Ask the Expert

July 1, 2014
By Adam Clayton Powell III

Q: Why is it important for government and industry to advance K-12 STEM education innovations in the United States 
today, and what can they do to improve that education?

A: Industry and government support is crucial to help the United States become a leader in K-12 STEM education—and they can leverage a key tool that is already in hand.

June 1, 2014
By William M. Nolte

Q: What are the next steps for intelligence after the post-9/11 era?

A: The next steps should be a radical shift in how resources are allocated, not business
as usual on tighter budgets.

May 1, 2014
By Staci Redmon

Question: Are contract consolidation, contract bundling
 and the Federal Strategic Sourcing Initiative good for the government but bad for small businesses?

Answer: Consolidating and bundling contracts may result in unintended bad consequences for small businesses. The extent of these consequences
is immeasurable due to government
information systems’ reported data limitations.
 

April 1, 2014
By M. Thomas Davis

Over the past decade, I have participated nearly each year in the Association of the U.S. Army Industry Day at the United States Army War College. In the afternoon, an industry representative spends about three hours in each student seminar of about 20 officers. I have always participated in this seminar portion. One item that has emerged over the years in these meetings is that many who spend their professional careers in the public sector have an uncomfortable sentiment about the concept of profit.

March 1, 2014
By Al Mink

It’s impossible these days to attend a U.S. Defense Department information technology presentation without repeated mentions of the Joint Information Environment (JIE). But industry representatives often ask, “What does JIE mean to me?” I did some digging into the environment—leveraging the expertise of the AFCEA Technology Committee, discussions with several senior defense information technology leaders and insights from colleagues at my firm who participated in JIE Increment 1 in Europe.

February 1, 2014
By Col. Herbert Kemp, USAF (RET.)

As the national security establishment emerges from more than a decade of counterinsurgency warfare in Iraq and Afghanistan and refocuses on other global priorities, the means by which intelligence, surveillance and reconnaissance (ISR) supports those priorities must change as well. ISR operations in Iraq and Afghanistan have been conducted in relatively permissive air environments that have allowed the use of long-dwell airborne platforms to provide sustained surveillance of targets of interest. This has led to an imagery-, and more specifically, full motion video (FMV)-intensive pattern of collection. While these conditions may be present in some future conflicts, they do not describe many of the scenarios envisioned for potential contested environments in the future.

January 1, 2014
By Nicole Woodroffe

Few people go more than a few days without updating their Facebook status, “checking-in” at some location on their social media application or tweeting their opinions on Twitter. Service members are no exception. However, they must take extra precautions to avoid the legal pitfalls of compromising operational security or making inappropriate remarks when posting anything on public websites.

December 1, 2013
By Rear Adm. James Greene, USN (Ret.)

When stripped to the bare essentials, the process followed in most defense acquisitions is quite simple. A requirement is generated, an acquisition strategy developed and a contract let, before the item is produced, deployed, sustained and, eventually, disposed of. Typically, efforts at acquisition reform have dealt with the predeployment phases and consist mostly of renaming the phases by changing milestones from ABC to 123 and back to ABC, by sliding milestone events left or right and by adding oversight reviews.

November 1, 2013
By Kenneth P. Rapuano

The recent emphasis on “resilience”—the homeland security equivalent of mission assurance—is overdue and much needed. However, it involves fundamental challenges with which we are still grappling in our efforts to achieve a more resilient nation.

October 1, 2013
By Dr. Ernest McDuffie

This is an important question for a number of reasons. Popular media often talk about the growing shortage of skilled cybersecurity workers needed to fill critical open positions both in government and the private sector. This is true, but employers need specific details on the work force so they can make informed decisions about whom to hire and potential employees need to know what to study to position themselves to be hired.

September 1, 2013
By Lt. Col. Carl Allard Young, USA

A great deal of discussion revolves around cyberspace, cyberwarfare, cybercrime, cyberdefense and cybersecurity, but what about cyberlaw, a critical component of societies’ abilities to address the other components successfully? “Cyber” is a global, multitrillion- dollar industry with annual cybercrime cost estimates ranging from $250 billion to $1 trillion. Determining how to define cybertransgressions; properly and accurately identify friendly, neutral and adversarial cyber actors; and develop the laws and international conventions to handle them are serious concerns for the future of civilian and national security and defensive realms. Such determinations have to properly balance corporate, security and defensive, property and privacy interests within frameworks consistent with U.S. legal ideals.