6:33 am, May 26, 2015

FederalNewsRadio.com - Purpose of Comments statement Click to show

Hubbard Radio, LLC encourages site users to express their opinions by posting comments. Our goal is to maintain a civil dialogue in which readers feel comfortable. At times, the comment boards following articles, blog posts and other content can descend to personal attacks. Please do not engage in such behavior here. We encourage your thoughtful comments which:

  • Have a positive and constructive tone
  • Are on topic, clear and to-the-point
  • Are respectful toward others and their opinions

Hubbard Radio, LLC reserves the right to remove comments which do not conform to these criteria.

  • 1
       

  • Not sure about that 80%
    deployed decoy
    CAC is for the most part the example to follow. Some people say PKI encrypted email is as or more secure than the military classified network. Then we hit the problem… Many people do not have PKI Keys. If for example I am sending sensitive emails, I have a choice of taking some critical person off the to line or sending the message not PKI. This problem is a matter of poor management for the most part. I recently moved physical locations and now have the exact same box of a PC I did in the last cube. The difference now is I cannot PKI an email if I wanted and this has happened several times throughout two different major commands outside the USA. The biggest personal good thing with CAC is no need to remember a password that contains 22 keystrokes that must contain two Navajo smoke signals and four N. Korean key strokes. Just one long number that can be the cube root of 2… Then that PIN and CAC get you in most sites like checking SF50 actions. One standard, one fight, one baseline, NOT.
    { "Agree":"1","Funny":"1","Insightful":"1","Disagree":"-1","Offensive":"-1","Troll":"-1" }
  • { "Agree":"1","Funny":"1","Insightful":"1","Disagree":"-1","Offensive":"-1","Troll":"-1" }