You have accessed a Department of Defense (DoD) computer system. Please read the
WARNING stated below. If you are not an authorized user of this DoD computer system, then you must leave now.
This site has been developed to take advantage of the latest technologies for presenting Web based applications.
Your web browser is not compatiable with the Web Standards adopted by ATRRS. Therefore, you must upgrade your web browser
before you will be able to access this site.
The following list of web browsers have been tested and appoved for use with this site:
Microsoft Internet Explorer, Version 4 and greater
Netscape Navigator, Version 4 and greater
UNCLASSIFIED, NON-SENSITIVE, NON-PRIVACY ACT USE ONLY
This Department of Defense (DoD) computer system is provided as an application by Army Training Requirements and Resources System (ATRRS). It is intended to be used by ATRRS users only.
Unauthorized attempts to retrieve information, view information, upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986.
Unless otherwise indicated all information on this system is considered private information and may be not distributed or copied.
W A R N I N G
It is a violation of United States code, title 18, to access and use U.S. Government computer resources without specific authorization.
Each access is subject to recording and auditing. Without specific authorization from the U.S. Government, you are an intruder. Intruders are subject to criminal prosecution, fine, and/or imprisonment.
All DoD computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems, including security devices, to prevent unauthorized use and violations of statutes and security regulations,
to deter criminal activity, and for other similar purposes. If monitoring of this or any other DoD computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information,
including identification informations about the user, may be provided to law enforcement officials.
|