The Next Intel Leak May Not Resemble the Most Recent One, Expert Warns

The Next Intel Leak May Not Resemble the Most Recent One, Expert Warns

As the Department of Defense begins a review of its policies and practices for handling classified information in the wake of a massive intelligence leak, a national security expert cautions that the next intel leak may not resemble the one that just happened—and so officials must try to be proactive in considering next steps.

“You don’t protect against just the last threat,” Sina Beaghley, a senior international and defense policy researcher at RAND, said in an interview with Air & Space Forces Magazine. “You have to address that, you have to close the gaps. But you also have to think about where technology, culture, all of those things are leading and then posture the government to be able to react to it, both in the recruiting world and in terms of trust, vetting, and mitigation.”

The question of how the military handles security clearances and classified information has been hotly debated ever since a trove of classified information on the war in Ukraine, the Indo-Pacific and Middle East military theaters, and other sensitive subjects were leaked in an online group chat. Airman 1st Class Jack Teixeira was arrested April 13 in connection with the leak, and, in the days since, Defense Secretary Lloyd Austin III and Air Force Secretary Frank Kendall directed separate reviews of their departments’ security practices.

On the Air Force side, the corrective action includes a review of the Massachusetts Air National Guard’s 102nd Intelligence Wing, Teixeira’s unit; a headquarters-level appraisal of Air Force policies; and a stand-down within the next 30 days for all Air Force and Space Force units to review their security practices and conduct training as necessary.

Approximately 700,000 people in the Department of the Air Force have security clearances, an Air Force spokesperson told Air & Space Forces Magazine. While the Defense Counterintelligence and Security Agency does not break down the average timelines to obtain a security clearance by military branch, it takes an average of 57 days to secure an initial secret clearance and 51 days to undergo a secret periodic reinvestigation. It takes an average of 94 days to obtain an initial top secret clearance and 115 days to undergo a top secret periodic reinvestigation.

At a Senate Appropriations defense subcommittee hearing and in a memo sent to the entire department, Kendall, Air Force Chief of Staff Gen. Charles Q. Brown Jr., and Chief of Space Operations B. Chance Saltzman stressed the importance of setting and following standards for who “needs to know” certain sensitive information.

“Enforcing the need-to-know requirement is a chain of command responsibility—these are important, conscious choices leaders must make at every level,” the three officials wrote.

But enforcing “need-to-know” may be easier said than done.

“Who makes that judgment?” Beaghley asked. “Need-to-know is partly a self-policed activity: I shouldn’t be searching something totally beyond what my mission is. But who knows exactly what my mission is? How do you determine what my permissions should be? Especially when job functions and tasks can be fluid in a national security environment.”

The U.S. government began sharing classified information more widely among authorized individuals after the Sept. 11, 2001 terror attacks, after criticism that national security agencies did not share information and coordination enough. Even now, officials call for even more info-sharing and cooperation across organizations.

The challenge in placing limits on that sharing would be deciding what information individuals need to do their job within the complex national security bureaucracy.

Access is one of several areas where the military and the government as a whole has to strike a balance between trusting individuals and protecting sensitive information.

Starting in 2018, the government launched Trusted Workforce 2.0, a multiyear effort intended to make the vetting process faster by implementing a single system. Instead of reviewing individuals with security clearances every five to 10 years, the new system continuously vets individuals via automated record checks of criminal, terrorism, and financial databases and public records. All Air Force and Space Force personnel with security clearances are subject to continuous security vetting, an Air Force spokesperson said.

But while Trusted Workforce 2.0 does improve the time it takes officials to get important information on security clearance holders, there are still instances when individuals don’t set off any triggers but still present a threat.

“When you have an individual who’s been cleared and been determined to by the government to be trustworthy at a certain level which, in this case, as I understand, is the highest level, what do you do when that person decides to not do what they said they would do as far as non-disclosure?” Beaghley asked. “How do you mitigate that?”

One commonly-suggested solution is to monitor a security clearance holder’s social media presence. There is policy for how government agencies can seek out information about a candidate’s public social media presence at the beginning of a security clearance investigation, and some agencies do so, Beaghley said. There have also been a few test programs that have gathered and analyzed information about individuals’ public activity on social media after they receive their security clearance, but reporting is mixed on how productive those programs were for the resources invested.

Even if there was a successful program that included public social media monitoring as part of a continuous vetting process, monitors are not currently allowed to access a private chat room like the one in which Teixeira allegedly leaked classified information, at least as part of a normal background investigation. It also may not be knowable under which social media profiles or handles a security clearance holder posts.

Beyond social media, the government has also directed employees to report on coworkers exhibiting suspicious behavior. Various federal government agencies also have insider threat programs that monitor employees’ computer activity for anomalous behavior.

Though all these systems complement each other, there are still possible blind spots that could allow for misuse of access. For example, if individuals with security clearances print out a classified document, they generally would not be inspected when they leave a classified facility, Beaghley said.

“In most cases, no one’s patting you down, looking through your bags. So here is the possibility that a trusted individual with access can print out classified material and quite literally walk out the door,” she explained.

While some have called for systems to monitor the printing of classified materials, there are still other ways to create and share classified information—all of those ways is part of what is straining the government’s current information security system.

PowerPoints, PDFs, Word documents, emails, video teleconferences, and chat messages can all be forms of secret or top secret records that must be marked with the appropriate classification level. Each new form of digital record also presents a challenge for how to protect it.

“We live in a world where technology has allowed for sharing of information in a much more robust way,” Beaghley said. “Technology has enabled a lot more national security secret-making and secret-sharing.”

All of these factors mean that even when the Air Force and the Department of Defense complete their current reviews of information security practices, they should continue to reevaluate their practices as technologies change, Beaghley said.

“There’s no silver bullet,” said Beaghley. “The next leak likely won’t look like this particular situation. … The government is evaluating options, learning from prior scenarios, but it’s really important to think about future scenarios and try to plan for and mitigate against the things that have not yet happened but could potentially in the future.”

China Shows ‘Concerning Lack of Interest’ in Talks, DOD Says

China Shows ‘Concerning Lack of Interest’ in Talks, DOD Says

U.S. officials expressed growing concern April 18 about the lack of communication between the Chinese and American militaries in light of increasingly aggressive actions by Beijing. It has now been nearly five months since Secretary of Defense Lloyd J. Austin III last spoke to his Chinese counterpart, despite a number of high-profile incidents involving the countries’ forces.

In written testimony to the House Armed Services Committee, principal deputy assistant secretary of defense for Indo-Pacific security affairs Jedidiah P. Royal said China had “a concerning lack of interest in the important lines of communication that underpin a stable defense relationship between our countries.”

In addition to Austin’s lack of communication with his Chinese counterpart, Secretary of State Antony Blinken’s planned trip to China—originally set for February—has been postponed indefinitely.

“There is clearly a high level of frustration with the lack of engagement from Beijing,” Zack Cooper, a China expert at the American Enterprise Institute, told Air & Space Forces Magazine.

In a November meeting with Chinese leader Xi Jinping, President Joe Biden underscored the importance of avoiding conflict and maintaining open lines of communication. And later that month, Austin met China’s then-Minister of National Defense Wei Fenghe in Cambodia.

But since then, attempts to contact high-level officials from the Chinese military after a Chinese intercept of U.S. Air Force RC-135 over the South China Sea and the U.S. shoot-down of a Chinese spy balloon have been rebuffed, U.S. officials said.

“The Department of Defense believes strongly in maintaining open lines of communication between Washington and Beijing to ensure competition does not veer into conflict,” Royal said. “Immediately after downing the [People’s Republic of China] high-altitude balloon in February, the Department submitted a request for a call between Secretary Austin and the PRC Minister of National Defense because we wanted to ensure there was no misunderstanding or miscalculation in Beijing about our actions. Unfortunately, the PRC declined our request. This was not far from the first time that the PRC has declined invitations to communicate from the Secretary, the Chairman of the Joint Chiefs of Staff, or other Department officials.”

China’s military, officially called the People’s Liberation Army or PLA, has also declined longstanding, lower-level requests from top regional U.S. military commanders to meet their military counterparts—requests that predate the latest incidents, officials said.

“I’ve had a standing ask to meet with the Eastern Theater commander and the Southern Theater commander from the PLA for my entire time in his job, and they have yet to accept it,” Adm. John C. Aquilino, the head of U.S. Indo-Pacific Command (INDOPACOM) since 2021, told lawmakers. ”The theme here is we continue to try to engage with our partner, but there’s a different opinion there.”

Experts noted that China views communications, or the lack thereof, between officials as strategic. China’s current unwillingness to engage in talks comes as it claims America is seeking to upend the status quo in Taiwan through arms sales to the island, Congressional engagements with Taiwanese leaders, and the Biden administration’s trade policy towards China.

The PLA has been more forceful in its activities around Taiwan since then-Speaker of the House Nancy Pelosi (D.-Calif.) visited the self-governing island in August 2022. After Taiwanese president Tsai Ing-wen met with current House Speaker Rep. Kevin McCarthy (R.-Calif.) and other lawmakers during an unofficial visit to the U.S. earlier this month, China staged aircraft carrier operations and live-fire military drills that practiced a blockade of Taiwan, which the Chinese government claims as a rebel province. U.S. officials have said the increased Chinese military activity around the island is the “new normal.”

In addition to China’s public actions, not talking to high-level American officials sends an implicit message of displeasure to Washington, experts said.

“I think that the Chinese are withholding dialogue from us in the hope that they will have some impact on our policies,” said Bonnie Glaser, a China expert at the German Marshall Fund of the United States. “I think they’re trying to get our attention. They’re going to have to decide at some point whether or not they want to engage.”

The U.S. says its interest in open military-to-military channels stems not from a desire to ligate policy but to avoid disaster. In late December, the U.S. claimed a PLA fighter came within 20 feet of a U.S. Air Force RC-135 in an “unsafe” maneuver. China has intercepted other U.S. military flights and allegedly harassed a vessel from the Philippines, a U.S. ally, with a high-powered laser.

“In just the past 12 months, PLA aircraft and maritime vessels have continued to conduct inherently risky intercepts against U.S., ally, and partner assets in the air and at sea, increasing the unacceptable danger of an accident,” Royal said in his testimony.

U.S. officials said it is ultimately in China’s interest to be on speaking terms with the U.S. if a serious incident occurs—a position echoed by regional security experts.

“They’re treating us like communications channels are only a favor to us, when in fact, it’s of mutual benefit,” said Patrick Cronin of the Hudson Institute. “There will be other surprises. When they precipitate a crisis, they better answer the phone, because the escalation will put the entire region at risk.”

Air Force Picks New Guard Locations for F-35, F-15EX Fighters

Air Force Picks New Guard Locations for F-35, F-15EX Fighters

The Air Force announced locations for two new F-15EX squadrons and a new F-35 unit on April 18, all within the Air National Guard. 

The preferred location for the new F-35A squadron is Barnes Air National Guard Base, Mass., while the F-15EXs are slated for Naval Air Station Joint Reserve Base New Orleans, La., and Fresno Air National Guard Base, Calif. 

All three bases currently operate older F-15C/D model fighters which the Air Force wants to retire in the coming years. 

At Barnes, the 104th Fighter Wing would gain 18 new F-35s. At NAS Joint Reserve Base New Orleans and Fresno, the 159th Fighter Wing and the 144th Fighter Wing would each get 18 F-15EXs. 

The selection of all three bases is contingent on an environmental impact analysis, which will be completed by the spring of 2024 before a final selection, the Air Force said. The service did not say when the new aircraft might arrive.

Air National Guard officials have said they want to assign F-35s or F-15EXs to every ANG unit that currently flies the F-15. In 2020, the Air Force announced that Jacksonville Air National Guard Base, Fla., will get the fifth-generation F-35, while Kingsley Field and Portland Air National Guard Base, both in Oregon, will get the fourth-gen F-15EX, a heavily-upgraded version of the F-15E. 

The ANG already has one location with the F-35, the 158th Fighter Wing at Burlington Air National Guard Base, Vt. Guard units at Truax Field, Wisc., and Dannelly Field, Ala., are slated to start receiving the F-35 later this year, which will replace their F-16s.

Those locations and units are in addition to the F-35’s Active-Duty units and locations, including: 

  • Eielson Air Force Base, Alaska 
  • Hill Air Force Base, Utah 
  • Luke Air Force Base, Ariz. 
  • Nellis Air Force Base, Nev. 
  • RAF Lakenheath, U.K. 
  • Tyndall Air Force Base, Fla. (planned) 

Air Force Reserve is also slated to get F-35s at Naval Air Station Joint Reserve Base Fort Worth, Texas. 

The F-15EX, meanwhile, is still undergoing testing at Eglin Air Force Base, Fla. The Air Force has yet to announce any Active-Duty locations for the fighter. 

Lockheed Will Miss Its Goal for F-35 Deliveries in 2023

Lockheed Will Miss Its Goal for F-35 Deliveries in 2023

Lockheed Martin will deliver fewer F-35s than expected in 2023 due to delays with the Tech Refresh 3 update, as well as the three-month pause in engine deliveries, but Chief Executive Officer Jim Taiclet expects the government will sign an F-35 Performance Based Logistics contract by the end of the year.

Speaking on a first-quarter earnings call with financial reporters April 18, Taiclet said “we do expect a fraction of total expected 2023 deliveries to be impacted later this year, due to both software maturation related to Technology Refresh 3 and hardware delivery timing.”

He did not specify how many aircraft the company would be short, but the goal for delivery in 2023 was 156 airplanes.

Part of the delay is also due to the three-month halt in F135 engine deliveries from Raytheon’s Pratt & Whitney to Lockheed, which Tacilet noted are provided as government-furnished equipment. Lockheed was prevented from conducting delivery test flights—and hence, deliveries—of F-35s for three months while Pratt investigated a harmonic vibration problem discovered after the crash of an F-35B at Lockheed’s Fort Worth, Texas plant in December 2022.

Company chief financial officer Jay Malave added later that the smaller number of deliveries were also due to Tech Refresh 3 (TR-3) “hardware delivery timing.” Taiclet noted that TR-3 is in flight testing now.

The TR-3 includes new computers, processors, and software that provide the basis of the F-35’s Block 4 upgrade, which in turn will feature new sensors, expanded electronic warfare, and information gathering and dissemination capabilities.  

“We’re in the … very late innings of fully implementing” TR-3, Taiclet said. The upgrade “gives us much greater capability to really make the F-35 a true ‘edge compute’ node, and an open architecture ‘Internet of Things’ construct system.”

Taiclet outlined the three elements of an edge-computing node in a 5G system as

  • Data storage onboard the vehicle
  • Data processing onboard the vehicle
  • Multi-pass ability to get data back to the cloud

All of that is “coming together” in the form of many subcomponents, he added—it’s a “leading edge” accomplishment for the aerospace industry, he said.

“There have been some delays in some of the hardware and software,” Taiclet acknowledged. “But we’re really in the in the very late innings of getting this all together. We’re literally in flight test right now. And we will…wrap all that up by October or December.”

After that, “we’ve got to see what the test results are, and work with the government to define exactly when everybody’s ready to go and implement in our production system … those software loads, and that’s where we’re at now.”

Taiclet also stressed the project’s high degree of difficulty and said the firm is “going to make sure that it’s done right.”

Given the planned increases in U.S. purchases of F-35s in fiscal year 2024—83 airplanes—and future budgets, as well as international orders for F-35s, the program is in good shape, Taiclet said, noting Canada’s decision to buy 88 of the jets and Germany’s recent order.

He did not, however, discuss the Air Force’s decision not to proceed with a new engine for the F-35.

Kendall Promises ‘Full-Court Press’ Security Review After Intel Leak

Kendall Promises ‘Full-Court Press’ Security Review After Intel Leak

Air Force Secretary Frank Kendall told lawmakers his department is committed to a complete review of its security practices after an Airman allegedly shared a trove of classified documents on the war in Ukraine, the Indo-Pacific and Middle East military theaters, and other sensitive subjects on an online group chat.

In the meantime, the Air National Guard unit to which the accused Airman was assigned has been temporarily relieved of its intelligence mission while a second, more focused review unfolds, an Air Force spokeswoman told Air & Space Forces Magazine.

“There is a full-court press going on about this,” Kendall told the Senate Appropriations defense subcommittee on April 18. “We are all disturbed about it and we are working very very hard to get to the bottom of it and take corrective action.”

Besides the ongoing criminal investigation of Airman 1st Class Jack Teixeira, the Air National Guardsman accused of leaking the documents, Kendall said the DAF has initiated three efforts to get a better handle on its policies for protecting classified information:

First, the Air Force Inspector General is reviewing the Massachusetts Air National Guard’s 102nd Intelligence Wing, Teixeira’s unit, to see if anything went wrong in terms of following Air Force security policies. In the meantime, the 102nd Intelligence Wing “is not currently performing its assigned intelligence mission,” Air Forces spokeswoman Ann Stefanek said. The 102nd’s mission has been temporarily reassigned to other Air Force organizations, she said.

Second, the department is conducting a “complete review of our policies themselves within the staff to make sure our policies are adequate,” Kendall said.

Third, units across the entire Air Force and Space Force will conduct a stand-down for Airmen and Guardians to review their security practices and conduct training as necessary. The stand-down is to be conducted in the next 30 days.

“Obviously we have got to tighten up our policies and our practices to make sure this doesn’t happen again,” the secretary added.

Kendall’s announcement comes the day after Defense Secretary Lloyd J. Austin III asked the entire military to review its information security programs, policies, and procedures. The initial findings of the review are due in 45 days, along with any recommendation to improve those systems. 

“Adverse security incidents are a stark reminder that adherence to required security procedures underpin all aspects of the Department of Defense mission, and we must continually reinforce these requirements to keep pace with evolving threats,” Austin wrote in an April 17 memo about the review. “It is therefore essential to carefully examine the sufficiency of, and compliance with, all security policies and procedures.”

Kendall said one of the key points of the Air Force-wide review is to emphasize the principle of ‘need to know.’ Earlier in the hearing, Air Force Chief of Staff Gen. Charles Q. Brown Jr. said that Teixeira, a cyber transport systems journeyman, had access to sensitive information but did not necessary have a need to know some of that information.

“We need to enforce [need to know] much more rigorously than it appears to have been in this case,” Kendall said.

In a memo sent to Airmen and Guardians on April 18 and provided to Air & Space Forces Magazine, Kendall, Brown, and Chief of Space Operations Gen. B. Chance Saltzman made the point even more finely.

“Safeguarding national security information is not limited to ensuring personnel possess the appropriate clearance and training, they must also have the need to know,” they wrote. “All of us are responsible for obeying and enforcing the rules that protect classified information.”

The department leaders said Airmen and Guardians should be “continually alert” for personnel accessing classified information without the need to know.

The advice echoes analyses made by the National Insider Threat Center at Carnegie Mellon’s Software Engineering Institute, which studies insider threats—instances where individuals with authorized access to an organization’s assets misuse that access to the detriment of the organization.

“This is not a technology problem, it’s a people problem,” Daniel Costa, technical manager of enterprise threat and vulnerability management at SEI, previously told Air & Space Forces Magazine. “We use technology to help us manage those risks, but at the end of the day—especially in terms of making the organization less mistake-prone—that largely comes down to management-related and HR-related activities.”

US, South Korea Begin New Round of Air Exercises

US, South Korea Begin New Round of Air Exercises

The U.S. and South Korea began another round of air drills April 17—days after U.S. Air Force B-52 bombers flew over the Korean Peninsula as the two countries follow through on their pledge to conduct more joint air exercises. 

The latest exercise, dubbed Korea Flying Training, kicked off at Gwangju Air Base, according to the South Korean Ministry of Defense. Japanese and Korean news agencies reported approximately 110 aircraft will be participating in the drills, which will last until April 28. 

Images released by the 8th Fighter Wing at Kunsan Air Base, South Korea, show U.S. Air Force F-16s and U.S. Marine Corps F-35s and F/A-18s arriving at the base on April 13 and 14. 

Also on April 14, a pair of USAF B-52s flew alongside American F-16s and South Korean F-35s over the Republic of Korea. 

“The training offered the alliance its latest opportunity to further strengthen its interoperability by demonstrating a combined defense capability and providing extended deterrence in the defense of the Korean Peninsula,” Pacific Air Forces said in a statement.

B-52s are in the region as part of a Bomber Task Force deployment to Andersen Air Force Base, Guam that began a few weeks ago. 

Korea Flying Training comes a little more than five months after the joint air exercise Vigilant Storm, which mostly took place in November 2022. Those drills included about 1,600 sorties and 240 aircraft—roughly 100 of them USAF planes. 

In early January, Secretary of Defense Lloyd J. Austin III said during a visit the U.S. would step up its military exercises with South Korea to include expanded use of air assets such as fifth-generation fighters and strategic bombers.  

Since then, B-1s have flown with South Korean fighters four times, and B-52s have now done so twice. 

The step-up in exercises and training has drawn a sharp response from North Korea, which has tested a range of missiles, including ICBMs, in recent months. North Korean leader Kim Jong-un has embarked on an ambitious missile program that saw a record number of tests in 2022. Tensions have continued to build on the Korean Peninsula, leading some South Korean politicians to publicly speculate about developing or hosting nuclear weapons in the country, something that hasn’t happened since 1991. In addition to the air drills, South Korea, Japan, and the U.S. held joint missile defense exercises on April 17.

After Intel Leak, Pentagon Launches ‘Comprehensive’ Review of Security Programs

After Intel Leak, Pentagon Launches ‘Comprehensive’ Review of Security Programs

Four days after a member of the Massachusetts Air National Guard was arrested in connection to a massive leak of secret and sensitive information online, Defense Secretary Lloyd J. Austin III has directed a “comprehensive” review of the military’s security programs, policies, and procedures, deputy Pentagon press secretary Sabrina Singh told reporters April 17.

The initial findings of the review are due in 45 days, along with any recommendations to improve Pentagon policies and procedures related to the protection of classified information. The effort is being led by undersecretary of Defense for intelligence and security Ronald S. Moultrie, in coordination with Chief Information Officer John Sherman and Director of Administration and Management Michael Donley.

Singh also said she was not aware of any investigation of the unit or supervisor for Airman 1st Class Jack Teixeira, the cyber transport systems journeyman who was arrested last week. Teixeira is a member of the 102nd Intelligence Wing.

The recent leak has raised questions and concerns about how the military can better protect itself from insider threats—individuals with authorized access to an organization’s assets who use that access to either maliciously or unintentionally hurt the organization. Asked if the Pentagon was reviewing its vetting process for individuals requesting a security clearance, Singh defended the system in place as “very robust,” noting that it includes an FBI background check and a review of family, friends, former coworkers, social media posts, and finances.

“I think we are pretty confident in how the FBI does conduct its background checks when it comes to somebody being able to obtain a security clearance,” Singh said. “That is why we are doing this process. If there is something that we feel that needs to be added to the background check process, I think that’s what this review will certainly lend itself to.”

Teixeira allegedly released a trove of classified details on Russia’s invasion of Ukraine, along with sensitive briefing materials and analysis on the Indo-Pacific and Middle East theaters, on Discord, an online social media platform popular with video gamers. Government agencies with access to classified computer networks are supposed to have insider threat detection and prevention programs, but no program is 100 percent airtight.

“There’s an inherent risk that comes along with doing business,” Daniel Costa, technical manager of enterprise threat and vulnerability management at The National Insider Threat Center at Carnegie Mellon’s Software Engineering Institute, previously told Air & Spaces Forces Magazine.

“What we’re talking about is human nature, and thinking about insider threats as an inherent risk to organizations requires real careful planning and organization-wide participation to reduce that risk to acceptable levels,” Costa said.

Part of what makes insider threat prevention programs so difficult is that they require a “whole-of-enterprise” approach to be effective, Costa said. That can include involving management and human resources to monitor for warning signs such as policy violations, disruptive behavior, personal financial difficulty, or changes in working patterns.

“This is not a technology problem, it’s a people problem,” Costa said. “We use technology to help us manage those risks, but at the end of the day—especially in terms of making the organization less mistake-prone—that largely comes down to management-related and HR-related activities.”

It may also take “right-sizing” who has access to sensitive assets, which is a challenging task in organizations as large as the Department of Defense, Costa said.

The military security clearance system is a frequent topic of study among national security experts, since it is often difficult to screen applicants for risk factors.

“Federal government security officers responsible for personnel vetting and insider threat detection may need to pay even closer attention to the answers to the questions of ‘associations’ now to assess the trustworthiness of current cleared employees and contractors who are continuously vetted as well as prospective clearance holders,” RAND researchers David Stebbins and Sina Beaghley wrote in a commentary piece after the Jan. 6, 2021, U.S. Capitol riots, where several rioters were also members of the military and police.

At the press briefing, Singh said the purpose of the new review is to identify better security practices.

“This is exactly what this effort internally here in the building is designed to look at,” she said. “Is there something else that we need to do to add on to a process when it comes to a background check and obtaining a security clearance?”

USAF Seeks to Almost Double Foreign Infrastructure Investment in ’24

USAF Seeks to Almost Double Foreign Infrastructure Investment in ’24

From Norway to Australia, and Guam to the United Kingdom, the Air Force wants to invest more money in overseas infrastructure, according to budget documents

The Air Force is seeking $1.24 billion in appropriations, a 93 percent increase over the prior year, and $872.5 million, a 44 percent jump, in new authorizations for military construction outside the U.S. The plans mark the largest such requests since 2000. 

For 2023, the Air Force asked for $637.7 million in appropriations and $605.7 million in authorizations last year.

Pacific 

The biggest investment would be at Andersen Air Force Base on the U.S. territory of Guam. Air Force budget documents show it wants $411 million to fund a North Aircraft Parking Ramp, large enough to park up to 14 bombers under normal operational conditions. 

Although the Air Force ended its continuous bomber presence at Andersen in 2020, it has continued to rotate heavy bombers to the base on Bomber Task Force missions. BTFs usually include just a few aircraft, so enabling a deployment of 14 would mark a significant expansion. 

Without the new apron, Andersen “will be unable to adequately support the bomber aircraft operations during contingencies, significantly impacting readiness and degrading operational capability and may increase the potential for a serious mishap,” the Air Force budget documents state. 

Air Force leaders emphasize Agile Combat Employment—dispersing aircraft and Airmen from bigger central bases to numerous remote locations in a “hub-and-spoke” model, and expanding Andersen points would enable it to become a key hub in that scheme. 

“This project will also support large force exercises with service components and international partners,” the budget documents state. 

But it’s not just Guam that will see extra investment. Pacific Air Forces commander Gen. Kenneth S. Wilsbach noted at the AFA Warfare Symposium in March that making ACE work entails “additional logistics” and infrastructure investment across the entire region. 

“There are a significant amount of dollars that are associated with prepositioning at our hubs and spokes, mainly our spokes so that you have sustainment materiel at those places,” Wilsbach said. “So what I’m talking about is fuel parts, support equipment, water, and food mainly. And we’re starting to purchase those and put them out at the spokes.”  

The 2024 budget ask includes $78 million for Tinian, another island in the Marianas near Guam, which the Pentagon has tapped for upgrades since returning to the airfield there in 2012. The $78 million would enable the airfield to support cargo and tanker aircraft, with a new jet fuel system, and a new parking apron to accommodate up to a dozen KC-46 or KC-135 tankers. 

Another potential “spoke” in the Air Force’s ACE concept could be Basa Air Base in the Philippines, one of a growing number of potential operating bases in the Philippines. The Air Force is asking for $35 million to build a parking apron for USAF and DOD aircraft, separate from those used by the Philippine Air Force. 

“Without this apron the United States will not have the facilities needed to train and work alongside the Philippines Air Force to accomplish the bilateral training necessary to build the capability of the Philippine Air Force and modernize the Alliance as a whole,” the budget documents state. 

The U.S. Air Force wants to spend some $156.5 million at RAAF Darwin and RAAF Tindal in Australia, to build operations and maintenance support facilities, and a bomber apron at Tindal to accommodate up to six B-52s. Plans to upgrade Tindal’s facilities for up to a half-dozen B-52s were first reported in Australia last fall but not previously confirmed by the U.S. Air Force.  

B-52s have previously deployed to RAAF Darwin, but the construction project there is for an expeditionary squadron operations facility that was planned based on design guides from Air Mobility Command. 

The Air Force has studied “every single piece of concrete” across the Indo-Pacific in planning for ACE airfields across the region, Wilsbach has said. 

Europe 

In Europe, Air Force investment plans are more modest, but still expansive. In Norway, the service is seeking $119 million to build storage facilities at Rygge Air Station, south of Oslo, that can hold up to 3 million pounds of munitions and facilities to provide storage and support for the Deployable Air Base Systems kits, sometimes referred to as “bases in a box” that would allow the service to rapidly deploy and operate from more locations. 

In the U.K., the Air Force wants to build new facilities at RAF Lakenheath and RAF Fairford to store Rapid Airfield Damage Recovery kits, used to quickly get airfields back into service after an attack. Those RADR facilities would cost a combined $75 million. Also at RAF Lakenheath, the service is planning a new $50 million dormitory for up to 144 beds for a “surety” mission. And at Moron Air Base, Spain, the Air Force seeks to spend $26 million on a new munitions storage facility.  

Photos: Airmen and Aircraft Take Part in a Unique, Massive Elephant Walk at Sheppard

Photos: Airmen and Aircraft Take Part in a Unique, Massive Elephant Walk at Sheppard

Air Force leaders often promote the skill of America’s Airmen as the U.S. military’s most powerful, if intangible, advantage. Officials at Sheppard Air Force Base, Texas, found a way to highlight the human element of airpower recently: an elephant walk with its aircraft and Airmen.

Elephant walks are used as a show of force, with fighters, bombers, and other aircraft coming together on the same runway to send the message that the USAF has plenty of powerful hardware at its disposal.

On April 7, Sheppard lined up 4,000 Airmen and 80 trainer aircraft on a runway to showcase the power of its people as well as its planes. The base said it was possibly the largest elephant walk in Air Force history—nearly 70 F-15Es took part in an elephant walk in 2012. Sheppard hosts technical and flying training, allowing for a unique display of man and machine. The base trains pilots in partnership with U.S. allies, many of whom were in their jets during the elephant walk, giving it an international aspect, a base spokesperson told Air & Space Forces Magazine.

“This elephant walk really illustrates the scope and magnitude of what we do here,” Brig. Gen. Lyle K. Drew, commander of the 82nd Training Wing, said in a news release. “The key to airpower is exceptional Airmen, and the key to exceptional Airmen is exceptional training. That’s what we do here at Sheppard, and this elephant walk was our message to the world that the U.S. and its international partners remain committed to delivering the best-trained Airmen in the world.”

Around 65,000 Airmen pass through Sheppard annually, and roughly 150,000 of the USAF’s Active-Duty Airmen were trained at Sheppard, the spokesperson said. The 82nd Training Wing is the Air Force’s largest technical training wing.

Airmen from the wing lined the runway in front of the horde of aircraft from the 80th Flying Training Wing, which brought out 40 T-6 Texan and 40 T-38 Talon trainers. The 80th Flying Training Wing hosts the Euro-NATO Joint Jet Pilot Training Program—known as ENJJPT—which teaches foreign combat pilots through a partnership between the U.S. and its allies.

“The fundamental technical and pilot training missions that happen here every day affect literally every base and every combat sortie in the Air Force–not to mention the impact on our global partners,” Col. Brad Orgeron, the commander of the 80th Flying Training Wing, said. The base trains Airmen in 52 specialties, with a contingent of international students passing through at any given time as well. The 80th trains pilots in a partnership with 14 countries, with around 200 new pilots earning their wings there. Five NATO members—Germany, Belgium, the Netherlands, Norway, and Denmark—only train new fighter pilots at Sheppard, the base spokesperson added.

“We want our allies to know that we are committed to and value our shared training experience with them, and we want our potential adversaries to know that we are bound together with our friends and partners from the very beginning of our military careers as we train side by side to defend our way of life,” Orgeron said.