This is a Department of Defense computer system. This system and related equipment, networks and network devices,
are for authorized Government use only. DOD computer systems may be monitored. Monitoring includes active attacks by
authorized DOD entities to test or verify the security of this system. During monitoring, information may be examined,
recorded, copied and used for official authorized purposes. All information, including personal data, placed or sent over
this system may be monitored.
Authorized or unauthorized use of this DOD computer system, constitutes consent to monitoring. Unauthorized use may subject
person(s) to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative,
criminal, or other adverse action.