Official websites use .mil
Secure .mil websites use HTTPS
The internet is a source of infinite information, but not everyone who creates content is reputable. The web is rampant with individuals and entities who wish to do harm.
Information leaks, blackmail, ransomware, fraud, and financial ruin are a few of the possible hard realities of cybercrime. However, it’s the human element that is the best defense against digital attacks.
“There are still things that technological safety nets can’t do,” said Randy Miller, Chief Information Security Officer, Headquarters, Air Force Materiel Command. “AFNET [Air Force Network] users must practice safe cyber hygiene techniques to keep our network safe.”
Some of those techniques include using caution when accessing unfamiliar hyperlinks, creating strong passwords, leveraging multi-factor authentication, and ensuring software is up to date.
$(document).ready(function () { let isDesktopInit = false; let detailSize = "full"; let displayhgt = "95vh";
let $this = $('[data-fancybox]').fancybox($.extend(true, {}, $.fancybox.defaults, { buttons: ['share'], caption: function (instance, item) { var caption = '';
if (item.type === 'image') { if (isMobile()) { caption += '
' + '
'; } else { caption += $(this).find('figcaption').html() + getDetailsURL($(this).parent()) + getDownloadURL($(this).parent()) + showFBShare(); } }
return caption; }, afterLoad: function (instance, current) { //initial desktop view $(".fancybox-caption__body").addClass("a2a_kit").addClass("a2a_default_style"); if (isMobile()) $(".fancybox-caption__body").addClass("mobile"); }, afterShow: function (instance, current) { var $currentSlide = $(".fancybox-slide.fancybox-slide--current.fancybox-slide--image").parent().parent();
if (isMobile()) $currentSlide.find(".fancy-detail-link").on("touchstart", function() { captionToggle(); }); }, afterClose: function () {
} }));
let debounceTimer;
$(window).on("resize", function (event) {
if (isMobile()) return;
if ($(".af3-caption-body").length > 0 && $(".af3-caption-body").css("height") != undefined) { event.stopImmediatePropagation(); $(".fancybox-caption__body").removeClass("half"); isDesktopInit = false; captionToggle();
debounceTimer = setTimeout(function () { clearTimeout(debounceTimer); debounceTimer = null;
recalculateImageSize();
}, 1000); } });
function recalculateImageSize() { // Fancy box miscalculates because of race conditions with new layout var origImgWth = $(".fancybox-image").prop("naturalWidth"); var origImgHgt = $(".fancybox-image").prop("naturalHeight"); var winWth = $(window).innerWidth(); var winHgt = $(window).innerHeight() var ratio = Math.min(winWth / origImgWth, winHgt / origImgHgt); var newImgWth = (origImgWth * ratio); var newImgHgt = (origImgHgt * ratio); var dstTop = Math.floor((winHgt - newImgHgt)) / 2; var dstLeft = Math.floor((winWth - newImgWth)) / 2;
$(".fancybox-content").removeAttr("style");
$(".fancybox-content").css("width", newImgWth + "px"); $(".fancybox-content").css("height", newImgHgt + "px"); $(".fancybox-content").css("transform", "translate(" + dstLeft + "px, " + dstTop + "px)"); }
function captionToggle() {
if ($(".fancybox-caption__body").hasClass("af3-caption-body")) { $(".af3-caption-body").stop(true, false).animate({ height: "0vh" }, 800, function () { // Animation complete. closeDetails(); }); $(".fancy-photo-detail-link").html($(".fancy-photo-detail-link").html().replace("CLOSE", "SHOW")); } else { $(".fancybox-caption__body").addClass("af3-caption-body"); $(".af3-caption-body").addClass(detailSize); $(".af3-caption-body").animate({ height: displayhgt }, 800); $(".fancybox-caption").addClass("af3-caption-bg"); $(".base-caption-info").addClass("full-height"); $(".fancy-photo-detail-link").addClass("photo-detail-gradient"); $(".fancybox-button").css("display", "none"); $(".fancy-photo-detail-link").html($(".fancy-photo-detail-link").html().replace("SHOW", "CLOSE")); $(".fancybox-caption__body").prepend(prependClosing()); $(".closing-box, .closingx").on("touchstart", function() { captionToggle(); }); } }
function getDetailsURL(fbObj) {
return 'DETAILS'; }
function getDownloadURL(fbObj) { return 'DOWNLOAD'; }
function showFBShare() { return 'SHARE'; }
function closeDetails() { $(".af3-caption-body").removeClass(detailSize); $(".fancybox-caption__body").removeClass("af3-caption-body"); $(".fancybox-caption").removeClass("af3-caption-bg"); $(".base-caption-info").removeClass("full-height"); $(".fancy-photo-detail-link").removeClass("photo-detail-gradient"); $(".fancybox-button").css("display", "block");
if (detailSize === "half") { detailSize = "full"; displayhgt = "90vh"; $(".fancybox-caption").removeClass("desktop-init"); } }
function prependClosing() { return '
' }
function isMobile() { var isMobile = false; //initiate as false // device detection if (/(android|bbd+|meego).+mobile|avantgo|bada/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|ipad|iris|kindle|Android|Silk|lge |maemo|midp|mmp|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)/|plucker|pocket|psp|series(4|6)0|symbian|treo|up.(browser|link)|vodafone|wap|windows (ce|phone)|xda|xiino/i.test(navigator.userAgent) || /1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw-(n|u)|c55/|capi|ccwa|cdm-|cell|chtm|cldc|cmd-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc-s|devi|dica|dmob|do(c|p)o|ds(12|-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(-|_)|g1 u|g560|gene|gf-5|g-mo|go(.w|od)|gr(ad|un)|haie|hcit|hd-(m|p|t)|hei-|hi(pt|ta)|hp( i|ip)|hs-c|ht(c(-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i-(20|go|ma)|i230|iac( |-|/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |/)|klon|kpt |kwc-|kyo(c|k)|le(no|xi)|lg( g|/(k|l|u)|50|54|-[a-w])|libw|lynx|m1-w|m3ga|m50/|ma(te|ui|xo)|mc(01|21|ca)|m-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|-([1-8]|c))|phil|pire|pl(ay|uc)|pn-2|po(ck|rt|se)|prox|psio|pt-g|qa-a|qc(07|12|21|32|60|-[2-7]|i-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55/|sa(ge|ma|mm|ms|ny|va)|sc(01|h-|oo|p-)|sdk/|se(c(-|0|1)|47|mc|nd|ri)|sgh-|shar|sie(-|m)|sk-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h-|v-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl-|tdg-|tel(i|m)|tim-|t-mo|to(pl|sh)|ts(70|m-|m3|m5)|tx-9|up(.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas-|your|zeto|zte-/i.test(navigator.userAgent.substr(0, 4))) { isMobile = true; }
return isMobile; } });
These techniques are important not only for the Department of Defense, but also at home.
Infographic of the areas humans can control in cyberspace
First, individuals need to think carefully before accessing hyperlinks. More than 90% of successful cyberattacks start with a phishing email or text that includes a hyperlink.
Before opening any hyperlink to verify personal information, consider the source. Hover over the hyperlink to determine if it is from a legitimate sender. Many phishing attempts are very sophisticated and try to impersonate people whom individuals know.
Good computer hygiene requires individuals to verify the source before offering information or accessing a hyperlink, especially if the email is coming from a non-DoD sender.
Another key area of vulnerability concerns password use. Addresses, birthdays, or using the one password most dreaded by cyber security experts, PASSWORD123, can make accounts susceptible to attack. The use of memorable passphrases, crafting unique passwords for individual sites or applications, and passwords that are at least 15 characters long and use a combination of numbers, special characters, and uniquely spelled words are the least vulnerable. Password Managers offer the best defense against password cracking by cyber criminals.
“Since a lot of people telework, home networks should also be protected,” cautions Miller. “Make sure you change the password on your home router regularly using a strong password and follow the security guidelines set forth in the AFMC Telework Guide.”
The DoD relies on multi-factor authentication to protect networks on many applications. MFA is simply adding an extra step after the username and password to gain access to an app. This is enforced in the DoD with the use of a CAC card and a PIN. Many private .com sites offer various MFA options, including a PIN, a confirmation code sent to phones or email, or face or fingerprint recognition.
Finally, up-to-date software is also a critical computer hygiene requirement. Developers push out security updates almost daily to defend against cyberattacks. Rebooting DoD devices daily also keeps security updates current.
DoD has made recent changes to make email encryption easy for users. DOD regulation (DoDI 5200.48_DAFI 16-1403) requires all controlled unclassified information (CUI) transmissions be encrypted. Emails sent on the DAF networks (@us.af.mil, @usspacecom.mil, and @spaceforce.mil address) are already encrypted. The Office of the Air Force Chief Information Officer (SAF/CN) has distributed guidance stating that only CUI emails going to non-DAF email address enclaves must be encrypted before sending in Outlook.
The introduction of the Controlled Unclassified Information (CUI) Program has brought on some confusion among DoD employees. CUI replaced the use of “For Official Use Only” on documents containing critical information. In any case, CUI documents must be properly marked and accessed only by those with a need-to-know.
“Not all legacy marked “For Official Use Only” (FOUO) documents are now CUI. It is not an automatic one-to-one swap,” said Miller. “Some information previously marked as FOUO will qualify as CUI, but FOUO information must be assessed against the CUI Registry to determine if it is now CUI.”
October is Cybersecurity Awareness Month, but employing a security-centric mindset should be an everyday practice and not just once a year. Cybersecurity hygiene is a critical daily need both in the workplace and at home.
Threats evolve and change quickly. For the latest information, visit the Cybersecurity and Infrastructure Security Agency at https://www.cisa.gov.
Other references:
https://www.dodcui.mil/Home/Training/
https://securityawareness.usalearning.gov/cui/index.html
https://www.dodcui.mil/CUI-Registry-New/
https://www.dodcui.mil/Frequently-Asked-Questions/