• Please take a moment and update your account profile. If you have an updated account profile with basic information on why you are on Air Warriors it will help other people respond to your posts. How do you update your profile you ask?

    Go here:

    Edit Account Details and Profile

Navy Websites

Sabre170

Active Member
None
Why are Navy Websites so lame? Look around at different squadron’s websites and most that I have looked at show bios and some text about how to check in? One of the worst sites (IMHO) is the Navy OCS site. You would think recruiting would help fund a better site to help with the recruiting effort. Were sites before 9/11 more informative and better quality?
 

Steve Wilkins

Teaching pigs to dance, one pig at a time.
None
Super Moderator
Contributor
Why are Navy Websites so lame? Look around at different squadron’s websites and most that I have looked at show bios and some text about how to check in? One of the worst sites (IMHO) is the Navy OCS site. You would think recruiting would help fund a better site to help with the recruiting effort. Were sites before 9/11 more informative and better quality?
Some were. But they were and still continue to be....an afterthought.
 

Gatordev

Well-Known Member
pilot
Site Admin
Contributor
Back around '99 there was also a big push for INFOSEC on all DOD (or at least DON) computers. Not that military web design was stellar back then, but they made everyone take off a lot of info that was on a DON server/machine. The maximum allowable personal info was CO/XO/CMC. No other emails or bios were allowed except for the webmaster.
 

Gatordev

Well-Known Member
pilot
Site Admin
Contributor
It's interesting you mention that, as about the time of '99, a buddy of mine was working for Raytheon (or whatever they were called) and part of the proto-NMCI project. He routinely talked about all the "probing" that was going on at the time by both N. Korea and China. Shortly afterwards, I got broadband and had a software firewall set up to log the "attacks." Sure enough, lots of IPs from the east.

I know it's nothing new nowadays, but it is interesting that it's a continued issue.
 

phrogdriver

More humble than you would understand
pilot
Super Moderator
Besides the huge bureaucratic red-ass, not to mention the NMCI pain, there's also the fact that few people have the time to waste on a squadron website that really won't be used by the squadron. Keeping the really useful stuff for members, e.g. the flight sked, squadron rosters, etc, really does breach INFOSEC, plus would require a real webmaster to keep current. The good PR stuff, like cool flash videos, etc, just is too much work for a regular unit whose business isn't recruiting.
 

Flash

SEVAL/ECMO
None
Super Moderator
Contributor
It's interesting you mention that, as about the time of '99, a buddy of mine was working for Raytheon (or whatever they were called) and part of the proto-NMCI project. He routinely talked about all the "probing" that was going on at the time by both N. Korea and China. Shortly afterwards, I got broadband and had a software firewall set up to log the "attacks." Sure enough, lots of IPs from the east.

I know it's nothing new nowadays, but it is interesting that it's a continued issue.

It is not just probing, the scale and the scope as well as the targeting are breathtaking when you learn about it.........:eek:
 

HooverPilot

CODPilot
pilot
Super Moderator
Contributor
**Threadjack**
Does anyone know what instruction prevents us from e-mailing the flight schedule out everyday? Or prevents from posting it on the website in a password protected fashion? Thanks!

**/Threadjack**
 

HH-60H

Manager
pilot
Contributor
**Threadjack**
Does anyone know what instruction prevents us from e-mailing the flight schedule out everyday? Or prevents from posting it on the website in a password protected fashion? Thanks!

**/Threadjack**

That was always a question back when I was skeds/aops, but I was never able to find an instruction that specifically covered this. I would guess it would fall under the general category of OPSEC.
 

Steve Wilkins

Teaching pigs to dance, one pig at a time.
None
Super Moderator
Contributor
**Threadjack**
Does anyone know what instruction prevents us from e-mailing the flight schedule out everyday? Or prevents from posting it on the website in a password protected fashion? Thanks!

**/Threadjack**
Probably the same instruction that says the CO is the boss.
 

Gatordev

Well-Known Member
pilot
Site Admin
Contributor
**Threadjack**
Does anyone know what instruction prevents us from e-mailing the flight schedule out everyday? Or prevents from posting it on the website in a password protected fashion? Thanks!

**/Threadjack**

CNATRA recently had this issue come up. The problem was that their online flight schedule (which is damn near a necessity) didn't jive w/ the security/password protocols of the Navy/DOD. So the decision was made to make the flight skeds open w/ the understanding that if anything happens (mishap-wise), there was someone to call 24 hours a day to shutdown the web server in Corpus. Apparently that's been okay ever since.

It is not just probing, the scale and the scope as well as the targeting are breathtaking when you learn about it.........

Yeah, perhaps I understated it a bit. He mentioned at the time that DOS attacks and the like were common as well.
 
Top