SECURE Applications

Name: Foreign Travel / Foreign Contact Management (FT-FC) Module
DESCRIPTION: Military Members and DoD Civilian personnel can enter Trip Requests, Trip Debriefs and Trip Related and non-Trip related Foreign Contacts for both Personal and Official travel.
STATUS: Production Pilot

Name: Risk Identification and Security Countermeasures (RISC)
DESCRIPTION: S&T Protection Module
STATUS: In Testing

Name: Security Classification Guides (SCG) Module
DESCRIPTION: Development and Management of SCGs
STATUS: In Development

Name: Security Incident Reporting/Management (SIR) Module
DESCRIPTION: Security Incident Reporting/Management/Tracking
STATUS: In Development

Need Help Accessing SECURE? DoD User Agreement Customer Support Email: Customer Support Phone Number:
Info and FAQs


This is a USG-interest computer system. This system and related equipment are intended for the communication, transmission, processing, and storage of official USG or other authorized information only. This USG-interest computer system is subject to monitoring at all times to ensure proper functioning of equipment and systems including security systems and devices, and to prevent, detect, and deter violations of statutes and security regulations and other unauthorized use of the system. Communications using, or data stored on, this system are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any authorized purpose.If monitoring of this USG-interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this USG-interest computer systems reveals violations of security regulations or other unauthorized use that information and other related information, including identification information about the user, may be used appropriate administrative or disciplinary action.Use of this USG interest computer system constitutes consent to authorized monitoring at all times. You can access the DAAPM here Contact your local field office with questions.