One of the most critical pieces of the U.S. Army's Baseline Information Technology Services (ABITS) effort is measuring data, including customer satisfaction data, said Brig. Gen. Frederick Henry, USA, deputy commanding general of the service's Network Enterprise Technology Command. Gen. Henry made the remarks while addressing the audience at TechNet Land Forces Southwest 2012 in Tucson, Arizona.
When the hacker activist group Anonymous broke into Booz Allen Hamilton's networks and stole thousands of email addresses, the company was embarrassed, and that's exactly what Anonymous wanted, said Joseph Mahaffee, the company's chief information officer.
In the intelligence business, it's common for people to think everything is all about the data, when really it's about getting the data to the warfighter, said Phillip Chudoba, assistant director of intelligence for the U.S. Marine Corps, at AFCEA's TechNet Land Forces Southwest 2012.
Mike Krieger, deputy chief information officer for the U.S. Army, told the audience at TechNet Land Forces Southwest 2012 on Wednesday that he had hoped to provide them with the URL for the Army's report to Congress concerning Enterprise Email.
Congress had asked the Army to review the Enterprise Email approach to "see if it is the right thing to do." The report has to be approved by the secretary of the Army, but it has not quite reached his desk as of March 28. Krieger said he hopes to be able to provide the report very soon.
Government may have been in the slow lane to accept social media as a viable conduit for sharing information, but agencies are now coordinating their efforts to ensure messages going out to the public can be trusted. Members of a panel discussing its uses at the AFCEA International Homeland Security Conference said the technologies that facilitate ubiquitous communications among the public are merely another change in generations of changes. The key is that the same principles that govern reliable news reports and privacy and civil liberties protections apply whether the public is depending on newspapers, broadcast, Facebook, Skype or Twitter, they agreed.
In a time when government agencies and industry must tighten their belts, it may be a cloak that saves the security day. While discussing best practices in securing the cloud at the AFCEA International Homeland Security Conference, panelist Tim Kelleher, vice president of professional services, BlackRidge Technology, shared details about his company's approach to stopping cybermarauders in their recon tracks. The technique is called cloaking, and Kelleher used caller ID to describe how his company's solution could improve cybersecurity not only in future environments but in current networks as well.
Amazing anecdotes kept the audience entertained during the lunch session at the AFCEA International Homeland Security Conference. The experts spoke about a serious subject: cyberwar. But the stories about their hands-on experiences in learning how to fight cyberwars, how they've fought cyberthreats and what they believe is needed to prepare future cyberwarriors kept conference attendees enthralled. Among the panelists was Maj. T.J. O'Connor, USA, 10th Special Forces Group (A), S-6. While attending the U.S. Military Academy, Maj. O'Connor had some time on his hands that led him to learn how best to defeat cyberattacks.
Although not claiming victory, the U.S. Department of Homeland Security (DHS) has made some serious headway in improving cybersecurity, according to panelists discussing the topic at the DHS 2012 Information Technology Industry Day in Washington, D.C. Experts said the threats have not disappeared but rather have changed, and various DHS agencies have been learning how to better handle them. Alma Cole, chief systems security officer, U.S. Customs and Border Protection, described today's cyberthreats in a way the other panelists agreed with.
Protecting any nation's citizens and institutions is difficult under any circumstances, but today's economic limitations make this task even more challenging. Government and business leaders will meet at the Ronald Reagan International Trade Center February 28 to March 1 to tackle this topic during AFCEA International's 11th annual Homeland Security conference. Conference discussion topics include cloud computing, cyberwar, procurement, wireless broadband and social media. Small businesses' interaction with the U.S. Department of Homeland Security (DHS) also will be explored.
Over the next two days, hackers from across the globe will team up on nearly every continent for the second Random Hacks of Kindness (RHoK) event aimed at finding solutions to real-world problems caused by natural disasters. It's a 48-hour marathon of competitive computer coding with the best and brightest developers in Washington, D.C.; Sydney, Australia; Nairobi, Kenya; London; Jakarta, Indonesia; and Sao Paolo, Brazil.
The Joint Warfighting Conference in Virginia Beach wrapped up Thursday. Executive Editor Maryann Lawlor blogged extensively from the event.
You can read her coverage here.
Wondering how you can get your business' news published in one of SIGNAL's publications? Executive Editor Maryann Lawlor will be hosting an event at West 2010 for PAOs, business development managers and PR folks to help you learn how. "The Secrets Behind Getting News Published" in SIGNAL's media will be held Wednesday, February 3, at 9 a.m. PST.
Interested in learning more? Want to attend? Contact Maryann for details.
AFCEA's Small Business Committee is hosting "Federal Legislative Overview" as part of its Small Business Toolkit Series. The guest speaker for the event is Gregory Willis, counsel for the U.S. Senate Committee on Small Business and Entrepreneurship. He'll share his first-hand insight on the current legislative climate for small businesses.
The event will be held at AFCEA International headquarters on Tuesday, January 12, at 10 a.m. EST. For more information, visit the Web site or contact Dawn Falsinotti, (703) 631-6190.
The German military has way too many legacy communication and information systems to replace them all at once, so it is looking to commercial technology to improve capabilities. EDir. IT-AmtBw Hans-Ulrich Schade, chief of Division C, Bundeswehr IT Office, described this challenge at the AFCEA Bonn Chapter's Koblenz Symposium on September 3, 2009.
Schade related that the Bundeswehr has more than 120,000 radios. These include about 200 different types of radios, and the military cannot afford to replace them all. So, any solution must incorporate these legacy systems.
German military forces in Afghanistan have improved their command and control (C2) capabilities significantly, but they need more advanced technologies to move those advances down to the lower tactical levels. This assessment was stated by Lt. Gen. Carl-Hubertus von Butler, GEA, commander, German Army Forces Command, at the AFCEA Bonn Chapter's Koblenz Symposium on September 3, 2009.
Gen. Butler cited broadband solutions as a vital need for moving vital reconnaissance data down to warfighters. "What good will sensors do if they can't get [their information] down to lower levels?" he stated.
Rita Boland covers TechNet Tampa 2009 here:
Read the Homeland Security 2.0 conference coverage from Maryann Lawlor and Beverly Mowery here: