An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Unapproved devices equal trouble

  • Published
  • By Staff Sgt. Rachel Kocin
  • 910th Airlift Wing Public Affairs

Think it’s a good idea to plug your cell phone into your government computer to charge it? Think again, or you could receive an unpleasant visit from a representative of the 910th Communications Squadron.

According to Air Force Instruction 33-200, Cyber Security Program Management, and Air Force Manual 33-283, Communications Security, unapproved devices such as smartphones and thumb drives may not be plugged into a government network.

Master Sgt. Edward Burns is a cyber security manager with the 910th Communications Squadron (CS) here.

“Any unauthorized device, whether it was cleared or not, could possibly have malicious software or some kind of virus on it,” said Burns.

Whenever an unauthorized device accesses the network, Burns must step in. His primary job is to protect the network from potentially harmful code or access with malicious intent.

Detection of unauthorized devices plugged into network computers results in a suspension of the user’s network access. The unit member will be notified by CS that they will have to re-accomplish their Information Assurance training and file paperwork to get back online. A second violation will lead to a visit with the first Colonel in the member’s chain of command.

Burns offers some addition device on protecting the network.

“When you use a laptop, if you have a docking station, don’t plug (devices) into the docking station either, because that’s still plugged into the network,” said Burns.

Using those handy USB ports to charge devices may seem convenient and harmless, but every Airmen has the responsibility of protecting the Air Force network. Find safe permitted alternatives to avoid making the CS list of policy violators.