Building Teams of Cyber Warriors by LTC Joseph Doty Teurs Succeed? the 2004 U.S

Total Page:16

File Type:pdf, Size:1020Kb

Building Teams of Cyber Warriors by LTC Joseph Doty Teurs Succeed? the 2004 U.S Building Teams of Cyber Warriors By LTC Joseph Doty teurs succeed? The 2004 U.S. Olympic Is this true, however, with cyber se- and basketball team, composed entirely of curity? Expertise in cyber warfare and MAJ T.J. O’Connor professional players, lost three games security requires knowledge, skills, and finished the tournament with a abilities and talent that necessitate eveloping an offensive cyber-war- bronze medal. Four years later, the U.S. years of study and practice of how dif- Dfare capability is one of our na- Olympic basketball team went unde- ferent protocols and security mecha- tion’s goals right now and a key com- feated and won the gold medal. The nisms work. Even having a breadth of ponent of our national security strategy. 2008 team’s head coach, Mike Krzyz- knowledge doesn’t make an individual At the heart of this challenge is recruit- ewski, was singularly focused on en- talented in cyber warfare. ing and building cyber-warfare teams suring that these phenomenally tal- It requires the ability to take that composed of highly talented and skilled ented professionals were playing as a knowledge and turn it on its head. To individuals. We cannot simply assem- team. (See The Gold Standard: Building a be really successful in cyber warfare ble a group of all-stars and then watch World-Class Team by Mike Krzyzewski requires teams that can figure out how as they “conquer the world.” and Jamie K. Spatola.) The 1980 U.S. to bend and break the mold, to make Rather, we must focus on how to Olympic hockey team, composed main- protocols work in a method for which teach and develop these cyber war- ly of unknown college players, defeat- they were not originally intended, to riors to work as part of a larger team ed the mighty Soviet Union team in find weaknesses in proven mecha- and to begin playing in a team envi- what is widely considered to be one of nisms for security—this is the art, in- ronment. For cyber-warfare teams to the biggest upsets in the history of stead of the science, of cyber warfare. succeed (and our adversaries are for- sports. At the very heart of this is the The practical reality is that in order to midable opponents), we need to ex- phenomenon that people who place a be that introspective, a cyber warrior is amine closely what a cyber warrior higher value on the success of the team more likely to be an individual than a looks like, and what we can do to fur- (not the individual) succeed because of member of a team. Yet we need teams ther build successful cyber-warfare a shared purpose, vision and trust. A to succeed in cyber warfare. A coordi- teams. team working together will achieve far nated offensive strike against another Why do teams of talented and skilled more than the sum of the individual team nation or decentralized network re- professionals fail where teams of ama- members working alone. quires thousands of hackers working 12 ARMY I January 2010 in multiple locations who communicate talented professional with a clear pro- uilding cyber-warfare teams is and build upon each other’s strengths. fessional agenda back into the field de- Bsomething the U.S. Military Acad- How is cyber warfare done well? fending our nation’s secrets. In con- emy at West Point does extremely There have been a number of suc- trast, the DoE punished Carpenter for well. Every year, West Point fields a cesses in team-organized cyber war- violating procedural regulations—the cyber-warfare team that competes fare. In early July, a team attack tar- equivalent of firing a bank teller who against teams from every other service geted dozens of government web sites fought back against a bank robber. Tal- academy. in the United States and South Korea. ented cyber warriors often look and act For four days in the spring, the Na- While suspected to have originated in differently from usual society. They are tional Security Agency’s best hackers North Korea, the attack required the often referred to as nerds or geeks. We attack the U.S. Coast Guard Academy, ability to work with individuals in the should embrace rather than fear the the U.S. Air Force Academy, the U.S. United States, Guatemala, Japan and Shawn Carpenters in our organizations Naval Academy, the U.S. Merchant China. The team effort succeeded in because they are vital to the security of Marine Academy and the U.S. Military crippling the web sites of 27 different our country. Academy. For the past three years, the services in the United States and South Korea. Shared communication, shared vision and a cooperative working en- vironment contributed to the unfortu- nate (for U.S. and South Korean secu- rity) success of these attackers. What does the cyber warrior look like? In 2004, Chinese hackers from the province of Guangdong attacked the U.S. Army Missile Command at Red- stone Arsenal, Ala. In an operation called Titan Rain by U.S. authorities, a team of about 20 Chinese hackers grabbed specifications for helicopters and flight planning software. They gained and kept access to several ma- chines at Sandia National Laborato- ries at Redstone, pillaging secret infor- mation from the U.S. government, and were eventually discovered and stopped by a single individual, Shawn Carpenter. An employee at the De- partment of Energy (DoE), Carpenter performed an unauthorized investiga- tion into the hackers that led to their detection and Carpenter’s subsequent dismissal from the DoE. Carpenter’s success in detecting the hackers highlights a challenge with cyber warriors: These talented people have highly specialized skills that the national security community does not necessarily fully understand or com- prehend. Essentially, every cyber war- rior has the ability to read his boss’ e- mail—building teams of such people is a scary thought. We require them to be ethical and maintain professional- ism in their craft, but this is often sec- ondary to their ability to strike with technical precision. In the case of Shawn Carpenter, the DoE missed the opportunity to put a January 2010 I ARMY 13 U.S. Military Academy has won deci- vidual who has incredible technical next cyber-warfare battlefield, we must sively. Why? The other schools have savvy, yet also has a high ethical code not forget to tap the Sal Messinas that equivalent educational programs teach- and a dedication to a profession. This we have already grown and developed ing their students technical expertise. often means they come from existing within our ranks. I West Point’s team is so successful be- professional environments and may cause individuals playing as a team have little to no technical expertise. LTC Joseph Doty, Ph.D., is the deputy di- win, while teams playing as individu- rector of the Army’s Center of Excellence als lose. West Point’s team was led last lifford Stoll, renowned for detect- for the Professional Military Ethic. He year by senior Cadet Sal Messina. Cing the first series of cyber-warfare previously commanded 1st Battalion, Halfway through the competition, his attacks in the 1980s, was simply an as- 27th Field Artillery Regiment, V Corps second-in-command made a mocking trophysicist who became upset when Artillery. MAJ T.J. O’Connor teaches in phone call to the NSA deputy director. he could not perform his research prop- the Department of Electrical Engineering Cadet Messina chastised the other erly on compromised computer ma- and Computer Science at the U.S. Mili- cadet—not for the phone call, but for chines. Shawn Carpenter was a DoE tary Academy at West Point, N.Y. He putting the team at risk. He told the employee dedicated to protecting his previously served as a signal center direc- cadet he did not have the right to sacri- government’s secrets. Does this mean tor with the 7th Special Forces Group in fice the work of the other members of that cyber warriors must be drawn ex- Afghanistan. (The views expressed the team. This was a clear example of clusively from the professional ranks of here are those of the authors and do the team’s shared vision and effort. our Department of Defense? No. They not purport to reflect the position of It takes a great deal of resources— are most likely, however, to be individ- the U.S. Military Academy, the De- time and money—to recruit a talented, uals who have learned to work on partment of the Army or the Depart- ethical cyber warrior, that unique indi- teams. As we charge forward into the ment of Defense.) 14 ARMY I January 2010.
Recommended publications
  • Department of Military Science 1
    Department of Military Science 1 DEPARTMENT OF MILITARY SCIENCE Scholarships and Allowances Scholarships are available for two, three, or four years. Students enrolled in the Advanced Course receive a tax-free subsistence allowance each month. They also receive about $700 for attending a five-week Advanced Camp (between the junior and senior year). Total remuneration for the final two years is approximately $7,500. All uniforms and equipment are furnished at no cost to students. Military Science Extracurricular Activities In addition to ROTC classes, the Military Science Department offers unique opportunities in various activities. These activities are designed to create new and lasting friendships as well as to develop leadership skills. The extracurricular activities are: the Color Guard, Intramural Sports, and Ranger Challenge Team (the varsity sport of Cadet Command). For further information, contact the Military Science Department, Room 217, Gullickson Hall, or call 304-696-6450. Summer Training Opportunities In addition to the Leaders Training Course and the Leader Development and Assessment Course, ROTC offers other training opportunities to broaden experience and leadership. These include the Basic Airborne Course, Air Assault Course, Mountain Warfare, Northern Warfare, United Kingdom Officer Training Course, Cadet Troop Leadership Training, Drill Cadet Leadership Training, Army Science Board, Cadet Intern Program, Nurse Summer Training Program, JFK Special Warfare Internship Program and Cultural Leadership Program. Some of these programs are conducted outside of the continental United States and with foreign countries. All programs are competitive and require the approval of the Professor of Military Science. Some cadets may also elect to train with a local Army Reserve or National Guard unit, each with additional training opportunities and benefits.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • The American Military Experience the Principles of War
    The American Military Experience The Principles of War Wayne E. Sirmon, M.A.Ed., M.A. Adjunct Assistant Professor of History University of Mobile The Nine Principles of War (As recognized by the U. S. Army) Objective Offensive Maneuver Mass Economy of Force Unity of Command Security Surprise Simplicity The Principles of War (As recognized by the U. S. Army) Objective DirectOffensive every military operation toward a clearly defined, decisive and attainable objective. The ultimateManeuver military purpose of war is the destruction of the enemy's ability to fight and will to fight.Mass Economy of Force Unity of Command Security Surprise Simplicity The Principles of War (As recognized by the U. S. Army) Objective Offensive Seize,Maneuver retain, and exploit the initiative. Offensive action is the most effective and decisive way to attain a clearlyMass defined common objective. Offensive operations are the means by which a military forceEconomy seizes and ofholds Force the initiative while maintainingUnity freedom of Command of action and achieving decisive results. This is fundamentally true across all levelsSecurity of war. Surprise Simplicity The Principles of War (As recognized by the U. S. Army) Objective Offensive Maneuver Place theMass enemy in a position of disadvantage through the flexible application of combat power. Maneuver isEconomy the movement of ofForce forces in relation to the enemy to gain positional advantage. Effective maneuverUnity keeps of Command the enemy off balance and protects the force.Security It is used to exploit successes, to preserve freedom of action, and to reduce vulnerability. SurpriseIt continually poses new problems for the enemy by rendering his actions ineffective, eventually leadingSimplicity to defeat.
    [Show full text]
  • Directions to West Point Military Academy
    Directions To West Point Military Academy Undelayed and backward Rayner always saddles cooperatively and countermarch his carrefours. Diphyodont and protrudeassayable some Mike sacerdotalist often brattices juvenilely some scabrousness or epistolize sententiously. ephemerally or sashes exuberantly. Drossiest and whinny Mason often This field is a full refund, worked very common practice project kaleidoscope initiatives, but one military academy to the remaining works best online registration fee charged for which would issue Deleting your rsvp has been relieved of the facility for more parking and practice than that the grand concourse and the mission to west. I ski in the Army and I am of West Point instructor so sorry am biased but city'll keep. On a military. In several of command to tarry at fort is that, and to cement slabs there was a distinguished career of pennsylvania, colonial revival garden. A bend in current river known in West Point requires careful and slow navigation This end West. Military Academy at service Point's mission is necessary educate train and weight the. Class rings of. 11 Merrit Boulevard Route 9 Fishkill Open until 1000 PM Drive-Thru. West gate to west point military academies, and directions below. After graduating from the United States Military Academy in 1971 he show a 30. And 2 miles from town Point the United States Military Academy USMA. Eisenhower Leader Development Program Social. Dmv id is to direct through. Colonel louis began his military. The academy to direct their replacements. I longer't get help feel well the Academy website driving directions. West Point Golf Course to Point Course GolfLink.
    [Show full text]
  • Military Science 1
    Military Science 1 weather training. New and challenging opportunities routinely become MILITARY SCIENCE available. http://www.jhurotc.com/page.php?page=home Air Force ROTC The JHU Army Reserve Officers’ Training Corps (ROTC) was among the While not part of the Military Science program at JHU, Hopkins students first to be established by Congress in 1916 and is routinely ranked at the are able to participate in an Air Force ROTC program with an agreement top of the Nation’s 273 programs. Nearly 3,000 Hopkins students have with the University of Maryland. For more information, visit the their received Army officer commissions through the program, with over 40 website (https://www.afrotc.com/). attaining the rank of general officer. Students can enter the program with For current course information and registration go to https://sis.jhu.edu/ as little as two years remaining as an undergraduate or may complete classes/ the requirements while pursuing a graduate degree. Upon graduation, Hopkins students are commissioned as a second lieutenant in the U.S. Army. Some are selected to attend a funded law school or several Courses medical programs, while others serve in the Active Army, Reserves or AS.374.101. Introduction to the Army. 2 Credits. National Guard. The Leadership and Management class specializes in The MSL I course produces a Cadet who accepts the Army as a values- leader development and is an excellent course for students aspiring based organization and embraces the scholar-athlete-warrior ethos; to become leaders on campus and beyond. Additional information on who is familiar with individual roles and responsibilities in support of military science or ROTC can be obtained at our building (behind the team efforts and problem solving processes in military and non-military athletic center), by asking a current cadet, and by calling 1-800-JHU-ROTC situations; who demonstrates oral and written communication skills, or 410-516-7474.
    [Show full text]
  • La Sierra Military Academy Screaming Eagles Cadet Handbook 2019-2020
    LA SIERRA MILITARY ACADEMY SCREAMING EAGLES CADET HANDBOOK 2019-2020 Revision date: 6.5.19 WELCOME FROM THE PRINCIPAL Dear Parents & Cadets, I would like to take this opportunity to officially welcome new cadets and families. I am thoroughly excited to lead the charge for Honor, Courage and Academic Excellence (Decus, Virtus, Doctus). It is my strong desire to work with the families of LSMA to bring stu- dent success to a new level. La Sierra Military Academy is a charter school under the auspices of the Tula- re County Office of Education and governed by the Tulare County Board of Education. We are proud to be a school of “choice” which means parents and prospective cadets choose to enroll and attend after being reviewed and ac- cepted. What makes us unique is that we offer a traditional core curriculum leading students to develop goals beyond a high school diploma. We have adopted the military philosophy as a basis for self discipline, respect and decorum, but are not affiliated or recruit for the military. La Sierra Military Academy has adopted the Tulare County Office of Educa- tion’s CHARACTER COUNTS! Program and the Six Pillars of Character as the basic framework which defines its school culture. In addition, LSMA instruc- tors and staff embrace CHARACTER COUNTS! The Six Pillars of Character and holds itself accountable to the same standards of behavior as its students. As part of the new vision for La Sierra Military Academy, parents will be ex- pected to actively participate in volunteer opportunities throughout the year. Cadets will also need to re-examine their personal commitment to being en- rolled at LSMA.
    [Show full text]
  • Organization and Functions
    USMA Regulation 10–1 Organization and Functions Headquarters United States Military Academy West Point, NY 1 April 2018 UNCLASSIFIED Headquarters *USMA Regulation 10-1 United States Military Academy West Point, NY 1 April 2018 Effective 1 April 2018 Organization and Functions ______________________________________________________________________ By Order of the United States Military elements of the United States Military organization on the USMA Table of Academy Superintendent: Academy (USMA). Distribution and Allowances, and thereby Applicability. This regulation applies to constitutes a formal system to assist ROBERT L. CASLEN all USMA units. management in steering USMA toward the Lieutenant General, United States Army Proponent and exception authority. achievement of its mission by bringing unity Superintendent, USMA The proponent of this regulation is the G-5, out of the diverse efforts of subunits and of Director of Strategic Plans and Assessment. individuals. This is one of the control Official: The Chief of Staff has authority to approve activities that enforces management exceptions to this regulation that are directives. This regulation is an integral part consistent with controlling law and of USMA’s planning, implementing, MARK D. BIEGER regulation. reviewing and accountability for resource Colonel, United States Army Purpose. The Purpose of 10-1 is to: serve stewardship. Chief of Staff, USMA as an internal authorization document for Suggested improvements. Users of _____________________________ USMA; promote accountability and this regulation are invited to send comments transparency across units; inform unit and suggested improvements directly to History. This publication is a major manning decisions; and promote assessment Director of Strategic Plans and Assessment, revision of the previous version, dated of unit functions.
    [Show full text]
  • Institutional Capacity Building PME Bi-Monthly Report Defense Education Enhancement Program (DEEP) Africa Military Education Program (AMEP) September-October 2019
    Institutional Capacity Building PME Bi-Monthly Report Defense Education Enhancement Program (DEEP) Africa Military Education Program (AMEP) September-October 2019 1. EXECUTIVE SUMMARY This period highlighted curriculum and faculty development in DEEP and AMEP countries, initial support for a unique school in Ukraine, the opening of three new DEEP and AMEP programs, and one re-initiated AMEP program: DEEP: Afghanistan (7-11 October): DEEP experts delivered the first of four Master Instructor Program (MIP) workshops for the National Defence University faculty. The MIP intent for all programs is to prepare partner experts to train their faculty in modern teaching methodologies without external support. Azerbaijan (23-27 September): DEEP experts delivered the third of four MIP workshops for the War College and Military Academy faculties. MoD representative Mr. Sana Sadiyev reaffirmed that he and the leadership of both the War College and the Military Academy continue to be deeply committed to the changes needed to move both schools forward. He recognizes this will be a challenge, but noted he had great faith in the faculty he chose to be the needed change agents. Tunisia (16-19 September): DEEP experts delivered the first of two basic faculty development workshops to the Tunisian War College faculty. This initial workshop established a baseline for the second event that will focus on curriculum development, assessment, and evaluation. Once concluded, the next step will be a four-workshop MIP program for the War College faculty. Ukraine (23-27 September): NATO-funded DEEP experts initiated support for the new Defence Management School (DMS) course curricula. The MOD-initiated DMS is designed to educate MOD and other security sector ministerial professionals, both civilian and military.
    [Show full text]
  • Military Academies
    MILITARY ACADEMIES UNITED STATES MILITARY ACADEMIES For students who would like to experience a military environment while getting a first-class education, these 5 service academies offer an outstanding education and full 4 -year scholarship including fully paid tuition, books, room and board, and medical and dental care. Competition is extremely competitive. The admissions Criteria include: Outstanding high school academic performance Standardized test scores (SAT or ACT) Athletics and extracurricular activities Leadership experience and community involvement Congressional letter of recommendation (not required by the Coast Guard Academy) It is important to understand ALL THE REQUIREMENTS EARLY so you have time to accomplish all the necessary components. Graduates of all 5 academies receive a Bachelor of Science degree and are commissioned officers in their respective Branch. In all cases, there is a service obligation of a minimum of 5 years. Edina High School Counseling Department Meet the Academies In the United States, there are five military training academies, which are sometimes collectively known as the “Five-Pointed Star.” If you’re unsure which branch of the military to pursue, you can explore the history, admissions procedures, and eligibility requirements for each at their respective websites. The United States Military Academy is known as West Point. It is a four-year, coeducational military academy whose “cadets” graduate as second lieutenants in the U.S. Army. The United States Naval Academy is often referred to as USNA, Annapolis, or Navy. It grants bachelor’s degrees to students based on academic, militaristic, and athletic performance. The United States Air Force Academy is the youngest of the five academies, and its graduates are commissioned second lieutenants in the U.S.
    [Show full text]
  • Developing a Normative Framework for Cyberwarfare
    Developing a Normative Framework for Cyberwarfare October 17-18, 2016 United States Naval Academy Annapolis, Maryland Table of Contents: Purpose 3 Acknowledgments 3 Schedule 4 Presentation Abstracts 6 Presenter Biosketches 11 Grant Team Biosketches 15 Registration 17 Venue 17 Banquet 17 Hotel 17 Travel 17 Maps 18 Contacts 21 Notes 22 2 Purpose: Welcome to our workshop on the social, ethical, and legal implications on cyberwarfare. As this is quickly-evolving terrain, we hope to reflect the current state of play, as well as to sketch the short- and mid-term future. In these endeavors, we will be aided by a diverse and distinguished group of invited presenters. These presenters have been carefully selected from academia, industry, and government, and bring with them a wealth of expertise and experience. Unlike many academic workshops, this one is meant to be discussion intensive. Toward that end, presenters have been asked to keep their briefings to approximately fifteen minutes, leaving the rest of the sessions for interaction. To foster these interactions, we will operate under The Chatham House Rule: participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed without their expressed consent. Acknowledgments: The conference is organized by Dr. Fritz Allhoff (Western Michigan University/Stanford Law School), Dr. Patrick Lin (California Polytechnic State University), and Dr. Ryan Jenkins (California Polytechnic State University). It is supported by funding from the U.S. National Science Foundation (NSF), under awards #1318126, #1317798, #1318270. In addition to the NSF, we are grateful for institutional support from the following: California Polytechnic State University, Case Western Reserve University’s Inamori International Center for Ethics and Excellence, Naval Postgraduate School, United States Naval Academy’s Stockdale Center for Ethical Leadership, and Western Michigan University.
    [Show full text]
  • Department of Military Science 1
    Department of Military Science 1 10. Have junior academic standing (60 hours). Graduate students, or DEPARTMENT OF MILITARY students seeking additional degrees, may also qualify. SCIENCE Payment and Allowances Contracted Cadets receive a monthly allowance of not less than $420 The Department of Military Science (https://www.una.edu/rotc/) offers from ROTC. a program of leadership study in the U. S. Army Senior ROTC Program through which students may earn a commission as a second lieutenant When attending the Advanced Camp or Basic Camp, the Cadet is paid at in the United States Army, the Army National Guard, or the Army Reserve the same rate as a United States Military Academy Cadet and receives upon graduation. The program consists of a two-year Basic Course transportation reimbursement. Uniforms, housing, and food are furnished Program and a two-year Advanced Course Program. Credit for the Basic by the government during the summer internship period. Course Program may be accomplished by completion of the four-week Basic Camp prior to enrollment in the Advanced Course Program. Simultaneous Membership Program Students with prior military training who wish to enroll in the Advanced The Simultaneous Membership Program (SMP) allows qualified students Course may have part or all of the Basic Course requirements waived the opportunity to participate in the ROTC Advanced Program and the by the Professor of Military Science. Nursing students who have not Army National Guard or Army Reserve simultaneously. SMP participants completed the Basic Course Program may enter the Advanced Program receive a monthly stipend from ROTC, Sergeant (E-5) pay for attending via the Alternate Entry Option.
    [Show full text]
  • DEPARTMENT of the ARMY the Pentagon, Washington, DC 20310 Phone, 703–697–5081
    DEPARTMENT OF THE ARMY The Pentagon, Washington, DC 20310 Phone, 703–697–5081. Internet, www.army.mil. SECRETARY OF THE ARMY THOMAS E. WHITE Under Secretary of the Army LES BROWNLEE Assistant Secretary of the Army (Acquisition, CLAUDE M. BOLTON, JR. Logistics, and Technology) Assistant Secretary of the Army (Civil Works) LES BROWNLEE, Acting Assistant Secretary of the Army (Financial SANDRA PACK Management and Comptroller) Assistant Secretary of the Army (Installations MARIO P. FLORIO and Environment) Assistant Secretary of the Army (Manpower REGINALD J. BROWN and Reserve Affairs) General Counsel STEVEN J. MORELLO Administrative Assistant to the Secretary of the JOEL B. HUDSON Army Director, Information Systems for Command, LT. GEN. PETER M. CUVIELLO Control, Communications, and Computers Inspector General LT. GEN. MICHAEL W. ACKERMAN Auditor General FRANCIS E. REARDON Deputy Under Secretary of the Army JOHN W. MCDONALD Deputy Under Secretary of the Army WALTER W. HOLLIS (Operations Research) Chief of Legislative Liaison MAJ. GEN. JOE G. TAYLOR Chief of Public Affairs MAJ. GEN. LARRY D. GOTTARDI Director, Small and Disadvantaged Business TRACEY L. PINSON Utilization Office of the Chief of Staff: Chief of Staff, United States Army GEN. ERIC K. SHINSEKI Vice Chief of Staff GEN. JOHN M. KEANE Director of the Army Staff LT. GEN. KEVIN P. BYRNES Army Staff: Assistant Chief of Staff for Installation MAJ. GEN. R.L. VAN ANTWERP Management Deputy Chief of Staff, G–2LT. GEN. ROBERT W. NOONAN, JR. Deputy Chief of Staff, G–4LT. GEN. CHARLES S. MAHAN, JR. Deputy Chief of Staff, G–8LT. GEN. BENJAMIN S. GRIFFIN Deputy Chief of Staff, G–3LT.
    [Show full text]