I’m not surprised; I’m actually just interested in the fact that the standing power throw is proving to be quite difficult for some soldiers. It makes sense, really. Service members haven’t ever been asked to be explosive before.
The U.S. military used to want members that rivaled its speed and ability to move and make change…But a new day has dawned, and with it, a new type of hero is being called on. The kind of hero that doesn’t slip a disc every time they get up too fast from their office chair.
Explosive power is important, especially for combat-ready troops. Let’s see how the standing power throw is doing at measuring power and how you should actually train for it.
ACFT Prep: Power Cleans for the Standing Power Throw
What is the standing power throw and why is it useful?
The SPT measures how much explosive power you have.
The new ACFT is designed to test 6 different aspects of fitness:
Power- Power Throw
Anaerobic conditioning- Sprint Drag Carry
Upper Body Muscular Endurance- Hand Release Push-ups
Core Control- Leg Tucks (For my caveat on the effectiveness of this choice, check this out.)
Aerobic conditioning- 2-mile run
Power is a legitimate fitness variable that should be tested, especially considering that there’s a ton of actions that Soldiers perform that take quick, explosive bursts of strength… like shoulder throwing an E-2 to the ground for bad mouthin’ the ACFT.
I’ll even double down on power training being important since the majority of back, hip, and neck injuries I saw while on active duty almost always included a crusty 35+ service member doing some dumb quick twisting jerking maneuver. You know who you are.
Add a full combat load to the ACFT then you’ll get a real eyeopening experience.
(U.S. Army photo by Spc. Matthew J. Marcellus)
How to train for the standing power throw
Train for power.
Training for power roughly translates to: incrementally loading an explosive movement in order to translate strength gains into power.
The key above is the incremental loading part. You can’t develop more power by using submaximal loads. ESPECIALLY when you only have two attempts at the standing power throw. Power Jumps and Tuck Jumps can only be effective at making you more powerful if you are some way able to increase your first two jumps. After that point, especially for purposes of the test, you’re training your muscular power endurance (if that’s even a thing…I think that’s just cardio).
The same is true of a long HIIT workout. A HIIT workout by definition requires you to be putting out at greater than 90% of your Heart Rate Max. If you’re no longer putting out at that level of intensity, you’re essentially just doing Medium Intensity Steady State (MISS) with weights. A REAL HIIT workout lasts 20 minutes, maybe 30 minutes if you’re an elite athlete.
In order to throw further, you need to do three things.
Translate that strength to power
Perfect your form
Lucky for you, I have an exercise that will help you with two of these, and in conjunction with training for the deadlift, you’ll have all three covered.
The power clean is the superior clean variation for the purposes of the ACFT. I’ll even make the argument that it beats out the snatch because there is a minimum drop of the hips in the power clean. All the Olympic lifts and their clean variations involve ‘getting under’ the weight so that you don’t have to pull the weight off the ground as high.
The power clean, on the other hand, has you only dropping the hips to roughly the quarter squat position. It has the longest pull, from the floor to the collarbone, of the lifts. That’s why it’s named the power clean. It requires the most amount of power to get the weight up.
For all his faults, I think Mark Rippetoe correctly categorized the power clean in his book Starting Strength when he said this of the power clean:
“The power clean by training the athlete’s ability to move heavy weight quickly, is the glue that cements the strength training program to sports performance”
Beyond Triple Extension : The Underlying Benefits of “Olympic” Weightlifting
The form of the standing power throw has a very striking similarity to the pull used in the power clean. They both make use of ‘triple extension,’ which, if performed efficiently, will allow you to transfer the most amount of your power through the ball and barbell to allow you to exhibit the most power possible.
Triple extension is when the ankles, knees, and hips are completely extended. It’s a complete transfer of all your power into the implement in hand.
It’s a skill. It’s not something that you’ll be able to do perfectly the first time, especially if you have a significant amount of weight on the barbell or if your nerves are really tweakin’ during the test.
The power clean trains nearly the entire movement for the standing power throw. The only part it misses is extending your arms overhead and releasing the ball. Lucky for you, that’s the easy part, the arms will follow the chain of kinetic energy traveling upward that started at your feet.
You still need to train actually throwing the ball, though.
One statement from North Korea’s state-run media likened ongoing military exercises involving US and South Korean forces to a rehearsal for an invasion, returning to a talking point from 2017, when Trump and Kim were trading nuclear threats.
In a later statement, a North Korean official expressed “violent anger” at the US’s behavior and said Pyongyang would have to “reconsider” the meeting with Trump.
The official offered Trump an ultimatum: Cede to North Korea’s demands, or lose the summit.
When Kim started discussing the prospect in early 2018, Trump and his top officials cheered the move as proof that its unique approach to North Korea had worked.
But in statements on May 15, 2018, North Korea said Trump had employed the same tired ideas that had failed in the past, asserting that its “treasured” nuclear program had brought it international power.
Now, after Trump has repeatedly hyped his progress with Pyongyang, it is Kim, the leader of a rogue state, dangling the prospect of a summit to gain concessions from the US.
What North Korea demands and how Trump might cave to it
North Korea’s recent statements push back on longstanding US-South Korea military exercises and call for Trump to back off of his demand for “complete, verifiable, and irreversible denuclearization.”
Already, it looks as if the US may cave to save the summit. South Korea’s Yonhap News reports that the B-52, a US nuclear bomber, could be pulled from air combat drills in a nod to North Korea’s new demands.
But before that, Trump’s top officials had minced words about the aim of talks with North Korea and the possible definitions of “denuclearization.”
Secretary of State Mike Pompeo, who has been to North Korea twice in the past month or so, has in a series of recent interviews described slightly different aims of the talks.
While Pompeo often speaks in absolute terms, saying total denuclearization and removal of nuclear facilities must come before Washington eases off Pyongyang, he told CBS’s “Face the Nation” on May 13, 2018, that talks with North Korea would seek to ensure that “America is no longer held at risk by your nuclear weapons arsenal” and ending Kim’s chemical and biological weapons program and missiles “that threaten the world.”
Adam Mount, the director of the Defense Posture Project at the Federation of American Scientists, tweeted that, in other words, Pompeo said the US would accept “a standard that could permit retention of nuclear warheads, facilities, material, and possibly short range missiles.”
Lewis added: “I think Kim wants that photo with the President of the United States, paying tribute to him, for the front page of the Rodong Sinmun,” North Korea’s state newspaper.
Similarly, the historic diplomatic meeting may play well for Trump, motivating him to meet Kim’s conditions for talks.
North Korea’s recent hardline statements contradict what a South Korean official told reporters in March 2018 — that Kim had said he “understands the South’s stance” on the military exercises, which were happening at the time.
Basically, Kim seemed fine with the exercises when he was trying to get meetings with the US and South Korea, but now that he’s secured those talks, he has started to object.
“North Korea is back to its old game of trying to raise the stakes prior to a meeting,” said Bruce Klingner, the former chief of the CIA’s Korea division. “But Kim risks undermining the good will he had built up through his diplomatic outreach since January 2018.”
Now the question for the Trump administration is whether to call Kim’s apparent bluff or quietly meet his demands.
But by backing off from complete denuclearization, Trump could end up with a bad deal — and if he calls Kim’s bluff, the two leaders could land right back on the nuclear brink.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
In this age of smartphones and social media, we often get unprecedented access to events that we normally would have just read about in a paper long ago. Many of us have seen videos of combat in Iraq, Afghanistan, Syria, Yemen and countless other places. We see the perspective of our enemies as they strap on Go-Pros and launch attacks. We see camera footage of Special Forces carrying out operations. We see airstrikes from drones and watch enemy bodies get turned to hamburger meat by attack helicopters.
For older conflicts, however, we usually see sanitized footage released by the government or newsreels that were edited with sound effects added. But have you ever wondered what it sounded like to storm the beaches of Iwo Jima?
Well, now you can hear it for yourself. Audio from the actual Iwo Jima landings can be heard here.
In it, we hear two Marine Corps Correspondents give a ‘play by play’ as the Marines head toward the beach. The first person identified as one Sgt. Mawson of the 4th Marine Division goes first.
As gunfire sounds around him, Mawson is on board a landing craft en route to the beach. He sees Marines being tossed into the air from mortar and artillery fire and states the beach ‘seems to be aflame.’ As the landing craft clears the warships, he heads straight to the beach. As he gets closer, he can see a tank already aflame. When they are only a couple of hundred yards out, he can see Marines moving up and down the beach through wrecked vehicles. He makes reference to the abandoned Japanese navy ships that were left to corrode on the beach, a sign of the decimation the Japanese Imperial Navy experienced in early battles like Midway.
The second Marine is not known by name. However, his words are even more grave than the first correspondent as his audio conveys his arrival on the black sands of Iwo Jima.
He starts at the line of departure and about 2000 yards from shore. He states that the beach ‘looks to be practically on fire.’ In the fog of war, he reports that casualties in the first wave are light. We know now that the Japanese allowed the Marines on the island and opened up once most of the first waves were settled on the beach. It seems like this correspondent can see the Japanese attack, but the severity is not known to him yet. He tells us he sees dive bombers strafing enemy positions.
Then, upon fully seeing the absolute carnage on the beach, he has a very human moment. He talks about his wife and daughter back home. He wonders aloud if they are alright and then wishes that he would be able to go back home to them.
Many of us who have been overseas have had this moment when you have a firm vision of your own mortality and immediately think of your loved ones back home. Through his professional demeanor, it’s a human and heartbreaking moment.
As the craft gets closer, he observed machine gun fire coming down from Mt. Suribachi aimed at his craft, although for the moment, they are out of range.
The landing craft grounds on the beach, and the ramp goes down, and a machine gun goes off. You hear in the background, ‘what the hell was that?’ and wonder if some poor soul had a negligent discharge (although I am sure a few minutes later, no one cared).
As he wades ashore, he mentions that the water is so high that his pistol gets wet as he trudges ashore. He starts giving a matter of fact description of the beach and its make-up before coming back to what he is doing. The gunfire gets louder.
He yells ‘spread out!’ as he and his stick get closer to the beach. You can hear incoming fire around him as he very calmly explains his situation. He states so far that no one around him has been hit, and you can hear a dive bomber flying overhead.
But unfortunately, as we know now, Iwo was not to be an easy operation.
He sees his first casualty, a Marine who is being evacuated. He then sees other Marines being hit by enemy fire, and his voice starts to dampen from the gravity of the situation. About 100 feet from the beach, we hear him as he sees more casualties. He sees a Marine lying on his back with ‘his blood pouring into the water.’ He is very calm as there are fire and death all around him.
Upon coming ashore, he is surprised to see that the Marines are still on the beach. He sees that the first waves are bogged down from the fire and sand. This was exactly the plan of the Japanese commander, and from the sound of the recording, it was initially very successful at bogging down the Marines and inflicting heavy losses.
The next thing he says tells of a courage that all Marines know of and admire. He talks of corpsman walking up and down the beach, seemingly unaffected by the incoming fire, checking up and down to make sure everyone who needs it, is being treated. Gotta love those Docs!
The recording ends with the correspondent headed toward the first wave as more Marines come in the waves behind him.
As we know now, what was supposed to be an easy landing and week-long battle turned into one of the bloodiest battles in World War II. Over 6,000 Marines died bravely to take Iwo Jima.
If anything, these recordings document a small part of their heroic journeys and horrible ordeals.
Even the band’s name is a reference to medieval knight’s armor – the Swedish metal band Sabaton makes music about war, history’s greatest battles, and daring feats of combat badassery. Their latest album, The Great War, features songs about just World War I. If you’ve never had an interest in military history, Sabaton might make the difference for you.
Also, their music videos are pretty great.
Their songs are poetic and thoughtful, about real historical events. From the Serbians fighting in World War I, to Poland’s legendary Winged Hussars, and even the Russians at Stalingrad – the heroes aren’t Swedish, they’re anyone who did something amazing for their comrades on the battlefield. Other songs are about the Night Witches (Russian female aviators who terrorized the Nazis), the Brazilian Expeditionary Force in World War II, and Audie Murphy’s postwar struggle with PTSD.
I know the video below looks like a broken link, but it’s really a music video for a Sabaton’s heavy metal song about the 101st Airborne at Bastogne, called “Screaming Eagles.” The music video begins with Gen. Anthony MacAuliffe’s now-famous reply to the German surrender demand – “Nuts.”
The band’s entire fourth album was inspired by Sun Tzu’s Art of War, another album is about World War II and the Finnish-Russian Winter War. They have released singles about the World War II-era battleship Bismarck and World War I’s Lost Battalion; nine companies of the United States 77th Infantry Division who lost more than half its manpower at the Argonne Forest in 1918.
Sabaton has won almost every metal award for which they were nominated, including Best Breakthrough Band, Best Live Band, and they were nominated for the 2012 “Metal as F*ck” Award for their album Carolus Rex, which actually was about the rise of the Swedish Empire under King Charles XII.
The song below is about 189 Swiss Guards who defended the Vatican during the Sack of Rome in 1527.
Bowe Bergdahl was Pfc. Bergdahl when he walked off his post in Paktika Province, Afghanistan, and was captured by the Taliban. Five years later, however, when the White House exchanged five Taliban detainees for his release, he was Sgt. Bergdahl.
According to the Department of Defense, prisoners of war and those under missing status continue to be considered for promotion along with their contemporaries. They must be considered for promotion to the next highest grade when they become eligible.
For enlisted, it is based on time in grade and time in service. The eligibility for officers is based on the date of rank in their current grade.
A notable story is of then-Cmdr. James Stockdale. When he was captured and sent to the Hanoi Hilton, he was the most senior POW and so was the ranking officer among the prisoners there. When Lt. Col. ‘Robbie’ Risner was also captured, he outranked Stockdale by time in grade.
Later, a newly captured naval pilot informed Stockdale of his promotion to captain, he assumed command again.
This continues for prisoners of war but stops for those on missing status when they are presumed dead under Title 37 of the U.S. Code, section 555.
This happened with 1st Lt. John Leslie Ryder. His aircraft, nicknamed “Bird Dog,” went missing during a visual reconnaissance flight during the Vietnam War on June 9, 1970.
During the flight, the crew failed to report in by radio and calls were not answered. The search could not be mounted until the next day. The search continued until the 19th to no avail. A year to the day later, Lt. Ryder was promoted to captain.
Payment is also changed from regular enlistments. Instead of being involved in DFAS, the payment is authorized by Congress and made directly through the Secretary of the Treasury, tax-free. Any earnings, leave and money, are still given to the individual at their appropriate rank and are held until return.
There is also no limit on leave accrual, meaning it is well deserved for the returning service member to take all of the leave at two and-a-half days per month.
American and Afghan forces were briefing each other at a forward operating base on March 11, 2013, about that day’s mission when machine gun rounds suddenly rained down on them.
The group immediately looked to see where the shots were coming from. The lone airman in the group, then-Tech. Sgt. Delorean Sheridan, identified the source of the shots, which turned out to be coming from a truck in the base’s motor pool.
“Initially, everyone starts to look to see what’s going on,” Sheridan, a combat controller, later told Stars and Stripes. “We’re accustomed to shooting, so our first instinct is, ‘OK, what is the person shooting at?’ I turned and looked back and I saw this guy shooting at me, and the light bulbs hit: It’s some guy trying to kill us.”
The shooter was a new member of the Afghan National Police who had slipped unnoticed to the bed of the truck and taken control of its machine gun.
It was a so-called “green-on-blue attack” — when supposed allies attack friendly forces. Meanwhile, insurgents from outside the base joined what was clearly a coordinated attack, sending more rounds into the grouped-up men. Bullet fragments even struck Sheridan’s body armor.
Sheridan decided that Afghan National Police officer or not, anyone who fired on him from within hand grenade range was conducting a near ambush and it was time to respond with force. He sprinted 25 feet to the truck and fired at his attacker up close and personal.
Once the on-base shooter was down, Sheridan ran back into the kill zone where the machine gun and AK fire from outside the base was still coming in. He grabbed the wounded and carried them to cover and medical aid.
As medics worked to save the wounded, Sheridan called in MEDEVAC flights for the 25 men hit in the fight — an airlift that required six helicopter flights. Twenty-three of them would survive the battle.
While the MEDEVACs were coming in and out, Sheridan assisted with carrying litters and called in strikes on the insurgent forces still attacking the base. The close air support broke up the enemy’s attacks and killed four of the militants.
When you look at South Korea, this is a country that has a need to be very ready to fight for its survival. This is particularly true for the pilots in the Republic of Korea Air Force. If South Korea were to lose a war with North Korea, the ones who survive the war and who are captured will be unluckier than those who are killed in action.
Hyperbole? Well, just look at the “re-education camps” that the North Vietnamese used after they conquered South Vietnam. The stakes are at least that high for South Korean military officers should South Korea fall to the North.
South Korean P-51 Mustangs. (AIR AND SPACE MUSEUM)
As you can imagine, these pilots train a lot. South Korea has often taken part in Red Flag Alaska, where American and allied pilots train for war. But the Republic of Korea’s Air Force is also very powerful in its own right – flying high-tech fighter jets that are made in South Korea. That is a far cry from when it was flying second-hand P-51 Mustangs during the Korean War.
According to FlightGlobal.com, South Korea has 169 F-16C/D Fighting Falcons, 59 F-15K Slam Eagles (comparable to the F-15E Strike Eagle), 71 F-4Es, 158 F-5Es, 20 FA-50s, 80 T-50s, and 36 F-5Fs in service. This is one of the most modern air forces in the world. By comparison, North Korea has 35 MiG-29s, 56 MiG-25s, and still relies on nearly 200 J-5 and J-6s, which are Chinese copies of the MiG-17 Fresco and MiG-19 Farmer, respectively.
The combination of good planes and well-trained pilots is a very difficult one to defeat. South Korea stands a very good chance of being able to take control of the air should hostilities break out with North Korea.
China reportedly wants to extend its surveillance state to the South China Sea by launching satellites to watch “every reef and ship” in the contested sea.
Beginning in 2019, China will begin launching satellites to monitor the region, as well as enforce “national sovereignty,” the South China Morning Post reported Aug. 16, 2018, citing China’s state-run China News Service. Six optical satellites, two hyerspectral satellites and two radar satellites will form the Hainan satellite constellation system, creating a real-time “CCTV network in space” controlled by operators in Hainan.
“Each reef and island as well as each vessel in the South China Sea will be under the watch of the ‘space eyes,'” Yang Tianliang, director of the Chinese Academy of Sciences Sanya Institute of Remote Sensing, told SCMP. “The system will [reinforce] national sovereignty, protection of fisheries, and marine search and rescue.”
The ten new surveillance satellites will allow China to keep a close watch on disputed territories, as well as the foreign ships entering the area. The project is expected to be completed by 2021, with three optical satellites going up in the second half of 2019.
The northeastern portion of the South China Sea.
The satellites, according to Asia Times, would be able to scan the entire 3.5-million-square-kilometer waterway and create an up-to-date satellite image database within a matter of days. Beijing has apparently promised transparency, stressing that it will share information with other countries.
Beijing’s efforts to alleviate the concerns of other claimant states are unlikely to result in a sign of relief, as China has been significantly increasing its military presence in the region this year by deploying point-defense systems, jamming technology, anti-ship cruise missiles, and surface-to-air missiles to Chinese occupied territories. China’s militarization of the South China Sea resulted in the country’s expulsion from the latest iteration of the Rim of the Pacific (RIMPAC) naval exercises by the Pentagon.
In recent weeks, China has come under fire for issuing threats and warnings to foreign ships and planes operating in the South China Sea, an area largely upheld as international waters in a 2016 rebuke to China. “Philippine military aircraft, I’m warning you again: Leave immediately or you will bear responsibility for all the consequences,” a Chinese voice shouted over the radio recently when a Philippine aircraft flew past the Spratlys. China issued a similar warning to a US Navy plane on Aug. 10, 2018.
The incidents came just a few months after Secretary of Defense Jim Mattis accused China of “intimidation and coercion” at a security forum in Singapore.
“China has a right to take necessary steps to respond to foreign aircraft and ships that deliberately get close to or make incursions into the air and waters near China’s relevant islands and provocative actions that threaten the security of Chinese personnel stationed there,” the Chinese Ministry of Foreign Affairs said in a statement to Reuters on the matter.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
You could be turning your passion into profit by teaching like-minded Thrones fans the language of Essos.
That’s according to leading local services marketplace Bark.com who say that tutors can earn upwards of £40 ($53) per hour teaching High Valyrian, the language spoken by Daenerys Targaryen and Lord Varys.
The tuition service is available for fans across the US and UK, who can either sign up to be a tutor here or to hire tutors here.
Bark.com says those who sign up to be High Valyrian tutor will be required to provide proof of their knowledge of the language.
The role will involve creating a variety of reading, writing and speaking exercises for students, alongside role-playing scenarios to enhance the learning experience.
Daenerys Targaryen is a High Valyrian speaker.
Kai Feller, co-founder of Bark.com, said: “Game of Thrones is more than another hit show — it’s become a worldwide sensation! And with the highly anticipated final season fast approaching, the show is more popular than it has ever been. That’s why we’ve launched our latest service — High Valyrian tuition.
“At Bark.com, we love giving people different ways to earn and this is the latest service we’ve launched to do that. High Valyrian is a complex language and this is a fantastic opportunity for anyone who has worked hard to become fluent to share their knowledge — not to mention it would be a fantastic string to any fan’s bow!”
Though the High Valyrian dialect appears occasionally in George R.R. Martin’s “A Song of Ice and Fire” series of fantasy novels, the author did not develop it beyond a few words and phrases. The actual language, which now comprises of around 2,000 words, was created for the HBO TV adaption by linguist David J. Peterson, who also fleshed out the language of the Dothraki.
Tyrion Speaking Valyrian and Banter with Jorah, Grey Worm
The Economist called Peterson’s take on Dothraki and Valyrian “the most convincing fictional tongues since Elvish,” which was created by J.R.R. Tolkien himself for Middle Earth.
New learners of the language will have to deal with verb conjugation and possessives but, fortunately, not a different writing system, which Peterson said might look something like “Egyptian’s system of hieroglyphs — not in style, necessarily, but in their functionality.”
Those wishing to get a head start on the competition can start learning High Valyrian in bite-sized lessons on Duolingo, taking courses which Peterson himself contributed to.
Those taking on the challenge of learning the fictional language will have to try harder than Tyrion Lannister, whose Valyrian was “a bit nostril” by his own admission.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
As part of this effort, the Army recently asked the defense industry to develop “novel muzzle brake structures for extended range cannon artillery systems” that are 30 percent lighter than conventional muzzle brakes, according to a solicitation posted on www.sibr.gov, a government website for the Small Business Innovation Research (SBIR) program.
The M109A6 Paladin.
(US Army photo)
“Given the Army’s Long Range Precision Fires priority, a need exists for novel and innovative muzzle brakes capable of supporting the new extended range cannons and sabot, direct, and indirect munitions currently under development,” the solicitation states.
“High pressure waves produced within gun barrels during projectile acceleration have negative impact upon the surrounding environment due to muzzle blast … exiting the barrel,” it adds.
Muzzle brakes are also subjected to “material degradation due to collisions with small particles exiting the gun barrel, such as solid propellant grains that did not undergo combustion,” the solicitation states.
Because of this, current muzzle brakes tend to be heavy.
The effort “seeks to develop novel muzzle brake aerodynamic designs and structures which minimize the overall mass of the artillery system without compromising performance,” according to the solicitation.
Interested companies have until Feb. 6, 2019, to respond to the Nov. 28, 2018 solicitation.
The first phase of the solicitation asks companies to model and simulate the operational performance of proposed muzzle brake designs that meet the weight-reduction requirements and simulate mechanical wear over the life cycle of the brake.
The M109A6 Paladin.
(US Army photo)
Companies will then produce at least one prototype for Phase Two, which will be tested on a large-caliber Army platform identified during the Phase One effort, according to the solicitation. Companies will document “recoil, acoustic and optical signature, and muzzle blast” and make refinements on the prototype design, it says.
Companies then will conduct a live-fire demonstration of their final prototype in an operational environment with involvement from the prime contractor for the weapon system, according to the solicitation.
Meanwhile, under the Extended Range Cannon Artillery program, or ERCA, the Army plans to fit M109A8 155 mm Paladin self-propelled howitzers with much longer, .58 caliber gun tubes, redesigned chambers and breeches that will be able to withstand the gun pressures to get out to 70 kilometers, Army officials said.
The service also is finalizing a new version of a rocket-assisted projectile (RAP) round that testers have shot out to 62 kilometers. Artillery experts plan to make improvements to the round by fiscal 2020 so Army testers can hit the 70-kilometer mark, service officials said at the 2018 Association of the United States Army annual meeting and exposition.
This article originally appeared on Military.com. Follow @militarydotcom on Twitter.
In October 2018, Airman Magazine sat down for a conversation with Maj. Gen. Robert J. Skinner, Twenty-fourth Air Force commander; Air Forces Cyber commander and Joint Force Headquarters-Cyber commander, Joint Base San Antonio-Lackland, Texas. He is responsible for providing Air Force component and combatant commanders with trained and ready cyber forces to plan, direct and execute global cyberspace operations.
Airman Magazine: In July, the Twenty-fourth AF moved from Air Force Space Command to Air Combat Command. At the same time you moved from AFSPC to ACC. What are the reasons for that restructuring?
Maj. Gen. Skinner: This allows Gen. Raymond, as the Air Force Space Command commander, to truly focus on space operations. The other thing is this brings cyber within Air Combat Command, which has intelligence, surveillance and reconnaissance; command and control and the air domain. Bringing all these forces together under one four-star MAJCOM (major command) commander, Gen. Holmes, allows him some more flexibility to be able to present forces across the spectrum of operations.
The networks for those operations need to be resilient and they need to be protected. When you bring together the ISR, cyber, information operations, electronic warfare and command and control, that’s a lot under one hat. But it allows us greater integration as we move forward. At the end of the day, this is about multi-domain operations and the more we can bring those together, the more successful we’ll be.
Airman Magazine: How are your responsibilities divided between your three commands? It seems that just the information technology portion alone would be a huge demand on your resources.
Maj. Gen. Skinner: Cyber operations have four or five different lines of effort. One is to actually build the networks, build the applications and build the systems.
Another is to operate and maintain the networks, but also secure and protect them from vulnerability to adversaries. We also defend networks for our maneuver forces and then we have full spectrum operations, which is on the offensive side.
We also have combat communications airmen and engineering installation airmen who extend the network out to a multitude of places, whether that’s tactical basing or at the forward battle edge.
With that said, information technology is still a key part of the cyberspace domain and we are moving forward in the Enterprise IT as a service. We are going to utilize things industry does very well as a commodity type of action activity.
We are going to leverage what industry does great, providing some services and network infrastructure, and re-mission our airmen to do core Air Force missions on the defensive and offensive side, while providing assurance for the many missions the Air Force presents to the combatant commanders on the joint side.
The bottom line is we’re in the cyber operations business — information technology, networks, both operating and defending — and we provide full spectrum operations in this thing we call the cyberspace domain.
Tech. Sgt. Wyatt Bloom uses a spectrum analyzer to check television broadcast network routers at the Defense Media Activity, Fort Meade, Md., July 18, 2012. Bloom is a cyber-transport technician assigned to DMA.
Airman Magazine: Would you explain your duties as commander of the Air Force component at Cyber Command? How is that different from the hat you wear as commander of Twenty-fourth AF and Air Force Cyber?
Maj. Gen. Skinner: This could actually be a dissertation. To break it down a little bit, the Twenty-fourth AF is where we organize, train and equip our airmen. The perfect example is we have an organization down at Hurlburt Field — they train almost every cyber professional. Now we do a lot more than that, but that’s one example of the Twenty-fourth AF piece.
In the Air Force cyber piece, I am charged by the Air Force to present forces to Gen. Paul Nakasone, the U.S. Cyber Command commander, for his missions and functions as the combatant commander.
We provide offensive forces and defensive forces, DODIN (Department of Defense Information Networks) ops cyber professionals and ISR professionals to Gen. Nakasone, so he can perform his mission.
Then the third area is the Joint Force Headquarters side. That’s where Gen. Nakasone has asked us to align to three different combatant commanders to provide additional joint support for their missions.
We have planning elements that are aligned to these three combatant commanders, as well as some cyber teams supporting the commanders’ efforts in defense of the mission. Our teams are able to deploy and employ forces against a particular adversary at the time and place of the combatant command commanders’ choosing.
Our job within Twenty-fourth AF, AF Cyber JFHQC and Cyber Command, is to be ready at a moment’s notice to protect our systems and defend the networks and defend the core missions of our military and our joint war fighters. Then deter, disrupt and degrade an enemy’s ability to perform those functions against us. Part of that goes into making sure that we have persistent engagement, a persistent presence, and a persistent innovation as we continue to move forward.
Airman Magazine: Across the Air Force, joint force, partner agencies and nations, do cyber operations equate to kinetic operations or is that a completely different animal?
Maj. Gen. Skinner: I would say it is not a completely different animal. To be successful in cyber operations and have cyberspace superiority at the time and place of our choosing, we need a team of teams that is internal to the Air Force.
Every single airman in our Air Force needs to be a cyber sentinel. We need every airman to be very conscious of cyber security, cyber hygiene and things that are going on within the cyberspace domain.
We have branched out and are part of several joint organizations that perform functions and missions within the cyber domain. The National Security Agency is a huge partner with us as we perform these missions, as well as the Central Intelligence Agency, Defense Information Systems Agency and Department of Homeland Security — a lot of different agencies across the board.
We are also great partners with commercial industry and academia because we’re all in the same field and in the same cyber domain.
Within Twenty-fourth AF, we have a United Kingdom representative and an Australian liaison officer, but most of our allies and partners are really up at the Cyber Command level. We leverage those partners through U.S. Cyber Command, NATO and other organizations.
Capt. Taiwan Veney, cyber warfare operations officer, watches members of the 175th Cyberspace Operations Group, from left, Capt. Adelia McClain, Staff Sgt. Wendell Myler, Senior Airman Paul Pearson and Staff Sgt. Thacious Freeman, analyze log files and provide a cyber threat update utilizing a Kibana visualization on the large data wall in the Hunter’s Den at Warfield Air National Guard Base.
(Photo by J.M. Eddins Jr.)
Airman Magazine: What is it that makes your cyber airmen “cyber warriors”?
Maj. Gen. Skinner: Our airmen are absolutely warriors. We have teams in the fight operating constantly: 7 days a week, 365 days a year, Christmas and New Year’s.
If you’ve heard Gen. Nakasone speak recently you’ve heard him say we’re no longer solely responding to network intrusions, we have cyber forces persistently engaged against state and non-state adversaries, actively identifying and countering threats in the cyber domain.
This achieves several benefits at once: first and foremost, it gives us control over the cyber terrain that serves as the foundation for superiority in cyberspace. It also keeps our operators ready and their skills honed and imposes cost on the adversary so they can no longer operate freely without repercussion. There’s already a massive demand signal for our cyber operators that will only increase, so we have to ensure we’re fielding proficient, ready and lethal operators at scale.
Because of this, we are investing not only the readiness of our mission, but also in the readiness of our people. This means examining everything within our scope of control, including the effect the operational tempo of our 24/7/365 mission has on our operators.
Just like you see within the (remotely piloted aircraft) field, cyber can mean long periods away from the sunlight and abnormal sleep hours, and that can absolutely have an effect on people. Any leader will tell you—if you take care of the people, they will take care of the mission.
Airman Magazine: What part does the total force play in cyber operations and defense?
Maj. Gen. Skinner: I will tell you, we could not do our job on a day-to-day basis without the total force. The majority of the forces within Twenty-fourth AF are guard and reserve components.
Our engineering installation mission is 85 to 90 percent within the guard. More than 50 percent of our combat communications capability, which extends and expands our capabilities to the tactical edge, is in the guard. We have guard organizations up in Washington. We have some in Rhode Island. We have some here in Texas. I will tell you they provide great day-to-day work.
What’s even more important is the expertise that they bring from their civilian jobs. We have vice presidents of some corporations who are part of our total force as well. Bringing that expertise, leadership, things that the public is good at and things that industry is focused on benefits the military and vice versa. They take lessons learned from the military and take it to their company. So it’s a great yin-yang relationship.
Whether it’s an offensive operation or a defensive operation or even DODIN ops, there has to be a tight tie between all of those as we move forward because the defense learns from the offense and the offense learns from the defense. DODIN ops learn from defense to figure it out where we need to be resilient, where some of our mission critical assets are and how to defend them.
All the computer networks, email, applications and systems in the cyberspace domain are what we call the Department of Defense Information Networks. There are pay applications that we have in the Air Force that are part of DODIN. If you get paid electronically within the Air Force that’s part of the DoD information network.
Airman Magazine: Is it an advantage that those reserve and National Guard personnel tend to have long histories with one unit?
Maj. Gen. Skinner: I would say sometimes it’s an advantage and sometimes it’s not. In some places having continuity is good. I would say having too much continuity isn’t necessarily good in cyber because you want some fresh blood, some fresh ideas.
Airman Magazine: Would a technical track for active-duty cyber operators benefit the force?
Maj. Gen. Skinner: Similar to other domains and weapon systems, we have to be proficient to be effective. Since cyber is a technical domain we do need technical expertise.
However as our people gain that expertise and increase in rank and responsibility, we need them to be leaders and lead teams to success while still maintaining credibility in their profession. We, ACC and Headquarters Air Force are working closely together to determine what the right “path to greatness” will look like, in order to build a force that generates maximum lethality.
Cyber warfare operators assigned to the 275th Cyber Operations Squadron of the 175th Cyberspace Operations Group of the Maryland Air National Guard configure a threat intelligence feed for daily watch in the Hunter’s Den at Warfield Air National Guard Base.
(Photo by J.M. Eddins Jr.)
Airman Magazine: As cyber tools and methods seem to change constantly, ow can the acquisitions process be altered to make sure the Air Force has the best technologies and practices in the cyber domain?
Maj. Gen. Skinner: The Air Force and DoD leadership are laser-like focused on our ability to acquire things in a more agile, fast and relevant way. We have leveraging other authorities, like 804 authorities, to bring on the future faster and to bring innovation faster.
As an Air Force we are becoming more of a software force than a hardware force. The ability to bring the new wave of agile software development operations, DevOps, is going to be key in maintaining our superiority and operating within the enemy’s OODA loop (time it takes to observe, orient, decide, and act).
We’re bringing in individuals who understand the old waterfall model is not the right model because by the time that you set the requirements and start developing to those requirements, the environment, threats and priorities have changed.
If you’re spending weeks, months and years identifying and defining hundreds or thousands of requirements, you definitely can’t meet those requirements in a timely manner. So leverage industry, leverage developers who are innovative, define the left and right limits or requirements.
So you get a three to five-page requirements document, which is much better than a 100 to 200-page document. Let them innovate and come back with a solution and in a much more timely manner—days and weeks versus months and years. Then you iterate and you continue to iterate on that minimum viable product.
Then also leverage some of those techniques to buy the right hardware in a timely fashion and focus on the approval top rate process, to reduce the amount of time to approve either software or hardware for connecting to the network. I know that Dr. Roper, Air Force Acquisition and the chief and secretary are very focused on bringing the future faster.
Airman Magazine: The Air Force is considering launching a cyber rapid capabilities office. How would that benefit the Twenty-fourth AF and the cyber community as a whole?
Maj. Gen. Skinner: The traditional slow-and-steady acquisition model is great for buying a fleet of fifth-generation aircraft, but it isn’t ideal for cyberspace where the landscape is changing constantly and where the state-of-the-art is available to anyone interested in buying. We need to get faster.
The DNA of the Air Force RCO brings agility and flexibility, which drives down timelines and increases capability. Right now we can’t say what form a cyber RCO would take, but will benefit us by getting the right capabilities and weapons at the right time to our operators. We need to respond to malicious cyber activity with greater speed and tempo employing a calculated, “spectrum of risk” framework which is properly delegated at echelon to enable responsible and responsive cyberspace operations in support of assigned missions.
The concept of Fusion Warfare gathers all intelligence, surveillance and reconnaissance data across all Air Force platforms into the “combat cloud” through and autonomous process where it’s analyzed and combined to create a real time big picture for commanders.
(Photo by Airman 1st Class Kevin Sommer Giron)
Airman Magazine: What effect will advances in big data research have on cyber operations?
Maj. Gen. Skinner: Data is the game changer in our business. If I own the data battle space, then I will definitely be within the OODA loop of the adversary. Being able to leverage quantum computing, artificial intelligence and analysis of big data platforms is really the future of our mission.
There is so much data out there in today’s environment there is no way that you can get through all of it (manually). So you may miss a key data point that would help you make a decision. In a future conflict, being able to have the right data at the right time analyzed at the right tempo is key to success.
We’re putting a lot of effort into better understanding the data, not just from cyber standpoint, but also in logistics, in intelligence and even in personnel. The more we can analyze the data, the better that we can perform education and training, perform timely logistics, perform ISR operations. Every single Air Force core mission is reliant on data to be more effective, more efficient and more successful.
Airman Magazine: Can you talk about Hack the Air Force and its value to the force?
Maj. Gen. Skinner: The first Hack the Air Force iteration was in late 2017, after the successful Hack the Pentagon initiative by Defense Digital Services. When the first hackathon sprint kicked off it took less than a minute for a hacker to find a valid vulnerability. By the end, over 200 holes in our boundary had been patched—and that was just the first iteration.
Hack the Air Force gets after two important focus areas: first, it builds capacity for the Air Force by leveraging expertise from a multitude of places, and second, it leverages innovative thinking to find vulnerabilities we otherwise might not uncover.
Take, for example, the person who won the first hackathon sprint, a 17-year-old high school student from Chicago. Maybe his path won’t lead him to the Air Force, but we were still able to use his talents to make ourselves more resilient. To me that’s a win.
Quynh Tran, right, a Raytheon Corporation software engineer, talks with Capt. Nick Lundin, Product Management lead, about a software coding project May 30, 2018 at Kessel Run, a program within the Defense Innovation Unit Experimental, a United States Department of Defense organization, in Boston.
(Photo by J.M. Eddins Jr.)
Airman Magazine: What lessons can be learned from commercial companies about practices that enable those fresh ideas to come forward?
Maj. Gen. Skinner: There are a lot of great lessons learned from Silicon Valley and I would offer Silicon Valley has also learned from the Department of Defense.
As I’ve said many times over my 33-year career to date, if I came into the military today, compared with a talent level of the individuals that we have now, I would not be as successful as I have been.
The talent today is amazing and our job as senior leaders is how do we unleash that talent? How do we have the right policies and the right directives leveraging the right acquisition authorities and unleash this talent on the hard problems that our force and our nation face today.
The key is getting the right people in the room to determine how best to provide solutions, whether it’s software development, hardware acquisition or cyberspace operations. It’s getting the right people in the room and getting through the bureaucracy, pushing the bureaucracy to the side and being able to unleash the talent.
Airman Magazine: How can, especially when it comes to the cyber domain, the Air Force compete with civilian industry to attract more STEM (science, technology, engineering and math) talent?
Maj. Gen. Skinner: There was always a competition between academia, research labs, commercial industry and the military. We as a military cannot compete from a dollar standpoint.
But where we can compete is with the great things you can do within the DoD, that you probably can’t do within the commercial world. We have great missions coming from the research we’re doing.
Some of the operations we’re doing on a day-to-day basis, you can’t do that on the commercial side. We have opportunities for individuals at a variety of levels to perform things they couldn’t do outside of the military. That’s our calling card.
Airman Magazine: Peer and near-peer competitors have been going to school on us since World War II; how do we offset that advantage?
Maj. Gen. Skinner: I would say every threat is an opportunity. While we have been focused over the last 10 to 15 years on the violent extremist, the latest National Defense Strategy, National Security Strategy and National Cyber Strategy outline strategic competition, peer competitors, and has turned the focus there.
You’ll hear a lot about readiness. Readiness is very important to our chief, very important to our secretary and very important to the secretary of defense. We need to make sure that we have a lethal force. In order to do that, you need to have a ready force.
In order to be ready, you need to have a disciplined force. Especially when there is strategic competition out there and adversaries who on a day-to-day basis are performing actions and operations that are probably right below the level of conflict.
But, I would not want to go and do a mission against a threat with anyone else but the airmen we have in our service today. Our airmen, with our joint partners in the other services, still have the most critical, credible and lethal force in the world.
Airmen with the 68th Network Warfare Squadron monitor Air Force communications to analyze disclosures of critical information and perform data loss prevention at Joint Base San Antonio-Lackland, Texas, Oct. 25, 2018.
(Photo by J.M. Eddins Jr.)
Airman Magazine: You talked about having a disciplined force in order to be lethal. What constitutes discipline in the cyber world?
Maj. Gen. Skinner: Discipline is key. I’m not talking about discipline from a uniform code of military justice aspect. This is discipline in processes, discipline in procedures and discipline in command and control. We spent a lot of time going back and trying to figure out what happened on something because there was an undisciplined tactic, technique, procedure or process. We’re trying to leverage discipline to make our force more effective and more capable and build capacity.
Then we come to a readiness standpoint. Readiness, as you know, is made up of personnel, equipment, procedures and training. We are continually leveraging our innovative airmen to improve the training they receive, how we purchase equipment, how we educate our airmen.
Part of all this is proficiency. Proficiency against a violent extremist organization is much different than proficiency against strategic competitors. Our focus continues to be how to maintain and improve the readiness and proficiency against strategic competitors.
We are also leveraging our airmen and technology to be more efficient and more effective.
Leveraging artificial intelligence can decrease the amount of time that our airmen spend doing manual work so they can focus on the higher end discussions of cognitive actions and activities.
For example, manually looking through thousands of pages of data takes a very long time. We have airmen who are leveraging technology, whether it’s using keywords or bringing a couple of technologies together, that can take those thousands of documents and run through them in minutes versus hours, days or weeks.
Then taking what the technology has given you and put the human eye on it — are there any other needles in the haystack?
That’s what our airmen are doing on a day-to-day basis. Whether it’s from a data collection standpoint, whether it’s from a cyber operation standpoint, whether it’s looking through logs to see if we have an adversary presence on our networks. Looking through logs to make sure that our user experience is where it needs to be on a daily basis, but leveraging technology to reduce the amount of manual steps.
Airman Magazine: With a kinetic weapon, the effects are apparent and there is an inherent process to be able to determine origin, intent and purpose. The very nature of cyber is to hide the hand that dealt the cards. What kind of challenges does determining attribution pose for a commander?
Maj. Gen. Skinner: So attribution is a very significant challenge. There are not as well defined international norms in the cyberspace domain and therefore a multitude of nations and multitude of criminals and the multitude of other individuals are continuing to push the limits.
It is often very apparent in the other domains, from an effect or an outcome, who the actors are. In the cyber domain, you can have the same type of effects in as in other domains, but it is harder to determine the source, which is really important when you start talking about multi-domain operations.
Cyber is a critical enabler while also a critical operation because cyber can be both supporting and supported within multi-domain operations. As we continue to refine our operations, to refine our tactics, techniques and procedures, we will continue to get better at understanding attribution, understanding the outcomes, and making sure that we refine and define those outcomes and bound the outcomes to meet our mission objectives.
As cyber continues to get more profound and more pronounced in the day-to-day operations, attribution is going to become that much harder.
U.S. Air Force Maj. Gen. Robert Skinner, then Deputy Commander of Air Force Space Command, speaks at the 2018 Rocky Mountain Cyberspace Symposium in Colorado Springs, Colorado, March 6, 2018.
(Photo by Dave Grim)
Airman Magazine: How do you convince people that cyber and space have become foundational to everything that the Air Force, and our society as a whole, does on a daily basis?
Maj. Gen. Skinner: I’ll give you a perfect example, the Global Positioning System is operated by Air Force Space Command: not only for the nation, but the whole world. The U.S. Air Force supplies and supports the system and satellites that enable the GPS navigation we use in our cars and on our phones every day, millions of times around the world.
It also provides timing. Every financial transaction is supported by the GPS system. So when you purchase something and put your credit card into that reader, there’s a timing aspect that is being supported by GPS. So the Air Force is supporting billions of activities and actions all the time.
Airman Magazine: The chief of staff and secretary have made it a priority to push command level decisions down to the lowest level possible. How is that manifested in your command?
Maj. Gen. Skinner: Its not only because the chief and the secretary say they want it done. We have the greatest airmen in the world and we have the greatest commanders in the world—pushing authorities and responsibility down to the lowest level really enables them to unleash the talent around them and enables us to unleash their talent.
You don’t need higher headquarters micromanaging and directing things on a daily basis. Our commanders are boarded. We have a tradition of great commanders in our Air Force and we need to let them run. We need to let them determine how best to run their organizations and how best to be effective. The more that we can push decision authority down, the more bureaucracy we can eliminate and the more agile, lethal and effective we can be as an Air Force.
From a higher headquarters level and higher commander level, our responsibility is to give the left and right limits to those organizations and then let them run.
If we are in a conflict, especially against a peer competitor, the amount of time it would take to micromanage our tactical-level units would not allow us to be inside the OODA loop of our adversary.
We need to allow our commanders, in peacetime, to train like they are going to fight. To have that authority to perform the mission as they see fit. With more guidance, directives and limitations to that commander, there’s going to be some negative learning, first and foremost, but secondly, the safety of our airmen will be put in jeopardy.
Participants in the joint, multinational exercise Cyber Guard 2016 work through a training scenario during the nine-day event in Suffolk, Va., on June 16, 2016.
(Photo by Petty Officer 2nd Class Jesse A. Hyatt)
Airman Magazine: As commander of Joint Force Headquarters Cyber, you’re responsible for cyber affects in campaign plans from U.S. Central Command to U.S. Transportation Command. How does that integration take place?
Maj. Gen. Skinner: Aligned to each of those combatant commanders we have an element called the Cyber Operations Integrated Planning Element. We are just now standing those up and they are at the combatant commanders’ headquarters.
They’re kind of our picture window into that combatant commander to enable cyber operations planning to be part of their overall plan. Each combatant commander has either a function or a region they’re responsible for and they have what we call a scheme of maneuver, which is either day-to-day or in conflict. It is the commander’s plan of how to ensure sure we are successful in that campaign.
These planning elements are aligned there so we can be part of that plan and make sure that cyber isn’t just bolted on, but integrated into that plan. Cyber will be one of the first options that are available to that combatant commander below the level of conflict to make sure that we are meeting our objectives.
Airman Magazine: How do you get everyone with a piece of the huge cyber puzzle speaking the same language? How do you communicate capabilities and vulnerabilities to leadership, agency partners and airmen who are not cyber experts?
Maj. Gen. Skinner: I would say today we have the best understanding and the best alignment from the cyber domain standpoint that we’ve ever had with all the strategy documents – the National Defense Strategy, which is underneath the National Security Strategy, the National Cyber Policy and Strategy, the DoD Cyber Strategy and the Cyber Posture Review.
All of these documents are perfectly aligned and it’s a great understanding of the capabilities that we provide, but also the importance of cyber to the multi-domain operations. The education is continual, but I offer that our Air Force leadership understands the cyber domain. They understand how important the cyber domain is to multi-domain operations.
We continue to educate the entire forest. We’re continuing the education process of all of our airmen, from the highest level to the most junior airman and the joint community, but from a joint standpoint and a national standpoint cyber is more understood than it ever has been.
Proposed content viewing page on the Cyber Education Hub, which is being developed at the Center for Cyberspace Research in the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio.
(AFIT CCR photo)
Airman Magazine: Do you see the Continuum of Learning concept and applications like the Cyber Learning Hub being developed by the Center for Cyberspace Research, Air Force Cyber College and U.S Air Force Academy’s CyberWorx, as aiding in that effort?
Maj. Gen. Skinner: There are a lot of great opportunities with that as cyber continues to be more and more integrated into the day-to-day operations.
We currently have the Air Force Warfare Center where we bring a lot of different mission systems together, integrate them, exercise and train and cyber is a significant part of that.
From an education standpoint we send people to the Air Force Institute of Technology. They not only have general education classes, but we they have Cyber 100, Cyber 200, Cyber 300 and Cyber 400 courses.
We have the 39th Information Operations Squadron, which does our cyber training. Keesler Air Force Base has a lot of our cyber courses. Just as Gen. Raymond over the last year has been working with Air University to make sure we have more space in our professional military education, we’re doing the same thing from a cyber standpoint.
We’re working with Gen. Cotton at Air University and Gen. Kwast at Air Education and Training Command to make sure that we continue to improve the amount of cyber and relevant topics in cyber education in basic military training through professional military education and to highlight cyber, both from a professional and a personal standpoint, because it impacts every part of your life.
Airman Magazine: In that vein, what would you like every airman to be aware of in their daily connectivity?
Maj. Gen. Skinner: One of the biggest vectors that our adversaries use to get into our networks is email. It’s called spear phishing. You can get those at your home and at the office. We continue to educate that you should know who the sender of an email is, that you do not click on links that you’re not certain are good links. If it looks too good to be true, it probably is.
If you get an email offering a free vacation, there’s probably not a free vacation. That’s probably someone trying to gain access to your personal information or gain access into our Air Force systems to cause havoc and disrupt our ability to do our missions.
Additionally, be aware that our adversaries can put different pieces of unclassified information together, which in the aggregate actually become classified. So you always have to be careful when you’re outside of work, or even inside work, of what you talk about in the open.
You have to monitor your computer systems. Make sure your systems are patched, especially at home, because that is the quickest way for an adversary to exploit your system. Some vulnerabilities have been out there for years. We find that both on the commercial side and the government side — there are systems out there that have not been patched in a long time, even though a patch has been out there.
We’re continuing to leverage technology to make that a little easier, to make sure that we’re updating and protecting all those systems.
Maj. Gen. Robert J. Skinner, Commander, 24th Air Force; Commander, Air Forces Cyber and Commander, Joint Force Headquarters-Cyber is photographed at his headquarters at Joint Base San Antonio-Lackland, Texas, Oct. 26, 2018.
(Photo by J.M. Eddins Jr.)
Airman Magazine: The Air Force places a premium on building leaders. What twists and turns has your career taken that culminated in command of the Twenty-fourth AF?
Maj. Gen. Skinner: I’ve had multiple mentors who have taken a special interest in my career. They have said you need to go to this position. I questioned it. I didn’t understand it. But it turns out that developed a place in my leadership that was not refined well enough. We spend a lot of time and energy on managing our talent. What differentiates us from other nations and other militaries is our airmen, whether officer, enlisted or civilian.
Our Airmen are our most precious asset. It is our solemn duty to professionally develop our airmen to the best extent possible. We take special interest in placing them where they professionally develop, while making sure our missions continue to be successful.
This article originally appeared on Airman Magazine. Follow @AirmanMagazine on Twitter.
Gary Brooks Faulkner, a construction worker from Colorado, was detained by police with a pistol and a sword. Except for the sword, this would not be unusual in Colorado. But he wasn’t in Colorado. He was in Pakistan, and he was there to avenge the 9/11 terrorist attacks by taking a sword to the world’s most wanted man.
When the U.S. Army adopted the motto “Army of One,” a lot of soldiers laughed. But one American civilian seemed to have taken it to heart. He wasn’t ashamed of his self-imposed mission. He was proud of it. Even when he was arrested in the Chitral District of Pakistan while trying to cross into Afghanistan, he didn’t hide it.
“He told the investigating officer he was going to Afghanistan to get Osama. At first we thought he was mentally deranged,” said Muhammad Jaffar Khan, the Chitral police chief. But the gun-toting, sword-wielding Californian was totally serious. He even brought along night vision goggles. The American was even under armed guard while staying in Pakistan under the guise of being an everyday tourist. One night, he slipped away from his guard and made a run for the border.
Faulkner was arrested in Pakistan back in 2010 and had no idea – like the rest of the world – that Osama bin Laden wasn’t even in Afghanistan at the time. Bin Laden’s compound in Abbottabad, Pakistan was just a ten-hour drive from the Kalash Valley, where Faulkner was staying. There wasn’t even a border to cross or policemen to arrest him or take away his samurai sword.
But the American had no idea where he was going. He told police he brought the Bible along with him and that God would guide him to where Osama bin Laden was hiding, and allow him America’s vengeance. Or at least allow him to capture the world’s most wanted terrorist. But of course, we all know how OBL’s story ends.
Faulkner’s ends with a Nic Cage movie.
Gary Brooks Faulkner, however, was turned over to the U.S. State Department in Pakistan and repatriated home to Colorado, where he was a guest on various talk shows, including The View and The Late Show with David Letterman, before going back to a regular life of managing his brother’s apartment complex. Then one day, a tenant who was being evicted tried to break into his apartment with three of her friends. She tried to intimidate a man who hunted Osama bin Laden with a sword.
He fired a shot at his assailants, but that shot brought the police, who confiscated his weapons and discovered he was a convicted felon. That shot eventually landed Faulkner in jail.
Let’s be real: Six-pack abs are a pretty dumb fitness goal. First and foremost, having a stomach that has ridges is not a barometer of health. In fact, in many ways it is quite the opposite. To have six-pack abs you need to have somewhere around the order of 6% body fat. Sounds good, right? Not exactly. Extremely low body fat (that’s below 5%) can put a strain on the system, causing testosterone to drop, the immune system to struggle, brain fog, splotchy skin… the list goes on. In other words, this is a vanity goal.
So you still want to give one a go? We get it, that six-pack is aesthetically pleasing and make anyone look damn good in a swimsuit. But be prepared to work for it. There is a very high bar you’ll need to hit repeatedly for workout dedication and dietary discipline.
So the first step to a six-pack is watching what you eat, and sticking to lean meats, vegetables, and cutting out all sweets and most carbs. The second step is committing to an intense ab-focused strength-training routine — not the twice a week deal you do now, but three to four times a week, with determination and focus — to see your abs transform themselves. The good news: Many of the moves don’t require machines or extra weights, so you can do them in the convenience of your own home.
The final ingredient to building your six-pack is a solid dose of daily cardio. Developing your overall fitness will help train your body to use energy more efficiently, and teach it to start torching calories the minute you begin to move. And that’s key because you can have the strongest abdominals in the world, but if they’re covered with a layer of fat, you’ll never see them.
Follow this 7-point checklist to take your six-pack fantasy one step closer to reality.
1. Eat less fat, and more protein.
Protein helps your body build muscle and recover from tough workouts. It also has the highest thermogenic property of the various food categories (carbs, fat, etc), meaning pound per pound it requires more energy to burn, helping you lose weight faster.
2. Count your calories.
Yes, your meals should be filled with high-quality nutrients and low on processed crap. But at some point, a calorie is a calorie, and to lose weight, you need to take in fewer calories than you expend. The average guy needs about 2,500 calories to maintain his weight. Shoot for 200 less than that a day to help hit your target safely. (For easy reference, that means cutting out the bowl of chips before dinner, or skipping dessert.)
3. Pick exercises that hit multiple muscle groups.
Crunches and sit-ups have their place, but exercises that involve multiple muscle groups give you more bang for your buck. Two of the best ones, which should be performed to the point of temporary muscle failure (i.e., you cannot do another rep), are planks and reverse crunches.
Plank: Start lying face-down on the floor, torso propped up on your elbows. Engaging your core, raise your body up onto your forearms and toes, making sure your body forms one long line from shoulders to feet. Hold this position as long as you can, working your way up to 90 seconds.
Reverse crunches: Lie on the floor on your back, knees bent at 90 degree, feet raised several inches off the ground. Contract your abs and hike hips off the floor, keeping your spine rounded. Raise knees high toward the ceiling. Relax and repeat as many times as you can.
4. Make your cardio workouts more intense (and shorter).
Cardio is an essential component to getting your six-pack, because it speeds up the weight-loss process. Despite what you’ve probably read about moderate intensity cardio being the best method for burning fat (which is true), the fastest way to achieve overall calorie burn is HIIT (High Intensity Interval Training), which goes like this: 60 seconds of biking, rowing or sprinting as hard as you can, followed by 30 seconds of rest. Repeat 10 times.
5. Hanging leg raises.
Don’t be fooled by its name — hanging leg raises are one of the best abdominal workouts you can do. The move works those deep, lower abdominal muscles that basic exercises like crunches miss. Start by hanging from a bar, legs straight. Engage your core and raise both legs straight in front of you (if this is your first time, it’s likely you will not be able to lift them very high — that’s OK). Repeat until failure.
6. Prioritize hydration.
It’s true, all the water in the world isn’t going to make your abs pop overnight. But it’s also true that drinking at least 8 glasses of water (or other non-alcoholic, non-caffeinated beverages) a day helps boost your energy levels so you can commit to your next workout. It also helps prevent water retention, which can give your gut a bloated appearance.
Even though you’ll need to do some ab-specific exercises along with general strength and cardio work, you’ll see better results if you alternate the moves you do, as each one works the abdominals in a slightly different way. A few to add to your repertoire:
Pronated Leg Raises: Lie flat on your back, legs straight, hand tucked beneath your lower spine for support. Engage your abs and raise legs to about 45 degrees. Lower. Do 10 times.
V-Hold: Sit on floor, knees bent, hand tucked under your knees. Engage your core and slowly raise your feet off the floor several inches. Once you find your balance, extend your legs in front of you, creating a V-shape with your body. Hold 60 seconds.
Bicycle: This favorite of aerobic classes everywhere gets your heart rate up with working your obliques. Start on your back, knees bent, hands behind your head. Raise your head and feet off the floor and begin cycling your legs back and forth as it you re riding a bike. Bring opposite elbow to knee as you go. Do 60 seconds, rest 20 seconds, and go again.
This article originally appeared on Fatherly. Follow @FatherlyHQ on Twitter.