JAFAN 6 3 PDF

US military JAFAN manual Protecting Special Access Program Information ( ). From WikiLeaks. Jump to: navigation, search. Donate to. (Note: Implementation must be within 6 months of publication via a Contract A- 3, In those cases where waivers are required, has the waiver request been. JAFAN , Revision 1. 3. Special Access Program Categories and Types (3) Provide facility security administration and management.

Author: Shaktik Meshura
Country: Bolivia
Language: English (Spanish)
Genre: Environment
Published (Last): 3 December 2011
Pages: 397
PDF File Size: 1.14 Mb
ePub File Size: 20.29 Mb
ISBN: 959-7-99702-334-8
Downloads: 63060
Price: Free* [*Free Regsitration Required]
Uploader: Dazragore

What links here Related changes Special pages Printable version Permanent link. WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. Views Page discuss View source. This includes other media organisations. Our submission system works hard to preserve your anonymity, but we recommend you also take some of your jaafn precautions. Do not talk about your submission to others If you have any issues talk to WikiLeaks.

File:JAFAN 6 – HORSE – Holistic Operational Readiness Security Evaluation.

We specialise in strategic global publishing and large archives. Tips for Sources After Submitting. If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.

Copy this address into your Tor browser. What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.

Submit documents to WikiLeaks

Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

  ENZO RULLANI PDF

Retrieved from ” https: Personal tools Log in.

If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you. We are the global experts in source protection — it is a complex field. See our Tor tab for more information. If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. If you have similar or updated material, see our submission instructions. Please review these basic guidelines.

Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. Was classified, confidential, censored or otherwise withheld from the public before release.

If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. How to contact WikiLeaks? Was first publicly revealed by WikiLeaks working with our source. Any questions about this document’s veracity are noted. Contact us to discuss how to proceed.

Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to. Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer. If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

  D.S.1802 DOBLE AGUINALDO PDF

If you used flash media to store sensitive data, it is important to destroy the jacan. Submit documents to WikiLeaks. The summary is approved by the editorial board. You can only access this submissions system through Tor.

US military JAFAN manual Protecting Special Access Program Information () – WikiLeaks

Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor. Donate to WikiLeaks Unless otherwise specified, the document described here: In particular, you should try to stick to your normal routine and behaviour.

If you have any issues talk to WikiLeaks. If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http: Is of political, diplomatic, ethical or historical significance.

File:JAFAN 6 3.pdf

Leaks News About Partners. In our experience it is always possible to find a custom solution for even the most seemingly difficult situations. Advanced users, if they wish, can jwfan add a further layer of encryption to their submission using our public PGP key. If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: