FORT MOORE, GA – During the week of 8 to 11 February 2021 selected Western Hemisphere PNIs conducted region familiarization with 1SFAB Soldiers at their training site on Kelly Hill.
The Soldiers are conducting training for future assistance visits to countries within the U.S. Southern Command Area of Operations.
One of the WHINSEC briefers was Colombian Army former Senior Enlisted Advisor, CSM(RET) Argemiro Posso. During his engagements with 1SFAB Soldiers he assumed the role-play of a distinguished visitor. This provided experience in interacting with high-ranking individuals in Latin America.
“The interest of the Soldiers(1SFAB) regarding the information we provided was impressive. They are focused on their mission, and very involved in learning more about the countries they are to visit in the future, said Posso. “Amongst the questions they had, one impressed me the most. They wanted to know how the U.S. military is perceived in our countries. Likewise, how our military is regarded by our civilian population.”
During the exercise, WHINSEC PNI’s talked about their specific countries’ important issues regarding training. They also talked about the strategic and operational environment within their own borders.
COL Cenen Castillo, WHINSEC Deputy Commandant for Police Affairs added, “We briefed them about our countries’ challenges dealing with narco-traffickers.” Additionally, what our public safety entities are doing in the areas of training to combat these challenges, he added.
“You can see the 1SFAB Soldiers’ commitment to be a force multiplier for our partner allies in the region,” concluded Castillo.
Joint Interagency Intergovernmental Multinational – Key on the fight against International Crime. October 7, 2021
Season 1 August 18, 2021
An Investment in Knowledge pays the Best Interest. – Benjamin Franklin July 2, 2021
NCOs Lead the Way June 29, 2021
Future Course & Initiatives June 29, 2021
The content of the Course Repository is limited to only those courses that have been
validated by the Office of the Registrar and approved for public release by the
school. Many older courses will not appear in the repository.
However, if you would like to request that a particular course be evaluated and added
to the repository then you can contact the
Office of the Registrar.
Contact Army University for information about privacy and privacy-related requirements
to include Privacy Act system of record notices; DD Form 2930, Privacy Act Assessments;
Office of Management and Budget control numbers required by the Paperwork Reduction
Act of 1995; Privacy Act statements, social security number justification/elimination
plans, and more.
32 CFR Part 505
Army Regulation 25-22
Records Management and Declassification Agency Privacy
Army G-6/CIO Privacy Impact Assessment (.pdf file)
Leader's Guide to Protecting Personally Identifiable Information (.pdf file)
System Owner's Guide to Accreditation and Data Protection (.pdf file)
DOD ID Number and PII Policy
Report possible and confirmed breaches of PII IAW
TRADOC Regulation 1-8.
Personal Information. Information about an individual that identifies,
links, relates, or is unique to, or describes him or her, for example, a social
security number (SSN); age; military rank; civilian grade; marital status; race;
salary; home/office phone numbers; other demographic, biometric, personnel; medical;
and financial information, etc. Such information is also known as PII (that is,
information which can be used to distinguish or trace and individual’s identity
such their name, SSN, date and place of birth, mother’s maiden name, and biometric
records including any other personal information which is linked or linkable to
a specified individual). This information can be in hard copy (paper copy files)
or electronic format, stored on personal computers, laptops, and personal electronic
devices such as blackberries and found within databases. This includes but is not
limited to, education records, financial transactions, medical files, criminal records,
or employment history.
PII Breach. A loss of control, compromise, unauthorized disclosure,
unauthorized acquisition, unauthorized access, or any similar term referring to
situations where persons other than authorized users and for an other than authorized
purpose have access or potential access to personally identifiable information,
whether physical or electronic. This includes, but is not limited to, posting PII
on public-facing websites; sending via e-mail to unauthorized recipients; providing
hard copies to individuals without a need to know; loss of electronic devices or
media storing PII (for example, laptops, thumb drives, compact discs, etc.); use
by employees for unofficial business; and all other unauthorized access to PII.
www.ArmyUniversity.edu website is provided as a public service by Army University
representing Schools and Centers Army-wide. Information presented on this site is
considered public information and may be distributed or copied unless otherwise
specified. Use of appropriate byline/photo/image credits is requested.
User Terms of Agreement
External Links Disclaimer
The appearance of hyperlinks to external sites does not constitute endorsement by
the Army University or the Department of the U.S. Army of the linked web site or
the information, products or services contained therein. The Army University does
not exercise any editorial control over the information found at these locations.
Such links are provided consistent with the stated purpose of this DoD web site.
The use of copyrighted material within the Army is subject to U.S. copyright law
as reflected in Army regulations. It is Army policy to recognize and respect the
rights of copyright owners. This page does not create any right, remedy, or cause
of action for any person against the Army.
It is Department of the Army policy to recognize the rights of copyright owners
(e.g., photo journalists or embedded media) consistent with the Army's mission and
worldwide commitments. Copyrighted works will not be reproduced or distributed outside
of the Army without the written or electronically conveyed permission of the copyright
In the event a copyright owner grants the Army written or electronically conveyed
permission to use copyrighted material for internal command information or morale
and welfare purposes, commanders or heads of Army activities will take care to assure
that such permission is not abused by improper use of the material.
In addition, any use of copyrighted material, for which permission has been obtained,
will carry attribution for the source of the material. Army Public Affairs will
continue to make every effort to reinforce this policy through public affairs channels
and to ensure widest dissemination of these guidelines around the Army, and at every
level of command.
Copyrighted material in the Army's possession should be safeguarded from accidental
Copyright issues are under the purview of the Office of the Judge Advocate General
and are covered in Army Regulation 27-60, Intellectual Property.
Army Regulation 25-1 prohibits the posting of documents or information protected
by a copyright on Army websites without the permission of the copyright holder.
Licensed use. A license is a contract which identifies the terms under which the
Army can use a copyrighted work (e.g., can use my painting on the Army website for
a period of 6 months, but not for any other purposes). There is no required format
for a license and different licenses will vary greatly in their terms. At a minimum,
the organization which receives the license should file a record copy. This will
vary based on the scope of the license and intended use of the copyrighted work.
For example, Office of Chief of Public Affairs might keep track of any licenses
which allow use of a copyrighted work on the Army website, but a battalion might
keep track of a license to use a copyrighted work in a locally distributed document.
Use of information in these resources is governed by the U.S. copyright law, as
well as individual database vendor agreements. According to the fair use clauses
of U.S. copyright law, you may cite short excerpts in papers and reports for classroom
and other academic uses if you also cite the source of the information (e.g. journal
article). You may not use entire works for this purpose. When using information
from these databases, properly cite and credit the source.
If you have any questions or comments about the information presented here, please
forward them to us using our Contact Us link.
To verify course completion, please click the image below.
To determine if a course you have completed has ACE credit recommendation, please click the image below.
To determine if there are related credentials and occupations for a course you have completed, please click the image below.