Department of Defense Authorization for Appropriations for Fiscal Year 2012 and the Future Years Defense Program

Total Page:16

File Type:pdf, Size:1020Kb

Department of Defense Authorization for Appropriations for Fiscal Year 2012 and the Future Years Defense Program S. HRG. 112–80, PT. 3 DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 2012 AND THE FUTURE YEARS DEFENSE PROGRAM HEARINGS BEFORE THE COMMITTEE ON ARMED SERVICES UNITED STATES SENATE ONE HUNDRED TWELFTH CONGRESS FIRST SESSION ON S. 1253 TO AUTHORIZE APPROPRIATIONS FOR FISCAL YEAR 2012 FOR MILITARY ACTIVITIES OF THE DEPARTMENT OF DEFENSE AND FOR MILITARY CONSTRUCTION, TO PRESCRIBE MILITARY PERSONNEL STRENGTHS FOR FISCAL YEAR 2012, AND FOR OTHER PURPOSES PART 3 READINESS AND MANAGEMENT SUPPORT MARCH 17 AND MAY 18, 2011 ( Printed for the use of the Committee on Armed Services VerDate Aug 31 2005 09:48 Feb 24, 2012 Jkt 000000 PO 00000 Frm 00001 Fmt 6011 Sfmt 6011 Y:\BORAWSKI\DOCS\68086.TXT JUNE PsN: JUNEB DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 2012 AND THE FUTURE YEARS DEFENSE PROGRAM—Part 3 READINESS AND MANAGEMENT SUPPORT VerDate Aug 31 2005 09:48 Feb 24, 2012 Jkt 000000 PO 00000 Frm 00002 Fmt 6019 Sfmt 6019 Y:\BORAWSKI\DOCS\68086.TXT JUNE PsN: JUNEB S. HRG. 112–80 PT. 3 DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 2012 AND THE FUTURE YEARS DEFENSE PROGRAM HEARINGS BEFORE THE COMMITTEE ON ARMED SERVICES UNITED STATES SENATE ONE HUNDRED TWELFTH CONGRESS FIRST SESSION ON S. 1253 TO AUTHORIZE APPROPRIATIONS FOR FISCAL YEAR 2012 FOR MILITARY ACTIVITIES OF THE DEPARTMENT OF DEFENSE AND FOR MILITARY CONSTRUCTION, TO PRESCRIBE MILITARY PERSONNEL STRENGTHS FOR FISCAL YEAR 2012, AND FOR OTHER PURPOSES PART 3 READINESS AND MANAGEMENT SUPPORT MARCH 17 AND MAY 18, 2011 Printed for the use of the Committee on Armed Services ( Available via the World Wide Web: http://www.fdsys.gov/ U.S. GOVERNMENT PRINTING OFFICE 68–086 PDF WASHINGTON : 2012 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Aug 31 2005 09:48 Feb 24, 2012 Jkt 000000 PO 00000 Frm 00003 Fmt 5011 Sfmt 5011 Y:\BORAWSKI\DOCS\68086.TXT JUNE PsN: JUNEB COMMITTEE ON ARMED SERVICES CARL LEVIN, Michigan, Chairman JOSEPH I. LIEBERMAN, Connecticut JOHN MCCAIN, Arizona JACK REED, Rhode Island JAMES M. INHOFE, Oklahoma DANIEL K. AKAKA, Hawaii JEFF SESSIONS, Alabama E. BENJAMIN NELSON, Nebraska SAXBY CHAMBLISS, Georgia JIM WEBB, Virginia ROGER F. WICKER, Mississippi CLAIRE MCCASKILL, Missouri SCOTT P. BROWN, Massachusetts MARK UDALL, Colorado ROB PORTMAN, Ohio KAY R. HAGAN, North Carolina KELLY AYOTTE, New Hampshire MARK BEGICH, Alaska SUSAN M. COLLINS, Maine JOE MANCHIN III, West Virginia LINDSEY GRAHAM, South Carolina JEANNE SHAHEEN, New Hampshire JOHN CORNYN, Texas KIRSTEN E. GILLIBRAND, New York DAVID VITTER, Louisiana RICHARD BLUMENTHAL, Connecticut RICHARD D. DEBOBES, Staff Director DAVID M. MORRISS, Minority Staff Director SUBCOMMITTEE ON READINESS AND MANAGEMENT SUPPORT CLAIRE McCASKILL, Missouri, Chairman DANIEL K. AKAKA, Hawaii KELLY AYOTTE, New Hampshire E. BENJAMIN NELSON, Nebraska JAMES M. INHOFE, Oklahoma JIM WEBB, Virginia SAXBY CHAMBLISS, Georgia MARK UDALL, Colorado ROB PORTMAN, Ohio MARK BEGICH, Alaska SUSAN M. COLLINS, Maine JOE MANCHIN III, West Virginia LINDSEY GRAHAM, South Carolina JEANNE SHAHEEN, New Hampshire JOHN CORNYN, Texas (II) VerDate Aug 31 2005 09:48 Feb 24, 2012 Jkt 000000 PO 00000 Frm 00004 Fmt 0486 Sfmt 0486 Y:\BORAWSKI\DOCS\68086.TXT JUNE PsN: JUNEB C O N T E N T S CHRONOLOGICAL LIST OF WITNESSES MILITARY CONSTRUCTION, ENVIRONMENTAL, AND BASE CLOSURE PROGRAMS MARCH 17, 2011 Page Robyn, Dr. Dorothy, Deputy Under Secretary of Defense, Installations and Environment ......................................................................................................... 9 Hammack, Hon. Katherine G., Assistant Secretary of the Army, Installations and Environment ................................................................................................. 23 Pfannenstiel, Hon. Jackalyne, Assistant Secretary of the Navy, Energy, In- stallations, and Environment .............................................................................. 32 Yonkers, Hon. Terry A., Assistant Secretary of the Air Force, Installations, Environment, and Logistics ................................................................................. 52 THE CURRENT MATERIEL READINESS OF U.S. FORCES MAY 18, 2011 Stevenson, LTG Mitchell H., USA, Deputy Chief of Staff, Logistics, U.S. Army ...................................................................................................................... 133 Panter, Lt. Gen. Frank A., Jr., USMC, Deputy Commandant for Installations and Logistics, U.S. Marine Corps ....................................................................... 137 Reno, Lt. Gen. Loren M., USAF, Deputy Chief of Staff for Logistics, Installa- tions, and Mission Support, U.S. Air Force ....................................................... 142 Burke, VADM William R., USN, Deputy Chief of Naval Operations for Fleet Readiness and Logistics (N4), U.S. Navy ........................................................... 146 (III) VerDate Aug 31 2005 09:48 Feb 24, 2012 Jkt 000000 PO 00000 Frm 00005 Fmt 5904 Sfmt 5904 Y:\BORAWSKI\DOCS\68086.TXT JUNE PsN: JUNEB VerDate Aug 31 2005 09:48 Feb 24, 2012 Jkt 000000 PO 00000 Frm 00006 Fmt 5904 Sfmt 5904 Y:\BORAWSKI\DOCS\68086.TXT JUNE PsN: JUNEB DEPARTMENT OF DEFENSE AUTHORIZATION FOR APPROPRIATIONS FOR FISCAL YEAR 2012 AND THE FUTURE YEARS DEFENSE PROGRAM THURSDAY, MARCH 17, 2011 U.S. SENATE, SUBCOMMITTEE ON READINESS AND MANAGEMENT SUPPORT, COMMITTEE ON ARMED SERVICES, Washington, DC. MILITARY CONSTRUCTION, ENVIRONMENTAL, AND BASE CLOSURE PROGRAMS The subcommittee met, pursuant to notice, at 2:33 p.m. in room SR–232A, Russell Senate Office Building, Senator Claire McCaskill (chairman of the subcommittee) presiding. Committee members present: Senators McCaskill, Webb, Udall, Shaheen, and Ayotte. Majority staff members present: Peter K. Levine, general coun- sel; Jason W. Maroney, counsel; and Russell L. Shaffer, counsel. Minority staff members present: Lucian L. Niemeyer, profes- sional staff member; and Diana G. Tabler, professional staff mem- ber. Staff assistants present: Kathleen A. Kulenkampff and Breon N. Wells. Committee members’ assistants present: Ann Premer, assistant to Senator Nelson; Gordon Peterson, assistant to Senator Webb; Tressa Guenov, assistant to Senator McCaskill; Joanne McLaughlin, assistant to Senator Manchin; Clyde Taylor IV, assist- ant to Senator Chambliss; and Brad Bowman, assistant to Senator Ayotte. OPENING STATEMENT OF SENATOR CLAIRE MCCASKILL, CHAIRMAN Senator MCCASKILL. Thank you for being here. I’d like to take just a moment to acknowledge a moment of his- tory here. There is something happening today that has never hap- pened before in the history of the U.S. Senate. What we have today is a woman chairman and a woman ranking member on a sub- committee in Armed Services, and that has never happened before in our country. So, with that, I want to welcome Senator Ayotte to the Senate Armed Services Committee, and this subcommittee in particular. (1) VerDate Aug 31 2005 09:48 Feb 24, 2012 Jkt 000000 PO 00000 Frm 00007 Fmt 6633 Sfmt 6602 Y:\BORAWSKI\DOCS\68086.TXT JUNE PsN: JUNEB 2 She and I are taking on this responsibility with enthusiasm. I’m honored to have the opportunity to do whatever I can to support the military. I will give a very brief opening statement and then turn it over to Senator Ayotte for her opening statement. Then we’ll look for- ward to your testimony today. The Subcommittee on Readiness and Management Support meets this afternoon to hear testimony on fiscal year 2012 budget request for Department of Defense (DOD) Installations and Envi- ronment. At today’s hearing, we will hear from our witnesses on the request for military construction (MILCON) and environmental programs for fiscal year 2012. This is our first subcommittee hearing in the 112th Congress, and I want to welcome all of the members of the subcommittee and say how much I look forward to working with everyone this year. I’d also like to thank our witnesses for rearranging their sched- ules to appear today on such short notice. It is very important for us to have this hearing as early in the congressional budget process as possible so we can have a full and frank discussion of the Presi- dent’s request that informs this year’s Defense authorization bill, and we appreciate your help in enabling us to do that. The subcommittee has scheduled a hearing on the Secretary’s ef- ficiencies initiatives for later this month. As far as I’m concerned, however, every hearing that we hold will be about efficiencies. Earlier this week, the Congressional Budget Office reported that the DOD budget has grown by 75 percent over the last decade. That is the base budget, not including the cost of overseas contin- gency operations. I do not believe there is anything DOD is doing that they cannot do better. I do not believe that there is any part of the budget that can be off limits as we look for potential savings. I will be looking at every area of this subcommittee’s jurisdiction as we attempt to cut duplicative projects and programs, increase management efficiencies, and reduce waste while we stay very fo- cused on maintaining the finest military in the world. Overall, the President’s budget request for MILCON and family housing is $14.7 billion in fiscal year 2012, as compared to a $19.3 billion authorized in last year’s National Defense Authorization Act (NDAA). That sounds
Recommended publications
  • Listener Feedback #171
    Security Now! Transcript of Episode #411 Page 1 of 40 Transcript of Episode #411 Listener Feedback #171 Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-411.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-411-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. We've got questions from our audience. We're going to answer those, talk a little bit about the math around NSA's 5ZB, also some more revelations on SSL security. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 411, recorded July 3rd, 2013: Your questions, Steve's answers, #171. It's time for Security Now!, the show that protects you and your loved ones online, your privacy, and also gives you deep insight into how computers work, how technology works, how the Internet works, with this guy here. Yeah, he's the Explainer in Chief, Mr. Steve Gibson. Hello, Steven. Steve Gibson: You know, Leo, I wondered whether maybe we'd gone a little, you know, there's the expression "jump the shark," or off, over the top or something last week.
    [Show full text]
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • Drowning in Data 15 3
    BRENNAN CENTER FOR JUSTICE WHAT THE GOVERNMENT DOES WITH AMERICANS’ DATA Rachel Levinson-Waldman Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at NYU School of Law is a nonpartisan law and policy institute that seeks to improve our systems of democracy and justice. We work to hold our political institutions and laws accountable to the twin American ideals of democracy and equal justice for all. The Center’s work ranges from voting rights to campaign finance reform, from racial justice in criminal law to Constitutional protection in the fight against terrorism. A singular institution — part think tank, part public interest law firm, part advocacy group, part communications hub — the Brennan Center seeks meaningful, measurable change in the systems by which our nation is governed. about the brennan center’s liberty and national security program The Brennan Center’s Liberty and National Security Program works to advance effective national security policies that respect Constitutional values and the rule of law, using innovative policy recommendations, litigation, and public advocacy. The program focuses on government transparency and accountability; domestic counterterrorism policies and their effects on privacy and First Amendment freedoms; detainee policy, including the detention, interrogation, and trial of terrorist suspects; and the need to safeguard our system of checks and balances. about the author Rachel Levinson-Waldman serves as Counsel to the Brennan Center’s Liberty and National Security Program, which seeks to advance effective national security policies that respect constitutional values and the rule of law.
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • NSA Utah Data Center
    NSA Utah Data Center Background The Utah Data Center, code-named Bumblehive, is the first Intelligence Community Comprehensive National Cyber-security Initiative (IC CNCI) data center designed to support the Intelligence Community's efforts to monitor, strengthen and protect the nation. Our Utah "massive data repository" is designed to cope with the vast increases in digital data that have accompanied the rise of the global network. NSA is the executive agent for the Office of the Director of National Intelligence ( ODNI ) and is the lead agency at the center. The 1.5 billion-dollar one million square-foot Bluffdale / Camp Williams LEED Silver facility houses a 100,000 sq-ft mission critical Tier III data center. The remaining 900,000 SF is used for technical support and administrative space. Our massive twenty building complex also includes water treatment facilities, chiller plants, electric substation, fire pump house, warehouse, vehicle inspection facility, visitor control center, and sixty diesel-fueled emergency standby generators and fuel facility for a 3- day 100% power backup capability. Utah Data Center Administration Building Learn More About Our Secret Surveill- ance Activities In recent months, numerous Top Secret documents have been leaked to the media relating to surveillance activities carried out by our Intelligence Community. In an effort to increase transparency, a new website called " IC OFF THE RECORD " was created to provide the American People immediate, ongoing and direct access to these unauthorized leaks. Click on the Photo Below to View Utah Data Center Up Close at High Resolution Utah Data Center Technical Specifications Data Storage Capacity In February 2012, Utah Governor Gary R.
    [Show full text]
  • From: Teressa B. Veith October 1, 2013 Hamilton, Illinois Via Email [email protected] To: the DNI Review Group on Intelligence and Communications Technologies
    From: Teressa B. Veith October 1, 2013 Hamilton, Illinois Via email [email protected] To: The DNI Review Group on Intelligence and Communications Technologies I should like to quote three men from three documents. While I am just quoting a few salient points I would encourage you to read all three in their entirety. Representative Louie Gohmert from the Congressional Record Volume 159, Number 108 Thursday July 25, 2013 from the middle of page H5079 upto and including most of page H5083: Page H5082: You’ve got to describe with sufficient particularity that people can identify items that you’re demanding to be produced. You can’t just come in and ask for everybody’s phone records in the country. I go back to 2002, when a CIA attorney at one of our judicial conferences Start page H5083: said, Gee, banks have all of your financial information. Why shouldn’t the government? I was aghast and said because the banks can’t come to your home, bust down the door, throw you to the ground, put a boot on your back, and put you in handcuffs and drag you off. But the government can and does. So we’ve got to be very careful to make sure that the government does not overreach what they are allowed to do. Then we find out the NSA has gotten orders so they can get every single call that we have made to somebody. There is no specificity in an order like that. This has to stop. I’ve been surprised. …I said that’s right, that’s what the law allows, but they’re going so far beyond that.
    [Show full text]
  • National Security Agency & the 4Th Amendment
    Seton Hall University eRepository @ Seton Hall Law School Student Scholarship Seton Hall Law 2016 National Security Agency & the 4th Amendment James C. DeZao Follow this and additional works at: https://scholarship.shu.edu/student_scholarship Part of the Law Commons Recommended Citation DeZao, James C., "National Security Agency & the 4th Amendment" (2016). Law School Student Scholarship. 765. https://scholarship.shu.edu/student_scholarship/765 NATIONAL SECURITY AGENCY & THE 4TH AMENDMENT Current Topics in Internet Law Professor Jennings December 3, 2014 James C. DeZao DATE SUBMITTED: DECEMBER 15, 2014 This paper is submitted in satisfaction of the Seton Hall Law School’s Advanced Writing Requirement. This paper is approved for AWR certification. E. Judson Jennings, Professor of Law Since the birth of the United States of America in 1776, there has been a sense of secrecy that has been cast around particular branches of our government. From the Kennedy assassination to Watergate, there are many instances that make us question our government’s intentions, particularly those branches that are not entirely transparent. The endless growth of technology in the world has only furthered our government’s agenda in keeping tabs on what is happening around the globe on a minute to minute basis. From the Middle East to the Mid-Western United States, the quest for information has been at its absolute highest level since September 11th, 2001. Born in 1952, the National Security Agency has been on the forefront of this race to collect data. Having been given several nicknames and abbreviations, the NSA has also been dubbed “No Such Agency” based on its secretive nature.
    [Show full text]
  • Virginia Base Seeks Tyndall F-22S
    COUNTY OKS $100M HURRICANE BOND LOCAL | A3 PANAMA CITY LOCAL & STATE | A3 RED SNAPPER SEASON SET FOR JUNE 11-JULY 12 Thursday, February 21, 2019 www.newsherald.com @The_News_Herald facebook.com/panamacitynewsherald 75¢ Virginia base seeks Tyndall F-22s By Jim Thompson and associated personnel to Counting pilots, mainte- 315-4445 | @Jimtnwfdn Joint Base Langley-Eustis in nance personnel and support [email protected] Hampton Roads. airmen, the units are bring- The state’s two senators, ing more than 500 people to EGLIN AFB — Maneu- Mark Warner and Tim Kaine, Eglin, a number that could vering by some members both Democrats, and the expand to 800 by summer, of Congress has potential state’s 11-member biparti- Eglin spokesman Andy Bour- implications to move Tyndall san House delegation, want land said recently. The F-22 Air Force Base’s temporarily the F-22 flight and main- operations are being housed relocated F-22 Raptor fighter tenance training units now at Eglin under a federally jets even farther away. moving to Eglin from Tyndall approved “interim beddown” With regard to the F-22 to be moved to Langley- arrangement that could keep Raptor fighter jets moved Eustis. Those units — the those operations at Eglin for to Eglin Air Force Base from 43rd Fighter Squadron, the as long as three years. In the Tyndall after Hurricane 2nd Fighter Squadron and interim, the Air Force will A 43rd Fighter Squadron Raptor roars down the runway late last Michael, Virginia’s con- Detachment 4 of the 372nd conduct an environmental year at Eglin Air Force Base.
    [Show full text]
  • 325Th Operations Group Changes Command
    A SPARTAN DEATH: TYNDALL’S 2015 MASTER QF-4s sacrifi ce selves SERGEANT SELECTS: See Gulf for others | Page 2 who was promoted on Page 9 Defender Friday, July 24, 2015 TYNDALL AIR FORCE BASE — HOME OF THE CHECKERTAILS Vol. 9, No. 30 325th Operations Group changes command See more photos from the ceremony on Page 4 AIRMAN 1ST CLASS SERGIO A. GAMBOA | Air Force The 325th Operations Group change of command ceremony was held July 17 at Hangar 2. During the ceremony, airmen, family members and spectators watched as Col. Robert Davis replaced Col. Max Marosko as the new 325th OG commander. The 325th OG is responsible for directing the flying and support operations for the 2nd Fighter Training Squadron, 43rd Fighter Squadron, 95th Fighter Squadron, the 325th Operations Support Squadron, and the 325th Training Support Squadron. The 325th OSS trains air traffic control personnel and intelligence officers for world-wide assignment, and supports daily operations of the group. TABLE OF CONTENTS ON FACEBOOK ON TWITTER ONLINE Raptor Games ............................. 9 Like 325FWTyndall Follow @Tyndall_325FW Find base info and Air Force news Nightlife ....................................10 for news, photos, for instant news and at www.tyndall.af.mil. See past Classifi eds ..................................12 reminders and more updates on the go editions at www.gulfdefender.com 2 | Gulf Defender Tyndall Air Force Base Friday, July 24, 2015 QF-4s sacrifice A SPARTAN DEATH selves for others By Tech. Sgt. David Salanitri military aircraft test their help pilots gain confidence the grey airframe, raw While the elements of the McCormick, a retired Airman’s Magazine staff writer abilities to engage with live and practice successfully American steel stripped of program are complex, the fighter pilot and aerial tar- munitions.
    [Show full text]
  • İSTİHBARATIN TEŞKİLATLANMA Ve YÖNETİM SORUNSALI: A.B.D. ÖRNEĞİ
    T.C. İSTANBUL ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ SİYASET BİLİMİ VE KAMU YÖNETİMİ ANABİLİM DALI YÜKSEK LİSANS TEZİ İSTİHBARATIN TEŞKİLATLANMA ve YÖNETİM SORUNSALI: A.B.D. ÖRNEĞİ Fatih TÜRK 2501110836 TEZ DANIŞMANI DOÇ. DR Pelin Pınar GİRİTLİOĞLU İSTANBUL - 2019 ÖZ İSTİHBARATIN TEŞKİLATLANMA ve YÖNETİM SORUNSALI: A.B.D. ÖRNEĞİ Fatih TÜRK Günümüzde teknolojinin gelişimi ve küreselleşme dünyayı uçtan uca değiştirdi. Toplumlar ve ülkeler birbiri ile etkileşime geçtikçe bireysel özgürlükler ve demokrasi konusunda hassas alanlar giderek artmaktadır. Bu etkileşim ülkelerin güvenliğini ve bireysel özgürlük alanlarınıda etkilemektedir. Bu hızlı değişime karşın ülkeler geçmişin soğuk savaş anlayışı ve güvenlik hassasiyetlerini de aynı zamanda taşımaya devam etmektedirler. Gelişmiş demokrasilere sahip ülkelerin başında gelen Amerika Birleşik Devletleri’nde (ABD) mevcut güvenlik ve istihbarat anlayışı, faaliyetleri ve denetimi işte bu çatışmanın uzun sürede meydana geldiği denge üzerine kuruludur. ABD açısından istihbarat teşkilatlanma süreci yeni problemler, hak arayışları, çatışma ve çözümler doğurmaktadır. Tüm bunların ışığında bu tezin temel amacı istihbarat problemlerini ABD istihbarat teşkilatlanma süreci üzerinden analiz edip karşılaşılan problemleri neden sonuç ilişkisi içerisinde tespit etmektir. Bu çalışmada Amerika Birleşik Devletleri’nde istihbaratın yönetim modeli, teşkilatlanması ve hukuki alt yapısı incelenmiştir. Birinci bölümde kavramsal anlamda istihbarat incelemesi literatüre önemli bir katkı olarak görülebilir. İkinci bölümde
    [Show full text]
  • Overexposed-Project
    Overexposed Profiles and photos of Overexposed artwork series. Research assembled by Paolo Cirio, 2014-2015. http://paolocirio.net/work/hd-stencils/overexposed Keith Alexander Keith seems excited for this selfie taken by Corrie Becker, a mysterious acquaintance of his whom he shares no apparent social connection with. He has his neck tucked into his collar and an awkward smile plastered across his face. He and Corrie appear to be close and intimate, having fun with the selfie. The location where this photo was taken and how these two met each other is unclear. Corrie stated on her Facebook post, “Look who takes a great #Selfie - General Keith Alexander, the Cowboy of the NSA.” The photo was obtained from Facebook via Corrie Becker's account. Dated May 27th, 2014.1 Keith Brian Alexander served as Director of the National Security Agency (NSA) until 2013 and is now a retired four-star general. He was also Chief of the Central Security Service (CHCSS) and Commander of the U.S. Cyber Command. Alexander held key staff assignments as Deputy Director, Operations Officer, and Executive Officer both in Germany and during the Persian Gulf War in Operation Desert Shield and Operation Desert Storm. He also served in Afghanistan on a peacekeeping mission for the Army Deputy Chief of Staff for Intelligence. In Saudi Arabia he presided over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army. Among the units under his command were the military intelligence teams involved in torture and prisoner abuse at Baghdad’s Abu Ghraib prison.2 Two years later, Donald Rumsfeld appointed Alexander director of the NSA.
    [Show full text]