Thursday, September 20, 2012

SECRETARY OF DEFENSE PANETTA COMMENTS ON CHINA MEETINGS

Defense Secretary Leon E. Panetta talks with Chinese Vice President Xi Jinping before a meeting in Beijing, Sept. 19, 2012. DOD photo by Erin A. Kirk-Cuomo   

FROM:  U.S. DEPARTMENT OF DEFENSE

Panetta Calls Beijing Meetings 'Substantive, Productive'

By Karen Parrish
American Forces Press Service


BEIJING, Sept. 20, 2012 - Visiting China at what he called a "very important moment" for the U.S.-China relationship, Defense Secretary Leon E. Panetta said yesterday his meetings with key Chinese leaders here have been both substantive and productive.

In a discussion with Chinese reporters and media representatives traveling with him, Panetta reviewed his meetings over two days with Chinese leaders including Vice President Xi Jinping, State Councilor Dai Bingguo, Vice Chairman of the Central Military Commission Xu Caihou and Defense Minister Gen. Liang Guanglie.

Key discussion points throughout the meetings, the secretary said, included territorial disputes, ballistic missile defense and North Korea, and cyber attack and intrusions. The overarching topic, he added, was the U.S.–China relationship in the context of the U.S. strategic rebalance to the Asia-Pacific region.

Panetta drew a parallel in describing his advice to Chinese leaders over a territorial dispute simmering between China and Japan – which, he noted, he also tendered to Japanese senior government officials when he visited there earlier this week – and Chinese advice to him over North Korea. Each side urged the other to seek peaceful, diplomatic solutions to their differences, he noted.

The secretary said he has some understanding of the deep feelings and long-standing differences between China and Japan over disputed islands in the East China Sea. But, he added, "it's really important that we not be trapped by the past and that we move forward."

Panetta said his message on the topic is consistent to any country claiming disputed territory in the East China Sea or South China Sea: while the United States doesn't take sides in territorial disputes, "we strongly urge the parties to exercise restraint and to work together to find a peaceful resolution to these issues."

The secretary added that he also strongly urges the Asia-Pacific nations to form a multilateral forum to resolve regional conflicts according to agreed-upon principles.

Panetta said his meetings here gave him the impression that the Chinese are looking for a good format in which to try to resolve these issues for the future. "They, too, have a concern that these issues can't just be resolved on the fly -- that there's got to be a process to try to deal with them," he added.

Both Japanese and Chinese leaders signaled this week that they "recognize that it's important not to let this kind of dispute get out of hand," Panetta said.

China's leaders similarly urged that the United States exercise restraint in its approach to North Korea, Panetta acknowledged. China, along with Russia, is one of North Korea's principal allies.

U.S.-North Korea differences came to the fore this week when, during his stay in Japan, the secretary announced the United States and Japan are discussing expansion of Japan-based ballistic missile defense radar systems. Panetta emphasized the X-band radar, which detects ballistic missiles early in their flight and provides precise tracking information for targeting systems, is intended solely for defense against North Korea.

The secretary told reporters that North Korea threatens the United States, its forward-deployed forces and its allied and partner nations as it continues to test nuclear weapons and delivery systems and to enrich uranium in defiance of international law.

During his meetings with China's leaders, Panetta said, he urged Chinese officials to try to persuade North Korea to engage with the United States to work on resolving these issues through diplomacy. In turn, he added, the Chinese leaders strongly recommended that the United States try to resolve its issues with North Korea peacefully.

Both sides noted that the recent change in North Korean leadership has produced some signs of softening in Pyongyang's stance, he noted. "We agreed that there are changes that are taking place and that we have to keep track of those changes," the secretary said.

Panetta said he also raised concerns about threats in the cyber domain, which he called the "potential battlefield for the future."

Cyber technology "has the potential to cripple a country, paralyze a country ... [and is] being used in order to exploit information -- important economic information -- from one country to the next," he said.

Panetta said the United States "has concerns about what China has been doing, in terms of exploiting information," and that during his meetings here he stressed the importance of the United States and China having a dialogue regarding cyber.

"I think we do have to make the effort to try to sit down with China and with other countries to discuss how we can approach cyber," the secretary said. He added that cyber is a growing threat in China as well, and that "there was concurrence" during meetings that the topic is worthy of strategic discussion.

"There was a sense that there has to be an effort to look at the larger picture here and whether or not we can develop international rules and standards. ... I thought that was a very good step to ... at least beginning the discussion about dealing with this issue," Panetta said.

The secretary has maintained throughout his comments to reporters this week that the chief focus of his visit to China was to strengthen military relations between the two countries and to seek Chinese response to the U.S. strategic rebalance to the Asia-Pacific region.

"What I hope this visit has made clear is that engagement with China is a critical part of [the rebalance]," he said. "And I believe we're making real progress towards building a military-to-military relationship with China that is, in fact, healthy, stable, reliable, and continuous."

China and the United States will not always agree, Panetta acknowledged. But he said the key to the relationship, as to any relationship, is open communications and the ability to express views candidly. "That, almost more than anything else, is what can lead to improved relations between the United States and China," he said. The "candid and frank discussions" he has had here bode well for the future, he added.

Concerning the U.S. rebalance in the Asia-Pacific region, Panetta said, Chinese leaders acknowledged that they don't view it as a threat. "They viewed it as important to the future prosperity and security of the Pacific region," he told reporters.

Their key concerns, he added, are that the United States develops and strengthens its presence in conjunction with developing a strong U.S.-China relationship, and that both nations work together to develop the capabilities of other countries and develop security for the region.

AFGHANISTAN CAMPAIGN REMANINS ON TRACK ACCORDING TO OFFICIAL


ENEMY WATCH - U.S. Army soldiers consolidate rounds and watch for enemy activity following a machine-gun and small arms attack on their position near the Pakistan border in Afghanistan, May 18, 2011. DOD photo by Karen Parrish
 

FROM: U.S. DEPARTMENT OF DEFENSE
ISAF Official: Campaign Remains on Track as Surge Winds Down

By Claudette Roulo and Army Sgt. 1st Class Tyrone C. Marshall Jr.
American Forces Press Service


WASHINGTON, Sept. 19, 2012 – The International Security Assistance Force’s campaign in Afghanistan is on track to achieve the objectives and timeline NATO set forth at its November 2010 summit, and American surge forces are on schedule to return home by Oct. 1, a senior ISAF official said today.

"The surge has effectively covered and enabled the training and fielding of the Afghan national security force, and is an amazing outcome in and of itself," Brig. Gen. Roger Noble of the Australian army, deputy to ISAF’s operations chief, told Pentagon reporters via satellite from Kabul, Afghanistan.

"The blood, sweat and tears of many coalition soldiers, especially many brave Americans, has directly delivered the time and space for the [Afghan forces] to stand up and assume the lead for the security of Afghanistan," he added.

Citing "relentless pressure on the enemy" by Afghan and coalition forces, Noble said insurgents have been pushed out of major population centers, allowing 76 percent of the Afghan population to live in areas of relative calm.

"In these areas, Afghans have the lead for their own security and their own lives," he said. "And the future of Afghanistan is, day by day, increasingly in Afghan hands, as it must be and should be."

While insider attacks are an ongoing problem, he said, ISAF is conducting a detailed analysis of every shooter involved to identify characteristics or traits that can be used to warn coalition forces of potential risks. A major challenge is that most of the shooters are either killed in the attacks or escape, the general acknowledged.

"But that doesn't stop you from still digging into their background using multiple means and actually interviewing the ones that we detain," he said.

Insider attacks are a long-term tactic used to erode trust, Noble said, and they increase during periods of heightened tension, as they did in February following an incident in which coalition forces inadvertently mishandled Korans.

Marine Corps Gen. John R. Allen, the ISAF commander, raised the force protection level in light of the insider attacks, Noble said, noting that the force protection level changes quite often as specific threats rise and fall.

The attacks are a sign that the insurgency is struggling, Noble said.

"I've got a funny feeling that if they could get into pickup trucks and drive into Kandahar, they would," he said. "But they can't do that. And the surge helped do that. There's now not just the coalition standing in the way of them, but [the Afghan security force] has about 350,000 who say, ‘You can't do that. You can't come back.’ And most of the people of Afghanistan don't want them back, either."

Insurgents cause 81 percent of the civilian casualties in Afghanistan, the general said, through improvised explosive devices, assassinations and suicide bombings. "If your only option is to erode confidence and will through extremism and violence," he said, "the insider threat methodology fits right into that box of things to do. … They don't have a lot of options other than to do that."

Much work remains to be done, Noble said, and the Afghans understand that and are working to improve their vetting process and develop the infrastructure to support a professional army.

"It’s a problem that plagues them [as well]," he said. "Most years, they’ve had far more attacks than we do."

Noble also clarified recent changes to ISAF's model for assisting Afghan forces. ISAF officials said in a written statement yesterday that media reports on the subject were inaccurate.

"General Allen has not said that we're never going to speak to an Afghan below kandak level again," Noble said. "And that is not what's happening." A kandak is the Afghan army’s equivalent of a battalion. Rather, he explained, Allen made adjustments due to the heightened threat around the "Innocence of Muslims" YouTube video, which has sparked protest and violence in the Muslim world.

"You would have to admit [it] has had an impact globally, … and you'd be crazy not to heighten force protection," he said.

Allen is not preventing partnership patrols below kandak level, Noble said, but simply is reinforcing a requirement to take a considered decision about when, where and how that happens.

"We're going to take all the lessons out of [the insider attacks] and check around the whole country to make sure that there can't be a repeat, or [to] minimize the chance of repeat," he said.

ISAF officials try to look "forward and backwards in context," he added, trying to keep day-to-day activity in perspective and to remain on track for Afghanistan’s security forces to be responsible for security throughout their country by the end 2014, the goal set at NATO’s 2011 summit.

"Being in Afghanistan, every day throws up a different challenge, and the enemy is nothing if not innovative and committed," Noble said. "So when we get hit with the insider threat problem or any new tactics, we'll leave no stone unturned to try and keep our people safe. We're not going to shy away from our commitment to be successful in the campaign."


2012 OUTSTANDING AIRMEN OF THE YEAR



FROM: U.S. AIR FORCE,

Chief Master Sergeant of the Air Force James Roy, left, and Sandy Schlitt, Air Force Association's chairman of the board presents a plaque to Senior Master Sgt. Luke Thompson, 125th special Tactics Squadron, Oregon Air National Guard, during the 2012 Outstanding Airmen of the Year reception and awards dinner.The Air Force Association hosted the annual Air & Space Conference and Technology Exposition in Washington, D.C., on Sept. 17, 2012. The recipients were recognized for superior leadership, job performance, community involvement, and personal achievements. (U.S. Air Force photo/Jim Varhegyi)

U.S.-MOROCCO RELATIONS


Map Credit:  CIA World Factbook.
FROM: U.S. DEPARTMENT OF STATE
Morocco formally recognized the United States by signing a treaty of peace and friendship in 1786. After a longstanding consular presence, permanent diplomatic relations began in 1905. Morocco entered into the status of a French protectorate from 1912 to 1956, and normal diplomatic relations were resumed after U.S. recognition of Moroccan independence in 1956. The two countries share common concerns and consult closely on regional security, political and economic transition, and sustainable development. Morocco is a strong partner in counterterrorism efforts, and it works closely with U.S. law enforcement to safeguard both countries’ national security interests.

U.S. Assistance to Morocco

Since 1957, the United States and Morocco have worked together to make real and substantial improvements in the lives of Moroccan citizens. In the wake of the Arab Spring, Morocco continues to make positive strides in pursuit of political reform and remains a strong U.S. supporter. The United States Agency for International Development programs aim to increase agricultural growth and productivity; enhance teacher training; build the capacity of local governments to respond to citizen demands; and address the needs of the most at-risk youth through engagement in productive social, economic and civic activities. Funding through the Middle East Partnership Initiative (MEPI) supports the work of Moroccan civil society through programming that provides training to journalists, businesspeople, female entrepreneurs, legislators, legal professionals, and the heads of leading nongovernmental organizations. Under the Joint-Statement on Environmental Cooperation, signed in 2004, the Department of State’s trade-related environmental cooperation programs focus on protecting the environment while promoting green economic development. The United States and Morocco signed a comprehensive Science and Technology Agreement in 2006. In 2008, the Millennium Challenge Corporation (MCC) commenced a five-year, $697.5 million compact with the Kingdom of Morocco to reduce poverty and stimulate economic growth. The MCC compact invests in expansion of fruit tree agriculture (including olives, nuts, and dates), support for small-scale fisheries and fish-markets, enhancement of the artisanal sector in the city of Fes, and training for small-scale businesses across all these sectors, with an emphasis on training for women and youth including literacy training.

Bilateral Economic Relations

The United States is Morocco’s 6th largest trading partner, and Morocco is the 55th largest trading export market for U.S. goods. In 2006, Morocco and the United States Free Trade Agreement entered into force. Morocco has also signed a quadrilateral FTA with Tunisia, Egypt and Jordan, and a bilateral FTA with Turkey. Additionally, it is seeking trade and investment accords with other African, Asian and Latin American countries. Morocco’s leading exports include phosphates and textiles. Morocco's banking system is one of the most liberalized in North Africa; it is also highly concentrated, with the six largest banks accounting for 85 percent of banking sector assets.


One of the walls of the medina (ancient city quarter) of Rabat. The Rabat medina dates back to the 17th century. It has a wide range of shops (pottery, leather, food), as well as parks, gardens, and broad boulevards. Credit: CIA.

Morocco’s Membership in International Organizations

Morocco is a moderate Arab state that maintains close relations with Europe and the United States. It is a member of the United Nations (UN), and in January 2012 it began a 2-year term as a non-permanent member of the UN Security Council. Morocco belongs to the Arab League, Arab Maghreb Union (UMA), Organization of Islamic Cooperation (OIC), the Non-Aligned Movement, and the Community of Sahel-Saharan States (CEN-SAD). King Mohammed VI is the chairman of the OIC's Al-Quds (Jerusalem) Committee. Although not a member of the African Union (formerly the Organization of African Unity), Morocco remains involved in African diplomacy. Morocco is a party to the dispute over the Western Sahara in the UN. After Spain withdrew from its former colony there in the 1970s, Morocco claimed sovereignty over the region. A ceasefire between Morocco and the independence-seeking Polisario Front has been monitored since 1991 by a UN peacekeeping operation, the United Nations Mission for the Referendum in Western Sahara (MINURSO).

CARTER WANTS MORE PROGESS ON CYBER DEFENSE

FROM: U.S. DEPARTMENT OF DEFENSE
Carter Urges Stepped Up Progress on Cyber Defense
By Cheryl Pellerin
American Forces Press Service


WASHINGTON, Sept. 19, 2012 - Even as the Defense Department increases investments in cyber capabilities, officials are working to reduce vulnerabilities in their own networks and in those of contractors who build sensitive defense systems, Deputy Defense Secretary Ashton B. Carter said today.

Speaking at the Air Force Association's Annual Air and Space Conference and Technology Exposition in Maryland, Carter said DOD's cyber concerns are threefold.

"Two of [these parts] we can get our hands on, including by managerial moves within the department, and a third ... is harder to get our hands on," the deputy secretary said.

The first is DOD's defense of its own networks, he said, noting that task is "technically very challenging."

It's paramount that DOD maintains security and integrity across its cyber networks, Carter said, because "we depend on them ... today in everything we do."

The second part involves developing cyber weapons as weapons of war, he said, "doing the intelligence preparation of the battlefield for their employment and planning for their employment. Again, that's something we can do within our own walls and are doing."

The third part is protecting the nation at large from cyberattack, he added, a job that's harder because DOD plays only a role in a larger cast.

The scope of DOD's responsibility for domestic cyber defense extends to the dependence of DOD installations and bases on the U.S. cyber infrastructure, and on the use of DOD data and plans by contractors who build the department's sensitive systems.

"First of all, other parts of the government have capabilities and responsibilities and we work with them. But the most important thing is that most of those networks are ... owned and controlled by private entities who typically fail to invest, or underinvest, in their security," the deputy secretary said.

"When we offer to assist them in protecting [the networks], we run up against barriers that we're slowly trying to knock down and reason our way through," he added.

Such barriers could include antitrust issues if the department provides information to a particular business, he said.

"Do we have to provide the same information to company B? Can company A provide information to company B or does that violate the antitrust laws?" Carter said. "Can company A provide information back to the United States or is that providing personal information to the government that is on their networks?"

He questioned whether DOD should require private industry to control and strengthen its cyber networks, or whether that would be interpreted as excessive government regulation.

"These are all tough problems," he said.

When it comes to dealing with issues of safeguarding the nation as a whole from cyberattack, "we're working our way through all these issues, and my own view is [we're doing it] way too slowly," Carter said.

The Cybersecurity Act of 2012, which called for minimum cyber security performance standards for critical infrastructure that the U.S. government would help develop with private industry, fell short of passage during an Aug. 8 Senate vote.

"We were hoping for some legislative relief this summer that we didn't get out of the Congress," Carter said.

Meanwhile, he said, the Defense Department is considering making U.S. Cyber Command, an armed forces subunified command subordinate to U.S. Strategic Command and led by Army Gen. Keith B. Alexander, a separate combatant command.

ALLEGED REAL ESTATE INVESTMENT FRAUD INVOLVING LAND VALUE MARK-UPS

FROM: U.S. SECURITIES AND EXCHANGE COMMISSION
Washington, D.C., Sept. 7, 2012 The Securities and Exchange Commission announced an asset freeze against a San Diego-based firm and its owner accused of running a real estate investment fraud that raised approximately $50 million from hundreds of investors nationwide.

The SEC alleges that Western Financial Planning Corporation and Louis V. Schooler sold units in partnerships that Western had organized to buy vacant land in Nevada and hold for sale at a profit at a later date. Schooler and Western failed to tell investors that they were paying an exorbitant mark-up on the land, in some cases more than five times its fair market value. Schooler and Western also failed to tell investors that the land held by the partnerships was often encumbered by mortgages that Western used to help finance the initial purchase of the land.

"Schooler conned hundreds of people into investing with Western by leading them to believe that they were getting a good value for plots of vacant land," said Michele Wein Layne, Director of the SEC’s Los Angeles Regional Office. "What he didn’t tell them was that the land was worth only a small fraction of their investment and that he was profiting at their expense."

The SEC’s complaint filed in federal court in San Diego alleges that Western and Schooler misled investors since 2007 by providing them with comparative prices or "comps" of supposedly similar plots of land that had sold for prices higher than those offered by Western. In reality, the real estate comps that Schooler and Western provided were in no way comparable to the land sold by Western. The SEC also alleges that since the spring of 2011, Schooler paid "hush money" to silence investors who discovered they had been defrauded, allowing the scheme to continue.

The Honorable Larry A. Burns for the U.S. District Court for the Southern District of California yesterday granted the SEC’s request for a temporary restraining order and asset freeze against Schooler, Western, and all entities under Western’s control, and appointed Thomas C. Hebrank as a temporary receiver over Western and the entities. Judge Burns has scheduled a court hearing for Sept. 17, 2012, on the SEC’s motion for a preliminary injunction.

The SEC’s investigation was conducted by Sara Kalin and Carol Shau of the Los Angeles Regional Office. Molly White will lead the SEC’s litigation. Ron Warton, Andy Ganguly, Michelle Royston, and Karol Pollack conducted the SEC examination that prompted the investigation.

U.S.-MALI EXTEND ARCHEOLOGICAL HERITAGE AGREEMENT



From: CIA World Factbook
Coursing through parched, landlocked Mali, the Niger River flows north through an ancient sand sea before turning sharply east to skirt the edge of the dune-striped Sahara; it then heads south, through Niger, Benin, and Nigeria, to the Gulf of Guinea. At the confluence of the Bani and Niger Rivers in Mali lies a vast Inner Niger Delta the size of Belgium and composed of narrows, twisting waterways, lagoons, and tiny islands (some of which are shown here). Due to evaporation and seepage in this area, the river loses two thirds of its potential flow. The Niger River's strange crescent-shaped route is believed to have been formed when two ancient rivers merged as the region dried. From the Niger's source near the coast to the bend, the Upper Niger once emptied into a now gone lake. In the hills near the ancient lake, the Lower Niger began and flowed south to the Gulf of Guinea. False-color image courtesy of USGS.

FROM: U.S. DEPARTMENT OF STATE
United States and Mali Extend Agreement to Protect the Archaeological Heritage of Mali
Media Note
Office of the Spokesperson
Washington, DC

September 19, 2012
The Department of State is pleased to announce the extension of the Agreement Between the Government of the United States of America and the Government of the Republic of Mali Concerning the Imposition of Import Restrictions on Archaeological Material from Mali from the Paleolithic Era (Stone Age) to Approximately the Mid-Eighteenth Century, effective September 19, 2012 for a period of five years, demonstrating America’s commitment to antiquities preservation. This extension, consistent with a recommendation made by the Cultural Property Advisory Committee, represents a continuation of cooperation that began in 1993 with the imposition of emergency U.S. import restrictions to staunch the pillage of Mali’s rich archaeological heritage and the illicit trafficking in such material.

The Government of the Republic of Mali requested this agreement under Article 9 of the 1970 UNESCO Convention on the Means of Prohibiting and Preventing the Illicit Import, Export and Transfer of Ownership of Cultural Property. The Convention offers a framework of cooperation among State Parties to reduce the further pillage of intact archaeological sites; an activity that destroys information about past cultures and places a nation’s cultural heritage in jeopardy. Sites in the region of the Niger River Valley, for example, represent a continuum of civilizations from the Neolithic period to the Colonial era, lending archaeological significance to the region. Also included in the import restriction is material from the Tellem burial caves of the Bandiagara Cliffs as well as material found in the region of the Sahara Desert.

Restricted objects may enter the United States if accompanied by an export permit issued by Mali or documentation verifying its provenance prior to 1993 for archaeological material from the Niger River Valley and the Tellem burial caves of Bandiagara, or prior to 2007 in the case of archaeological material dating from the Paleolithic era to the mid-eighteenth century from sites throughout the country, and if no other applicable U.S. laws are violated.

$500 MILLION GOING FOR COMMUNITY COLLEGE GRANTS TO EXPAND JOB TRAINING

FROM: U.S. DEPARTMENT OF LABOR
Obama administration announces $500 million in community college grants to expand job training through local employer partnerships

Grants are the 2nd installment of $2 billion, 4-year initiative
WASHINGTON, D.C.
— Secretary of Labor Hilda L. Solis today announced $500 million in grants to community colleges and universities around the country for the development and expansion of innovative training programs. The grants are part of the Trade Adjustment Assistance Community College and Career Training initiative, which promotes skills development and employment opportunities in fields such as advanced manufacturing, transportation and health care, as well as science, technology, engineering and math careers through partnerships between training providers and local employers. The U.S. Department of Labor is implementing and administering the program in coordination with the U.S. Department of Education.

Speaking in Florida at St. Petersburg College, which is receiving $15 million in funds to lead a consortium of community colleges across the state in developing programs focused on advanced manufacturing, Secretary Solis said: "These federal grants are part of the Obama administration's ongoing commitment to strengthening American businesses by strengthening the American workforce. This strategic investment will enhance ties among community colleges, universities, employers and other local partners while ensuring that students have access to the skills and resources they need to compete for high-wage, high-skill careers."

The initiative complements President Obama's broader goals to help ensure that every American has at least one year of postsecondary education and the U.S. has the highest proportion of college graduates in the world by 2020. Through this initiative, each state plus the District of Columbia and Puerto Rico will receive at least $2.5 million in dedicated funding for community college career training programs.

In total, 297 schools will receive grants as individual applicants or as members of a consortium. The grants include 27 awards to community college and university consortia totaling $359,237,048 and 27 awards to individual institutions totaling $78,262,952. Twenty-five states that were without a winning individual submission will be contacted to develop a qualifying $2.5 million project.

Educational institutions will use these funds to create affordable training programs that meet industry needs, invest in staff and educational resources, and provide access to free, digital learning materials. All education materials developed through the grants will be available for use by the public and other education providers through a Creative Commons license.

These grants emphasize evidence-based program design. Each grantee is required to collect rigorous student outcome data annually and conduct final evaluations at the end of the grant period to build knowledge about which strategies are most effective in placing graduates in jobs.

AIR FOCE EVAC SUPPORT ASIA-PACIFIC REGION

F-15's and other aircraft from Kadena Air Base, Japan are parked on the flight line at Andersen Air Force Base, Guam, Sept. 17, 2012. The aircraft were evacuated here from Kadena due to the typhoon threat in Okinawa, Japan and inclement weather throughout the Asia-Pacific region. Historically, aircraft from throughout the region have evacuated to Andersen in times of threatening weather to ensure no damage occurs to the aircraft. (U.S. Air Force photo/Senior Airman Carlin Leslie)


FROM:  U.S. AIR FORCE
36th Wing provides consistent evac support in Asia-Pacific
by Airman 1st Class Marianique Santos
36th Wing Public Affairs

9/19/2012 - ANDERSEN AIR FORCE BASE, Guam (AFNS) -- With tsunami threats recently pervading the Asia-Pacific region, the 36th Wing here has been actively exercising its capabilities of providing evacuation support to neighboring bases while simultaneously accommodating some of the largest joint and coalition exercises in the region.

"This year the activity in the water has been pretty heavy so it seems every other week we received evacuating aircraft," said Master Sgt. Anthony Matthews, 36th Operations Support Squadron airfield manager.

The reception working group on Andersen AFB receives evacuating aircraft and makes sure the Airmen associated with those aircraft are accommodated. The group is made up of different operation and support units on base.

"It's more than just parking aircraft; it's making sure they have everything they need to do their mission until it's time for them to go back," said Maj. Nicole Fuller, 36th Logistics Readiness Squadron commander and reception working group lead. "We make sure that the Airmen have a place to sleep, eat and have cars to drive if their maintainers need to go to the flightline to fix the aircraft. We also take care of their cargo and provide them with support equipment that they need to sustain their mission while they're here."

Initially, the base the evacuating aircraft are from will work with their Installation Deployment and Reception Center. The personnel from the originating base deploy their evacuating aircraft and personnel, then contact the destination base and inform them the numbers of incoming personnel, aircraft and equipment.

"The process is seamless when we know the numbers," said Fuller. "With this information we can prepare to receive and take care of the evacuating aircraft and personnel during their time on Andersen."

After the information has been received, the 36th LRS divides the tasks through a worksheet consisting of the needs of the evacuees. The corresponding units then check-off their designated tasks.

One of the first units notified after receiving an evacuation support request is the 36th Force Support Squadron. The members of the sustainment services flight are responsible for making sure the Airmen associated with the evacuating aircraft are accommodated.

"We do everything to make sure they get their nutritional needs and are bedded down," said Capt. Jesse Calland, 36th FSS sustainment services flight commander. "Everyone who transits through this base goes through us for lodging. We try to keep personnel in the best conditions possible. Our two-person reservations team supports all the accommodations."

During Valiant Shield 2012 there were no availabilities on base. The sustainment flight searched off base and worked out reservations at approximately 14 hotels. In September, 2,400 reservations were made in order to support the exercises and the evacuation.

With the Airmen accommodated by the 36th FSS, the 36th OSS situates the aircraft by providing the planes with spaces on the flightline.

Multiple factors are taken into consideration when parking aircraft: different air frames, missions, circles of safety, protection levels and additional issues. The 36th OSS takes all of these factors in consideration when providing the evacuees a slot on the flightline, especially when there are a significant number of airframes already present that was the case when Kadena Air Base, Japan evacuated their aircraft here during Valiant Shield 2012.

Additionally, 36th OSS provides evacuating aircrews with airfield driving training and vital flightline information. The unit accomplishes this through a "windshield tour" that shows Airmen the flightline layout, from designated parking spaces to areas affected by activities like construction.

"We also make sure we train the incoming individuals on airfield driving," said Sergeant Matthews. "They need to know what is currently happening on the flightline so that they can be safe and proficient while they are here."

The 36th OSS has more than 60 million square feet of real-estate to work with; however, with large-scale exercises like Valiant Shield, the unit works even harder in order to make sure that all the operations can coexist on the flightline.


"Aircraft heavy exercises like Valiant Shield and real-world scenarios simultaneously occurring test our creativity and the extent of our capabilities, but we'll always make it happen," said Matthews. "We've opened ramps that have been closed and worked with the 36th Civil Engineering Squadron to make sure the areas are structurally sound to hold heavy aircraft."

KC-135 Stratotankers, C-130 Hercules, F-15 Eagles, F-16 Fighting Falcons and U.S. Navy's P-3 Orions and A-3 Skywarriors are some of the airframes that have taken refuge on Andersen.

With the aircraft situated on designated parking areas, the reception team makes sure they are in serviceable condition and ready to return to home station once it is possible.

The 36th Maintenance Squadron prepares work areas for the incoming aircraft. They provide facilities and support: from establishing maintenance operations centers, which coordinate with 36th Wing and disseminate vital information to the maintenance team, to providing structural and mechanical maintenance support for the aircraft.

"We are responsible for setting up facilities for the incoming aircraft and maintainers," said Tech. Sgt. Alan Stutzman, 36th MXS program flight chief maintenance lead for the reception working group. "We have hangars that we divvy up to the evacuees. We schedule around the current maintenance that's going on when needed."

"The goal is to help them maintain their normal operations and keep their sortie generation up," continued Stutzman. "We posture for these planes to fly their sorties like they were at their home station."

With this year's heightened weather activity in the Pacific, Andersen's strategic location has become an ideal evacuation location for neighboring bases in the Asia-Pacific region.

"We're on American soil, not much coordination is needed to land here," said Major Fuller. "Beyond that, we have ranges available to their pilots to continue their training. We have a huge ramp and resources to accommodate them. With the proper coordination we can have all these resources lined up for them the moment they arrive."

Though accustomed to providing support, having evacuations coincide with large-scale exercises like Valiant Shield have tested the units' capabilities. Such have proven that at times of emergency, the 36th Wing will always deliver and provide a mission-conducive haven for service members and the Department of Defense's valuable assets.

FINAL SHUTTLE SPACEWALK

 

FROM:  NASA
The Shuttle Era's Final Spacewalk

Spacewalker Mike Fossum rides on the International Space Station's robotic arm as he carries the Robotic Refueling Mission experiment. This was the final scheduled spacewalk during a shuttle mission.

Image Credit: NASA

Wednesday, September 19, 2012

U.S. ATTORNEY GENERAL HOLDER'S STATEMENT ON "OPERATION FAST AND FURIOUS" REPORT

FROM: U.S. DEPARTMENT OF JUSTICE
Wednesday, September 19, 2012
Statement by Attorney General Eric Holder on the Office of the Inspector General’s Report on Operation Fast and Furious

Attorney General Eric Holder released the following statement today on the Department of Justice’s Office of the Inspector General’s report on Operation Fast and Furious:

"I have reviewed the Office of the Inspector General’s report on Operation Fast and Furious and the key conclusions are consistent with what I, and other Justice Department officials, have said for many months now:

The inappropriate strategy and tactics employed were field-driven and date back to 2006;

The leadership of the Department did not know about or authorize the use of the flawed strategy and tactics; and The Department’s leadership did not attempt to cover up information or mislead Congress about it.

"Beginning in 2011 - shortly after public concerns were first raised about Operation Fast and Furious – I referred this matter to the Office of the Inspector General (OIG). Throughout the next several months, I instituted significant policy reforms, stronger internal controls and made key personnel changes to prevent the flaws that plagued this investigation, as well as the earlier investigation, Operation Wide Receiver, from recurring. I’m pleased that the OIG report appropriately recognizes these reforms.

"Based upon the information in the OIG report and other related information, I am also announcing additional personnel changes today.

"First, Kenneth Melson, the former Acting Director at ATF, has retired from the Department, effective immediately. Ken has served the Department in several important roles for over thirty years, including as a United States Attorney for the Eastern District of Virginia and more recently as an advisor on forensic science issues. I want to thank him for his dedication and service to the Department over the last three decades.

"Second, those individuals within ATF and the U.S. Attorney's Office for the District of Arizona, whom the OIG report found to have been responsible for designing, implementing or supervising Operation Fast and Furious have been referred to the appropriate entities for review and consideration of potential personnel actions. Consistent with the requirements of the Privacy Act, the Department is prohibited from revealing any additional information about these referrals at this time.

"Finally, I have accepted the resignation of Deputy Assistant Attorney General Jason Weinstein, a longtime career prosecutor who most recently served in the Criminal Division where he led our violent and organized crime, computer crimes and intellectual property enforcement efforts. Jason has dedicated much of his career to fighting violent crime and has led highly successful efforts around the country in this effort. The American people are safer because of his work. His commitment to the Department has been unwavering, and I deeply appreciate his 15 years of distinguished service here at Main Justice as well as in Baltimore and New York.

"It is unfortunate that some were so quick to make baseless accusations before they possessed the facts about these operations – accusations that turned out to be without foundation and that have caused a great deal of unnecessary harm and confusion. I hope today’s report acts as a reminder of the dangers of adopting as fact unsubstantiated conclusions before an investigation of the circumstances is completed.

"I want to assure the American people that I, and my colleagues at the Department, will continue to focus on our mission of protecting their rights and their security, and doing so in a manner that is consistent with the high standards of the Department of Justice. This includes continuing to seek justice on behalf of Agent Brian Terry and his loved ones.

"The FBI and the United States Attorney from the Southern District of California have been working for many months with Mexican authorities to identify and apprehend the fugitives involved in the murder of Agent Terry, who made the ultimate sacrifice in serving his country. We now have two men in custody and we will continue to aggressively pursue the remaining fugitives to ensure justice for Agent Terry, his family and his fellow law enforcement agents who put their lives on the line each day to keep this country safe."

Media Roundtable with Secretary Panetta and Ambassador Locke in Beijing, China

Media Roundtable with Secretary Panetta and Ambassador Locke in Beijing, China

Together as One: Honoring Team USA at the White House | The White House

Together as One: Honoring Team USA at the White House | The White House

DOD News Briefing with Brig. Gen. Noble from the Pentagon SEPTEMBER 19, 2012

DOD News Briefing with Brig. Gen. Noble from the Pentagon

U.S. STATE DEPARTMENT DAILY BRIEFING

http://www.google.com/url?q=http://www.addthis.com/bookmark.php&sa=D&sntz=1&usg=AFQjCNFYzDlKeLL_IMEm7XBQrYQa1f17Zg

NEWS FROM AFGHANISTAN

Marines provide security after dismounting an amphibious assault vehicle while performing a direct action raid on an urban terrain facility during pre-deployment training on Fort Pickett, Va., Sept. 8, 2012. U.S. Marine Corps photo by Cpl. Chris Stone.
 

FROM: U.S. DEPARTMENT OF DEFENSE
Combined Force Arrests Senior Insurgent Leader
From an International Security Assistance Force Joint Command News Release

KABUL, Afghanistan, Sept. 19, 2012 - An Afghan and coalition security force arrested the senior Islamic Movement of Uzbekistan leader for Afghanistan's Kunduz province in the province's Qalah-ye Zal district today, military officials reported.

As the security force approached the IMU leader's location, he and another insurgent maneuvered from the compound and displayed hostile intent. The security force positively identified the insurgent threat and engaged. The insurgent was killed, and the IMU leader was arrested without injury. No civilians were harmed during the operation.

The detained senior insurgent leader is believed to have directed the terrorist organization's insurgent activity in Kunduz province, including the financing, manning and provision of weapons and equipment for attacks on Afghan and coalition forces. He also provided training and direction to insurgents, resulting in several attacks using improvised explosive devices.

The security force also detained four suspected insurgents as a result of this operation.

In other operations today:

-- A combined force arrested a Taliban weapons specialist and killed two armed insurgents in the Muqer district of Ghazni province. As the security force approached his location, two armed insurgents opened fire on the Afghan and coalition troops. The security force engaged the armed insurgents, killing them. No civilians were harmed in the exchange. Prior to his arrest, the Taliban weapons specialist planned and executed several attacks against Afghan and coalition forces in the region using mortars and small-arms fire.

-- A combined force detained six suspects during a search for a Haqqani network weapons facilitator in the Gardez district of Paktia province. The sought-after Haqqani facilitator is believed to work with Haqqani and insurgent leaders throughout western Paktia province to acquire and distribute weapons for attacks against Afghan and coalition forces.

-- An Afghan-led, coalition-supported force detained two suspects during a search for a Taliban facilitator in the Kandahar district of Kandahar province. The Taliban facilitator is believed to acquire, transport and distribute lethal supplies for insurgent attacks against Afghan and coalition forces in Kandahar City.

-- A combined force detained two suspects in the Zharay district of Kandahar province. The security force also found and destroyed bomb-making components. No civilians were harmed during the operation.

In a Sept. 17 operation, one of the Haqqani network leaders behind an Aug. 7 attack on a coalition base in Logar province, was killed by a combined security force in Logar's Pul-e Alam district. As the security force approached his location, he maneuvered from the compound and opened fire. The security force returned fire, killing him. Hemat was suspected of having supplied suicide bombers with equipment for the Aug. 7 attack, which wounded several Afghan civilians but failed to cause any significant damage to the coalition base. The security force also seized firearms and safely destroyed some explosives.

TWO ROMANIAN NATIONALS PLEAD GUILTY IN REMOTE HACKING SHCEME

FROM: U.S. DEPARTMENT OF JUSTICE
Monday, September 17, 2012

Two Romanian Nationals Plead Guilty to Participating in Multimillion Dollar Scheme to Remotely Hack into and Steal Payment Card Data from Hundreds of US Merchants’ Computers


Defendants Agree to Serve Seven-year and 21-month Prison Sentences

Two Romanian nationals pleaded guilty today to participating in an international, multimillion-dollar scheme to remotely hack into and steal payment card data from hundreds of U.S. merchants’ computers.

Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division; John P. Kacavas, U.S. Attorney for the District of New Hampshire; and Holly Fraumeni, Resident Agent in Charge of the U.S. Secret Service, Manchester, N.H., Resident Office, announced today that Iulian Dolan, 28, of Craiova, Romania, pleaded guilty to one count of conspiracy to commit computer fraud and two counts of conspiracy to commit access device fraud, and Cezar Butu, 27, of Ploiesti, Romania, pleaded guilty to one count of conspiracy to commit access device fraud.

In their guilty pleas, the defendants admitted that, from in or about 2009-2011, they participated in Romanian-based conspiracies with co-conspirator Adrian-Tiberiu Oprea, who is in U.S. custody and awaiting trial in the District of New Hampshire, to hack into hundreds of U.S.-based computers to steal credit, debit and payment account numbers and associated data (collectively "payment card data") that belonged to U.S. cardholders and then use the stolen payment card data to make unauthorized charges on, and/or transfers of funds from, those cardholders’ accounts (or alternatively to transfer the stolen payment card data to other co-conspirators who would do the same).

At the plea hearings today, federal prosecutors noted that the conspiracies involved more than 146,000 compromised cards and more than $10 million in losses.

Dolan admitted that he, along with Oprea, remotely hacked into U.S. merchants’ "point-of-sale" (POS) or "check out" computer systems, where customers’ payment card data was electronically stored. Specifically, Dolan first remotely scanned the internet to identify U.S.-based vulnerable POS systems with certain remote desktop software applications (RDAs) installed on them. Using these RDAs, Dolan logged onto the targeted POS systems over the internet. These were typically password-protected, so Dolan would attempt to crack the passwords, where necessary, to gain administrative access. He would then remotely install software programs called "keystroke loggers" (or "sniffers") onto the POS systems. These programs would record, and then store, all of the data that was keyed into or swiped through the merchants’ POS systems, including customers’ payment card data.

Dolan periodically remotely hacked back into the compromised merchants’ POS system to retrieve the customers’ payment card data and then electronically transferred the payment card data to various electronic storage locations ("dump sites") that Oprea had set up. Dolan knew that Oprea later attempted to use the stolen payment card data to make unauthorized charges on, or transfers of funds from, the accounts. He also knew that Oprea attempted to sell, or otherwise transfer, the stolen payment card data to other co-conspirators for them to use in a similar manner. During the course of the conspiracies, the co-conspirators hacked into several hundred U.S. merchants’ POS systems. Dolan stole payment card data belonging to approximately 6,000 cardholders and was aware that Oprea was engaged in similar conduct. Dolan received approximately $5,000 - $7,500 in cash and personal property from Oprea for his efforts.

In his plea agreement, Butu admitted that he repeatedly asked Oprea to provide him with stolen payment card data and that Oprea provided him with instructions for how to access the website where Oprea had stored a portion of the stolen payment card data. Butu later attempted to use the stolen payment card data to make unauthorized charges on, or transfers of funds from, the accounts. He also attempted to sell, or otherwise transfer, the stolen payment card data to other co-conspirators for them to use in a similar manner. Butu acquired stolen payment card data from Oprea belonging to approximately 140 cardholders.

In his plea agreement, Dolan has agreed to be sentenced to seven years, and Butu has agreed to be sentenced to 21 months in prison.

The case was investigated by the U.S. Secret Service, with the assistance of the New Hampshire State Police and Romanian authorities.

VA APPROVES $28 MILLION IN GRANTS FOR HOMELESS VETS


New York Mayor Michael Bloomberg, center, and retired Army Gen. David H. Petraeus, director of the CIA, salute a crowd during the Veterans Day Parade in New York, Nov. 11, 2011. U.S. Army photo by Staff Sgt. Teddy Wade
 
FROM: U.S. DEPARTMENT OF VETERANS AFFAIRS
VA Approves $28 Million in Grants for Homeless Veterans
From a Department of Veterans Affairs News

WASHINGTON, Sept. 19, 2012 - The Department of Veterans Affairs today announced it has approved $28.4 million in grants to fund 38 projects in 25 states and the District of Columbia that will provide transitional housing to homeless veterans.

Among these 38 projects, 31 will provide temporary housing to homeless veterans with the goal that they will retain the residence as their own.

"As we drive toward our goal to end homelessness among veterans by 2015, VA continues to find innovative ways to permanently house veterans who were formerly homeless," said Veterans Affairs Secretary Eric K. Shinseki. "Under President [Barack] Obama's leadership, we have made incredible strides in creating programs to aid these brave men and women who have served our Nation so well."

Thirty-one of the grants were awarded through VA's Homeless Providers Grant and Per Diem Program's "Transition in Place" model. The program allows veterans the opportunity to take over payment of a lease instead of moving out after using VA services—substance use counseling, mental health services, job training and more. Other VA programs require veterans living in transitional housing to move out after 24 months.

GPD helps close gaps in available housing for the nation's most vulnerable homeless veterans, including women with children, Native American tribal populations, and veterans with substance use and mental health issues.

Those receiving funding have undergone a rigorous review by teams of experts rating each application under objective criteria to ensure that those funded have the ability to provide the services described and a solid plan to get these Veterans into housing with a high probability of obtaining residential stability and independent living.

"Securing permanent housing is a vital step in the journey of our homeless Veterans," said Dr. Susan Angell, executive director for VA's Veterans Homeless Initiative. "This is the last piece of the puzzle, and it is crucial for them in continuing to lead independent lives."

Community-based programs funded by GPD provide homeless veterans with support services and housing. GPD grants are offered annually as funding is available by VA's National Homeless Program.

Lisa Pape, national director of homeless programs for the Veterans Health Administration which oversees GPD said VHA's focus is creating and strengthening community services around the country so that homeless Veterans get the support they need.

"Our focus is creating a team of community support -- pairing a variety of services, such as mental health support, employment assistance and job training with the essential component of housing," Pape said. "Whether it is aid in overcoming substance use or finding a job, a community helping hand is exactly what these veterans need to lead a better quality of life."

On a single night in 2011, a national count of homeless veterans totaled 67,495, which is 12 percent lower than 76,000 in 2010. As part of the government's five-year plan to eliminate veteran homelessness by 2015, VA has committed almost $1 billion to strengthen programs that prevent and treat the many issues that can lead to veteran homelessness.

The award of grants follows closely with a notice VA published asking interested organizations to submit a nonbinding letter of intent to the Supportive Services for Veteran Families Program to apply for initial and renewal supportive services grants by Sept. 28, 2012. The SSVF Program in the first 10 months of operation has assisted more than 28,000 veterans and their families to prevent or rapidly end homelessness.

SCREENING FOR CONGENITAL HEART DEFECTS IN NEWBORNS

Photo Credit:  CDC
FROM: U.S. CENTERS FOR DISEASE CONTROL

Preventing Infant Deaths from Congenital Heart Defects
Kristine Brite McCormick had a healthy pregnancy and gave birth to her daughter, Cora, on November 30, 2009. Kristine and her husband soon brought baby Cora home, after getting a clean bill of health at the hospital. A few days after arriving home, Kristine was feeding Cora when the baby suddenly stopped breathing. Kristine and her husband rushed Cora to the hospital in minutes, but it was too late. Cora was gone. "We learned that she had an undetected congenital heart defect from the coroner," said Kristine. "Neither of us had ever even heard the term."

In the United States, every 15 minutes a baby is born with a congenital heart defect, the most common type of birth defect in this country.

After Cora’s death, her parents learned about newborn screening for critical congenital heart defects (CCHDs) using pulse oximetry. CCHDs are congenital heart defects that require surgery or intervention in the first year of life. Pulse oximetry is a simple bedside test to determine the amount of oxygen in a baby’s blood and the baby’s pulse rate. The test is done using a machine called a pulse oximeter, with sensors placed on the baby’s skin. The test is painless and takes only a few minutes. Low levels of oxygen in the blood can be the first sign of a CCHD. Cora’s mother Kristine wants to make sure that other parents know about newborn screening for CCHDs. In Indiana, where the McCormicks live, a new law requiring newborn screening for CCHDs is known as Cora’s Law, after Cora McCormick.

Congenital heart defects account for 24 percent of infant deaths due to birth defects. Like Cora, babies born with a CCHD can appear healthy at first and be sent home with their families before their condition is detected. These babies are at risk for serious complications and death within the first few days or weeks of life and often require prolonged hospitalizations and emergency care.

Newborn screening for CCHDs can identify some babies with these conditions before they show signs of illness. Once identified, these babies can be seen by pediatric cardiologists and can receive specialized care and treatment. Treatment can include medications and surgery. Detecting and treating CCHDs soon after birth can help to prevent death and disability early in life and can potentially improve the long-term health of individuals with these conditions.

In September 2011, U.S. Department of Health and Human Services Secretary Kathleen Sebelius approved adding CCHDs to the recommended list of conditions that are included in newborn screening. As newborn screening for CCHDs is implemented throughout the United States, the Centers for Disease Control and Prevention (CDC) will play an important role in helping the public understand the effectiveness of such screening. The National Center on Birth Defects and Developmental Disabilities (NCBDDD) at CDC is helping assess how well screening programs are detecting CCHDs. NCBDDD also is researching the costs associated with CCHD screening. These activities will help states make decisions about adding these conditions to their existing newborn screening programs and will provide information that will be helpful for states with new or proposed CCHD screening programs.

"While we’ll never know for sure if it would have made a difference for Cora, we sure wish she’d had the simple screening. I hope for a day when no mother finds out about her child’s heart defect from the coroner," Kristine said. "My ultimate hope is that one day no baby is born with a broken heart and that congenital heart defects are prevented in every pregnancy."

JACKAL STONE 2012 SPECIAL OPERATIONS EXERCISE

Members of the Romanian special forces parachute into a drop zone during a demonstration for Ivo Josipovic, the president of Croatia, at the Josip Jovic Air Base in Udbina, Croatia, Sept. 17, 2012. Josipovic visited the air base during Jackal Stone 2012's media day to observe special forces representing 11 nations in this year's training event. U.S. Army photo by Sgt. Kyle Wagoner


Jackal Stone Promotes Special Operations Partnerships

By Donna Miles
American Forces Press Service

WASHINGTON, Sept. 18, 2012 - The scenario for the Jackal Stone 2012 special operations exercise taking place in Croatia reads like a Hollywood thriller.

A criminal gang infiltrated an industrial plant in the fictional nation of Freedonia, stealing nuclear, biological and chemical material to pass to a terrorist organization. Commandos from U.S. Special Operations Command Europe teamed up with special police from Croatia's Interior Ministry to track down the perpetrators and recover the material.

The recovery – following an action-packed mission – wasn't the end of the story. An analysis revealed that the insurgents behind the plot had tentacles extending deep into Freedonia. They had to be stopped.

Freedonia turned for help to the United Nations, which in turn, called on NATO to intervene with military forces. NATO declined, citing force commitments in Afghanistan and elsewhere, but urged individual member nations to form a coalition.

Eleven nations stepped forward, with the United States taking the lead. U.S. and Romanian company commanders command two ground task forces, and a Norwegian is leading the maritime component.

"We formed this coalition, and now we are going to take on the Freedonian insurgency problem," Army Maj. Gen. Michael S. Repass, commander of Special Operations Command Europe, told American Forces Press Service by phone from Croatia.

That sets the stage for Jackal Stone, an annual multinational exercise designed to build special operations capabilities and improve interoperability among European partner nations.

The two-part exercise began earlier this month with a bilateral U.S.-Croatian counterterrorism exercise and expanded into a multinational, multi-echelon counterinsurgency scenario that continues into next week.

About 700 U.S. participants are on the ground, working alongside special operators and enabling forces from 10 partner nations as they apply capabilities many have honed together in Afghanistan.

"To the extent possible, Afghanistan has informed everything that we are doing during this exercise," said Repass, who serves as Jackal Stone's coalition commander.

About 60 role-players, many portraying insurgents, add realism to the scenario.

"This is a live exercise, full up," Repass said. "We have role players, people who have taken on the personas of insurgents and are living those personas. And we have multiple sources of intelligence collecting on these personas in the operating environment."

That includes many of the intelligence sources in use in Afghanistan, including human intelligence and imagery from intelligence, surveillance and reconnaissance aircraft flying overhead, he said. Participants also conduct post-mission analyses, applying biometrics from a database created especially for the exercise, and exploiting intelligence from seized cell phones and computers.

"So we have a very sophisticated operation at the tactical level that will feed intelligence upward, creating a much more robust intelligence picture," Repass said. "At the same time, we are getting national-level Freedonian and international intelligence feeding into us, and we are pushing that down to the tactical units."
 


Special operations forces from the United States, Croatia, and Romania prepare to assault a building during a demonstration of their tactical capabilities for Ivo Josipovic, the president of Croatia, at the Josip Jovic Air Base in Udbina, Croatia, Sept. 17, 2012. Josipovic visited the air base during Jackal Stone 2012's media day to observe special forces representing 11 nations in this year's training event. U.S. Army photo by Sgt. Kyle Wagoner

While exercising as they would operate in a real-world scenario, the participants are improving their ability to work together as they apply what NATO calls "smart defense," Repass said.

The basic premise is to leverage each other's capabilities to build stronger teams to serve in a coalition or NATO operation, he explained. "You provide tactical units up to your level of ability and your nation's willingness to do so, and you team up with another capable partner," he said.

Repass pointed to the International Security Assistance Force special operations structure in Afghanistan as a tangible demonstration of that concept. Stood up about four years ago, it has grown to an estimated 2,000 operators from about 18 countries.

Jackal Stone is building on this capability, Repass said, strengthening participants' collective ability to plan and execute combined and joint multinational operations with host-nation support from civil and governmental agencies.

That's fundamental to realizing the vision of Navy Adm. William H. McRaven, the Special Operations Command commander, of a special operations force network, postured for global challenges.

While ensuring special operations have the equipment and technical ability to operate together, Repass said the exercise helps strengthen the relationships that underpin their operations.

"One of the fundamental truths of this whole endeavor is that you can't build trust in a crisis. You have to have long relationships, and this is strictly done in the human domain," he said.

"The more we develop these relationships, the better we will work together in the future," Repass said. "The more capable and interoperable our militaries are, the better we will be as a community to achieve common goals of security, stability and peace."

Search This Blog

Translate

White House.gov Press Office Feed