MCRD/ERR PARRIS ISLAND, S.C. -- This is the message representatives from the Computer and Information Systems Division want made "perfectly clear" to Depot personnel regarding the misuse of government computers.
Depot Marines and civilian personnel use government computers everyday. However, whether they realize it or not, many may be using their Information Technology Equipment for unauthorized purposes that are in violation of Depot Order P5230-4B and Marine Administrative Message 162/00.
Even something as seemingly harmless as forwarding a chain e-mail or joke to others is in violation of the order, making it easy for anyone to be at fault.
"It happens throughout the Marine Corps," said Capt. Joseph Teasley, director of CISD. "In some cases, it's commissioned officers and, in some cases, staff NCOs. You have a wide range."
According to the order, "Information resources shall be used for authorized purposes only. Specific prohibitions include passing chain letters or hoax e-mail or pornographic or racist material; placing malicious code on a system; using resources for personal or commercial financial gain; and accessing, viewing or downloading information or graphics from adult entertainment sites."
"If something is work related, it's not a problem," said Teasley. "If we're talking about 'pass this on because this is a great e-mail,' then yes, that is a violation of MARADMIN 162/00."
"We have password misuse, like sharing passwords and allowing another person access to your account," added Zadie Reeves, Depot Information Assurance manager for CISD. "It's also adding unapproved software. The only software we're supposed to have on the network computers is software that has been approved and purchased by the Marine Corps."
The CISD, which monitors government computer use aboard the Depot, has the capability to track personnel using their computers for unauthorized purposes - down to the second where they click, according to Teasley.
"We have the ability to monitor you live on the computer," he said. "Everything you do on a government computer is subject to be monitored. However, in order for us to do that, we have to have inception in scope, which is like probable cause."
If they suspect anyone of using their computer for unauthorized purposes, they lock that person's account, per standard operating procedures, and view their proxy log to determine if they are, in fact, "doing something wrong," said Teasley.
Anyone found guilty of violating the Depot Order may be subject to punitive action, said Teasley.
"I'm the guy who catches the fish, I'm not the guy who fries the fish," he said. "CISD simply identifies misuse and reports any misuse to the Inspector General's office."
The order was implemented to prevent computer viruses, worms or Trojan Horses from making their way into the network, said Teasley.
"We constantly have to put virus updates on all our government systems to catch them in these sort of things," he said. "You have to catch them as they come."
The order was also put in place to maintain Information Security, so as to ensure no outside "hackers" get a hold of sensitive or classified information, Teasley added.
"You have to have a way to secure that information, to prevent hackers from seeing that information and using it for their own use or misuse. Take social security numbers, for instance. A hacker could take social security numbers and go get credit cards in his name."
Aside from a possible breach in security aboard the Depot, too many users simultaneously sending or receiving large files potentially degrade network performance and deny access to other official users, said Reeves.
Government Information Technology resources may, however, be used to access the Internet to obtain information conducive to the Department of Defense, Department of the Navy and Marine Corps missions, obtain information that enhances the professional skills of Marine Corps personnel, and improve the professional or personal skills as part of a formal academic education or military/civilian personnel development program, if approved by the command.
Anyone who suspects the misuse of a government computer should notify Information Assurance at 228-3495.
As for that funny joke or chain e-mail sent by a co-worker - "delete it."