Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo
 

Incoming

Time for Government to Dump its 8-Tracks

February 2011
By Capt. Joseph A. Grace Jr., USN (Ret.), SIGNAL Magazine

In the early 1970s, the music industry was transformed by the arrival of a practical solution to mobile music—the 8-track player. The world embraced this technology, which infected car stereos, home entertainment systems, portable players and lifestyles. While transformational, this technology soon was replaced by the cassette, followed by CDs and audio DVDs until Apple came out with the iPod—another game-changing technology. The market has created many forms of iPod docking stations for cars, clock radios, entertainment systems, airplane seats, pillows and every possible application. Uses include photos, FM radio, podcasts, videoconferencing and Wi-Fi. This technology is significantly smaller, faster, more comprehensive, more capable and inherently more user-friendly than its 8-track progenitor. The same lessons from this progression can be applied to command, control, communications, computers and intelligence (C4I) and government information technology.

Jack of All Trades or Master of None?

January 2011
By Capt. Joseph A. Grace Jr., USN (Ret.), SIGNAL Magazine

Where have all the leaders gone? Gone to better opportunities every one; when will we ever learn, when will we ever learn. Who ever would have thought that the words from the popular protest song of the 1960s could be so relevant to the world of technology and leadership today?

Maneuver in the Global Commons—The Cyber Dimension

December 2010
By Linton Wells II, SIGNAL Magazine

Much has been written about maneuver in various domains of conflict—land, sea and air. As in many other fields, the thinking owes much to the late Col. John Boyd, USAF, who is well known for his concept of the OODA loop (observe, orient, decide, act), and who contributed materially to thinking about maneuver warfare vice attrition warfare.

Improving Alliance Cybersecurity

November 2010
By Linton Wells II, SIGNAL Magazine

Cyberdefense is far from being a challenge just for the United States—there are many international aspects to this issue. In this column last month, I cited the important Foreign Affairs article “Defending a New Domain” by Deputy Secretary of Defense Bill Lynn, which addresses U.S. Defense Department cyberstrategy head on.
Alliance relationships depend on shared trust, especially in networked environments. Lynn’s article notes that, “Some of the United States’ computer defenses are already linked with those of U.S. allies, especially through existing signals intelligence partnerships, but greater levels of cooperation are needed to stay ahead of the cyberthreat. Stronger agreements to facilitate the sharing of information, technology and intelligence must be made with a greater number of allies.”

Cyber Defense Strategy, From Paper to Practice

October 6, 2010
By H. Mosher

This month, Linton Wells II drew his inspiration for Mission Assurance Moves to the Fore in Cyberspace from Deputy Secretary of Defense William J. Lynn III's recently published article, Defending a New Domain: The Pentagon's Cyberstrategy. Wells summarizes Lynn's strategy points, noting that taken on a whole they have a broader implication than just cyberdefense. It has more to do with mission assurance, he says. But he has a number of concerns, among them: how will the new cyberstrategy be implemented? And how can the private sector do a better job of meeting its requirements?

Mission Assurance Moves to the Fore in Cyberspace

October 2010
By Linton Wells II, SIGNAL Magazine

Last month I expressed concern that the growing gap between online functionality and security demanded a rethinking of several key aspects of security—more focus on tagging and tracking data, rethinking resilience and robustness, clearer security policies, and a need to change people’s behavior to reflect more security awareness.

We're Only Human

September 1, 2010
By H. Mosher

No matter how much we think technological solutions will be the panacea for all our information assurance concerns, there's still the human factor to consider, writes Linton Wells II in this month's Incoming column, "Uneasy Sleep in a Golden Age":

In the end, it all comes down to people. When Lou Gerstner was chief executive officer of IBM, he asked how he would know if his organization had a good information assurance program. The answer was: "Walk down the hall. Find a random employee. Ask them three questions: 'Would you know if your computer was being interfered with?' If yes, 'Would you know whom to call to get support?' If yes, 'Would you care enough to call?'" Unless you can answer "yes" to all three of these questions for each of your employees, you can spend all you want on technology and still fail on the people side.

As the gap between functionality and security continues to grow, how can organizations develop security policies that people will understand and follow?

Uneasy Sleep in a Golden Age

September 2010
By Linton Wells II, SIGNAL Magazine

This summer I attended a series of thought-provoking conferences, ranging from business technology to clean energy to cybersecurity and network integration. Collectively, they suggest that we’re living in a “golden age” of technological innovation, but they also highlighted a growing gap between increasingly interactive capabilities and the ability to provide security at several levels, ranging from individual privacy to critical infrastructure protection. The bottom line is that nothing I heard makes me sleep better at night.

Information Sharing in Afghanistan

August 2, 2010
By H. Mosher

Linton Wells II points to UnityNet as an example of how information sharing can support U.S. and coalition strategy in Afghanistan and elsewhere around the globe. He then challenges readers: "Now think of how you can support UnityNet-like approaches."

UnityNet Offers Information Sharing Boon

August 2010
By Linton Wells II, SIGNAL Magazine

Open information sharing in diverse environments is critical. A new initiative in Afghanistan called UnityNet can help bring unclassified information to bear to support U.S. and coalition strategy there and elsewhere around the globe.
UnityNet’s goal is straightforward: networking people together in a unity of effort for a common cause. The key points are people and unity of effort. This is not about technology; it is about changing behavior.

Pages

Subscribe to RSS - Incoming