Scope broadens for AF cyber mission as challenge grows Published July 28, 2009 By Mary Lou Gorny Hilltop TImes editor HILL AIR FORCE BASE, Utah -- The U.S. military -- and the Air Force in particular -- faces a cyber threat unlike those posed even two years ago. "Every day more things become part of (the Air Force) cyber mission," says John Gilchrist, of the 775th Communications Squadron. When asked about the threat posed by thoughtless use of the Internet or federal computers by an Air Force or Department of Defense worker, the Hill Air Force Base Information Assurance manager urges extreme caution. "It is absolutely critical that the user be aware of what they are doing and understand the consequences of their actions ...for both on the job here at Hill, as well as at home. The bottom line is there are bad guys out there on the Internet -- all the way from pre-teen hacker wannabes to petty criminals, special interest groups, to organized crime, and state-sponsored espionage -- who want access to our computers." Although Gilchrist says he doesn't want to sound "as though the sky is falling," it is easy to understand his concerns as he explains, "On base that access could provide information about logistics systems, troop deployments, flight schedules, all kinds of OPSEC information that used to require an agent physically present to collect. Now, most of this information can be accessed from remote locations." Gilchrist emphasizes the threat is real here in the continental United States. "Cyber war has no physical, geographical or political boundaries. Organized crime in Moscow is as much a threat to your computer from Russia as the crook three doors down from you on your own street!" Among the common sense remedies Gilchrist recommends is that the user understand the computer and its use and that great care be taken with any e-mail without a digital signature. Gilchrist says that the digital signature is the only tool that allows the recipient to guarantee the sender is who they say they are. AFI 33-119 requires all e-mail to be digitally signed if it contains an active hyperlink or an attachment. On base do not follow any hyperlink or open any attachment from an e-mail that has not been digitally signed. At home do not follow a hyperlink or open an attachment from any unsolicited e-mail. Even if it appears to come from somebody you know, call them and make sure they sent that e-mail. The reason for the concern is that hyperlinks and attachments are the two top ways of getting your computer infected. Gilchrist views the problem with a sense of humor as he suggests various fictitious penalties which he thinks might be effective. He does, however, compare the growing cyber risks and careless use of the computer without understanding the potential risks as similar to giving a weapon to a child who doesn't understand how to use it. The penalties in place for violating computer use directives are up to the various units and departments at Hill Air Force Base. Historically, the base has pursued a relentless prosecution of those who violate policy beginning with the use of computers to visit pornography sites. Gilchrist says such sites are riddled with malicious code and that the prosecution of such incidents began a foundation of prevention greatly reducing that particular threat and associated threats. "Now, when we examine the virus logs from computers across the base we find that users get infections from recipe sharing, genealogy, scrap booking, and other sites most of which have nothing at all to do with the user's job," he says. Gilchrist points out the potential for additional problems. "Another vector for malicious code is the laptop. When a user goes TDY or takes a laptop home, the protections provided by our base are no longer there," he says. "Further, it seems that being away from 'Big Brother' emboldens otherwise cautious users, and their Web browsing often becomes significantly more eclectic. The laptop becomes infected, then they bring it back to the base and plug it into the network potentially exposing the rest of us to their Internet wanderings. The bottom line is the workstation or laptop that has been entrusted to the user is for official or authorized activity. It's not free access to the Internet." If workers would use the government equipment to just do the government's work it would reduce the threat to the base significantly. Gilchrist does see the potential risks of cyber war as likely to get worse before the situation gets better. Prevention and understanding are key to protecting information. He urges anyone who uses a computer at home to consider the risks as well because of the danger of identity theft. In general, he says that short of wiping your computer clean, starting fresh and building your firewalls before you access the Internet with that computer -- your information is at risk of being accessed by others. And he urges that the protections of home computers be kept current.