October 2009

October 2009

October is Cyber Awareness Month. This is an excellent effort to spread the word about cyber safety and to reinforce the policies, procedures and best business practices that support sound information assurance (IA). Given the consequences of compromised military networks or the loss of Personally Identifying Information (PII), any program that helps get the message across is worth the time and effort.

October 13, 2009
Henry S. Kenyon

October 15, 2009
Katie Packard

Cloud computing can solve many problems that state and federal governments are experiencing with traditional network-based systems. Through its cost-effective, flexible options, cloud computing enables organizations to move the burden of network management from their own staff to a host environment.

October 15, 2009
By Kent R. Schneider

This is a time when everyone needs to be part of the cyber debate. Our dependency on the cyber environment is greater than ever. Cyber is being recognized as a priority domain for warfare. U.S. capabilities and those of the nation’s allies are growing, but the threat is growing and becoming more sophisticated at an alarming rate.

October 15, 2009
By Henry S. Kenyon

October 15, 2009
By Alan P. Balutis

This viewpoint is in response to the “Incoming” column published in SIGNAL Magazine, August 2009, page 112. (scroll to Related section for link)

Christopher J. Dorobek’s “Incoming” column focused on good leadership. I once was as misguided as Dorobek, but no more. I hope it is not too late to affect his thinking—and yours as well.

October 15, 2009
By Christopher J. Dorobek

 
The Obama administration deserves credit for looking to reconstruct National Security Personnel System.

October 15, 2009
By Maj. Daniel Ward, USAF, Maj. Gabe Mounce, USAF, and Carol Scheina

A social media manifesto can lead the way.

The explosion of online social media is profoundly changing how people produce, consume and share information. Social media rapidly turns monologues into dialogues and broadcasts into conversations. The result is a rich environment in which ideas are shared, questions are answered and collaborative relationships flourish.

October 15, 2009
By Robert K. Ackerman

Nontraditional partners and approaches characterize homeland security efforts.

The U.S. intelligence community is seeking to bring citizens into the homeland security quest through new efforts at tapping potential intelligence information from new sources. This thrust aims to provide mechanisms for collecting information that resides outside the realm of conventional sources.

October 15, 2009
By Maryann Lawlor

 

Richard Schaeffer is the director of the Information Assurance Directorate, National Security Agency.

Maintaining the edge in information assurance calls for constant vigilance.

October 15, 2009
By Gen. James N. Mattis, USMC

Command and control must morph into a feedback loop.

Editor’s note: This viewpoint is adapted from a speech given by Gen. Mattis at LandWarNet 2009.

Command and control is a subject that encompasses all military functions. No matter how brave soldiers are or how many billions of dollars are spent, command and control is essential in enabling the warfighter to execute commander’s intent.

October 15, 2009
By Maryann Lawlor

 

Ed Granstedt, vice president of strategy, mission solutions group, national systems, QinetiQ North America, warns that current economic conditions can favor U.S. adversaries if organizations do not invest more heavily in comprehensive information security measures.

Globalized marketplace influences how analysts view the world.

October 15, 2009
By Henry S. Kenyon

 

Airborne Multi-INT Laboratory (AML) is a modified Gulfstream G3 business jet equipped with reconfigurable array sensors and data links. Developed by Lockheed Martin, the AML is a plug and play platform that allows a variety of systems to be mixed and tested to meet customer needs.

October 15, 2009
By Henry S. Kenyon

October 15, 2009
By Maj. Vincent W. Lau, USAF, and David P. Martin

U.S. Forces Korea aims for ubiquitous, authoritative data.

As the civilian sector moves toward available collaborative networking applications and technologies, U.S. Forces Korea finds itself on the crest of this wave and is transforming how it conducts business across the command. The results of this effort will enable the command to provide authoritative, far-reaching data while dramatically improving its decision-making capabilities both in peace and wartime.

October 15, 2009
By Maryann Lawlor

 

Gen. Stalder (l) cuts a ribbon with Luvsanvandan Bold (c), Mongolian minister of defense, and Tsakhiagiin Elbegdorj, president of Mongolia, at the official opening of a park at the Five Hills training area. The general visited Mongolia as well as other countries in the Asia-Pacific region in August.