For site security purposes and to ensure that this service remains available to all users, this government computer system employs commercial software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.
Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
Provide integrated layered chemical, biological, radiological, and nuclear defense capabilities to the Joint Force across Combined Joint All-Domain Operations
A resilient Joint Force enabled to fight and win unencumbered by a chemical, biological, radiological, or nuclear environment; championed by innovative, agile, results-oriented acquisition professionals