OCR Text |
Show D Hill AFB, Utah 84056-582-4 www.hilttoptimes.com hilitop.pahill.af.mil Vol. 57 No. 30, July 19, 2001 B Piresodleinril: it riff 1 INSIDE: Service plans Summer Bash Page 2 Why stay In? i3 ffoir dhoeff Joammpeir ttaps WASHINGTON (AFPN) The president announced his nomination of Gen. John R Jumper Monday as chief of staff of the Air Force. Jumper, currently the commander of Air Combat Command at Langley Air Force Base, Va., has been serving in the Air Force since 1966, and has commanded a fighter squadron, two fighter wings and a numbered air force and two major commands. Some of Jumper's previous Pentagon assignments include serving as ueputy chief of staff for air and space operations. He also was the senior military assistant to two secretaries of defense and was a special assistant to the chief of staff for roles and missions. Completing two tours of duty in Southeast Asia, Jumper is a command pilot with more than 4,000 flying hours, principally in fighter aircraft. He has received numerous awards for his military service including the Distinguished Service Medal and the Distinguished Flying Cross with two oak leaf clusters. Jumper earned his undergraduate degree from the Virginia Military Institute in Virginia, and completed Squadron Officer School and Air Command and Staff College at Maxwell Air Force Base, Ala. He received a master's degree in business administration from Golden Gate University in California, and then attended the National War College at Fort McNair in Base i a J. Photo by Staff Sgt. David McCarrlson Gen. John P. Jumper presently commands Air Combat Command at Langley AFB, Va. coinniipiLfltteir security tested daUy with how our networksystems operate so we can spot unusual activity. Unusual activity has to be checked out quickly to see if it's legitimate or if there might be a problem." As tight as security is, hackers still get through. More than a year ago, in the space of a month, two domestic hackers were able to penetrate the system. Both were discovered and one received a visit from the Federal Bureau of Investigations. This year Air Force OSI agents charged old from Dennis Moran, an by Gary Boyle Hilltop Times staff Hill AFB is under attack. A bevy of foreign and domestic operatives are trying to gain entrance to base computer networks daily and carry out acts of sabotage and surveillance. More than 1,000 such attacks on average occur daily, according to John Gilchrist, Hill AFB chief of information assurance, and the problem is not localized to Hill. As the Air Force reliance on computer and information systems grows, so does the possibility for adversaries to exploit and damage these systems, said Special Agent Daniel Fleeger of the Air Force Office of Special Investigations. This year the Air Force is conducting an information assurance awareness campaign that started in January. "Our computer networks ... are a source of national power ... because they're a source of economic and military power. And if they're a key to national power and key to economic and military power, that also makes them targets," said Gen. Ralph Eber-hacommander of U.S Space Command in an address to the Space Symposium last year. "Information threats are different they're global in nature. So if information condition is not being closely watched in one theater, someone can enter through that theater and then a back door, side door, a trap door ... into another or into the United States." Communications flow through 64,000 ports at Hill, Gilchrist said, and a firewall system secures these ports and protects the base. This system treats information b one of two ways: it blocks it or lets it through. Additionally, the system monitors and logs all traffic, whether it is blocked or allowed to pass. This system gives information assurance major control regarding what comes in and goes out of the base while has closing ceremonies Kelly Page 6 Bar code seminar set Page 7 Park graduation Friday Em&ry-Rltidl- e, Page 9 Summer safety Page 10-1- 1 rt Brothers conquer Mount McKlnley Pages 13 (flip 18-ye- ar New Hampshire, for hacking into Patrick "What hackers want is control," AFB, Fla., and gaining "super user-levprivileges." He received a year's confinement and $15,000 fine. His hack was a "Category 1" intrusion, according to Air Force Special Agent Ken Koch. "He could do anything he wanted on the system and even set up a back door so that he could come back and connect again without a password. Essentially he 'owned' the system," Koch said. Internet intruders aren't the only ones who can expect to be prosecuted to the full extent of the law. A disturbing occurrence on Hill is the frequency of some to visit pornographic sites and even download material. Even worse, a few have visited sites that contain child pornography, a federal offense. Gilchrist said. "The most devastating acquisition for Hill and the prize for a hacker would be a domain server that controls network routing. This could potentially close the base network down and, in turn, cause major grief for software development and impact production areas. "If I was a sophisticated agent I'd give myself hooks into every server I could get into, so if something happened I didn't like I could shut the whole base down. That's one of the reasons Inforg mation Assurance is a "We said. Gilchrist to have watch job," for new attacks as well as be familiar site, there are two issues," Gilchrist said. "First, there is the misuse of government resources. When we spot this type of activity, we work with the unit commander or director to get the activity stopped. Second, the individual is obviously not doing their job, which ties back to the first issue. "Once commanders become aware of the problem, it is quickly stopped. We just provide them another tool so they can better do their jobs. However, child pornography is a completely different situation. Since it's a federal See Computer Security, page 4 el providing an audit trail of the activity. This security is tested daily. "Immediately following the plane incident with China, we saw an increase in access attempts from China. Likewise, after bombing Iraq several months ago, we saw increased access attempts from the Middle East," Gilchrist said. "Unauthorized people are trying to gain electronic access to our base, trying to gain control of systems and obtain information. They use a variety of tools and techniques. This is an occurrence, and the Information Assurance office maintains constant vigilance." Not surprisingly, the attempts come from all over the world, including places within the United States. "It's tempting to retaliate, but its not that simple," Gilchrist noted. "The technical challenges of pinpointing the actual attacker as opposed to an unsuspecting person who was used as a conduit are difficult enough. Add that to the fact that Information War E-- 3 on-goi- Recon-naissan- fare is still evolving in concept as well as doctrine, and it's even harder." For the people who protect Hill's computer system, the threat level is always between Alpha and Bravo, according to Gilchrist. It's as if the information system is under constant mortar attack or there are angry mobs at the gates, but defenses keep the hordes at bay. well-bui- lt never-endin- Riders required to Missile Intercept successful Page 15 wear safety helmets by Tech Sgt. Mark Borgerdlng Police Services All bicyclists, in-li- skaters, scooter riders, motorized scooter riders and skateboarders riding on base are now required to wear a bicycle helmet. The changes went into effect with the publication of Hill AFB Supplement to Air Force Instruction Helmets must be approved by the American National Standards Institute, Snell Memorial Foundation. The use of elbow pads, knee pads and wrist guards are optional, but are recommended. Bicycle, scooter, motorized scooter : or skateboard riders are required to 1 ride on the far right side of the road Photo by Gary Boyle when and, turning left, stay to the far day in the shade as they ride right of the turning lane. 31-20- 4. vC I - Pioneer Day July 24 "When a person goes to a pornographic I VrJSSivcr II All Wilson, left, and Kaltlyn Dunn bikes In the base housing area. " V4,,V prepare to pedal away a - After completing the turn, bicyclists will comply with stop signs, stoplights and other official traffic control devices or Security Forces personnel regu- lating traffic. They are subject to inspection for safety issues by Security Forces, and bicycles not complying won't be used on base. When riding on base, all bicycles, scooters and motorized scooters are required to have an operational front lamp and red rear reflector when riding 30 minutes before sunset, 30 minutes after sunrise, and when ground visibility is less than 1,000 feet. The headlamp and rear reflector must be visible from a distance of 500 feet. The Security Forces police services section has more information on safe riding practices or bicycle for details. registration. Call Ext |