Guest Blogs

April 8, 2016
By Taylor Justice

Those of us with the privilege of providing social services to veterans and those with significant needs face a similar challenge: Addressing many requests for help that come at us from so many different directions. Sometimes we get it right and provide the exact services clients seek. But far more often, it’s not an exact fit, and the door they walked in isn’t the right one.

April 11, 2016
By Tony Bardo

Current technology trends such as the Internet of Things (IoT), bring your own device (BYOD) initiatives and the deployment of cloud-based applications all demand more and more bandwidth. One aspect of modernization that could be overlooked as we rush to implement emerging technologies is also the most important—the network backbone that will support it all.

April 6, 2016
By J. Wayne Lloyd

Federal agencies clamor for industry best practices to implement findings resulting from last year’s 30-day “Cybersecurity Sprint,” part of the administration’s broader effort to bolster federal cybersecurity. A new mandatory directive for all civilian government agencies, the Cybersecurity Strategy Implementation Plan (CSIP), provides a series of actions to further secure federal information systems.  

December 10, 2015
By Cyndi Thomas
With electronic attack, adversaries now can deny use of command and control systems across all domains. Illustration courtesy NCI Inc.

The United States' dependence on valuable space assets and the nation's critical need to maintain superiority in command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) disciplines have also made these fields somewhat of an Achilles' heel. The country had long held technological and capabilities advantages over the rest of the world. Those days are gone.

September 22, 2015
By Bob Fortna

The Defense Department stands at a technological and financial crossroads, needing to accelerate the proliferation of new networks and applications while heeding budgetary concerns.

As such, department officials are looking carefully at software-defined networking (SDN) and the potential the method provides as a key foundation of the Joint Information Environment (JIE). SDN lets agencies build more flexible, consolidated and efficient networks, while spinning up new applications and tools faster.

“We have to embrace the software-defined mission of where we have to go with the networks,” Defense Department Chief Information Officer Terry Halvorsen said at the 2014 Federal Forum when discussing the JIE.

September 11, 2015
By B. Scott Swann
Courtesy CanStockPhoto via MorphoTrak

The time is quickly approaching when video analytics no longer will be an afterthought for supporting investigations or categorized as a nice-to-have. Brute force procedures traditionally used by law enforcement are not effective for handling massive amounts of video and images. In fact, the problem of daunting volumes of video handled by criminal justice organizations today is compounded by heightened public perception that digital evidence must be processed quickly, and increasingly, juries expect to see video presented during trials. Law enforcement executives jest that if a crime is not caught on video, as far as courts are concerned, it didn’t happen.

September 2, 2015
By Jason Thomas

Over the past week, I have thought a lot about innovation. In part because I’m preparing for my upcoming panel discussion on innovation at the AFCEA/INSA Intelligence Summit next week, and in part because I’m troubled by the seemingly pervasive use of the word “innovation” as a solution to many of our intelligence collection and analysis challenges.

April 21, 2015
By Bill Nolte

For now, the Iranian nuclear framework is just that—a midpoint in a process that will continue for several months. Already, however, we find apparent—and basic—disagreement between the principal negotiators on just what the framework is supposed to frame. Will sanctions be removed in their totality, on the completion of the accord? Or will they be removed incrementally as the inspection regime takes hold? And, for good measure, what about inspections of facilities collocated on military bases?

April 21, 2015
By Justin Marston
Virtual smartphones running commercial mobile apps from a government-hosted data center could be the future of classified mobility.

Almost four years ago, my company co-founder and I sat in a nondescript hotel in Maryland meeting with two senior technical executives from the National Security Agency (NSA) to discuss classified mobility. We initially focused on how to install a few specific apps onto classified phones, but as the meeting unfolded, it became obvious the government struggled with a broader challenge of securely managing all mobile apps across classified networks. In the news media, we read with interest about proposed options for the President’s next cellphone or devices used by the nation’s senior leadership. Despite all the commentary, very little of this speculation came to fruition.

April 16, 2015
By Glenn Kesselman

It seems every week we read about a cyber breach that involves millions of records at risk of compromise. Why can’t the big boys get it right? After all, they have large information technology departments and many layers of protection. From the opposite perspective, what did you do today to protect personally identifiable information (PII)?

Do you have unique personal identification numbers (PINs) for all of your passwords? If you answered no, create a priority “to do” and investigate password vaults, accessible from your mobile devices and Web browser.

April 15, 2015
By David E. Meadows

In December 2014, Stephen Hawking, the renowned theoretical physicist, warned the world that true artificial intelligence (AI) could mean the death of mankind. Well, that got my attention. His comments stirred up a maelstrom of support. Small wonder, but the AI argument has been ongoing since the late Isaac Asimov wrote the Foundation series.

Hawking’s statement did complement a blast by Elon Musk, Tesla CEO and a strong advocate of driverless cars, who two months prior at the MIT Aeronautics and Astronautics Department's 2014 Centennial Symposium responded to the discussion about AI by saying, “With artificial intelligence, we are summoning the demon.”

April 8, 2015
By Al Krachman

Is the U.S. Defense Department moving back toward requiring cost and pricing data for commercial item purchases? A recent series of memoranda and experiences show a backward march toward the department requesting cost data as a means to justify fair and reasonable pricing for commercial item purchases.

April 6, 2015
By Lewis Shepherd

Every now and then a poll result pops up that surprises me. Results sometimes are counter-intuitive, or at least counter-narrative from what we're led to believe in major media coverage.

Case in point: An early 2015 poll shows that after nearly two years of a negative spotlight on the U.S. intelligence community, and particularly on the National Security Agency (NSA) and Central Intelligence Agency (CIA), the American people still have a positive view of the NSA and CIA. More startlingly, young Americans have more favorable views of NSA and CIA than older Americans!

March 30, 2015
By Terry Roberts

In a recent GovExec article, Kellie Lunney raised a few perspectives regarding the average age of senior executives in government today—it is the mid to late 50s—and the limited compensation flexibility. And I realized that ever since I entered the Defense Intelligence Senior Executive Service (DISES) in early 2004 and was involved in the vetting and filling of more than 40 SES positions, I have been deeply concerned about the ability of government to continuously attract, recruit and enable top talent of all ages, educational and experiential backgrounds.

March 27, 2015
By Chris LaPoint

Data center consolidation has been a priority for federal information technology teams since 2010 when the government launched the Federal Data Center Consolidation Initiative (FDCCI). The goal was to close or consolidate 40 percent of government data centers by 2015 to combat server sprawl, centralize and standardize storage, and streamline application management and establish shared services across multiple agencies.

The FDCCI has changed many things about how federal information technology (IT) is set up and created many challenges for federal IT professionals, including:

March 20, 2015
By Bill Nolte

A year or two ago, I wrote an article proposing a Hart-Rudman Commission for the 21st Century, referring to a neglected effort from the 1990s to review America’s national security. (I’m happy to share the article, along with its rejection letters.) More recently I have advocated at several events for a strategic review of intelligence, more than a decade after the post-9/11 “reforms.” Its focus should be a study of the environments U.S. intelligence could face in 2030 or 2040. The consequences of such a study should be a rigorous evaluation of existing structures and processes, presumably reaffirming some while altering or eliminating others.

March 16, 2015
By Suzanne Petrie Liscouski

We all appreciate and value the opportunities to hear from government. The AFCEA Homeland Security Conference afforded industry and government officials alike the chance to talk and share ideas. One topic of conversation piqued my interest that I think will resonate with both industry and government.

March 4, 2015
By Glenn Kesselman

Cyber attacks originate from the outside or the inside. Is there "low hanging fruit" that you can harvest to reduce an insider attack?

You can reduce the probability of an attack from a disgruntled employee by becoming more mindful of your command climate or employee attitudes and by making a commitment to spend more time with your employees/members of your command. Take an employee to lunch and learn about his or her world. Schedule a breakfast with a subordinate and listen to his or her concerns.

March 3, 2015
By Joyce Bosc

With fewer government workers and contractors attending conferences and events, companies that do decide to exhibit at a conference need to maximize their investments. Here are some tips to take advantage of, and capitalize on, the lead generation and thought leadership opportunities that exhibiting provides.

February 27, 2015
By Terry Roberts

Several years back, my tech savvy college student son, Michael, was helping me to set up my new (at that time) iPhone 4. When he was done, he had downloaded several applications (apps) that he thought I would want to have such as BBC News, his Radford University app, Pandora, etc.  But instead of being an appreciative mother, the paranoid career intelligence professional screamed inside: What did he put on my phone (that I use for work and my entire personal life)? I have no clue what these apps could do to the privacy and security of my data and all my communications.