Author Topic: List of real terrorists-proponents of unconstitutional National Security State  (Read 4475 times)

0 Members and 1 Guest are viewing this topic.


  • Guest

Danny Allan

Danny Allan is a Security Analyst with Waltham-based Watchfire, a provider of Online Risk Management software and services to monitor and report online security, privacy, quality, and compliance risks. Danny joined Watchfire in 2000 bringing with him several years of business and technology-related experience including penetration testing and internal system remediation for one of Canada's biggest universities.

In his role as security analyst, he is closely involved with enterprise global customer deployments, researching and evaluating technologies and helping define and recommend strategic directions for Watchfire's security solutions. In his five years with Watchfire, Danny has held several critical customer- facing positions, including Team Lead, Consulting Services and Sales Engineer. Danny has published several whitepapers and articles and participates in industry working groups. He has also spoken at security events and is often called upon for his opinions regarding web application security. Danny holds a Bachelor of Commerce with a major in Information Systems from Carleton University

Edward G. Amoroso
Vice President
AT&T Chief Security Officer and
AT&T Client Executive for the State of New York

Dr. Amoroso's present role involves leading the corporate-wide global network security protection initiatives for AT&T. This involves 7 by 24 protection of AT&T's vast IT and network infrastructure base. It involves management of several hundred security specialists, engineers, analysts, and developers charged with building security services for AT&T and its clients. Ed's team supports active military-style protection for AT&T round-the-clock, including best-in-class services for firewall management, intrusion detection, anti-virus services, managed authentication, and PKI.

Ed held a previous position as Technical Division Manager in AT&T Laboratories in affiliation with AT&T Government Markets, National Information Systems. In that role, Ed led a large team of security engineers located around the country that were responsible for research and development in intrusion detection, emerging data network service security infrastructure design, Internet and intranet security engineering, public key technology and infrastructure issues, Internet and intranet firewall and router integration, and client/server authentication techniques.

During his 19 years with AT&T, Ed has been involved in a variety of different computer and network security projects. He helped engineer the security-enhanced UNIX System V/MLS operating system which underwent formal B1 Orange Book certification in 1989. He was chief author of the Trusted Software Development Methodology created for the Ballistic Missile Defense Organization in the late 1980s. He was also lead security engineer on the development of the US Army's Sustaining Base Information Services (SBIS) massive network infrastructure.

In addition to his duties at AT&T, Ed has also written or co-authored a large number of scientific papers and three books, the latest one entitled "Intrusion Detection - An Introduction to Internet Surveillance, Correlation, Traps, Trace-Back, and Response" (1999). A fourth book on protecting national infrastructure from cyber attack is expected later in 2006. He is a frequent lecturer around the world on topics related to the Internet and network security. Ed also has held an active adjunct faculty position in the Department of Computer Science at the Stevens Institute of Technology, Hoboken, NJ since 1989.

Michael Assante
Idaho National Labs

Michael J. Assante, a recognized security and infrastructure protection visionary and new product development leader, brings a powerful combination of leadership/domain experience, technological vision and strategy development to the Idaho National Lab (INL). Prior to assuming his strategic leadership position at INL, Mr. Assante was a Vice president and Chief Security Officer at American Electric Power, the largest generator of electric power in the US, serving five million customers in eleven states.

He provided leadership, developed and implemented strategies to enhance security and business continuity for AEP; he was also responsible for protecting and maintaining corporate facilities, critical operating assets and property; and ensured the security and continued preservation of all corporate information and proprietary data and the technology that supports it. Selected for outstanding contribution at the RSA 2005 Conference and awarded the outstanding achievement in the practice of security within an organization.

He has been recognized by SC Magazine among all Chief Security Officers as one of two finalists for the global 2005 awards as CSO of the year. He was selected as a finalist for Information Security Executive of the Year of the Midwest in 2005. In 2003, Mr. Assante was awarded best governance program “The Best of the Best – Best Governance Program,� Information Security Magazine, December 2003 for the establishment of an enterprise executive security committee.

Rohyt Belani

Rohyt Belani is the Director of Proactive Security at Mandiant. He is a contributing author for Osborne's Hack Notes - Network Security, as well as Addison Wesley's Extrusion Detection: Security Monitoring for Internal Intrusions. Mr. Belani is a regular speaker at industry conferences and forums including OWASP, HTCIA, FBI-Cyber Security Summit, ASIS, New York State Cyber Security Conference, HackInTheBox-Malaysia, and CPM. In addition he is a columnist for online publications such as Securityfocus and SC magazine.

Ron Ben Natan
Guardium [Ptech-Israeli MOSSAD company]

Ron Ben Natan, Guardium CTO, has more than 20 years experience in software development and technology. Ron has worked for Intel, AT&T Bell Laboratories, Merrill Lynch, and J.P. Morgan. Ron has a Ph.D. in distributed computing and speaks at numerous venues. Ron is an expert in distributed application environments and security, and database security.
He has authored ten books and numerous articles. His most recent book is Implementing Database Security and Auditing. Ron is an IBM GOLD consultant.

Joe Bower

Joe is a business professional with over 10 years experience in Information Security. His experience includes consulting and line management, development and business management, direct sales and project management. With his diverse background, Joe seeks to bridge the gaps between technology enabling business solutions, and business adopting development methodologies that lead to effective solutions that have a high ROI and low vulnerability profile.

Jeanne Brown
SUNY Institute of Technology
Town of Trenton, NY

Program Coordinator of the Institute for Local Government (ILG) at SUNY Institute of Technology, member of the Advisory Board of the Digital Towpath Cooperative, and Deputy Town Clerk and Webmaster for the Town of Trenton in Oneida County. Jeanne has held various positions in local government over the past decade. She currently works with local governments across the state to provide e-government services as well as teaching courses in office productivity software for local government officials through the ILG and the Local Government Education Committee of Oneida and Herkimer Counties.

Steffani Burd, Ph.D.
Ansec Group

Steffani is an expert in applying analytics to security issues in the private and public sectors. She is the Executive Director of the Information Security in Academic Institutions research project funded by the National Institute of Justice. Related activities include New York Police Department (NYPD) auxiliary police officer, incident commander for Citizens Emergency Response Team (CERT), and Director of Research for the LI Metro InfraGard Alliance. Relevant education includes CISSP (summer 2006), Columbia University (Ph.D. 1998), and University of Chicago (B.A. 1988).

Madhusudhanan Chandrasekaran
University at Buffalo

Madhusudhanan Chandrasekaran is a third year Ph.D. student at University at Buffalo. His research interests Computer Security, and Forensics with particular focus on malware defense, attack traceback, e-mail attribution and anti-Phishing efforts.

Meghan Cook
Center Technology

As Program Manager, Meghan works with a variety of government, corporate, and university partners to conduct applied research projects on the policy, management, and technology issues surrounding information use in the public sector. Currently, she is leading an effort to investigate the costs, benefits, and risks associated with moving to an electronic health record for custodial communities in NYS. Recent past projects include the development of the NYS State-Local Internet Gateway and an investigation into the use of parcel data in public, private, and non profit organizations throughout NYS. Speaking at numerous conferences about IT and intergovernmental relations, Meghan has also written articles and research reports focusing on information technology innovation in the public sector. She has a Master of Science in Education and a Master of Public Administration, both from the State University of New York at Albany.

Thomas Conway
NYS Attorney General’s Office

Thomas Conway has been an attorney in the Consumer Frauds Bureau of the New York Attorney General’s Office for 20 years. During that time, he has held the positions of Assistant Attorney General, Section Chief, Deputy Bureau Chief and, since 1999, Bureau Chief. Mr. Conway currently supervises 20 attorneys in the Consumer Frauds Bureau who prosecute corporations and individuals engaged in fraudulent and illegal conduct. Successful cases argued by Mr. Conway include People of the State of New York v. Ford Motor Co., 74 N.Y.2d 495 (1989); Motor Vehicle Mfrs. Ass’n v. State of New York, 75 N.Y.2d (1990); People of the State of New York v. Alamo Rent A Car, 89 N.Y.2d 560 (1997). Prior to joining the Attorney General’s Office, Mr. Conway was a staff attorney with the Harlem Neighborhood Office of the Legal Aid Society and Director of Litigation for the Public Utility Law Project. Mr. Conway is a graduate of Fordham University and New York Law School.

Joanna Crane
Federal Trade Commission

Joanna Crane has been Manager of the FTC’s Identity Theft Program since 2000. Ms. Crane oversees implementation of the FTC’s responsibilities under the Identity Theft Act of 1998 and the identity theft provisions of the Fair Credit Reporting Act. The FTC’s program focuses on assisting victims of identity theft, supporting law enforcement, partnering with private industry, developing regulatory and policy responses to identity theft, and bringing enforcement actions against non-complying entities under a variety of relevant laws. Ms. Crane also participates in governmental councils and workshops, public-private partnerships, and training and research initiatives.

Joe Cupano
EMC Corp.

Joe Cupano has been an information security professional for over ten years working in global financial services and Big Four consulting firms that include UBS Investment Banking, Salomon Smith Barney and Ernst & Young. As a Director for UBS Investment Banking he served as the Global Technology Manager for security and e-commerce. Joe has performed a variety of roles in security that include policy development, risk assessment, as well as architecture and engineering.

Melissa Dark
Purdue University

Melissa Dark is an Associate Professor in Computer Technology and Assistant Dean in the School of Technology at Purdue. She has extensive experience in post-secondary science, technology, engineering, and math (STEM) education. Melissa completed her Ph.D. work at Purdue University and throughout her career has worked on several stem curriculum and instruction projects with business and industry, government, and higher education.

She has led faculty development projects in technology education and information security education aimed at increasing the knowledge and skills of secondary and post-secondary educators throughout the United States. She has been active in helping define the information assurance discipline and is currently leading a group that is developing the common body of knowledge in information security education.

She has extensive experience in needs assessment, instructional design, development, and evaluation of continuing education in science, math, engineering, and technology related disciplines including traditional face-to-face training and education, as well video, CDROM, and Internet-delivered courseware. Melissa has specialized in educational measurement and evaluation. She has designed, developed, and taught educational measurement and evaluation. She also has consulting experience in the evaluation of operator error in heat treatment operations, industrial radiography, industrial infant security alarm systems, cost of quality measurement systems, and the evaluation of personal digital assistants for a company standard.

Dipankar Dasgupta
The University of Memphis

At present, Dipankar Dasgupta is a Professor of computer science Department of the University of Memphis. He obtained his Bachelors Degree in Electrical Engineering in 1981 and Masters Degree in Computer Engineering in 1986, from India. He received Ph.D in Computer Science from the University of Strathclyde, Glasgow, in 1993. Before doing Ph.D he was teaching computer science in India as Assistant Professor. He was a post doctorate researcher at the University of New Mexico from January 1994 to August, 1995 and worked on an immune system based model for Novelty Detection in sensory data. He was a visiting faculty at the University of Missouri, St. Louis until December 1996.

George Dolicker
International Network Services (INS)

George J. Dolicker, CISA, CISSP, is Senior Principal Consultant and Global Security Practice Leader at International Network Services (INS), with over ten years at INS, and over 30 years experience in the information systems field. Mr. Dolicker specializes in information security, providing full-lifecycle professional information security services to the financial, life sciences, transportation, insurance, legal, publishing, and government market verticals.

He is a frequent speaker internationally on topics including Security Architecture and Program Design, Incident Response, Intrusion Detection, Standards and Regulations, Security Training and Awareness, Security Audits and Assessments, Penetration and Vulnerability Testing, Electronic Privacy, and Cryptography. Mr. Dolicker holds CISSP and CISA designations, is certified by the NSA in InfoSec Assessments and Evaluations, is Director of the New York Metro chapter of the Information Systems Security Association (ISSA), founded the New York Windows Security User's Group, and is a member of ISACA, CSI, and InfraGard.

Robert F. Erbacher
Utah State University

Dr. Erbacher is an Assistant Professor in the Department of Computer Science at Utah State University. He is an Associate Editor for the Journal of Electronic Imaging, Chairs the SPIE Conference on Visualization and Data Analysis, is on numerous other program committees related to computer security and visualization and performs extensive reviewing for conferences and journals in these areas. His research interests include Computer Graphics, Information and Scientific Visualization, Computer Security, and Intrusion Detection. Dr. Erbacher has ~40 publications in these areas.

In keeping with his research interests in computer security and visualization, Dr. Erbacher spent the summers of 2004 and 2005 at AFRL's Rome Labs developing visualization for intrusion detection techniques for the air force under their summer faculty fellowship program. He received his BS in Computer Science from the University of Lowell in 1991 and his MS and ScD degrees in Computer Science from the University of Massachusetts-Lowell in 1993 and 1998, respectively.

Dan Farmer
Elemental Security

Mr. Farmer has been involved in the computer industry for more than 20 years and is recognized worldwide as one of the leading experts in computer and network security. Mr. Farmer's work includes serving as an expert witness and consultant for the recording industry in its case against Napster, advising the U.S. Department of Defense on protecting networks from cyber-terrorism in the wake of 9/11, and testifying before Congress regarding cyber security. Prior to that, he led network security at EarthLink for more than three years.

Mr. Farmer also spent several years leading the technical aspects of computer and information security at Sun Microsystems. Mr. Farmer is well known as the author or co-author of several software programs that are among the world's most widely used security tools, including SATAN (Security Administrator's Tool for Analyzing Networks), a program that analyzes and reports on the security of a network. He is also the co-author of Forensic Discovery a book covering the theory and hands-on practice of forensic computing. Mr. Farmer earned a B.S. degree in Computer Science from Purdue University.

Matt Fisher
SPI Dynamics

Matt is the known expert in Web application security assessment and testing, and is a subject matter expert for the DISA IATAC. He has performed hundreds of Web security assessments throughout the DoD and is a frequent speaker at information security and application development conferences as well as a published author on the topic of Web application security and testing. Matt is a contributing author to the book titled, Google Hacking for Penetration Testers, and is currently working on his own book titled, Web Application Security: A Guide for Developers and Penetration Testers. Prior to beginning his computer career that spans well over a decade, Matt spent six years in a reserve Infantry battalion.

Sioux Fleming
Computer Associates

Sioux Fleming is a director of product management for eTrust security management at CA, responsible for eTrust PestPatrol Anti-Spyware products. She joined CA as part of its acquisition of PestPatrol, where she served as group product manager. Sioux has a wide range of experience in the security tools industry, including antivirus and encryption security in addition to anti-spyware. She also has prior experience in the software industry in media asset management tools, enterprise PC migration tools and other system utilities at companies such as Central Point Software and Symantec. Sioux holds a B.S. in Physics from Lewis and Clark College in Portland, Oregon.

Stan France
Schoharie County, NY

Stanley France is the Director of Central Data Processing for Schoharie County, a position he has held for the past twenty-eight years. He earned degrees from Syracuse University and his doctorate from the University of the Pacific. He is a Past President of the New York Association of Local Government Records Officers and the NYS Local Government Information Technology Directors Association. He is a member of the CIO Council and serves on its Strategic Planning, Security, and Intergovernmental Communications committees. He is also a member of CSCIC's NYS Local Government Cyber Security Committee.

Greg Gardner
Oracle Corporation

Greg synchronizes the development, integration and fielding of Oracle's Government and Homeland Security Solutions, coordinating the efforts of a team of experts from across the Corporation and its Partners. Mr. Gardner, who retired from the United States Army as a Colonel with 30 years of commissioned service, joined Oracle Corporation on March 15, 2004. During his final military assignment, Mr. Gardner was responsible for Joint Command and Control in the Command, Control, Communications and Computers Directorate of the Joint Staff in The Pentagon.

In this role he developed the prototype of the Joint Protected Environment Network (JPEN) now in wide use by military bases and state and local governments across the country. From April to November 2003, Mr. Gardner served with the Coalition Provisional Authority in Iraq as Chief of Staff for the Senior Advisor, Ministry of National Security and Defense. He then returned to Washington and coordinated personnel activities for the Authority before leaving government service in March 2004. Mr. Gardner, a graduate of the United States Military Academy with a Bachelor of Science Degree in Electrical Engineering, also holds Masters Degrees in Industrial Relations/Personnel Management from the Krannert School at Purdue University, Military Art and Science from the Army's School of Advanced Military Studies, and Strategy and Policy from the Naval War College.

Mr. Gardner chairs the Association for Enterprise Integration (AFEI) team that produced in April 2005 a paper for the Defense Department entitled, Best Business Practices in Service Oriented Architecture and in February 2006 a paper entitled Facilitating Shared Services in the Department of Defense. Mr. Gardner is a member of the Net Centric Industry Consortium (NCOIC), the Armed Forces Communications Electronics Association, and the Association of the United States Army. He occasionally comments on operations in Iraq and Afghanistan for Fox News.

Mara Ginsberg Esq.
NYS Office of Cyber Security and Critical Infrastructure Coordination

Counsel for the New York State Office of Cyber Security and Critical Infrastructure Coordination (CSCIC). CSCIC was created by Governor Pataki to lead and coordinate New York State’s efforts regarding cyber readiness and resilience including monitoring and managing the State’s networks for malicious cyber activities. Ms. Ginsberg directs all legislation and was involved with the negotiations for the New York notification law.

Additionally, she directs a national legislative committee for the Multi-State ISAC (information sharing and analysis center) which this year has been focusing on notification laws. Ms. Ginsberg also directs all procurements and contract negotiations. She is a member of the New York State Bar Association’s Special Committee on Cyberspace Law.
Ms. Ginsberg was formerly the Deputy Director and Counsel to the NYS Office for Technology; and has worked in a variety of other government positions for more than twenty years. She is a graduate of Albany Law School and Union College of Union University.

Dr. Sanjay Goel
Center for Information Forensics and Assurance
University at Albany, SUNY

Sanjay Goel is an Assistant Professor in the School of Business at the University at Albany, SUNY. He is also the Director of Research at the New York State Center for Information Forensics and Assurance at the University. Prior to joining the University, he worked at the General Electric Global Research Center. Dr. Goel received is Ph.D. in Mechanical Engineering in 1999 from Rensselaer Polytechnic Institute. His current research interests include investigation of computer crimes including botnets and virus/worm propagation, security risk analysis and security policy creation.

He also works in the development of autonomous computer security systems based on biological paradigms of Immune Systems, Epidemiology, and RNA Interference. His portfolio of research includes distributed service-based computing, network resilience and active networks. He also uses machine learning algorithms to develop self-learning adaptive optimization strategies for solving engineering optimization problems. Dr. Goel teaches several classes including, Computer Networking & Security, Information Security Risk Analysis, Enterprise Application Development, Database Design and Java Language Programming.

Catherine Gorman-Klug
Meridian Health

Ms. Gorman Klug has over twenty years experience in healthcare. In addition to a varied clinical background, she has extensive experience in project design, implementation and management.

As Corporate Director of Privacy and Data Security she is responsible for compliance with requirements imposed by HIPAA, other regulatory and accreditation standards for Meridian Health System, Inc., an integrated health system with over 7,000 employees. She is the process owner for activities that provide access to and protect the confidentiality and integrity of patient, provider, employee and business information, technical Security and Privacy tools and policies relevant to access control, Physical Security and Privacy, and Business Continuity. Prior to this she coordinated Meridian’s Year 2000 Compliance Program. Before assuming responsibility for enterprise wide projects, Ms. Gorman-Klug was the Director of Resources/Regulatory Compliance for a Medical Center within Meridian. She holds a Masters of Science in Nursing Administration from Seton Hall University.

James H. Graham
University of Louisville

Dr. James H. Graham is the Henry Vogt Professor of Computer Science and Engineering at the University of Louisville, and has a joint appointment in the Department of Computer Engineering and Computer Science, and the Department of Electrical and Computer Engineering. He earned the Bachelor of Science degree in electrical engineering from Rose-Hulman Institute of Technology in 1972, and the Master of Science and Ph.D. degrees from Purdue University in 1978 and 1980, respectively. He worked for General Motors Corporation, and as a faculty member at Purdue University and Rensselaer Polytechnic Institute, before joining the faculty of the University of Louisville.

He has served as a consultant to a number of companies, including the General Electric Company, GTE Laboratories (now Verizon), and several high-technology startup companies. Dr. Graham is the editor of two books, and the author or coauthor of over 200 technical publications. He has supervised seventeen Ph.D. dissertations, and over 50 master’s theses. He is a senior member of the Institute of Electrical and Electronic Engineers (IEEE), a member of the Association for Computing Machinery (ACM), a member of the American Association for Artificial Intelligence (AAAI), and a member of the International Society for Computers and Their Applications (ISCA). He is currently a member of the Board of Directors for ISCA.

Patrick Gray
Cisco Systems, Inc.

Patrick Gray joined Cisco Systems after serving as the Director of X-Force Operations, Office of the Chief Technology Officer, Internet Security Systems, Inc. (ISS). Patrick also comes to Cisco Systems after twenty years of service with the Federal Bureau of Investigation. Upon his retirement from the FBI in November 2001, he joined Internet Security Systems and created the X-Force Internet Threat Intelligence Center and thereafter was Director of the Penetration Testing and Emergency Response Teams until his promotion to the X-Force R & D Team.

As a result of his service with the FBI, and the Internet Threat Intelligence Center, he has first-hand knowledge of the hacking community, its aims and methodologies as they attack government, ecommerce, energy and financial entities relentlessly. Prior to joining Internet Security Systems, Patrick served as a Special Agent with the Federal Bureau of Investigation for twenty years and has served in Baltimore, Maryland, Daytona Beach, Florida, Washington, D.C. and Atlanta, Georgia.

Patrick was also assigned as a Supervisory Special Agent at FBI Headquarters, Washington, D.C. in the Intelligence Division where he was responsible for global counterintelligence investigations. While serving in the Washington, D.C. area, Patrick was seconded to the National Security Agency where he was responsible for an FBI group that provided operational support to the Intelligence Community. He was transferred to Atlanta in 1988 to assume Supervisory Duties for the FBI's Drug and Violent Gang Program in Georgia.

In 1994, he assumed the duties as the Supervisor of the Technical Services Squad and served as the Acting Assistant Special Agent in Charge of the FBI in Georgia in 1996 and 1997 during the time of the spree of terrorist bombings at Centennial Olympic Park and two subsequent bombings at two women's clinics in Alabama and Georgia. Patrick was assigned as Supervisor of the Special Operations Group in 1994 which ultimately morphed into one of the FBI's first regional Cyber Crime Squads; and was a member of the FBI's elite Computer Assistance Response Team as a Forensic Examiner.

He has investigated cases involving financial institutions, government agencies, commercial businesses and colleges and universities. He was also assigned to the investigation of the September 11 attacks. He was the Coordinator of the Atlanta Chapter of InfraGard, an alliance between the public and private sectors for the sharing of information regarding technology security issues. He grew the Atlanta Chapter of InfraGard into the largest chapter nationally. He continues to work closely with the FBI, the National Infrastructure Protection Center, the Department of Homeland Security and the White House.

Patrick is a member of the American College of Forensic Examiners International and maintains a CHS Level III certification; is a member of the Association of Certified Fraud Examiners; the Information Systems Audit and Control Association; InfraGard Atlanta; the Atlanta Chapter of the Information Systems Security Association, and the International Information Systems Forensic Association.

He has lectured at Colleges and Universities around the country. He has spoken at numerous technology events around the world to include Gartner Sector 5, Networld Interop, the IT World Congress, CIO Summit, GE Access, Forbes and others.
He has been quoted in numerous newspapers, magazine articles and periodicals and makes regular cable television appearances. Patrick is a former Marine having served in Vietnam.

Margaret E. Grayson
AEP Networks

Peg is a specialist in providing secure networking, application access, and information sharing solutions, and a pioneer in the development of Internet cyber security protection. Ms. Grayson served as President of V-ONE Corporation, before it combined with AEP Networks in 2005. Prior to joining V-ONE, Ms. Grayson served as Vice President and then CFO for SPACEHAB. Ms. Grayson is a member of the National Infrastructure Advisory Council (NIAC) and co-chair of the Convergence Working Group, providing advice to the Secretary of Homeland Security and the President on the security of our Nation's critical infrastructure. She serves on the Advisory Board for the Center of Excellence in Information Assurance at SUNY Buffalo. She holds an M.B.A. from the University of South Florida and a B.S. in Accounting from the State University of New York at Buffalo.

Ron Gula
Tenable Network Security

Ron Gula - Chief Executive Officer, Tenable Network Security - was the original author of the Dragon IDS and CTO of Network Security Wizards which was acquired by Enterasys Networks. At Enterasys, Mr. Gula was Vice President of IDS Products and worked with many top financial, governments, security service providers and commercial companies to help deploy and monitor large IDS installations. Mr. Gula was also the Director of Risk Mitigation for US Internetworking and was responsible for intrusion detection and vulnerability detection for one of the first application service providers. Mr. Gula worked for BBN and GTE Internetworking where he conducted security assessments as a consultant, helped to develop one of the first commercial network honeypots and helped develop security policies for large carrier-class networks. Mr. Gula began his career in information security while working at the National Security Agency conducting penetration tests of government networks and performing advanced vulnerability research. Mr. Gula has a BS from Clarkson University and a MSEE from University of Southern Illinois. Ron Gula was the recipient of the 2004 Techno Security Conference 'Industry Professional of the Year' award.

Lisa Harris
NYS Consumer Protection Board

Lisa Harris received her B.A. in Political Science from Fredonia State University in 1990 and received her Juris Doctorate from Ohio Northern University College of Law in 1993. Lisa began her legal career in Buffalo, New York as a staff attorney for Prisoner’s Legal Services. In 1995, Lisa began her four years as an Assistant Attorney General. In 1999, Lisa was named Legislative Counsel, to the New York State Department of Correctional Services. In 2001, Lisa was then named Deputy General Counsel to the New York State Consumer Protection Board. In January 2004, Lisa was promoted and named General Counsel of the Consumer Protection Board (CPB). In April 2006, Lisa was promoted again and named, Executive Deputy Director of the CPB.

Lisa is a member of the Albany County Bar Association; the Capital District Women’s Bar Association and is an active member of her community who participates in volunteer supported projects through the Newtonville United Methodist Church and the Albany Medical Center children's literacy program.

Ed Hemminger
Ontario County, NY

Ed Hemminger is currently the Ontario County Chief Information Officer. He has been in this position since 1996. In this role he is responsible for all Information Technology functions for the organization with over 1,100 employees, including technical service/support, communication networks (voice and data), computer program development and computer systems operations.

He also establishes and directs the strategic goals, policies and procedures for technology enterprise-wide, as well as providing overall management and definition of all computer and communication activities within the organization including the responsibility for providing a leadership role in the day-to-day operations of the Information Services functions as well as providing direction as the enterprise grows through internal growth and external systems implementations.

Additionally, he is responsible for technology issues in Economic Development activities countywide, specifically relating to telecommunications bandwidth availability and Industrial Development Agency proposal review. Ed was also appointed to be the Chief Executive Officer for the Finger Lakes Regional Telecommunications Local Development Corporation, a not-for-profit corporation established to build a 173 mile fiber optic ring around Ontario County connecting Police, Fire, Healthcare, Education, Municipalities and business locations county-wide. He is also the Vice President, NY State Local Government IT Directors Association Member, NY State CIO Council and Member, Ontario County GIS Coordinating Committee. He is a retired US Air Force Chief Master Sergeant and holds a Bachelors Degree in Human Resource Management and an Associates Degree in Data Processing.

Jim Hewitt

Jim Hewitt has 15 years of diverse experience as a programmer, security engineer, architect and project manager. He has experience in IT audit, regulatory compliance, policies and procedures, business continuity planning, cryptography, application security and enterprise deployment. He is certified as a Project Management Professional (PMP) and as a Certified Information Systems Security Professional (CISSP).

William H. Hogencamp
NYS Division of Criminal Justice Services

William H. Hogencamp is a 28 year employee of the New York State Division of Criminal Justice Services (DCJS). Bill is currently the Chief of the Customer Service Group in the Office of Justice Information. The Customer Service Group includes units responsible for Quality Assurance of all DCJS developed systems, User Support for internal and external customers for criminal justice agencies across the State and the Customer Contact Center which is the first point of contact for all customers.

Prior to working at DCJS, Bill served as a police officer in Chatham, NY and as an Army MP in San Francisco, CA. He holds an A.A.S. in Criminal Justice from Hudson Valley Community College, B.A. in Sociology from the University of Albany, and M.P.A. from Rockefeller College.

Thomas B. Hurbanek and NYS Forensics Workgroup
New York State Police

The New York State Computer Forensic Workgroup includes representatives from more than 20 NYS Agencies. The membership includes investigators, attorneys, auditors, forensic analysts, technical staff, managers, and information security officers. The members of the workgroup would like to build upon last year’s successful presentation with a team discussion of the very latest topics in digital evidence and computer forensics. Investigator Thomas B. Hurbanek, NYSP Computer Crime Unit is the chair of the workgroup.

Chet Hosmer
WetStone Technologies, Inc.

Chet Hosmer is a co-founder, and the CEO and Chief Scientist of WetStone Technologies, Inc. He has over 25 years of experience in developing high technology software and hardware products, and during the last 15 years, has focused on research and development of information security technologies, with specialty areas including: cyber forensics, secure time, and intrusion detection and response. Chet is a co-chair of the National Institute of Justice’s Electronic Crime and Terrorism Partnership Initiative’s Technology Working Group, and was one of five international steganography experts interviewed by ABC News after the 9/11 al-Qaeda attacks. Chet has been quoted in numerous cyber security articles, and has been invited to present as both a Keynote and Plenary speaker numerous times over the course of his career. Chet is a member of the IEEE, ACM, and he is on the editorial board for the Journal of Digital Forensic Practice. Chet holds a B.S. Degree in Computer Science from Syracuse University where he is also an adjunct professor.

Geof Huth
NYS Archives

Geof Huth currently serves as the Director of the New York State Archives’ Government Records Services, ensuring the development and delivery of quality records management and archives services to local governments and state agencies across the state. He previously served as Manager of Records Advisory Services, overseeing a regionally-based program of archives and records management advisory services to local governments and state agencies in New York State. Previously, he managed Records Service Development for the New York State Archives, where the major focus of his work was electronic records management and where he oversaw retention scheduling and the development of records management workshops, publications, and web-based resources. For most of the 1990s, he served as the Archives’ Regional Advisory Officer covering New York’s North Country. He speaks frequently around the country and the state about records management and archives.

Dean Iacovelli
Microsoft Corporation

Dean Iacovelli is currently the Chief Security Officer for Microsoft State and Local Government. In this role, he is responsible for coordinating security strategy, readiness, and communication for Microsoft with its State and Local Government customers. Mr. Iacovelli also served for three years as Senior Security Architect for Microsoft Mid Atlantic, promoting best practices relating to enterprise security architecture and solutions on the Microsoft platform. Prior to joining Microsoft, Mr. Iacovelli was the Director of Microsoft Programs for Corbett Technologies, a Department of Defense-focused information security consulting firm. In addition to his background as an MCSE / MCT and author, Dean also led the development of the Quickstart for Planning ISA Server and the Quickstart for Planning for Secure Systems - methodologies adopted by Microsoft Consulting Services for the design/deployment of ISA Server and Windows 2000 security architectures. He has worked for IBM and Digital Equipment Corporation.

Dr. Kamal Jabbour
Air Force Research Laboratory

Dr. Kamal Jabbour holds a GS-15 civil service appointment as a Principal Computer Engineer in the Cyber Operations Branch of the Air Force Research Laboratory in Rome, NY. He received the Bachelor of Engineering in Electrical Engineering from the American University of Beirut in Lebanon and the Doctor of Philosophy from The University of Salford in England. His professional interests focus on building a cybercraft, a futuristic abstraction of an autonomous cyber security agent, and on developing cyber security leaders through the Advanced Course in Engineering Cyber Security Boot Camp.
Dr. Jabbour is an avid long distance runner and writer. He established the Ed Stabler National Distance Running Library at Syracuse University, and received Runner's World Bob Rodale Golden Shoe Award for contributions to the running community. He spends his free time restoring a 1969 black Jaguar E-Type Coupe, which he drives around Central New York in the summer.

K.D. Kang
State University of New York at Binghamton

Dr. KD Kang joined the Computer Science Department in September 2003. He received a PhD in Computer Science from the University of Virginia in May 2003. His dissertation title was "QoS-Aware Real-Time Data Management". Before his PhD study, he designed and developed real-time software and firmware for embedded avonics computers at the Agency for Defense Development in South Korea. His research interests include sensor networks, real-time data management, and security.

Eric M. Krauss
SecureWave, Inc.

Eric Krauss has 20 years in the technology industry with the last 15 years in various aspects of perimeter, network, desktop and corporate security.

Christopher Labatt-Simon
D&D Consulting, Ltd.

Christopher Labatt-Simon is the CEO of 14 year old D&D Consulting, Ltd., an organization which focuses on Information Security and Enterprise Networking for both the public and private sectors. Labatt-Simon has worked in the information technology arena for over 20 years and, today, focuses on the use of technology to improve business practices, primarily to boost organizational efficiency, increase the quality of customer service and decrease costs. Labatt-Simon has a successful history in providing solutions to state and local government. He is currently the private sector Co-Chair of the NYS Forum’s Security Committee, and has worked with both NYS CSCIC and the NYS CIO Council to promote education on various security topics to many public sector individuals. His organization focuses on access, availability, performance and security of applications and data crossing internal and external networks.

Slawomir J. Marcinkowski

Slawomir has more than 11 years of commercial and academic experience, having honed his skills as a systems analyst by supporting projects at NYSTEC and as a research assistant at Syracuse University. At NYSTEC, he has developed survey instruments and performed interviews to elicit the current (“as-is�) status of organizations, along with their future (“to-be�) requirements. He has participated as a team member in developing RFP evaluation criteria. Also, he has focused on the information-security aspects of projects, including performing vulnerability assessments and policy development. He holds three certi¬fications in the information-security area: 1) the Global Information Assurance Certification (GIAC) 2) Systems and Network Auditor (GSNA) Certification and 3) the GIAC Security Essentials Certification. He is currently pursuing a Ph.D. degree in the area of information-security behavior in organizations, with a focus on information-security policy.

Mark D. McDaniel
Lancope, Inc.

As a senior security engineer for over ten years, has worked with numerous Fortune 500 companies as well as governmental and educational organization on defining and solving their information security challenges. By working with major clients to solve real world security challenges, Mark has experiences with many leading edge security technologies and an in-depth understanding of the capabilities and limitations of today’s commonly deployed information security products. Mark has a detailed knowledge and understanding of network infrastructure and data center design, flow and packet analysis techniques, investigation and forensics and enterprise network deployment. Mark has worked for industry-leading companies including Dell, DEC/Compaq/HP, Level3 Communications, Sourcefire and Lancope delivering solutions to their customers’ security and network infrastructure needs.

Peter Mell
National Institute of Standards and Technology (NIST)

Peter Mell is a senior computer scientist in the Computer Security Division at the National Institute of Standards and Technology (NIST). He is the creator and project manager of the National Vulnerability Database, For this work, he was awarded the 2006 Federal 100 award and the Commerce Department’s bronze medal. He has written the NIST Special Publications on Patching, Malware, Intrusion Detection, and the Common Vulnerabilities and Exposures standard. Previously, he was in charge of developing security policies for NIST and he created plans for new security technology implementations (e.g. wireless networks and centralized directories). His research experience includes the areas of intrusion detection systems (IDSs) and vulnerability databases. Peter received an MS in computer science from the University of California at Davis in 1998.

JR Reagan
BearingPoint, Inc.

Mr. Reagan is the Senior Executive responsible for the strategy & direction of solutions and services for the BearingPoint Security & Identity Management Group. He has over 20 years of Federal, Intelligence and Commercial sector experience managing Enterprise Security, Technology, Fraud & Risk Management initiatives. Prior to joining BearingPoint in 2004, Mr. Reagan held a number of technology and executive positions with American Management Systems (AMS), Titan Corporation, First Union National Bank, and the Department of Defense. Within the Federal and Defense arena, Mr. Reagan has security operations and program management experience with numerous U.S. agencies including NSA, DIA, FBI, NASA, DISA, DARPA, JCS, Air Force, Navy, Marine Corps, and Army.

He has performed security engagements worldwide including support of EU nations and NATO. In the commercial sector, as VP and Group CSO of a Fortune 500 bank, he established an overall Consumer Banking Group Security Strategy and Risk Management Program, the first in company history. As CTO of two technology companies, he developed global product strategy, architecture and development of CRM and Wealth Management solutions for over 800 clients in the financial and insurance industries. Mr. Reagan holds a Masters of Science Degree in Management Information Systems and a Bachelor of Arts Degree in Sociology.

He is a graduate of the NSA National Cryptologic School; the Advanced Korean Language Studies Program at Yonsei University (Seoul, Korea); the Graduate School of Banking Technology & Operations (Vanderbilt University); the Program on Negotiation for Senior Executives (Harvard Law School); and the New Market Growth Innovation Workshop (Harvard Business School). Mr. Reagan holds a Certified Information Security Manager (CISM) designation from the Information Systems Audit and Control Association (ISACA) and is a member of many public & private sector organizations.

Michael Redmond
Redmond Worldwide, Inc.

Ms. Michael C. Redmond is CEO of Redmond Worldwide; a firm that specializes in Business Continuity Management, Emergency Management, Crisis Management, Business Processes Reorganization, and Management Processing. Before owning her own company, Redmond Worldwide, Inc., she spent many years in the Business Continuity/Disaster Recovery field. Michael started in Business Continuity/Disaster Recovery with the Bank of New York. She then worked for Chubb Services for five years. Her Big 4 experience includes five years as a Sr. Manager for Deloitte and Touche in Business Continuity/Disaster Recovery Consulting and almost three years as a Sr. Manager with KPMG in Business Continuity/Disaster Recovery Consulting. She is an Adjunct Professor at both John Jay Criminal College, Masters Program and New York University, where she teaches both Emergency and Business Continuity Management. She is a Certified Emergency Manager and holds two Master Level Certifications in Business Continuity through the Disaster Recovery Institute and the Business Continuity Institute.

K. Rudolph
Native Intelligence, Inc.

Native Intelligence, Inc., a firm that is focused on supporting security awareness for government and private industry clients. K holds a degree from Johns Hopkins University. She wrote the chapter on Security Awareness Programs in the 'Handbook of Information Security' (Wiley 2005). She is a named contributor to NIST Special Publication 800-16, 'Information Technology Security Training Requirements: A Role- and Performance-Based Model.' Several hundred thousand people worldwide have taken security awareness courses that K has developed.

Some of these courses have been translated into several languages. K has developed awareness programs that include surveys and analyses, e-learning for various audiences, newsletters, motivational programs, security mascot and themes, screen savers, posters, contests, and videos. K's presentations are informative and entertaining. She is an active member of the Executive Board of the Federal Information Systems Security Educators' Association (FISSEA).

John Somerville
Tailwind Associates

In his current position Mr. Somerville is charged with developing the security products and services that Tailwind Associates sells its customers. Over the past 15 years Mr. Somerville has provided professional consultative services and training on network design, implementation and management for many New York State government agencies and authorities as well as private sector business.

Peter Stephenson
Norwich University

Dr. Peter Stephenson is a writer, consultant, researcher and lecturer in information protection and forensics on large-scale computer networks with 40 years experience in electronic and computer technology, more than 20 of which have been spent in information security. He has spoken extensively on digital forensics and security, and has written or contributed to 14 books and several hundred articles in major national and international trade publications and technical/scientific journals. He has lectured and delivered consulting engagements for the past 18 years in eleven countries plus the United States.

He currently holds the positions of Research Professor at the Research Institutes at Norwich University and Associate Director of the Master of Science in Information Assurance, School of Graduate Studies, Norwich University. His PhD is in computing from Oxford Brookes University (Oxford, UK) where his thesis was “Structured Investigation of Digital Incidents in Complex Computing Environments�. Dr Stephenson’s current research interests are cyber attack attribution, knowledge fusion and actionable intelligence, and cyber conflict.

Scott Ticano
IPLogic, Inc.

Scott Ticano holds a BA in Political Science and is an M.B.A. candidate at Regis University. He holds several industry certifications including CCIE, CISSP, CCSP, and CCSE. Scott is a former US NAVY Electronic Warfare Technician. Scott’s technology solution focus is on routing and switching specializing in LAN, WAN and protocol design as well as device and port level management security; his security experience is built around Industry, Cisco, Checkpoint foundations and solutions and currently holds security specific authorizations for Cisco and Checkpoint.

He is specializing in Network Admission Control solutions and authorization/authentication protocols and techniques. He specializes in Call Control Design and Application Implementation; and wireless and mobile solution experience includes Blue Socket and Cisco solutions. His primary focus is designing, configuring, implementing and managing Secure Wireless solutions, utilizing both fat and light weight protocols. He is also specializing in the integration of disparate wireless technologies through the Cisco IPICS solutions.

Stephen Treglia
Nassau County District Attorney’s Office

Stephen has been a prosecutor for over 25 years and is presently Chief of the Technology Crime Unit of the Nassau County (NY) DA's Office (NCDA). Created in 1997, this Unit was one of the first of its kind in the country. Stephen has been the supervisor of this operation since its inception, and the Unit presently utilizes several of the resources within the Investigations Division of the NCDA to create a fully in-house investigative and prosecutorial task force of forensic examiners, undercover officers, investigators, accountants and IT personnel.

The Unit handles most of the high technology-related cases investigated by the NCDA. For the past 3 years, Stephen has written a bi-monthly column on computer crime for the New York Law Journal and also contributes similar articles to The Nassau Lawyer. Stephen is one of the original members of the New York State DA Association's (NYSDAA) Subcommittee on Computers and Technology, which provides legislative recommendations to the Governor's Office and State Legislature.

From June, 2002 through February, 2005, he was subcommittee chair. He is also one of the founding members of the newly-formed Long Island chapter of FBI InfraGard, which is a partnership of government and business groups dedicated to keeping an open line of communication between such diverse entities. Stephen is Chief of the Government and Law Enforcement Sector of the Long Island chapter.

James Van Bokkelen
Sandstorm Enterprises, Inc.

James Van Bokkelen is the President and a co-founder of Sandstorm Enterprises, Inc. Sandstorm, which specializes in developing aggressive software products for network monitoring, network forensics analysis, and security auditing including telephone scanning, penetration testing, and vulnerability assessment. Prior to working at Sandstorm, he was a pioneer in Internet protocol stacks for IBM-compatible-personal computers at FTP Software, where he was a founder, officer and director from 1986 until it went public in 1993 with $58 million in annual revenues. Other achievements in the field include authoring and collaborating on Internet RFCs, the Packet Driver specification and the WinSock API specification. Van Bokkelen attended MIT. His research interests are interoperability, heuristic recognition of network protocols and TCP tuning.

Glenn Watt
Backbone Security, Inc.

Glenn Watt, President and CEO of Backbone Security, Inc. brings over 28 years of experience delivering security solutions to the information technology community. He has a unique blend of academic, government and industry experience that forged expertise in networking, security, and executive management. His career includes positions as the Associate Professor of Computer Science, U.S. Air Force Academy, and a several years as Deputy Chief of Network Security Research, National Security Agency (NSA), along with Director of Computer Security for Strategic Air Command and Commander of the 509th Communications Squadron supporting the B-2 Stealth bomber. He retired from the United States Air Force in 1999. As head of Backbone Security, Inc., Mr. Watt manages a team of security engineers who perform network risk assessments, vulnerability assessments and penetration testing. He also supervises Backbone's state-of-the-art 24 x 7 monitoring center, as well as, its Steganography Analysis and Research Center.

John Weinschenk

Prior to Cenzic, John was the VP of the Enterprise Services Group at VeriSign, the largest provider of digital trust services in the world. In that role, he held worldwide responsibility for marketing VeriSign's authentication, digital trust, and wireless services to Global 1000 companies. He forged several alliances with strategic partners, including IBM, where he drove the effort to embed VeriSign's public key infrastructure technology in network access devices. Before VeriSign, John was CEO at TransIndigo.

While growing that company from six to more than 50 employees, he shaped it into one of the leading developers of real-time transactional authority, and then oversaw the successful acquisition of the company by RSA. John has established numerous pivotal deals and relationships while holding executive positions at Entegrity Solutions (VP of Business Development and Alliances, Product Operations, and Worldwide Marketing), HAL Computer Systems (Director of Business Strategy), and Unisys Corporation (Director of Engineering).

Michael Weisberg

Michael has more than 20 years of experience in information systems, information security, and systems engineering, for both corporate and New York State government clients. His work includes supervising security teams, designing secure networks, developing security policy, and performing vulnerability assessment testing. His experience spans platforms from the largest mainframes to security on handheld devices.

Michael J Wiser
Citadel Security Software Inc.

Mr. Wiser is regarded as one of the industry’s foremost authorities on distributed infrastructure and security. He has advised leading Wall Street Firms, Fortune 500 companies and the U.S. Government’s most classified agencies on overall security architecture and vulnerability management. He is most recognized for executing a vulnerability assessment that resulted in the identification of an international spy.

Mr. Wiser is an active member of the Information Systems Security Association and Association of Information Technology Professionals and holds several industry certifications including CISSP, CIWSA, MCIWA, MCSE, MCSA, LINUX+, CCSA NG, and I-Net+. Michael now holds the position of Executive Vice President of World Wide Sales Engineering for Citadel Security Software. Michael is a frequent speaker, teacher and writer on security-related topics. He has been coined as a “security evangelist� given his sermon-like real-life stories that always portray the moral of good winning over evil – even in the world of bits and bytes.

Rob Zeglen

Rob has more than 15 years of experience across a broad range of information-security-related areas that range from mainframe systems programming to his more recent efforts in helping to build the NYS LDAP directory and web-based single-sign-on service. During Rob’s six years as a consultant for Netscape/Sun Microsystems at the NYS Office for Technology, he was a core part of a team responsible to design, build, and provide continued support of the NYS Directory Services project. This project received a Center for Digital Government “Best of NY� award. Rob played a major role in assisting agencies in utilizing web technologies and in participating in the NYS Directory Services solution.


  • Guest


John G. Grimes has been nominated to be assistant secretary of defense for networks and information integration. He is a member of the AFCEA Washington Chapter.

Dr. Thomas O. Hunter has been named president of the Sandia Corporation and director of Sandia National Laboratories, Albuquerque, New Mexico. Dr. Joan Woodard will replace Hunter as head of Sandia's nuclear weapons program and will remain executive vice president and deputy director.

Edmund S. Hawley has been nominated to be assistant secretary of homeland security for the Transportation security Administration, Arlington, Virginia.

F. Duane Ackerman has been designated chairman of the President's National Security Telecommunications Advisory Committee. Patricia F. Russo has been re-designated as the committee's vice chairman.


Gen. Peter Pace, USMC, has been nominated to be chairman of the Joint Chiefs of Staff, the Pentagon, Washington, D.C. In addition, Adm. Edmund P. Giambastiani Jr., USN, has been nominated to serve as vice chairman of the Joint Chiefs of Staff.

Rear Adm. William D. Crowder, USN, has been assigned as assistant deputy chief of naval operations for information, plans and strategy, Office of the Chief of Naval Operations, the Pentagon, Washington, D.C.

AFCEA Northern Virginia Chapter member Rear Adm. Elizabeth A. Hight, USN, has been assigned as principal director, Global Information Grid Operations; commander of global operations, Defense Information Systems Agency; and deputy commander, Joint Task Force-Global Network Operations, Washington, D.C.

Rear Adm. Richard J. Mauldin, USN, has been assigned as director, Operational Plans and Joint Force Development, J-7, the Joint Staff, Washington, D.C. Brig. Gen. Arthur M. Bartell, USA, has been assigned as vice director.

Brig. Gen. Kevin J. Kennedy, USAF, has been nominated to the rank of major general while serving as the deputy director of intelligence, surveillance and reconnaissance, Deputy Chief of Staff, Air and Space Operations, Headquarters U.S. Air Force, the Pentagon, Washington, D.C.

Brig. Gen. Michael Ferriter, USA, has been assigned as director, J-3, U.S. Joint Forces Command, Norfolk, Virginia.

Maj. Gen. Brian I. Geehan, USA, has been assigned as director for logistics, J-4, U.S. Central Command, MacDill Air Force Base, Florida.

Maj. Gen. Joseph F. Peterson, USA, has been assigned as commanding general, Civilian Police Assistance Training Team, Multinational security Transition Command-Iraq, operation Iraqi Freedom.

AFCEA Scott-St. Louis Chapter member Richard V. Mock has been named chief information officer at the U.S. Air Force Academy, Colorado Springs, Colorado.


AFCEA Paris Chapter member Dag Wilhelmsen, general manager of the NATO Consultation, Command and Control Agency, and AFCEA Belgium Chapter member Maj. Gen. Georges D'hollander, SWA, NATO director of command, control and communications, have joined the Network Centric Operations Industry Consortium (NCOIC) Advisory Council. The 19-member council is designed to provide insight and guidance to the NCOIC to establish technical approaches to support transformation through network-centric operations.

AFCEA Hawaii Chapter member Victor Chongchua has been named Pacific theater division director, FGM Incorporated, Honolulu. The company also appointed AFCEA San Diego Chapter member John Ballard as Navy division director. He will be based in the San Diego office.

Col. John W. Booher, USAF (Ret), has joined BAE Systems as vice president of strategic planning, Information and Electronic Systems Integration sector, Nashua, New Hampshire.

Computer Sciences Corporation, headquartered in El Segundo, California, has hired Rear Adm. David M. Crocker, USN (Ret.), as director, U.S. Navy, U.S. Marine Corps and Joint business development.

The Boeing Company has named Darryl W. Davis as vice president of the company's new Air Force Systems Global Strike Solutions organization, located in St. Louis.

Charles D. Schwalier has been named president and chief operations officer, SMI International, Colorado Springs, Colorado. He is a member of the AFCEA Rocky Mountain Chapter.

Lt. Gen. Paul T. Mikolashek, USA (Ret), has been appointed as Raytheon's Army service executive. Raytheon is headquartered in Waltham, Massachusetts.