Éditoriaux Défense Sécurité Terrorisme Zones de conflits Logistique Livres de référence Liens
Terre Air Mer Gendarmerie Renseignement Infoguerre Cyber Recherche

Computer Crime Investigators Engage in War on Cyber Threats

By Special Agent Matthew Johnson, Air Force Office of Special Investigations.

04/18/01 - Andrews Air Force Base, Maryland -- April 18, 2001 (AFPN) -- The Air Force Office of Special Investigations fields a team of 48 specially trained agents to ward off hackers, thwart computer criminals, and detect cyber terrorists.

They are called computer crime investigators, or CCIs, and escalating threats from the cyber world keep them on their toes. Probes and scans of Air Force computers from foreign locations alone number in the millions per year.

The need for vigilance against such threats is clearly demonstrated by the damage caused to the Air Force by last year's "I Love You" computer virus:

  • Number of users executing the virus: 7,418
  • Number of servers offline: 1,065
  • Average downtime: 32 hours
  • Total cost: $3,174,427

Imagine such a crippling attack -- or several at one time -- during wartime operations, and it is easy to understand why information assurance awareness is so critical to the Air Force.

It is also easy to understand why so many adversaries choose to operate in cyberspace: Their attacks are harder to identify, they benefit from the rapidity of information flow, they can inflict great damage without great expenditure, and cyberspace provides a virtual sanctuary from identification.

And that is why CCIs have become increasingly important. CCIs provide rapid response to intrusions into Air Force information systems and networks worldwide. These officer, enlisted, and civilian agents are dispersed to seven primary locations around the world, supporting OSI field units and Air Force commanders in their respective areas of responsibility.

CCIs provide threat information, analysis, operations and intelligence support by engaging investigations and information assurance issues with military and civilian Computer Emergency Response Teams, other military and federal law enforcement entities, and intelligence agencies.

Besides providing response to high-profile viruses, a CCI's primary caseload revolves around traditional computer intrusion investigations. In 2000, CCIs opened 26 substantive computer intrusion investigations. Half of these investigations originated in foreign locations.

Intrusions that originate from the United States are divided into two categories: traditional intrusions and intrusions from "insiders."

Insiders are Air Force members, employees or contractors with access to Air Force information or systems who exceed their authorized access. Because of their regular access to information systems, insiders present the greatest potential for causing harm.

While CCIs are critical to the war on cyber threats, they cannot do it alone. They depend on every Air Force member complying with sound computer practices. Do not open e-mail attachments from unreliable sources. Do not load unauthorized software onto your computer. Do not send information to anonymous e-mail requesters. Do not attempt to venture outside of your authorized level of access. But do report these things if you become aware of them.

If you see a violation or exploitation of an Air Force resource or information system, immediately notify your assigned security officer or local OSI detachment. You may just foil the attempt of an adversary who seeks to harm our information systems.

RELATED LINKS

- Air Force Office of Special Investigations

 

 

Derniers articles

Verdun 2016 : La légende de la « tranchée des baïonnettes »
Eyes in the Dark: Navy Dive Helmet Display Emerges as Game-Changer
OIR Official: Captured Info Describes ISIL Operations in Manbij
Cyber, Space, Middle East Join Nuclear Triad Topics at Deterrence Meeting
Carter Opens Second DoD Innovation Hub in Boston
Triomphe de St-Cyr : le Vietnam sur les rangs
Dwight D. Eisenhower Conducts First OIR Missions from Arabian Gulf
L’amiral Prazuck prend la manœuvre de la Marine
Airmen Practice Rescuing Downed Pilots in Pacific Thunder 16-2
On ne lutte pas contre les moustiques avec une Kalachnikov...
Enemy Mine: Underwater Drones Hunt Buried Targets, Save Lives
Daesh Publications Are Translated Into Eleven Languages
Opération Chammal : 10 000 heures de vol en opération pour les Mirage 2000 basés en Jordanie
Le Drian : Daech : une réponse à plusieurs niveaux
Carter: Defense Ministers Agree on Next Steps in Counter-ISIL Fight
Carter Convenes Counter-ISIL Coalition Meeting at Andrews
Carter Welcomes France’s Increased Counter-ISIL Support
100-Plus Aircraft Fly in for Exercise Red Flag 16-3
Growlers Soar With B-1s Around Ellsworth AFB
A-10s Deploy to Slovakia for Cross-Border Training
We Don’t Fight Against Mosquitoes With a Kalashnikov
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks
Vice Adm. Tighe Takes Charge of Information Warfare, Naval Intelligence
Truman Strike Group Completes Eight-Month Deployment
KC-46 Completes Milestone by Refueling Fighter Jet, Cargo Plane
Air Dominance and the Critical Role of Fifth Generation Fighters
Une nation est une âme
The Challenges of Ungoverned Spaces
Carter Salutes Iraqi Forces, Announces 560 U.S. Troops to Deploy to Iraq
Obama: U.S. Commitment to European Security is Unwavering in Pivotal Time for NATO
International Court to Decide Sovereignty Issue in South China Sea
La SPA 75 est centenaire !
U.S. to Deploy THAAD Missile Battery to South Korea
Maintien en condition des matériels : reprendre l’initiative
La veste « léopard », premier uniforme militaire de camouflage
Océan Indien 2016 : Opérations & Coopération
Truman Transits Strait of Gibraltar
Navy Unveils National Museum of the American Sailor
New Navy, Old Tar
Marcel Dassault parrain de la nouvelle promotion d’officiers de l’École de l’Air
RIMPAC 2016 : Ravitaillement à la mer pour le Prairial avant l’arrivée à Hawaii
Bataille de la Somme, l’oubliée
U.S., Iceland Sign Security Cooperation Agreement
Cléopatra : la frégate Jean Bart entre dans l’histoire du BPC Gamal Abdel Nasser
Surveiller l’espace maritime français aussi par satellite
America's Navy-Marine Corps Team Fuse for RIMPAC 2016
Stratégie France : Plaidoyer pour une véritable coopération franco-allemande
La lumière du Droit rayonne au bout du chemin





Directeur de la publication : Joël-François Dumont
Comité de rédaction : Jacques de Lestapis, Hugues Dumont, François de Vries (Bruxelles), Hans-Ulrich Helfer (Suisse), Michael Hellerforth (Allemagne).
Comité militaire : VAE Guy Labouérie (†), GAA François Mermet (2S), CF Patrice Théry (Asie).

Contact