hookipa june 2010

14
issue 9 2010 P3 You have always delivered strong results and ethical behavior. Our Code of Business Conduct and ethics coupled with our Core Values reflects our continuing and absolute determination to do the right thing, at the right time for the right reason (Kina’ole). This is truly a huge challenge in today’s complex global business environment. We have many different business lines, a diverse workforce and projects throughout the world. Our clients and partners are small and large, government contractors, federal, state and local government. This diversity creates many challenges for us as we carry out our unyielding commitment to conduct our business responsibility, ethically and legally. Our Business Code of Conduct serves as a resource for all employees. It cannot answer every question about proper business conduct but it should at least point you in the right direction. You will never lose your bearings if you remember and follow our core values and Code of Business Conduct and Ethics: • Safety: “We hold sacred the well-being of people – employees, clients, and communities in which we work and live.” • Integrity: “We live by the highest ethical standards.” Integrity is doing the same thing when no one is looking. President’s Corner: Letter to NHV Employees Dr. Raymond Jardine, Jr. Colonel, Army, Retired President & CEO P2 STAFF UPDATES bIrThDAyS, AnnIvErSArIES, nEw STAFF worD oF ThE DAy: hAwAI’I P8 CoUnTEr- InTELLIGEnCE InTEGrATIon P7 P4 STrATEGIC PLAn 2010-2014 ohAnA CornEr P5 SECUrITy CornEr: SoCIAL nETworKInG SITES A SECUrITy ThrEAT P9 Teamwork: “We respect each other’s perspective and share knowledge and resources to achieve excellence, deliver value, and grow individually and collectively.” • Excellence. “We deliver quality service and solutions of unmatched value, constantly raising the bar on our performance.” The standards established in this Code are not new. It is a good azimuth check for all to use. The Code summarizes, clarifies, and sometimes updates our existing standards for employee conduct so that we can all act consistently within the framework of our vision and values. While we operate in many different parts of the country and overseas and in different business climates, we must always set and work within our high standards. Follow this Code of Conduct for it is the right thing to do. If you are ever unsure about the proper course of action, get guidance from your supervisor, management and/or leadership. Remember, this is your company – your Ohana. Our success depends on you. by Ray Jardine, NHV Honolulu P11 nhv LAUnChES nEwLy rEDESIGnED wEbSITE P12 Army DonATES ComPUTErS To EDUCATE ChILDrEn on UXo'S Ho‘okipa ShArInG oF ThE nEwS PULEKInA hA’ILono ELICITATIon: CAn yoU rECoGnIZE IT?

Upload: cindy-tourison

Post on 23-Mar-2016

225 views

Category:

Documents


4 download

DESCRIPTION

Sharing of the News

TRANSCRIPT

issue 9 • 2010

P3

You have always delivered strong results and ethical behavior. Our Code of Business Conduct and ethics coupled with our Core Values reflects our continuing and absolute determination to do the right thing, at the right time for the right reason (Kina’ole). This is truly a huge challenge in today’s complex global business environment. We have many different business lines, a diverse workforce and projects throughout the world. Our clients and partners are small and large, government contractors, federal, state and local government. This diversity creates many challenges for us as we carry out our unyielding commitment to conduct our business responsibility, ethically and legally.

Our Business Code of Conduct serves as a resource for all employees. It cannot answer every question about proper business conduct but it should at least point you in the right direction. You will never lose your bearings if you remember and follow our core values and Code of Business Conduct and Ethics:

• Safety: “We hold sacred the well-being of people – employees, clients, and communities in which we work and live.”

• Integrity: “We live by the highest ethical standards.” Integrity is doing the same thing when no one is looking.

President’s Corner: Letter to NHV Employees

Dr. Raymond Jardine, Jr. Colonel, Army, Retired President & CEO

P2 STAFF UPDATES

bIrThDAyS, AnnIvErSArIES, nEw STAFF

worD oF ThE DAy: hAwAI’I

P8 CoUnTEr- InTELLIGEnCE InTEGrATIon

P7P4 STrATEGIC PLAn 2010-2014

ohAnA CornEr

P5 SECUrITy CornEr: SoCIAL nETworKInG SITES A SECUrITy ThrEAT P9

• Teamwork: “We respect each other’s perspective and share knowledge and resources to achieve excellence, deliver value, and grow individually and collectively.”

• Excellence. “We deliver quality service and solutions of unmatched value, constantly raising the bar on our performance.”

The standards established in this Code are not new. It is a good azimuth check for all to use. The Code summarizes, clarifies, and sometimes updates our existing standards for employee conduct so that we can all act consistently within the framework of our vision and values.

While we operate in many different parts of the country and overseas and in different business climates, we must always set and work within our high standards. Follow this Code of Conduct for it is the right thing to do. If you are ever unsure about the proper course of action, get guidance from your supervisor, management and/or leadership. Remember, this is your company – your Ohana. Our success depends on you.

by Ray Jardine, NHV Honolulu

P11nhv LAUnChES nEwLy rEDESIGnED wEbSITE

P12Army DonATES ComPUTErS To EDUCATE ChILDrEn on UXo'S

Ho‘okipaS h A r I n G o F T h E n E w S

P U L E K I n A h A ’ I L o n o

ELICITATIon: CAn yoU rECoGnIZE IT?

We live in a very special place and it’s called Hawai’i, and the meaning guides us and directs our behavior. The word

ha – the breath, the life, the essence, the space in the atmosphere – this is the ha. It’s the breath that you take when you first come to the planet, the first breath. It’s the last thing you give back when you leave. And in between the first breath and the last breath, you never own it. It is the wai – the water that we drink; it’s within each of us. It’s the spiritual water that guides us daily. It’s what connects us to one another. It is the i – the spiritual force, the creative energy some would call God, the cosmos of nature. It allows us to recognize one another

before we’ve introduced and shared our names or our backgrounds.

The ha, the wai, and the i – it is a mission statement that guides us and says, “Care for the air, the water, and the spirit. Watch what you eat, what you serve others, and how you treat your friends and your places.” Our kuleana in this wonderful place called Hawai’i is to do just that – to care for the air, the water, and the spirit for ourselves and for others, for the present as well as the future as we honor our ancestors in the past. This is Hawai’i.

Word of the Day:Hawai’i

Ramsay Taum is the founder and president of the Hawai’i based Life Enhancement Institute (LEI) of the Pacific, LLC. Ramsay also lectures on host cultural values in the workplace at the school of Travel industry Management (TIM) at the University of Hawai’i where he formerly served as Special Assistant to the Dean on Host Culture and Community Affairs. Here, he shares the meaning behind the name “Hawai’i”.

Hawai’i, a deeper meaning

P3

Adapted from:“Life In These Islands” TV Special: Ramsay Taum Shares the Meaning of Hawai’i

”Hawai’i is a mission statement

that guides us and says, “Care for the air, the water, and the spirit...”

– Ramsay Taum

To view this video segmenton the web, please visit: http://lifeintheseislands.tv/?p=32

P4

Strategic Plan 2010-2014On January 1, 2010, Native Hawaiian Veterans, LLC began its 5th year in Business. i’m sure by now all of you have heard about this “Success Story”. We really had a tremendous start and both Dr. Jardine and I appreciate you embracing our “Message” and your continued portrayal of our “Message” to our Customers and Partners. You are the reason for our success and the key to NHV’s Future.

in December of 2009, NHV’s Leadership held a conference to answer that exact question. We discussed Maintaining Current Work, Mentor-Protégé Program, Projections for 2010, and our next strategic Plan.What’s Next?

CUrrEnT worK

it has been difficult during the first quarter of 2010 to maintain current work. A lot of it had to do with the Government’s Continuing Resolution (CR), which is basically the government’s way of delaying the Federal Budget. This year, it ran longer than previous years, and once the money was released, Agencies still needed to make decisions on what to fund as they did not get what they asked for. We’ve closed the loop on most of our funding issues except in a few EM/CBRNE, F&ES & ROC contracts.

some of the difficulties were internal to NHV as we did not have the required systems and contract vehicles necessary to capitalize on new Business Opportunities. As a result, we purchased a new accounting system and are applying for a GSA Mobis Contract both of which should be fully implemented before the end of the year.

mEnTor-ProTÉGÉ ProGrAm

This is a Program that provides funding for a large company (mentor) to train a small company (protégé) how to be successful in the Business World. in 2007, Dr. Jardine and i decided on Battelle as a Mentor and began the process. It was approved by the DoD last year and was funded this year. in November of 2009, Battelle

and NHV’s Leadership began extensive meetings identifying and organizing training needs of NHV. The process starts soon. “Stand By”.

ProjECTIonS For 2010

We have secured at least 95 % of required funding to continue work that NHV currently performs and are working hard to Prime large contracts within our core competencies this year. We feel that our projected growth to approximately $18M in revenue and 120 employees is sound.

STrATEGIC PLAn

Besides creating a Business Plan when we started this Business, we put together a 5 year Strategic Plan. At the end of our first 5 years, we realized that we hit every item except for one (“Priming a Large Contract”). Another reason for our success! During our meeting in December of 2009, we put together a Plan for the next 5 years (below). Let’s see if we can do the same!

As you can see, we are hard at work in planning and strategizing our next move. However, none of this would mean anything if we do not perform on time and in budget. Again, mahalo for your continued hard work and support.

-Aloha, “Chief”

Michael “Chief” JonesFire Chief, Retired Executive Vice President

2010

• SDVOSB/SDB/8(a) • Sub/Prime • Business Plan • LOC 2M • Partnering/Teaming • Assess Strategic Plan • Relationships Strategy • HR (in source) • Benefit Plan • GSA MOBIS • 501(c)(3) • MPP DOD and SBA • Join Ventures - 2 • Employees 100-120

2011-2012

• add HUBZone/NHO • Sub/Prime • Update • Add as needed • Add • Assess/Review • Update • Evaluate • Update • Schedule 70/Eagle • Grants/Sponsors • Continue • Join Ventures - 2 • Employees 120-150

2011-2012

• Multi 8(a) Companies • Prime/Sub • Update • Add as needed • Add • Strategic Plan 15-19 • Update • Evaluate • Update • Add/Update • Continue • Continue • Add • Employees 150-200

STRATEGIC PLAN 2010-2014

“We havesecured 95%of requiredfunding to

continue workthat NHVcurrently

performs.”

P5

Report says defense contractors battle “relentless” online assaultsForeign nations are increasingly exploiting the Internet, including social network sites, to conduct industrial espionage against Defense Department contractors, according to a recently released government report.

“United States defense-related technologies and information are under attack each day, every hour and from multiple sources,” the Defense Security Service, which oversees security at 13,000 contractor facilities, said in the report. “The attack is pervasive, relentless and unfortunately, at times, successful.”

Contractors are required to detail suspicious contacts with foreign nations or commercial organizations to the Defense Security Service, according to the report, which is the second document on industrial espionage that top Pentagon officials called for in July 2008. The report covers 2008, was written in 2009. it was released on March 30.

Direct requests for information sent via e-mail were the most prevalent type of attempt to obtain information on U.S. defense systems, followed closely by what the Defense Security Service called “suspicious Internet activity,” which included intrusions into unclassified contractor networks.

The attacks came from nations considered unfriendly and friendly. Countries in East Asia and the Pacific - including China, the two Koreas and Vietnam - dominated Internet attempts to collect U.S. defense information, the report noted. E-mail messages requesting price quotes and system information were the preferred method to attempt to steal information on U.S. technologies.

Users also sent multiple e-mail requests for the same information to different individuals working for the same contractor.

The report warned that the abundance of personnel information on contractor Web sites and the growing use of social network sites “give a likely targeting advantage to East Asia and Pacific cyberactors exploiting the Internet.”

Hackers from east Asia and the Pacific region focused their attention on information systems, accounting for 29 percent of suspicious contact reports turned in to the Defense Security Service, according to the report. More than a third of the attacks (36 percent) coming from European countries, including Russia and NATO allies such as France, Germany and the United Kingdom, tried to obtain information on

As featured in NextGov.com, April 2010

Security Corner:Social networking sites a security threat

by bob brewin

aeronautical systems and 12 percent targeted data on information technology.

Attempts to obtain information on unmanned aerial vehicles, which the military has used successfully in Iraq and Afghanistan, have increased to an extent that the report devoted a special section on foreign probes to gain information on these programs.

The U.S. industrial sector is at risk of intensive foreign-originated efforts to acquire UAV-related technologies or information at contractor facilities, the report concluded.

NATO allies as well as current or potential allies have tried a variety of Internet probes to obtain information on UAV technology, including inquiries to buy entire systems or suspicious requests asking to team with a contractor or to create a joint venture.

Gene Robinson, president of RP Flight Systems in Austin, Texas, which builds UAVs for civilian public safety agencies, said his company experiences Internet probes on a daily basis from everywhere in the world. During the weekend of April 4-5, the company

Continued on next page...

P6

Security Corner (Continued from previous page)

a daily basis from everywhere in the world. During the weekend of April 4-5, the company logged attacks from Syria, Turkey and Iran, and on Monday flagged probes from Australia, Brazil, Belgium, France, Greece and the Netherlands, he said.

Countries seeking UAV information monitor social network sites such as YouTube, which Robinson said has numerous UAV videos. They also log on to the professional social networking site LinkedIn, which large U.S. defense corporations use to glean personal information on top Defense contractor personnel to create e-mail phishing attacks aimed at those executives, Robinson noted.

A.R. “Trey” Hodgkins III, vice president for the national security and procurement policy for the industry group TechAmerica, said LinkedIn poses a potential security problem because it provides detailed personal information that can make the recipient of a phishing e-mail think it is from a legitimate company. He said the amount of information available on a social network site comes down to individual responsibility.

“As our means of communications evolve, I think we should expect such efforts at espionage to evolve,” Hodgkins said. “One of the persistent weak links in network security is

the people that use those networks, so there will always be those trying to take advantage of that weak link.”

Charles “Jack” Holt, senior strategist for emerging media in the Pentagon, said Defense, which issued a policy on the use of social media in March, wants to use social media, but that requires the department to train troops, employees and contractors to understand the threats it poses.

Holt added reports such as the one from the Defense Security Service “help us to understand the environment in which we now work and live and it is our responsibility to help our people understand their roles and their responsibilities.”

A spokesman said Facebook provides privacy settings to block access to personal information and emphasized users should follow their employers’ social networking guidelines. “As we advise all Facebook users, Department of Defense personnel should be aware of the information they post and how to control who sees that information,” he said. “Like any nonsecure communications channel, sensitive or classified information should never be posted on Facebook and information that is made available should be in compliance with employer guidelines.”

Supporting the woundedwarrior Project

On April 24, 2010, a fundraising event hosted by the Fort Monroe Spouses’ and Civilians’ Club was held at historic Fort Monroe in Hampton, Virginia. The event raised money to provide support to the “Wounded Warrior Project”. The family friendly event consisted of a 10K run, 5K and 1K run/walk. Over 600 runners turned out to support the cause. Prior to and after the runs, there was live music and proper recognition of the purpose of the event.

One of our own, Bud Williams, provided support to the Wounded Warrior Project one step at a time. Having not run for many years, this run was indeed a challenge. Although not a race setting record time, he did complete the 5K run while supporting the cause.

Congratulations to Bud Williams for providing his support to this worthy cause! Looking forward to seeing you at the next Iron Man Triathlon in Hawaii.

To see how you can help, please visitthe Wounded Warrior website at:www.woundedwarriorproject.org

P7

Elicitation:Can you recognize it? It is your duty to report it!

whAT IS rECrUITmEnT?

Recruitment is obtaining cooperation from someone to provide sensitive or classified information.

An intelligence service typically conducts recruitment after careful assessment and patient cultivation of the target. By the time the offer to work for the foreign government or entity (the “pitch”) is made, the intelligence officer (iO) is relatively confident of the target’s willingness to cooperate.

If the target agrees to the recruitment, that person becomes an “asset” (a spy). The IO handles the asset by clandestinely receiving information, paying the asset, and guiding the asset in illicit collection activities.

Money is frequently used as a recruitment tool, but there are alternate methods such as appealing to ideology, ego, revenge, blackmail, etc. Safeguard your actions and words to avoid becoming an easy target.

Be honest with yourself about your own vulnerabilities and adjust your lifestyle to close gaps that hostile entities could exploit.

ThE ThrEAT

The mainstay of most intelligence services worldwide is the recruitment of well-placed assets who can provide insightful intelligence

on collection requirements. Most sensitive military and civilian jobs are of special interest to foreign intelligence services.

Foreign intelligence services also use foreign defense industry representatives involved in business with U.S. companies to identify, assess, and approach potential recruitment targets.

Despite the number of Americans who have initiated espionage careers on their own volition, foreign intelligence services continue to invest considerable time and resources assessing and targeting U.S. citizens for recruitment.

Approaches are almost never made impulsively, but are actually the end result of detailed planning and thorough assessment of the target. By the time the target is asked to work for an intelligence service, the person is probably aware that a dubious relationship is developing.

bottom line: be assertive. be alert. be aware. report suspicious activity!

DAmAGE PoTEnTIAL

Indisputably, those Americans who have betrayed their country, regardless of whether they volunteered or were recruited, have caused immeasurable damage to the security of the United States. In some cases, lives

were lost. In others, lives were destroyed. In all cases, lives were irreparably altered.

Americans who have spied have betrayed a special trust to the country, to their friends and colleagues, and to their families. Despite their personal rationale for committing espionage, all had other means at their disposal for fulfilling their aspirations, needs, and desires. Most, if not all spies, eventually regret their actions and their decisions to commit espionage.

Providing classified information to any unauthorized individual is illegal. Espionage against the U.S. government is a very serious crime punishable by imprisonment, fines, or death.

your individual contribution to the security of your company, military branch, federal agency, and your nation is vital.

rEPorTInG

Presidential Decision Directive / NsC-12 requires that government employees report all contact with individuals of any nationality, either within or outside the scope of the employees official activities, in which:

• illegal or unauthorized access to classified or sensitive information is sought.

• The employee is concerned that he/she may be the target of foreign entity exploitation.

Created by the Defense Security Service (DSS) Counterintelligence Directorate to sensitize you to foreign intelligence services targeting and elicitation; to assist you in recognizing and countering recruitment attempts; and to advise you to immediately report an incident or questionable relationship.

Continued on next page...

P8

roLE oF ThE DSS CI DIrECTorATE

in February 1993, pursuant to DoD direction, the DSS Counterintelligence (CI) Directorate was established to foster the integration of CI into the agency’s missions.

Purpose: To integrate CI into all functional aspects of DSS’s mission through operational support, training, and policy development:

• Provide for the early detection and referral of potential espionage situations.

• Assist in the recognition and reporting of foreign intelligence collection attempts directed against U.S. industry.

The CI Directorate at DSS Headquarters in Alexandria, VA contains several divisions: Collections, Insider Threat, Analysis, Cyber, and Production.

Additional CI Analysts are positioned with Defense Industrial Security Clearance Office (DisCO) and our field elements. Field Ci specialists are deployed in offices across the country to support and assist DSS Industrial Security Specialists and Cleared Defense Contractors.

mAjor DUTIES

The CI Directorate works closely with Dss field elements, military Ci departments, the Defense CI and HUMINT Center, military services, and national agencies in the development and referral of CI issues at both the local and national level.

DSS CI DIrECTorATE mISSIon ArEAS:

Threat Support

• Provide foreign threat analysis for U.S. Defense industry to aid security counter-measure development.

referral and Liaison

• evaluate potential insider threat cases and industry-related suspicious indicator reporting.

• Refer developments to DoD Ci and federal law enforcement agencies for further investigation.

CI Integration

• enhance security awareness and educate cleared industry concerning effective threat identification and reporting.

• educate and train Dss personnel on integration of CI into DSS missions.

DSS CI’s risk-based approach incor-porates:

• Realistic assessment of threats to technology and classified infor-mation.

Elicitation (Continued from previous page)

Elicitation is non-threatening.

It is hard to recognize as an intelligence technique,

and it is easy to denyany wrongdoing.

Because elicitation is subtle and difficult to recognize, you should report any suspicious conversations to your Facility security Officer, Dss industrial security Representative, or DSS Field Counterintelligence (CI) specialist. The individuals staffing these offices can assess your information and determine if a potential CI concern exists.

SUmmAry

in the espionage trade, intelligence officers use elicitation as a technique to subtly extract information about you, your work, and your colleagues. Elicitation is the art of conversation honed by intelligence services to its finest edge. You never know if entities are using elicitation to pass the time or to gather intelligence.

Social networking offers almost unlimited opportunities to gather information through direct personal contact. Elicitation requires patience and persistence. Pieces of information, collected over an extended period of time, can provide the final piece of the puzzle to a complex problem or save scarce research money.

Created by the Defense Security Service (DSS) Counterintelligence Directorate

DSS Field regions

Continued on next page... To download this brochure as created by DSS, please click here: http://files.me.com/lattasima/johuj1

CountErIntEllIgEnCEIntErrogatIon

P9

Tailored CI services through objective • criteria and threat categorization.

SUmmAry oF DSS

The Defense Security System (DSS) was formerly the Defense Investigative Service (Dis). Dis was established in 1972 to provide a single, centrally-directed service within the Department of Defense (DoD) for conducting Personnel Security Investigations (PSIs). DIS gained its industrial oversight mission in 1990.

in 1997, Dis was re-designed as the DSS in recognition of its broader mission and functions. in 2005, DoD restructuring transferred the Psi mission to the Office of Personnel Management.

DSS mISSIon

To support national security and the warfighter, secure the nation’s technological base, and oversee the protection of U.S. and foreign classified information in the hands of industry.

Five Primary mission Essential Tasks:

Clear industrial facilities, personnel, and • associated Information Systems.

Collect, analyze, and provide threat • information to cleared industry and government partners.

Manage Foreign Ownership, Control, and • influence in cleared industry.

Provide advice and oversight to cleared • industry.

Deliver security education and training.•

rEPorTInG

If you believe that a suspicious situation applies to your company, you should immediately notify your cognizant DSS Industrial Security Representative and/or Field CI Specialist. Likewise, notify DSS should you have any indication that your company or any of your employees may be the target of another country’s or entity’s attempted exploitation.

NisPOM 1-302B states, “Contractors shall report efforts by any individual, regardless of nationality, to obtain illegal or unauthorized access to classified information or to compromise a cleared employee.”

NisPOM 1-301 states, “Reports of actual, probable, or possible espionage, sabotage, terrorism, or subversion shall promptly be submitted to the FBI and DSS.”

bottom line: be assertive. be alert. be aware. report suspicious activity!

ProDUCTS

Each year, based on U.S. defense industry reporting of suspicious activity, the DSS CI Directorate publishes its findings against u.s. industry. This publication is:

“Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry.”

For specific threat information, please coordinate requests and requirements through your Facility security Officer to be worked through the DSS CI Directorate.

Counterintelligence Integration (Continued from previous page)

Dillard Spray, Shop Manager, took time out of his schedule to help the Muscular Dystrophy Association raise $28,639 as a West Oahu Jailbird at the MDA Lock Up at Chili’s Waikele. The proceeds will go towards sending local keiki (children) to MDA summer camp at Camp Erdman.

Big thanks to Dillard for agreeing to be “arrested” for having such a big heart. Bail is currently set at $700, the amount he helped bring in at the event as a jailbird!

if you would like to make a donation or find out how you can volunteer, please visit the MDA website at www.mda.org.

Become a West oahu Jailbird for MDa

Bail: $7

00

To download this brochure as created by DSS, click here: http://files.me.com/lattasima/5iv5ai

Our daughter, Skyylynn, is completing her fourth year of ballet and tap classes and is already preparing to audition for Whidbey Island Dance Theater’s production of The Nutcracker*. The dancers, some as young as 4 years old, will commit to a grueling two-week,

8-10 show marathon, sometimes performing the 3-hour ballet twice in a single day. Skyylynn has earned a part in The Nutcracker 4 years running, starting when she was five years old. Last year, she auditioned for (and got) a larger part as a mouse, and was chosen for a small individual part, engaging the Prince in a sword duel. She performed flawlessly in every performance and was invited to audition for a fifth consecutive year. Our son, Joey, featured in this newsletter when his football

team won the championship last year, is on yet another championship-bound team this year. This time, it’s baseball. The Coupeville Braves are currently undefeated with a record of 10-0. Joey’s accomplishments thus far include strong hitting and his stellar play as starting catcher. He is not afraid of a little contact at the plate, and many base runners have thought twice before taking a run at home plate when he is in the catchers gear. His crowning achievement so far this year

was against the only other undefeated team in the league where he hit a double, a two run home run, and a Grand Slam to help his team to victory, making the Braves the only undefeated baseball team in the league!

- Joseph Lippo

t h e l o v e o f a f a m i ly i s l i f e ’ s g r e at e s t b l e s s i n g

Joseph Lippo, Battle Watch Specialist, shares some exciting news about the performers and athletes in his family.

Future Stars in the Spotlight

Ohana Corner

* The Nutcracker ballet was first performed to the music of Tchaikovskiy in 1892 at the Mariinsky Theatre in Russia, home of the famed Kirov Ballet Company.

have exciting news to share about your loved ones?Share them here with us! we are always looking for stories that

inspire, motivate, and remind us of why family comes first.

w h AT w E A r E U P T o

P11

nHV launches new Corporate Website

www.nativehawaiianveterans.com

Back in April 2010, NHV announced a new product offering: Creative Design. since then, the Creative services Department has been working diligently to re-vamp the company's website and materials. NHV is proud to announce that the newly redesigned website is complete and has launched. In addition to getting a new face lift, the website now features an entire list of our partners and customers as well as a link to our consultants.

our Partners & Customers page features a complete list of the organizations we work with. This page also includes a link to read more about our consultants.

with a fresh new look, nhv's website continues to provide answers to questions you might have about our company. but of course, you may still contact our Corporate office in honolulu at (808) 792-7528 should you have any further questions. our office is open monday-Friday, 8:00am-5:00pm hST.

NHV's Creative services Department is a 100% digital design studio located in the Washington, D.C. area with capabilities to service all internal and client graphic documentation and presentation needs. Please send all your questions, comments, and suggestions regarding the website to

Cindy Tourison at [email protected]. have a creative project need? be sure to contact the Creative Services Department to see how they can assist you.

Army donates computers to educate children on unexploded ordnanceby joseph bonfiglio

ForT ShAFTEr, hawaii (April 9, 2010) -- Sen. Daniel K. Inouye, other veterans and officials from the Army visited students on the Waianae Coast April 1, to see first-hand how they are using computers donated by the Army to increase their safety and knowledge about unexploded ordnance.

The schools visited were Nanaikapono Elementary School and Ka Waihona Public Charter School in Nanakuli.

The first stop was at Nanaikapono and the students and faculty were thrilled by the visiting senator. The students presented the visiting party with leis and sang songs such as Aloha means I love you with Kupuna (elders) backing them up on ukuleles.

After music and a question and answer session, the visiting party got to visit with the elementary school students and see how they use their computers to learn about unexploded ordnance and other educational topics.

“I know that this has taken a lot to make this happen,” said school Principal Debra Knight. “This computer donation is so critical for us. It really helps us to meet our goals

for a 21st-century education. We have to be able to prepare our kids for the 21st century. Mahalo!”

After an hour visit at Nanaikapono, the visiting party went to Ka Waihona Public Charter Elementary and Middle School. They were again greeted with leis and more singing and ukulele music from the eighth graders.

Ka Waihona Principal Alvin Parker thanked Sen. Inouye and the Army and took the visiting party to a social studies class where the students were studying the Holocaust using their new computers. According to Sen. Inouye, these two events brought together the local community and the Army community in the concept of Ohana and Laulima. (Ohana means family and Laulima means working together.)

“This morning I looked at two projects, the result of Ohana and Laulima,” Inouye said. “This is where the military, the Corps of Engineers, the community, the Hawaiian organizations, all got together and this is the result. We have students here who will be able to compete with the finest in the land.”

“So I want to congratulate all of you in the Ohana who participated in bringing this up. And I hope you can keep this up. You all work together. I’ve been spending much time with adults and politicians and industry leaders and this morning was, I would say, a most memorable day. It’s been inspiring to be here and know that Hawaii is in good hands,” Inouye said.

Maj. John Henderson, U.S. Army Corps of Engineers, deputy district commander, said “the U.S. Army Corps of Engineers is very proud to represent the Army in this partnership with sen. inouye’s office, the local community and our business partners, Native Hawaiian Veterans and Hawaii 3R’s to help educate the children in these areas about the dangers of unexploded ordinance and what to do when they find it.”

“We visited these two schools today to get a first-hand look at how this project is being implemented and to ensure that the federal dollars authorized are being used as intended,” Henderson said. “It was absolutely great to see how these valuable teaching tools

Continued on next page...

maj. john henderson of the U.S. Army Corps of Engi-neers helps a grade-school student in hawaii learn about the dangers of unex-ploded ordnance.

Article and pictures used by permission as featured on Army.mil, April 2010

P12

integrated into the classrooms, the progress our kids are making in the awareness of UXO, and the very positive impact this project is having in the local community to help keep our children safe.”

The background of the program is that in fiscal year 2009, the u.s. Army Garrison Hawaii received $850,000 to implement a uXO safety Awareness Program for 11 Leeward Oahu Schools and two Big Island Schools.

The U.S. Army Corps of Engineers, Honolulu District, in turn supports the garrison and the local community by providing safety awareness and helping to educate children who could be exposed to UXO. In order to best do this, the District contracted Native Hawaiian Veterans, to launch a public safety/outreach program for Oahu and the Big Island.

Native Hawaiian Veterans subsequently subcontracted Hawaii 3R’s to procure computer equipment for the schools with UXO Safety Awareness materials.

The unexploded ordnance safety awareness training computer program has a primary audience of students from kindergarten to 12th grade and has put 370 new laptop computers into DOE and charter schools between september 2009 and February 2010.

The interactive UXO Safety Awareness materials installed on the laptop computers provide short UXO Safety questions and answers called “Fun Facts” as part of the computer log-in process. So far, 58 different “Fun Facts” screens have been added into the system. The Fun Facts are drawn randomly

from a central Web site each time a student turns on the computer and starts the log-in process.

The 11 schools on Oahu are: Makaha Elementary, Waianae High School, Waianae Intermediate School, Waianae Elementary, Leihoku Elementary, Maili Elementary, Nanaikapono Elementary, Nanakuli High & Intermediate School, Nanakuli Elementary, Kamaile Charter School, Ka Waihona O Ka Na’auao Charter School. The two schools on the Big Island are: Keaukaha Elementary School and Waikoloa Elementary School.

(Joseph Bonfiglio is the chief of Public Affairs for the U.S. Army Corps of Engineers, Honolulu District, and this article first appeared in the Hawaii Army Weekly at Schofield Barracks, Hawaii.)

Army Donates Computers (Continued from previous page)

Sen. Daniel K. Inouye answers students’ questions at nanaikapono Elementary School in nanakuli, hawaii, as members of his staff, veterans, the State Dept. of Education and the U.S. Army Corps of Engineers look on.

P13

EmPLoyEE rIGhTSUnDEr ThE nATIonAL LAbor rELATIonS ACT

The NLRA guarantees the right of employees to organize and bargain collectively with their employers, and to engage in other protected concerted activity. Employees covered by the NLRA* are protected from certain types of employer and union misconduct. This Notice gives you general information about your rights, and about the obligations of employers and unions under the NLRA. Contact the National Labor Relations Board, the Federal agency that investigates and resolves complaints under the NLRA, using the contact information supplied below, if you have any questions about specific rights that may apply in your particular workplace.

Under the nLrA, you have the right to:● Organize a union to negotiate with your employer concerning your wages, hours, and other terms and conditions of employment.● Form, join or assist a union.● Bargain collectively through representatives of employees’ own choosing for a contract with your employer setting your wages, benefits, hours, and other working conditions.● Discuss your terms and conditions of employment or union organizing with your co-workers or a union.● Take action with one or more co-workers to improve your working conditions by, among other means, raising work-related complaints directly with your employer or with a government agency, and seeking help from a union.● Strike and picket, depending on the purpose or means of the strike or the picketing.● Choose not to do any of these activities, including joining or remaining a member of a union.

Under the nLrA, it is illegal for your employer to:

● Prohibit you from soliciting for a union during non-work time, such as before or after work or during break times; or from distributing union literature during non-work time, in non-work areas, such as parking lots or break rooms.● Question you about your union support or activities in a manner that discourages you from engaging in that activity.● Fire, demote, or transfer you, or reduce your hours or change your shift, or otherwise take adverse action against you, or threaten to take any of these actions, because you join or support a union, or because you engage in concerted activity for mutual aid and protection, or because you choose not to engage in any such activity.● Threaten to close your workplace if workers choose a union to represent them.● Promise or grant promotions, pay raises, or other benefits to discourage or encourage union support.● Prohibit you from wearing union hats, buttons, t-shirts, and pins in the workplace except under special circumstances.● Spy on or videotape peaceful union activities and gatherings or pretend to do so.

Under the nLrA, it is illegal for a union or for the union that represents you in bargaining with your employer to:

● Threaten you that you will lose your job unless you support the union.● Refuse to process a grievance because you have criticized union officials or because you are not a member of the union.● Use or maintain discriminatory standards or procedures in making job referrals from a hiring hall.● Cause or attempt to cause an employer to discriminate against you because of your union-related activity.● Take other adverse action against you based on whether you have joined or support the union.

If you and your coworkers select a union to act as your collective bargaining representative, your employer and the union are required to bargain in good faith in a genuine effort to reach a written, binding agreement setting your terms and conditions of employment. The union is required to fairly represent you in bargaining and enforcing the agreement.

Illegal conduct will not be permitted. If you believe your rights or the rights of others have been violated, you should contact the NLRB promptly to protect your rights, generally within six months of the unlawful activity. You may inquire about possible violations without your employer or anyone else being informed of the inquiry. Charges may be filed by any person and need not be filed by the employee directly affected by the violation. The NLRB may order an employer to rehire a worker fired in violation of the law and to pay lost wages and benefits, and may order an employer or union to cease violating the law. employees should seek assistance from the nearest regional NLRB office, which can be found on the Agency’s website: www.nlrb.gov.

Click on the NLRB’s page titled “About us,” which contains a link, “Locating Our Offices.” You can also contact the NLRB by calling toll-free: 1-866-667-nLrb (6572) or (TTY) 1-866-315-nLrb (6572) for hearing impaired.

*The National Labor Relations Act covers most private-sector employers. Excluded from coverage under the NLRA are public-sector employees, agricultural and domestic workers, independent contractors, workers employed by a parent or spouse, employees of air and rail carriers covered by the Railway Labor Act, and supervisors (although supervisors that have been discriminated against for refusing to violate the NLRA may be covered).

This is an official Government Noticeand must not be defaced by anyone.

3375 Koapaka Street, Suite b-286 honolulu, hI 96819

(Airport Industrial Park Complex)

Phone: (808) 792-7528 Fax: (808) 792-7527

[email protected]

Editor & Layout: Chance LattasimaDesign & Layout: Cindy Tourison

Here at Native Hawaiian Veterans, we recognize the value of partnerships, not only with our teammates, but also with our customers. We strive for long-term relationships with our customers founded on integrity and our commitment to listen and respond to their needs.

We approach each customer with our driving principle in mind: doing the right thing, the right way, the first time.

The Value of Partnerships: Our Partners & Customers

• ABSG Consulting, Inc.• Aegir Systems, Inc.• AES Technical• Akimeka, LLC• Alaska Training Group, LLC• Aleut Mgmt Services, LLC (ANC)• American Automation• American Hospital Svc Group, Inc.• American Systems• Apogen Technologies• ARA, Inc.• Army Corp (ACOE)• Arrowpoint Corporation• Baca Group• Battelle Memorial Institute• BCP International Ltd• Blackheart International, LLC• Boeing• BUMED HQ• By Light Professional IT Services• CACI• Capstone Corporation• Chenega (ANC)• Chickasaw Nation Industries, Inc.• Choy Enterprises, Inc. (CEI)• Civil & Environmental Consultants, Inc.• CNIC• CNRH• CommsFirst, Inc.• Concurrent Technologies Corp.• CSC• Dawson Tech (NHO)• Department of the Army• Eagle Support Services• EOD Technology, Inc.

• Epsilon Systems Solutions, Inc.• Espire Services, LLC• Excalibur Associates, Inc.• Excellere Consulting Associates• Eyak Technology, LLC• FISC• Flashback Media Productions• Flatter and Associates• FOP Development Group, LLC• General Dynamics• Gradient Technologies, Inc.• Global Trends Technologies, LLC• GovSource• Grainger• Group IQ• Halfaker and Associates• Hana Group (NHO)• Hawaii 3R’s• Hickam AFB• Hyperspective Studios• Ikayzo• J. M. Waller Associates, Inc.• JTSI (NHO)• Juniroa Productions• K4 Solutions• KEMSS, LLC• King Fisher Company• Legatus6, LLC• Lockheed Martin• Louis Berger Group• Metters Industries, Inc.• Moonblink Communications• MSSI• MTCI• NANA (ANC)

• Native Hawaiian Ordnance, LLC• NAVFAC• NHES, LLC• Nortel Government Solutions• Northrop Grumman• Oceaneering International• OER, Inc.• P&E Automation, Inc.• Pacific Wireless• Pelatron (NHO)• Planate Mgmt Group, LLC• PS3 Group, LLC• Raytheon UTD, Inc.• Riverside Research Institute• RNB Technologies, Inc.• SAIC• Sandia/DOE• SBG Technology Solutions• Semper Delta, LLC• Serco, Inc.• Siemens• Slate River• SMS Research & Marketing• SPAWAR• Spec Rescue International• Strategic Solutions, Inc.• TAJ• Tetra Tech• Tribalco• Trident Technology Systems• US Army ARDEC• USA Environmental• VSE Corporation• VT Griffin

Ho‘okipaP U L E K I n A

h A ’ I L o n o

MissionTo be known as an exceptional provider

of products, services and solutions to our partners and for our customers while fostering growth and profitability for our Ohana and enriching our community.

Founding Core ValuesOhana – the circle of those who are family and those chosen as familyAlaka’i – leadership - leading with initiative and by setting a good exampleKina’ole – flawlessness – doing the right thing, the right way, the first timeLokahi – collaboration and cooperation. Working together to achieve moreHo’okipa – generosity, sharing with our ohana and our community