OCR Text |
Show MGVJO. TTcCLjia Twenty airmen join NCO ranks Nov. 10, 1988 0L7(3DDQLKlg) Hill CLSS team works in AFB, and Air Ohio (AFLCNS) Force Reserve combat logistics support squadrons are gaining valuable experiences in Central and South Twenty airmen joined the ranks of the noncommissioned officer corps at ceremonies held at the NCO club Nov. 1. Guest speaker at the NCO appointment ceremony was SMSgt. Timothy Byro, 388th Tactical Fighter Wing Outstanding Senior NCO of the Year. The new sergeants are: WRIGHT-PATTERSO- N Active-dut- y And Hill AFB 2952nd CLSS members were among those who have had the opportunity to partake in the training, taking a trip to El Salvador. Air Force Logistics Command CLSS teams have been allowed to conduct training in aircraft battle damage repair, supply and transportation in four Central and South American nations. The program is part of Look South. The four countries where CLSS training is under way are El Salvador, Guatemala, Colombia and Honduras. 2849th Air Base Group: Maureen R. Eubanks. 2849th Civil Engineering Squadron: Leighton I.N. Beech, Maurice S. Cartledge, Veronica Lynn Jankowski, Jeffery King, Matthew A. Steele and Robert R. Vaughn. 2849th Security Police Squadron: Melvin E. Hightower, Kevin J. Hunt and Dexter L. Smith. Directorate of Maintenance: Frank Nunez. U.S. Air Force Hospital, Hill: Jonathan M. Bucks and Lisa M. Peru, the Dominican Republic and Costa Rica may join the list during the coming year. Similar training is envisioned in three additional countries, according to Lt. Col. Eddie Womack, chief of the posture implementation division in the office of the deputy chief of staff for maintenance at AFLC headquarters at Steel. 2952nd Combat Logistics Support Squadron: Jerry D. Davis and Leonard J. Friedel. 388th Headquarters Squadron: Joseph A. Knowles and John Wright-Patterso- n. Colonel Womack said CLSS teams have already made nine training trips into the Latin American region, and at least eight such training deployments are planned for fiscal year 1989. He said the first training deployment occurred in October 1987 in El C. Rojas. 388th Aircraft Generation Squadron: Scott A. Skank and Gretchen A. Wallis. 388th Equipment Maintenance Squadron: Lindy J. Cascaddan. Salvador, where 10 CLSS maintenance workers trained on a 7 aircraft that had major corrosion damage. The peonot only for their ple were hand-picke-d C-4- Prop course grad earns Levitow El 3 CDoDCfeD Salvador; part of Look South skills but also for their Spanish-speakincapability. The and workers were both active-dutaircraft-repai- Hilltop Times r g y Reserve workers. The workers were dispatched from the 2952nd CLSS and the 2954th CLSS and 404th CLSS, a reserve unit, both from Kelly AFB, Texas. They spent five weeks in El Salvador working on a flightline under austere, bare-bas- e conditions. They pulled the wings 7 off the and made corrosion holes that looked like batrepairs on tle damage and were "larger than we normally see." Colonel Womack said after their work was finished, they had the satisfaction of seeing the aircraft fly after it was grounded for two years. He said CLSS members generally do not get to see the aircraft they work on fly, as their customary duties occur at AFLC's depots. Salvadoran mechanics did the engine work and systems maintenance. From June 12 to July 17 of this year, a 2952nd CLSS team spent five weeks in El Salvador engaged in supply They moved 93,000 line items from Ilopango to Comalapa InC-4- ternational Airport. in Colombia conducting a site survey of five Colombian bases. Then a team comprised of members of the 2951st CLSS at McClellan, 2953rd CLSS at Tinker AFB, Okla., 2954th CLSS at Kelly and the 2955th CLSS at Robins AFB, Ga., spent a month in Colombia doing supply inventory work. In fiscal 1989, personnel from the 2954th CLSS at Kelly are scheduled to aircraft in Honduras. work on a A-37- B Additional training deployments in fiscal 1989 are slated for Guatemala, Colombia, El Salvador and the Dominican Republic. Potential training opportunities are being explored in Peru and Costa Rica. Colonel Womack said the project is not a Security Assistance Program, but a way to enhance Air Force combat readiness by providing CLSS training under realistic conditions in the field. "The program gives selected CLSS personnel an invaluable opportunity to enhance their supply, transportation and battle damage repair skills in a sometimes hostile environment," Colonel Womack said. "That way they get to enhance their wartime skills as well." and He said all AFLC active-dut- y Since then, CLSS personnel from the 404th CLSS at Kelly and the 405th reserve CLSS organizations are inCLSS at Hill, both Air Force Reserve volved in one way or another. "We select which unit will go depending on squadrons, spent a month in Guatemala engaged in warehousing duties. which unit requires the training and They inventoried 2,506 line items and has the expertise we need to carry out the assignment." 42,634 units. Colonel Womack said, "This initiaA team from the 2951st CLSS at McClellan AFB, Calif., spent nine days tive is a real feather in ALFC's cap." A 2849th Munitions Test Squad ron airman was the top graduate of the Hill AFB, NCO Preparatory Course at ceremonies held at the NCO club Oct. WASHINGTON (AFIS) A virus is on the loose that threatens to infect computers; it could choke off information vital to the nation's defense. It's not a biological virus that 28. SrA. James A. Gowin was the John Levitow Honor Graduate of Class beating out 25 other graduates for the award. Guest speaker at the ceremony was SSgt. Michael J. Litke, 2849th Civil Engineering Squadron. Distinguished graduates were SrA. John G. Melnick, U.S. Air Force Hospital, Hill; SrA. Daniel R. Cox, Directorate of Distribution; and SrA. William F. Bagby, 2849th MTS. Other Class 88-1graduates 88-1- 5, threatens David W. Larson 2849th Air Dose Group: SrA. Jay E. Fenton and SrA. Tracey M. 2849th CES: SrA. Brian M. Lake and SrA. Darrin J. Mikus. 2849th Security Police Squadron: SrA. Brian T Abelson and Homan. 729th Tactical Control Squadron: SrA. Michael J. Bolstad. kid with a computer could come up with a virus that would wipe out your entire memory. A 10-year-- old 99 James M. Vavrina Information Systems Software Support Center kid with a computer a virus that would with could come up wipe your entire memory," Mr. Vavrina said. "Viruses are not all that hard to build, and they are very easy to "A 10-year-o- ld transmit." Fred Cohen, a computer virus "Hackers (self-style-d computer pirates) have penetrated many networks," Mr. Vavrina said. "The most recent was a penetration at the Jet Propulsion Laboratory (in Pasadena, Calif.). As far as I know, no virus was detected. But it would have been possible." Mr. Vavrina said that information about computer viruses is hard to come by. "Many companies don't want it known that their software has been infected," he said. "Still, information on viruses is growing and as new viruses are discovered, there is a network that gets the information out. "I think we're headed into escalation here," he said. "What one programmer can come up with, another can work around. With many of these people, it becomes a challenge to see if they can defeat a program. There's no easy solution." researcher at the University of Cincinkiller portions of the virus. In others, nati, said that the potential is there for a certain date or the number of times significant infection. "A computer the software is copied will trigger the standing alone is nothing more thanbe-a glorified typewriter," he said. "It lethal properties of the virus. comes effective only when it's tied into "They are virtually undetectable," James M. Vavrina, an automation larger data bases and data banks. This is where the potential for spreading a specialist with the Army's Information Systems Software Support Center virus is greatest." A magazine publisher demonstrated at Fort Belvoir, Va., said. "But some software has been manufactured that this when he sent a harmless virus bearing a message of peace to thouwill detect them." sands of computers around the counlimitvaccines are of These People can only practice "preventive ed use, however. "There are at least 25 try. "Imagine if that hadn't been medicine." Experts agree that people different types of viruses that we benign," Mr. Cohen said. Other experts say that the talk should never use software off a bulleknow of right now," a Department of Defense spokesman said. "If we about the damage computer viruses tin board. Also, people should isbeware checked all of our software through can cause is a case of too much hype. of "freeware" (software that given away by individuals or companies). the use of vaccines, who's to say that "We still don't know to what extent software has we wouldn't have an infection from a we're vulnerable," Univeristy of "Know where yoursaid. Mr. Vavrina 26th virus? It's serious and potential- Southern California Professor Ken been," If people don't, according to Mr. comAdleman said. ly disastrous for anyone using The extent of vulnerability is sug- Vavrina, they might as well just "kiss puters, which, of course, includes gested by the known cases of com their disks and data goodbye." DOD." ber port Squdron: AlC Chad A. of keystrokes will activate the word-of-mou- Communications Squadron: SrA. Dana T. Coutu. 388th Aircraft Generation Squadron: SrA. Ronald J. Domin-que1881st z Jr., SrA. Earnest F. Hauser, SrA. Michael A. Jones, SrA. Stan- ley K. Kotlowski, SrA. John A. SrA. Jason E. Sandeinrich, AlC Franklin E. Milford and AlC John H. Yozamp. Le-por- e, 388th Component Repair Squadron : AlC Cheryl L. Romanauski. 388th Equipment Maintenance Poor-moSquadron: SrA. Donald A. Jr. and SrA. Geoffrey R. n . informa- There are many ways the virus can become lethal. In some, a certain num- SrA. David B. Pinson. 2952nd Combat Logistics Sup- Waldron. d tion; it is a software virus. A virus is a hidden segment of code in a comitputer program that is able to copyand self, "infect" other programs maliciously damages the files of any machine it comes in contact with. Normal software is used to run computers. It becomes infected when the viral segment is introduced into the system and duplicated in the system's software. Viruses can be transmitted in many ways. A computer is vulnerable to a virus when it is hooked into a computer network, when users get software from an electronic bulletin board or when users buy (or receive free) software that is contaminated. 5 were: DS: SrA. computer-store- 66 virus puter viruses. In one case, aDallas-based a of infected the computers company. The virus spread and infected computers at NASA, the Environmental Protection Agency and several congressional offices on Capitol Hill. A worker bringing in some software that he had received through a bulletin board service transmitted the virus. When he used it in his office computer, the virus infected computers networked to his. More sophisticated viruses and purposeful sabotage of Defense Department computers are possible. 338th Tactical Fighter Wing: SrA. Robert L. Ecochardt Jr. so-call- ed th |