This website is not affiliated with the U.S. government or military. All proceeds from the operation of this site are donated to veteran and other charities.


Use to inform commander and staff of suspected attack into the command information system.

LINE 1 — DATE AND TIME______________________________(DTG)

LINE 2 — UNIT________________________________________(Unit Making Report)

LINE 3 — MISSION OF SYSTEM AFFECTED_______________(Commander’s Assessment)

LINE 4 — EQUIPMENT STATUS__________________________(List Type of Equipment Affected)

LINE 5 — DTG ATTACK DETECTED_______________________(DTG Computer System Was Attacked)

LINE 6 — DTG ATTACK ENDED__________________________(DTG Computer Attack Ended)

LINE 7 — SOFTWARE AFFECTED________________________(List Type and Number of System Software Attacked)

LINE 8 — NUMBER OF SYSTEMS AFFECTED______________(List Number of Systems Affected by the Attack)

LINE 9 — TYPE OF ATTACK_____________________________(List Type of Attack (Virus Type))

LINE 10 — ADDRESS OF SOURCE________________________(Address of Attacking Machine)

LINE 11 — INTRUSION METHOD_________________________(Method Used, for Example, Hacked in, From Disk, Internet)

LINE 12 — NARRATIVE_________________________________(Free Text for Information Required for Clarification of Report)

LINE 13 — AUTHENTICATION___________________________(Report Authentication)

Important Information: We strive to provide information on this website that is accurate, complete and timely, but we make no guarantees about the information, the selection of schools, school accreditation status, the availability of or eligibility for financial aid, employment opportunities or education or salary outcomes. Visit here for important information on these topics.