Presidents Commentary

October 1, 2012
by Kent R. Schneider

 

Since the U.S. General Services Administration scandal over a training conference in Las Vegas, reinforced by concerns regarding two expensive Department of Veterans Affairs conferences, fear has spread across government and industry that government-related conferences are now a thing of the past. This is just not the case—nor should it be.

If government leaders make bad decisions with respect to conferences—or other areas within their job scope—they should be held accountable. Controls should be in place to minimize future abuses. Organizations that support government in conferences that recommend or support such abuses similarly should be penalized.

September 1, 2012
by Kent R. Schneider

Security has become all the more important at the user level. Verifying the validity of an individual’s access to a network is vital to preventing cybermarauders from getting into a system to purloin or sabotage important information. Biometrics can play a key role in identity management, particularly in cross-enterprise implementations.

August 2012
By Kent R. Schneider, SIGNAL Magazine

 
As I write this, we are experiencing some nearly unprecedented oppressive weather in the Washington area. About one week ago, we had a series of violent thunderstorms that caused extensive damage and knocked out power to more than 1.5 million electrical customers—comprising millions of people—in Washington, D.C., Maryland and Virginia. Many communications systems also failed, either because of damaged infrastructure or loss of power.

July 2012
By Kent R. Schneider, SIGNAL Magazine

 
No, I did not misspell the title of this commentary. When I wrote these words, I was sitting in Sofia, Bulgaria, on a visit to a number of AFCEA’s Eastern European chapters. Earlier that same week, AFCEA Europe, in conjunction with the Czech Chapter, conducted a conference—TechNet Europe—on cybersecurity.

June 2012
By Kent R. Schneider, SIGNAL Magazine

 
At the Defense Information Systems Agency (DISA) Mission Partner Conference in Tampa, Florida, last month, the discussion focused on the enterprise and jointness and coalition. If it did not cause attendees to have an epiphany, it certainly should have triggered a re-awareness.

May 2012
By Kent R. Schneider, SIGNAL Magazine

 
The command, control, communications and computers (C4) technology community has undergone a great deal of change over the past couple of years. The U.S.

April 2012
By Kent R. Schneider, SIGNAL Magazine

 
I joined the U.S. Army in 1968. Having been trained as a Signal officer, I went to the field in the early 1970s with maps in hand, and I used acetate and grease pencils to prepare overlays for troop movements, command post and signal site locations, and the ever-important radio line-of-sight calculations. One of the greatest technology developments of the time was the marking pen—we got rid of grease pencils and we had color!

March 2012
By Kent R. Schneider, SIGNAL Magazine

 
Cyber threats draw much of the focus in today’s information technology realm. The threat profile in cyberspace is growing and becoming more complex, more sophisticated and more diverse.

February 2012
By Kent R. Schneider, SIGNAL Magazine

 
I frequently characterize our membership, or constituency, as the global security community. I define this as defense + intelligence + homeland security. I don’t think anyone would argue with my notion that we live in a dangerous world and that, no matter where you live, there are significant threats to national and regional security.

January 2012
By Kent R. Schneider, SIGNAL Magazine

 
Happy New Year 2012!

December 2011
By Kent R. Schneider, SIGNAL Magazine

 
The concept and practice of cyber operations are topics of considerable discussion. I thought about what I could add to this dialogue, and I came down on the side of making one more case for a comprehensive, holistic view of cyber.

November 2011
By Kent R. Schneider, SIGNAL Magazine

 
Government information technology is an area rife with issues for discussion. These include enterprise initiatives, mobile computing, the cloud in all its forms, cybersecurity and many more. However, one activity is the key to making all government information technology useful and secure: the common operating environment.

October 2011
By Kent R. Schneider, SIGNAL Magazine

September 2011
By Kent R. Schneider, SIGNAL Magazine

 
The North Atlantic Treaty Organization (NATO) is putting the finishing touches on planning and is beginning the transition to the most profound restructuring in its history. Wherever they are based, all who work with NATO will be affected by this restructuring. NATO headquarters staff is being reduced by as much as 40 percent. NATO agencies are being reduced from 13 to three.

August 2011
By Kent R. Schneider, SIGNAL Magazine

Your association continues to move forward in what is proving to be an exciting and dynamic era, and these efforts include personnel changes. In an important step, AFCEA has just added two new members to the executive team who are going to benefit all of you.

July 2011
By Kent R. Schneider, SIGNAL Magazine

The world may be on the cusp of Web 3.0. Some of us digital immigrants still are trying to get our arms around Web 2.0. We have been told that Web 2.0 is all about information sharing. Applications, storage and data are Web-enabled. Virtualization has made information easier to use and share. Social networking has created whole new environments for information sharing.

June 2011
By Kent R. Schneider, SIGNAL Magazine

The global security community has never had a greater need for training and education—or needed more help.

May 2011
By Kent R. Schneider, SIGNAL Magazine

Throughout history, armed forces have faced the challenge of working together effectively. In the United States, the Defense Department has been working to make joint operations more effective since the origins of its armed forces, but the government institutionalized joint requirements in 1986 with the introduction of the Goldwater-Nichols Act. In Europe, NATO was created in the wake of World War II, built on the premise that the member nations were stronger together than individually and that an integrated joint approach was necessary.

April 2011
By Kent R. Schneider, SIGNAL Magazine

The U.S. Coast Guard plays a vital role helping tie together pieces of the national security community. The Coast Guard is unique in that, while it is a military service, organizationally it sits within the U.S. Department of Homeland Security and clearly has homeland security/counterterrorism, public safety and law enforcement roles. This positioning within several national security communities allows the Coast Guard to provide an invaluable coordination and linking function.

March 2011
By Kent R. Schneider, SIGNAL Magazine

As you know, AFCEA’s primary mission is to promote effective and ethical communication among government, industry and academia. We help inform government on the capabilities that exist in industry to meet its needs, and we help inform industry of government requirements so it can plan investments in research and development and product and service advancement. Recently, we have received several requests to help government obtain visibility of capabilities in industry and academia, large and small, within specific priority areas of interest.

Pages