Air Force

August 16, 2013

Using USB devices on base computers big no-no

Tags:
Staff Sgt. LUTHER MITCHELL Jr.
56th Fighter Wing Public Affairs

130807-F-BZ180-002
The first thing that pops up after logging onto a government computer is a message: “Effective immediately, the following removable flash media are unauthorized on all Department of Defense information systems until further notice: memory sticks, thumb drives and camera flash memory cards.”

Many people may not read this message and click through the pop-ups until reaching their desktop screen. But, not heeding this message could be costly, as plugging in unauthorized devices can not only damage Air Force networks, they can also damage one’s career.

“The current policy is a universal serial bus, or flash drive device, has to be approved by an information assurance officer,” said Tech Sgt. Jeffery Carroll, 56th Communications Squadron NCO-in-charge of information assurance. “USB devices on the SIPRNet and NIPRNet have to be approved by an IAO and routed to the appropriate agencies for approval. Those users then will be loaded into a program that will recognize them as authorized users.”

Flash media is banned and the only device authorized for use is an external spinning hard drive. Solid-state disk drives aren’t allowed and are still considered flash media.

Flash media includes: USB flash drives, eReaders, digital cameras, MP3 players, smartphones, personal digital assistants, flash media cards, solid state hard-drives and wireless network air-cards.

The 561st Network Operations Squadron at Peterson Air Force Base, Colo., constantly scans the Air Force network for USB violations.

“Results are provided once a week to the 56th Fighter Wing Information Assurance Office in a report that lists the time, computer name, user name, item and IP address of the USB violation,” said Steven Bryan, 56th CS communications security manager. “The WIAO tracks down the violator, disables the user’s account, confiscates the violator’s computer until a complete and thorough virus scan can be accomplished and the user’s unit commander is notified.”

The journey back into the good graces of the network gods is long and hard and involves additional training and lost man-hours.

“The violator must retake DOD cyber awareness training before being allowed access to the network,” Bryan said. “The overall process can take several days to complete, resulting in non-productive time for the violator and those involved in the overall detection process.”

The rules are clear: USB flash drive devices are not authorized to be connected to government computers and with good reason.

“Malicious code can be stored on a device straight from the factory and USB devices can easily introduce viruses into a computer network,” Bryan said.

Additionally, USB flash drive devices pose a risk of loss and theft, and caution should be exercised when using them.

“People shouldn’t be loading any personal identifiable information on external drives,” Carroll said.
The Air Force’s USB flash drive policy has been in effect since February 2009. Nevertheless, individuals continue to plug unapproved devices into government computers daily. If a device isn’t properly labeled, it shouldn’t be connected to a government computer or printer.

“Approved devices should be properly marked and labeled,” Bryan said. “Unclassified devices must be marked with SF-710, SF-711, and a label stating the device must be scanned for viruses before use.”

For more information, call the unit information assurance officer.




All of this week's top headlines to your email every Friday.


 
 

 
MXG_SA

Keeping things purring …

FROM LEFT: Senior Airmen Greg Sarabia and Nick Valentine, 56th Equipment Maintenance Squadron Aerospace Ground Equipment journeyman, replace a boost pump Oct. 30 on a self-generating nitrogen servicing cart at Luke Air Force Ba...
 
 

Air Force News – November 21, 2014

Alaska Pope Francis has appointed Chaplain (Maj.) Chad Zielinski, the 354th Fighter Wing deputy wing chaplain, as the new bishop of the Catholic Diocese of Fairbanks, Alaska. Zielinski is scheduled to be ordained Dec. 15 at the Carlson Center in Fairbanks. Japan Personnel from the Japan Self Defense Force teamed with the 33rd Rescue Squadron...
 
 

People First – November 21, 2014

Editor’s Note: The “People First” section is compiled from information from the Air Force Personnel Center, TRICARE, 56th Force Support Squadron, Airman and Family Readiness Flight, Veterans Affairs, the civilian personnel office and armed forces news services.  DOD, AF nuclear force reviews consistent with force improvement efforts The secretary of defense recently announced the result...
 

 
Senior Airmen Grace Lee

Thunderbolts celebrate wingman day

Senior Airmen Grace Lee Col. Jeremy Sloane, 56th Fighter Wing vice commander, shoots a basket Nov. 7 in the Luke Air Force Base Bryant Fitness Center. Luke commanders went up against the Phoenix Banner Wheelchair Suns basketbal...
 
 
Tech. Sgt. Louis Vega Jr.

Enlistment highlights total force

Tech. Sgt. Louis Vega Jr. The 944th Fighter Wing’s newest recruits stand next to a new F-35 Lightning II joint strike fighter and raised their hands to enlist into the Air Force Reserve during a “Total Force” mass enlistm...
 
 

AFRC CC, CCC visit 944th …

Lt. Gen. James Jackson, back right, Air Force Reserve Command commander and Chief Master Sgt. Cameron Kirksey, AFRC command chief, listen to the heartbeat of the Laerdal 3G Simulation Manikin while Tech. Sgt. Tymmothy Roy, 944th Aeromedical Staging Squadron Air Reserve Technician health services manager, demonstrates its capabilities Nov. 6 during a tour of the...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin