Air Force

August 16, 2013

Using USB devices on base computers big no-no

Tags:
Staff Sgt. LUTHER MITCHELL Jr.
56th Fighter Wing Public Affairs

130807-F-BZ180-002
The first thing that pops up after logging onto a government computer is a message: “Effective immediately, the following removable flash media are unauthorized on all Department of Defense information systems until further notice: memory sticks, thumb drives and camera flash memory cards.”

Many people may not read this message and click through the pop-ups until reaching their desktop screen. But, not heeding this message could be costly, as plugging in unauthorized devices can not only damage Air Force networks, they can also damage one’s career.

“The current policy is a universal serial bus, or flash drive device, has to be approved by an information assurance officer,” said Tech Sgt. Jeffery Carroll, 56th Communications Squadron NCO-in-charge of information assurance. “USB devices on the SIPRNet and NIPRNet have to be approved by an IAO and routed to the appropriate agencies for approval. Those users then will be loaded into a program that will recognize them as authorized users.”

Flash media is banned and the only device authorized for use is an external spinning hard drive. Solid-state disk drives aren’t allowed and are still considered flash media.

Flash media includes: USB flash drives, eReaders, digital cameras, MP3 players, smartphones, personal digital assistants, flash media cards, solid state hard-drives and wireless network air-cards.

The 561st Network Operations Squadron at Peterson Air Force Base, Colo., constantly scans the Air Force network for USB violations.

“Results are provided once a week to the 56th Fighter Wing Information Assurance Office in a report that lists the time, computer name, user name, item and IP address of the USB violation,” said Steven Bryan, 56th CS communications security manager. “The WIAO tracks down the violator, disables the user’s account, confiscates the violator’s computer until a complete and thorough virus scan can be accomplished and the user’s unit commander is notified.”

The journey back into the good graces of the network gods is long and hard and involves additional training and lost man-hours.

“The violator must retake DOD cyber awareness training before being allowed access to the network,” Bryan said. “The overall process can take several days to complete, resulting in non-productive time for the violator and those involved in the overall detection process.”

The rules are clear: USB flash drive devices are not authorized to be connected to government computers and with good reason.

“Malicious code can be stored on a device straight from the factory and USB devices can easily introduce viruses into a computer network,” Bryan said.

Additionally, USB flash drive devices pose a risk of loss and theft, and caution should be exercised when using them.

“People shouldn’t be loading any personal identifiable information on external drives,” Carroll said.
The Air Force’s USB flash drive policy has been in effect since February 2009. Nevertheless, individuals continue to plug unapproved devices into government computers daily. If a device isn’t properly labeled, it shouldn’t be connected to a government computer or printer.

“Approved devices should be properly marked and labeled,” Bryan said. “Unclassified devices must be marked with SF-710, SF-711, and a label stating the device must be scanned for viruses before use.”

For more information, call the unit information assurance officer.




All of this week's top headlines to your email every Friday.


 
 

 
square

Luke conducts first F-35 training deployment

Senior Airman Thomas Spangler A 61st Fighter Squadron F-35 Lightning II joint strike fighter taxis prior to take off April 15 at Nellis Air Force Base, Nevada. Ten F-35s from the 61st Fighter Squadron were sent to Nellis for th...
 
 

Sidewinders fly missing-man formation

A missing-man formation flyover took place at the Air Force Academy Cemetery April 14, to honor a fallen Airman whose remains were repatriated and laid to rest. Pilots from the 311th Fighter Squadron of the 54th Fighter Group from Holloman Air Force Base, New Mexico, flew it. Capt. Richard Chorlins, U.S. Air Force Academy class...
 
 

Birth of a flagship

Courtesy photo An F-35 Lightning II joint strike fighter taxis at Lockheed Martin’s Fort Worth, Texas, facility just before its first flight March 31. This jet is one of several Lightning IIs destined for Luke Air Force Base in the near future after flight testing. Tail number 5056 is scheduled to be the 56th Fighter...
 

 

It’s a bird, it’s a plane … it’s a Viper

Tech. Sgt. Timothy Boyer A group touring Luke Air Force Base watches as an F-16 Fighting Falcon launches. Both the tower and the mountains are further away than they appear.
 
 

Use, lose leave over 60 days visible on April LES

In 2008, legislation was introduced to increase the number of leave days a member could carry forward at the end of the fiscal year from 60 to 75 days. Every year since, legislation has been introduced to extend the 75-day leave carryover through Sept. 30. The Office of the Under Secretary of Defense, Personnel and...
 
 

Air Force News – April 24, 2015

Idaho Airmen from the 366th Fighter Wing and the 266th Range Squadron at Mountain Home Air Force Base teamed with Sailors, Marines and Army National Guardsmen for combat training scenarios to simulate deployed situations during Gunfighter Flag 15-2. Honduras Chief Master Sgt. of the Air Force James Cody visited Soto Cano Air Base April 13...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin