Yokota network administrators crack down on unauthorized USB usage

  • Published
  • By Airman 1st Class Desiree Economides
  • 374th Airlift Wing Public Affairs
Despite the Department of Defense ban on USB and flash media devices, unauthorized flash media usage is on the rise at Yokota, according to the 374th Airlift Wing Information Assurance office.

Although the DoD approved limited use of authorized external USB devices in 2010, many devices remain prohibited on government computers because of the potential they have for introducing viruses and other malicious code.

"On average, we typically experience one violation per week. However, we have seen a notable increase in the number of offenders in the last few weeks," said Tech. Sgt. Keith Shoup, 374th Communications Squadron wing emissions security manager.

In November 2008, the DoD banned all use of thumb drives and flash media devices on government computers after several computer systems were infected by viruses.

Today, government-purchased external hard drives can be utilized on DoD computers, but must first be approved by each unit's information assurance officer and the 374th AW IA office.

A number of devices containing flash memory such as USB thumb drives, Blackberries, iPods and camera flash memory cards, are still not authorized to be connected to the network.

"The most common violation is the charging of Blackberries, iPods, and other portable media devices," said Sergeant Shoup. "These connections put the entire computer network at risk. If these unauthorized devices contain viruses, they have the potential to rapidly spread."

To ensure networks remain secure, scans are completed 24 hours-a-day, seven days-a-week to detect unauthorized USB devices. If a person is caught in violation, their computer access is automatically suspended, which negatively impacts the mission.

"It doesn't matter what your job is, we have a heavy reliance on computers," said Senior Master Sgt. Kareema Patton, 374th CS plans and resources flight superintendent. "If you lose your access, you are inhibiting both your unit and the mission."

To regain access to the network, violators must again complete annual Information Assurance and Information Protection training and obtain a letter from their commander requesting account restoration from the 374th Mission Support Group commander.

"A threat exposed by one is a risk shared by all," said Sergeant Shoup. "If you aren't sure if you can plug it in, ask your unit's IA officer or contact the Wing IA Office at 225-9000."