Tight nets around loose formations
The military will teach one a lot about security, but even it turns to the private sector when it comes to sorting out electronic vulnerabilities. Brainstorm speaks to CA`s ex-RAF security man.
07 October 2002
At first, David Love doesn`t seem as his bio would have it. He looks far too outgoing for someone who claims to have spent 28 years in the security wing of the British Royal Air Force (with stints at NATO and various other military postings sprinkled in between). One expects some sort of secretive über-geek. A kind of Q with horn-rim glasses.
“The application of air power is a function of IT,” he states. “It`s a series of computers flying in loose formation. Personnel, physical security, IT security – they`re all part of the principles of war in deploying air power. And as IT security is a prerequisite for air power, so it is for running big organisations.”
ITWeb Premium
Get 3 months of unlimited access
No credit card. No obligation.