Welcome to the USS OGDEN WEBSITE.

 

 

 

 

 

 

 

 

USS OGDEN (LPD 5), one of the mainstays of the Pacific Fleet's amphibious forces, is capable of launching amphibious assaults by sea and air simultaneously.

The crest of USS OGDEN contains on one side a small flower, and on the other, a bee. The flower represents OGDEN'S continued mission of peace and humanitarian service. The bee represents the ship's response whenever the crew or our nation's allies are threatened. When the time comes, USS OGDEN is like a hive from which emits the swift and potent power of the US Marine Corp. 

Latest news: Get IT HERE!!(Gator Gazzette)

See the Ombudsman Newsletter

Care Line 619-338-4203

We on the USS Ogden take pleasure in welcoming our new Ombudsmans MRS. Samantha Jenkins and MRS. Erica Wise.

Careline Email:

ogdenombudsman@sbcglobal.net

and

ogdenombudsman@cox.net

     

    This is an official U.S. Naval  website. Please read this PRIVACY POLICY. If you have browsed this site and still require additional information, please email our Webmaster.
    or write:
    USS OGDEN (LPD 5)
    FPO AP 96674-1708
    Attn: PAO

    This page is authored and maintained by IT1(SW) Richard Kay
    Updated 20 July, 2004

  • Notice: This is a U.S. Government Web Site
    This is a World Wide Web site for official information about the USS OGDEN. It is provided as a public service by the USS OGDEN. The purpose is to provide information and news about the USS OGDEN to the general public. All information on this site is public domain and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested.
    Unauthorized attempts to upload information or change information on this Web site are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.
    For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
    Except for authorized law enforcement investigation and to maintain required correspondence files, no other attempts are made to identify individual users or their usage habits. Raw data logs* are used to simply determine how many users are accessing the site, which pages are the most popular, and,
    from time to time, from which top level domain users are coming. This data is scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.