International Defense Organization Sunt lacrimae rerum et mentem mortalia tangunt.
 YOU HAVE JUST ENGAGED AN OFFICIAL
INTERNATIONAL DEFENSE ORGANIZATION
WEB INFORMATION SERVICE

YOU MUST LOG IN TO CONTINUE
USER
PASS

This is an International Defense Organization web site. Use of this or any other IDO interest computer system constitutes a consent to monitoring at all times. This is a IDO interest computer system. All IDO interest computer systems and related equipment are intended for the communication, transmission, processing, and storage of official International Defense Organization or other authorized information only. All IDO interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems, to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of an IDO interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. If monitoring of this or any other IDO interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials. If monitoring of this or any other IDO interest computer systems reveals violations of security regulations or unauthorized use, employees who violate security regulations or make unauthorized use of IDO interest computer systems are subject to appropriate disciplinary action.

INTERNATIONAL DEFENSE ORGANIZATION WARNING STATEMENT

This is an International Defense Organization computer system. This computer system, including all related equipment, networks and network devices (specifically including Internet access), are provided only for authorized IDO use. IDO computer systems may be monitored for all lawful purposes, including to ensure that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability and operational security. Monitoring includes active attacks by authorized IDO entities to test or verify the security of this system. During monitoring, information may be examined, recorded, copied and used for authorized purposes. All information, including personal information, placed on or sent over this system may be monitored. Use of this IDO computer system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal or adverse action. Use of this system constitutes consent to monitoring for these purposes.

PRIVACY AND SECURITY NOTICE

This IDO Web Information Service is provided as an official service by IDO Intelligence & Information Warfare Systems Command. For site security and management purposes, all transactions with this server are collected for security and statistical purposes. This computer system uses software programs to create summary statistics, which are used for determining technical design specifications, traffic load, and to identify system performance or problem areas. For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration General Schedule 20. Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.

DISCLAIMER

Areas of this Server link to other Web Information Systems providing security-related information which are operated by other government organizations, commercial firms, educational institutions, and private parties. We have no control over the information on those systems which may be objectionable or which may not otherwise conform to IDO policies. Unless otherwise noted, some of the Sites listed within the pages of this server are provided by organizations outside the IDO Domain. These links are offered as a convenience and for informational purposes only. Their inclusion here does not constitute an endorsement or an approval by International Defense Organization of any of the products, services, or opinions of the external providers. International Defense Organization bears no responsibility for the accuracy or the content of external sites.