Photos of Larryblakeley
(Contact Info: larry at larryblakeley dot com)
Important Note: You will need to click this icon to download the free needed to view most of the images on this Web site - just a couple of clicks and you're "good to go."
I manage this Web site and the following Web sites: Leslie (Blakeley) Adkins - my oldest daughter
Lori Ann Blakeley (June 20, 1985 - May 4, 2005) - my middle daughter
Evan Blakeley- my youngest child
Chapter 1: Trends in Vulnerabilities, Threats, and Technologies, Jacques S. Gansler and William Lucyshyn, page 13.
Chapter 2: Physical Vulnerabilities of Critical U.S. Information Systems, Robert Anderson, page 27.
Chapter 3: Physical Vulnerabilities Exposed at the National Training Center, John D. Rosenberger, page 41.
Chapter 4: Dealing with Physical Vulnerabilities, Bruce W. MacDonald, page 45.
Chapter 5: Vulnerabilities to Electromagnetic Attack of Defense Information Systems, John M. "Mike" Borky, page 52.
Chapter 6: Vulnerabilities to Electromagnetic Attack of the Civil Infrastructure, Donald C. Latham, page 74.
Chapter 7: Trends in Cyber Vulnerabilities, Threats, and Countermeasures, Michael A. Vatis, page 79.
Chapter 8: Enhancing Cyber-Security for the Warfighter, Sean R. Finnegan, page 92.
Chapter 9: Complexity of Network Centric Warfare, Stanley B. Alterman, page 100.
Chapter 10: Difficulties with Network-Centric Warfare, Charles Perrow, page 111.
Military transformation is a continuous process. Changes in military doctrine, such as network centric warfare (NCW), often appear revolutionary but actually have been years in the making and have been influenced by changing societal/cultural concepts, environmental issues, economics, politics, nationalism, assessment of past and present warfare schema and technological innovation. Coinciding with the ongoing military transformation, the past 30 years have marked a corresponding transformation in the business world, usually referred to as the "information revolution." This business world transformation centers on the manipulation of information through technology that simplifies, generates, analyzes, stores, exchanges, and uses information in a variety of forms. The desire to emulate the commercial revolution in information technology (IT) is one of the major drivers to reorganize government along business process lines.
One of the missions of the Center for Technology and National Security Policy (CTNSP) at the National Defense University (NDU) is to maximize the infusion of technology from commercial sources into military systems while addressing security and acquisition reform. To better understand the problems of incorporating IT into the battlefield, CTNSP, in concert with The Center for Public Policy and Private Enterprise (CPPPE) of the University of Maryland School of Public Affairs, brought together leaders in the field of military and commercial policy and technology (A list of attendees can be found in Appendix A). The purpose of the meeting was to discuss information assurance issues as they relate to network centric warfare.The workshop objective was to gain insight into transformation risks in the following areas:
- trends in information system threats and vulnerabilities;
- vulnerabilities introduced by the complexity of the new digitized battlefield;
- impact of degraded information systems on battlefield operations; and
- trends in information assurance technologies and system design.
This volume presents the proceedings of that workshop.
- "Information Assurance: Trends in Vulnerabilities, Threats and Technologies," Center for Technology and National Security Policy (CTNSP) http://www.ndu.edu/ctnsp/home.html, National Defense University (NDU) http://www.ndu.edu/, Spring 2004 http://www.ndu.edu/ctnsp/information_assurance_book.htm
File Name: information_assurance_CTNSP2004.pdf
Post Date: March 28, 2005 at 8:10 AM CST; 1410 GMT