Skip Navigation Links
Skip navigation links
Home
Garrison
Test Center
2ND EN BN
Public Affairs
NEC (DOIM)
Network Integration Evaluation (NIE)
Skip navigation links
Who We Are
Welcome
Garrison
Garrison CommanderExpand Garrison Commander
DirectoratesExpand Directorates
About White SandsExpand About White Sands
Garrison Management OfficesExpand Garrison Management Offices
Installation Support OfficesExpand Installation Support Offices
NewcomersExpand Newcomers
West Region Police Academy
Feedback/ICE
Army Emergency Relief Campaign (AER)
Homeowners Assistance Program
H1N1 Information Center
Garrison Publications
McAfee U.S Army Health ClinicExpand McAfee U.S Army Health Clinic
WSMR Army Ready and Emergency Management
WSMR Army Ready and Emergency Management Training Instructions
White Sands Missile Range Post Phone Book
Interactive Customer Evaluation (ICE)
Test Center
2ND EN BN
Public Affairs
508 Compliance
Inspector General
Environmental Impact Stmt.
WSMR Road Block Schedule
NEC (DOIM)
Unexploded Ordnance (UXO)
Around The Army
Network Integration Evaluation (NIE)
Click for IMCOM Campaign PlanClick for Emergency Preparedness InformationClick for Army Community ServicesClick for Housing Crisis AssistanceClick for Army Family Covenant web site.Click for Ready Army web siteClick for Post GuideClick for Sexual Assault Prevention and Response Program BrochureClick for H1H1 Swine Flu Information CenterClick for the United States Army community Covenant web site.Click for WSMR Environmental Management System (EMS) brochure.Click for WSMR Environmental Policy MemoramdumClick for WSMR Garrison Strategic Action Plan

Interactive Customer Evaluation
WSMR Test Center |  WSMR Garrison |  AKO |  Contact Us

This is a Department of Defense Computer System. This computer system, including all related equipment, networks, and network devices (specifically including Internet access) are provided only for authorized U.S. Government use. DoD computer systems may be monitored for all lawful purposes, including to ensure that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security. Monitoring includes active attacks by authorized DoD entities to test or verify the security of this system. During monitoring, information may be examined, recorded, copied and used for authorized purposes. All information, including personal information, placed or sent over this system may be monitored.

Use of this DoD computer system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or other adverse action. Use of this system constitutes consent to monitoring for these purposes.

Last modified on: 11/30/2012 12:57 PM