A fast-moving squad of government and industry computer security experts is preparing to swing into action. This computer-security-expert assist team is structured to support federal government agencies by providing ways to protect information technology systems and networks. The team's core will be industry members who are proficient in identifying and alleviating complex information system and infrastructure vulnerabilities.
Arms sales in Southeast Asia are returning to levels that existed prior to the region's 1997 financial crash. Procurement plans that had been frozen because of the economic turmoil have been reactivated as area nations seek to acquire items such as military aircraft, communications systems and warships. Although these purchases reflect steady improvement in a number of national economies, some countries remain gripped by fiscal and political crises.
Almost 50 years after the end of the Korean War, Korea remains one of the world's flash points-a place where the flames of the Cold War have yet to be fully extinguished. Although progress has been made during the recent North-South summit in Korea, North Korea still maintains one of the largest forward-deployed armies in the world. Its offensive posture, coupled with its recent development of ballistic missiles, lethal special operations forces and weapons of mass destruction, causes the Korean peninsula to be very volatile.
While various Internet consumer privacy protection bills steadily make their way through U.S. congressional committees, businesses are taking a stab at self-governance. The work is based on the premise that commercial relationships demand trust, and the best way to gain customers' trust is to assure consumers that the information they provide, both automatically and intentionally, will not be shared without their permission. However, unless Web site visitors read published privacy policies, they may not be aware of how much of their personal data can be shared or sold.
The decision to assume the helm of AFCEA International was one I made very easily. This is a prestigious organization with an honorable mission and an exciting future, both of which would present anyone with a strong sense of opportunity.
The war on terrorism and heightened homeland security are prompting the U.S. military to re-evaluate its priorities and accelerate the use of strategic concepts that only months ago were in the experimental stage. Although some of the tactical approaches are not in the polished form they would have been in several years from now, certain aspects can and are making their way into today's efforts.
Defensive information warfare posturing traditionally has taken the form of security-passwords, firewalls and locked doors. But with less than 100 percent confidence that intruders can be kept out of information systems, a U.S. Air Force and industry team is developing a fundamentally different defensive approach. They are creating a prototype that provides advanced warning of attacks on U.S. Defense Department systems so they are prepared when security is breached.
The United States has been using simulations for decades to explore the capabilities of its military forces and train soldiers to perform their missions better. In the war against terrorism, however, this technology can come out of the training centers and into the operations centers to support the country and its allies in fighting this new type of war and enhance homeland security.
Despite a delayed launch, the first year of the maiden voyage of a different approach to military acquisition of information technology products and services has been mostly smooth sailing. The Navy/Marine Corps Intranet is well underway, and key leaders from both industry and the U.S. Defense Department say they are pleased with the progress that has been made so far.
The U.S. Navy is shoring up its information systems capabilities with the creation of a new restricted line designation for its officers. The information professional community will concentrate on space systems, information technology, network operations and protection, and enhanced fighting techniques. This new group joins the ranks of two long-established specialties in intelligence and cryptography.