An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News : News
JBSA News
NEWS | May 31, 2023

CYBER HYGIENE | Rules for removable media, mobile devices

Defense Counterintelligence and Security Agency

Removable media include flash media, such as thumb drives, memory sticks, and flash drives; external hard drives; optical discs (such as CDs, DVDs, and Blu-rays); and music players (such as iPods).

Other portable electronic devices (PEDs) and mobile computing devices, such as laptops, fitness bands, tablets, smartphones, electronic readers, and Bluetooth devices, have similar features.

The same rules and protections apply to both.

  • Use only removable media approved by your organization
  • Only use flash media or other removable storage when operationally necessary, owned by your
  • organization, and approved by the appropriate authority by policy
  • Do not use any personally owned/non-organizational removable media on your organization’s systems
  • Do not use your organization’s removable media on non-organizational/personal systems
  • Never plug unauthorized devices into a government system
  • Be aware that wireless connections to the devices bring increased threats and vulnerabilities
  • Abide by the signed End User License Agreement for mobile devices
  • Understand and follow your organization’s Bring Your Own Device (BYOD) policy

Use of Removable Media and Mobile Devices

Your organization may severely restrict or prohibit the use of removable media and PEDs. Follow your organization’s policies or contact your security POC with questions. If allowed, use appropriately:

  • Do not download data from the classified networks onto removable storage media
  • Encrypt data appropriately and in accordance with its classification or sensitivity level
  • As a best practice, label all removable media regardless of classification or environment and avoid inserting removable media with unknown content into your computer
  • Store according to the appropriate security classification in GSA-approved storage containers
  • Mark all classified and sensitive material correctly
  • Ensure unclassified media in a classified environment is labeled appropriately
  • Label all media containing Privacy Act information, personally identifiable information (PII), or protected health information (PHI) appropriately regardless of the environment
  • Follow your organization’s policy for sanitizing, purging, discarding, and destroying removable media
  • Destroy classified removable media in accordance with its classification level

Protecting Data on Removable Media and Mobile Devices

To protect data on your mobile computing and portable electronic devices (PEDs):

  • Lock your laptop/device screen when not in use and power off the device if you don’t plan to resume use in the immediate future
  • Enable automatic screen locking after a period of inactivity
  • Encrypt all sensitive data on laptops and on other mobile computing devices when possible
  • At a minimum, password protect Government-issued mobile computing devices; use two-factor authentication if possible
  • Secure your personal mobile devices to the same level as Government-issued systems
  • Understand your organization’s policy for using commercial cloud applications (e.g., Dropbox, Drive, etc.)
  • Maintain visual or physical control of your laptop and mobile devices at all times and especially when going through airport security checkpoints
  • Have a strategy for addressing a potential “authority situation” (e.g., police who want to inspect devices coincident with a traffic stop or an airport TSA agent check)
  • If lost or stolen, immediately report the loss to your security POC

Traveling with Mobile Devices

When traveling with mobile computing devices, including laptops and cell phones:

  • Be aware that information sent over public Wi-Fi connections may be exposed to theft, and the device may be exposed to malware
  • Fake Wi-Fi access points may be used for deception
  • Use public or free Wi-Fi only with the Government VPN

Use caution when connecting laptops to hotel Internet connections. If you are directed to a login page before you can connect by VPN, the risk of malware loading or data compromise is substantially increased.

When traveling overseas with mobile devices:

  • Be careful and do not travel with mobile devices, unless absolutely necessary
  • Report your travel if carrying a device approved under Bring Your Own Approved Device (BYOAD)
  • policy so it can be unenrolled while out of the country
  • Assume that any electronic transmission you make (voice or data) may be monitored
    • Mobile phones carried overseas are often compromised upon exiting the plane
  • Physical security of mobile devices carried overseas is a major issue
  • Devices not in your custody or in secure U.S. Government facility storage should be assumed to be compromised

Public Use of Mobile Devices

When using mobile computing devices, including laptops and cell phones, in public:

  • Be careful of information visible on your mobile computing device; consider screen protection
  • Maintain possession of the laptop and other government-furnished equipment (GFE) at all times and be extra vigilant in protecting it
  • Protect your mobile computing device using a password or other access control (i.e., two-factor authentication)
  • Make certain all sensitive data stored on your laptop is encrypted
  • Avoid using Government computers in non-secure environments
    • DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices such as those found in public libraries and Internet cafes
  • Never discuss sensitive information in public, even if using a secure device

Near Field Communication

Exercise caution when using near field communication (NFC):

  • NFC is wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other. Smartphones can be enabled to:
    • Read electronic tag information, such as proximity cards or other objects with embedded NFC tags
    • Transmit information electronically, such as when making credit card payments with information held on the smartphone
  • Security risks:
    • Eavesdropping: an adversary intercepts the signal
    • Data manipulation or corruption: an adversary intercepts the signal and alters it
    • Viruses: stored financial or mission information increases potential rewards for hackers
  • Only use NFC with your Government-furnished device as instructed and permitted by your organization

GPS on Mobile Devices

Many mobile devices and applications can track your location without your knowledge or consent. Mobile device tracking can:

  • Geolocate you
  • Display your location
  • Record location history
  • Activate by default

Stop and think before you wear or use a mobile device!

(Editor’s note: This information is part of the Cyber Awareness Challenge 2023, which is available at https://public.cyber.mil/training/cyber-awareness-challenge/. The purpose of the Cyber Awareness Challenge is to influence behavior, focusing on actions that authorized users can engage in to mitigate threats and vulnerabilities to DOD Information Systems. This training is current, designed to be engaging, and relevant to the user. The Cyber Awareness Challenge is the DOD baseline standard for end user awareness training by providing awareness content that addresses evolving requirements issued by Congress, the Office of Management and Budget (OMB), the Office of the Secretary of Defense, and Component input from the DoD CIO chaired Cyber Workforce Advisory Group (CWAG). The course provides an overview of current cybersecurity threats and best practices to keep information and information systems secure at home and at work. The training also reinforces best practices to protect classified, controlled unclassified information (CUI), and personally identifiable information (PII).)