Training objectives must support the mission profile and meet the commanders desired end state. Prior to the 56TH train up at the National Training Center (NTC) the deployment location changed from Iraq to Afghanistan (case study). Changes to mission essential tasks were not identified prior to NTC, resulting in the BCT training on collective tasks and validated during MRE based on the Iraq mission profile. However, the shift to the Afghanistan mission profile created gaps in training not identified until units arrived at Bagram Air Field (BAF). i.e. the BCT had to establish an MRAP drivers training program at BAF extending the RSOI process. Training gaps were not limited to company level shortfalls as battalion and brigade staffs were not able to anticipate potential threats and capitalize on opportunities. (case study 2)
The Naval Aviation Command Logistics Information Management Information System (NALCOMIS) Optimized Organizational Maintenance Activity (OOMA) is the Navy and Marine Corps’ primary aviation maintenance documentation system. Introduced to the fleet in 2007 by the Space and Naval Warfare Systems Command (SPAWARSYSCOM), it provided significant capability improvements such as the creation of the Auto Log-Sets, thus allowing the Naval Aviation Enterprise to track the repair history, Technical Directives, etc... for individual repairable components throughout its life. The developers failed to ensure integrity of the Automated Log Set by not limiting the amount of times a component with the same part and serial number could be created.
Officers, Warrant Officers, and enlisted personnel have had to adapt to a new way of doing business. The language bridging alone from legacy to GCSS-A has relied on the Warrant Officer to educate and train the forces across the Army. This change has also caused a learning gap between those in the field and those detached from
4.12.1. Project objective: To Expedite Change for Aegis Training Courses to ensure students are equipped with the most up to date information to carry out their duties at Sea;
Develop and integrated a comprehensive 40-hour Integrated MTC Tool Suite training program that provided training to MTC and unit staffs to efficiently plan, design and executes exercises through the primary use of G27 Tool Suite; Exercise Support Application (ESA), Exercise Design Tool (EDT), Virtual OPFOR Academy (VOA), and Information Operation Network (ION). Validated the MTC Integrated Tool Suite training program and team certification to ensure a standardization of training and DATE compliancy. Provided briefings to the 84th Training Command and AVNCoE Commanding Generals, the United Kingdom ISR Bde Commander, NTC, JMRC senior leaders and individual staffs to continuously fostered enduring partnerships that resulted in a substantial growth in recognition and usage of G27’s web-enabled
In support of my capstone project, I assessed and will submit a redesigned proposal with developmental recommendations for reformation of a solid POI for the SPCC that takes place at the Army Logistics University. In this, I have identified the foremost purpose for this redesign as the following: The investment in the education and training of rising leadership is vital to the long-term success of our sustainment support staff and the services provided. With this course providing training in modular force operations for newly selected command designees that enables them to function effectively throughout their command tour it is very important to make sure that the training is substantive. Therefore the main focus is to assure that training is current and emerging sustainment doctrine and leadership topics for commanders on the National Guard, Reservist and Active Duty levels is most essential.
This security profile of the Department of Veterans Affairs (VA) is based on two documents of public record. The first is the published VA Handbook 6500 (VAH 6500) which defined policy and procedures for systems within the purview of the VA (Department of Veterans Affairs, 2007). The second document is the Federal Information Security Management Act Assessment for FY 20011 commissioned by the VA Office of Inspector General (OIG) and performed by Ernst & Young in accordance with Federal Information Security Management Act (FISMA) guidelines (VA Office of Inspector General, 2012, p. i).
Verify each Soldier’s name, rank, and SSN with the AAA-162, utilizing the Soldiers CAC Identification Card and have Soldiers initial by their name. Soldiers must also verify that their deployment non-availability status and reason codes are correct.
The National Defense Administration Act (NDAA) is “The comprehensive legislation to authorize the budget authority of the Department of Defense and the national security programs of the Department of Energy”.(https://verdict.justia.com/2011/12/21/the-national-defense-authorization-act-explained). It is a bill that basically states that the president can detain American Citizens without trial or without corpus habeas protection. Corpus habeas protection is the right to have a speedy trial as well as properly being detained for the crime you were accused for. It is an annual appropriations bill that funds the department of defense. There has been a lot of controversy about this act. This act gives permission to the president and future presidents of the United States to incarcerate a person without having a fair trial. According to WWW. TheNewAmerican.com President Obama said that he will never use it. But what about future corrupt
She assisted with reimaging 81 PCs to resolve security client applications issues, and another 30 PCs to complete clean up actions due to an electronic spillage occurrence. Her attention to detail conducting several walkthroughs of 8 LNSC spaces and organizing 13 DIVO records lead to a well-earned passing grade for the N8’s Department In The Spotlight (DITS) inspection. As N8 department Career Counselor, she was directly responsible for 6 career development boards resulting in 2 Sailors advancing in rank to Petty Officer Third Class.
Federal Information Security Management Act (FISMA) – This refers to a U.S. law that was enacted in 2002 to lay down a comprehensive framework on how government information are protected. This also relates to operations and assets against natural or man-made threats. This act assigns responsibilities to federal agencies that re responsible for system and data protection, ensuring that all elements of FISMA are complied to, and integration of security measures throughout federal agencies in cost-effective, timely and efficient manner (. FISMA regulations require that inspection of the agencies be done annually through an independent evaluation (Gibson, 2010, pg. 59). The evaluation seeks to test the effectiveness of policies and practices in agencies and compile a report that identifies the state of compliance of that agency.
The National Defense Authorization Act (NDAA) for Fiscal Year 2012 (H.R. 1540) was introduced into the 112th Congress on April 14, 2011 by Representative Howard P. "Buck" McKeon (R-CA), chairman of the Armed Services Committee (Library of Congress, 2012). The NDAA 2012 was cosponsored by Rep. Adam Smith (D-WA), a ranking member of the Armed Services Committee. This bill essentially authorizes annually federal funding for all Department of Defense operations, including the military, and defense operations within the Department of Energy (OpenCongress, 2012). The amount budgeted for the 2012 fiscal year was $662 billion (Mariner, 2011, para. 14), which represents about 73 percent of the total defense budget and just over 18% of the entire federal budget (Chantrill, 2012).
Quality and Customer Service: Officer Goetsch handles complex and sensitive ASC situations with minimal supervision. Officer Goetsch generally performs his N600 case work within the 30-day benchmark per regional guidelines. Of the twelve random selected cases, none had noted errors. He has had only one noted error with administrative duties in matching STAT and webTA. He has reporting duties relating to biometric counts that have had no errors. Officer Goetsch runs the SMART Report for Extension Sticker Issuance report, G-22 log and monthly sticker usage report to maintain usable secure
As mentioned in the overview, Chief Fazzini is highlighting the importance of NIMS to colleges and universities. He is providing an expert level of understanding of this system, developed in March of 2004 by the Department of Homeland Security, to administrators and college
To be honest before filling out this application I had never heard of the National Federation of Independent Business. Since then I have done my research and believe I have a grasp of who the NFIB is and what they stand for. Being a small businesses owner and coming from a family of small business owners, I appreciate the efforts of the NFIB.