Privacy & Security Notice

The Department of Defense (DoD) Modeling and Simulation Coordination Office (DMSCO) website is provided as a public service by the Department of Defense. Information presented on the DMSCO website is considered public information and may be distributed or copied. Use of appropriate byline/photo/image credits is requested. For site management and for statistical purposes, this government computer system uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.

For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration Guidelines.

Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1987 and the National Information Infrastructure Protection Act.


  1. The DMSCO website is provided as a public service by the DoD.
  2. Information concerning visitors' use of this site is collected for analytical and statistical purposes, such as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.
  3. For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unautho-rized attempts to upload or change information, or otherwise cause damage.
  4. Raw data logs will only be used to identify individual users and their usage habits for authorized law enforcement investigations or national security purposes. These logs are scheduled for regular destruction in accordance with National Archives and Records Administration Guidelines
  5. Unauthorized attempts to deny service, upload information, change information, or to attempt to access a non-public site from this service are strictly prohibited and may be punishable under Title 18 of the U.S. Code to include the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
  6. If you have any questions or comments about the information presented here, please forward them to us using the DMSCO Feedback Form