HOME



picture info

United States Uniformed Services Privilege And Identification Card
A United States Uniformed Services Privilege and Identification Card (also known as U.S. military ID, Geneva Conventions Identification Card, or less commonly abbreviated USPIC) is an identity document issued by the United States Department of Defense to identify a person as a Military personnel, member of the Armed Forces or a member's Military dependent, dependent, such as a child or spouse. The card is used to control access to List of American military installations, US military installations, Base exchange (such as Army and Air Force Exchange Service, AAFES, Navy Exchange, Marine Corps Exchange, Coast Guard Exchange), Defense Commissary Agency, commissaries and Morale, Welfare and Recreation, Morale Welfare and Recreation (MWR) facilities. It also serves as proof of eligibility for medical care delivered either directly within the Military Health System, military health system or non-military providers via the TRICARE medical system. The modern military identification car ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Geneva Conventions Identification Card From 2001
Geneva ( , ; ) ; ; . is the second-most populous city in Switzerland and the most populous in French-speaking Romandy. Situated in the southwest of the country, where the Rhône exits Lake Geneva, it is the capital of the Republic and Canton of Geneva, and a centre for international diplomacy. Geneva hosts the highest number of international organizations in the world, and has been referred to as the world's most compact metropolis and the "Peace Capital". Geneva is a global city, an international financial centre, and a worldwide centre for diplomacy hosting the highest number of international organizations in the world, including the headquarters of many agencies of the United Nations and the ICRC and IFRC of the Red Cross. In the aftermath of World War I, it hosted the League of Nations. It was where the Geneva Conventions on humanitarian treatment in war were signed. It shares a unique distinction with municipalities such as New York City, Basel, and Strasbourg as a c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Defense Enrollment Eligibility Reporting System
Defense Enrollment Eligibility Reporting System (DEERS) is a computerized database for United States Service members, military retirees, 100% VA Disabled Veterans, dependents, DoD active Contractors, and others worldwide who are entitled to Public Key Infrastructure and TRICARE eligibility. DEERS is used in the Real-Time Automated Personnel Identification System (RAPIDS). RAPIDS is United States Department of Defense system to issue the definitive credential within DoD for obtaining Common Access Card tokens in the DoD PKI. Used together, these two systems are referred to as a DEERS/RAPIDS stations, available in 700 locations in the world. With the expansion of base exchange online shopping privileges to all honorably discharged veterans beginning in 2017, the DEERS database is also used to verify non-disabled veterans' eligibility for the Veteran online shopping benefit. History DEERS was created in the late 1970s as a Joint Medical/Personnel Database, and first put into ope ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Space-A Travel
Space-available travel, also known as Space-A travel, is a means by which members of United States Uniformed Services (United States Military, reservists and retirees, United States Department of Defense civilian personnel under certain circumstances), and these groups' family members, are permitted to travel on aircraft of the Air Mobility Command under the jurisdiction of the United States Department of Defense when excess capability allows. Background Space available travel is a privilege that derives, in part, from United States Code, title 10, section 4744, which states, "officers and members of the Military Departments, and their families, when space is available, may be transported on vessels operated by any military transport agency of the Department of Defense". Space available travel is defined as "travel aboard DoD owned or controlled aircraft and occurs when aircraft are not fully booked with passengers traveling under orders". It is a privilege offered to United States ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Non-repudiation
In law, non-repudiation is a situation where a statement's author cannot successfully dispute its authorship or the validity of an associated contract. The term is often seen in a legal setting when the authenticity of a signature is being challenged. In such an instance, the authenticity is being "repudiated". For example, Mallory buys a cell phone for $100, writes a paper cheque as payment, and signs the cheque with a pen. Later, she finds that she can't afford it, and claims that the cheque is a forgery. The signature guarantees that only Mallory could have signed the cheque, and so Mallory's bank must pay the cheque. This is non-repudiation; Mallory cannot repudiate the cheque. In practice, pen-and-paper signatures are not hard to forge, but digital signatures can be very hard to break. In security In general, ''non-repudiation'' involves associating actions or changes with a unique individual. For example, a secure area may use a key card access system where non-repudia ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Data Encryption
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Despite its goal, encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users. Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often used in military m ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Two-factor Authentication
Multi-factor authentication (MFA; two-factor authentication, or 2FA) is an electronic authentication method in which a user is granted access to a website or Application software, application only after successfully presenting two or more distinct types of evidence (or Authentication#Authentication factors, factors) to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password. Usage of MFA has increased in recent years. Security issues which can cause the bypass of MFA are #Fatigue attack, fatigue attacks, phishing and SIM swap scam, SIM swapping. Accounts with MFA enabled are significantly less likely to be compromised. Authentication factors Authentication takes place when someone tries to log into a computer resource (such as a computer network, device, or application). The resource requires ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Personal Identification Number
A personal identification number (PIN; sometimes RAS syndrome, redundantly a PIN code or PIN number) is a numeric (sometimes alpha-numeric) passcode used in the process of authenticating a user accessing a system. The PIN has been the key to facilitating the private data exchange between different data-processing centers in computer networks for financial institutions, governments, and enterprises. PINs may be used to authenticate banking systems with cardholders, governments with citizens, enterprises with employees, and computers with users, among other uses. In common usage, PINs are used in ATM or PO transactions, secure access control (e.g. computer access, door access, car access), internet transactions, or to log into a restricted website. History The PIN originated with the introduction of the automated teller machine (ATM) in 1967, as an efficient way for banks to dispense cash to their customers. The first ATM system was that of Barclays in London, in 1967; it accepted ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Third Geneva Convention
The Third Geneva Convention, relative to the treatment of prisoners of war, is one of the four treaties of the Geneva Conventions. The Geneva Convention relative to the Treatment of Prisoners of War was first adopted in 1929, but significantly revised at the 1949 conference. It defines humanitarian protections for prisoners of war. There are 196 state parties to the Convention. Part I: General provisions This part sets out the overall parameters for GCIII: * Articles 1 and 2 cover which parties are bound by GCIII * Article 2 specifies when the parties are bound by GCIII ** That any armed conflict between two or more "High Contracting Parties" is covered by GCIII; ** That it applies to occupations of a "High Contracting Party"; ** That the relationship between the "High Contracting Parties" and a non-signatory, the party will remain bound until the non-signatory no longer acts under the strictures of the convention. "...Although one of the Powers in conflict may not be a pa ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Geneva Conventions
upright=1.15, The original document in single pages, 1864 The Geneva Conventions are international humanitarian laws consisting of four treaties and three additional protocols that establish international legal standards for humanitarian treatment in war. The singular term ''Geneva Convention'' colloquially denotes the agreements of 1949, negotiated in the aftermath of the Second World War (1939–1945), which updated the terms of the two 1929 treaties and added two new conventions. The Geneva Conventions extensively define the basic rights of wartime prisoners, civilians and military personnel; establish protections for the wounded and sick; and provide protections for the civilians in and around a war-zone. The Geneva Conventions define the rights and protections afforded to those non-combatants who fulfill the criteria of being '' protected persons''. The treaties of 1949 were ratified, in their entirety or with reservations, by 196 countries. The Geneva Conventio ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]