The site uses session cookies, i.e., tokens that remain active only until you close your browser, for site management. Information is collected for analytical and statistical purposes, and no personal information is collected using this technology. When you close your browser, the cookie is deleted from your computer. This government computer system uses software programs to create summary statistics, which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas. You can choose not to accept these cookies and still use the site. The help information in your browser software should provide you with instruction on how to disable session cookies. The Air Force does not control the editorial or user policies of external links on this site. Users should read privacy and user agreements when visiting sites external links.
For site management, information is collected for analytical and statistical purposes. This government computer system uses software programs to create summary statistics which are used for such purposes as assessing what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.
For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
Your interaction with this system is not anonymous. By using this system you are consenting to the monitoring of your activity. Raw data logs will only be used to identify individual users and their usage habits for authorized law enforcement investigations or national security purposes. These logs are used for no other purposes and are scheduled for regular destruction in accordance with National Archives and Records Administration.
Unauthorized attempts to deny service, upload information, change information, or to attempt to access a non-public site from this service are strictly prohibited and may be punishable under Title 18 of the U.S. Code to include the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.