An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
U.S. Central Command
CENTCOM
Search
Search CENTCOM:
Search
Search CENTCOM:
Search
Home
ABOUT US
COMMAND PRIORITIES
LEADERSHIP
COMPONENT COMMANDS
HISTORY
POSTURE STATEMENT
CENTCOM AOR
CENTCOM COALITION
OPERATIONS AND EXERCISES
USMTM
CIVILIAN CASUALTY REPORT
CONTACT
OPERATIONAL CONTRACT SUPPORT
COMMUNITY RELATIONS
THEATRE MEDICAL CLEARANCE
INNOVATION VENDOR PORTAL
MILITARY MEMBER INNOVATION PORTAL
MEDIA
SOCIAL MEDIA
NEWS ARTICLES
PRESS RELEASES
STATEMENTS
IMAGERY
VIDEOS
TRANSCRIPTS
VISITORS AND PERSONNEL
FAMILY CENTER
FAMILY READINESS
CENTCOM WEBMAIL
SOCIAL MEDIA SECURITY
ACCOUNTABILITY
EMERGENCY PREPAREDNESS
USCENTCOM UNCLASSIFIED REGULATIONS
FOIA LIBRARY
WELCOME GUIDE
Home
Home
Privacy and Security
Privacy & Security
The United States Central Command Homepage is provided as a public service by the United States Central Command Public Affairs Office. Information presented on this web site is considered public information and may be distributed or copied. Use of appropriate byline/photo/image credits is requested. For site management, information is collected for statistical purposes. This government computer system uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas. For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage. Except for authorized law enforcement investigations, no other attempts are made to identify individual users or their usage habits. Raw data logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration Guidelines. Unauthorized attempts to upload information or change information on this service are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1987 and the National Information Infrastructure Protection Act. If you have any questions or comments about the information presented here, please forward them to the United States
Central Command Public Affairs Office
.
Learn more about social media security