Smart phone charging increases cyber threat

By Capt. James Williams III, NETCOMFebruary 12, 2013

Smart phone charging increases cyber threat
(Photo Credit: U.S. Army) VIEW ORIGINAL

YONGSAN, South Korea (Feb. 8, 2013) -- Smart phone owners with access to government computers in South Korea have rapidly become the number one group of cyber security violators in the country.

Over a recent seven-day period, the Korea Theater Network Operations Center detected 129 cyber violations caused by smart phones alone. Most of the perpetrators did not realize they had done anything wrong.

"The main problem is that people are using their government computers to charge their phones with USB cables," said Lt. Col Mary M. Rezendes, 1st Signal Brigade operations officer-in-charge.

Violators don't realize that computers recognize their phones as USB devices and that their software puts the network at risk.

The Army's information assurance policies, found in Army Regulation 25-2, prohibit the use of USB devices on its networks. Before being granted access to Army networks, users are required to take cyber security training. They also sign a user agreement that states that they will not use USB devices on government computers.

"Cyber security is at the top of the list of our priorities and we must hold those accountable for violating the Army's policies," Rezendes said.

Service members who violate the policy are subject to punishment under military law. Civilians may be reprimanded.

"People who violate the policy will lose access to the network and run the risk of losing the data on their smart phones or other USB devices," Rezendes said.

A good cyber security program is a team effort.

"Though the 1st Signal Brigade implements DOD network policies, unit commanders have the authority to enforce them," said Paul H. Fredenburgh, the 1st Signal Brigade commander. "But most importantly, it takes individual responsibility for us to collectively protect our networks."

Related Links:

U.S. Army Social Media Handbook - 3rd Edition

Army Regulation 25-2, INFORMATION ASSURANCE

U.S. Army Cyber Command

Army activates first-of-its-kind Cyber Brigade

Cyber Guard exercise focuses on defensive cyberspace operations

Cyber Awareness Week focuses on network, personal security, other issues

Army.mil: Asia and Pacific news