Irony in the Fire.” the Oddities of Sea Life and a Hoping to Collect Some of the We Review Protections Affecting Thousands of New Students

Total Page:16

File Type:pdf, Size:1020Kb

Irony in the Fire.” the Oddities of Sea Life and a Hoping to Collect Some of the We Review Protections Affecting Thousands of New Students Career College Central Career College Central CAREER COLLEGE CENTRALu The Definitive Voice of the Career College Sector of Higher Education www.CareerCollegeCentral.org 15500 W. 113th St., Suite 200 • Lenexa, KS 66219 Suite 200 • Lenexa, 113th St., 15500 W. CCA FIGHTS BACK The Career College Association takes on negative news stories and misreporting VOL. 4 EDITION 20 • MARCH/APRIL 2010 VOL. 4 EDITION 20 • MARCH/APRIL IRONY EMERGING IN THE GIANT? Two business powers align in hopes of creating a new online education force THE STUDENT DEBT CRISIS STOPS HERE FIRE No more middleman in student borrowing Obama’s selection of a University of Phoenix grad SPECIAL SECTION for key post complicates his education platform COHORT DEFAULT RATE DATA Industry analysts pour through the numbers to assess what CDR really shows AMBASSADOR REDEFINES, REINVENTS AND REDIRECTS SourceOne Proprietary supply chain software designed to manage student transactions Outsource Your Bookstore Requirements to Ambassador We make it that simple. Turnkey Bookstore Solutions Our full array of marketing services is a proven formula • Brick-and-mortar bookstores for effectively contacting and converting your leads to • Virtual, online bookstores satisfied students. On-demand variable printing, call center • Auto-fill services solutions and integrated web services are all delivered to Enhance Your Lower the right person, at the right time, with the right message. Brand’s Image Costs At InfoCision, we’re expanding our services to provide you Improve Generate with a simple solution for all of your student recruitment and Efficiency Revenue retention needs. Your Partner in Premier Bookstore Solutions Steve Boyazis, Executive Vice President • 330-670-4777 www.infocision.com 160 Finn Court, Farmingdale, New York 11735 800-431-8913 • www.ambassadorbookstores.com Established in 1982, we are your proven marketing experts. ACBKS-80003 • Job# 8003 • FP 4C • 8.5" W x 11" H • Bleed AD • EGC Group 516.935.4944 AMBASSADOR REDEFINES, REINVENTS AND REDIRECTS SourceOne Proprietary supply chain software designed to manage student transactions Outsource Your Bookstore Requirements to Ambassador We make it that simple. Turnkey Bookstore Solutions Our full array of marketing services is a proven formula • Brick-and-mortar bookstores for effectively contacting and converting your leads to • Virtual, online bookstores satisfied students. On-demand variable printing, call center • Auto-fill services solutions and integrated web services are all delivered to Enhance Your Lower the right person, at the right time, with the right message. Brand’s Image Costs At InfoCision, we’re expanding our services to provide you Improve Generate with a simple solution for all of your student recruitment and Efficiency Revenue retention needs. Your Partner in Premier Bookstore Solutions Steve Boyazis, Executive Vice President • 330-670-4777 www.infocision.com 160 Finn Court, Farmingdale, New York 11735 800-431-8913 • www.ambassadorbookstores.com Established in 1982, we are your proven marketing experts. ACBKS-80003 • Job# 8003 • FP 4C • 8.5" W x 11" H • Bleed AD • EGC Group 516.935.4944 interest in your school with exciting experiential Bigger learning and celebrity instructors! retention with proven curricula featuring C Better capstone events! Stronger enrollments that increase Jay Cutler Two-Time Mr. Olympia graduation rates! Our student-centeredBeth Horn programs American Gladiators’ offer Venom exciting challenges unlike any other! Contact us now to find out more! Jen Hendershott Two-Time Miss Olympia 702-434-8940 Capstone Education Marketing offers relevant [email protected] programs that will help you attract interest, increase enrollment and improve graduation rates. • We offer high-demand programs so you can attract more students. • Our courses offer a unique blend of labs, lectures and externships resulting in more enrollments. • We deliver exciting capstone events at the end of each program, boosting retention and graduation rates. BUSINESS Subscribe at www.CareerCollegeCentral.com | 1 www.CapstoneEducationMarketing.com COntents Feature stories 6 burnOut before graduation Better graduation rates are on the University of Phoenix’s to-do list. The university tweaks its open admissions policy with an eye toward retention and how the changes could alter their image on Wall Street and in the higher education community. 34 CCa fights baCk Take that, mainstream news media! Issuing what might be its most combative responses ever, the Career College Association responds to news outlets either misrepresenting or wrongly reporting about the career education sector. news 8 the student debt CrIsIs stOps here Student borrowers now have another safety net with the Student Aid and Fiscal Responsibility Act, which eliminates On the Cover 24 the need for the private middleman in moving money from the Scrutiny hit President Barack Obama his first year federal government to the students. in office for making bold decisions that netted only 17 bOOk revIeW lukewarm results. He firmly established his position on several important issues, spending billions on bank 52 prOteCtIng Police Dogs and automotive bailouts, pushing for a healthcare bill, After a police dog's death, students enrolled in Argosy and eventually setting his sights on job creation, all to University, Twin Cities' Veterinary Technology program little effect. His education platform as seen through the volunteer their time and skills in helping the Minneapolis Police eyes of career education professionals, though, lacks Department’s canine unit. more in clarity than it does impact. The President’s selection of a University of Phoenix graduate for a 60 emergIng Giant? Cybersecurity Coordinator post is an ironic move for Make room for the newest force in the online education realm an administration that has cracked down on for-profit as the AFL-CIO and The Princeton Review bring National schools and the Apollo Group, which owns the nation’s largest university. The Obama administration’s logic Labor College online through relationships with a potential comes under fire in our cover story. 11.5 million students. 64 press releases Columns 70 makIng headlInes 72 baCk taxes Sensing an imminent political defeat, Pittsburgh Mayor Luke 12 medIa medItatIOn Ravenstahl calls off his proposed 1-percent Fair Share tuition 41 InsIde vIeW tax that would have impacted both nonprofit and for-profit colleges in the city. 59 traInIng FOr perFOrmanCe 74 retentIOn In every Issue 18 IMAGIne amerICa FOUNDATIOn subscribe now! 49 blOg bIts Career College Central grants you access to: • Insightful operations tactics from sector experts 76 Where are they now? • student stories • Industry research and analysis Only $79 for an annual subscription and $39 for additional subscriptions. ContactMARCH Us Today!2010 |Call 2 913.254.6771 or email [email protected] Contributed articles CAREER COLLEGE 14 abIlIty tO benefit and admIssions testIng In general by glenn Bogart CENTRAL Numbers don’t lie, but they can be misleading. An in-depth sO yOu Want tO sell yOur sChOOl analysis of graduation and retention rates involving Ability to Making the choice to sell your school isn’t easy. Benefit students provides a contrast to popular opinion. www.CareerCollegeCentral.com Actually going through the process of acquisi- tion can be even more difficult. Bruce McClintock 22 prOteCtIng Your reputation In a user- Publisher/Editor generated envIrOnment by eric brIdges helps you make surekevin all of k uzmayour bases are covered. Nasty comments that users tend to post on social media [email protected] pages have scared some career colleges from creating USPs, pOds and peeps active online presences. But Facebook, Twitter and other Creative Director Okay, okay! Enoughlaura with a ndersonthe acronyms. Dr. Jean popular online social sites can actually be a way to protect Norris, a Managing Partner with Norton-Norris Inc., your school’s image, not see it tarnished. explains why yourAssociate school’s unique Editor selling point isn’t so unique, no matterJenni what v alentinoacronym you slap on it. 30 the InCreasIng Power of the student COnsumer by JustIn McMorrow COmmunicatioGraphicn breakd Designerown Students now have more say in their educational bryan long Make sure that you’re hiring the best candidates experience than ever before. Improving that experience for your school’s open positions. Learn where com- comes down to being able to readily access all data and Columnists mon communication breakdowns occur in the hiring information about those students. Jonathan liebman amir moghadam the FIve levels of Why by gregg meIklejohn ryan Irwin 38 loren kroh Based on a Japanese word and English philosophy, the concept of Kaizen can help career colleges and other Staff Writers businesses to concentrate on continual improvement to kelly duffy unlock business challenges. sarah skelnik david knopf 42 skeWed statIstics by danIel bennett Closer examination of the statistical evidence suggests that Copy Editors proprietary education’s Cohort Default Rates are not as bad mike athey as they were reported by the mainstream news media. monica buntin erin Cockman 46 Does Your resume Open Doors … Or ClOse rebecca Coffindaffer them? by LouIse garver nate mcginnis Sharpen your pencils … ring your hands out for the Subscriptions Manager keyboard. More than likely, your resume needs some work. Chris rueter It’s likely it might even be closing more doors of opportunity [email protected]
Recommended publications
  • Considering the Planks of U.S. International Cyber Policy, 2005-2011
    JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY FROM TUNIS TO TUNIS: CONSIDERING THE PLANKS OF U.S. INTERNATIONAL CYBER POLICY, 2005–2011 BY CHRISTOPHER BRONK, PH.D. FELLOW IN INFORMATION TECHNOLOGY POLICY JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY MAY 21, 2012 Considering the Planks of U.S. International Cyber Policy THESE PAPERS WERE WRITTEN BY A RESEARCHER (OR RESEARCHERS) WHO PARTICIPATED IN A BAKER INSTITUTE RESEARCH PROJECT. WHEREVER FEASIBLE, THESE PAPERS ARE REVIEWED BY OUTSIDE EXPERTS BEFORE THEY ARE RELEASED. HOWEVER, THE RESEARCH AND VIEWS EXPRESSED IN THESE PAPERS ARE THOSE OF THE INDIVIDUAL RESEARCHER(S), AND DO NOT NECESSARILY REPRESENT THE VIEWS OF THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY. © 2012 BY THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY OF RICE UNIVERSITY THIS MATERIAL MAY BE QUOTED OR REPRODUCED WITHOUT PRIOR PERMISSION, PROVIDED APPROPRIATE CREDIT IS GIVEN TO THE AUTHOR AND THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY. 2 Considering the Planks of U.S. International Cyber Policy Abstract How have U.S. policies on the governance of the Internet and cyberspace evolved between the 2005 World Summit of the Information Society (WSIS) in Tunisia and the massive, cyber-fueled uprisings in the Middle East of 2011? The paper develops a framework of possible actions regarding Internet or cyber governance to produce contexts for the timeline of significant policy statements by U.S. government officials and agencies on the topic. In the resulting narrative, Internet governance policy rises from a relatively marginal issue for the foreign policy establishment to a significant component of U.S.
    [Show full text]
  • Cyberpro December 31, 2009
    Volume 2, Edition 26 CyberPro December 31, 2009 Keeping Cyberspace Professionals Informed Officers The articles and information appearing herein are intended for President educational purposes to promote discussion in the public interest and to Larry K. McKee, Jr. keep subscribers who are involved in the development of Cyber-related concepts and initiatives informed on items of common interest. The Chief Operations Officer newsletter and the information contained therein are not intended to Jim Ed Crouch provide a competitive advantage for any commercial firm. Any misuse or unauthorized use of the newsletter and its contents will result in removal ------------------------------ from the distribution list and/or possible administrative, civil, and/or CyberPro Editor-in-Chief criminal action. Lindsay Trimble The views, opinions, and/or findings and recommendations contained in CyberPro Research Analyst this summary are those of the authors and should not be construed as an Kathryn Stephens official position, policy, or decision of the United States Government, U.S. Department of Defense, or National Security Cyberspace Institute. CyberPro Archive To subscribe or unsubscribe to this newsletter click here CyberPro News Subscription. Please contact Lindsay Trimble regarding CyberPro subscription, sponsorship, and/or advertisement. All rights reserved. CyberPro may not be published, broadcast, rewritten or redistributed without prior NSCI consent. 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace
    [Show full text]
  • And the Winners Are... BOTTLENECK.GOV
    VOLUME 25 • NUMBER 6 • 25 VOLUME FCW.COM Strategy and Business Management for Government Leaders | March 28, 2011 FCW.COM And the winners are... BOTTLENECK.GOV SOLVED. Today, government agencies rely on optimized connectivity. We get it. With dedicated account managers, solution architects and partnerships with leading vendors like Cisco, Brocade and Avaya,wecanhelpyoudesignandbuildasolutionthat’sfast,flexibleandsecure.Onenetwork, reliable, with bandwidth and communication for all. Get things moving at CDWG.com/networking ©2011CDWGovernmentLLC.CDW®, CDW•G® andPEOPLEWHOGETIT™aretrademarksofCDWLLC. Rising to the challenge...again his year’s Federal 100 awards be it the earthquake in Haiti or the Deep- program is a reminder that water Horizon oil spill — when time is excellent work goes on, even of the essence and options are limited. It’s in the toughest of times. the art of the possible raised to its highest TAnd times were tough in 2010, make no form. mistake about that. Civilian agencies and Federal 100 winners oft en seem to look their contractors felt the pinch of budget at the world from a unique perspective. It’s uncertainty as the year progressed and not that they don’t see obstacles. But they Congress could not reach agreement on come at problems from a slightly diff erent an appropriations bill. Many defense agen- angle. Th ey see ways around obstacles that cies also faced austere times, as two wars others might have missed. Th at vision and continued to demand a steady fl ow of their ability to share it is what makes them resources. Yet the 2011 Federal 100 award leaders.
    [Show full text]
  • Conference Speakers
    Cyber Defense and Disaster Recovery Conference 2011: Securing the Human Speakers and Topics Howard Schmidt, CISSP, CSSLP Special Assistant to the President and Cybersecurity Coordinator Howard A. Schmidt has had a long distinguished career in defense, law enforcement, and corporate security spanning more than 40 years. He brings together talents in business, defense, intelligence, law enforcement, privacy, academia and international relations through his distinguished career. He currently is Special Assistant to the President and the Cybersecurity Coordinator for the federal government. In this role Mr. Schmidt is responsible for coordinating interagency cybersecurity policy development and implementation and for coordinating engagement with federal, state, local, international, and private sector cybersecurity partners. Previously, Mr. Schmidt was the President and CEO of the Information Security Forum (ISF). Before ISF, he served as Vice President and Chief Information Security Officer and Chief Security Strategist for eBay Inc. He also served as Chief Security Strategist for the US-CERT Partners Program for the Department of Homeland Security. Before eBay, he served as the Vice Chair of the President’s Critical Infrastructure Protection Board and as the Special Adviser for Cyberspace Security for the White House. Prior to the White House, Howard was Chief Security Officer for Microsoft Corp., where his duties included Chief Information Security Officer, Chief Security Officer, and forming and directing the Trustworthy Computing Security Strategies Group. Mr. Schmidt is recognized as one of the pioneers in the field of computer forensics and computer evidence collection. Mr. Schmidt's government experience includes work with the Air Force Office of Special Investigations (AFOSI) Computer Forensics Lab and Computer Crime and Information Warfare Division, the FBI at the National Drug Intelligence Center, and the Chandler Police Department in Arizona.
    [Show full text]
  • Smartly Engaging Selected Aspects of Overall U.S. Counterterrorism Strategy: an Emphasis on Domestic Terrorism, Foreign Policy and Cybersecurity
    SMARTLY ENGAGING SELECTED ASPECTS OF OVERALL U.S. COUNTERTERRORISM STRATEGY: AN EMPHASIS ON DOMESTIC TERRORISM, FOREIGN POLICY AND CYBERSECURITY by Nicholas Urbonowicz A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts in Government Baltimore, Maryland May 2021 © 2021 Nicholas Urbonowicz All Rights Reserved Abstract Not unlike the threats it strives to avert, counterterrorism strategy evolves and adapts to changing conditions. Given that terrorism is an ever-present threat to our national interests – security, prosperity, and values – one could reasonably prescribe a deductive logic-driven counterterrorism strategy whereby resources and capabilities focus on threats as they exist. In a representative democracy, elected officials or those appointed and confirmed by elected officials possess the authority to develop policies and strategies to further national interests. These men and women maintain varying worldviews, political ideologies, and specific interests that combine to influence not only how the United States contends with threats, but how it defines them. Strategies and policies are subject to varying degrees of Congressional approval and judicial review, but the simplest measurement of effectiveness may just be a measurement of elected officials’ performance. Should a prevailing strategy prove ineffective, detrimental to the United States’ interests, or even unpopular, its architects will face electoral consequences. This work examines U.S. counterterrorism strategy as an aspect of domestic security, foreign policy, and cyber security, attempting to illuminate how and where politics caused otherwise avoidable setbacks that delayed or prevented the United States from achieving its basic stated objective: security. The primary contribution of this work is the development of policy prescriptions informed by reflective analysis.
    [Show full text]
  • Gary E. Mcgraw, Jr
    Gary E. McGraw, Jr. Synopsys 21351 Ridgetop Circle, Suite 400 Dulles, VA 20166 (703) 404-9293 e-mail: [email protected] http://garymcgraw.com EMPLOYMENT HISTORY Winter 2016–present Synopsys, Software Integrity Group, Mountain View, CA Winter 2016–present Vice President Security Technology Fall 1995–Winter 2016 Cigital, Inc., Dulles, VA Summer 2001–Winter 2016 Chief Technology Officer Summer 1998–Summer 2001 Vice President, Corporate Technology Fall 1995–1998 Research Scientist / Senior Research Scientist Summer 1996–Winter 1999 Krasnow Institute Associate Krasnow Institute for Advanced Study, George Mason University, Fairfax, VA Summer 1990–Fall 1995 Researcher Center for ResearcH on Concepts and Cognition, Indiana University, Bloomington, IN Fall 1993–Fall 1994 Researcher Istituto per la Ricerca Scientifica e TecHnologica, Trento, Italia Fall term 1994 and Spring term 1993 Visiting Assistant Professor of Computing Science EarlHam College, RicHmond, IN Course: Programming Languages Fall 1988–Spring 1990 Associate Instructor Computer Science Department, Indiana University, Bloomington, IN TaugHt courses in ScHeme, Pascal, and Assembly Language 1985–1989 President M2 Computing, Inc., Kingsport, TN EDUCATION 1995 Ph.D., Computer Science and Cognitive Science Indiana University, Bloomington, IN Dissertation: Letter Spirit: Emergent HigH-Level Perception of Letters Using Fluid Concepts Advisor: Douglas R. Hofstadter 1990 M.S., Computer Science Indiana University, Bloomington, IN 1988 B.A., PHilosopHy (Minor: MatHematics and Scientific Computing) University of Virginia, Charlottesville, VA 1 BOARD MEMBERSHIPS CURRENT Ntrepid, Herndon, VA. Technical Advisory Board, CHairman, 2016—. Max Financial Corporation, New York, NY. TecHnical Advisory Board, 2013—. Raven White, Palo Alto, CA. Advisory Board, 2006—. School of Informatics Dean’s Advisory Council, Indiana University, Bloomington, IN, 2005—.
    [Show full text]
  • Electronic Crime Needs Assessment for State and Local Law Enforcement U.S
    U.S. Department of Justice Office of Justice Programs National Institute of Justice National Institute of Justice Research Report Electronic Crime Needs Assessment for State and Local Law Enforcement U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531 Office of Justice Programs National Institute of Justice World Wide Web Site World Wide Web Site http://www.ojp.usdoj.gov http://www.ojp.usdoj.gov/nij Electronic Crime Needs Assessment for State and Local Law Enforcement Hollis Stambaugh David S. Beaupre David J. Icove Richard Baker Wayne Cassaday Wayne P. Williams March 2001 NCJ 186276 Project Management Team National Institute of Justice Saralyn Borrowman Amon Young TriData Corporation Hollis Stambaugh Teresa Copping U.S. Department of Justice Wayne P. Williams (retired) U.S. Department of State David S. Beaupre U.S. Navy Space and Naval Warfare Systems Center, Charleston, Security Department Wayne Cassaday Richard Baker U.S. Tennessee Valley Authority Police David J. Icove This program was supported under award number 98–DT–R–076 to the Tennessee Valley Authority by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Findings and conclu- sions of the research reported here are those of the authors and do not necessarily reflect the official posi- tion or policies of the U.S. Department of Justice. The National Institute of Justice is a component of the Office of Justice Programs, which also includes the Bureau of Justice Assistance, the Bureau of Justice Statistics, the Office of Juvenile Justice and Delinquency Prevention, and the Office for Victims of Crime.
    [Show full text]
  • USSC Symposium on Federal Sentencing Policy for Economic
    Appendix A Speaker Biographies A-1 Speaker Biographies NORMAN R. AUGUSTINE Chair, Executive Committee, Lockheed Martin Corporation Norman R. Augustine attended Princeton University where he graduated with a B.S.E. in Aeronautical Engineering magna cum laude, an M.S.E., and was elected to Phi Beta Kappa, Tau Beta Pi and Sigma Xi. In 1958, he joined the Douglas Aircraft Company where he held titles of program manager and chief engineer. Beginning in 1965, he served in the Pentagon in the Office of the Secretary of Defense as an assistant director of defense research and engineering. Joining the LTV Missiles and Space Company in 1970, he served as vice president, advanced programs and marketing. In 1973 he returned to government as Assistant Secretary of the Army and in 1975 as Under Secretary of the Army. Joining Martin Marietta Corporation in 1977, he served as chairman and CEO from 1988 and 1987, respectively, to 1995, having previously been president and chief operating officer. He served as president of Lockheed Martin Corporation upon the formation of that company in 1995, and became its chief executive officer on January 1, 1996, and later vice chairman and chairman. He currently serves as chairman of the executive committee of Lockheed Martin, having retired as an employee on August 1, 1997. After his retirement, Mr. Augustine became a lecturer with the rank of professor on the faculty of the Princeton University School of Engineering and Applied Science where he served until July of 1999. Mr. Augustine is in his ninth year as chairman and principal officer of the American Red Cross and is a former chairman of the National Academy of Engineering and a former president of the Boy Scouts of America.
    [Show full text]
  • Hardening the Internet Final Report and Recommendations
    NATIONAL INFRASTRUCTURE ADVISORY COUNCIL HARDENING THE INTERNET FINAL REPORT AND RECOMMENDATIONS BY THE COUNCIL October 12, 2004 GEORGE H. CONRADES WORKING GROUP CHAIR CHAIRMAN AND CHIEF EXECUTIVE OFFICER AKAMAI TECHNOLOGIES ACKNOWLEDGEMENTS Mr. George Conrades wishes to thank the members of the Working Group and Study Group who have contributed to this effort, as well as others who have supported us by sharing their wealth of knowledge. These individuals and companies represent some of the luminaries of the Internet industry, and this report would not have been possible without their continuous support. Contributors: Working Group Members: George Conrades, Akamai John Chambers, Cisco Margaret Grayson, V-ONE Alfred Berkeley, Pipeline Trading Systems Study Group Members: Bora Akyol, Cisco Vint Cerf, MCI John L. Clarke III, US-CERT Andy Ellis, Akamai Noam Freedman, Akamai Adam Golodner, Cisco Barry Greene, Cisco Deb Miller, V-ONE Bob Mahoney, Zanshin Security J. Scott Marcus, Senior Advisor to FCC Mike Petry, MCI Jeff Schiller, MIT Howard Schmidt, eBay Marty Schulman, Juniper Rick Waddell, MSN Ken Watson, Cisco Lee Zeichner, GMU Department of Homeland Security Support: Gail Kaufman Brett Lambo Tim McCabe Nancy Wong Additional Study Group Resources: Pete Allor, ISS Matt Bishop, UC-Davis Steve Crocker, Shinkuro, Inc. Sean Convery, Cisco Page 2 of 28 Sean Donelan, SBC Matt Korn, AOL Charles LeGrand, IIA Gerry Macdonald, AOL Paul Vixie, ISC Page 3 of 28 TABLE OF CONTENTS ACKNOWLEDGEMENTS........................................................................................................
    [Show full text]
  • Quest for Cyber Peace
    THE QUEST FOR CYBER PEACE Contact Information: Corporate Strategy Division International Telecommunication Union Place des Nations - 1211 Geneva 20 Switzerland E-mail: [email protected] Website: www.itu.int/cybersecurity Printed in Switzerland Geneva, January 2011 January 2011 | PEACE PEACE FOR CYBER CYBER FOR T THE QUES International Telecommunication Union THE QUEST FOR CYBER PEACE By Dr Hamadoun I. Touré Secretary-General of the International Telecommunication Union and the Permanent Monitoring Panel on Information Security World Federation of Scientists January 2011 Legal notice Authors individually retain copyright to their work. Third-party sources are quoted as appropriate. The International Telecommunication Union (ITU) is not responsible for the content of external sources including external websites referenced in this publication. Neither ITU nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication. Disclaimer The chapters in this publication represent the views of the individual authors, which are not endorsed by or intended to represent the views of any organization they may be employed by or affiliated with. Mention of and references to specific countries, companies, products, initiatives or guidelines do not in any way imply that they are endorsed or recommended by ITU, the authors, or any other organization that the authors are affiliated with, in preference to others of a similar nature that are not mentioned. Acknowledgements The ITU Secretary-General and the World Federation of Scientists would like to thank Jody Westby, Henning Wegener, and all the authors who have made it possible to put together their views on this emerging global concern.
    [Show full text]
  • Administration Says It Will Give Industry and Academia Heads up on Cyberattacks
    Volume 10, Issue 3, January 21, 2011 Administration Says It Will Give Industry And Academia Heads Up On Cyberattacks The Obama administration will provide universities and businesses with government intelligence. By Aliya Sternstein, nextgov.com The Obama administration will provide universities and businesses with government intelligence and law enforcement information about malicious Internet activities so that they can protect their critical assets, the president's cyber czar said on Tuesday. "I think we all recognize that the government has unique access to information," Howard Schmidt, cybersecurity coordinator and special assistant to the president, told congressional staff, policymakers and interest groups at a Washington conference. "We need to continue to look for ways to share that information, but also give our universities and our businesses information to be able to protect them- selves." Recent history is rife with examples where such disclosures could prove helpful. The intelligence community is privy to information about foreign governments, such as China, that Americans fear could be trying to extricate intellectual property from technology firms or research institutions. The FBI, in the past, has learned of holes in automated banking security, which it then told 4,000 financial sector organizations about so they could shore up systems before hackers exploited the vulnerabilities. Figure of the week Schmidt also addressed a forthcoming public-private initiative to create secure online identities that has riled some privacy advocates. The National Strategy for Trusted Identities in Cyberspace aims to provide people with a means of verifying who they are interacting with when they conduct online transactions. Critics liken the concept of Internet IDs to a national identification card that the 59% government will use to track the activities of everyone online.
    [Show full text]
  • Center for Strategic and International Studies (CSIS)
    Center for Strategic and International Studies (CSIS) Rethinking Identity Management Keynote Moderators: Rick “Ozzie” Nelson, Director of the Homeland Security, CSIS; Brian Seagrave, Vice President for Homeland Security, Raytheon Speaker: Howard Schmidt, Cyber-Security Coordinator for the Obama Administration Location: B-1 Conference Room, Center for Strategic and International Studies, Washington, D.C. Time: 9:30 a.m. EST Date: Tuesday, January 31, 2012 Transcript by Federal News Service Washington, D.C. RICK “OZZIE” NELSON: OK. Well, welcome everyone. We’re going to go ahead and get started on time. Hopefully everyone has got something to eat and a beverage in front of them. We’ve got a great conference today on a very interesting, fascinating and important topic. My name is Rick “Ozzie” Nelson. I’m director of the Homeland Security and Counterterrorism program here at CSIS. We’re nonprofit at CSIS, so we’re really dependent upon outside supporters to make terrific events like this happen. So first thing I need to do is to thank our sponsor for today’s event, is Raytheon. With that, I’d like to introduce the – one of our – the senior – the vice president for homeland security, Brian Seagrave. He’s going to come up here and introduce our special guest, Mr. Howard Schmidt, special assistant to the president for cyber. He is on a very tight timeline. We’re actually thrilled that he made time in his schedule to come over here and give us some remarks. He’s going to do about 20 minutes of remarks followed by about 10 minutes of questions and answers, moderated by me.
    [Show full text]