This is a Department of Defense (DoD) interest computer
system. All DoD computer systems are subject to monitoring
at all times to ensure proper functioning of equipment and
systems, including security devices, to prevent unauthorized
use and violations of statutes and security regulations, to
deter criminal activity, and for other similar purposes. If
monitoring of this or any other DoD computer system reveals
possible evidence of violation of criminal statutes, this
evidence and any other related information, including
identification information about the user may be provided to
law enforcement officials. UNCLASSIFIED, NON-SENSITIVE,
NON-PRIVACY ACT USE ONLY