Computer virus at Dover?

  • Published
  • By Maj. Jason Fick
  • 436th CS commander
First let me start by introducing myself. I'm the new Communications Squadron commander at Dover AFB. I'm excited to have the opportunity to write an Airlifter article so soon after taking command. As I pen this I've been in the commander's seat for two weeks. In that short time, I've had the opportunity to drink from the proverbial fire hose and gain a sense of some of the bigger issues we face within our command and control communication systems on base.

The biggest issue I see with our systems is both critical and one that I need your help in resolving - cyber threats to our unclassified computer networks. The communications squadron is hard at work keeping our anti-virus and computer patches installed and operating correctly. However, these cyber-security measures only protect us against known threats. They do not protect against unidentified threats like new viruses and worms, or social networking scams.

On the day I took command, a Dover AFB computer was found infected with a key-logger virus. This computer was not connected to the main base network, but rather on a subsidiary network required by a unit to accomplish the mission. A key-logger virus is a dangerous beast because it records every key stroke made on the computer's keyboard and then sends it to an off-base location. Once identified, this virus was quickly quarantined, the network was sanitized and operations were restored. However, think of the possibilities. What if the bad guys were able to record every key stroke from your computer? How dangerous would sharing your operational information be to the on-going war effort? Below are three steps everyone can take to help protect our command and control systems.

1) Know and recognize the telltale signs of infections. Cyber crimes, like this key-logger virus, are a real threat to Dover Air Force Base. I need your help in maintaining our cyber-vigilance so we can keep Dover's command and control systems operational. The above virus was detected and reported to the communications squadron by a computer user that noticed the telltale signs of a virus infection - a sluggish computer, a computer that frequently crashes and disabled virus protection.

2) If you suspect a virus, unplug the LAN cable from the back of your computer to keep the virus from spreading and then contact your computer system administrator and the communications focal point at 677-2666, ext. 1. Once identified and properly reported, the cyber experts in the communications squadron have the tools to quickly root-out and kill the virus, keep it from spreading to other computers and get your systems running smoothly again.

3) Be vigilant when you use our computer systems. Most viruses are downloaded and installed by legitimate users of our networks. We have all taken the Department of Defense's phishing training as a prerequisite to gaining a network account. This training provides an excellent description of how criminals use social networking tricks to attempt to fool us into providing personal information or clicking on their virus programs. My communicators will never ask you for your password, so don't share passwords ... ever. If you get an email from someone that you do not know and that email is not digitally signed, be wary of clicking on links or attachments, as they may contain a malice payload.

In conclusion, thank you for welcoming me and my family as part of the Eagle Wing. I look forward to serving with you as we work together to complete the base's many important missions. Remember: recognize the telltale signs of a virus, report it and be wary of social engineering tricks.