IA is key to Wolf Pack's cyber security Published Aug. 17, 2011 By Senior Airman Scott Saldukas 86th Airlift Wing Public Affairs KUNSAN AIR BASE, Republic of Korea -- An information and cyber war is emerging as one of the nation's most widely publicized national-security concerns. Right now, hundreds of foreign intelligence organizations are trying to hack into the digital networks and capturing information on U.S. military operations and the economy. William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare...[which] has become just as critical to military operations as land, sea, air, and space." President Barack Obama declared U.S. digital infrastructure and information to be a "strategic national asset," and the Pentagon recently set up its new U.S. Cyber Command, headed by the Director of the National Security Agency, to defend the U.S. military networks and attack other countries' systems, as necessary. Other countries are also positioning themselves with strong military forces on winning future information and cyber wars, among them are China, Russia, Israel and North Korea. What does this mean to the Wolf Pack? Kunsan Airmen have the responsibility to instill operations, rigor and discipline in ensuring cyber capabilities are protected and information is assured. The 8th Fighter Wing will be undergoing Air Force Cyber Command sponsored Information Assurance Assessment and Assistance Program inspection on Aug. 29, and is scheduled to end Sept. 9. The IAAPs purpose is to "find and fix" Information Assurance concerns throughout the Wolf Pack community. Information Assurance encompasses three disciplines: Computer Security, Emissions Security and Communications Security. To ensure a smooth inspection, Wing Information Assurance Office recommends you review and take action on the following tips: - Know who your unit IA officers are - Remove your Common Access Card from your computer when you leave the immediate area -Do not bring any cell phones or electronic devices into classified processing areas. i.e. PDAs, MP3 players, etc. - Ensure no unauthorized personal software is loaded on government systems - Stand-alone computers performing any function for your unit need to be properly patched and updated - Wireless devices such as keyboards and mice are prohibited on government computers - All CDs, DVDs, external hard drives, floppy disks and removable media need to be labeled with the proper classification - Have a DD form 2056 (red sticker) on all government phones - Remove all WAV files, MP3s and documents named PASSWORD, etc. from computers immediately; the inspectors are looking for each of those in the work centers - Ensure you have completed end of day checklists, and they are signed off for your Work Center and Safe Standard Forms 701 and 702, if applicable -The Foreign Disclosure office needs to sign off on all Local National Form 115s before they can be considered complete - Key Material Destruction reports/documentation needs to be completed with all proper signatures Protecting information and cyber capabilities is absolutely crucial not only during the IAAP but in daily activities, and is everyone's responsibility. Your actions are essential in defending the Wolf Pack's information and by acting on the above tips and continuing to be vigilant; we will continue to assure our information is never compromised with mission accomplishment. (Editor's note: Maj. Brian Snyder and Capt. Pall Green, 8th Communications Squadron, contributed to this story.)