Air Force

August 16, 2013

Using USB devices on base computers big no-no

Tags:
Staff Sgt. LUTHER MITCHELL Jr.
56th Fighter Wing Public Affairs

130807-F-BZ180-002
The first thing that pops up after logging onto a government computer is a message: “Effective immediately, the following removable flash media are unauthorized on all Department of Defense information systems until further notice: memory sticks, thumb drives and camera flash memory cards.”

Many people may not read this message and click through the pop-ups until reaching their desktop screen. But, not heeding this message could be costly, as plugging in unauthorized devices can not only damage Air Force networks, they can also damage one’s career.

“The current policy is a universal serial bus, or flash drive device, has to be approved by an information assurance officer,” said Tech Sgt. Jeffery Carroll, 56th Communications Squadron NCO-in-charge of information assurance. “USB devices on the SIPRNet and NIPRNet have to be approved by an IAO and routed to the appropriate agencies for approval. Those users then will be loaded into a program that will recognize them as authorized users.”

Flash media is banned and the only device authorized for use is an external spinning hard drive. Solid-state disk drives aren’t allowed and are still considered flash media.

Flash media includes: USB flash drives, eReaders, digital cameras, MP3 players, smartphones, personal digital assistants, flash media cards, solid state hard-drives and wireless network air-cards.

The 561st Network Operations Squadron at Peterson Air Force Base, Colo., constantly scans the Air Force network for USB violations.

“Results are provided once a week to the 56th Fighter Wing Information Assurance Office in a report that lists the time, computer name, user name, item and IP address of the USB violation,” said Steven Bryan, 56th CS communications security manager. “The WIAO tracks down the violator, disables the user’s account, confiscates the violator’s computer until a complete and thorough virus scan can be accomplished and the user’s unit commander is notified.”

The journey back into the good graces of the network gods is long and hard and involves additional training and lost man-hours.

“The violator must retake DOD cyber awareness training before being allowed access to the network,” Bryan said. “The overall process can take several days to complete, resulting in non-productive time for the violator and those involved in the overall detection process.”

The rules are clear: USB flash drive devices are not authorized to be connected to government computers and with good reason.

“Malicious code can be stored on a device straight from the factory and USB devices can easily introduce viruses into a computer network,” Bryan said.

Additionally, USB flash drive devices pose a risk of loss and theft, and caution should be exercised when using them.

“People shouldn’t be loading any personal identifiable information on external drives,” Carroll said.
The Air Force’s USB flash drive policy has been in effect since February 2009. Nevertheless, individuals continue to plug unapproved devices into government computers daily. If a device isn’t properly labeled, it shouldn’t be connected to a government computer or printer.

“Approved devices should be properly marked and labeled,” Bryan said. “Unclassified devices must be marked with SF-710, SF-711, and a label stating the device must be scanned for viruses before use.”

For more information, call the unit information assurance officer.




All of this week's top headlines to your email every Friday.


 
 

 
Senior Airman Devante Williams

Luke 1 brings home flagship

Senior Airman Devante Williams Brig. Gen. Scott Pleus, 56th Fighter Wing commander, speaks with the press after landing the flagship F-35 Lightning ll joint strike fighter Tuesday at Luke Air Force Base. The flagship’s arriva...
 
 

Every Airman has a voice

While Gen. Mark Welsh III was here at Luke Air Force Base, he discussed the importance of listening to your young Airmen, and making sure they feel empowered to have open dialogue and share ideas within their chain of command. As the NCO in charge of my section, I took General Welsh’s words to heart...
 
 

Off-base activities build your CAF

The Critical Days of Summer draw near. I know that in our shop this kicks off a slew of safety briefings about how to minimize the chance of injuries and stay out of danger. However, this shouldn’t discourage you from going out and exploring the Valley of the Sun. Luke is an amazing base because...
 

 
Senior Airman 
MARCY COPELAND

Love thy feet

Senior AirmanMARCY COPELAND Senior Airman Yadria Wood, 56th Medical Operations Squadron aerospace medical technician, wraps a toe after a wedge resection is performed April 16 on Luke Air Force Base. The human foot contains 26 ...
 
 

News Briefs May 1, 2015

BMGR IEC convenes The Intergovernmental Executive Committee for the Barry M. Goldwater Range will convene at 5:30 p.m. May 13 in Cabela’s Conference Room at 9380 W. Glendale Ave., Glendale. The IEC meets three times per year to facilitate the exchange of views, information and advice relating to the Air Force and Marine Corps’ management...
 
 

Trainee breaks 90 percent, never looks back

“Lee, get off my track!” the instructor yelled. The time clock showed that 21 minutes had passed. Everyone in my flight was finished with the mile-and-a-half run except me. I didn’t finish. Before that we had been mock tested on the sit-up and pushup portion of the test. I performed six sit-ups and zero pushups...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin