U.S. military needs wikis, video sharing, defense expert says
U.S. forces need better ways to communicate with other groups, Guy Ben-Ari says
IDG News Service - The U.S. military should embrace user-driven Web services such as wikis, video-sharing sites and social networking sites as its focus grows to include providing more security and reconstruction help, a defense analyst recommended today.
The military is increasingly moving toward a role where it will share responsibilities with organizations outside the U.S. government, including charitable organizations, international aid groups and even private businesses, said Guy Ben-Ari, a fellow in the Defense-Industrial Initiatives Group at the Center for Strategic and International Studies, a Washington-based think tank.
At times when the military is helping with reconstruction or security following a natural or human-made disaster, U.S. forces need to find better ways to communicate with other groups, said Ben-Ari, speaking at the Network Centric Warfare conference in Washington. Too often, the U.S. military has been reluctant to share even unclassified information with other groups working toward the same goals, he said.
Members of the military have good information to share on terrain or possible danger spots, but if they debate too long about what they can share with other organizations, the information becomes useless, he said.
"Rethink what you're sharing, what you're willing to share," he said to the crowd, about half of whom were uniformed military. "Information sharing not only makes sense, but is critical."
Before Ben-Ari spoke, David Emery, chief engineer for the U.S. Army's Future Combat Systems project, said instant messaging and whiteboard sharing were the "killer apps" the Army needed in the field. But Ben-Ari said those two applications were the "tip of the iceberg," and the military could offer many more information-sharing tools using readily available technology.
For example, a group of military officers launched CompanyCommand.com in the early days of the current Iraq war. At the site, they shared tips and warnings about locations in Iraq, and the site rapidly grew to have thousands of members, Ben-Ari said. The U.S. military threatened to shut the site down because it was on the open Internet, but it eventually moved the site in-house and restricted access via passwords.
After a major earthquake in Pakistan in October 2005, a small group of aid workers launched RISEPak.com, allowing aid workers there to share information and pictures, Ben-Ari added. Within weeks, RISEPak.com became the go-to site for aid workers headed to Pakistan, and the site still operates today with support from Pakistani and U.S. groups, he noted.
Ben-Ari acknowledged that there's a potential for user-generated Web sites to include inaccurate or malicious information. But in most cases, user-generated sites self-police -- if a terrorist had posted information on CompanyCommand.com, the military officers there would have quickly recognized the imposter, he said.
"The power today is with the end users, and it's the end users who drive the content," he said. "The argument is [that in disaster zones], some information is better than none."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses
- IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center
- IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results
- Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- HP HAVEn: See the big picture in Big Data
- HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data... All Government IT White Papers
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Government IT Webcasts