PC misuse can lead to stiff penalties

By PC misuse can lead to stiff penaltiesSeptember 8, 2010

An employee with the Network Enterprise Center monitors Internet use across the installation.
(Photo Credit: U.S. Army) VIEW ORIGINAL

FORT JACKSON, S.C. -- Those who think they can get away with viewing pornography or prohibited websites on their government computers beware. You are being monitored.

That is the message Fort Jackson's Network Enterprise Center is trying to get out to prevent the misuse of government computers and help users avoid disciplinary and possible criminal actions.

"Every connection to the Internet is logged and we go through those logs," said LaShonda Howard, information assurance officer. "Even if you clear your history, it is logged."

Each day employees at NEC go through the Internet history of more than 8,000 computers on the installation - that is equal to about 10 million website hits a day. Websites that have adults themes, such as pornography, gambling and dating services are strictly prohibited on government computers.

When a user's log indicates he or she is actively seeking out a prohibited site, the NEC contacts that user's supervisors for disciplinary actions.

"We aren't looking for people who mistakenly click on the wrong link and it brings up porn," Howard said. "We are searching for those who actively seek it out."

Depending on the severity of the case, when logs reveal a user has accessed prohibited sites, the NEC sends out an e-mail warning to the user that he or she is being monitored.

So far this fiscal year, the NEC has investigated and referred five cases of accessing pornography at Fort Jackson.

"It has been less and less as the community of Fort Jackson becomes aware that the network is closely monitored," Rene Muniz, chief of Information Assurance, said of the instances of prohibited websites being accessed. "Folks for the most part know what websites they are not allowed to visit."

In the case of child pornography, the Army Criminal Investigation Division is contacted immediately. "If anything suggests that child pornography is involved, it is hands off for us and CID takes over," Muniz said.

The NEC filters most prohibited and illegal websites; however, there are instances when a user is able to access those sites, Howard said. An example would be when an adult-themed link is located on an acceptable site.

There are also proxy sites that allow users to circumvent an Internet filter.

"They are out there for collecting information on you," Howard said. "You may think you are getting something for free, but really they are getting your information in return."

Prohibited and illegal sites may also not be viewed on government laptops or Blackberries that a user takes home, even if the computer is connected to a commercial Internet provider.

"This is not your computer. This is a government computer," Howard said. "Everything you do on the Internet leaves a trace."

The NEC is not involved in the disciplinary procedures, but does provide documentation that might be needed, Muniz said. NEC officials can disable a user's account immediately for accessing pornography, then his or her supervisor or unit commander is notified. For a first offense, a user's computer account is typically suspended for a week.

Punishment can also range from Uniform Code of Military Justice actions to job termination and prison for child pornography, according to Army Regulations 25-2 Information Management Information Assurance.

"The 165th Infantry Brigade considers the responsible use of our government computers a must for the success of our mission," said Col. Bryan Rudacille, brigade commander. "With the proliferation of computers in the workplace, we can ill afford to violate the clear guidelines we have established for proper use. Violations are a serious matter and people are held accountable for their actions."

Rudacille said all allegations of improper use of government computers are fully investigated. Soldiers can have their privileges suspended while the investigation is ongoing, and if found in violation, the command takes appropriate action through administrative or judicial means.

"Leaders throughout the brigade are obligated to protect our resources and prevent mishaps," Rudacille said. "Whether they are inadvertent or deliberate."