Information assurance: Be mindful when sending information over network

  • Published
  • By Staff Sgt. Nicholasa Reed
  • 48th Fighter Wing Public Affairs
In this technological age information is a weapon.

Data sent over telecommunication devises can be easy prey for advisaries. Airmen should ensure they are mindful and protect sensitive information sent over the military network.

Telecommunication devices such as land lines, cellular phones, computers and fax machines used to pass information can pose a security risk if not used properly, said Staff Sgt. Quinton Johnson, 48th Fighter Wing staff information systems security officer.

These devices should not be used to transmit classified information, unless otherwise stated. Each piece of equipment is required to be marked with the highest classification of information the terminal is authorized to transmit.

Even though most units have an ISSO available, safeguarding information is everyone's responsibility.

"All network users are required to take information protection training, formerly known as information assurance, annually," said Sergeant Johnson.

Information covered in this training includes; the difference between types of information, an Airman's responsibilities in information protection, and what to do if unauthorized information is sent via unsecured terminals.

"In the case a classified message is sent to another computer each terminal has to be sanitized. The process can take at least 24 hours if the offense is caught immediately after the incident," said Staff Sgt. Jeremy Polite, 48th Fighter Wing Information Assurance office NCO.

One day is not the norm, though, said Sergeant Polite, "Most of the time it takes two to three days."

In addition to affecting the individual who violates information security, it also affects the unwilling recipients, added Master Sgt. Thomas Roback II.

Each terminal involved will be wiped of all information it contained.

"The Air Force is actually losing money when instances such as this occur. Information and time is money," said Sergeant Roback.

In cases where the incident is believed to be caused due to negligence, the offending individual could be held responsible for financial compensation, said Sergeant Roback.
Taking the time to check with an ISSO or consult the annual training can prevent time lost from the mission and avoid security risks.

Individuals with questions should contact their ISSO.

When sending information or using communication devices, here are some things to be aware of:

· Fax security
Use of AF Form 3535, facsimile electronic mail transmittal, is mandatory. It should include a notice and consent statement when sending fax transmissions, i.e., "Do not transmit classified information over unsecured telecommunications systems are subject to monitoring and use of DoD telecommunications systems constitutes consent to monitoring."

· Portable electronic devices
All users issued a portable electronic device must sign a receipt with the exact notice and consent statement from AFI 33-219, attachment 3, paragraph A3.3.4: "Do not transmit classified information over unsecured telecommunication systems. Official DoD telecommunications systems are subject to monitoring and use of DoD telecommunications systems constitutes consent to monitoring."

· DoD Form 2056
DoD Form 2056 should be applied to all telecommunications devices stating, "Do not discuss classified information. This telephone is subject to monitoring at all times. Use of this telephone constitutes consent to monitoring." This includes cellular phones, hand-held radios and land mobile radios.