The Transmitter

Page 1

came across the book The OZ Principle: Getting Results through Individual and Organizational Accountability by authors Connors, Smith and Hickman. By using the analogy of "The Wizard of Oz" by L. Frank Baum, the aim is to propel individuals and organizations to excellence. The XO’s Corner authors emphasize that the “yellow brick road” to LCDR Joey Harrison success is paved with accountability. Oz defines accountability as an attitude of continually asking “What else can I do to rise above my circumstances and achieve the results I desire?” Furthermore, there is a thin line of accountability that separates success from failure and greatness from mediocrity. Saluti COMSTA Team, Family and Friends! Now that spring has sprung, I’m sure Excuses and blaming others, confusion, that many would agree the return of the sun is a and an attitude of helplessness lies below the line welcome sight. As springtime represents a new while ownership, commitment, solutions to page in life and starts everything anew, we problems, and determined action soar above the welcome aboard our new Senior Enlisted line. There is always room for improvement, and Advisor, ITCS Lee Simpson, who comes to us we must do an honest assessment to determine if from a tour on board the USS John McCain in we are operating above or below the line. Then, Yokosuka, Japan. YNC Jeff Sellers served in we must have the courage to march up the four this crucial role for the past year, and he has steps to accountability: “See It”, “Own It”, “Solve moved back to his roots as our Administrative Department Head. We extend a special thank It”, and “Do It”. (see chart below from the OZ you to Chief Sellers as he helped keep our ship Principle) on course during some choppy waters. As the When everyone is accountable for transfer season is quickly approaching, we will achieving organizational results, the move from certainly have many new faces to greet and wish good to great is inevitable. I challenge each of you all those who will be departing a warm farewell. to examine yourselves and your team, and together we can take NCTS Sicily to the next It is a celebratory time here at level. The Command offers sailors the opportunity COMSTA as well. For the fourth time in five years, NCTS Sicily has won the 2012 Defense to participate in a 360 Assessment for personal Information Systems Agency (DISA) End Office Switch Award. This solidifies our rise to excellence and is a testament to all of your hard work and dedication. Your efforts did not go unnoticed. Also, it was recently announced that our very own LTJG Jeremy Hazelbaker won the 2013 US Navy Officer IT Leadership Award from the Washington, D.C. Chapter of the Armed Forces Communications and Electronics Association (AFCEA). This recognition is highly coveted within the Information Dominance Community. Well done, Shipmate! Along the note of spring renewal, I want to touch on the topics of self examination and accountability. As each and every one of us plays an integral role in the success of NCTS Sicily, it is important to routinely examine ourselves to look for ways to improve both personally and professionally. I recently


By Pietro Migliorini

Palermo In this issue we will continue with our visit to the City of Palermo, which as we mentioned in the April issue, is not measurable in a few bars of an informative article. We will begin with a visit of the Theatre Massimo Vittorio Emanuele that is named after King Vittorio Emanuele II, the first King of Italy, and the most largest opera house in Italy and the third largest in Europe after the Opera of Paris and the Vienna State Opera. The theater which can also be visited as a building of architectural merits, as well as a venue for representation of classical opera and symphonic orchestra, is by the architects Giovanni Battista Basile (Father) and Ernesto Basile (Son) that will take over the death of his father. The theater has a typical shape of a horseshoe with five tiers of boxes and a gallery with a capacity of three thousand five hundred people with extensions in the typical "Liberty" style in vogue in Europe at the end of the nineteenth century.. The Liberty otherwise known as "Art Nouveau" a floral style that derives from the French artistic and philosophical movement of the same name, and which takes its name from the department stores of London's Arthur Liberty monopolize the products show "Art Nouveau" throughout Europe and that from what is also called, precisely of "Liberty." We will continue the visit outside with the Piazza (Square) Pretoria, a monumental square called "The square of Shame" because of the nakedness of the statues. The square dates from 1573, the year in which the Senate of Palermo purchased the fountain originally intended to the city of Florence, but which was later placed where it is today with the addition of other decorative elements over time. (The statues ) for the note (Shame), that in the post unit were identified with the administration corrupt, and this by adding an additional meaning to the word shame. The square takes its name from Pretoria placement in front of the Praetorian Palace also known as the Palace of the Eagles and the Town Hall of the City of Palermo. I wish you an enjoyable visit to this landmark!!


May 2013 GMT Awardees

IT3 Hopkins LSSN Burks IT2 Hearndon IT3 Barsana IT3 Lilienthal IT3 Peters

NAM NAM EIDW EIDW EIDW EIDW

Creighton Cup

IT3 Hopkins

ET3 McGee IT3 Hopkins IT3 Lilienthal Isidoro Russo

LOC LOC LOC Civilian Service Award

Mentor of the Month

IT1 Espin Protégé - ITSN Roswell


If you ever spent any time around the Supply building, or needed to make a visit to DRMO, you undoubtedly met a friendly gentleman by the name of Mario. Mario has been a staple at NCTS Sicily, and is always ready to help out any way that he can. We recently caught up with Mario to ask him a little about himself!

First thank you for this opportunity. For all the years I have been working for the U.S. Government, I think that you must know that I am lucky to be a person that doesn't regret a second of his life, thanks to my second country, the USA. Because in these past years I have felt Italian and American every day that has gone by and this is a feeling that I hold very dear. What is your job function at NCTS? My job function is, as my title specifies, Personal Property Manager and credit card purchase agent for NCTS.

How long have you worked at NCTS Sicily? I have been working at NCTS since August 1983, that means 30 years!

What is your favorite memory about NCTS? My favorite memory is that in these past years I have met many military and civilians and on a personal property inspection coming from the USA, I met a female inspector Marilyn Ward from Columbus (Ohio) that I still have a great friendship with today. Anyway, when I went to Columbus, Ohio for my training I met from the first time I was in the States her mother that I have always called my America Mother because she was the greatest person I have ever known in my life. She has since passed away and I went to her funeral in Cadiz (Ohio), her birth town, where everyone knew why I was there because I was her Italian adopted son.

What is something not many people know about you? Most people do not know that I was born in South Africa (Cape Town) to Italian immigrated parents and came to live in Sicily when I turned 16.

If there was one place that Sailors should not miss on their tour in Sicily, what would it be? A place not to miss for Americans is the town ERICE, near Palermo. It’s full of history and located near Trapani, where the last Sailing Americans Vuiton Cup was held.


By: IT1 Greg Shreiner Asst. IAM

Many people around the world experienced what is being called the largest cyber attack in history on March 27th, 2013. A major network named Spamhaus was the target of a Denial of Service (DOS) attack from the group Cyberbunker. This was not your “normal” DOS attack Investigators found this attack to be using a much higher level of sophistication in attacking both the target and its Internet Service Providers (ISP’s). Because this attack focused on such a broad range of ISP’s it caused a global internet disruption. Experts said the attacks flooded Spamhaus servers with 300 billion bits per second (300 gigabytes) of data. Prior DoS attacks have been measured at 50 gigabytes per second. Because of the way Internet traffic flows, these DoS attacks created congestion and ripple effects around the Web. So what does this all mean to you as a member of NCTS? It means you are a warfighter on a new front in global warfare and the fight against terrorism, Cyber Warfare! It is not just System Administrators and Information Assurance teams who must be vigilant to threats, but also every single person in the Department of Defense. If you use a computer, you are on the front lines. Most everyone has heard of hacking and viruses, but not so much about who some of the major players behind these forms of attack? As long as there have been information systems with valuable or marketable data, there have been individuals who intend to overcome them. In the beginning these individuals designed their attacks to shut systems down, delete information, or just to see if they could pull it off. Today, though, these attacks have changed. It is no longer economical to conduct these attacks in the open. Most hacking and malicious logic is conducted covertly, because if an attack is discovered it can be stopped or for some, it can lead to jail. These new threats target systems to become imbedded, remain discreet, and to gather information. The attacks of today are capable of doing a myriad of operations such as gathering large amounts of information and sending it out in such small bursts of data that it is difficult to detect. These attacks can create screen shots of work in progress, turn on webcams, monitor network traffic, and map out network infrastructure. They can even turn on the recording devices on your cell phone via Bluetooth and begin pulling data or recording your conversations. Some attacks occur through browsers over time, assemble complex programs, bit by bit, on your computer, which, once assembled, perform complex espionage on your personal computer or the network you work on. Some examples of these types of attacks are easy to see. Just turn on your TV or look at your favorite news website. Every single day and every single hour there is a new Cyber Warfare attack occurring somewhere. Behind these attacks are individuals or groups using pseudonyms such as LulzSec or Anonymous. Who are these groups? To understand this you must go back to the heydays of the internet. One group, Anonymous, is a group of individuals known as a “hacktivist” group. They began their activities in 2003 on the website known as 4chan. From here their online community exploded initially with their opposition to Scientology and then to several other cyber attacks using DOS and website shutdowns including the Pentagon. They have been heavily involved in numerous counter government movements in countries such as Israel, Mexico, Syria, and also the United


Cont. from page 5

States. Although the motives of Anonymous are loosely connected, they spawned the emergence of a much more sophisticated and destructive group known as LulzSec. Since May 2011, LulzSec has been responsible for several of the highest level cyber attacks in recent history. Targets such as the FBI, CIA, DoD, and the US Senate were penetrated. Civilian and other governmental organizations were also hit. Using simple exploits such as password reuse across multiple platforms this group managed to shut down the Sony networks, Fox News, and even Automated Teller Machines (ATMs). They released thousands of user names and passwords for websites such as Facebook. Also military users of online dating websites had their accounts compromised, which could have possibly led to a compromise of their .mil accounts. Today this group has gone dormant, but the possibility of their emergence is always there, they may even be silently allied with other active groups. So now that you are sufficiently paranoid or we’ve scared you from using your internet what can you do to fight against these adversary forces? (1) First of all, start with keeping your passwords complex [12 or more alphanumeric and special characters combined], and (2) change them often. (3) Keep your antivirus software up to date on your personal computer systems*. (4) Finally, be aware of social engineering. It is much easier to gain information by simply asking for it rather than the complex methods required to forcibly infiltrate a system. Remember, the fight against cyber attacks is everyone’s responsibility! *DoD provides Antivirus software at no cost to U.S. Military and Government civilians to ensure they are safe at home and don’t forward compromised emails to the DoD enterprises. You can find Symantec Endpoint Protection on the NCTS Information Assurance Self Help page via the NCTS Sicily command SharePoint site. Email M-SI-NCTSINFORMATIONASSURANCE-GS@eu.navy.mil for any questions or information


The Navy is filled with diversity and every member of our great force is valuable no matter the race or sex. This month we celebrate Asian heritage month with honoring two shipmates from the past who helped our great force In different By ITSN Jesse Roswell

Name: Gordon R. Nakagawa Rank/Branch: O5/United States Navy, pilot Unit: Attack Squadron 196 Date of Loss: 21 December 1972 Country of Loss: North Vietnam Commander Nakagawa's distinguished career as a naval officer included flying 185 combat missions in the A-6 intruder during four combat deployments to Vietnam. In December 1972 his aircraft was struck by enemy fire, resulting in his being detained as a Prisoner of War in Hanoi. He was returned back to the United States on March 29, 1973. Captain Nakagawa was also a Commanding Officer of the Naval Air Station Pt. Mugu. He coordinated all major design competitions for Naval Aviation at Naval Air Systems Command, and in his final active duty assignment, he was Chair for Tactical Analysis at Naval Postgraduate School Monterey. During his service, Captain Nakagawa was awarded two Legions of Merit, two Bronze Stars, two Purple Hearts, two Meritorious Service Medals, Distinguished Marksman (Rifle) Medal, Distinguished Pistol Medal, POW Medal, and various other campaign, service and individual awards.

Name: Eleanor Marino Rank/Branch: O7/United States Navy Eleanor Mariano is the first Filipino American and graduate of the Uniformed Services University of Medicine to reach the rank of Rear Admiral in the U.S. Navy as well as the first woman to be the director of the White House Medical Unit. Mariano joined the U.S. Navy in 1977 and received a medical degree from the Uniformed Services University of Medicine in 1981. By 1991, Mariano was a commander and the division head of internal medicine and director of the internal medicine clinic at the San Diego Naval Hospital. Only a year away from being eligible for release from active duty, she was nominated by her commanding officer to serve as Navy physician to the White House Medical Unit. She joined the unit in June 1992, serving as a physician to President George H.W. Bush, and was about to be issued new orders to be director of the clinic at the Marine Corps Recruit Depot in San Diego when she was personally selected by the incoming President, Bill Clinton, to be White House Physician and director of the White House Medical Unit, which resulted in early promotion to captain on December 7, 1994. In the autumn of 1999, Mariano was nominated by the President to the rank of rear admiral (lower half); she was formally promoted on July 26, 2000 in a ceremony at the White House.


Address PSC 812 BOX 3290 FPO AE 09627-3290

Command Numbers CWO:

Sailor of the Quarter ET1 Ronnie Edwards

Junior Sailor of the Quarter IT2 Francis Buechler

COMM: 011-39-095-86-5553 DSN: 314-624-5553

QD: COMM: 011-39-095-86-5521 DSN: 314-624-5521

Website www.public.navy.mil/ fcc-c10f/navcomtelsta/ Pages/default.aspx

Bluejacket of the Quarter ITSN Jesse Roswell

April’s Navy Trivia Answers

Facebook Group: NCTS Sicily

Editors IT1 Shelly Espin IT2 Katie Dale ET3 Courtney Robson ITSN Jesse Roswell

Photographer IT1 Enderle Questions or comments?

IT1 Espin: 624-5551

1. USS Black Hawk (AD-9) 2. "Cast" Recovery - the ship made a wide turn causing a slick and the plane would land in the smooth water then come up on the sled. "Dog" recovery - the ship steered a steady course and the plane landed astern and them came up on the sled. 3. Patrol Bomber manufactured by Consolidated Air- craft Company. 4. The NC-4 - 1919. 5. USS HIGBEE (DD-806) 6. USS Nautilus (SSN-571) 7. USS Kearsarge (BB-5) 8. 1958 9. Radioman ( IT ) 10. USS George Washington (SSBN-598) 11. Hummer 12. GMCM Delbert Black 13. Submarine Warfare Insignia, usually known as “dolphins” or “fish” 14. Unity, Service, Navigation 15. Transiting the Suez Canal


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.