当前位置:文档之家› Operations AIR FORCE DEFENSIVE COUNTERINFORMATION OPERATIONS

Operations AIR FORCE DEFENSIVE COUNTERINFORMATION OPERATIONS

Operations AIR FORCE DEFENSIVE COUNTERINFORMATION OPERATIONS
Operations AIR FORCE DEFENSIVE COUNTERINFORMATION OPERATIONS

BY ORDER OF THE

SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-201 OCTOBER 1998

Operations

AIR FORCE DEFENSIVE

COUNTERINFORMATION OPERATIONS

OPR:HQ USAF/XOIWD (Lt Col John W. Levy) Certified by:HQ USAF/XO

(Lt Gen Marvin Esmond)

Pages:9

Distribution:F

This policy directive provides guidance for planning and conducting defensive counterinformation (DCI)operations, the aerospace function through which the Air Force employs its defensive Information Oper-ations (IO) capabilities. This policy applies to all military and civilian Air Force personnel, members of the Air Force Reserve, Air National Guard, DoD contractors, and individuals or activities under legal agreement or obligation with the Department of the Air Force.

The success of aerospace operations depends on the Air Force’s ability to access reliable information,effectively utilize information systems, and perform information functions despite adversarial attempts to exploit or deny those capabilities. The Air Force will employ comprehensive, integrated defensive coun-terinformation (DCI) operations to protect and defend Air Force information and information systems.DCI is a multi-discipline mission area impacting many functional areas. Air Force DCI capabilities include information assurance, operations security (OPSEC), counterintelligence, counter-deception,counterpsychological operations, and electronic protection. Effective DCI requires the full integration of numerous supporting activities to include intelligence and IO-related law enforcement efforts, as well as physical, personnel, industrial, and information security (e.g., document classification and control) mea-sures. The Air Force will integrate DCI awareness, objectives and capabilities into strategy, plans, oper-ations, acquisition and procurement, exercises, inspections, training, communications and computer architectures, systems development, and professional education. AFPD 10-20 is not intended to duplicate or interfere with the management of those functional aspects of DCI that are already working well; rather,it provides the policy basis for an overarching, integrated DCI program for the Air Force.

1.The identification and protection of sensitive and classified information (see appendix for definitions)is required by public law, Executive Order, and regulation. OPSEC analysis leads to the identification of additional critical information and operational indicators which may be of value to an adversary. Protect-ing sensitive and classified information, as well as critical information/indicators derived via the OPSEC process is an inherent responsibility of command. Compliance with all DCI policy and directives will be enforced through command channels.

NOTICE:This publication is available digitally on the SAF/AAD WWW site at: https://www.doczj.com/doc/9a8338923.html,.If you lack access, contact your Publishing Distribution Office (PDO).

2.DCI planning will be integrated with other aerospace operational planning. Information will be pro-tected and defended at a level commensurate with the threat and the consequences of its compromise, delay, or loss.

2.1.All operational and exercise plans will identify critical and sensitive information and information

system dependencies (i.e., centers of gravity). Additional guidance to help determine information criticality/sensitivity is provided in CJCSI 6510.01B, Defensive Information Operations Implementa-tion, and DoDD 5200.xx, Information Assurance (draft). These plans will use and develop IO sec-tions of the Joint Operational Planning and Execution System (JOPES) as applicable.

https://www.doczj.com/doc/9a8338923.html,manders and operational planners will use risk management to apply operational, proce-

dural, physical and technical countermeasures to reduce existing vulnerabilities.

3.Units (i.e., AFIWC, 609IWS), and activities (i.e., Regional/MAJCOM Information Protection Centers and Network Control Centers) that conduct proactive security functions to assist Air Force organizations to deter, detect, defend, report, isolate, contain, and recover from intrusions of information systems will report their resources as part of the Status of Resources and Training System (SORTS) process. Air Staff functional managers, in conjunction with AF/XO, will establish appropriate criteria for this SORTS reporting.

4.Procedures and criteria for reporting DCI events will be adhered to by all Air Force units, to include acquisition and procurement organizations. DCI events include attempted or actual intrusions into Air Force information systems; espionage--to include industrial espionage; spectrum interference incidents; detected adversarial PSYOP or deception efforts; and physical attacks on the Air Force information infra-structure. HQ Air Intelligence Agency (AIA), in coordination with Air Staff, MAJCOMs, HQ AFOSI and HQ AFCA, is the lead agency for developing standardized, comprehensive reporting criteria and reporting procedures for DCI events. HQ AIA, in coordination with the AFOSI, will compile and analyze data on all DCI events and will provide fused reporting to AF command, intelligence, and law enforce-ment channels and other DCI operational entities (i.e., AFCERT, 609 IWS, AFNCCs, etc.) as appropriate.

5.The Air Intelligence Agency will establish a “Red Team” capability to periodically evaluate the defen-sive readiness of Air Force units, headquarters, and DRUs. The Red Team will participate as “aggressor units” in operational test, training and exercise events. Air Intelligence Agency will develop policy and procedures for conducting Red Team assessments in concert with appropriate Air Force organizations, such as MAJCOMs who have overall responsibility for the effective implementation of DCI vulnerability assessments within their commands. AFIWC will provide on-demand technical support to all AF organi-zations to conduct DCI-related vulnerability assessments. AIA will work with the Air Force Inspector General to incorporate assessments into readiness inspections.

6.The Air Force Operations Security (OPSEC) program, managed by AF/XO, and the Air Force Infor-mation Assurance program, managed by AF/SC, will be conducted in accordance with existing Air Force policy. MAJCOM commanders are responsible for the effective implementation of these programs. All Air Force members must abide by published security standards and procedures if these programs are to succeed.

7.The Air Intelligence Agency, in coordination with Air Force Special Operations Command and Air Combat Command, will provide a framework for developing and operationalizing the constructs of coun-

terdeception and counter-psychological operations. Various friendly entities (e.g., ISR, military units, and commanders) can identify adversary PSYOP and deception attempts to influence friendly populations and military forces. Air Force counter-PSYOP capabilities will complement existing Joint Psychological Operations Task Force (JPOTF) activities as part of an integrated IO campaign.

8.Air Force commanders must consider how Public Affairs and other military information dissemination can convey truthful, accurate information to mitigate the intended effects of adversary PSYOP. When permitted by National Command Authorities, commanders may use other forces to undertake offensive responses (i.e., physical attack, electronic warfare, etc.) to counter adversarial PSYOP and deception activities.

9.The Air Force will plan and employ Electronic Protection (EP), the defensive component of Electronic Warfare, in accordance with existing doctrine and policy. Air Force EP, while defensive in nature, will be conducted and managed as part of the existing, consolidated EW program which includes electronic attack, electronic protection and electronic support activities. Future EP planning and requirements development must address emerging EW threats (e.g., directed energy weapons, and non-nuclear EMP, other radio frequency weapons, etc.).

10.The Air Force Office of Special Investigations (AFOSI) is the lead agency for the Air Force counter-intelligence program and is responsible for conducting electronic surveillance countermeasures and investigations of unauthorized intrusions into USAF information systems. Close and early coordination between AFOSI and all other DCI team members is critical, as investigations of DCI events frequently cross the functional and legal lines between operations, intelligence, counter-intelligence, and law-enforcement.

11.Effective DCI requires the full integration of several traditional security programs managed by AF/ SF:

11.1.The Air Force Physical Security program protects the Air Force critical information infrastruc-

ture against conventional or non-conventional attack (e.g., terrorist actions, traditional air base defense threats, etc.) and is an important supporting link in the overall DCI mission area. Air Force operations are vulnerable to unauthorized access and denial-of-service threats. Therefore, command-ers must ensure that users and owners of information systems identify both physical and electronic security requirements, and that these requirements be met. Additionally, physical and electronic secu-rity requirements must be integrated into operational planning.

11.2.The Air Force Personnel Security program (i.e., security clearances and access controls) is

essential to minimize the threat posed by disgruntled employees or hostile internal agents. Internal agents pose a serious threat to Air Force operations due to their unique--often unlimited--access to critical information and information systems. All personnel have a role in maximizing personnel security by being conscious of their working environment, and by noting and reporting suspicious or unusual activities by others.

11.3.The Air Force Information Security program provides policy and procedures for the protection

of classified national security information.

11.4.The Air Force Industrial Security program includes policy and procedures for protecting classi-

fied information in the hands of US contractors.

12.DCI measures will be embedded into Air Force acquisition programs to ensure security and surviv-ability are integrated throughout the life of a program IAW DoDD 5200.1M, Acquisition System Protec-tion Program and DoDD 5200.39, Security, Intelligence and Counterintelligence Support to Acquisition Program Protection. The Air Force acquisition process will provide Information Assurance for informa-tion systems and information-based systems on a "cradle-to-grave" basis, with operational users actively engaged in the definition of operational and training requirements.

13.Air Force DCI operations will respect the rights of US citizens, carefully heeding the rules and proce-dures in associated laws and directives. DCI activities will be coordinated with cognizant General Coun-sel and Staff Judge Advocate authorities.

14.The Air Force will work with the other Services and Defense Agencies, the Joint Staff and CINCs, and other government agencies to maximize the security and integrity of USAF information at all times, to include exercises. It will abide by the law and other policies and standards established by appropriate command and control, intelligence, law enforcement, and communications and information authorities.

15.The Air Force will foster strong relationships with commercial industry and other civilian partners to promote the exchange of operational data, tactics, techniques and procedures in order to leverage common capabilities and enhance the overall defensive preparedness of Air Force and critical US information infrastructures. The Air Force will leverage the Reserve Component, with its unique integration into the civilian sector, to achieve this goal.

16.DCI entails a multi-discipline capability that can succeed only as an integrated team effort across nearly all Air Force functional areas. Operations (DO equivalent) is the overall lead for both offensive and defensive counterinformation. Specific DCI disciplines (e.g., OPSEC, counterintelligence, electronic protection, information assurance, etc.) and supporting disciplines (e.g., physical security, personnel security, etc.) will be executed by appropriate functional elements as delineated by existing and emerging Air Force guidance.

17.MAJCOM, NAF, FOA, and DRU Commanders are responsible for implementing and enforcing Air Force DCI policies and directives in their day-to-day operations, as well as for planning, prioritizing, and programming the DCI activities of their commands.

18.Successful DCI begins with each individual accepting and carrying out his/her responsibilities in pro-tecting information and information systems from attack and exploitation by adhering to all applicable policies and procedures.

19.See Attachment 1 for references and and other supporting information.

F. Whitten Peters

Acting Secretary of the Air Force

Attachment 1

GLOSSARY OF REFERENCES AND SUPPORTING INFORMATION

References

DoD Directive S-3600.1, Information Operations, 9 December 1996

DoD Directive 5200.xx, Information Assurance, Draft, 19 May 1998

DoD Directive 5200.1M, Acquisition System Protection Program, Draft, September 1997

DoD Directive 5200.39, Security, Intelligence and Counterintelligence Support to Acquisition Program Protection, 10 September 1997

Joint Pub 1-02, Department of Defense Dictionary of Military and Associated Terms, 23 March 1994 CJCSI 3210.01, Information Warfare Policy, 2 January 1996

CJCSI 3213.01A, Joint Operations Security, 1 December 1997

CJCSI 6510.01B, Defensive Information Operations Implementation, 22 August 1997

AFDD 1, Air Force Basic Doctrine, September 1997

AFDD 2-5, Information Operations, Final Draft, 6 April 1998

NSTISSI No. 4009, National Information Systems Security Glossary, August 1997

AFPD 10-7, Command and Control Warfare, 12 August 1993

AFPD 10-11, Operations Security, 17 May 1993

AFPD 31-1, Physical Security, 1 August 1995

AFPD 31-4, Information Security, 1 August 1997

AFPD 31-5, Personnel Security Program Policy, 1 August 1995

AFPD 31-6, Industrial Security, 1 August 1997

AFPD 33-2, Information Protection, 1 December 1996

AFPD 71-1, Criminal Investigations and Counterintelligence, 3 March 1995

Terms

Classified Information—Official information which has been determined to require, in the interests of national security, protection against unauthorized disclosure and which has been so designated. (Joint Pub 1-02)

Counterdeception—Efforts to negate, neutralize, diminish the effects of, or gain advantage from a foreign deception operation. (Joint Pub 1-02).

Counterintelligence—Information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations, or foreign persons, or international terrorist activities. (Joint Pub 1-02)

Counterpsychological Operations—Efforts to negate, neutralize, diminish the effects of, or gain advantage from foreign psychological operations.

Defensive Counterinformation—Activities which are conducted to protect and defend friendly information and information systems. Also called DCI. (AFDD 2-5)

Information Assurance—Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. (DoDD S-3600.1)

Information Operations—Actions taken to affect adversary information and information systems while defending one’s own information and information systems. Also called IO. (Joint Pub 3-13, Preliminary Coordination, 28 Jan 98.) (This term promulgated in DoDD S-3600.1) The Air Force believes that in practice a more useful working definition is: [those a-ctions taken to gain, exploit, defend or attack information and information systems and include both information-in-warfare and information warfare.] {Italicized definition in brackets applies only to the Air Force and is offered for clarity.} (AFDD 2-5) Information Superiority—The capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same. Also called IS. (Joint Pub 3-13, Preliminary Coordination, 28 Jan 98.) (This term promulgated in DoDD S-3600.1) The Air Force prefers to cast ‘superiority’ as a state of relative advantage, not a capability, and views Information Superiority as: The Air Force prefers to cast ‘superiority’ as a state of relative advantage, not a capability, and views IS as: [That degree of dominance in the information domain which allows friendly forces the ability to collect, control, exploit, and defend information without effective opposition.] . {Italicized definition in brackets applies only to the Air Force and is offered for clarity.} (AFDD 2-5)

Critical Information—Information about friendly activities, intentions, capabilities, or limitations that an adversary needs in order to gain a military, political, diplomatic, or technological advantage. (CJCSI 3213.01A)

Operations Security—A process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to: a. Identify those actions that can be observed by adversary intelligence systems. b. Determine indicators hostile intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries. c. Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. Also called OPSEC. (Joint Pub 1-02) Sensitive Information—Information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of federal programs, or the privacy to which individuals are entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense or foreign policy. (NSTISSI No. 4009)

Attachment 2

MEASURING AND DISPLAYING COMPLIANCE WITH POLICY

A2.1.Defensive counterinformation (DCI) is a multi-discipline capability impacting many functional areas. Several DCI capabilities (e.g., information assurance, OPSEC, counterintelligence, etc.) have been implemented for years through existing policy and AFIs. AFPD 10-20 is not intended to duplicate or interfere with the management of those elements of the DCI program that are already working well. How-ever, all Air Force policy directives, instructions, and other official guidance pertaining to DCI operations will be reviewed annually by OPRs and, as necessary, updated or reinvigorated to reflect the growing IO threat.

A2.2.The strategy for reporting compliance with this AFPD entails the following: HQ AIA, a field oper-ating agency of HQ USAF/XO, will serve as the OPR for measuring Air Force-wide compliance with DCI policy via a comprehensive annual report to AF/XO. This report will depict the overall health of the Air Force DCI mission area, as measured by the agencies responsible for the various DCI programs and the Inspector General. The report should be developed by assessing existing metrics already in place under current AF policy and by assessing new metrics which will be developed by functional OPRs in support of this AFPD (e.g., SORTS, legal review of defensive IO operational activities, etc.). A compre-hensive list of inclusive DCI policy areas, to include those areas for which new metrics are required, as well as specific guidance to functional OPRs for reporting compliance data to HQ AIA, will be provided in a subordinate AFI. As they become available, SORTS reporting and IO-related exercise results and lessons-learned will be compiled by HQ AIA for integration into the annual compliance report to ensure it provides a comprehensive assessment of the DCI program. Examples of metrics from designated func-tional OPRs to be integrated into the annual report are identified below.

Figure A2.1.Sample Metric of Systems Accreditation Status.

Figure A2.2.Sample Metric of AFOSI Case Resolution Rates for Counterintelligence and Com-puter Crime.

Figure A2.3.Sample Metric of IG Inspection Results for OPSEC Programs.

国际鞋尺码对照表

鞋舌上标注说明:CM即厘米,为鞋的部长度;EUR即欧洲码,为中国人平时购鞋时所说的鞋码;US即美国码,UK即英国码也都是选购运动鞋时的一个参照。脚板窄者选鞋不会有太大影响,脚板宽或厚者需穿大一号甚至大二号的鞋! 鞋子尺码对照表 标准通用尺码对照表 男鞋尺码对照表(标准通用) 女鞋尺码对照表(标准通用)

Adidas 尺码对照表 Adidas 男鞋尺码对照表 欧洲码/EUR 39 40 40.5 41 42 42.5 43 44 44.5 45 46 46.5 47 厘米/CM 24 24.5 25 25.5 26 26.5 26.5 27 27.5 27.5 28 28.5 29 英国码/UK 6 6.5 7 7.5 8 8.5 9 9. 5 10 10.5 11 11.5 12 标准尺码(mm) 240 245 250 255 260 265 270 275 280 285 290 295 女式 欧洲码/EUR 36 36.5 37 38 38.5 39 40 40.5 41 42 42.5 厘米/CM 22 22.5 23 23.5 23.5 24 24.5 24.5 25 26 26.5 英国码/UK 3. 5 4 4. 5 5 5.5 6 6.5 7 7. 5 8 8.5 中性 欧洲码/EUR 36 36.5 37 38 38.5 39 40 40.5 41 42 42.5 43 44 44.5 45 46 厘米/CM 22 22.5 23 23.5 23.5 24 24.5 24.5 25.5 26 26.5 26.5 27 27.5 27.5 28 英国码/UK 3. 5 4 4. 5 5 5.5 6 6.5 7 7.5 8 8.5 9 9. 5 10 10.5 11 Nike 尺码对照表 Nike 男鞋尺码对照表 欧洲码/EUR 38.5 39 40 40.5 41 42 42.5 43 44 44.5 45 45.5 46 47 47.5 厘米/CM 24.5 24.5 25 25.5 26 26.5 27 27.5 28 28.5 29 29.5 30 30.5 31 美国码/US 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 11.5 12 12.5 13

中国美国国际鞋码对照表

鞋码对照表,中国/美国/国际鞋码对照表 鞋码,通常也称鞋号,是用来衡量人类脚的形状以便配鞋的标准单位系统。目前世界各国采用的鞋码并不一致,但一般都包含长、宽两个测量。长度是指穿者脚的长度,也可以是制造者的鞋楦长。即使在同一个国家/地区,不同人群和不同用途的鞋,例如儿童、运动鞋,也有不同的鞋码定义。下面是尺码对照表,可以帮你解决如何挑选正确的码数;经过量度脚长与脚宽,让你能够挑选到合适的鞋子。 国际标准鞋号表示的是脚长的毫米数。 中国标准采用毫米数或厘米数。如:245是毫米数,24 1/2是厘米数,表示一样的尺码。 换算公式: 厘米数×2-10=欧制(欧制+10)÷2=厘米数 厘米数-18+=美制美制+18-=厘米数 厘米数-18-=英制英制+18+=厘米数 (欧码+10)×5=中国鞋号,如欧码35的鞋,对应的中国鞋号为225;欧码37对应的中国鞋号为235。 鞋号换算表(单位:毫米)34号——22035号——22536号——23037号——23538号——24039号——24540号——25041号——25542号——26043号——26544号——27045号——275。 男人鞋尺码对照表: 女人鞋尺码对照表:

儿童鞋尺码对照表: 国际(成年人)女鞋码尺寸对照表:

国际(成年人)男子鞋码尺寸对照表:

标准通用尺码对照表 男鞋尺码对照表(标准通用) 尺码 39 40 41 42 43 44 45 46 47 脚长(mm) 美国码 7 8 9 10 日本码 国际码 245 250 255 260 265 270 275 280 285 女鞋尺码对照表(标准通用) 尺码 35 36 37 38 39 40 41 42 脚长(mm) 美国码 5 6 7 8 日本码 国际码 225 230 235 240 245 250 255 260 Adidas 尺码对照表 Adidas 男鞋尺码对照表 中国码 38 2/3 39 1/3 40 40 2/3 41 1/3 42 42 2/3 43 1/3 44 44 2/3 45 1/3 46 美国码 6 7 8 9 10 11 英国码 6 7 8 9 10 11 标准尺码(mm) 240 245 250 255 260 265 270 275 280 285 290 295 Nike 尺码对照表 Nike 男鞋尺码对照表 中国码 39 40 41 42 43 44 45 美国码 6 7 8 9 10 11

国际的鞋尺码对照表

鞋舌上标注说明:CM即厘米,为鞋的内部长度;EUR即欧洲码,为中国人平时购鞋时所说的鞋码;US即美国码,UK即英国码也都是选购运动鞋时的一个参照。脚板窄者选鞋不会有太大影响,脚板宽或厚者需穿大一号甚至大二号的鞋! 鞋子尺码对照表 标准通用尺码对照表 男鞋尺码对照表(标准通用) 女鞋尺码对照表(标准通用)

Adidas 尺码对照表Adidas 男鞋尺码对照表 欧洲码/EUR 3 9 40 40. 5 41 4 2 42. 5 43 44 44. 5 45 4 6 46. 5 4 7 厘米/CM 2 4 24. 5 25 25. 5 2 6 26. 5 26. 5 27 27. 5 27. 5 2 8 28. 5 2 9 英国码/UK 6 6.5 7 7.5 8 8.5 9 9. 5 10 10. 5 1 1 11. 5 1 2 标准尺码(mm) 240 245 250 255 260 265 270 275 280 285 290 295 女式 欧洲码 /EUR 36 36. 5 37 38 38. 5 3 9 40 40. 5 41 4 2 42. 5 厘米/CM 22 22. 5 23 23. 5 23. 5 2 4 24. 5 24. 5 25 2 6 26. 5

英国码/UK 3. 5 4 4. 5 5 5.5 6 6.5 7 7. 5 8 8.5 中性欧洲码 /EUR 36 36. 5 37 38 38. 5 3 9 40 40. 5 41 4 2 42. 5 43 44 44. 5 45 4 6 厘米/CM 22 22. 5 23 23. 5 23. 5 2 4 24. 5 24. 5 25. 5 2 6 26. 5 26. 5 27 27. 5 27. 5 2 8 英国码/UK 3. 5 4 4. 5 5 5.5 6 6.5 7 7.5 8 8.5 9 9. 5 10 10. 5 1 1 Nike 尺码对照表Nike 男鞋尺码对照表 欧洲码/EUR 38. 5 39 4 40. 5 4 1 42 42. 5 43 4 4 44. 5 4 5 45. 5 4 6 47 47. 5 厘米/CM 24. 5 24. 5 2 5 25. 5 2 6 26. 5 27 27. 5 2 8 28. 5 2 9 29. 5 3 30. 5 31 美国码/US 6 6.5 7 7.5 8 8.5 9 9.5 1 0 10. 5 1 1 11. 5 1 2 12. 5 13 标准尺码(mm) 240 245 250 255 260 265 270 275 280 285 290 Nike 女鞋尺码对照表 欧洲码 /EUR 35 35. 5 36 36. 5 37. 5 3 8 38. 5 3 9 40 40. 5 41 4 2 43

★鞋子尺码对照表大全(标准通用)★美国码★日本码★国际码★英国码★

★鞋子尺码对照表大全(标准通用)★美国码★日本码★国际码★英国码★ 鞋子尺码对照表 标准通用尺码对照表 男鞋尺码对照表(标准通用) 尺码39 40 41 42 43 44 45 46 47 脚长(mm)23.6-24 24.1-245 24.6-250 25.1-255 25.6-260 26.1-265 26.6-270 27.1-275 27.6-280 美国码 6.5 7 7.5 8 8.5 9 9.5 10 10.5 日本码24.5 25.0 25.5 26.0 26.5 27.0 27.5 28.0 28.5 国际码245 250 255 260 265 270 275 280 285 女鞋尺码对照表(标准通用) 尺码35 36 37 38 39 40 41 42 脚长(mm)22.1-225 22.6-230 23.1-235 23.6-240 24.1-245 24.6-250 25.1-255 25.6-260 美国码5 5.5 6 6.5 7 7.5 8 8.5 日本码22.5 23.0 23.5 24.0 24.5 25.0 25.5 26.0 国际码225 230 235 240 245 250 255 260 Adidas 尺码对照表 Adidas 男鞋尺码对照表 中国码38 2/3 39 1/3 40 40 2/3 41 1/3 42 42 2/3 43 1/3 44 44 2/3 45 1/3 46 美国码6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 11.5 英国码5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 标准尺码(mm)240 245 250 255 260 265 270 275 280 285 290 295 Nike 尺码对照表 Nike 男鞋尺码对照表 中国码38.5 39 40 40.5 41 42 42.5 43 44 44.5 45 美国码6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 英国码5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 标准尺码(mm)240 245 250 255 260 265 270 275 280 285 290 Nike 女鞋尺码对照表 中国码35 35.5 36 36.5 37.5 38 38.5 39 40 40.5 41 美国码4.5 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 英国码2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 标准尺码(mm)220 220 225 230 235 240 245 250 255 260 265 Reebok 尺码对照表 Reebok 男鞋尺码对照表

国际鞋尺码标准对照表

男鞋尺码标准对照表:(日本的单位为cm) 欧洲(EUROPE)39 40 40.5 41 42 42.5 43 44 44.5 45 美国(US)6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 英国(UK)6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 日本(JAPAN)24.5 25 25.5 26 26.5 27 27.5 28 28.5 29 台湾(TAIWAN)69 70 71 72 73 74 75 76 77 78 中国码39 39.5 40 41 42 42.5 43 43.5 44 45 女鞋尺码标准对照表:(日本的单位为cm) 欧洲(EUROPE)34 34.5 35 35.5 36 36.5 37 37.5 38 38.5 39 39.5 40 美国(US)4 4.5 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 英国(UK)2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8 日本(JAPAN)21 21.5 22 22.5 23 23.5 24 24.5 25 25.5 26 26.5 27 台湾(TAIWAN) 64 65 66 67 68 69 70 71 72 73 74 75 76 中国码34 35 36 37 37.5 38 39 39.5 国际鞋码换算器”告诉大家,希望对大家有所帮助!!! http://www.chinashoes.ru/cn/tool/size/size.html 另外还有对照表:

美欧陆鞋码对照表 女鞋尺码表 欧 35.5 36 36.5 37 38 39 39.5 40 41 42 42.5 43 44 44.5 45 46 47 码 英 3 3.5 4 4. 5 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 11 12 国 码 美 国 5 5.5 6 6.5 7 7.5 8 8.5 9 10 10.5 11 11.5 12 12.5 13 13.5 码 男鞋尺码表 欧码38.5 39 40 40.5 41 41.5 42 43 43.5 44 45 45.5 46 47 48 英国码 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 12 13 美国码 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 11.5 12 13 14 童鞋尺码表 欧码20.5 21 22 23 24 24.5 25 26 27 28 29 30 31 31.5 32 33 美国 8.5 9 9.5 10 10.5 11 11.5 12 12.5 13 13.5 1 1.5 2 2.5 3 码 27码=腰围1尺9/63CM、裤长107CM、臀围98CM、大腿50CM、裤腿41CM、立裆29CM 28码=腰围2尺/67CM、裤长107CM、臀围100CM、大腿52CM、裤腿41CM、立裆30CM 29码=腰围2尺1/70CM、裤长107CM、臀围102CM、大腿54CM、裤腿42CM、立裆31CM 30码=腰围2尺2/73CM、裤长107CM、臀围104CM、大腿56CM、裤腿42CM、立裆32CM 31码=腰围2尺3/77CM、裤长107CM、臀围106CM、大腿58CM、裤腿42CM、立裆32CM 32码=腰围2尺4/80CM、裤长107CM、臀围108CM、大腿60CM、裤腿44CM、立裆33CM 33码=腰围2尺5/83CM、裤长107CM、臀围110CM、大腿62CM、裤腿44CM、立裆34CM 34码=腰围2尺6/87CM、裤长110CM、臀围112CM、大腿64CM、裤腿44CM、立裆35CM 36码=腰围2尺7/90CM、裤长110CM、臀围118CM、大腿65CM、裤腿46CM、立裆36CM

鞋子尺码对照表大全

★鞋子尺码对照表大全(标准通用)★美国码★日本 码★国际码★英国码★ 鞋子尺码对照表 标准通用尺码对照表 男鞋尺码对照表(标准通用) 尺码 39 40 41 42 43 44 45 46 47 脚长(mm)23.6-24 24.1-245 24.6-250 25.1-255 25.6-260 26.1-265 26.6-270 27.1-275 27.6-280 美国码 6.5 7 7.5 8 8.5 9 9.5 10 10.5 日本码 24.5 25.0 25.5 26.0 26.5 27.0 27.5 28.0 28.5 国际码 245 250 255 260 265 270 275 280 285 女鞋尺码对照表(标准通用) 尺码 35 36 37 38 39 40 41 42 脚长(mm) 22.1-225 22.6-230 23.1-235 23.6-240 24.1-245 24.6-250 25.1-255 25.6-260 美国码 5 5.5 6 6.5 7 7.5 8 8.5 日本码 22.5 23.0 23.5 24.0 24.5 25.0 25.5 26.0 国际码 225 230 235 240 245 250 255 260 Adidas 尺码对照表 Adidas 男鞋尺码对照表 中国码 38 2/3 39 1/3 40 40 2/3 41 1/3 42 42 2/3 43 1/3 44 44 2/3 45 1/3 46 美国码 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 11.5 英国码 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 标准尺码(mm) 240 245 250 255 260 265 270 275 280 285 290 295 Nike 尺码对照表 Nike 男鞋尺码对照表 中国码 38.5 39 40 40.5 41 42 42.5 43 44 44.5 45 美国码 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 英国码 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 标准尺码(mm) 240 245 250 255 260 265 270 275 280 285 290 Nike 女鞋尺码对照表 中国码 35 35.5 36 36.5 37.5 38 38.5 39 40 40.5 41 美国码 4.5 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 英国码 2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 标准尺码(mm) 220 220 225 230 235 240 245 250 255 260 265

鞋子尺码对照表

鞋子尺码对照表 1、标准通用尺码对照表 男鞋尺码对照表(标准通用) 尺码39 4041424344454647美国尺码78910 日本尺码25262728 国际码245250255260265270275280285脚长(mm) 女鞋尺码对照表(标准通用) 尺码3536373839404142美国尺码5678 日本尺码23242526国际码225226227228229230231232脚长(mm)

2、常见品牌鞋尺码 Adidas 尺码对照表 Adidas 男鞋尺码对照表 中国码38 2/3 39 1/3 40 40 2/3 41 1/3 42 42 2/3 43 1/3 44 44 2/3 45 1/3 46 美国码 6 7 8 9 10 11 英国码 6 7 8 9 10 11 标准尺码(mm)240 245 250 255 260 265 270 275 280 285 290 295 Nike 尺码对照表 Nike 男鞋尺码对照表 中国码39 40 41 42 43 44 45 美国码 6 7 8 9 10 11 英国码 5 6 7 8 9 10 标准尺码(mm)240 245 250 255 260 265 270 275 280 285 290 Nike 女鞋尺码对照表 中国码35 36 38 39 40 41 美国码 5 6 7 8 9 英国码 2 3 4 5 6 7 标准尺码(mm)220 220 225 230 235 240 245 250 255 260 265 Reebok 尺码对照表 Reebok 男鞋尺码对照表 中国码39 40 41 42 43 44 45 美国码7 8 9 10 11 英国码 6 7 8 9 10 标准尺码(mm)245 250 255 260 265 270 275 280 285 290 295 Reebok 女鞋尺码对照表 中国码35 36 38 39 40 41 美国码 5 6 7 8 9 10 英国码 3 4 5 6 7 标准尺码(mm)220 225 230 235 240 245 250 255 260 265 270 converse 尺码对照表 converse 男鞋尺码对照表 中国码39 40 41 42 43 44 45 46 47 48 49 50 美国码7 8 9 10 11 12 13 14 15 16 标准尺码(mm)240 245 250 255 260 265 270 275 280 285 290 295 300 305 310 315 320 330 340

鞋子尺码对照表

鞋子尺码对照表 标准通用鞋子尺码对照表: 男鞋子尺码对照表(标准通用): 尺码:39 40 41 42 43 44 45 46 47 脚长(mm) 23.6-24 24.1-24.5 24.6-25 25.1-25.5 25.6-26.0 26.1-26.5 26.6-27.0 2 7.1-27.5 27.6-28.0 美国码: 6.5 7 7.5 8 8.5 9 9.5 10 10.5 日本码 :24.5 25.0 25.5 26.0 26.5 27.0 27.5 28.0 28.5 国际码: 245 250 255 260 265 270 275 280 285 女鞋子尺码对照表(标准通用): 尺码: 35 36 37 38 39 40 41 42 脚长(mm): 22.1-22.5 22.6-23.0 23.1-23.5 23.6-24.0 24.1-24.5 24.6-25.0 25.1-25 .5 25.6-26.0 美国码 :5 5.5 6 6.5 7 7.5 8 8.5 日本码 :22.5 23.0 23.5 24.0 24.5 25.0 25.5 26.0 国际码 :225 230 235 240 245 250 255 260 Adidas 男鞋子尺码对照表: 中国码 :38 2/3 39 1/3 40 40 2/3 41 1/3 42 42 2/3 43 1/3 44 44 2/3 45 1/3 46 美国码: 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 11.5 英国码 :5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 标准尺码(mm): 240 245 250 255 260 265 270 275 280 285 290 295 Nike 男鞋子尺码对照表: 中国码 :38.5 39 40 40.5 41 42 42.5 43 44 44.5 45 美国码: 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 英国码 :5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 标准尺码 (mm) :240 245 250 255 260 265 270 275 280 285 290 Nike 女鞋子尺码对照表: 中国码: 35 35.5 36 36.5 37.5 38 38.5 39 40 40.5 41 美国码: 4.5 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 英国码: 2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 标准尺码 (mm) :220 220 225 230 235 240 245 250 255 260 265 Reebok 男鞋子尺码对照表 中国码 :38.5 39 40 40.5 41 42 42.5 43 44 44.5 45 美国码 :6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 11.5 英国码 :5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5

相关主题
文本预览
相关文档 最新文档