13.07.2015 Views

2006 WVNG Annual Report PDF - West Virginia Army National Guard

2006 WVNG Annual Report PDF - West Virginia Army National Guard

2006 WVNG Annual Report PDF - West Virginia Army National Guard

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>West</strong> <strong>Virginia</strong> <strong>National</strong> <strong>Guard</strong> <strong>Annual</strong> <strong>Report</strong> <strong>2006</strong>Throughout the year, <strong>West</strong> <strong>Virginia</strong>'s <strong>National</strong> <strong>Guard</strong> assisted the <strong>National</strong> <strong>Guard</strong> Bureauin testing new services for the mobile communications packages, such as video teleconferencingbetween a mobile communications kit and the <strong>Army</strong> <strong>National</strong> <strong>Guard</strong> video teleconferencingnetwork. Also, new innovative services have been pioneered by the <strong>West</strong> <strong>Virginia</strong><strong>National</strong> <strong>Guard</strong> for the mobile communicationspackages, such as a remote controlled InternetProtocol camera as well as secure telephoneand fax services. To continue honing its skills,the <strong>West</strong> <strong>Virginia</strong> <strong>National</strong> <strong>Guard</strong> will participatein a Northern Command sponsoredCoalition Warrior Interoperability Demonstrationin 2007. This exercise will validate theability of the mobile communications packagesto provide incident site communicationsservices (an important homeland defensemission) during a simulated major evacuationof the <strong>National</strong> Capital Region due to terroristattack.As with the private sector, <strong>National</strong> <strong>Guard</strong> technology faces multiple challenges. Threatsto over 1,700 networked computers cause the security staff to be ever vigilant. As noted onnational news broadcasts, information security is of paramount importance and the need forabsolute privacy abounds. Technological advances continue to be rampant in the informationtechnology business. New technologyoften makes legacy systemsobsolete within a matter of a fewmonths. To protect data, informationand personnel, the <strong>National</strong> <strong>Guard</strong>installed computer access cardreaders to computers within the<strong>National</strong> <strong>Guard</strong> communicationsinfrastructure. These card readersensure only authorized personnelaccess U. S. Government systems.As the world-wide information threatcontinues, J6 staff receives InformationAssurance Vulnerability Alerts(IAVAs) that aide in informationtechnology. On site security managers successfully applied these "patches" and "fixes", thusensuring full security of <strong>National</strong> <strong>Guard</strong> systems.In order to gain a more efficient use and upkeep of technology, Camp Dawson informationtechnology staff reorganized into a robust organization consisting of J6, Homeland Securityand <strong>National</strong> <strong>Guard</strong> Bureau personnel. This "tailored" team supports armories and facilities inNorthern <strong>West</strong> <strong>Virginia</strong> and Camp Dawson. The group's efforts earned highest accoladesfrom <strong>National</strong> <strong>Guard</strong> Bureau and the team's many customers.36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!