+ All Categories
Home > Documents > SoldiersMagJune10

SoldiersMagJune10

Date post: 08-Apr-2018
Category:
Upload: paulmazziotta
View: 215 times
Download: 0 times
Share this document with a friend

of 52

Transcript
  • 8/7/2019 SoldiersMagJune10

    1/52

  • 8/7/2019 SoldiersMagJune10

    2/52

  • 8/7/2019 SoldiersMagJune10

    3/52

  • 8/7/2019 SoldiersMagJune10

    4/52

  • 8/7/2019 SoldiersMagJune10

    5/52

    June 1, 2010

    To the Soldiers, civilians and Family members of theUnited States Army Criminal Investigation Command:

    I salute you for your countless contributions to our Army and to our country, as you continueyour dual mission in direct support of overseas contingency operations and protecting the Soldiers,civilians, and Families at home and abroad.

    Your dedication to provide a safe environment in which our Soldiers, civilians and their Fami-lies live, work and operate, has earned you the well-deserved reputation you hold today as one of

    the premier law enforcement agencies in the world.

    e ongoing missions in Iraq and Afghanistan have developed an operational capability thatexpands many of CIDs traditional roles. You have risen to the call.

    e CIDs work in forensics, biometrics and criminal intelligence, as well as your organizationscriminal investigative expertise in conducting and mentoring local national investigations contin-ues as a critical component to developing rule of law in theater. Your contributions in this arenahave led to the investigation of complex criminal scenarios, exploitation and recovery of forensicevidence and development of local national police ecacy.

    Your tremendous success in shaping theater governance and civil authority has measurablyadvanced theater operations, and paid tremendous dividends to combatant commanders. ecommanders on the ground benet rst hand from the application of these capabilities in supportof combat operations. Your eorts allow commanders to take the ght to the enemy, and mostimportantly, save lives.

    After more than eight years of war, I am incredibly proud of what we have accomplished as anArmy. It has required a total team eort by active and reserve components of our entire force, bothoverseas and at home. roughout, our Army law enforcement personnel have played an absolutelykey and critical role.

    You should be very proud of what you have accomplished on behalf of our Army and our Na-tion. Be assured that you have made a signicant and lasting impact.

    ank you for your service, commitment and innumerable sacrices.

    Army Strong!

    Peter W. ChiarelliGeneral, United States Army

    Vice Chief of Sta

  • 8/7/2019 SoldiersMagJune10

    6/52

  • 8/7/2019 SoldiersMagJune10

    7/52

  • 8/7/2019 SoldiersMagJune10

    8/52

  • 8/7/2019 SoldiersMagJune10

    9/52

  • 8/7/2019 SoldiersMagJune10

    10/52

  • 8/7/2019 SoldiersMagJune10

    11/52

    !"#$%&'()*+,$,'-#*.'"$,'&-',$"#-#/

    000/&-12/1(345&6#,)5,'-#*.'"

    !"#$%&'(()$*%+#,-#)$.%/)0',%1*%2'#,3.#4%,#.5,#*%6,'(%."#%7,(89%

    !"#$%$&'(#)*+"#!%+#,*--%(-"&(#(*#+")."++#+"/0%,"1#2%+#3**$#4/%"&$#

    5&$#6+!%&3#78$$9:#;/"3#25/0"9:#&""$"$#5#*"/+(")#8&$"/?"&(#+8/3"/9#(*#$*&5("#!%+#"7/85/9#ABBC1#D!5(#%+#(!"#(/8"#$"6&%(%**4#5#75(()"#78$$9:#

    25/0"9#+59+1#E(5&$#79#9*8/#4/%"&$+#5&$#45-%)9#5&$#+8==*/(#"5,!#

    *(!"/#(!/*83!#="/+*&5)#+5,/%6,"#111#(!5(#%+#*0"/5))#@/-9#+(/"&3(!1

    789$:;$

  • 8/7/2019 SoldiersMagJune10

    12/52

  • 8/7/2019 SoldiersMagJune10

    13/52

  • 8/7/2019 SoldiersMagJune10

    14/52

  • 8/7/2019 SoldiersMagJune10

    15/52

    13

    tric environment,the opportu-

    nity for cybercrime willonly continue

    to increase.

    In Septem-ber 1998, the teambecame the Computer

    Crime Resident Agencyand moved to Fort Belvoir.

    e CCRA was redesignated inNovember 1999 as the ComputerCrime Investigative Unit and separatedfrom FIU, becoming a subordinateelement of the 701st Military PoliceGroup (CID). In January 2000, CCIUwas ocially established as a criminalinvestigative organization within CID.

    Because investigations of thisnature require a specialized level ofcomputer expertise, special agentsassigned to CCIU receive advancedcomputer training from the DefenseCyber Investigations Training Acad-emy, the Federal Law EnforcementTraining Center and other technicalexperts. CCIU special agents also usetheir extensive knowledge of informa-tion technology to provide guidance toother CID special agents who conduct

    investigations involving computers.By its very nature, and due to the

    rigorous training required, CCIU ismade up of civilian special agents.Many served in uniform as CID specialagents, before specializing in computercrimes and cyber security.

    Since its creation, CCIU has been akey element in the successful prosecu-tion of numerous computer intrusionmatters, and has been recognizedaround the globe. CCIU, as well as

    its special agents and alumni, havebeen honored for their expertise anddevelopment of technological productsin the realm of cyber security.

    An example of this was the creationof the Rapid Extraction and AnalysisProgram. With a global mission, Mil-ner said stang challenges preventedagents from physically respondingto every cyber incident, and CCIUneeded a solution. e REAP was thatsolution.

    e program was developed in-house, at no cost to the government,and allowed non-CCIU personnelto deploy the program across vari-ous Army computer platforms. Oncedeployed, the program preserves col-

    lected digital evidence in an automatedmanner following computer intrusions,expedites critical threat information tonetwork defenders, and analyzes mali-cious software.

    Whats great about the programis when the bad guys do one thing, wecan adapt, said Special Agent DavidShaver, who as a result of his workdeveloping the REAP, was selected asthe 2009 August Vollmer Excellencein Forensic Science Award winner. eVollmer award is a national award andis the highest recognition for currentor past contribution by an individualin the eld of forensic science.

    CCIU is one of the best outtsworking in cyber law enforcementtoday, said Howard Schmidt, specialassistant to the president of the UnitedStates and cyber-security coordinator.Schmidt, who is a former CID special

    agent, was appointed by PresidentBarack Obama to head cyber securityfor the White House while serving atCCIU.

    Without my time in CID andgovernment service, I dont know if Iwould have had the insight and depthof understanding of government andhow it relates to cyber security, hesaid. I think that staying involved inthose communities helped tremen-dously.

    Currently, Milner is serving as thesenior U.S. advisor to the Iraq Ministryof Interiors National Information andInvestigation AgencyIraqs equiva-lent to the FBIproviding strategiccounsel on criminal investigative andintelligence matters. is marks therst time a CID leader has been as-signed to a senior staposition withU.S. Forces-Iraq. !

    !!!!!!!"#$%&'!('')#%$*!&+!,,-.!(/$!0)1)2)(%!'3$0)(2!(#$%&'4!5)#526!&/()%$*!)%!0+738&$/!(%(26')'!(%*!9+/$%')0':

    !!! !!"!,-;!'3$0)(2!(#$%&!3$/9+/7'!*(&(!/$0+1$/6!)%!'833+/&!+9!(%!+%#+)%#!0/)7)%(2!)%1$'&)#(&)+%:

    ! ! ! !;)#)&(2!$1)*$%0$!0+7$'!)%! 1(/)+8'!9+/7'!&5/+8#5+8&! &5$!0+8/'$!+9! 0+738&$/!0/)7$!)%'(5-4'56-('$050*;-'0$('+:?-#*+- #-L*>('5#;8(*-#*+-H'8K#$6-4$;-#);/('8;62

  • 8/7/2019 SoldiersMagJune10

    18/52

  • 8/7/2019 SoldiersMagJune10

    19/52

  • 8/7/2019 SoldiersMagJune10

    20/52

  • 8/7/2019 SoldiersMagJune10

    21/52

  • 8/7/2019 SoldiersMagJune10

    22/52

  • 8/7/2019 SoldiersMagJune10

    23/52

    18 www.army.mil/soldiers

  • 8/7/2019 SoldiersMagJune10

    24/52

  • 8/7/2019 SoldiersMagJune10

    25/52

  • 8/7/2019 SoldiersMagJune10

    26/52

    24 www.army.mil/soldiers

    !"#$%&'($)*$%+,)-*

    !" !"#$%!"#$%&'($)*$%+,)-*

    !" !"#$%

    24 www.army.mil/soldiers

  • 8/7/2019 SoldiersMagJune10

    27/52

    25

    !"#$%&'"()#*%+""*,%-".%%&'($./0$12#+)34$35#*,1$3224($3673*+#6$+&)'#$1+#*#$2&-+#11)*5$,#+"*)89#1$69&)*5$,"#$%673*+#6$.&)'#$:+#*#$.-9&1#$3,$,"#$;9A4)+$%@@3)&1

    25

  • 8/7/2019 SoldiersMagJune10

    28/52

    26 www.army.mil/soldiers

  • 8/7/2019 SoldiersMagJune10

    29/52

  • 8/7/2019 SoldiersMagJune10

    30/52

    28 www.army.mil/soldiers

    The evidenceof crime

    28 www.army.mil/soldiers

    EFG%"3$3%#".$-4"3%3B,B$[4A[BC$[,-B%B$HC#0W"$3%B4%10AB%D#T$-I-0#B3%A-4.%$L05$#H$>%,3%3$$#%,M4L$+

  • 8/7/2019 SoldiersMagJune10

    31/52

    29

    WHEN the Armys Criminal

    Investigation Commandsspecial agents need to have

    evidence for a case analyzed, they sendit to a cutting-edge laboratory locatedin Fort Gillem, Ga. e U.S. ArmyCriminal Investigation Laboratory isntlike the labs seen on television, but thefacility is impressive.

    Forensic evidence arrives at thelabs evidence-processing branch via asecure delivery system, Alonzo Rhodes,branch chief, explained. From the

    crime scene to the lab, all evidence iscarefully handled, packaged and main-tained to ensure its integrity through-out the process.

    is is where all evidence basi-cally meets the lab, and is processedfor distribution throughout the labto the appropriate branches, Rhodessaid, while showing o the crime labsevidence receiving area.

    e packages, which are calledcontainers, are stored in a vault, with

    the newest evidence at the front. Whenthe technicians bring the containers outto process, they assign them trackingnumbers before beginning the case-work, he said.

    Most (containers) are double-packaged, with documents within theinside of the outer wrapping, whileevidence is in the second wrapping,Rhodes said. All we really do is openthe outer packaging, take the paper-

    work out, review the paperwork, andreseal the package before routing it tothe appropriate evidence branch.

    e evidence-processing branch isequipped to take something as largeas a vehicle, and once even processeda chimney, Rhodes said. If evidenceis too large to send, investigators canalways contact them and request thatan examiner come out to the scene.

    Once the evidence is processed, itssent to the appropriate branch. Some-

    times the container must go to morethan one branch.

    eres a priority of branchesdepending on what examinations needto be completed by those branches, saylike trace, Rhodes said. Trace refersto trace evidence, a very small piece of

    evidence left at a crime scene that maybe used to identify or link a suspect toa crime.

    Trace goes through rst, becauseif everybody goes and opens that up itmesses up the evidence within. It givesyou cross contamination, he added.

    Chris Taylor, chief of the TraceEvidence Branch, said there are aboutsix collection rooms used to processevidence, like clothing, for bers, glassor paints. ese are considered clean

    !"#$%&'%&()*+,-./0-&12&3)4-5

    29

    Y-$,B%,BB$#B04#%B4%5$B,01%03%H-0B0H,1%B4%EFG%3I$H0,1%,T$#B3%*C$#%I-4H$330#T%H-0.$%3H$#$3+

    9+U+V-.

    /E

    FG

  • 8/7/2019 SoldiersMagJune10

    32/52

    30 www.army.mil/soldiers

    rooms. We want separation of subjectand victim clothing at all times. If youhave a third-party scene or you havemultiple suspects, well use a variety ofrooms, he said.

    Trace evidence works with thesmallest samples imaginable. Taylor

    displayed a picture of an enlargementof a penny, with bers, paint and glasschips next to itthe penny appearedenormous by comparison.

    ese size samples right herewould be plenty big enough for us todo all the analysis we need to do to say,if these items are consistent with, say,a known paint sample from a vehicle,Taylor said.

    Every contact leaves a trace, hesaid. e branch can analyze bers,

    chemical or crystalline materials,powder, soil, re debris, gun residue,explosiveseven glitterand trace itback to potential suspects.

    In addition to pulling bers ortraces of soil from evidence and usingthem to determine a suspect, examinerscan also pull ngerprints from almostany surface.

    e Latent Print Branch is respon-sible for analyzing ngerprints andother impressions made in the ground,

    or other substances.Probably one of the better, the

    most overlooked piece of forensic evi-dence that there is, is footwear, DonCoey, the Latent Print Branch chief,explained. Because you dont hoverinto a scene, unless you rappel down

    there, youre going to walk in and walkout. So if you have the ability and theequipment to capture those footwearimpressions, they are always there,whether its carpet, on dirt, dust, tile orwhatever.

    Tire-track impressions also makeup a good portion of the work donein latent prints. Investigators will takecastings of the track, and latent printexaminers will try to nd a match in atread database.

    But of course, ngerprint analysis isthe bread and butter of the branch.

    e rst thing to attack in a nger-print is moisture, Coey said. Finger-print powder adheres to the moisture,and enables an investigator to lift theprint from a surface, which is the clas-sic method.

    In the early 1980s, examinersdiscovered super-glue fuming, orcyanoacrylate fuming. According toCID ocials, a CID special agent was

    instrumental in helping to developand bring this technology to U.S. lawenforcement.

    Cyanoarcrylate, when heated,turns intoa gaseous form. And thegaseous form will attach itself to themolecules of moisture, and then it

    plasticizes (or makes plastic), that mois-ture, Coey said. e cyanoacrylateprint is very durable. You can wipethis and rub on this and its not goingto come o. If it were a print, it wouldbe gone.

    Other techniques used to liftngerprints include chemical devel-opment with ninhydrine, which willmake the prints show up blue whenheated; and spectral photography,which uses the whole light spectrum

    to take pictures of otherwise invisiblengerprints.

    You can develop a print in paperthats like 200 years old, Coey said.

    In fact, examiners recently liftedthe prints of the nations founding fa-thers o supporting documents relatedto the Declaration of Independence.So, (you can lift prints from) justabout anything you can talk about withthe exception of water in a liquid state,re and air.

    30 www.army.mil/soldiers

    K4-$#30H%3H0$#B03B%V.,#5,%VBO0#3%,#,1/Z$3%BC$%H,3B0#T%4A%,%B0-$%0.I-$3304#%,#5%H4.I,-$3%BC$%3,.I1$%B4%,%B0-$%5,B,M,3$%A4-%05$#B0DH,B04#%,B%BC$%9+U+%V-./%E-0.0#,1%F#L$3B0T,B04#%8,M4-,B4-/%,B%K4-B%Y011$.>%Y,+%

    !"#$

    %&'()+,

    -.""#/0

  • 8/7/2019 SoldiersMagJune10

    33/52

  • 8/7/2019 SoldiersMagJune10

    34/52

  • 8/7/2019 SoldiersMagJune10

    35/52

  • 8/7/2019 SoldiersMagJune10

    36/52

  • 8/7/2019 SoldiersMagJune10

    37/52

  • 8/7/2019 SoldiersMagJune10

    38/52

    36 www.army.mil/soldiers36 www.army.mil/soldiers

    C1665(D1*4&5E(&('&+#*+(".%*+(#F&6%*#.(0%+3(+3#(GF"#4%+%1*&.5(H1.#*,%$,(A%7%,%1*(&+(+3#(>=!=(?.65(@.%6%*&'(-*7#,+%)&+%1*(I&91.&+1.5(&+(H1.+(J%''#6E(J&=E(%,(".#"&.%*)(+1(4#"'15(+1(?8)3&*%,+&*(0%+3(&(K1%*+(#F"#4%+%1*&.5(81.#*,%$,(8&$%'%+5=((

    Until recently, investigators alsohad to ship all of their evidence back tothe States for processing at USACIL.

    But in 2005, the

    rst joint expedition-ary forensics facilities were establishedin Iraq to process ngerprints, rearmsand even DNA collected downrange.e JEFFs have since been deployedto Afghanistan as well, with additionallabs ready to deploy on an as-neededbasis.

    Some of the labs are still in devel-opment, and many of the 150-oddtechnicians have yet to be hired, butthe ultimate goal is for the teams torotate and spend two months statesidefor every month of deployment, ac-cording to Col. Martin Rowe, chief ofthe Expeditionary Forensics Division.

    e challenge came, you know, wehave all the technology and all the pro-cedures well established here, he said.How do you take that and apply it toan area where you dont have power allthe time, or you dont have clean wateror youve got dust and sand? Rugged-izing the equipment to make it operatein that type of environment was a huge

    challenge.

    Evidence processed at the JEFFshas been used to link senior Talibanleaders to crimes, update watch lists,increase force protection and prosecutecriminals in Iraqi courts.

    As far as I know, everybodys re-ally pleased with the rst rotation andsupport were providing, said JEFFOperations Specialist Jerzy Mikulski, aretired CID special agent who recentlyreturned from Afghanistan. e timeit takes to return any kind of forensicdata back to the United States, canmean Soldiers lives being saved. If weprocess evidence and it leads to somekind of active investigation, or providessome intelligence or data to unitsghting, its obviously very benecial.Having assets on site or in theaterprovides (a) far more timely exchangeof information.

    We take weapons, we processthem for DNA, process them for n-gerprints. We submit them to rearms

    and tool marks. Perhaps this weaponwas red before on our Soldiers andwe recovered a round, and we com-pare them and we can tie it directly toa group of people or maybe even anindividual who was involved in a sniperattack, he explained.e JEFFs, Rowe added, could also

    be very benecial in a natural disasterlike Hurricane Katrina or the recentearthquake in Haiti, because the JEFFswill eventually be able to deploy on amoments notice.

    ats another one of the thingsthat were planning. When Hur-ricane Katrina came through, it wiped

    out three or four crime labsthe statelab, county lab and the city lab so theywere without. e National Instituteof Justice went down there and set

  • 8/7/2019 SoldiersMagJune10

    39/52

  • 8/7/2019 SoldiersMagJune10

    40/52

    38 www.army.mil/soldiers

    THE U.S. Army Criminal In-vestigation Command trainsits agents extensively at the

    U.S. Army Military Police School atFort Leonard Wood, Mo.

    CID agents complete law, testi-monial evidence, drug operations,family advocacy, and forensics coursesduring their training, Marine MasterSgt. Shane Reichenberg, noncom-

    missioned ocer-in-charge of theMilitary Police Investigation Division,explained.

    e school is a joint facility,training representatives from all fourservices, said Chief Warrant Ocer4 Ronald Meyer, former chief of theforensics-training branch. We canprovide standardized training acrossthe entire spectrum. Its pretty inter-esting.

    Some of the most intense train-

    ing occurs during the forensic andtestimonial evidence blocks, whichcomprise both classroom lectures andhands-on training in mock crimescenes.

    Testimonial evidence trainingcan be dicult because it is more ofan art form than an exact science,Chief Warrant Ocer 3 Barry Young,branch chief, said. Students role-play,one taking on the position of theinvestigator, the other, suspect, and

    !"#$%&'%&()*+,-./0-&12&3)4-5

    Training

    38 www.army.mil/soldiers

    !"#$$#%&'()$*&+,#-.(/$01(&23(4$-&3#&$5,#635&(7$(48-01(&/,0%(&-/(4(&$,204043&2$&$5(&9:;:&0'0$2,=&+#'0/(&;/5##'?&@#,$&A(#42,B&C##B?&>#:&!+5#$#&D=&E#'D=&F26-(,*

  • 8/7/2019 SoldiersMagJune10

    41/52

    39

    practice interrogation techniques.e instructors provide guidance

    and mentorship, teaching students theins and outs of conducting a suspectinterview, and guiding them throughthe questioning process. One of themore dicult things to teach studentsis how to get people to talk.

    Some of the processes are dicultto master, Young said, so thats onehurdle the students have to overcome.

    e only way to understand thisjob is to do it, Young said, addingthat you have to be a people-person.

    Forensics is the bulk of thetraining administrated at the school,according to StaSgt. Aaron Carter,Advanced Crime Scenes InvestigativeTechniques Course instructor.

    We have the Military PoliceInvestigators Course, the CID SpecialAgent Coursethose are the basiccourses that we have come through

    this facility, Carter explained.When its time for them to train

    on any kind of criminalistics, hands-on training, they come to this facility.We also have the Warrant OcerBasic and Advanced courses for CIDagents, (as well as) the AdvancedCrime Scenes Investigative Tech-niques course.

    In this training facility here wehave 60 mock-crime-scene rooms,

    which is pretty neat, Meyer said. Itallows us to train 60 students at atime to a specic standard.

    e students learn how to processcrime scenes, identify, collect andpreserve evidence, and how to con-duct death investigations, Meyer said.Twenty to 30 percent of what otherlaw enforcement agencies teach intheir advanced courses, CID teachesin its Basic Course.

    When students learn how to

    process a crime scene in the BasicCourse, they are taught a detailed listof things to check and given eighthours to process a mock scene, whichis staged with fake evidence such asguns, liquor bottles and bodies.

    A year from now, if they went tocourt, they could literally reconstructthis room based o their photographs,their measurements and all theirnotes, Reichenberg said of the detail

    involved in the training.Photography is extremely im-

    portant as a crime scene technician,Carter said, because much of thedocumentation for a crime is pho-tographic. Both the Advanced andthe Basic courses focus on honingphotography skills.

    e rst two and a half days (ofthe advanced class) are photography,Carter said. Understanding the con-cepts and applications of photography,

    39

    ;.(/02'&23(4$&/24B0B2$(-&'(2,4&5#G&$#&/2-$&$0,(&0%.,04$-&04&24&26-$(,(.(,2$0#42'&(410,#4%(4$&2$&$5(&9:;:&0'0$2,=&+#'0/(&;/5##':

    9:;:

  • 8/7/2019 SoldiersMagJune10

    42/52

    40 www.army.mil/soldiers

    the camera, the equipment that wehavethe most important thing thatan agent or an investigator needs tounderstand is how to use their camera.

    In the advanced crime scene class,students also practice crime sceneprocessing outside. ey learn how totake casts of impressions in the ground,from boots or tires and the like; how toprocess shallow graves, how to processscattered remains, and how to analyze

    blood-spatter patterns.Were very, very thorough and

    thats one of the things were renownedfor: how thorough and accurate we arein our crime scene processing, Cartersaid.

    My goal for them is to understandthe basics of what we teach them andto do a good job at the basics, headded. ese basics are the platformfor criminalistics, and every investiga-tor needs a good foundation before he

    can excel, Carter explained.e interrogation and forensics

    training is so detailed, one CID specialagent would be able to operate in anyenvironment independently, Meyersaid.

    I know of no other traininginstitution in the United States at thefederal or state level that has the train-ing capabilities that we haveand Iveseen many of them, he said. We traingreat students and agents. !

    40 www.army.mil/soldiers

    EHI&23(4$-&2$&2&9:;:&0'0$2,=&+#'0/(&;/5##'&2B124/(B&/#6,-(&2$&@#,$&A(#42,B&C##B?&>#:?&%(2-6,(&D'##B&-.'2$$(,&6-043&-=4$5($0/&D'##B:&

    EHI&23(4$-&B,#.&-=4$5($0/&D'##B&),#%&12,=043&5(035$-$#&B0))(,(4$&-6,)2/(-&B6,043&D'##B8-.'2$$(,&$,204043&2$&$5(&9:;:&0'0$2,=&+#'0/(&;/5##'&2$&@#,$&A(#42,B&C##B?&>#:&

    J'0K2D($5>:

    E#''04-

    L2/M6('04(>:

    F2%(

    -

  • 8/7/2019 SoldiersMagJune10

    43/52

  • 8/7/2019 SoldiersMagJune10

    44/52

  • 8/7/2019 SoldiersMagJune10

    45/52

  • 8/7/2019 SoldiersMagJune10

    46/52

    44 www.army.mil/soldiers

    !"#$%&'%&()*+,'-".&/0&1#))*23

    Secret

    Service

    DODs

    !"#$%&'(&)#*+,(-%''(+&.#(&(/0''#+(%1(*#$#,,&234(/0+(+5#%2(67/(%,(+7()#+(&("2%*$%"&'(70+(71(5&289,(-&3(&*:(.##"(#;#237*#(,&1#(1278(&,,&,,%*&+%7*4(.%:*&""%*)4(%*6023(&*:(#8/&22&,,8#*+%M?%+52214.*

    C/'01#2%#3'4).%4'7)$#21J'%#%)>$'#)%67$143%#4%O#))#0T%54%/$14:01/#2P%6$122%=>12'%$'0'18143%'U)'4.18'%)$#14143%#)%)>'%

  • 8/7/2019 SoldiersMagJune10

    50/52

  • 8/7/2019 SoldiersMagJune10

    51/52

  • 8/7/2019 SoldiersMagJune10

    52/52

    PRIOR SERVICE ORCURRENTLY SERVING?

    CONSIDER THE ARMYRESERVEgoarmy.com/reserve

    Enlist today and you may be eligible for:

    Prior service enlistment bonuses up to $10,000Selected Reserve GI Bill, up to $333 per monthTuition Assistance up to $4,500 per yearParticipation in a retirement savings plan

    The Arm Reser e is committed to taking care of Soldiers