18.12.2012 Views

3rd Infantry Division The Frontline May 13, 2010 - Fort Stewart ...

3rd Infantry Division The Frontline May 13, 2010 - Fort Stewart ...

3rd Infantry Division The Frontline May 13, 2010 - Fort Stewart ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2A <strong>The</strong> <strong>Frontline</strong> <strong>May</strong> <strong>13</strong>, <strong>2010</strong><br />

Lt. Gen. Rick Lynch<br />

Commanding General, IMCOM<br />

Defender 6<br />

<strong>The</strong> Installation Management<br />

Community is committed to leveraging<br />

the power of technology to expand our<br />

communication capabilities and<br />

enhance our ability to serve and support<br />

Soldiers, Army Civilians and<br />

Families. In today's world, information<br />

technology is at the core of all we do at<br />

work, at home, and at play. Smaller,<br />

more powerful and less expensive IT<br />

products hit the market every day.<br />

Becoming savvy with state-of-the-art<br />

technology helps us work smarter,<br />

learn more efficiently and play harder.<br />

Over the past six months, I have visited<br />

many garrisons, listening to many<br />

members of the Army Family to better<br />

understand how they prefer to receive<br />

information and communicate.<br />

Because more than 75 percent communicate<br />

and retrieve information<br />

through the Internet and other electronic<br />

means, I now communicate<br />

through my Facebook page and the<br />

IMCOM Twitter, Flickr and YouTube<br />

sites. This implements the Deputy<br />

Command Sgt. Maj. James Ervin<br />

Garrison Command Sergeant Major<br />

What do Will Smith, Bill Gates, and one<br />

out of eight Americans have in common?<br />

All have been victims of identity theft,<br />

11 million victims in 2009 to be exact! An<br />

eye-opening 12-percent increase from<br />

the year before.<br />

In 2009, the U.S. Government had more<br />

than 79 million records compromised<br />

that contained Personally Identifiable<br />

Information. All of us have to do a better<br />

job in protecting PII while in the performance<br />

of our duties.<br />

We have a personal obligation and a<br />

regulatory responsibility to ensure that we<br />

and our organizations do our part by:<br />

• Encrypting all e-mails containing PII.<br />

• Shredding documents that contain<br />

PII when no longer operationally<br />

required.<br />

• Securing Mobile PII data; positive<br />

personal security control when transporting.<br />

Identity theft is also becoming a serious<br />

problem with the advancement of social<br />

networking sites, innovative approaches<br />

to steal your identity pop up each week. It<br />

is becoming a constant struggle to protect<br />

yourself from criminal activity and to<br />

ensure your personal data is safe. You<br />

wouldn’t give your personal information<br />

Kevin Larson<br />

<strong>Fort</strong> <strong>Stewart</strong> Public Affairs<br />

Secretary of Defense,<br />

Feb. 25, <strong>2010</strong>, memorandum<br />

that requires DoD<br />

unclassified networks be<br />

configured for Internetbased<br />

capabilities like<br />

YouTube, Facebook,<br />

MySpace, Twitter and<br />

Google Apps.<br />

Because IT is so critical<br />

to how we do business<br />

and communicate,<br />

I have made IT one of<br />

the focus areas of the<br />

Services and Infrastructure Core<br />

Enterprise in my role as co-lead of the<br />

SICE board. SICE is a collaborative and<br />

cross-functional team of more than 15<br />

commands, organizations, and staff<br />

offices formed to develop solutions to<br />

Army-wide challenges. Presently, the<br />

SICE team is developing plans to modernize<br />

and standardize IT services on<br />

Army installations. <strong>The</strong> results will<br />

enhance delivery of IT in the deployment<br />

process, training, and programs<br />

such as Comprehensive Soldier Fitness.<br />

Also, look for improved IT to lead to<br />

improvements on how we deliver on<br />

Installation Management Command recently unveiled both its campaign plan outlining<br />

how every Soldier, Family Member, and Civilian plays a vital role in supporting<br />

our nation's warriors and a new IMCOM logo.<br />

<strong>The</strong> plan is a living document that focuses on six areas, or "lines of effort:"<br />

Soldier, Family and Civilian Readiness; Soldier, Family and Civilian Well Being;<br />

Leader and Workforce Development; Installation Readiness; Safety; and Energy<br />

Efficiency and Security. <strong>The</strong> new IMCOM brand showcases the installations<br />

importance as the Army's home.<br />

"All agencies and directorates will integrate these lines of effort in their operations<br />

and implement the IMCOM strategy," said <strong>Fort</strong> <strong>Stewart</strong>-Hunter Army Airfield Garrison<br />

Commander Col. Kevin Milton.<br />

<strong>The</strong> new logo, developed to coincide with the <strong>2010</strong>-2017 Installation Management<br />

Campaign Plan rollout and to run in conjunction with the IMCOM emblem, is representative<br />

of the four major facets of Army community life: stewardship, readiness,<br />

facilities and Families, said chief of Strategic Communications of Assistant Chief of Staff<br />

for Installation Management/IMCOM Kathy Aydt.<br />

"You have the green with the tree which symbolizes our stewardship," she said. "You<br />

have the flag at the top that symbolizes our readiness in support of the Army. You see<br />

the facilities, the structures which represent the infrastructure that we're responsible for<br />

and of course you see the Family grouping at the bottom. You may note that you can't<br />

tell who are Soldiers, or if there are Soldiers there...we also have a large civilian workforce<br />

that is very important to us. In this day and age not only Soldiers deploy but [so<br />

do] civilians. Those things were intentionally built into this logo, and probably on some<br />

level it's why it has such a wide appeal."<br />

<strong>The</strong> campaign plan will deliver sustainable installation communities that<br />

ensure a mission-ready Army by empower strong Soldiers and resilient Families,<br />

Col. Milton said. <strong>The</strong> first priority is to ensure Soldiers and Army Civilians are<br />

ready to answer the nation's call.<br />

"Here at <strong>Stewart</strong>-Hunter, we will implement the plan by developing and sustaining<br />

programs, services and capabilities that meet the needs of our Senior Commander to<br />

our promises of the<br />

Army Family Covenant<br />

and Army Community<br />

Covenant.<br />

<strong>The</strong> most important<br />

components of IT – telecommunications,information<br />

assurance and<br />

data processing – tie into<br />

every aspect of installation<br />

management. We<br />

use telecommunications<br />

to connect Soldiers to<br />

their Families by video<br />

teleconference when they deploy. Techsmart<br />

Soldiers and Family Members<br />

use it when they ‘tweet’ to friends and<br />

Family through their Twitter accounts.<br />

Information assurance measures and<br />

practices reduce risk and ensure our<br />

communication and information<br />

remain secure from malicious attacks.<br />

IA enables Soldiers and Civilians to<br />

communicate with government-issued<br />

Blackberries, knowing conversations<br />

are secure from unauthorized individuals.<br />

Most of us use data processing to<br />

manage our bits and bytes of information<br />

each day when we work on desk-<br />

<strong>3rd</strong> <strong>Infantry</strong> <strong>Division</strong><br />

Supporting Army Soldiers, Civilians and their Families with IT<br />

top computers, laptops, scanners and<br />

copiers. And cell phones may be the<br />

most powerful device of all since they<br />

incorporate all three of these IT components.<br />

Every day, the universe of IT products<br />

expands. Mobile handheld devices<br />

like the current generation of smartphones<br />

open up possibilities only<br />

dreamed of a few years ago. <strong>The</strong> convergence<br />

of cell phones, digital cameras,<br />

music players, GPS, video games,<br />

camcorders, electronic book readers<br />

and mobile Web browsers rapidly<br />

change how we communicate and<br />

interact.<br />

As the IMCOM commander, I am<br />

dedicated to embracing these new,<br />

exciting technologies and adapting<br />

them to continue to be ahead of the<br />

curve in supporting Soldier, Army<br />

Civilian and Family well-being and<br />

mission readiness. Each generation of<br />

Soldiers brings a valuable, new perspective<br />

to the Army. It is up to us to<br />

stay in step with communication capabilities<br />

that are in synch with a quality<br />

of life commensurate with service.<br />

We Are the Army’s Home.<br />

From the CSMs Desk: Fight back against identity theft<br />

unwittingly to a complete<br />

stranger, but the harsh reality<br />

is you are doing this<br />

every time you sign up to a<br />

SNS.<br />

Two out of three online<br />

U.S. households use social<br />

networks such as Facebook<br />

and MySpace, nearly twice<br />

as many as a year ago,<br />

according to the latest<br />

Consumer Reports State of<br />

the Net survey.<br />

<strong>The</strong> Consumer Reports<br />

National Research Center also states that:<br />

• A projected 1.7 million online households<br />

had experienced online identity<br />

theft in the past year.<br />

• An estimated 5.4 million online consumers<br />

submitted personal information<br />

to e-mail (phishing) scammers during the<br />

past two years.<br />

• Among adult social network users, 38<br />

percent had posted their full birth date,<br />

including year. <strong>Fort</strong>y-five percent of those<br />

with children had posted their children’s<br />

photos. And 8 percent had posted their<br />

own street address.<br />

• An estimated 5.1 million online households<br />

had experienced some type of abuse<br />

on a social network in the past year,<br />

including malware infections, scams, and<br />

harassment.<br />

<strong>The</strong> Consumer Reports<br />

recommends seven things<br />

to stop doing now on<br />

Facebook:<br />

1. Using a Weak<br />

Password: A password<br />

should have at least eight<br />

characters. One good<br />

technique is to insert<br />

numbers or symbols in<br />

the middle of a word, such<br />

as the word "houses":<br />

hO27usEs!<br />

2. Leaving your full birth<br />

date in your profile: It's an ideal target for<br />

identity thieves. If you've already entered<br />

a birth date, go to your profile page and<br />

click on the Info tab, then on Edit<br />

Information. Under the Basic Information<br />

section, choose to show only the month<br />

and day or no birthday at all.<br />

3. Overlooking useful privacy controls:<br />

Restrict access to photos, birth date, religious<br />

views, and Family information,<br />

among other things. You can give only<br />

certain people or groups access to items<br />

such as photos, or block particular people<br />

from seeing them.<br />

4. Posting your child's name in a caption:<br />

Don't use a child's name in photo<br />

tags or captions. If someone else does,<br />

delete it by clicking on Remove Tag. If your<br />

child isn't on Facebook and someone<br />

IMCOM paves way to strong<br />

future with new strategy, logo<br />

includes his or her name in a caption, ask<br />

that person to remove the name.<br />

5. Mentioning that you'll be away from<br />

home: That's like putting a "no one's<br />

home" sign on your door.<br />

6. Letting search engines find you: To<br />

help prevent strangers from accessing<br />

your page, go to the Search section of<br />

Facebook's privacy controls and select<br />

Only Friends for Facebook search results.<br />

Be sure the box for public search results<br />

isn't checked.<br />

7. Permitting youngsters to use<br />

Facebook unsupervised: <strong>The</strong> best way to<br />

provide oversight is to become one of<br />

their online friends. Use your e-mail<br />

address as the contact for their account so<br />

that you receive their notifications and<br />

monitor their activities.<br />

I encourage the entire community<br />

help us deter identity theft by being proactive<br />

and realizing your identity is not<br />

SAFE until you take steps protecting<br />

your information.<br />

Protect yourself and your Family<br />

Members, prevent identity theft by also<br />

destroying personal documents that<br />

contain PII, which are no longer required.<br />

To support this effort DPTMS and DPW<br />

is sponsoring a Shred It…Don’t Share it<br />

Day, <strong>May</strong> 18-19. For more information,<br />

contact the DPTMS Security <strong>Division</strong> at<br />

912-767-86<strong>13</strong>.<br />

ensure that the <strong>3rd</strong> ID and our tenant<br />

units are trained and ready forces,"<br />

he said. "Our Families resiliency<br />

will be strengthened under the plan.<br />

We will support the readiness needs<br />

of the units that call <strong>Stewart</strong>-Hunter<br />

home so we can ensure they can win<br />

the current fight and be prepared for<br />

the next."<br />

Hand-in-hand with empowerment<br />

is well being. This line of effort<br />

focuses on renewing community relations to ensure high quality of life for Soldiers,<br />

Families and Army Civilians.<br />

"We are blessed with the finest neighbors possible here at <strong>Stewart</strong>-Hunter," Col.<br />

Milton said. "<strong>The</strong> Army Community Covenant is alive and well here. This line of effort<br />

for us is simply a recommitment to what is already true, that love and support flows<br />

freely onto our installation from outside the gates."<br />

Additionally, well being efforts will standardize and fund existing Family programs<br />

and services and ensure that the Army Family Covenant continues to provide for all<br />

Soldiers - single or married - and Families.<br />

Leader and workforce development is vital to the plans’ success because professional<br />

leaders leading a talented and motivated workforce will successfully execute the<br />

mission, Col. Milton said.<br />

"Our primary objective is to build and sustain a cadre of agile and adaptable leaders<br />

and a multi-skilled workforce committed to delivering quality services to our Army<br />

community," he said.<br />

Workforce development rolls into installation readiness, which touches on the<br />

energy, sustainability, and cost culture lines of effort, Col. Milton said.<br />

"Installation readiness is all about sustaining resources and streamlining processes,"<br />

he said. "We will manage installation facilities and support services to meet the needs<br />

of generating and operating forces and other organizations' needs within the limits of<br />

our resources."<br />

<strong>The</strong> final line of effort – Safety – proactively and aggressively ensures the safe and<br />

secure installations for Soldiers, Families and Civilians by making safety everyone's<br />

responsibility.<br />

"We have an inherent obligation to provide a safe and healthy environment for our<br />

Army Family," Col. Milton said. "We are firmly committed to a growing culture of<br />

safety awareness that pervades our daily operations and activities, both on and off<br />

<strong>Stewart</strong>-Hunter, and which guide our actions at all times."<br />

Editor’s note: Information for this article was taken from:<br />

www.army.mil/-news/<strong>2010</strong>/04/08/37010-new-imcom-logo-to-illustrate- <strong>2010</strong>-2017campaign-plan/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!