3rd Infantry Division The Frontline May 13, 2010 - Fort Stewart ...
3rd Infantry Division The Frontline May 13, 2010 - Fort Stewart ...
3rd Infantry Division The Frontline May 13, 2010 - Fort Stewart ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
2A <strong>The</strong> <strong>Frontline</strong> <strong>May</strong> <strong>13</strong>, <strong>2010</strong><br />
Lt. Gen. Rick Lynch<br />
Commanding General, IMCOM<br />
Defender 6<br />
<strong>The</strong> Installation Management<br />
Community is committed to leveraging<br />
the power of technology to expand our<br />
communication capabilities and<br />
enhance our ability to serve and support<br />
Soldiers, Army Civilians and<br />
Families. In today's world, information<br />
technology is at the core of all we do at<br />
work, at home, and at play. Smaller,<br />
more powerful and less expensive IT<br />
products hit the market every day.<br />
Becoming savvy with state-of-the-art<br />
technology helps us work smarter,<br />
learn more efficiently and play harder.<br />
Over the past six months, I have visited<br />
many garrisons, listening to many<br />
members of the Army Family to better<br />
understand how they prefer to receive<br />
information and communicate.<br />
Because more than 75 percent communicate<br />
and retrieve information<br />
through the Internet and other electronic<br />
means, I now communicate<br />
through my Facebook page and the<br />
IMCOM Twitter, Flickr and YouTube<br />
sites. This implements the Deputy<br />
Command Sgt. Maj. James Ervin<br />
Garrison Command Sergeant Major<br />
What do Will Smith, Bill Gates, and one<br />
out of eight Americans have in common?<br />
All have been victims of identity theft,<br />
11 million victims in 2009 to be exact! An<br />
eye-opening 12-percent increase from<br />
the year before.<br />
In 2009, the U.S. Government had more<br />
than 79 million records compromised<br />
that contained Personally Identifiable<br />
Information. All of us have to do a better<br />
job in protecting PII while in the performance<br />
of our duties.<br />
We have a personal obligation and a<br />
regulatory responsibility to ensure that we<br />
and our organizations do our part by:<br />
• Encrypting all e-mails containing PII.<br />
• Shredding documents that contain<br />
PII when no longer operationally<br />
required.<br />
• Securing Mobile PII data; positive<br />
personal security control when transporting.<br />
Identity theft is also becoming a serious<br />
problem with the advancement of social<br />
networking sites, innovative approaches<br />
to steal your identity pop up each week. It<br />
is becoming a constant struggle to protect<br />
yourself from criminal activity and to<br />
ensure your personal data is safe. You<br />
wouldn’t give your personal information<br />
Kevin Larson<br />
<strong>Fort</strong> <strong>Stewart</strong> Public Affairs<br />
Secretary of Defense,<br />
Feb. 25, <strong>2010</strong>, memorandum<br />
that requires DoD<br />
unclassified networks be<br />
configured for Internetbased<br />
capabilities like<br />
YouTube, Facebook,<br />
MySpace, Twitter and<br />
Google Apps.<br />
Because IT is so critical<br />
to how we do business<br />
and communicate,<br />
I have made IT one of<br />
the focus areas of the<br />
Services and Infrastructure Core<br />
Enterprise in my role as co-lead of the<br />
SICE board. SICE is a collaborative and<br />
cross-functional team of more than 15<br />
commands, organizations, and staff<br />
offices formed to develop solutions to<br />
Army-wide challenges. Presently, the<br />
SICE team is developing plans to modernize<br />
and standardize IT services on<br />
Army installations. <strong>The</strong> results will<br />
enhance delivery of IT in the deployment<br />
process, training, and programs<br />
such as Comprehensive Soldier Fitness.<br />
Also, look for improved IT to lead to<br />
improvements on how we deliver on<br />
Installation Management Command recently unveiled both its campaign plan outlining<br />
how every Soldier, Family Member, and Civilian plays a vital role in supporting<br />
our nation's warriors and a new IMCOM logo.<br />
<strong>The</strong> plan is a living document that focuses on six areas, or "lines of effort:"<br />
Soldier, Family and Civilian Readiness; Soldier, Family and Civilian Well Being;<br />
Leader and Workforce Development; Installation Readiness; Safety; and Energy<br />
Efficiency and Security. <strong>The</strong> new IMCOM brand showcases the installations<br />
importance as the Army's home.<br />
"All agencies and directorates will integrate these lines of effort in their operations<br />
and implement the IMCOM strategy," said <strong>Fort</strong> <strong>Stewart</strong>-Hunter Army Airfield Garrison<br />
Commander Col. Kevin Milton.<br />
<strong>The</strong> new logo, developed to coincide with the <strong>2010</strong>-2017 Installation Management<br />
Campaign Plan rollout and to run in conjunction with the IMCOM emblem, is representative<br />
of the four major facets of Army community life: stewardship, readiness,<br />
facilities and Families, said chief of Strategic Communications of Assistant Chief of Staff<br />
for Installation Management/IMCOM Kathy Aydt.<br />
"You have the green with the tree which symbolizes our stewardship," she said. "You<br />
have the flag at the top that symbolizes our readiness in support of the Army. You see<br />
the facilities, the structures which represent the infrastructure that we're responsible for<br />
and of course you see the Family grouping at the bottom. You may note that you can't<br />
tell who are Soldiers, or if there are Soldiers there...we also have a large civilian workforce<br />
that is very important to us. In this day and age not only Soldiers deploy but [so<br />
do] civilians. Those things were intentionally built into this logo, and probably on some<br />
level it's why it has such a wide appeal."<br />
<strong>The</strong> campaign plan will deliver sustainable installation communities that<br />
ensure a mission-ready Army by empower strong Soldiers and resilient Families,<br />
Col. Milton said. <strong>The</strong> first priority is to ensure Soldiers and Army Civilians are<br />
ready to answer the nation's call.<br />
"Here at <strong>Stewart</strong>-Hunter, we will implement the plan by developing and sustaining<br />
programs, services and capabilities that meet the needs of our Senior Commander to<br />
our promises of the<br />
Army Family Covenant<br />
and Army Community<br />
Covenant.<br />
<strong>The</strong> most important<br />
components of IT – telecommunications,information<br />
assurance and<br />
data processing – tie into<br />
every aspect of installation<br />
management. We<br />
use telecommunications<br />
to connect Soldiers to<br />
their Families by video<br />
teleconference when they deploy. Techsmart<br />
Soldiers and Family Members<br />
use it when they ‘tweet’ to friends and<br />
Family through their Twitter accounts.<br />
Information assurance measures and<br />
practices reduce risk and ensure our<br />
communication and information<br />
remain secure from malicious attacks.<br />
IA enables Soldiers and Civilians to<br />
communicate with government-issued<br />
Blackberries, knowing conversations<br />
are secure from unauthorized individuals.<br />
Most of us use data processing to<br />
manage our bits and bytes of information<br />
each day when we work on desk-<br />
<strong>3rd</strong> <strong>Infantry</strong> <strong>Division</strong><br />
Supporting Army Soldiers, Civilians and their Families with IT<br />
top computers, laptops, scanners and<br />
copiers. And cell phones may be the<br />
most powerful device of all since they<br />
incorporate all three of these IT components.<br />
Every day, the universe of IT products<br />
expands. Mobile handheld devices<br />
like the current generation of smartphones<br />
open up possibilities only<br />
dreamed of a few years ago. <strong>The</strong> convergence<br />
of cell phones, digital cameras,<br />
music players, GPS, video games,<br />
camcorders, electronic book readers<br />
and mobile Web browsers rapidly<br />
change how we communicate and<br />
interact.<br />
As the IMCOM commander, I am<br />
dedicated to embracing these new,<br />
exciting technologies and adapting<br />
them to continue to be ahead of the<br />
curve in supporting Soldier, Army<br />
Civilian and Family well-being and<br />
mission readiness. Each generation of<br />
Soldiers brings a valuable, new perspective<br />
to the Army. It is up to us to<br />
stay in step with communication capabilities<br />
that are in synch with a quality<br />
of life commensurate with service.<br />
We Are the Army’s Home.<br />
From the CSMs Desk: Fight back against identity theft<br />
unwittingly to a complete<br />
stranger, but the harsh reality<br />
is you are doing this<br />
every time you sign up to a<br />
SNS.<br />
Two out of three online<br />
U.S. households use social<br />
networks such as Facebook<br />
and MySpace, nearly twice<br />
as many as a year ago,<br />
according to the latest<br />
Consumer Reports State of<br />
the Net survey.<br />
<strong>The</strong> Consumer Reports<br />
National Research Center also states that:<br />
• A projected 1.7 million online households<br />
had experienced online identity<br />
theft in the past year.<br />
• An estimated 5.4 million online consumers<br />
submitted personal information<br />
to e-mail (phishing) scammers during the<br />
past two years.<br />
• Among adult social network users, 38<br />
percent had posted their full birth date,<br />
including year. <strong>Fort</strong>y-five percent of those<br />
with children had posted their children’s<br />
photos. And 8 percent had posted their<br />
own street address.<br />
• An estimated 5.1 million online households<br />
had experienced some type of abuse<br />
on a social network in the past year,<br />
including malware infections, scams, and<br />
harassment.<br />
<strong>The</strong> Consumer Reports<br />
recommends seven things<br />
to stop doing now on<br />
Facebook:<br />
1. Using a Weak<br />
Password: A password<br />
should have at least eight<br />
characters. One good<br />
technique is to insert<br />
numbers or symbols in<br />
the middle of a word, such<br />
as the word "houses":<br />
hO27usEs!<br />
2. Leaving your full birth<br />
date in your profile: It's an ideal target for<br />
identity thieves. If you've already entered<br />
a birth date, go to your profile page and<br />
click on the Info tab, then on Edit<br />
Information. Under the Basic Information<br />
section, choose to show only the month<br />
and day or no birthday at all.<br />
3. Overlooking useful privacy controls:<br />
Restrict access to photos, birth date, religious<br />
views, and Family information,<br />
among other things. You can give only<br />
certain people or groups access to items<br />
such as photos, or block particular people<br />
from seeing them.<br />
4. Posting your child's name in a caption:<br />
Don't use a child's name in photo<br />
tags or captions. If someone else does,<br />
delete it by clicking on Remove Tag. If your<br />
child isn't on Facebook and someone<br />
IMCOM paves way to strong<br />
future with new strategy, logo<br />
includes his or her name in a caption, ask<br />
that person to remove the name.<br />
5. Mentioning that you'll be away from<br />
home: That's like putting a "no one's<br />
home" sign on your door.<br />
6. Letting search engines find you: To<br />
help prevent strangers from accessing<br />
your page, go to the Search section of<br />
Facebook's privacy controls and select<br />
Only Friends for Facebook search results.<br />
Be sure the box for public search results<br />
isn't checked.<br />
7. Permitting youngsters to use<br />
Facebook unsupervised: <strong>The</strong> best way to<br />
provide oversight is to become one of<br />
their online friends. Use your e-mail<br />
address as the contact for their account so<br />
that you receive their notifications and<br />
monitor their activities.<br />
I encourage the entire community<br />
help us deter identity theft by being proactive<br />
and realizing your identity is not<br />
SAFE until you take steps protecting<br />
your information.<br />
Protect yourself and your Family<br />
Members, prevent identity theft by also<br />
destroying personal documents that<br />
contain PII, which are no longer required.<br />
To support this effort DPTMS and DPW<br />
is sponsoring a Shred It…Don’t Share it<br />
Day, <strong>May</strong> 18-19. For more information,<br />
contact the DPTMS Security <strong>Division</strong> at<br />
912-767-86<strong>13</strong>.<br />
ensure that the <strong>3rd</strong> ID and our tenant<br />
units are trained and ready forces,"<br />
he said. "Our Families resiliency<br />
will be strengthened under the plan.<br />
We will support the readiness needs<br />
of the units that call <strong>Stewart</strong>-Hunter<br />
home so we can ensure they can win<br />
the current fight and be prepared for<br />
the next."<br />
Hand-in-hand with empowerment<br />
is well being. This line of effort<br />
focuses on renewing community relations to ensure high quality of life for Soldiers,<br />
Families and Army Civilians.<br />
"We are blessed with the finest neighbors possible here at <strong>Stewart</strong>-Hunter," Col.<br />
Milton said. "<strong>The</strong> Army Community Covenant is alive and well here. This line of effort<br />
for us is simply a recommitment to what is already true, that love and support flows<br />
freely onto our installation from outside the gates."<br />
Additionally, well being efforts will standardize and fund existing Family programs<br />
and services and ensure that the Army Family Covenant continues to provide for all<br />
Soldiers - single or married - and Families.<br />
Leader and workforce development is vital to the plans’ success because professional<br />
leaders leading a talented and motivated workforce will successfully execute the<br />
mission, Col. Milton said.<br />
"Our primary objective is to build and sustain a cadre of agile and adaptable leaders<br />
and a multi-skilled workforce committed to delivering quality services to our Army<br />
community," he said.<br />
Workforce development rolls into installation readiness, which touches on the<br />
energy, sustainability, and cost culture lines of effort, Col. Milton said.<br />
"Installation readiness is all about sustaining resources and streamlining processes,"<br />
he said. "We will manage installation facilities and support services to meet the needs<br />
of generating and operating forces and other organizations' needs within the limits of<br />
our resources."<br />
<strong>The</strong> final line of effort – Safety – proactively and aggressively ensures the safe and<br />
secure installations for Soldiers, Families and Civilians by making safety everyone's<br />
responsibility.<br />
"We have an inherent obligation to provide a safe and healthy environment for our<br />
Army Family," Col. Milton said. "We are firmly committed to a growing culture of<br />
safety awareness that pervades our daily operations and activities, both on and off<br />
<strong>Stewart</strong>-Hunter, and which guide our actions at all times."<br />
Editor’s note: Information for this article was taken from:<br />
www.army.mil/-news/<strong>2010</strong>/04/08/37010-new-imcom-logo-to-illustrate- <strong>2010</strong>-2017campaign-plan/