But they don't say 'Leave!'

THIS IS A DEPARTMENT OF DEFENSE COMPUTER SYSTEM.  THIS COMPUTER
SYSTEM, WHICH INCLUDES ALL RELATED EQUIPMENT, NETWORKS AND NETWORK
DEVICES (SPECIFICALLY INCLUDING ACCESS TO THE INTERNET), ARE PROVIDED
ONLY FOR OFFICIAL U.S. GOVERNMENT BUSINESS.

DOD COMPUTER SYSTEMS MAY BE MONITORED BY AUTHORIZED PERSONNEL TO
ENSURE THAT THEIR USE IS AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO
FACILITATE PROTECTION AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY
SECURITY PROCEDURES.  MONITORING INCLUDES "HACKER" ATTACKS TO TEST OR
VERIFY THE SECURITY OF THIS SYSTEM AGAINST USE BY UNAUTHORIZED
PERSONS.  DURING THESE ACTIVITIES, INFORMATION STORED ON THIS SYSTEM
MAY BE EXAMINED, COPIED AND USED FOR AUTHORIZED PURPOSES, AND DATA OR
PROGRAMS MAY BE PLACED INTO THIS SYSTEM.  THEREFORE, INFORMATION YOU
PLACE ON THIS SYSTEM IS NOT PRIVATE.

USE OF THIS DOD COMPUTER SYSTEM, AUTHORIZED OR UNAUTHORIZED,
CONSTITUTES CONSENT TO OFFICIAL MONITORING OF THIS SYSTEM.
UNAUTHORIZED USE OF A DOD COMPUTER SYSTEM MAY SUBJECT YOU TO CRIMINAL
PROSECUTION.  EVIDENCE OF UNAUTHORIZED USE COLLECTED DURING MONITORING MAY 
BE PROVIDED TO APPROPRIATE PERSONNEL FOR ADMINISTRATIVE, CRIMINAL OR OTHER 
ACTION.

Return
Washington Apple Pi IFAQ