The Emergence of Us Military Cyber Expertise, 1967–2018

Total Page:16

File Type:pdf, Size:1020Kb

The Emergence of Us Military Cyber Expertise, 1967–2018 The Scholar WHAT IS A CYBER WARRIOR? THE EMERGENCE OF U.S. MILITARY CYBER EXPERTISE, 1967–2018 Rebecca Slayton What Is a Cyber Warrior? The Emergence of U.S. Military Cyber Expertise, 1967–2018 How have military cyber operations, a diverse set of activities that often differ little from civilian cyber security work, achieved the status of “warfighting”? What activities have the greatest warfighting status, what activities have the least, and why? This paper examines the establishment and growth of expertise associated with cyber operations in the individual services and at the joint level since the late 1960s. Threat-oriented activities, such as attacking adversaries or responding to adversaries that have breached U.S. networks, have more readily achieved warfighting status than have vulnerability-oriented activities, such as patching software, training users in good security practices, and other actions that aim to prevent intrusions. Ultimately, the lower status of work and expertise associated with vulnerability mitigation remains a significant problem for military cyber operations. n May 4, 2018, U.S. Cyber Command warfighting, this paper shows that, in practice, the was elevated from a sub-unified com- individuals who perform these activities do not all mand under U.S. Strategic Command, have equal “warrior” status. making it America’s 10th unified com- Of course, it may seem strange that any cyber batantO command. At a ceremony marking this experts would have warrior status. After all, they change, Deputy Secretary of Defense Patrick typically work at desks, and without substantial Shanahan described the command’s challenge as physical risk. Furthermore, while missiles, drones, strengthening “our arsenal of cyber weapons, cy- combat aircraft, and other high technology have ber shields and cyber warriors.”1 all changed how militaries fight and what it means Shanahan’s words evoke the image of a tradi- to be a warrior, the technologies with which cy- tional warrior, fighting with weapons and a shield. ber warriors work are not unique to the military.3 And yet, cyber “warfare” differs dramatically from Every major civilian organization today also relies traditional combat.2 In fact, many cyber warriors on complex computer networks and experts who spend less time using virtual “weapons” than they defend them. While some cyber warriors attack ad- do inventing or maintaining them. While joint doc- versary computer networks, many spend their time trine treats use, invention, and maintenance as focused on defensive work that differs very little, important components of cyber “operations,” i.e., if at all, from that of civilian computer security 1 Jim Garamone, “Cybercom Now a Combatant Command, Nakasone Replaces Rogers,” DOD News, May 4, 2018, https://www.defense.gov/ Explore/News/Article/Article/1512994/cybercom-now-a-combatant-command-nakasone-replaces-rogers/. 2 I am using terms such as “cyber warfare” and “cyber warrior” colloquially. I do not mean to imply that what they do qualifies as “war” as war is understood in international law. The term “cyber warrior” has been used broadly to refer to a wide range of career specializations within the military. 3 For discussion of the warfighting identity of missileers, see George L. Chapman, “Missileer: The Dawn, Decline, and Reinvigoration of America’s Intercontinental Ballistic Missile Operators,” Master’s Thesis, Air University, 2017, https://apps.dtic.mil/dtic/tr/fulltext/u2/1045804.pdf. On drones and warfighting, see P. W. Singer, Wired for War: The Robotics Revolution and Conflict in the 21st Century (New York: Penguin Press, 2009) and Hugh Gusterson, Drone: Remote Control Warfare (Cambridge, MA: MIT Press, 2016). Air Force pilots continue to be the butt of jokes implying that they are not tough enough, as compared to marines. For example, see Mark Thompson, “Petraeus Zinger Wounds Air Force Egos,” Time, Aug. 21 2009, http://content.time.com/time/nation/article/0,8599,1917841,00.html. 62 The Scholar experts. Indeed, the U.S. Defense Department has edge, and ability were more readily seen as war- leveraged the civilian U.S. National Initiative on fighting than others. In particular, threat-focused Cybersecurity Education workforce framework to activities like offensive operations, intrusion de- build its own cyber workforce.4 For that matter, the tection, and incident response, which were first Department of Defense uses civilian contractors developed within signals intelligence units, were for both offensive and defensive cyber operations. most easily viewed as warfighting. By contrast, So, why are some kinds of cyber experts who vulnerability-focused activities such as password work for the Defense Department considered “war- management, software patching, and other forms fighters” but others are not? This paper examines of technology maintenance, which were primarily the historical process by which some of these kinds the responsibility of communications units, were of experts gained warfighter status while others did slow to be seen as a kind of warfighting. not. It shows how, throughout the 1990s and early Today, the distinction between threat-focused 2000s, key leaders in intelligence, communications, and vulnerability-focused activities can be found in and warfighting communities made the case that joint doctrine, which outlines three primary mis- computer network operations should be treated as sions for cyberspace operations. The first mission, a kind of warfighting. While specific approaches var- offensive cyber operations, is unique to the mili- ied across different services and professional spe- tary. U.S. law prohibits civilian organizations from cializations, all of these leaders struggled against a conducting offensive cyber operations unless they culture that has historically treated information-re- are operating under military authority. The second lated work such as intelligence, computing, and mission, defensive cyber operations, responds to communications as a warfighting support function, threats that have already breached Defense De- something lower in status than warfighting itself. partment networks. Some of these activities, in- Elevating the status of cyber expertise entailed cluding incident response, intrusion detection, and challenging organizational hierarchies that made network monitoring, are very similar to defensive cyber experts subordinate to traditional warf- work within major corporations, civilian govern- ighters. For example, it meant empowering cy- ment, and other non-military organizations. ber experts and organizations to effectively issue The third mission, Department of Defense In- commands to warfighting units, directing them formation Network (DODIN) operations, focuses to remediate vulnerabilities in their computer on mitigating vulnerabilities. It includes “actions networks. It also involved reorganizing well-es- taken to secure, configure, operate, extend, main- tablished military specializations, such as signals tain, and sustain [Defense Department] cyber- intelligence, electronic warfare, and communica- space and to create and preserve the confidential- tions, around cyber infrastructure and operations. ity, availability, and integrity of the DODIN.” Like Perhaps most importantly, it meant establishing defensive cyber operations, these activities are new career paths through which cyber experts commonplace in non-military organizations. Fur- might advance to the highest levels of command. thermore, by virtue of their focus on mitigating Military leaders made their case for elevating cy- vulnerabilities rather than attacking adversaries, ber expertise in a variety of ways. For example, they they have struggled to gain the status of warfight- developed concepts of cyber operations that were ing. In an effort to cast its work as warfighting, analogous to well-established concepts of kinetic Joint Force Headquarters-DODIN describes its operations. They also conducted exercises that re- mission with the phrase “Fight the DODIN,” not vealed the potential impact of cyber operations on “secure,” “maintain,” or “sustain” the DODIN.5 military warfighting and gathered data that high- And joint doctrine seems to recognize the lower lighted a steady increase in intrusions that might regard in which such operations might be held, have gone completely unnoticed if not for the work noting that “although many DODIN operations of cyber experts. activities are regularly scheduled events, they I argue that these and related activities succeed- cannot be considered routine, since their aggre- ed in establishing cyber operations as a type of gate effect establishes the framework on which warfighting, but that some kinds of skills, knowl- most DOD [Department of Defense] missions ulti- 4 William Newhouse et al., National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, National Institute of Standards and Technology, Publication 800-181, August 2017, https://doi.org/10.6028/NIST.SP.800-181. The framework consists of seven broad functions, 33 areas of work, and 52 work roles. Each of the work roles consists of specific tasks and requires specialized knowledge, skills, and abilities. Altogether, the framework lists 1,007 tasks, 630 kinds of knowledge, 374 kinds of skills, and 176 abilities. 5 Jeffrey R. Jones, “Defense Department Cyber Requires Speed, Precision and Agility,” Signal, May 1, 2019, https://www.afcea.org/content/de- fense-department-cyber-requires-speed-precision-and-agility. 63 What Is a Cyber Warrior?
Recommended publications
  • The Northern Sentry Is Pub- Lished by BHG, Inc., a Private fi Rm Operating Independently of the U.S
    NORTHERN SENTRY FRIDAY, SEPTEMBER 8, 2017 1 FREE | VOL. 55 • ISSUE 36 | WWW.NORTHERNSENTRY.COM | MINOT AIR FORCE BASE | FRIDAY, SEPTEMBER 8, 2017 U.S. AIR FORCE PHOTO | AIRMAN 1ST CLASS ALYSSA M. AKERS 2 FRIDAY, SEPTEMBER 8, 2017 NORTHERN SENTRY AIRMAN 1ST CLASS ALYSSA M. AKERS | MINOT AIR FORCE BASE PUBLIC AFFAIRS MINOT AIR FORCE causing it to capsize. 429 Lawrence was one of laid to rest at Immanuel Airmen, families and BASE, N.D. -- sailors and marines were the missing who were Lutheran Church in Willow military veterans. More “Yesterday, December trapped, giving the ultimate identifi ed. Creek. than 200 people lined the 7th, 1941, a date which will sacrifi ce, their life. He was fi nally returned Lawrence was welcomed live in infamy, the United “I thought it was home to North Dakota, on by Willow City natives, States of America was impossible he was dead,” Aug. 13, 2017. He was Minot Air Force Base Continued on page 3 suddenly and deliberately said Anderson. “We all attacked by naval and air thought maybe he went to forces of the Empire of town and stayed overnight. Japan.” We just received Christmas With those words, cards from him. [But] a few President Franklin days after, we were told he Roosevelt ensured America was killed.” would never forget Pearl In 1943, the Oklahoma Harbor. was removed from the Betty Anderson was only ocean and the bodies were 15 years old, but this would recovered. Due to the lack be a day she and her family of technology at the time, would never forget.
    [Show full text]
  • United States Air Force and Its Antecedents Published and Printed Unit Histories
    UNITED STATES AIR FORCE AND ITS ANTECEDENTS PUBLISHED AND PRINTED UNIT HISTORIES A BIBLIOGRAPHY EXPANDED & REVISED EDITION compiled by James T. Controvich January 2001 TABLE OF CONTENTS CHAPTERS User's Guide................................................................................................................................1 I. Named Commands .......................................................................................................................4 II. Numbered Air Forces ................................................................................................................ 20 III. Numbered Commands .............................................................................................................. 41 IV. Air Divisions ............................................................................................................................. 45 V. Wings ........................................................................................................................................ 49 VI. Groups ..................................................................................................................................... 69 VII. Squadrons..............................................................................................................................122 VIII. Aviation Engineers................................................................................................................ 179 IX. Womens Army Corps............................................................................................................
    [Show full text]
  • General Robin Rand
    GENERAL ROBIN RAND Gen. Robin Rand is the Commander, Air Force Global Strike Command, Barksdale Air Force Base, La. He is responsible for organizing, training, equipping all U.S. intercontinental ballistic missile and bomber forces. The command's mission is to provide combat-ready forces for nuclear deterrence and global strike operations. The command comprises more than 23,000 professionals operating at six wings that control the nation's inventory of Minuteman III intercontinental ballistic missiles, B-2 and B-52 bomber aircraft. General Rand was commissioned in 1979 after graduating from the U.S. Air Force Academy. He's had multiple flying tours; served as an air liaison officer with the U.S. Army; and has had staff tours on the Joint Staff, Office of the Secretary of Defense, and Air Staff. General Rand's previous commands include the 36th Fighter Squadron, USAF Weapons School, 8th Fighter Wing, 56th Fighter Wing, 332nd Air Expeditionary Wing at Balad Air Base, Iraq, 12th Air Force (Air Forces Southern), and prior to this assignment, Air Education and Training Command. General Rand is a command pilot with more than 5,080 flying hours, including more than 470 combat hours. EDUCATION 1979 Bachelor of Science degree in aviation science, U.S. Air Force Academy, Colorado Springs, Colo. 1983 Squadron Officer School, Maxwell AFB, Ala. 1986 Air Command and Staff College, by seminar 1988 Master of Science degree in aeronautical science, Embry-Riddle Aeronautical University, Fla. 1990 U.S. Air Force Fighter Weapons Instructor Course, Nellis AFB, Nev. 1998 Master of Arts degree in national security policy, Naval War College, Newport, R.I.
    [Show full text]
  • 2020 Annual Operating Budget 2020 Annual Operating Budget
    CITY OF SHREVEPORT BUDGET EXECUTIVE2020 ANNUAL OPERATING BUDGET 2020 ANNUAL OPERATING BUDGET Published by the City of Shreveport Adrian D. Perkins M A Y O R Sherricka Fields-Jones, Chief AdministrativeBUDGET Officer Kasey Brown, Assistant CAO/Budget Manager Printed by the City of Shreveport EXECUTIVE CITY OF SHREVEPORT 2020 ANNUAL OPERATING BUDGET CITY OF SHREVEPORT, LOUISIANA 2020 ANNUAL OPERATING BUDGET Adrian D. Perkins MAYOR BUDGET Sherricka Fields-Jones CHIEF ADMINISTRATIVE OFFICER CITY COUNCIL MEMBERS Willie Bradford District A Levette Fuller District B John Nickelson District C Grayson Boucher District D EXECUTIVEJames Flurry District E James Green District F Jerry Bowman District G CITY OF SHREVEPORT 2020 ANNUAL OPERATING BUDGET BUDGET EXECUTIVE CITY OF SHREVEPORT TABLE OF CONTENTS THE MAYOR'S BUDGET MESSAGE 1 INFORMATION ABOUT SHREVEPORT Community Profile 10 Major Employers 15 BUDGET SUMMARIES Total Operating Budgets 19 Organization Chart of City Government 20 Form of Government and Services 21 Budgetary Structure 21 Statement of Budgetary Policies 23 Calendar for 2019 Budget Preparation 24 Budgetary Process 25 Full-Time Employees 26 Summary of Full-Time Positions by Budget Activity Unit 27 2019 Revenues by Source and Fund 31 2019 Expenditures by Source and FundBUDGET 32 GENERAL FUND SUMMARY Budgets by Department 34 Sources of Revenue and Uses of Funds 35 Budget Allocations by Department 36 General Fund Expenditures 36 Summary of Available Funds 37 Major Revenue Assumptions 38 Summary of Revenues 42 Revenue Detail 43 Summary
    [Show full text]
  • Beyond Close Air Support Forging a New Air-Ground Partnership
    CHILD POLICY This PDF document was made available CIVIL JUSTICE from www.rand.org as a public service of EDUCATION the RAND Corporation. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE Jump down to document6 INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit POPULATION AND AGING research organization providing PUBLIC SAFETY SCIENCE AND TECHNOLOGY objective analysis and effective SUBSTANCE ABUSE solutions that address the challenges TERRORISM AND facing the public and private sectors HOMELAND SECURITY TRANSPORTATION AND around the world. INFRASTRUCTURE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Project AIR FORCE View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Beyond Close Air Support Forging a New Air-Ground Partnership Bruce R. Pirnie, Alan Vick, Adam Grissom, Karl P. Mueller, David T. Orletsky Prepared for the United States Air Force Approved for public release; distribution unlimited The research described in this report was sponsored by the United States Air Force under Contract F49642-01-C-0003.
    [Show full text]
  • Lineage and Honors of the Operational Weather Squadrons
    Air Force Weather Heritage Series Lineage and Honors of the Operational Weather Squadrons Anticipate & Exploit the Weather for Battle Air Force Weather History Office — Offutt Air Force Base, Nebraska March 2003 Lineage and Honors of the Operational Weather Squadrons In the mid-1990s, Air Force Weather began a major re-engineering effort to better organize itself to meet the challenges of modern military support in the 21st century. Air Force Weather re-engineering including the activation of eight regional weather “hubs,” the operational weather squadrons, in 1999-2000. This brochure outlines the official lineage, assignments, stations, emblems, and honors of the operational weather squadrons. TABLE OF CONTENTS 11th Operational Weather Squadron 1 15th Operational Weather Squadron 5 17th Operational Weather Squadron 9 20th Operational Weather Squadron 11 25th Operational Weather Squadron 15 26th Operational Weather Squadron 17 28th Operational Weather Squadron 19 USAFE Operational Weather Squadron 21 Lineage and Honors of the Operational Weather Squadrons 11th Operational Weather Squadron Elmendorf Air Force Base, Alaska Lineage Constituted as Air Corps Detachment, Weather, Alaska, on 15 Nov 1940 Activated on 11 Jan 1941 Redesignated 11th Air Corps Squadron, Weather (Regional Control) on 26 Feb 1942 Redesignated 11th Weather Squadron on 6 Jan 1944 Inactivated on 20 Apr 1952 Activated on 20 Apr 1952 Inactivated on 18 Nov 1957 Activated on 18 Jun 1958 Inactivated on 1 Jun 1992 Redesignated 11th Operational Weather Squadron on
    [Show full text]
  • 166 Public Law 86-500-.June 8, 1960 [74 Stat
    166 PUBLIC LAW 86-500-.JUNE 8, 1960 [74 STAT. Public Law 86-500 June 8. 1960 AN ACT [H» R. 10777] To authorize certain construction at military installation!^, and for other pnriwses. He it enacted hy the Hemite and House of Representatives of the 8tfiction^'Acf°^ I'raited States of America in Congress assemoJed, I960. TITLE I ''^^^* SEC. 101. The Secretary of the Army may establish or develop military installations and facilities by acquiring, constructing, con- \'erting, rehabilitating, or installing permanent or temporary public works, including site preparation, appurtenances, utilities, and equip­ ment, for the following projects: INSIDE THE UNITED STATES I'ECHNICAL SERVICES FACILITIES (Ordnance Corps) Aberdeen Proving Ground, Maryland: Training facilities, medical facilities, and utilities, $6,221,000. Benicia Arsenal, California: Utilities, $337,000. Blue Grass Ordnance Depot, Kentucky: Utilities and ground improvements, $353,000. Picatinny Arsenal, New Jersey: Research, development, and test facilities, $850,000. Pueblo Ordnance Depot, Colorado: Operational facilities, $369,000. Redstone Arsenal, Alabama: Community facilities and utilities, $1,000,000. Umatilla Ordnance Depot, Oregon: Utilities and ground improve­ ments, $319,000. Watertow^n Arsenal, Massachusetts: Research, development, and test facilities, $1,849,000. White Sands Missile Range, New Mexico: Operational facilities and utilities, $1,2'33,000. (Quartermaster Corps) Fort Lee, Virginia: Administrative facilities and utilities, $577,000. Atlanta General Depot, Georgia: Maintenance facilities, $365,000. New Cumberland General Depot, Pennsylvania: Operational facili­ ties, $89,000. Richmond Quartermaster Depot, Virginia: Administrative facili­ ties, $478,000. Sharpe General Depot, California: Maintenance facilities, $218,000. (Chemical Corps) Army Chemical Center, Maryland: Operational facilities and com­ munity facilities, $843,000.
    [Show full text]
  • Published by 2 Armed Forces Week May 7, 2010
    A supplement to the Fort Carson Mountaineer, the Peterson Space Observer, the USAFA Academy Spirit and the Schriever AFB Schriever Sentinel May 7, 2010 2010 Armed Forces Week Published by 2 www.csmng.com Armed Forces Week May 7, 2010 ARMED FORCES DAY EVENTS TUESDAY May 11, 2010, 7:30PM “United in Strength” Home Of The Brave, USAF Academy Band Concert Saturday, May 15, 2010 Pikes Peak Center THURSDAY May 13, 2010, 10am-2:00pm President Harry S. Truman led 20, 1950, marks the fi rst combined welcome opportunity to pay special the eff ort to establish a single holi- demonstration by America’s de- tribute to the men and women of the Military Spouse Appreciation Day day for citizens to come together and fense team of its progress, under the Armed Forces ... to all the individuals Southeast Family Center/Armed Forces YMCA thank our military members for their National Security Act, towards the who are in the service of their coun- 2190 Jet Wing Drive (next to Sierra High School.) patriotic service in support of our goal of readiness for any eventuality. try all over the world. Armed Forces For more information call 719-622-9622 country. It is the fi rst parade of preparedness Day won’t be a matter of parades and On August 31, 1949, Secretary of by the unifi ed forces of our land, sea, receptions for a good many of them. May 13, 2010, 8pm Defense Louis Johnson announced and air defense. Th ey will all be in line of duty and the creation of an Armed Forces Day Th e theme of the fi rst Armed Forces some of them may give their lives in Comics For Courage to replace separate Army, Navy and Air Day was “Teamed for Defense.” It was that duty.” Loonees Comedy Corner Force Days.
    [Show full text]
  • NSIAD-96-111BR Military Readiness B-271209
    United States General Accounting Office Briefing Report to the Chairman, GAO Committee on National Security, House of Representatives March 1996 MILITARY READINESS Data and Trends for January 1990 to March 1995 GOA years 1921 - 1996 GAO/NSIAD-96-111BR United States General Accounting Office GAO Washington, D.C. 20548 National Security and International Affairs Division B-271209 March 4, 1996 The Honorable Floyd Spence Chairman, Committee on National Security House of Representatives Dear Mr. Chairman: As you requested, this report is an unclassified version of our earlier classified report on military readiness. We analyzed military readiness data contained in the Department of Defense’s (DOD) Status of Resources and Training System (SORTS) to determine if the data showed significant changes in readiness since 1990—a year of peak readiness. This report provides readiness information for the four military services. Specifically, it (1) summarizes the reported overall readiness status of all military units from January 1, 1990, to March 31, 1995; (2) assesses readiness trends of selected units from each service for the same period, and, where applicable, discusses reported readiness problems experienced throughout a service and by the selected units; and (3) explains significant changes in reported readiness of the selected units. On August 31, 1995, we briefed the Subcommittee on Military Readiness, House Committee on National Security, staff on the results of our work. This report summarizes the information we presented in that briefing. SORTS is DOD’s automated reporting system that identifies the current level Background of selected resources and training status of a unit—that is, its ability to undertake its wartime mission.
    [Show full text]
  • NSIAD-96-194 Military Readiness B-272379
    United States General Accounting Office Report to the Chairman, Committee on GAO National Security, House of Representatives August 1996 MILITARY READINESS Data and Trends for April 1995 to March 1996 GOA years 1921 - 1996 GAO/NSIAD-96-194 United States General Accounting Office GAO Washington, D.C. 20548 National Security and International Affairs Division B-272379 August 2, 1996 The Honorable Floyd Spence Chairman, Committee on National Security House of Representatives Dear Mr. Chairman: As you requested, we have updated our Military Readiness report 1 through March 31, 1996, to determine if the data show significant changes. Also, we reviewed readiness data for selected units participating in the Bosnia operation to see whether the operation has affected readiness. This report provides unclassified readiness information on the four military services. Specifically, it (1) assesses readiness trends of selected units from each service from April 1, 1995, to March 31, 1996, with particular emphasis on units that reported degraded readiness during the prior period and (2) assesses readiness trends (for the period Oct.1, 1995, to Mar. 31, 1996) for selected units that participated in the Bosnia operation. On June 26, 1996, we provided a classified briefing to the staff of the Subcommittee on Military Readiness, House Committee on National Security, on the results of our work. This letter summarizes the unclassified information presented in that briefing. Background The Status of Resources and Training System (SORTS) is the Department of Defense’s (DOD) automated reporting system that identifies the current level of selected resources and training status of a unit—that is, its ability to undertake its wartime mission.
    [Show full text]
  • 224 Lives $11.6 Billion 186 Aircraft
    MILITARY AVIATION LOSSES FY2013–2020 4 22 Lives $11.6 billion 186 aircraft ON MIL ON ITA SI RY IS A V M I M A T O I O C N L National Commission on A S A N F O E I T T A Y N NCMAS Military Aviation Safety Report to the President and the Congress of the United States DECEMBER 1, 2020 ON MIL ON ITA SI RY IS A V M I M A T O I O C N L A S A N F O E I T T A Y N NCMAS National Commission on Military Aviation Safety Report to the President and the Congress of the United States DECEMBER 1, 2020 Cover image: U.S. Air Force F-22 Raptors from the 199th Fighter Squadron Hawaii Air National Guard and the 19th Fighter Squadron at Joint Base Pearl Harbor- Hickam perform the missing man formation in honor of fallen servicemembers during a Pearl Harbor Day remembrance ceremony. The missing man formation comprises four aircraft in a V-shape formation. The aircraft in the ring finger position pulls up and leaves the formation to signify a lost comrade in arms. (Department of Defense photo by U.S. Air Force Tech. Sgt. Michael R. Holzworth.) ON MIL ON ITA SI RY IS A V M I M A T O I O C N L A S A N F O E I T T A Y N NCMAS The National Commission on Military Aviation Safety dedicates its work to the men and women who serve in the aviation units of the U.S.
    [Show full text]
  • MILITARY READINESS: Data and Trends for April 1995 to March 1996
    United States General Accounting Office Report to the Chairman, Committee on GAO National Security, House of Representatives August 1996 MILITARY READINESS Data and Trends for April 1995 to March 1996 GOA years 1921 - 1996 GAO/NSIAD-96-194 United States General Accounting Office GAO Washington, D.C. 20548 National Security and International Affairs Division B-272379 August 2, 1996 The Honorable Floyd Spence Chairman, Committee on National Security House of Representatives Dear Mr. Chairman: As you requested, we have updated our Military Readiness report 1 through March 31, 1996, to determine if the data show significant changes. Also, we reviewed readiness data for selected units participating in the Bosnia operation to see whether the operation has affected readiness. This report provides unclassified readiness information on the four military services. Specifically, it (1) assesses readiness trends of selected units from each service from April 1, 1995, to March 31, 1996, with particular emphasis on units that reported degraded readiness during the prior period and (2) assesses readiness trends (for the period Oct.1, 1995, to Mar. 31, 1996) for selected units that participated in the Bosnia operation. On June 26, 1996, we provided a classified briefing to the staff of the Subcommittee on Military Readiness, House Committee on National Security, on the results of our work. This letter summarizes the unclassified information presented in that briefing. Background The Status of Resources and Training System (SORTS) is the Department of Defense’s (DOD) automated reporting system that identifies the current level of selected resources and training status of a unit—that is, its ability to undertake its wartime mission.
    [Show full text]