This is a Department of Defense (DoD) interest computer system. All DoD computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems, including security devices, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. If monitoring of this or any other DoD computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user may be provided to law enforcement officials. UNCLASSIFIED, NON-SENSITIVE, NON-PRIVACY ACT USE ONLY