Air Force

August 16, 2013

Using USB devices on base computers big no-no

Tags:
Staff Sgt. LUTHER MITCHELL Jr.
56th Fighter Wing Public Affairs

130807-F-BZ180-002
The first thing that pops up after logging onto a government computer is a message: “Effective immediately, the following removable flash media are unauthorized on all Department of Defense information systems until further notice: memory sticks, thumb drives and camera flash memory cards.”

Many people may not read this message and click through the pop-ups until reaching their desktop screen. But, not heeding this message could be costly, as plugging in unauthorized devices can not only damage Air Force networks, they can also damage one’s career.

“The current policy is a universal serial bus, or flash drive device, has to be approved by an information assurance officer,” said Tech Sgt. Jeffery Carroll, 56th Communications Squadron NCO-in-charge of information assurance. “USB devices on the SIPRNet and NIPRNet have to be approved by an IAO and routed to the appropriate agencies for approval. Those users then will be loaded into a program that will recognize them as authorized users.”

Flash media is banned and the only device authorized for use is an external spinning hard drive. Solid-state disk drives aren’t allowed and are still considered flash media.

Flash media includes: USB flash drives, eReaders, digital cameras, MP3 players, smartphones, personal digital assistants, flash media cards, solid state hard-drives and wireless network air-cards.

The 561st Network Operations Squadron at Peterson Air Force Base, Colo., constantly scans the Air Force network for USB violations.

“Results are provided once a week to the 56th Fighter Wing Information Assurance Office in a report that lists the time, computer name, user name, item and IP address of the USB violation,” said Steven Bryan, 56th CS communications security manager. “The WIAO tracks down the violator, disables the user’s account, confiscates the violator’s computer until a complete and thorough virus scan can be accomplished and the user’s unit commander is notified.”

The journey back into the good graces of the network gods is long and hard and involves additional training and lost man-hours.

“The violator must retake DOD cyber awareness training before being allowed access to the network,” Bryan said. “The overall process can take several days to complete, resulting in non-productive time for the violator and those involved in the overall detection process.”

The rules are clear: USB flash drive devices are not authorized to be connected to government computers and with good reason.

“Malicious code can be stored on a device straight from the factory and USB devices can easily introduce viruses into a computer network,” Bryan said.

Additionally, USB flash drive devices pose a risk of loss and theft, and caution should be exercised when using them.

“People shouldn’t be loading any personal identifiable information on external drives,” Carroll said.
The Air Force’s USB flash drive policy has been in effect since February 2009. Nevertheless, individuals continue to plug unapproved devices into government computers daily. If a device isn’t properly labeled, it shouldn’t be connected to a government computer or printer.

“Approved devices should be properly marked and labeled,” Bryan said. “Unclassified devices must be marked with SF-710, SF-711, and a label stating the device must be scanned for viruses before use.”

For more information, call the unit information assurance officer.




All of this week's top headlines to your email every Friday.


 
 

 
Courtesy Photo

Chrach saves lives, earns recognition

Courtesy Photo Tech. Sgt. Steven Bruner, 56th Security Forces Squadron military working dog handler, and Chrach, 56th SFS MWD, pose for a photo in Afghanistan during their 2012 deployment. Chrach was recently awarded the 12th A...
 
 

Ahead of schedule …

Master Sgt. Thomas Hartley, right, 309th Aircraft Maintenance Group depot structural maintenance chief and Staff Sgt. Joseph Kern, 309th AMG DSM craftsman, analyze blueprints to repair cracked canopy seal longerons in Hangar 914 Dec. 11 at Luke Air Force Base. Hartley is team leader for the seven-man depot team sent from Hill Air Force Base,...
 
 

Heating up the asphalt …

The heat and exhaust of a launching F-16 Fighting Falcon creates a photo opportunity Jan. 8 on the runway at Luke Air Force Base. Luke’s mission is to train the world’s greatest F-16 fighter pilots while deploying mission-ready warfighters.
 

 

Divorce comes with heavy baggage

Divorce, though a difficult chapter in many lives, happens. Divorce comes with both financial and emotional burdens for all involved. Once the decision is made, knowing what will come next can be helpful and comforting. In order to file for divorce in Arizona, one of the parties must reside in Arizona for 90 days. In...
 
 
6_150113-F-VY794-166

Test … testing … 1-2-3

Airman 1st Class Brian Dirgo, 56th CMS avionics team member, demonstrates soldering procedures on an engine diagnostic unit.
 
 
Courtesy photo

White Sands ‘Vipers’ – F-16 training thrives at Holloman

Courtesy photo Lt. Col. Jerod Rick, 54th Fighter Group chief of standardization and evaluation, and 1st Lt. Taylor Roberts, 311th Fighter Squadron basic course student, prepare to taxi Nov. 13, 2014, in an F-16 Fighting Falcon ...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin