Beznosaukuma.gif
0000 2017 cutout center .png
Special Operations Group
!!2020 floating panell_edited.png

U.S. Government Warning Statement

Links provided on this website are networked to multiple U.S. Government (USG) & DoD Information Systems (IS) and are the property of the United States Government.  Those computer systems and related equipment are intended for the communication, transmission, processing, and storage of official U.S. Government or other authorized information only.  All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, COMSEC monitoring, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, to facilitate protection against unauthorized access, counterintelligence investigations, and to verify security procedures, survivability, and operational security and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. The USG routinely intercepts communications and data transfers within SOP guidelines. Information classified as privileged, including those of attorneys, psychotherapists, active intelligence officers , oversight, and clergy are exempt unless approved by the Director of National Intelligence.

If monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials.  By continuing you imply understanding and acceptance of this warning. 

symbol string2l.png

FEDERAL DATABASES

 
!! warning.gif
fingerprint.gif

TUCKER  GLOBAL

SECTION 5105

CONTRACTORS

ONLY.

TS/SCI

Log In Terminal
cia shield gead.png

Register a Secure+ SMS 2-Factor Device

Login with your

PIV or CAC

 

Remember to plug in your

PIV/CAC card

!! hrs_G Sample Contractor CAC.jpg

//  ERROR  //

// VALID CERTIFICATE NOT FOUND  //

 //  KEY ENCIPHERMENT NOT FOUND  //

// CARD NOT FOUND //

Insert valid identification

card per CI specification. 

Login with your

FACIAL

RECOGNITION

 

Register Scanner

reconocimiento-facial-2.gif
 

CONTRACTOR LOGINS

 
 
glass.jpg

AUTHORIZED ACCESS ONLY: CAC / PIV IDENTIFICATION AND SECURITY CLEARANCE ARE REQUIRED. 

TGI Shield small.png

INTELINK LOGIN

 
Military Operations Network

Rerouting to MILNET

~ END TRACE
BigheartedVagueFoal-small.gif

initializing network trace…

 

 

 

 

please stand by

Element ui purple gif 1.79MB.gif

VOICE PRINT AUTHORIZATION ACTIVATED.

UI voice input 84kb.gif

PLEASE STATE LAST NAME, FIRST NAME, CONTRACTOR NUMBER, &

PRIME CONTRACT HOLDER ID #

MILNET LOGIN

 

BASAL COMMUNICATIONS

SECURED.gif
globe modern .png

WORLD STATUS

REPORT

 

GENERAL INFORMATION

U.S. Department of Homeland Security

383px-Hsas-chart_with_header.svg.png
DHS CISA logo.png

FBI

Twitter

Defense Contract News

DIA chooses 16 firms for massive $17.1 billion military intelligence support contract

Military Embedded Systems

dia cutoutWHT.png

WASHINGTON. The Defense Intelligence Agency (DIA) has awarded spots to 16 companies on a potential 10-year, $17.1 billion contract to provide military intelligence support for national-security policymakers, defense planners, and warfighters in the field.

Awarded under the terms of the contract are BAE Systems, Bluehawk, Booz Allen Hamilton, CACI International, Calhoun International, Celestar, Edge Analytic Solutions, Huntington Ingalls Industries, General Dynamics Information Technology, Invictus International Consulting, Leidos, Mission Essential Personnel, Perspecta, Preting, SOS International, and the Buffalo Group.

Work under the ID/IQ contract -- dubbed the Solutions for Intelligence Analysis 3 award -- will occur at multiple sites in the continental U.S. and abroad through August 2029

NCS embossed shadow.png

Clandestine Services In Action:

Federal investigators conducting covert surveillance and other Clandestine operations successfully breached security at two secure U.S. government facilities in Maryland and Colorado proving a lack of security protocols.   ...The Full Story...

The Advanced Aerospace Threat Identification Program, (AATIP) utilized Clandestine Officers to investigate incidents in what can best be described as the 21st century's version of Project Blue Book.  The real "Men in Black" back in action? Doubtful.  ...The Full Story...

This section is being updated.

the reference database will be available shortly.

gold encryption.gif
9_squares_dot.gif
DNA