Skip Navigation
Office of Auxiliary CG-BSX-1

The Director of the Auxiliary is the direct representative of the Commandant of the United States Coast Guard to the United States Coast Guard Auxiliary. (Title 14, USC Chapt. 23)


The United States Coast Guard Auxiliary is the uniformed volunteer component of Team Coast Guard. Founded in 1939 by an Act of Congress as the US Coast Guard Reserves and re-designated the Auxiliary in 1941. The 30,000+ volunteer members (men and women) donate millions of hours in support of Coast Guard missions.

Items of Interest


  OPM Cybersecurity Incident - UPDATE

OFFICE OF PERSONNEL MANAGEMENT (OPM) CYBERSECURITY INCIDENT - UPDATE

1. Auxiliarists are strongly encouraged to thoroughly review the following message. It was received on June 23, 2015 from the Department of Homeland Security Management Communications network, and it provides updates to information provided in ALAUX 011/15 issued on June 5, 2015 and ALAUX 013/15 issued on June 13, 2015. It indicates that notifications to affected individuals began June 8 and may take several days beyond June 19 to arrive by email or mail.

"This is an update on the recent cyber incidents at the U.S. Office of Personnel Management (OPM).

As the Department has recently shared, on June 4, OPM announced an intrusion impacting personnel information of approximately four million current and former Federal employees. OPM is offering affected individuals credit monitoring services and identity theft insurance with CSID, a company that specializes in identity theft protection and fraud resolution. Additional information is available on the company's website, https://www.csid.com/opm/ and by calling toll-free 844-777-2743 (international callers: call collect 512-327-0705). More information can also be found on OPM's website: www.opm.gov.

Notifications to individuals affected by this incident began on June 8 on a rolling basis through June 19. However, it may take several days beyond June 19 for a notification to arrive by email or mail. If you have any questions about whether you were among those affected by the incident announced on June 4, you may call the toll free number above.

On June 12, OPM announced a separate cyber intrusion affecting systems that contain information related to background investigations of current, former, and prospective Federal Government employees from across all branches of government, as well as other individuals for whom a Federal background investigation was conducted, including contractors. This incident remains under investigation by OPM, DHS, and the FBI. The investigators are working to determine the exact number and list of potentially affected individuals. We understand that many of you are concerned about this intrusion. As this is an ongoing investigation, please know that OPM is working to notify potentially affected individuals as soon as possible.

As an important reminder, OPM discovered this incident as a result of the agency's concerted and aggressive efforts to strengthen its cybersecurity capabilities and protect the security and integrity of the information entrusted to the agency. In addition, OPM continues to work with the Office of Management and Budget (OMB), DHS, the FBI, and other elements of the Federal Government to enhance the security of its systems and to detect and thwart evolving and persistent cyber threats. As a result of the work by the interagency incident response team, we have confidence in the integrity of the OPM systems and continue to use them in the performance of OPM's mission. OPM continues to process background investigations and carry out other functions on its networks.

Additionally, OMB has instructed Federal agencies to immediately take a number of steps to further protect Federal information and assets and improve the resilience of Federal networks. We are working with OMB to ensure we are enforcing the latest standards and tools to protect the security and interests of the DHS workforce.

The Department will continue to update you as more information about the cyber incidents at OPM comes to light. For all updates, including previous messages and important resources, please visit the OPM Cybersecurity Incident Updates <http://dhsconnect.dhs.gov/org/comp/mgmt/Pages/OPM-Cybersecurity-Incident-Updates.aspx> page on Connect.

OPM is the definitive source for information on the recent cyber incidents. Please visit OPM's website for regular updates on both incidents and for answers to frequently asked questions: www.opm.gov/cybersecurity <http://www.opm.gov/news/latest-news/announcements/> . DHS is also interested in your feedback and questions on the incident and our communications. You can reach out to us at privacyhelp@dhs.gov with these comments.

Employees who want to learn additional information about the measures they can take to ensure the safety of their personal information can find resources at the National Counterintelligence and Security Center (NCSC) at http://www.ncsc.gov <http://www.ncsc.gov/about/docs/Dealing_with_a_Breach_of_your_PII.pdf> .

Please note that the OPM notification is different from other notifications you may have already received. The Department is also in the process of notifying some DHS employees in CBP, ICE, TSA, and in a small number of other components that one of the companies that DHS contracts with to conduct background investigations and credit checks may have experienced a compromise of its network. That notification, which was made via U.S. Postal Service, is separate from the OPM notification. It is possible that some employees are affected by both the DHS and OPM incidents."
Posted by Webmaster at 7:19:18 AM on 26 Jun 2015

  LAUNCH OF THE ENTERPRISE COMMON IDEATION PLATFORM

R 181130Z JUN 15
FM COMDT COGARD WASHINGTON DC//CG-092//
TO ALCOAST
BT
UNCLAS //N05224//
ALCOAST 249/15
COMDTNOTE 5224
SUBJ: LAUNCH OF THE ENTERPRISE COMMON IDEATION PLATFORM (ECIP)

1. The Coast Guard Innovation Program is excited to share the launch of the Enterprise Common Ideation Platform, ECIP Connect. ECIP Connect is a tool that is being prototyped to replace the legacy Innovation database. Rather than a passive tool that only receives information, ECIP Connect is a new crowd-sourcing tool designed to invite any Coast Guard member (active duty, civilian, reservist, Auxiliarist) to participate in Service "challenges" from anywhere, at any time, on any device.

2. ECIP Connect is designed to promote and strengthen the Services commitment to foster a culture of continuous innovation and learning. The intent is to demonstrate the value of a proven crowd-sourcing platform that supports innovation through real-time information sharing and engages the workforce to help solve the Services strategically targeted challenges.

3. ECIP Connect provides a positive and empowering experience where participants can voluntarily review challenges, submit possible solutions, and collaborate with other members of the workforce by voting, supporting, and influencing the best ideas as they are offered, advance toward possible prototypes, and potentially becoming implementable solutions.

4. The prototype period for ECIP Connect will run from now until 19SEP15. This period will be used to conduct research and influence the Innovation Program redesign. Participation from all Coast Guard members is highly encouraged as we collectively shape the future of the Innovation Program. Participation is voluntary.

5. If you would like to participate in this prototype and join the growing community of Coast Guard innovators, please visit http://ecipconnect.ideascale.com to register and learn more on how you can advance solutions forward. Note: "www" is not required in the website address.

6. For additional questions related to ECIP Connect or the Coast Guard Innovation Program, please contact Innovation Program Manager, LCDR Thomas (Andy) Howell, 202-372-4587, Thomas.A.Howell(at)uscg.mil, or innovation(at)uscg.mil.

7. Ellen Engleman Conners, Director of Governmental and Public Affairs, sends.

8. Internet release authorized.
BT
Posted by Webmaster at 8:48:57 AM on 20 Jun 2015

  OPM CYBERSECURITY INCIDENT - UPDATE

OFFICE OF PERSONNEL MANAGEMENT (OPM) CYBERSECURITY INCIDENT - UPDATE

1. The following message was recently received from the Department of Homeland Security Management Communications network. It provides an update to information first provided in ALAUX 011/15 issued on June 5, 2015. Notifications to affected individuals began June 8 and will continue thru June 19. Auxiliarists are strongly encouraged to thoroughly review this following message:

"As was communicated on June 4, 2015, the U.S. Office of Personnel Management (OPM) recently became aware of a cybersecurity incident affecting its systems and data that may have exposed the Personally Identifiable Information (PII) of some current and former federal employees. This email provides additional information regarding next steps for DHS employees.

Beginning June 8 and continuing through June 19, OPM will be sending notifications to individuals whose PII was potentially compromised in this incident. OPM has retained a private vendor, CSID, to transmit the notifications on behalf of OPM. Consequently, the email will come from opmcio@csid.com and will not come from a .gov email address. The notification will feature a CSID logo and will contain information regarding credit monitoring and identity theft protection services being provided to those federal employees impacted by the data breach. In the event OPM does not have an email address for the individual on file, a standard letter will be sent via the U.S. Postal Service.

This notification is different from other notifications you may have already received. The Department is also in the process of notifying some DHS employees in CBP, ICE, TSA, and in a small number of other components that one of the companies that DHS contracts with to conduct background investigations and credit checks may have had a compromise of its network. That notification, which was made via U.S. Postal Service, is separate from this OPM notification.

As a note of caution, confirm that the email you receive is, in fact, the official notification. It’s possible that malicious groups may leverage this event to launch phishing attacks. To protect yourself, we encourage you to do the following:

1. Make sure the sender email address is "opmcio@csid.com."

2. The email should not contain any attachments. If it does, do not open them, and forward the email to dhsspam@hq.dhs.gov.

3. The email is sent exclusively to your email address. No other individuals should be in the TO, CC, or BCC fields.

4. The email subject should be exactly "Important Message from the U.S. Office of Personnel Management CIO."

5. The email will feature an embedded "Enroll Now" button. Do not click on the included link. Instead, record the provided PIN code, open a web browser then manually type the URL - http://www.csid.com/opm - into the address bar and press enter. You can then use the provided instructions to enroll using the OPM/CSID website.

6. The email should not contain any attachments. However, once you visit the OPM/CSID website (http://www.csid.com/opm) to enter your PIN code, you will be asked to provide personal information to verify your identity.

7. The official email should look like this sample screenshot .

8. If you would prefer not to enter your personal information on the OPM/CSID website (http://www.csid.com/opm), you may call the CSID call center toll-free at 844-777-2743 or 844-222-2743. (International callers: call collect 512-327-0705).

9. OPM will not proactively call you about the breach. If you receive a phone call about the breach claiming to be OPM, then it iot provide any personal information. CSID, not OPM, is making all notifications about this breach, and the notifications are by email or through the U.S. Postal Service.

Additional information is also available on CSID’s website, http://www.csid.com/opm (external link), or you can call them toll-free at 1-844-777-2743 (International callers: call collect at 1-512-327-0705).

Regardless of whether or not you receive this notification, you should take extra care to ensure that they are following recommended cyber and personal security procedures. If you suspect that you have received a phishing attack, contact your component’s security office .

In general, government employees are often frequent targets of “phishing” attacks, which are surreptitious approaches to stealing your identity, accessing official computer systems, running up bills in your name, or even committing crimes using your identity. Phishing schemes use email or websites to trick you into disclosing personal and sensitive information.

We will continue to keep you advised of new developments regarding this cybersecurity incident as we learn more from OPM. The following includes helpful information for monitoring your identity and financial information and precautions to help you avoid being a victim.

Steps for Monitoring Your Identity and Financial Information:

* Monitor financial account statements and immediately report any suspicious or unusual activity to financial institutions.
* Request a free credit report at www.AnnualCreditReport.com or by calling 1-877-322-8228. Consumers are entitled by law to one free credit report per year from each of the three major credit bureaus – Equifax®, Experian®, and TransUnion® – for a total of three reports every year. You can find contact information for the credit bureaus on the Federal Trade Commission (FTC) website, www.ftc.gov.
* Review resources provided on the FTC identity theft webitytheft.gov. The FTC maintains a variety of consumer publications providing comprehensive information on computer intrusions and identity theft.
* You may place a fraud alert on your credit file to let creditors know to contact you before opening a new account in your name. Simply call TransUnion® at 1-800-680-7289 to place this alert. TransUnion® will then notify the other two credit bureaus on your behalf.

Precautions to Help You Avoid Becoming a Victim:

  • Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about you, your employees, your colleagues or any other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.

  • Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person’s authority to have the information.

  • Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.

  • Do not send sensitive information over the Internet before checking a website’s security (for more information, see Protecting Your Privacy, http://www.us-cert.gov/ncas/tips/ST04-013).

  • Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net).

  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from groups such as the Anti-Phishing Working Group (http://www.antiphishing.org).

  • You should take steps to monitor your personable information and report any suspected instances of identity theft to the FBI’s Internet Crime Complaint Center at www.ic3.gov.

  • Additional information about preventative steps by consulting the Federal Trade Commission’s website, www.consumer.gov/idtheft. The FTC also encourages those who discover that their information has been misused to file a complaint with the commission using the contact information below.

    Identity Theft Clearinghouse
    Federal Trade Commission
    600 Pennsylvania Avenue, NW
    Washington, D.C. 20580
    https://www.identitytheft.gov/
    1-877-IDTHEFT (438-4338)
    TDD: 1-202-326-2502"

    Posted by Webmaster at 8:46:46 AM on 13 Jun 2015

      TEMPORARY SUSPENSION OF UDC Istore

    1. The Coast Guard Uniform Distribution Center's (UDC) iStore, the online uniform ordering portal (http://udcistore.net and www.udcistore.net), is temporarily suspended for maintenance.

    2. Uniform item ordering may still be conducted via phone at 1-(800)-874-6841, via fax at 1-(609)-861-7930, or by walk-in service at the UDC facility in Woodbine, NJ. These services are available Monday thru Friday, 0800-1500. Service is also available at the Cape May facility on Thursdays, 0800-1500. Please refer to the following web site for more information: http://www.uscg.mil/uniform/Ordering.asp .

    3. The Uniform Clothing Locker at the Coast Guard Academy as well as Coast Guard Exchanges throughout the country also stand by to assist Auxiliarists in obtaining uniform items in a timely manner.

    4. Estimated time of service restoration is not available. Notification will be issued when the iStore is back online.
    Posted by Webmaster at 9:27:13 AM on 12 Jun 2015

            Next Page >>
    Download Plug-Ins
  • Download Plug-Ins: Some of the links on this page require a plug-in to view them. Links to the plug-ins are available below.
    Click Here to Download Adobe Acrobat Reader Adobe Acrobat Reader (PDF)
    Last Modified 6/3/2014