“To be a leader worth following there must be alignment between the values you preach to the organization and the values you live out in every facet of your life.”
Andy Stanley
Category: Uncategorized
Truth sells itself.
Looking dumb is oodles better than lying.
The risk of false accusations is one of those risks that accompany success and senior leadership positions. The only way to insure yourself against this risk is to be publicly, privately and deliberately squeaky clean.
Integrity ensures you solve and do not ignore real problems. It acts as a forcing function for needed improvements.
Lack of integrity on the part of an individual is often a key indicator of a deeper problem in the organization of unit.
No matter what you have heard, personal integrity is in itself an excellent armament. There is always room at the top for an honest man.
A single lie can deed your soul to the devil for eternity.
From my Shipmate and occasional mentor – Rear Admiral Dave Oliver Jr.
U.S. Navy Program Guide 2015
Put this in the hands of every Sailor
Something else the CNO has published that O5s and O6s are unlikely to read because they are TOO BUSY
- Naval aviation gets 30 pages.
- SWOs get 33 pages.
- Submariners get 7 pages.
- Information Dominance gets 55 pages!
Navy Cyber Warfare Development Group’s 4th Anniversary
Navy Cyber Warfare Development Group – established four years ago, today
Rear Admiral Bill Leigher, Deputy Commander, Fleet Cyber Command/TENTH Fleet presided over the establishment ceremony for Navy Cyber Warfare Development Group on 18 February 2011. Captain Steve Parode assumed command on that date from Captain Diane Gronewold (now the Executive Director).
From July 2013 – We’ve come a long way – Combining N2 and N6
For all of those incredible First Class Petty Officers out there who are working their butts off. This is for all of you.
Excellence as a standard
Cyber ATTACK – Much overused. Not EVERYTHING we call an attack is an attack.
“Since many reports call everything – pranks, embarrassing leaks, fraud, bank robbery and espionage – a cyber attack, the strategy led to expressions of concern that the United States would be shooting missiles at annoying teenage hackers or starting wars over Wikileaks,” he wrote. “In fact, the strategy sets a very high threshold that is derived from the laws of armed conflict for defining a cyber attack. Nothing we have seen this year would qualify as an attack using this threshold.“
Jim Lewis at CSIS HERE.










