Steps aimed at protecting network

In this day and age, war readiness is at the forefront of everything we do.
We stay mentally and physically prepared through training that enhances our skill as war fighters in the event that we will be called to deploy and serve in austere locations. We check our equipment so we know it will serve its purpose when needed.

The last thing you want to have is a weapon that malfunctions when you need it the most.

The most important weapon system in today’s fight that is greatly overlooked is the computer network. Computers ensure we get the job done and get it done in a timely fashion. When the network is threatened, we need to act fast to make absolutely sure it stays uncompromised and maintain the three points of computer security: confidentiality, integrity and availability.

Recently, our network has been threatened by the agent.btz worm that has affected computers all across the Department of Defense network.
The worm spreads quickly and quietly through the use of flash memory. This was, and still is, the cause for the continuing universal ban on all flash memory devices across the Defense Department.

Flash memory is any non-volatile computer memory that can be electrically erased and re-programmed. Non-volatile means no power is required to keep the information on the chip. Several examples of flash memory would be thumb drives, memory cards, handheld devices (e.g. MP3 players, iPods, cameras) and flash hard drives. A flash hard drive would be any storage device connected by USB cable that lacks magnetically spinning disks to store data. In really simple terms, flash drives don’t vibrate when storing data.

The only devices currently allowed to be plugged into the DOD network are drives that are government owned and not based on flash memory technology. This includes anything the government has purchased for official business and has internal moving parts.

 Keep in mind, you must perform a full virus scan with Symantec Antivirus on the device every time you plug it into your computer.
This step will ensure the media has not been compromised and will not pose a risk to the network. To perform a virus scan:

• Open Symantec Antivirus by double-clicking the yellow shield in the system tray at the bottom right hand corner of your desktop
• Once the program is open, you will see the scan menu on the left. Expand the menu to view all options
• Select the custom scan option; check the box of the drive you will be using and click the scan button
• Once the scan is complete and no malware has been detected, it is safe to proceed
One item of interest is government owned BlackBerries. These devices contain flash memory but still must be connected to the network occasionally.
Government owned BlackBerries are not included in the flash memory ban due to their use of two forms of encryption: Triple DES (Data Encryption Standard) and AES (Advanced Encryption Standard). Because of the extreme level of security used, the Defense Information Systems Agency has approved their use on the government network.

As our missions grow, so do the number of adversaries determined to stop them, and the agent.btz worm can do just that. In order to contain this computer attack, we must not use flash memory or flash-based devices until further notice.
By taking this inconvenient action now, we can trust and know the network will be safer and our mission data, pay and personal information will be there when we need it next time.

(Courtesy of 435th Air Base Wing Information Assurance Office)