Every Airman has a stake in network security Published Sept. 28, 2016 By Mark Aaron Locken Air Education and Training Command Public Affairs JOINT BASE SAN ANTONIO-RANDOLPH, Texas -- Computers and the networks they are attached to are crucial to conducting the daily business in every corner of the Air Force. Every military computer user plays an important role in protecting the security of the network from malicious attacks and unauthorized devices which can damage or even shut down the network completely. Jonathan Poole is the Chief of Cyber Compliance for the Regional Network Enterprise Center, Joint Base San Antonio–Fort Sam Houston, Texas. He said the problems of the network occasionally slowing down are not caused by a lack of bandwidth. “It would take a couple of thousand people streaming music, all at the same time, to slow down the network even a little,” said Poole. “But that’s not an issue because we’ve blocked audio streaming services. We also blocked many video streaming services with the exception for YouTube as it is often used in training presentations.” Poole said that the network can experience slowdowns due to a variety of causes. “Most often, it is just structural,” he said. “Configuration changes can be implemented for various reasons and are generally transparent to the customers. Occasionally a configuration change can negatively affect the network and cause things to slow down. We do monitor the network closely and when these issues arise, they are usually resolved quickly.” Tommy Garcia, computer security manager for the JBSA cyber security office at JBSA–Randolph says that even though security systems are in place, some weaknesses do exist. “Military computer networks are regularly scanned in order to detect and patch vulnerabilities in the system,” said Garcia. “Discoveries are quickly addressed either by military information security specialists, industry partners, or through a collaborative effort.” “There are some vulnerabilities existing in the system,” continued Garcia. “By accident, some Airmen encounter those vulnerabilities and create an entry for someone with bad intentions. In most instances, Airmen are not trying to do harm, they are just looking for information and winding up in a place on the network where they shouldn’t be. Now a breach is created and it becomes a problem for all network users.” Poole said there are security measures in place which cause any breach of the system to set off alarms. He gives the example of an Airman who plugs a smartphone into his work computer to listen to music. “The computer terminal will immediately shut down, the Airman’s computer account is frozen, and that Airman’s commander is notified,” said Poole. “The same actions would take place if someone attempted to introduce malicious code (a virus) to the network.” According to Garcia, personnel are regularly found in violation of AFMAN 33-282, Computer Security. Users plug smartphones or thumb drives into their work computers or attempt to go to restricted websites such as on-line gambling casinos. With external and internal threats to military computer networks, Garcia said there are simple steps users can take to protect their computer and the network. “It is really important to log off of your work station each day but leave the machine on so we can push updates through the network on a regular basis and perform vulnerability scans,” said Garcia. “If each user does this, it makes the network less susceptible to harm.” Garcia said that every computer station should also have the green, JBSA Information Operations Conditions card at their desk to serve as a quick reference. “Please read that card so you are aware of what you need to do to protect the network,” said Garcia. “Information assurance officers can’t be everywhere. If something doesn’t look right to you, call one of the contacts listed at the bottom of that card to let them know. We all have to guard the network.” Poole said network protection starts before users even log on. “It begins before you even get on the network, though,” said Poole. “Reading the Acceptable Use Policy you have to sign before you are allowed to use the system at each new duty station is important. It thoroughly explains what you can and cannot do." Other steps system users can take to protect military computer networks include guarding passwords and maintaining control of common access cards. Additional information on network security is available from unit information assurance officers.