Health & Safety

October 10, 2013

Be more vigilant: Protect passwords, government systems

Brandice J. O’Brien
Tinker Public Affairs

TINKER AIR FORCE BASE, Okla.  — In an era when identities can be easily stolen and networks compromised, Air Force Sustainment Center officials are urging its network users to be more careful. By adhering to two requests, the number of attempted hacker intrusions and virus downloads can be drastically reduced.

Officials stress that network users should never plug non-government USB devices including cell phones and MP3 chargers into the system. Also, if user names and passwords must be sent via email, send them in separate and encrypted messages. That way if someone does hack into a message, he doesn’t have both the user name and the password. Air Force systems include the Air Force Portal, My Pay, Thrift Savings Plan and the Employee Benefits Information System.

“USB devices can easily spread malicious logic,” said Staff Sgt. Ryan Gebert, 78th Air Base Wing Network Security noncommissioned officer in charge.

Prinston Wilson, 72nd ABW/SC Information Assurance officer who also handles network violations and credential disclosures, agreed.

“We pick up a lot of things on our cell phones. If you’re using your phone as a flash drive and saving to it, and it picks up a virus; once it gets into our system it work its way up,” Mr. Wilson said. “Credential disclosures have become a growing problem. Hackers can do a lot with your information. They can take your social security number, job history and personal data, put the data together and use it to gain access into other systems.”

In August, there were 12 reported AFSC violations, three for USB incidents and nine for account credential disclosures, or ACDs.

Mr. Wilson said oftentimes a credential disclosure occurs when a user is in a rush and sends their list of user IDs and passwords unencrypted through email to their personal email address. When these user IDs and passwords are sent unencrypted, they can easily be picked up by hackers and used to gain unauthorized access to government systems.

“Usually people keep the same password for a lot of systems and when hackers find out one password, they can figure out access into other systems,” he said.

If a USB violation or credential disclosure is found on a government system, the account is disabled and only a commander – colonel or above – can unlock the account. The commander will also have to fill out a memo explaining the incident and actions that were taken.

“USB violations have been reduced dramatically over the past eight months due to Group Policy Object capability being implemented,” said Ryan Moorman, AFSC Logistics Portal Content manager at Wright-Patterson Air Force Base, Ohio. “Robins Air Force Base, Ga., implemented this capability first and has had no USB violations since.”

The GPO capability is a policy that forces a computer to block a driver from being loaded when a flash device is plugged in. The driver is the necessary component that lets an operating system and flash drive communicate. Without a driver, a computer won’t read a USB, Mr. Moorman said.

“There is no steady trend of ACDs based off the statistics of the past six months, however due to the sudden rise in August, leadership looked to create awareness on the issues across the center,” Mr. Moorman said.




All of this week's top headlines to your email every Friday.


 
 

 
(U.S. Air Force Photo by 2nd Lt. Lacey Roberts)

Arizona Airmen memorialize fallen Iraqi fighter pilot

Members of the Arizona Air National Guard’s 162nd Wing honored the life and memory of Iraqi Air Force Brig. Gen. Rasid Mohammed Sideeq Hasan during a memorial service here July 7. Hasan died June 24 after his F-16 Fighting Fa...
 
 

Deployed A-10s take to the skies

(U.S. Air Force photo by Staff Sgt. Christopher Ruano) An aircraft maintainer assigned to the 354th Expeditionary Fighter Squadron inspects the oil levels of an A-10 Thunderbolt II attack aircraft engine during a theater security package deployment to Lask Air Base, Poland, July 13. The U.S. and Polish air forces will conduct training aimed at...
 
 

Airmen leverage TFI concept

LUKE AIR FORCE BASE, Ariz. – Thirty-eight service members, including individuals from the 944th Civil Engineer Squadron explosive ordnance disposal section, participated in a Battlefield Forensics training course here at the end of June. Together, Senior Master Sgt. Stephen Hunter, 944th Civil Engineer Squadron EOD program manager and Joshua Nason, General Dynamics Information Technology ...
 

 

Celebration and education; Equal Opportunity

  In 1948, Ester Blake became the first enlisted female in the U.S. Air Force, pictures were still black and white, and families gathered around radios for the evening news. Since then, the U.S. Air Force has gone through many changes. The Davis-Monthan Equal Opportunity office specializes in making sure that everyone is treated equally...
 
 
DoD

Final rule puts more teeth into Military Lending Act

  WASHINGTON – The Defense Department today closed loopholes to protect U.S. men and women in uniform from predatory lending practices, President Barack Obama said this morning at the 116th Veterans of Foreign Wars National Convention in Pittsburgh, Pennsylvania. The heightened level of financial and consumer-rights protection against unscrupulous practices, called the final rule of...
 
 

AF continues to work with DOD, OPM on cybersecurity incident

WASHINGTON (AFNS) — The Air Force maintains its commitment to protect personal information from cyber threats by continuing efforts with the Defense Department and the Office of Personnel Management to assist those impacted by the recent cyber incident involving federal background investigation data. OPM and an interagency response team, including investigators from the FBI and...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>