News | Aug. 10, 2007

Cyber warfare: It’s everyone’s fight

By Staff Sgt. Luke Johnson 940th ARW

As the 940th Air Refueling Wing here prepares to convert to an intelligence, surveillance, reconnaissance (ISR) mission, cyberspace security and computer equipment accountability are a serious business for the wing and the Air Force.

With information technology and computer hardware evolving rapidly, the Air Force is committed to protecting and defending the cyberspace realm.

"As the wing begins to drawdown, be sure to keep track of who will be taking over the computer equipment assigned to you before you leave the wing for another assignment," said Senior Master Sgt. Gregory Garrett, 940th Communications Flight chief.

Computer equipment custodians are responsible for the proper turn over of equipment, but all Airmen in the wing should stay vigilant in assuring a proper computer equipment turn over, according to 940th Communications Flight commander, Maj. Annette Poole.

"If you see something that doesn't look right, or computer equipment in your workplace that you think doesn't belong, find an equipment custodian and ask if it belongs in your office," Maj. Poole said.

Sergeant Garrett also stressed the importance of computer equipment custodians knowing how to turn over hardware and following the correct procedures. Even though a custodian may leave the wing, that person could still be responsible for equipment here if they did not properly assign it to a new custodian.

"When you hand over your equipment to another custodian make sure you know where it's going," said Sergeant Garrett.

Maj. Poole and Sergeant Garrett emphasize the importance of ensuring that all custodians of laptops have an Air Force Form 1297 with them and also have one on file with the wing.

"If you happen to lose or misplace a wing laptop with personal information, there are fines and even jail time associated with mishandling privacy act information," Sergeant Garrett said.

Protecting personal information is critical to maintaining operational readiness stated Sergeant Garrett.

"If you're deployed to the desert and your identity is stolen back at home, it will take your mind off the fight," Sergeant Garrett said. "Classified military information and privacy act data now overlap. We need to closely guard our personal information as closely as we guard military classified information."

Maj. Poole reminds all wing members to always take their military common access cards when they leave their computer and also to ensure that all emails sent are free from security violations.

"Even unclassified information can be dangerous when in the wrong hands," Maj. Poole said.

The Major and Sergeant Garrett emphasized that computers and cyberspace technology are great war-fighting tools that can be dangerous weapons in the wrong hands.

For questions or more information regarding computer equipment accountability or information security, contact the 940th Communications Flight at 634-1812.