60th year, No. 30
Serving the NATO, Naples and Gaeta Military Community in Italy
Friday, July 31, 2015
First Rain in Six Weeks Produces High Winds, Flooding
Adm. Rogers: NSA, Cybercom Need Partners to Aid Cybersecurity By Cheryl Pellerin DoD News
The first rainfall in the Naples area in six weeks produced unexpected wind gusts up to 53 miles per hour July 23. Though official recorded rainfall was only .05 inches, drivers at Support Site had to navigate carefully through streets that were quickly flooded by the sudden summer storm. Photo by Laura Peritore
Military Consumer Protection Day Your First Line of Defense
New Chiefs' Names to be Released Next Week
By LT Thomas Au, JAGC
here to help. Looking for protection from Everyone has a story. Mili- scams, fraud, or identity theft? Maybe you’re wondertary Consumer Protection ing about the best way to Day, observed every July use credit, shop for a used 15, makes the month of July a perfect time to think car, protect yourself from identity theft, maximize onabout yours. Ari, a soldier, bought a car line security, or take advantage of other military from a dealership just off consumer protections? Now base at his first duty stais a time to think about tion. When the dealership found out that he was a sol- these issues, and find out more about how you can dier, they promised him protect yourself. that they would put him a RLSO Europe, Africa, and car he could afford. But the loan program didn’t deliver Southwest Asia (EURAFSWA) encourages you to on the promises. When you’re in a difficult think about how you are protecting yourself and proposition like this – talk to vides a variety or written the Region Legal Service Office (RLSO) Legal AssisMILITARY CONSUMER Page 7 tance Department. We’re
From Chief of Naval Personnel Public Affairs Office
Names of Sailors selected to advanced to chief petty officer by the fiscal year 2016 E-7 selection board are scheduled to be posted to commands’ BUPERS Online (BOL) accounts August 5, with public release via NAVADMIN August 6 at 5 p.m. (11 a.m. ET). Approximately 4,100 quotas were announced in June with an overall advancement opportunity of 23.64 percent for this cycle, just a .45 point drop from last cycle and above the 10-year average of 21.94 percent. The selection board is not required to fill all quotas; only the best and most fully qualified candidates are selected for advancement to chief. Because the Navy advances to vacancies, opportunity varies by rating, though advancement planners work to smooth overall opportunity across cycles. CAPTAIN’S CORNER. . . . . . . . . 2 BASE NOTES. . . . . . . . . . . . . . . 2 NAVY HISTORY / SPOTLIGHT. . 4 FFSC CALENDAR . . . . . . . . . . . 5 SOUND OFF . . . . . . . . . . . . . . . 6 MOVIES . . . . . . . . . . . . . . . . . . . 9
WORD SEARCH / COLOR ME 12
Defend Industry, Defend the Nation “What DoD said was, we believe that the nation is going
JOBS . . . . . . . . . . . . . . . . . . . . 14
NSA-CYBERCOM Page 7
USO TOURS . . . . . . . . . . . . . . 12
COMMAnd SEnIOR CHIEF RATIng . . . . . . . page 5
HISTORY OF SMOKEY BEAR . . . . .page 12
U.S. Cyber Command and the National Security Agency have capabilities critical to helping the nation’s public- and privatesector entities during and even before a cyberattack, but both agencies need partners to do so, Navy Adm. Mike Rogers said recently. Rogers, commander of Cybercom and director of NSA, was speaking July 24 at the annual Aspen Security Forum in Aspen, Colorado, during a discussion moderated by David Sanger, chief Washington correspondent for the New York Times. The admiral also took questions from the audience on war, crime and security in cyberspace. Cybercom is especially interested in trends in cyberattacks and cybercrime – even those occurring in the private sector – because the U.S. government has designated 16 areas in the private sector that have implications for the nation’s security, Rogers said. These include energy, transportation, financial services, food supplies and communications, and may be especially vulnerable to cyberattack because they use open-source software or hardware, third-party utilities and interconnected networks, according to the Congressional Research Service.