This website is not affiliated with the U.S. government or military.


Use to inform commander and staff of suspected attack into the command information system.

LINE 1 -- DATE AND TIME______________________________(DTG)

LINE 2 -- UNIT________________________________________(Unit Making Report)

LINE 3 -- MISSION OF SYSTEM AFFECTED_______________(Commander's Assessment)

LINE 4 -- EQUIPMENT STATUS__________________________(List Type of Equipment Affected)

LINE 5 -- DTG ATTACK DETECTED_______________________(DTG Computer System Was Attacked)

LINE 6 -- DTG ATTACK ENDED__________________________(DTG Computer Attack Ended)

LINE 7 -- SOFTWARE AFFECTED________________________(List Type and Number of System Software Attacked)

LINE 8 -- NUMBER OF SYSTEMS AFFECTED______________(List Number of Systems Affected by the Attack)

LINE 9 -- TYPE OF ATTACK_____________________________(List Type of Attack (Virus Type))

LINE 10 -- ADDRESS OF SOURCE________________________(Address of Attacking Machine)

LINE 11 -- INTRUSION METHOD_________________________(Method Used, for Example, Hacked in, From Disk, Internet)

LINE 12 -- NARRATIVE_________________________________(Free Text for Information Required for Clarification of Report)

LINE 13 -- AUTHENTICATION___________________________(Report Authentication)