September 28, 2007
Total Page:16
File Type:pdf, Size:1020Kb
Vol. 65, No. 39 Publishedished inin thethe interinterest of Division West, First Army and Fort Carson community Sept. 28, 2007 Visit the Fort Carson Web site at www.carson.army.mill Building the team 2nd BCT trains at AF Academy Story and photos by Cpl. Rodney Foliente 2nd Brigade Combat Team Public Affairs Office, 4th Infantry Division Soldiers from 2nd Brigade Combat Team, 4th Infantry Division, conducted team-building training in Jacks Valley at the Air Force Academy in Colorado Springs Sept. 7. Leaders from Headquarters and Headquarters Company, 2nd BCT, coor- dinated the event and opened the training up to their Soldiers and Soldiers from Company A, 204th Brigade Support Battalion, cooks from the Warhorse Dining Facility and medics from 1st Squadron, 10th Cavalry Regiment. “Overall, the Jacks Valley event was geared to provide a different training setting as well as to promote team spirit and team accomplishment,” said Sgt. 1st Class Erin Langes, training Soldiers from Company A, 204th Brigade Support Battalion, 2nd Brigade Combat Team, 4th Infantry Division, noncommissioned officer-in-charge, dig their way beneath an electrical fence at the Air Force Academy’s Leadership Reaction Course Sept. 7. HHC, 2nd BCT. He said Soldiers had a lot of fun and learned quite a bit. the day and saw the event as a “hugely their destinations. Soldiers had to accomplish their missions with limited “It was a chance for (Soldiers) to beneficial team-building exercise.” locate each point and then use that supplies, limited time and a whole get out, see a different part of Colorado Soldiers separated into squads, spot as reference to finding the next lot of teamwork. Springs and see a different aspect of conducted the Land Navigation Course destination during the timed event. Throughout the challenges, military training and benefit greatly and Leadership Reaction Course and Although Soldiers said they Soldiers sometimes yelled at each from it,” added Capt. David Sturgis, enjoyed a barbecue lunch in between. enjoyed the land navigation, it was the other, often laughed together and mostly commander, HHC, 2nd BCT. Squads were also able to retrain on LRC that offered the most enjoyment encouraged each other as a team. The Taking Soldiers to the academy the basics of land navigation, as they and helped forge unit cohesion. squads often found new and creative allowed them to be in a different environ- plotted points as destinations, made The LRC tested each squad’s ways to accomplish their missions, ment and they were able to relax more, calculations for distance and direction, ability to work together and the mettle which mostly worked. said Sturgis. He said he enjoyed seeing set up their walking pace counts and of the squad leaders. Squads rotated the enthusiasm of the Soldiers throughout utilized compasses and maps to find through different scenarios and had to See Building on Page 3 INSIDE THE MOUNTAINEERMOUNTAINEER Opinion/Editorial Community Briefs . .13 Protecting your identity . .2 Where would he be . .14 Chapel schedule . .15 Military Nurse practitioner gets Victorian .16-17 Striker soldier named best NCO . .5 Police Blotter . .18 Military Briefs . .6 MWR events . .22 Hunters MOUT up . .7, 9 Day Zero Brief . .8-9 Feature Field hospital exercise . .20-21 Community Fall Fiesta on post . .11 Sports Youth football under way . .25 MUST SEE On the Bench . .26 Pigskin Pics . .27 Photo by Rebecca E. Tonn Intramural standings . .28 Wounded Warriors honored Happenings Col. Henry Kievenaar, commander 2nd Brigade Combat Team, 4th Cripple Creek is solid gold . .29-30 Infantry Division, front, welcomes home Wounded Warriors Sept. 20 Get Out . .31 during the Joe Gmelch Wounded Warrior Welcome Social at Alternate Escapes. From left are Pfc. Douglas Meeker, Staff Sgt. Allen Bradley, Spc. Scott Sikonia, Pfc. Donald Hewatt, Spc. George Avalos, Classified advertising (719) 329-5236 Staff Sgt. Johnie Singleton, Pfc. Bobby Denney, Sgt. Daniel Frosch, 10th CSH sets up field hospital. Display advertising (719) 634-5905 See Pages 20-21. all 1st Battalion, 9th Infantry Regiment, 2nd BCT, 2nd ID, and Spc. Mountaineer editor (719) 526-4144 Post information (719) 526-5811 Matthew Evans, and Spc. Timothy Herrmann, both 3rd Squadron, Word of the month: Readiness Post weather hotline (719) 526-0096 61st Cavalry Regiment. Not shown is Sgt. Nicolas McDermott, 1-9th. MOUNTAINEER 2 Sept. 28, 2007 Opinion/Editorial Learn to protect yourself from identity theft Criminal Investigation Detachment information that needs to and should be safeguarded. Public Affairs Office Some of the common ways identity theft can occur involves skilled identity thieves using a FORT BELVOIR, Va.– Special Agents of the U.S. variety of methods to steal personal information. Army Criminal Investigation Command, commonly According to CID Special Agents and the FTC, known as CID, are helping Soldiers, Family members some of the methods include: and Army civilians learn to recognize the warning The scam — dumpster diving the use of hidden signs to deter, detect and defend themselves from This involves rummaging through trash looking equipment like becoming targets of identity theft and consumer fraud. for bills or other personal information. Thieves cameras, false personal With billions of dollars lost and millions of will collect the information, piece torn documents identification number pads on Americans as victims, consumer fraud and identity together and use it to steal your identity. What automated teller machines, or card theft is the number one complaint for consumers in to do — shredding or burning bills or documents readers. What to do — to protect yourself, use your the United States. CID defines identity theft and with your personal data will help prevent identity hand or body to prevent people from looking over identity fraud as any type of crime involving the theft. Also destroy any pre-approved credit card your shoulder while at an ATM or a debit card Point fraudulent use of someone’s personal identifying applications received in the mail. of Sale terminal. Look for any physical alterations at information, such as Social Security number, date of The scam — pretext calling the ATM or debit card locations. birth, or bank account number, to commit a crime. Pretext calling is the fraudulent means of The scam – Vishing According to a 2007 Federal Trade Commission obtaining a person’s personal information needed to This is a relatively new scam that uses Voice annual report on consumer crime, identity theft is a impersonate someone. The pretext caller through over Internet Protocol, or “VoIP” phones to steal vicious crime that can continue well beyond someone deception poses as a bank employee, law enforcement financial information. “VoIP” is a technology that losing their money or personal property; it’s a crime official, or other authority figures and through allows you to make voice calls using a broadband that can rob innocent men and women of their good innocent sounding questions and queries collects per- Internet connection instead of a regular (or analog) credit, reputation and financial well-being, without sonal identifying information needed to further their phone line. “Vishing” is a combination of “voice” them even knowing it has occurred. crime. A pretext caller may contact financial center and “phishing,” which is short for “voice phishing.” Commonly, the identity thief will use this employees, posing as clients, accessing the clients’ Con artists send blast e-mail or recorded phone information for financial gain, often taking control personal account information changing addresses so messages that appear to be from a financial of someone’s personal finances, obtaining credit as not to alert the person being victimized until it is institution, payment service or other well-known cards, making purchases on-line, and taking out too late. The callers can then withdraw, divert or create business. The message reports a “security” problem loans, all within one’s name, but can also obtain and fraudulent accounts without the victim’s knowledge. and urges the victim to call a telephone number to incur services charges such as cell phone bills and Not only are the banks being contacted but also “fix” their account. The victim thinks it’s safer calling a rental car fees. Even worse is when the imposter employers and even the victim themselves. What to do telephone number than to click on an unknown commits crimes using the identity of someone else — avoid the pretext caller, be cautious to whom you imbedded hyperlink. What to do — do not automati- and gives that person a criminal record. provide your personal information and for what cally trust a phone number based on its area code. On average the identity theft victim doesn’t purpose. Never give out personal information over the Con artists can hack into Caller ID systems and VoIP realize he is a victim for approximately 12 months phone or Internet unless you initiated the contact or users can assign any area code to a phone number. and often spends the next couple of years trying to know the person to whom the information is being To avoid becoming a victim of this scam, do not repair the damage the imposter has done to his provided. When at work and someone calls trying to give out your PIN numbers or passwords, especially credit, reputation, and financial well being. get personal information about an employee, ask for if you receive a recording that refers to you as a Military members and their families can be targets their name and number then verify prior to providing “valued customer” instead of your name. These are for identity thief. Much of their personal information any information. Most of this seems like common warning signs since legitimate institutions would is contained in documents needed to conduct daily sense; however, these pretext callers are experts in the never ask you to verbalize your PIN or passwords.