Accessible email, social network accounts pose security threat

  • Published
  • By Benjamin Newell
  • AFDW/PA
New Web access via Air Force District of Washington networks provide Airmen with more options for communications and networking, while simultaneously presenting the military with a distinct threat.

Web-based tools including Facebook, Twitter and personal email accounts became accessible Sunday May 2. Used incorrectly, social networking sites like Facebook and Twitter can lead to information security violations, according to information assurance officials in the 844th Communications Group. Additionally, mixing personal and government email accounts can lead to unintended publication of official use only documents and information.

"We recognize the value of some of these new tools to the Air Force," said Mark Price, an AFDW information assurance officer. "But every user must also understand that these new tools pose very real threats."

Information assurance specialists view every user of government networks as the tip of the spear, said Mr. Price. Responsible use of Web-based tools and applications can help fend off attacks on military networks.

With the opening of social networking and personal email accounts on Air Force computers, the 844th Communications Group warns every Airman to become hyper-vigilant. When an Airman logs on to their government computer, they are responsible for threat assessment and reporting suspicious behavior or activities.

In addition, Airmen must actively separate their personal and military email accounts. "Do not set up automatic forwarding from your government computer now that you can access a personal email account at work," said Mr. Price. Automatic forwarding can lead to classified and official use only documents becoming accessible to third parties.
Information, like where Airmen work, who they work with, when they are deploying and who their superiors are should not be considered public information. Making these small pieces of information part of your social networking page can help enemies put together an overall picture of military operations.

To combat the threat posed by new social networks, military network operators have a phalanx of defensive capabilities.

A DoD wide security system used throughout the Air Force, known as the Host Based Security System gathers data on surfing patterns, which are traceable to the user. "With HBSS, we have the ability to set up a strainer," said 844th Communications Group Chief of Plans and Implementations, Michael Calkins. "This strainer searches for specific words, patterns and phrases and reports them to network experts at Langley AFB, Va." If a user repeatedly violates rules and regulations agreed to every time they log onto a government computer, their actions may be reported to a superior.

While surfing patterns and websites visited are monitored, the information Airmen release is not. "All Airmen must understand that it is their responsibility to use these tools as they are intended on and off duty hours," said 844th Communications Group Commander Col. Curtis Frost. "For instance, I plan on using Twitter and possibly a unit Facebook account to keep in touch with Airmen."

The best way to keep your information private and protect the Air Force, according to Mr. Price, is to pretend as if everything you post to social network accounts will be collected by foreign intelligence networks.