Privacy and Security

Information available at is consistent with Army and DoD policies and principles of information and contains information cleared for public release.

Information presented on the Army website is considered public information and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested.

The use of copyrighted material by the Army is subject to the Lebanese Copyright Law. It is Army policy to recognize and respect the rights of copyright owners.

Unauthorized attempts to upload information or change information on these services are strictly prohibited and are punishable under the Lebanese Copyright Law.

The Lebanese Army has no other websites than the following ones ( and ) and it is forbidden to use the name of the Lebanese Army in any language as an address to an electronic website and in any other electronic field at the risk of subjecting the violators to legal prosecution. Any amendment or attempt to intrude on the Army website on the internet can make the perpetrator of these acts subject to prosecution

Any website claiming to be an official Army asset should therefore use these two official domain names. If any doubt exists as to the authenticity of a website not falling within this naming convention please notify us using the Contact Us link.

If you have any questions or comments about the information presented here, please forward them to us using the Contact Us link.

External Links Disclaimer - The appearance of hyperlinks to external sites does not constitute endorsement by the Department of the Lebanese Army of the linked Web site or the information, products or services contained therein. The Department of the Lebanese Army does not exercise any editorial control over the information you may find at these locations.


User information processed by the Lebanese Armed Forces applications is not shared with any third party. All transmission of such information are done using secure channels, and no personally identifiable information is extracted. All other types of information are stored after explicit user consent.