INFOCON aids in protecting vital info

  • Published
  • By Master Sgt. Daniel Cartagena
  • 52nd Communications Squadron
Cyberspace is the newest frontier filled with opportunities and challenges, representing the latest domain the U.S. military is entrusted with defending. One of the means we use to standardize defense of cyberspace is through actions that reflect changes in our information operations condition, or INFOCON.

Changes in INFOCON come about when threat levels to cyberspace or a connected system have increased, remained the same or decreased. According to the Internet Storm Center's Web site, "the intent of the 'Infocon' is to reflect changes in malicious traffic and the possibility of disrupted connectivity. In particular importance is the concept of 'change.'"

As significant changes in cyberspace occur, INFOCON measures for communications and computer systems have a basic purpose of protecting resources according to a given threat.

In Air Force culture, we learn "change is constant." In an ever-changing landscape of technological advances and threats, the manner in which we adjust to change aids our ultimate success. If INFOCON levels help conduct business with the appropriate frame of reference and protect vital information and resources, then INFOCON postures aid in achieving our mission objectives.

There are five levels of INFOCON with the higher number representing the lowest threat. In its simplest description, as offered by Wikipedia, INFOCON levels address the following general criteria:

INFOCON 5: There is no apparent hostile activity against computer networks. Operational performance of all information systems is monitored, and at a minimum, password systems are used as a layer of protection.

INFOCON 4: There risk of attack increases. Increased monitoring of network activities is mandated, and all Department of Defense users must ensure their systems are secure. Internet usage may be restricted to government sites, and backing up files to removable media is ideal.

INFOCON 3: Risks are identified. Security review on important systems is a priority, and the computer network defense system's alertness is increased.

INFOCON 2: An attack took place. Non-essential networks may be taken offline, and alternate methods of communication may be implemented.

INFOCON 1: Attacks are taking place and the computer network defense system is at maximum alertness.

"The mission of the United States Air Force is to fly, fight and win...in air, space and cyberspace." As we work together to defend each of these critical domains, being aware and adjusting properly to the INFOCON aids in protecting vital information, resources and national security objectives.