paulgorman.org

< ^ txt

Mon May 23 06:00:01 EDT 2022 ======================================== Slept from eleven-thirty to six-thirty. Woke briefly around four. Mostly cloudy until late afternoon then becoming partly cloudy. Highs in the lower 60s. Northeast winds 5 to 10 mph. Work ---------------------------------------- Finished the Box/OneDrive whitepaper enough to send it to Jim for his contributions, lunch meeting with Matt and Nick about eMNEPA. Water shut off in the office, so I left an forty-five minutes early. Matt's at agile training for the next couple days, so I'll work from home. Home ---------------------------------------- Twenty-minute walk after work. Cloudy and cooler. Saw woodpecker pecking and a chipmunk. https://www.govtech.com/em/disaster/how-pentagon-names-military-operations.html > During World War II, British Prime Minister Winston Churchill urged military leaders to come up with valiant names for battles so no mother of a fallen soldier need say her son was killed “in an operation called ‘Bunnyhug’ or ‘Ballyhoo.’” > > More than 70 years later, Pentagon officials faced a similar problem when they struggled to choose an operational name for the widening campaign of airstrikes against Islamic State militants in Iraq and Syria. > > The branding effort took weeks, involved a classified Pentagon computer system called NICKA, consultations with military officers in Baghdad and Washington, approval by two dozen partner nations, and the endorsement of top Pentagon brass. > > Thus was born Operation Inherent Resolve, a moniker so inherently bland it sparked jokes on late night TV. > > Until 25 years ago, the U.S. military issued random code names for exercises, landing beaches, headquarters, attack plans and other operations, from Aberdeen (an Allied objective in Burma in World War II) to Zipper (another World War II attack plan). The point was to protect secrecy, confuse the enemy and simplify communications. > > A few were poetic, in a military sort of way. > > The Pentagon called its heavy bombing of North Vietnam from 1965 to 1968 Operation Rolling Thunder, a name that proved so popular it was adopted by a veterans’ advocacy group, a 1977 movie, an annual motorcycle rally and a Bob Dylan concert tour. > > Others didn’t prove so trendy. > > Operation Killer and Operation Ripper, a double-barreled counteroffensive early in the Korean War, were widely criticized as crude even though the attacks succeeded. And Operation Masher, a 1966 U.S.-led assault in South Vietnam, drew so many jibes it was renamed Operation White Wing. > > But for every U.S.-led combat operation in Vietnam named Inferno, Gladiator or Dragon Fire, U.S. troops also were sent on lethal missions named Flip Flop, Hopscotch and Jingle Bells. > > The practice of naming military operations is believed to have begun during World War I. Germany branded missions with religious and mythological titles, including Valkyrie and Archangel. > > Churchill appreciated those examples. In 1943, he dictated a note that said, in part, that “operations in which large numbers of men may lose their lives” should not be given names that are too boastful, too despondent or “of a frivolous character.” > > He urged commanders to use heroes of antiquity, figures from Greek and Roman mythology, the constellations and stars, famous racehorses or names of British and American war heroes. > > Churchill personally chose Operation Overlord for the Allied invasion of German-occupied France in June 1944. The crucial phase of that operation, the D-day landings, was called Operation Neptune. > > So it went until 1989, when President George H.W. Bush ordered an invasion of Panama that deposed dictator Manuel Noriega. The Pentagon had prepared contingency military plans for Panama under the code name Blue Spoon. > > According to Lt. Col. Gregory C. Sieminski’s “The Art of Naming Operations,” published in a military journal in 1995, Gen. James Lindsay, then head of Special Operations Command, called the Joint Chiefs to complain, asking, “Do you want your grandchildren to say you were in Blue Spoon?” > > The name was changed to Just Cause, and a trend was born — even if some soldiers mocked that war as Just Because. > > Ever since, high-profile U.S. combat campaigns get rousing names that not only are used for funding requests to Congress and bestowing medals and ribbons. They also attempt to shape public perceptions. That’s a polite way of calling them a form of propaganda. > > The 1991 war in the Persian Gulf? Desert Storm. The 1993 mission in Somalia? Restore Hope. The 2003 invasion of Iraq? Iraqi Freedom. > > The 2001 invasion of Afghanistan? Infinite Justice, until Muslim clerics called it offensive, saying that only God could deliver infinite justice. > > Officials “swore they used computers and algorithms and such stuff,” Torie Clarke, an assistant secretary of Defense for public affairs in the George W. Bush administration, wrote in her recent book, “A Survivor’s Guide to Washington.” “I’m pretty sure they scrawled words on a white board and threw darts until they came up with Operation Enduring Freedom,” as the Afghanistan war has been known since. https://www.thedrive.com/the-war-zone/29353/how-the-pentagon-comes-up-with-all-those-secret-project-nicknames-and-crazy-code-words > However, shortly after the close of the Vietnam War, the Joint Chiefs of Staff (JCS) decided it was time to formalize the use of code words and nicknames by unveiling the Code Word Nickname and Exercise Term System, colloquially known as NICKA. > > For the Department of Defense (DoD), NICKA is both a set of policies governing the selection of defense monikers and a military-wide computer system that archives and prevents duplication of terms. > > Important to note, NICKA is primarily used for Department of Defense-related endeavors. Many operations or programs emerging from within the intelligence community use their own separate naming system. > > For example, the Central Intelligence Agency uses the Cryptonym system for developing code words and names. It is also worth noting that the National Security Agency (NSA), National Geospatial-Intelligence Agency (NGA), Defense Intelligence Agency (DIA), and National Reconnaissance Office (NRO) all use the NICKA system > > NICKA outlines three distinctive types of monikers that can be used within the DoD: > > * Code Words > * Nicknames > * Exercise Terms > > In NICKA, a code word is a single word that’s assigned to any program or operational plan that's classified confidential or higher. Each component agency in the Department of Defense are assigned blocks of code words by the Joint Staff. When needed, the NICKA computer program will randomly select and assign a code word from the originating agency’s allocated block of terms. > > For example, in the lead up to the Gulf War, when the Combat Aviation Brigade of the 1st Armored Division needed a code word for their forward assembly area, the NICKA computer system pulled from one of the Army’s predetermined block designations and selected the amusingly mundane code word—LARRY. > > Essentially a password for entry in an exclusive club, the preeminent role of code words is to restrict access to sensitive national security information to only those who have a need to know. Assisting security, a code word itself will be safeguarded by being classified by one of the three security classifications—confidential, secret, or top secret—based on the security level of the associated program. > > As we briefly mentioned, when it comes to the designation of nicknames, NICKA offers some flexibility and gives military commanders the ability to be a little more creative. > > Whereas NICKA only assigns single-word code words, by policy, nicknames must be comprised of two separate words. Similar to the code word process, each DoD component agency is assigned a set of designated numerical block assignments by NICKA. In turn, the agency’s numerical block assignment will correspond to “alphabetical assignment list,” which is a range of two-letter alphabetical sets. The first word of any nickname must come from within an agency’s assigned alphabetical range. > > Once the alphabetical block assignments are determined, for military commanders, the process then becomes a word-search of sorts in order to come up with an appropriate first word for a nickname that fits within the designated letter combinations. In our example, the words “DOOM,” “IDEAL,” “MOON,” or “STEREO” would all fit the criteria as being acceptable first words for a DIA nickname. > > When it comes to the second portion of the two-word requirement for nicknames, military planners have the unrestricted ability to get creative, provided phrases are not “improper” or “counterproductive.” > > NICKA guidelines stipulate nicknames are not required, but can be assigned to actual real-world events, projects, or activities. One caveat to “not required” being with Special Access Programs, which are required to have an unclassified nickname assigned to them. > > Rounding out NICKA’s trifecta of officially sanctioned phrases, are exercise terms. As the name implies, exercise terms are monikers assigned to tests, drills, or exercises, which are assigned for the purpose of emphasizing the event is not an actual real-world operation. > > Though technically their own classification, exercise terms are more or less an extension of NICKA nicknames, with their selection and regulation falling under the same agency assigned alphabetical block system as the nicknaming process. > > Since some military training evolutions are regularly repeated, certain specific exercises will carry the same name with an added numerical postfix indicating the month or year the event occurs. For example, held annually from 2006 to 2018, some of the largest U.S. military war games ever performed in the Pacific Ocean were all conducted under the exercise term “Valiant Shield.” Since this training event was repeated for twelve-years, a four-digit identifier for the year training maneuvers were performed would accompany the exercise term, producing “Exercise Valiant Shield 2017,” and so on and so forth. > > For exercises that occur multiple times in a fiscal year, like "Swift Response," a large training event between the U.S. and its European allies, the second iteration of the exercise in 2017 would be called “Swift Response 17-2.” Servings: grains 3/6, fruit 1/4, vegetables 2/4, dairy 1/2, meat 2/3, nuts 0/0.5 Breakfast: banana, cucumber, egg, naan, coffee Brunch: half a doughnut Lunch: gyro, fries, Coke Afternoon snack: Dinner:

< ^ txt