COVID-19 is here and schools have been cancelled across the country for weeks, even months. No matter if you are a working parent who is now teleworking or a stay at home parent with an unexpected long Spring Break, this list will help you get things done around the house without using copious amounts of screen time. All while saying screen time, especially education-focused learning, is important and a great tool to use within moderation.
Legos are a useful tool. When I give my boys a box of Legosand minimal direction they can play for hours. But when I can channel their energy into learning while playing, Legos become worth their weight in gold. Check out these 20 educational ways to use Legos. Even with all of these, the best way to use Legos is through free-play and imagination.
Depending on where you live the weather might not be ideal for going outside, but luckily Spring is almost here to stay, and even a 10-minute walk in the rain is a way to break up the schedule. On nicer days, send the kids outside to play. Some of my favorite games are race around the house, tag, sending the kids to find various objects in nature and puddle jumping in the rain. Make it a point to spend at least an hour outside each day. It will be good for you and the kids. Bonus if you can bring your laptop so you can get work done too.
Similar to Legos, but not as sturdy. One of my favorite things about Magna-tiles is that you can use them on the fridge to practice learning shapes and colors, but they are also great for building. Give your kids a theme and watch them use their imaginations. My boys especially love building rockets that we count down to blast off (aka total destruction of the said rocket).
Read Books Alone or Together
Even with a six and four year old, my boys can sit and read books for at least 30 minutes on their own. Sometimes longer. I often set a timer for the boys to read and then reward their independent time by me reading them a story. It gives them something constructive to do and allows me to get work done. And having a reward at the end of the time is an added bonus for them.
To be fair, not all art projects are created equally, but drawing with markers and crayons is a great way for kids to use their imaginations and keep them focused on a project for an extended period of time. You can leave it basic with coloring or go on Pinterest and become the art queen or king.
Last summer we had every intention of doing school work during the break, but life happened and the school workbooks we bought went unused. Luckily for us we still have them and each day we will be working through the workbook.
What ways are you finding to keep your kids entertained with this sudden life interruption? Has there been something that you have felt has helped you the most or are any of these suggestions something you want to try at home this week?
In October 2018, Airman Magazine sat down for a conversation with Maj. Gen. Robert J. Skinner, Twenty-fourth Air Force commander; Air Forces Cyber commander and Joint Force Headquarters-Cyber commander, Joint Base San Antonio-Lackland, Texas. He is responsible for providing Air Force component and combatant commanders with trained and ready cyber forces to plan, direct and execute global cyberspace operations.
Airman Magazine: In July, the Twenty-fourth AF moved from Air Force Space Command to Air Combat Command. At the same time you moved from AFSPC to ACC. What are the reasons for that restructuring?
Maj. Gen. Skinner: This allows Gen. Raymond, as the Air Force Space Command commander, to truly focus on space operations. The other thing is this brings cyber within Air Combat Command, which has intelligence, surveillance and reconnaissance; command and control and the air domain. Bringing all these forces together under one four-star MAJCOM (major command) commander, Gen. Holmes, allows him some more flexibility to be able to present forces across the spectrum of operations.
The networks for those operations need to be resilient and they need to be protected. When you bring together the ISR, cyber, information operations, electronic warfare and command and control, that’s a lot under one hat. But it allows us greater integration as we move forward. At the end of the day, this is about multi-domain operations and the more we can bring those together, the more successful we’ll be.
Airman Magazine: How are your responsibilities divided between your three commands? It seems that just the information technology portion alone would be a huge demand on your resources.
Maj. Gen. Skinner: Cyber operations have four or five different lines of effort. One is to actually build the networks, build the applications and build the systems.
Another is to operate and maintain the networks, but also secure and protect them from vulnerability to adversaries. We also defend networks for our maneuver forces and then we have full spectrum operations, which is on the offensive side.
We also have combat communications airmen and engineering installation airmen who extend the network out to a multitude of places, whether that’s tactical basing or at the forward battle edge.
With that said, information technology is still a key part of the cyberspace domain and we are moving forward in the Enterprise IT as a service. We are going to utilize things industry does very well as a commodity type of action activity.
We are going to leverage what industry does great, providing some services and network infrastructure, and re-mission our airmen to do core Air Force missions on the defensive and offensive side, while providing assurance for the many missions the Air Force presents to the combatant commanders on the joint side.
The bottom line is we’re in the cyber operations business — information technology, networks, both operating and defending — and we provide full spectrum operations in this thing we call the cyberspace domain.
Tech. Sgt. Wyatt Bloom uses a spectrum analyzer to check television broadcast network routers at the Defense Media Activity, Fort Meade, Md., July 18, 2012. Bloom is a cyber-transport technician assigned to DMA.
Airman Magazine: Would you explain your duties as commander of the Air Force component at Cyber Command? How is that different from the hat you wear as commander of Twenty-fourth AF and Air Force Cyber?
Maj. Gen. Skinner: This could actually be a dissertation. To break it down a little bit, the Twenty-fourth AF is where we organize, train and equip our airmen. The perfect example is we have an organization down at Hurlburt Field — they train almost every cyber professional. Now we do a lot more than that, but that’s one example of the Twenty-fourth AF piece.
In the Air Force cyber piece, I am charged by the Air Force to present forces to Gen. Paul Nakasone, the U.S. Cyber Command commander, for his missions and functions as the combatant commander.
We provide offensive forces and defensive forces, DODIN (Department of Defense Information Networks) ops cyber professionals and ISR professionals to Gen. Nakasone, so he can perform his mission.
Then the third area is the Joint Force Headquarters side. That’s where Gen. Nakasone has asked us to align to three different combatant commanders to provide additional joint support for their missions.
We have planning elements that are aligned to these three combatant commanders, as well as some cyber teams supporting the commanders’ efforts in defense of the mission. Our teams are able to deploy and employ forces against a particular adversary at the time and place of the combatant command commanders’ choosing.
Our job within Twenty-fourth AF, AF Cyber JFHQC and Cyber Command, is to be ready at a moment’s notice to protect our systems and defend the networks and defend the core missions of our military and our joint war fighters. Then deter, disrupt and degrade an enemy’s ability to perform those functions against us. Part of that goes into making sure that we have persistent engagement, a persistent presence, and a persistent innovation as we continue to move forward.
Airman Magazine: Across the Air Force, joint force, partner agencies and nations, do cyber operations equate to kinetic operations or is that a completely different animal?
Maj. Gen. Skinner: I would say it is not a completely different animal. To be successful in cyber operations and have cyberspace superiority at the time and place of our choosing, we need a team of teams that is internal to the Air Force.
Every single airman in our Air Force needs to be a cyber sentinel. We need every airman to be very conscious of cyber security, cyber hygiene and things that are going on within the cyberspace domain.
We have branched out and are part of several joint organizations that perform functions and missions within the cyber domain. The National Security Agency is a huge partner with us as we perform these missions, as well as the Central Intelligence Agency, Defense Information Systems Agency and Department of Homeland Security — a lot of different agencies across the board.
We are also great partners with commercial industry and academia because we’re all in the same field and in the same cyber domain.
Within Twenty-fourth AF, we have a United Kingdom representative and an Australian liaison officer, but most of our allies and partners are really up at the Cyber Command level. We leverage those partners through U.S. Cyber Command, NATO and other organizations.
Capt. Taiwan Veney, cyber warfare operations officer, watches members of the 175th Cyberspace Operations Group, from left, Capt. Adelia McClain, Staff Sgt. Wendell Myler, Senior Airman Paul Pearson and Staff Sgt. Thacious Freeman, analyze log files and provide a cyber threat update utilizing a Kibana visualization on the large data wall in the Hunter’s Den at Warfield Air National Guard Base.
(Photo by J.M. Eddins Jr.)
Airman Magazine: What is it that makes your cyber airmen “cyber warriors”?
Maj. Gen. Skinner: Our airmen are absolutely warriors. We have teams in the fight operating constantly: 7 days a week, 365 days a year, Christmas and New Year’s.
If you’ve heard Gen. Nakasone speak recently you’ve heard him say we’re no longer solely responding to network intrusions, we have cyber forces persistently engaged against state and non-state adversaries, actively identifying and countering threats in the cyber domain.
This achieves several benefits at once: first and foremost, it gives us control over the cyber terrain that serves as the foundation for superiority in cyberspace. It also keeps our operators ready and their skills honed and imposes cost on the adversary so they can no longer operate freely without repercussion. There’s already a massive demand signal for our cyber operators that will only increase, so we have to ensure we’re fielding proficient, ready and lethal operators at scale.
Because of this, we are investing not only the readiness of our mission, but also in the readiness of our people. This means examining everything within our scope of control, including the effect the operational tempo of our 24/7/365 mission has on our operators.
Just like you see within the (remotely piloted aircraft) field, cyber can mean long periods away from the sunlight and abnormal sleep hours, and that can absolutely have an effect on people. Any leader will tell you—if you take care of the people, they will take care of the mission.
Airman Magazine: What part does the total force play in cyber operations and defense?
Maj. Gen. Skinner: I will tell you, we could not do our job on a day-to-day basis without the total force. The majority of the forces within Twenty-fourth AF are guard and reserve components.
Our engineering installation mission is 85 to 90 percent within the guard. More than 50 percent of our combat communications capability, which extends and expands our capabilities to the tactical edge, is in the guard. We have guard organizations up in Washington. We have some in Rhode Island. We have some here in Texas. I will tell you they provide great day-to-day work.
What’s even more important is the expertise that they bring from their civilian jobs. We have vice presidents of some corporations who are part of our total force as well. Bringing that expertise, leadership, things that the public is good at and things that industry is focused on benefits the military and vice versa. They take lessons learned from the military and take it to their company. So it’s a great yin-yang relationship.
Whether it’s an offensive operation or a defensive operation or even DODIN ops, there has to be a tight tie between all of those as we move forward because the defense learns from the offense and the offense learns from the defense. DODIN ops learn from defense to figure it out where we need to be resilient, where some of our mission critical assets are and how to defend them.
All the computer networks, email, applications and systems in the cyberspace domain are what we call the Department of Defense Information Networks. There are pay applications that we have in the Air Force that are part of DODIN. If you get paid electronically within the Air Force that’s part of the DoD information network.
Airman Magazine: Is it an advantage that those reserve and National Guard personnel tend to have long histories with one unit?
Maj. Gen. Skinner: I would say sometimes it’s an advantage and sometimes it’s not. In some places having continuity is good. I would say having too much continuity isn’t necessarily good in cyber because you want some fresh blood, some fresh ideas.
Airman Magazine: Would a technical track for active-duty cyber operators benefit the force?
Maj. Gen. Skinner: Similar to other domains and weapon systems, we have to be proficient to be effective. Since cyber is a technical domain we do need technical expertise.
However as our people gain that expertise and increase in rank and responsibility, we need them to be leaders and lead teams to success while still maintaining credibility in their profession. We, ACC and Headquarters Air Force are working closely together to determine what the right “path to greatness” will look like, in order to build a force that generates maximum lethality.
Cyber warfare operators assigned to the 275th Cyber Operations Squadron of the 175th Cyberspace Operations Group of the Maryland Air National Guard configure a threat intelligence feed for daily watch in the Hunter’s Den at Warfield Air National Guard Base.
(Photo by J.M. Eddins Jr.)
Airman Magazine: As cyber tools and methods seem to change constantly, ow can the acquisitions process be altered to make sure the Air Force has the best technologies and practices in the cyber domain?
Maj. Gen. Skinner: The Air Force and DoD leadership are laser-like focused on our ability to acquire things in a more agile, fast and relevant way. We have leveraging other authorities, like 804 authorities, to bring on the future faster and to bring innovation faster.
As an Air Force we are becoming more of a software force than a hardware force. The ability to bring the new wave of agile software development operations, DevOps, is going to be key in maintaining our superiority and operating within the enemy’s OODA loop (time it takes to observe, orient, decide, and act).
We’re bringing in individuals who understand the old waterfall model is not the right model because by the time that you set the requirements and start developing to those requirements, the environment, threats and priorities have changed.
If you’re spending weeks, months and years identifying and defining hundreds or thousands of requirements, you definitely can’t meet those requirements in a timely manner. So leverage industry, leverage developers who are innovative, define the left and right limits or requirements.
So you get a three to five-page requirements document, which is much better than a 100 to 200-page document. Let them innovate and come back with a solution and in a much more timely manner—days and weeks versus months and years. Then you iterate and you continue to iterate on that minimum viable product.
Then also leverage some of those techniques to buy the right hardware in a timely fashion and focus on the approval top rate process, to reduce the amount of time to approve either software or hardware for connecting to the network. I know that Dr. Roper, Air Force Acquisition and the chief and secretary are very focused on bringing the future faster.
Airman Magazine: The Air Force is considering launching a cyber rapid capabilities office. How would that benefit the Twenty-fourth AF and the cyber community as a whole?
Maj. Gen. Skinner: The traditional slow-and-steady acquisition model is great for buying a fleet of fifth-generation aircraft, but it isn’t ideal for cyberspace where the landscape is changing constantly and where the state-of-the-art is available to anyone interested in buying. We need to get faster.
The DNA of the Air Force RCO brings agility and flexibility, which drives down timelines and increases capability. Right now we can’t say what form a cyber RCO would take, but will benefit us by getting the right capabilities and weapons at the right time to our operators. We need to respond to malicious cyber activity with greater speed and tempo employing a calculated, “spectrum of risk” framework which is properly delegated at echelon to enable responsible and responsive cyberspace operations in support of assigned missions.
The concept of Fusion Warfare gathers all intelligence, surveillance and reconnaissance data across all Air Force platforms into the “combat cloud” through and autonomous process where it’s analyzed and combined to create a real time big picture for commanders.
(Photo by Airman 1st Class Kevin Sommer Giron)
Airman Magazine: What effect will advances in big data research have on cyber operations?
Maj. Gen. Skinner: Data is the game changer in our business. If I own the data battle space, then I will definitely be within the OODA loop of the adversary. Being able to leverage quantum computing, artificial intelligence and analysis of big data platforms is really the future of our mission.
There is so much data out there in today’s environment there is no way that you can get through all of it (manually). So you may miss a key data point that would help you make a decision. In a future conflict, being able to have the right data at the right time analyzed at the right tempo is key to success.
We’re putting a lot of effort into better understanding the data, not just from cyber standpoint, but also in logistics, in intelligence and even in personnel. The more we can analyze the data, the better that we can perform education and training, perform timely logistics, perform ISR operations. Every single Air Force core mission is reliant on data to be more effective, more efficient and more successful.
Airman Magazine: Can you talk about Hack the Air Force and its value to the force?
Maj. Gen. Skinner: The first Hack the Air Force iteration was in late 2017, after the successful Hack the Pentagon initiative by Defense Digital Services. When the first hackathon sprint kicked off it took less than a minute for a hacker to find a valid vulnerability. By the end, over 200 holes in our boundary had been patched—and that was just the first iteration.
Hack the Air Force gets after two important focus areas: first, it builds capacity for the Air Force by leveraging expertise from a multitude of places, and second, it leverages innovative thinking to find vulnerabilities we otherwise might not uncover.
Take, for example, the person who won the first hackathon sprint, a 17-year-old high school student from Chicago. Maybe his path won’t lead him to the Air Force, but we were still able to use his talents to make ourselves more resilient. To me that’s a win.
Quynh Tran, right, a Raytheon Corporation software engineer, talks with Capt. Nick Lundin, Product Management lead, about a software coding project May 30, 2018 at Kessel Run, a program within the Defense Innovation Unit Experimental, a United States Department of Defense organization, in Boston.
(Photo by J.M. Eddins Jr.)
Airman Magazine: What lessons can be learned from commercial companies about practices that enable those fresh ideas to come forward?
Maj. Gen. Skinner: There are a lot of great lessons learned from Silicon Valley and I would offer Silicon Valley has also learned from the Department of Defense.
As I’ve said many times over my 33-year career to date, if I came into the military today, compared with a talent level of the individuals that we have now, I would not be as successful as I have been.
The talent today is amazing and our job as senior leaders is how do we unleash that talent? How do we have the right policies and the right directives leveraging the right acquisition authorities and unleash this talent on the hard problems that our force and our nation face today.
The key is getting the right people in the room to determine how best to provide solutions, whether it’s software development, hardware acquisition or cyberspace operations. It’s getting the right people in the room and getting through the bureaucracy, pushing the bureaucracy to the side and being able to unleash the talent.
Airman Magazine: How can, especially when it comes to the cyber domain, the Air Force compete with civilian industry to attract more STEM (science, technology, engineering and math) talent?
Maj. Gen. Skinner: There was always a competition between academia, research labs, commercial industry and the military. We as a military cannot compete from a dollar standpoint.
But where we can compete is with the great things you can do within the DoD, that you probably can’t do within the commercial world. We have great missions coming from the research we’re doing.
Some of the operations we’re doing on a day-to-day basis, you can’t do that on the commercial side. We have opportunities for individuals at a variety of levels to perform things they couldn’t do outside of the military. That’s our calling card.
Airman Magazine: Peer and near-peer competitors have been going to school on us since World War II; how do we offset that advantage?
Maj. Gen. Skinner: I would say every threat is an opportunity. While we have been focused over the last 10 to 15 years on the violent extremist, the latest National Defense Strategy, National Security Strategy and National Cyber Strategy outline strategic competition, peer competitors, and has turned the focus there.
You’ll hear a lot about readiness. Readiness is very important to our chief, very important to our secretary and very important to the secretary of defense. We need to make sure that we have a lethal force. In order to do that, you need to have a ready force.
In order to be ready, you need to have a disciplined force. Especially when there is strategic competition out there and adversaries who on a day-to-day basis are performing actions and operations that are probably right below the level of conflict.
But, I would not want to go and do a mission against a threat with anyone else but the airmen we have in our service today. Our airmen, with our joint partners in the other services, still have the most critical, credible and lethal force in the world.
Airmen with the 68th Network Warfare Squadron monitor Air Force communications to analyze disclosures of critical information and perform data loss prevention at Joint Base San Antonio-Lackland, Texas, Oct. 25, 2018.
(Photo by J.M. Eddins Jr.)
Airman Magazine: You talked about having a disciplined force in order to be lethal. What constitutes discipline in the cyber world?
Maj. Gen. Skinner: Discipline is key. I’m not talking about discipline from a uniform code of military justice aspect. This is discipline in processes, discipline in procedures and discipline in command and control. We spent a lot of time going back and trying to figure out what happened on something because there was an undisciplined tactic, technique, procedure or process. We’re trying to leverage discipline to make our force more effective and more capable and build capacity.
Then we come to a readiness standpoint. Readiness, as you know, is made up of personnel, equipment, procedures and training. We are continually leveraging our innovative airmen to improve the training they receive, how we purchase equipment, how we educate our airmen.
Part of all this is proficiency. Proficiency against a violent extremist organization is much different than proficiency against strategic competitors. Our focus continues to be how to maintain and improve the readiness and proficiency against strategic competitors.
We are also leveraging our airmen and technology to be more efficient and more effective.
Leveraging artificial intelligence can decrease the amount of time that our airmen spend doing manual work so they can focus on the higher end discussions of cognitive actions and activities.
For example, manually looking through thousands of pages of data takes a very long time. We have airmen who are leveraging technology, whether it’s using keywords or bringing a couple of technologies together, that can take those thousands of documents and run through them in minutes versus hours, days or weeks.
Then taking what the technology has given you and put the human eye on it — are there any other needles in the haystack?
That’s what our airmen are doing on a day-to-day basis. Whether it’s from a data collection standpoint, whether it’s from a cyber operation standpoint, whether it’s looking through logs to see if we have an adversary presence on our networks. Looking through logs to make sure that our user experience is where it needs to be on a daily basis, but leveraging technology to reduce the amount of manual steps.
Airman Magazine: With a kinetic weapon, the effects are apparent and there is an inherent process to be able to determine origin, intent and purpose. The very nature of cyber is to hide the hand that dealt the cards. What kind of challenges does determining attribution pose for a commander?
Maj. Gen. Skinner: So attribution is a very significant challenge. There are not as well defined international norms in the cyberspace domain and therefore a multitude of nations and multitude of criminals and the multitude of other individuals are continuing to push the limits.
It is often very apparent in the other domains, from an effect or an outcome, who the actors are. In the cyber domain, you can have the same type of effects in as in other domains, but it is harder to determine the source, which is really important when you start talking about multi-domain operations.
Cyber is a critical enabler while also a critical operation because cyber can be both supporting and supported within multi-domain operations. As we continue to refine our operations, to refine our tactics, techniques and procedures, we will continue to get better at understanding attribution, understanding the outcomes, and making sure that we refine and define those outcomes and bound the outcomes to meet our mission objectives.
As cyber continues to get more profound and more pronounced in the day-to-day operations, attribution is going to become that much harder.
U.S. Air Force Maj. Gen. Robert Skinner, then Deputy Commander of Air Force Space Command, speaks at the 2018 Rocky Mountain Cyberspace Symposium in Colorado Springs, Colorado, March 6, 2018.
(Photo by Dave Grim)
Airman Magazine: How do you convince people that cyber and space have become foundational to everything that the Air Force, and our society as a whole, does on a daily basis?
Maj. Gen. Skinner: I’ll give you a perfect example, the Global Positioning System is operated by Air Force Space Command: not only for the nation, but the whole world. The U.S. Air Force supplies and supports the system and satellites that enable the GPS navigation we use in our cars and on our phones every day, millions of times around the world.
It also provides timing. Every financial transaction is supported by the GPS system. So when you purchase something and put your credit card into that reader, there’s a timing aspect that is being supported by GPS. So the Air Force is supporting billions of activities and actions all the time.
Airman Magazine: The chief of staff and secretary have made it a priority to push command level decisions down to the lowest level possible. How is that manifested in your command?
Maj. Gen. Skinner: Its not only because the chief and the secretary say they want it done. We have the greatest airmen in the world and we have the greatest commanders in the world—pushing authorities and responsibility down to the lowest level really enables them to unleash the talent around them and enables us to unleash their talent.
You don’t need higher headquarters micromanaging and directing things on a daily basis. Our commanders are boarded. We have a tradition of great commanders in our Air Force and we need to let them run. We need to let them determine how best to run their organizations and how best to be effective. The more that we can push decision authority down, the more bureaucracy we can eliminate and the more agile, lethal and effective we can be as an Air Force.
From a higher headquarters level and higher commander level, our responsibility is to give the left and right limits to those organizations and then let them run.
If we are in a conflict, especially against a peer competitor, the amount of time it would take to micromanage our tactical-level units would not allow us to be inside the OODA loop of our adversary.
We need to allow our commanders, in peacetime, to train like they are going to fight. To have that authority to perform the mission as they see fit. With more guidance, directives and limitations to that commander, there’s going to be some negative learning, first and foremost, but secondly, the safety of our airmen will be put in jeopardy.
Participants in the joint, multinational exercise Cyber Guard 2016 work through a training scenario during the nine-day event in Suffolk, Va., on June 16, 2016.
(Photo by Petty Officer 2nd Class Jesse A. Hyatt)
Airman Magazine: As commander of Joint Force Headquarters Cyber, you’re responsible for cyber affects in campaign plans from U.S. Central Command to U.S. Transportation Command. How does that integration take place?
Maj. Gen. Skinner: Aligned to each of those combatant commanders we have an element called the Cyber Operations Integrated Planning Element. We are just now standing those up and they are at the combatant commanders’ headquarters.
They’re kind of our picture window into that combatant commander to enable cyber operations planning to be part of their overall plan. Each combatant commander has either a function or a region they’re responsible for and they have what we call a scheme of maneuver, which is either day-to-day or in conflict. It is the commander’s plan of how to ensure sure we are successful in that campaign.
These planning elements are aligned there so we can be part of that plan and make sure that cyber isn’t just bolted on, but integrated into that plan. Cyber will be one of the first options that are available to that combatant commander below the level of conflict to make sure that we are meeting our objectives.
Airman Magazine: How do you get everyone with a piece of the huge cyber puzzle speaking the same language? How do you communicate capabilities and vulnerabilities to leadership, agency partners and airmen who are not cyber experts?
Maj. Gen. Skinner: I would say today we have the best understanding and the best alignment from the cyber domain standpoint that we’ve ever had with all the strategy documents – the National Defense Strategy, which is underneath the National Security Strategy, the National Cyber Policy and Strategy, the DoD Cyber Strategy and the Cyber Posture Review.
All of these documents are perfectly aligned and it’s a great understanding of the capabilities that we provide, but also the importance of cyber to the multi-domain operations. The education is continual, but I offer that our Air Force leadership understands the cyber domain. They understand how important the cyber domain is to multi-domain operations.
We continue to educate the entire forest. We’re continuing the education process of all of our airmen, from the highest level to the most junior airman and the joint community, but from a joint standpoint and a national standpoint cyber is more understood than it ever has been.
Proposed content viewing page on the Cyber Education Hub, which is being developed at the Center for Cyberspace Research in the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio.
(AFIT CCR photo)
Airman Magazine: Do you see the Continuum of Learning concept and applications like the Cyber Learning Hub being developed by the Center for Cyberspace Research, Air Force Cyber College and U.S Air Force Academy’s CyberWorx, as aiding in that effort?
Maj. Gen. Skinner: There are a lot of great opportunities with that as cyber continues to be more and more integrated into the day-to-day operations.
We currently have the Air Force Warfare Center where we bring a lot of different mission systems together, integrate them, exercise and train and cyber is a significant part of that.
From an education standpoint we send people to the Air Force Institute of Technology. They not only have general education classes, but we they have Cyber 100, Cyber 200, Cyber 300 and Cyber 400 courses.
We have the 39th Information Operations Squadron, which does our cyber training. Keesler Air Force Base has a lot of our cyber courses. Just as Gen. Raymond over the last year has been working with Air University to make sure we have more space in our professional military education, we’re doing the same thing from a cyber standpoint.
We’re working with Gen. Cotton at Air University and Gen. Kwast at Air Education and Training Command to make sure that we continue to improve the amount of cyber and relevant topics in cyber education in basic military training through professional military education and to highlight cyber, both from a professional and a personal standpoint, because it impacts every part of your life.
Airman Magazine: In that vein, what would you like every airman to be aware of in their daily connectivity?
Maj. Gen. Skinner: One of the biggest vectors that our adversaries use to get into our networks is email. It’s called spear phishing. You can get those at your home and at the office. We continue to educate that you should know who the sender of an email is, that you do not click on links that you’re not certain are good links. If it looks too good to be true, it probably is.
If you get an email offering a free vacation, there’s probably not a free vacation. That’s probably someone trying to gain access to your personal information or gain access into our Air Force systems to cause havoc and disrupt our ability to do our missions.
Additionally, be aware that our adversaries can put different pieces of unclassified information together, which in the aggregate actually become classified. So you always have to be careful when you’re outside of work, or even inside work, of what you talk about in the open.
You have to monitor your computer systems. Make sure your systems are patched, especially at home, because that is the quickest way for an adversary to exploit your system. Some vulnerabilities have been out there for years. We find that both on the commercial side and the government side — there are systems out there that have not been patched in a long time, even though a patch has been out there.
We’re continuing to leverage technology to make that a little easier, to make sure that we’re updating and protecting all those systems.
Maj. Gen. Robert J. Skinner, Commander, 24th Air Force; Commander, Air Forces Cyber and Commander, Joint Force Headquarters-Cyber is photographed at his headquarters at Joint Base San Antonio-Lackland, Texas, Oct. 26, 2018.
(Photo by J.M. Eddins Jr.)
Airman Magazine: The Air Force places a premium on building leaders. What twists and turns has your career taken that culminated in command of the Twenty-fourth AF?
Maj. Gen. Skinner: I’ve had multiple mentors who have taken a special interest in my career. They have said you need to go to this position. I questioned it. I didn’t understand it. But it turns out that developed a place in my leadership that was not refined well enough. We spend a lot of time and energy on managing our talent. What differentiates us from other nations and other militaries is our airmen, whether officer, enlisted or civilian.
Our Airmen are our most precious asset. It is our solemn duty to professionally develop our airmen to the best extent possible. We take special interest in placing them where they professionally develop, while making sure our missions continue to be successful.
This article originally appeared on Airman Magazine. Follow @AirmanMagazine on Twitter.
On Thursday, Jan. 2, 2020, a U.S. airstrike in Iraq killed Quds Force Commander and Iranian Major-General Qassem Soleimani and Kata-ib Hezbollah leader Abu Mahdi al-Muhandis, sending a wave of uncertainty into an already volatile region.
According to NBC News, Soleimani was planning to attack U.S. targets in the Middle East. NBC spoke to a State Department official after the strike, who said that they had “very solid intelligence” that Soleimani would act. U.S. President Donald Trump would later call Soleimani the “No. 1” terrorist in the world.
In response to the strike, Iran‘s leader, Ayatollah Ali Khamenei, said that “forceful vengeance” awaits the criminals behind the attack.
Coffee or Die spoke to two veterans of the Iraq War who have experience fighting Iran’s proxy militias, and three Iranians, two of whom currently live in Iran. The Iranians were given aliases to protect their identities.
Former U.S. Army Ranger and Green Beret Travis Osborn on deployment.
(Photo courtesy of Travis Osborn.)
Travis Osborn is a former U.S. Army Ranger and Green Beret. He spent 20 years in the Army and has experience going rifle-to-rifle with Iran’s proxy fighters.
“He caused a lot of issues in Iraq with the Badr Brigades and supporting Muqtada Al Sadr’s Madhi Army,” he said, referring to a Shi’a militia that was involved in multiple clashes with U.S. troops. “It was a target of opportunity that could not be passed up.
“Why was [Soleimani] in Iraq?” Osborn continued. “It wasn’t just for vacation. In my estimation, they were planning their first opening moves against the U.S. and Iraqi government for a takeover/overthrow of the country. We have been in the business of asking Iran to be nice for too long. It is time they were taught it is in their best interest to not sponsor terrorism and genocide.”
He also had some insights for people who may be afraid of a war with Iran: “They forget Iraq beat Iran in a war. And we ran over Iraq when it had one of the largest militaries in the world.”
Army veteran Adam Schumann agrees that the death of Soleimani was a positive action. Schumann served three combat deployments in Iraq with the Army’s 1st Infantry Division, and his struggle with traumatic brain injury (TBI) and post-traumatic stress disorder (PTSD) was turned into the Hollywood movie “Thank You For Your Service.”
“I’m overjoyed with the news of Soleimani’s death! I was fortunate enough to spend three years in Iraq encompassing every campaign of the war except for operation New Dawn,” he said. “In 2007, the Mahdi militia were thick in New Baghdad — and clearly backed and equipped by Iran.”
Schumann doesn’t believe that the strike indicates the start of another war. “Some are saying this is the beginning of a new conflict. I think it’s finally the beginning of the end of one we’ve been invested in for 17 years,” he said. “Too many American service members fought and died at the hands of Iran’s influence in the region. I can only hope that the commander in chief keeps his foot on the gas and further aides Iraq to a free and sovereign country.”
The Iranians we spoke to about the issue aren’t mourning the death of Soleimani, either.
“He was the head of a terrorist Shia network. He has blood on his hands, including the blood of Americans, Israelis, Iraqis, Syrians, and, of course, Iranians,” Hossein said. “It’s a great loss for the Islamic Republic, especially Ali Khamenei. They are angry, desperate, and confused. As an Iranian, I’m so happy he is dead and that it was done in such a quick, intelligent way by U.S. forces.”
Firuz said that it was the happiest news he has heard all month. “Soleimani displaced and destroyed thousands of innocent people,” he added.
“To me, he was always a terrorist,” Kaveh said. “They all are — IRGC (Islamic Revolutionary Guard Corps) members, I mean. One day he’s the general, and the day before that he was the guy torturing political prisoners. I see him as someone responsible for the death of many Iranians and Arabs from neighboring countries. Good riddance!”
What happens next depends on if Khamenei chooses to escalate the situation. Either way, tensions between America and Iran appear to be at an all-time high.
And in 2016, the Kuznetsov cruised through the English channel belching black smoke on its way to the Mediterranean.
This series of accidents and problems leads to one inevitable conclusion: The Russian Navy has a maintenance problem.
Bryan Clark, senior fellow for the Center of Strategic and Budgetary Studies, said that when it comes to maintenance, “You can’t live on older ships. After 20 to 25 years, all you have is what’s left on the shelf.”
The Admiral Kuznetsov.
Though many of the incidents plagued their submarine force, even more telling than its history of catastrophes is the routine reliance on oceangoing tugs, which accompany its surface vessels on every deployment.
On Oct. 22, 2018, two Russian corvettes, a tanker, and a tug set sail for the North Atlantic.
Experts say Russia’s dependence on tugs is an indication of an aging, insufficient surface fleet.
While Russia can boast impressive littoral capabilities, for blue-water operations it leans heavily on its Cold War-era platforms, an influential naval expert said.
This is problematic for several reasons, according to Clark. Maintenance becomes more difficult as ships age, and as decades pass their parts become harder, if not impossible, to obtain. It is impossible, then, to manage the eventual breakdown of equipment, which results in a loss of redundancy for crucial systems.
This redundancy — secondary, tertiary and even quaternary systems — is what keeps ships afloat and ready to fight.
For the Russian Navy, the idea of tug as escort has become standard. For the rest of the world, Clark thinks there is a lesson to be learned.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
The US believes North Korea fired a missile shortly before midnight Japan time, or 11 am EST July 28, a defense official confirmed to Business Insider — and initial estimates indicate it could be the longest-range missile ever tested by the Hermit Kingdom.
“I can confirm that we detected a launch of a ballistic missile from North Korea,” Lt. Col. Christopher Logan told Business Insider. “We assess that this missile was an intercontinental ballistic missile, as had been expected” Capt. Jeff Davis later said in a Pentagon release.
Ankit Panda, a senior editor at the Asia-focused news website The Diplomat, cited a US source as saying that the missile flew for 47 minutes, reaching an altitude of 2,300 miles and traveling 620 miles. Such a long flight time and high crest suggest a tremendous range.
While North Korea had already demonstrated an intercontinental range with the July 4 test of its Hwasong-14 ICBM, the missile launched July 28 appeared capable of reaching New York or Washington, DC. Yet as with the previous launch, it is unclear whether North Korea has developed the technology to accurately deliver a nuclear warhead to the US mainland.
The missile on July 28 may have landed in Japan’s exclusive economic zone, according to the Japanese public broadcaster NHK.
As launching an ICBM at full range could easily be interpreted as an act of war, North Korea lofts its missiles on a steep angle. Therefore a missile that flies only a few hundred miles toward Japan can still demonstrate a range of many thousands of miles.
For weeks, US intelligence monitoring North Korean military sites had predicted another missile test. July 27 marked the Day of Victory in the Great Fatherland Liberation War, a North Korean holiday celebrating the end of the Korean War on July 27, 1953.
North Korea has a pattern of launching missiles on historically significant dates, like its July 4 debut of an ICBM, but the weather July 27 was poor, possibly preventing a launch.
Typically, North Korea waits until the day after a launch to release photos or video from the event, which researchers analyze for insights into Pyongyang’s shadowy missile program.
The Army Corps of Engineers is installing up to 500 temporary generators until Puerto Rico’s old and deteriorating power grid can be made operational again, but long-term total power restoration could take nearly a year, the Corps’ chief of engineers told reporters at the Pentagon today.
The Corps is starting with public facilities and it faces power restoration to 3.4 million houses on the U.S. territory, some of which are in remote areas, Army Lt. Gen. Todd T. Semonite said.
Semonite said the island governor’s immediate goals are to restore power to 30 percent of Puerto Rico by the end of October and to 50 percent by the end of November, which the general said he considers a challenge.
The Corps is responding to the effects of four major hurricanes that struck the U.S. mainland, Puerto Rico and the U.S. Virgin Islands within a six-week span. Puerto Rico remains a challenge in part because it is an island, making it difficult to receive supplies, such as the 62,000 utility poles needed for power restoration.
“Puerto Rico and the Virgin Islands is a completely different paradigm,” he said. “People have asked me in the last several weeks … ‘Why don’t you do in Puerto Rico what you could have done in Florida?’ Because it is an island and it is very, very hard to just drive hundreds of pole trucks … down into the Virgin Islands and Puerto Rico.”
The Corps also needs about 338 utility towers, Semonite said, noting that each one is 75 feet long and must be flown in. “And then we need an awful a lot of connectors and cable, as well. But the whole goal is to get the transmission up and running,” he added.
The Corps’ power strategy is fourfold, starting with the temporary generators. As of today, 148 have been put in place, Semonite said.
The second line of effort is generation from the power plants.
“We need about 2,500 megawatts of power … to be able to restore the power back up to where it was at the beginning of the storm. Today, right now, we’ve got about 21.6 percent of that up,” he said.
FORT BUCHANAN, Puerto Rico—Temporary power generators staged in a yard in Fort Buchanan are prepared for installation in critical facilities throughout Puerto Rico, October 8, 2017. Soldiers assigned to 249th Engineer Battalion (Prime Power), along with civilian U.S. Army Corps of Engineers responders are working with FEMA to provide power generators to support disaster relief emergency operations throughout Puerto Rico. (Army photo by Staff Sgt. Elizabeth Tarr, 24th Press Camp HQ)
Transmission is the third line of effort in the strategy to restore power, Semonite said. “The No. 1 goal right now of what the Corps is doing is to be able to move this electricity that’s in the south up to the north,” he explained.
The fourth line of effort is distribution — getting power to homes and other buildings along terrain that is a massive logistics challenge, the general said.
“There are seven large power plants that normally run off of fossil fuel,” he said. There are also about seven solar or wind power plants and 21 hydropower plants, Semonite added. But, the general explained, the majority of that power is generated in the southern part of the island, while the majority of the need is in the north — particularly around San Juan.
And though transmission and distribution remain a challenge, there just isn’t enough capacity in Puerto Rico’s existing power plants to provide electricity to the island, Semonite said.
“Even if in fact all of the power plants are up and running, we would have a generation shortfall,” he said. “So about a week and a half ago, we cut a contract to a large company to come back in and place a temporary power plant in San Juan.”
The Corps and the Defense Department are working alongside the Federal Emergency Management Agency and Puerto Rico’s local government to restore power to the island, he emphasized.
Restoring power to the island is going to take a massive, long-term rebuild of the power grid, Semonite said.
“So what we are doing is to go all-out and put as many generators in as we can, mainly in public facilities. We got a list from the governor, and all the mayors donated to that list,” the general said. “And the list has got about 428 different requirements on it today.”
Every one who’s ever work the uniform loves that military discount. No matter how hard you try to deny it or blow off a small discount, that extra ten percent ain’t bad. In California, that’s like not paying sales tax. While we all love them and appreciate them when it happens, many of us don’t really go looking for them. Let’s be real: shopping purely for military discounts can be a lot of work. Now you can find everything you’ll ever need discounted in one place.
And what’s more, your shopping spree will go toward helping your fellow veterans.
Then you can keep your savings in one place.
GovX has access to the products and brands everyone loves, not just veterans. From outdoor gear by The North Face to Ray-Ban accessories, this site covers most anything you can think of wanting or needing for work or play. Like the A-10 being a tough plane designed around a giant gun, GovX is a retailer designed around providing amazing discounts to military, veterans, and first responders.
The site is like the exclusive Costco for the military-veteran and uniformed community. A membership with GovX provides access to discounts on brands like 5.11 Tactical, Propper, Vortex Optical, Under Armour, and – amazingly – Yeti.
If you’re unfamiliar with this miracle brand, I suggest you head to the Google posthaste.
But wait. That’s not what really makes GovX stand out. The real power of this site is that every month, the company selects a new nonprofit organization who does work related to first responders, military members, veterans, and their families and donates a portion of its revenues to the chosen groups. This is what GovX calls “Mission: Giveback.”
Previous Mission: Giveback recipients include the Iraq and Afghanistan Veterans of America, Firefighter Aid, National Law Enforcement Officers Memorial, the Semper Fi Fund, Team Rubicon, The Pat Tillman Foundation, and the Green Beret Foundation.
In 2019, GovX is supporting the Military Influencer Conference, a three-day event that brings together entrepreneurs and veterans from all walks of life to share knowledge, build one another up, and help mentor each other through the rigors of starting their own businesses. Learn more about it by visiting the website and look for a Military Influencer Conference near you.
Now feel free to splurge on those yoga shorts you were iffy about buying – and feel good about doing something for your brothers and sisters in arms.
The Afghan Air Force is scheduled to receive 150 new MD530 F Cayuse Warrior light attack helicopters by 2022.
By this, the total number of MD530 Fs operated by the Afghan National Security and Defense Forces will rise to almost 180.
The US Department of Defense announced on Sept. 5 that it has issued a $1.38 billion contract to MD Helicopters “for procurement of an estimated quantity of 150 MD 530F aircraft and required production support services to include program management, delivery support, pilot training and maintenance,” the Diplomat reported.
The estimated completion date of the contract is 2022.
According to a MD Helicopters press release, the first deliveries under the contract will be 30 MD 530Fs for an estimated $177 million. The first part of the order is expected to be completed by September 2019.
“Mission Equipment for these aircraft will include a ballistic crash worthy fuel system, consisting of a main fuel tank and a 38-gallon Auxiliary Fuel Tank, high capacity landing gear, FN Herstal Weapons Management System, DillonAero Mission Configurable Armament System weapons plank and Fixed-Forward Sighting System, Rohde and Schwarz M3AR Tactical Mission Radio, and FN Herstal .50 caliber HMP 400 Machine Gun Pods and M260 7-shot rocket pods,” MD Helicopters noted in a press statement released on Sept. 13.
Earlier this week, Gen. Phillip A. Stewart, commander of Train, Advise, Assist Command said in an interview with TOLOnews that $7 billion will be spent on the Afghan Air Force over the next four years.
“We expect the Afghan Air Force to be fully professional, sustainable, and capable and independent and that’s our whole goal here,” he said.
Under the new aid package, the number of aircraft owned by the AAF will be doubled in the next four years.
This comes after Major General Abdul Raziq Sherzai, the commander of Kandahar Air Brigade, last week said more military aircraft should be delivered to the hard-pressed Afghan security forces who have been battling insurgent groups in their traditional heartlands in Kandahar and Helmand provinces for weeks.
He said that the Kandahar Air Brigade, despite having inadequate facilities on hand, continue to back the ground forces in their campaign against the militants in Helmand and Kandahar provinces, where in recent months violence dramatically increased following the Taliban’s new attempt to seize control of the strategic province of Helmand in the south and infiltrate neighboring provinces.
The Kandahar Air Brigade that operates under the command of 205 Atal Army Corps has about 20 different types of aircrafts – a figure security officials claim is nothing near what they need to deal with the current scale of security issues that have undermined large swaths of land in the south.
US intelligence officials are under pressure from the White House to produce a justification to declare Iran in violation of a 2015 nuclear agreement, in an echo of the politicization of intelligence that led up to the Iraq invasion, according to former officials and analysts.
The collapse of the 2015 deal between Tehran, the US, and five other countries – by which Iran has significantly curbed its nuclear program in return for sanctions relief – would trigger a new crisis over nuclear proliferation at a time when the US is in a tense standoff with North Korea.
Intelligence analysts, chastened by the experience of the 2003 Iraq war, launched by the Bush administration on the basis of phony evidence of weapons of mass destruction, are said to be resisting the pressure to come up with evidence of Iranian violations.
“Anecdotally, I have heard this from members of the intelligence community – that they feel like they have come under pressure,” said Ned Price, a former CIA analyst who also served as a national security council spokesman and special assistant to Barack Obama. “They told me there was a sense of revulsion. There was a sense of déjà vu. There was a sense of ‘we’ve seen this movie before’.”
However, Donald Trump has said he expects to declare Iran non-compliant by mid-October, the next time he is required by Congress to sign a three-monthly certification of the nuclear deal (known as the Joint Comprehensive Program of Action, or JCPOA). And the administration is pursuing another avenue that could trigger the collapse of the deal.
David Cohen, a former deputy director of the CIA, said it was “disconcerting” that Trump appeared to have come to a conclusion about Iran before finding the intelligence to back it up.
“It stands the intelligence process on its head,” Cohen told CNN. “If our intelligence is degraded because it is politicized in the way that it looks like the president wants to do here, that undermines the utility of that intelligence all across the board.”
In another move reminiscent of the Iraq debacle, the US administration is putting pressure on the International Atomic Energy Agency (IAEA) to be more aggressive in its demands to investigate military sites in Iran, just as George W Bush’s team pushed for ever more intrusive inspections of Saddam Hussein’s military bases and palaces.
The US ambassador to the United Nations, Nikki Haley, visited IAEA headquarters in Vienna to press the agency to demand visits to Iran’s military sites. Haley described IAEA inspectors as “professionals and true experts in their field”.
US ambassador to the United Nations, Nikki Haley. Photo from Wikimedia Commons.
“Having said that, as good as the IAEA is, it can only be as good as what they are permitted to see,” Haley told reporters on her return to New York. “Iran has publicly declared that it will not allow access to military sites, but the JCPOA makes no distinction between military and non-military sites. There are also numerous undeclared sites that have not been inspected yet. That’s a problem.”
Unlike the case of Iraq and the Bush administration, where there were deep divisions in the US intelligence community over the evidence for Iraqi weapons of mass destruction, there is now a general consensus among US intelligence and foreign intelligence agencies, the state department, the IAEA and the other five countries that signed the JCPOA, as well as the European Union, that there is no significant evidence that Iran has violated its obligations under the deal. Tehran scaled down its nuclear infrastructure and its nuclear fuel stockpiles soon after the deal was signed in Vienna.
However, Trump, who denigrated the agreement throughout his election campaign, has appeared determined to torpedo it.
On July 17, the latest deadline for presidential certification of the JCPOA deal required by Congress, the announcement was postponed for several hours, while Trump’s senior national security officials dissuaded the president from a last-minute threat not to sign.
“If it was up to me, I would have had them non-compliant 180 days ago,” Trump told the Wall Street Journal on July 25. He hinted it was his secretary of state, Rex Tillerson, who had persuaded him to certify the agreement.
“Look, I have a lot of respect for Rex and his people, good relationship. It’s easier to say they comply. It’s a lot easier. But it’s the wrong thing. They don’t comply,” the president said. “And so we’ll see what happens… But, yeah, I would be surprised if they were in compliance.”
Trump said his administration was doing “major” and “detailed” studies on the issues.
Richard Nephew, who was principal duty coordinator for sanctions policy in the Obama administration state department and a member of the team that negotiated the JCPOA said government agencies were producing such studies all the time. He said the difference under the Trump administration was that they were being told the conclusions should be.
“Behind the scenes, there is a huge machine that is pumping up reports and updates and status checks for the administration and Congress,” Nephew, now at Columbia University’s School of International and Public Affairs, said. “You have intelligence officers and analysts in a bunch of agencies who spend literally every day scrubbing every single report they have got of what is going on inside Iran trying to find instances of non-compliance.
“What I suspect is happening now is that those intel officers have been asked to go to the cutting room floor, [and are being asked:] ‘What have you forgotten? What have you discounted? What have you said doesn’t really fit and not really relevant?’
“I actually think that’s healthy if it’s an honest question,” Nephew said, but he added: “It seems there is a faction within the administration that is trying to lay the basis for getting out [of the agreement] on the basis of cooked books.”
He predicted that intelligence analysts would resign if they were pushed too hard.
“The intelligence community learned the lessons of Iraq hard,” Nephew said. “And the analysts I know who are attached to this effort I am quite convinced would resign and resign loudly before they would allow… their words to be twisted and turned the way it happened with Iraq.”
Robert Malley, who was a senior US negotiator at the nuclear talks with Iran, said that the Trump administration was discounting the information it was getting from its agencies because it viewed them as the “deep state” or “Obama holdovers.” But Malley predicted it would be harder for Trump to ignore the reservations of US intelligence and US allies and drive towards confrontation with Iran than it was for George Bush to go to war in Iraq.
“The main difference is that Iraq has already happened, which means that both the American public and the international community have seen a similar movie before, and therefore might well react differently than the way they reacted the last time around,” he said.
The other principal avenue of attack on the JCPOA being pursued by the Trump administration has focused on the question of inspections of Iranian military sites. Under the agreement, the IAEA can present evidence of suspect activity at any site to Iran and ask for an explanation. If the explanation is not accepted by the IAEA, Tehran would have two weeks to negotiate terms of access for the agency inspectors. If the Iranian government refuses, a joint commission of JCPOA signatories could vote to force access, andIran would have three days to comply.
“There is a mechanism, a very detailed one and one of the issues we spent the most time on in negotiation,” Malley said. But he added: “There are people on the outskirts of the administration, and who are pushing hard on the Iran file, saying they should be allowed to ask for inspection at any sensitive site for no reason whatsoever, in order to test the boundaries of the agreement.”
During her visit to Vienna, Haley suggested that Iran’s past practice of using military sites for covert nuclear development work was grounds for suspicion. But Laura Rockwood, a former legal counsel in the IAEA’s safeguards department (which carries out inspections), said the US or any other member state would have to provide solid and contemporaneous evidence to trigger an inspection.
“If the US has actionable intelligence that is useful for the IAEA to take into account, and I mean actual and honest intelligence, not fake intel that they tried to use in 2003, then I think the agency will respond to it,” Rockwood, who is now executive director of the Vienna Centre for Disarmament and Non-Proliferation, said. “But if they try to create evidence or if they try to pressure the agency into simply requesting access because they can, I think it will backfire.”
Some analysts, however, believe that the Obama administration was too willing to let Iranian infractions slide and that a more skeptical view of the agreement and implementation is overdue.
“Asking the system for knowledge of violations is different than asking anyone to falsify them,” said David Albright, head of the Institute for Science and International Security. “This is a highly technical subject and the Obama administration downplayed and even hid violations and problems. So, there is a need to establish the true situation and ensure decision makers understand these issues. Spinning this as equivalent to Iraqi WMD claims is not only unfair but highly inaccurate. Certainly, the pro-JCPOA advocates would love to do that.”
Any Iranian objections to new inspections could be cited by Trump if he carries out his threat to withhold certification of the JCPOA in October. It would then be up to the US Congress whether to respond with new sanctions, and then Trump would have to sign them into law, in potential violation of the agreement. The Iranian president, Hassan Rouhani, said this week that elements of the program that had been stopped under the agreement could be resumed “within hours” if the US walked out.
Ultimately, Tehran and the other five national signatories to the agreement would have to decide whether to try to keep the deal alive without US participation. The head of the Iranian Atomic Energy Organisation, Ali Akbar Salehi, suggested over the weekend that if the other signatories remained committed, Iran would continue to observe the deal. It is an issue that would split Europe from the US, likely leaving the UK perched uneasily in the middle.
“As a practical matter, you’re not going to have the rest of the international community, you’re not going to have our allies in Europe, you’re certainly not going to have the Russians and the Chinese coming along with us to reimpose real pressure on the Iranians,” Cohen said. “So you’ll have this fissure between the United States and essentially the rest of the world in trying to reinstate pressure on Iran.”
Many troops enlist with hopes of finding something bigger than themselves. After their contract is up, it’s not uncommon for the battle-hardened grunt to feel lost in a world now unfamiliar. All the while, they’re told that there’s nothing out there for them but flipping burgers or greeting customers at some supermarket.
Then, there’s the world of law enforcement. The police force is, and always will be, trying to scoop up as many of these former-military badasses as possible. In terms of transitions, going from the armed forces into law enforcement isn’t that much of a stretch: you’ll face similar hours, do similar tasks, and be surrounded by similar camaraderie all in attempts to promote greater good.
With the utmost respect to law enforcement officers, however, many infantrymen aren’t interested in waiting at the local doughnut shop until it’s time to write parking tickets and toss the same village drunk into the lockup — again. They want something bigger, something badass, something that rewards their ability to kick in doors. This is where the Special Weapons and Tactics (SWAT) team comes in.
For many, the only real change between the infantry and SWAT is the uniform. Here’s why:
You’ll even do the exact same training. Being an infantryman just gets you ready for the same ol’ ride.
(Photo by Staff Sgt. Patrick Harrower)
The job description is nearly identical
Heavy ballistic armor? Check. Assigned weapon? Check. Breaking down doors to catch bad guys? Oh, yeah — check.
The SWAT team’s objective is to keep the peace at a level higher than is expected of the average cop. While every police officer should be trained and ready to fight at a moment’s notice should the situation arise, the SWAT team provides that extra oomph needed in intense situations, like bank robberies, hostage negotiations, and high-level drug cartel activities.
Instead of infiltrating a compound in Kandahar to catch an HVT bomb maker, SWAT officers are infiltrate compounds back home to catch drug kingpins.
Did I mention that you’ll spend a lot of time training at the range?
(Photo by Staff Sgt. Patrick Harrower)
The requirements are basically the same
Potential applicants must be physically fit, hard working, excellent shots, mentally and emotionally strong, decisive under stress, and able to communicate under hazardous conditions.
The help-wanted ad reads almost exactly like a description of a post-deployment infantryman.
The only thing holding an infantryman back from immediately joining the SWAT team is that, typically, membership requires three years of prior experience in law enforcement. I can’t speak for every police department, but that requirement can be lessened for exceptionally badass applicants.
You really will be training… a lot. Which shouldn’t be too far off from infantry life.
(Photo by Sgt. Juana M. Nesbitt)
The structure almost mirrors the military
Between SWAT teams and military life, the chain of command is identical and the organizational structure is the same.
Being selected for SWAT isn’t easy. Potential recruits go through a grueling process and only the best of the best can make it through to the end. But if you do, you’re basically in the military again.
You’ve still got a battle buddy (you’ll call them “partner” instead), you still work in four-man teams (squads) and there’ll be, on average, 15 teams per district. Since high-stakes situations aren’t happening every day, you’re going to be training and continually honing your skills with your team.
Officers got each other’s back, literally and figuratively.
(Photo by Sgt. John Crosby)
The brotherhood is just as tight
If there’s one thing that damn-near every veteran misses about the military, it’s the camaraderie. Knowing that the people to your left and right would die for you without a second thought is hard to come by at some desk job.
SWAT is not a place to go if you’re looking to make a name for yourself at the expense of others. Real SWAT teams live as a unit, work as a team, and train until everyone becomes as close as family.
This level of trust in another human can only be formed in groups like the military and SWAT.
Military service is very common among law enforcement officers — especially in SWAT. You’ll fit right in.
(Photo by Staff Sgt. Patrick Harrower)
The good you do is in your community
As a SWAT officer, you’re not deploying for 12 months at a time and leaving your family behind. You’re still going to come home and sleep in your own bed most nights.
Now, don’t get that twisted: There will be bad nights. There will be moments that go horribly wrong. There will be missions that require you to be gone for extended periods of time. SWAT officers, like infantrymen, are over-worked and under-appreciated.
But doing the difficult thing to promote the greater good is exactly what you’re signing up for — again.
Military Working Dogs, or MWDs, play a huge role in the defense of the United States — and when one of them is injured, the Veterinary Medical Center Europe plays a huge role in getting them back in the fight.
Recently, while on patrol with his handler in Afghanistan, MWD Alex, assigned to the 8th MWD Detachment, 91st Military Police Battalion, Fort Drum, New York, was injured in an attack by a suicide bomber. Following care in Bagram, Afghanistan, Alex was medically evacuated to VMCE for further treatment.
Like many of their human counterparts, when an MWD is injured while deployed, they are often medically evacuated to Germany. Service members are transported to Landstuhl Regional Medical Center for care, and MWDs are transported to VMCE for comprehensive veterinary care.
According to Maj. Renee Krebs, VMCE deputy director and veterinary surgeon, when Alex arrived in Germany, he had a fractured left tibia, shrapnel wounds, and multiple other fractures below and above his shin bone.
On the day he arrived, Krebs performed surgery to stabilize Alex’s leg, “which worked pretty well,” she said. “But his other wound, particularly the one over his ankle, started to get worse and worse every day despite appropriate medical therapy and pain management.”
Maj Renee Krebs, Veterinary Medical Center Europe Deputy Director and Veterinary Surgeon, greets Alex, Military Working Dog from the 91st Military Police Battalion, 16th Military Police Brigade, prior to surgery.
(U.S. Army photo by Ashley Patoka )
Alex’s wound over his ankle was getting so bad that it would likely require up to six months of reconstructive and orthopedic surgery. And because of bone and tissue loss, he was also at a very high risk for infection.
In addition to this, Krebs said that Alex was “not using the limb as well as he had been the first week or so after surgery — it was getting more painful. And he began to develop some behavioral problems, centered on some of the things we had to do when we were treating him.”
Krebs said some of the behavioral problems included aggression and snapping when the team would move him to the table to do treatments.
“I spoke to a behaviorist about it and she thought he was having some post-traumatic stress disorder-type acute episodes,” Krebs said. “So we changed the way we were managing him, but he was still getting worse, so in the interest of allowing him to move on with his life and improve his quality of life, we went with amputation.”
Krebs said that had they not performed the amputation, it was likely that Alex would have still ended up losing his leg if they had gone with the option of three to six months’ of wound management.
“The risk was very high. It was a very guarded prognosis to begin with that he would ever have normal return of function to the leg, and I knew if I amputated his leg he would be functional as a pet or regular dog probably within a week — so it seemed like the best option for him.”
Alex was described as relatively calm by Krebs, and during his time at the VMCE, the staff learned more about him, enabling them to cater to his needs and ensure he was comfortable.
“MWDs run the gamut from very high strung, very nervous and needing to be restrained because they have so much energy and are so anxious, to being very mellow,” Krebs said. “Alex was sort of a strange combination — he was relatively calm, but there were things that you knew if you did them he was going to get angry, like touching his tail.”
At Alex’s home unit, Sgt. First Class David Harrison, kennel master for the 8th MWD detachment at Fort Drum, said Alex always felt like an old soul to him.
“[Alex has] the experience of a career soldier, and always carried himself in a way which always made trainers and handlers just believe he was focused on the mission at hand,” Harrison said. “He carries the ability to simply be a fun-loving dog who values his rapport with his handler as much as he enjoys executing his duties.”
Military Working Dog Alex is recovering well following leg amputation surgery, after suffering extensive wounds in a suicide bomber attack in Afghanistan.
(U.S. Army photo by Ashley Patoka )
Even while recovering from his injury and going through surgery, Alex was teaching those around him some important lessons.
“It’s tragic what happened,” said Spc. Landon DeFonde, MWD handler with the 8th MWD detachment at Fort Drum, who has been with Alex for his recovery in Germany. “But it just goes to show how selfless and resilient these animals are. For him to go through that blast and still be as strong as he is and kind and gentle towards people, it really amazes me that what they are capable of living through and surviving through. It definitely teaches me resiliency.”
But these lessons don’t just come when an injury happens, as the relationship between MWD and handler is one that both benefit from over the course of their pairing.
“The relationship between handlers and their partners is a relationship I’ve always found difficult to put into words,” Harrison said. “It’s a familial bond, but it almost goes deeper in some ways. The co-dependent nature of the business puts handlers in a position where they have to give more trust to their canine than most put in fellow humans. It’s not always a comfortable or easy process, but once they reach the point where they independently trust each other while working in tandem, the connection the team develops is unparalleled.”
DeFonde, who has been a MWD handler for three years, shares similar sentiments.
“It is truly incredible how selfless one can be and I think it shows the true side and caring side of humans — how much compassion and care we can show another living being — it is really special,” said DeFonde. “It is really amazing how we interact and how we can combine to create such a strong and powerful team.”
Alex will head back to the states at the end of August 2018 where he will continue his recovery. Due to his injury, his home station kennel will submit a medical disposition packet to allow Alex to retire and be adopted.
“I’ve built a bond with Alex—- not as deep as his handler’s,” DeFonde said. “But it is always hard to say goodbye. Dogs do come and go — that is part of the job, but I am just really happy I was able to come over here and help him recover and then get him back to the states and get him to see his handler.
“I’ve always heard the saying, humans don’t deserve dogs because of how kind they are, and I 100 percent agree. You could not ask for a more selfless companion.”
Prosecutors have accused a man of sending threatening and harassing messages on Instagram to relatives and friends of people killed in the Marjory Stoneman Douglas High School shooting in Parkland, Florida.
Brandon Fleury, a resident of Santa Ana, California, said he sent the threatening messages for nearly three weeks using numerous Instagram accounts, according to a criminal complaint filed in the US District Court of Southern Florida and seen by INSIDER.
“One post threatened to kidnap the message recipients, while others sought to harass the recipients by repeatedly taunting the relatives and friends of the [high school] victims, cheering the deaths of their loved ones and, among other things, asking them to cry,” the affidavit said.
Following the search warrant on his home, Fleury said he created multiple Instagram profiles referencing Nikolas Cruz, who is accused of killing 17 people in the Parkland shooting.
Nikolas Cruz being arrested by police in Florida, Feb. 14, 2018.
At least five accounts with usernames such as “nikolas.killed.your.sister,” “the.douglas.shooter,” and “nikolasthemurderer,” were traced to an IP address linked to Fleury’s home during the course of a law-enforcement investigation.
Some of the messages contained emojis with applauding hands, a smiling face, and a handgun:
“I killed your loved ones hahaha”
“With the power of my AR-15, I erased their existence”
“I gave them no mercy”
“They had their whole lives ahead of them and I f—–g stole it from them”
“Did you like my Valentines gift? I killed your friends.”
“Little [AS] will never play music again,” one message said on New Year’s Eve, in an apparent reference to the death of 14-year-old student Alex Schachter, who performed in the school’s marching band and orchestra.
Fleury said in a statement that he posted the messages “in an attempt to taunt or ‘troll’ the victims and gain popularity,” according to the FBI. Fleury also said he had a “fascination” with Cruz and other mass shooters, and specifically targeted the victims’ family, who he said were “activists” with large followings on social media.
Multiple news outlets cited authorities who said Fleury did not show remorse for his actions.
Law-enforcement officials investigated similar threats made on Instagram in 2018. Two days after the Parkland shooting, a 15-year-old Florida teen was arrested on charges of threatening to kill people in the same school district. The teen at the time “appeared to be remorseful and claimed his post was a joke,” according to the Broward Country Sheriff’s Office.
This article originally appeared on INSIDER. Follow @thisisinsider on Twitter.