Archive for the ‘U.S. Department of Defense’ Category

Employment Services and Supports Available to Veterans with Disabilities Through the U.S. Department of Veterans Affairs and Other Federal Agencies

April 19, 2014 Comments off

Employment Services and Supports Available to Veterans with Disabilities Through the U.S. Department of Veterans Affairs and Other Federal Agencies (PDF)
Source: Mathematica Center for Studying Disability Policy

The number of military personnel incurring disability in current military conflicts is the highest in over three decades. Since 2001, over 1.6 million service members, Reservists, and National Guard have been deployed to Iraq, Afghanistan, and other Middle Eastern nations. As noted by Lew et al. (2007), advances in medical innovations and body armor have enabled 90 percent of soldiers to survive injuries that would have likely been fatal in previous wars, but many service personnel survive with serious physical and psychological injuries.

The Federal government has recently responded to the growing number of service members with disabilities in several ways. President Obama has signed executive orders to improve federal government hiring of veterans and to require federal agencies to contract with veteran owned agencies. The 2011 American Jobs Act added tax credits to employers hiring veterans with service co nnected disabilities. That same year, the Veterans Opportunity to Work (VOW) to Hire Heroes Act was passed and signed into law . The VOW Act provides additional tax credit and training funds for unemployed veterans to prepare them for employment.

Many federal agencies will be involved in the implementation of these initiatives. Employment services and supports for veterans with disabilities is primarily provided by the VA, but the Department of Defense (DoD) and Department of Labor (DoL) also operate program s specifically targeting veterans with disabilities. Veterans also access other employment service programs that target all individuals with disabilities or persons in need specialized support to obtain employment.

T his report provides an overview of Federally – funded employment services and supports that can be accessed by veterans with disabilities, including those designed to meet the needs of the disabled veteran population specifically, the veteran population in general, and the disability population in general. The purpose is to present a comprehensive cataloging and review of all employment resources of which veterans with disabilities could access in pursuit of wage and self – employment.

About these ads

DoD OIG — Section 847 Ethics Requirements for Senior Defense Officials Seeking Employment with Defense Contractors

April 17, 2014 Comments off

Section 847 Ethics Requirements for Senior Defense Officials Seeking Employment with Defense Contractors
Source: U.S. Department of Defense, Office of Inspector General

Our objectives were to (1) address the central database and DoD IG oversight provisions of Public Law 110-181, “The National Defense Authorization Act for Fiscal Year 2008,” Section 847, “Requirements for Senior Department of Defense Officials Seeking Employment with Defense Contractors,” January 28, 2008; (hereinafter referred to as “section 847”) (2) address subsequent direction from the House Armed Services Committee (HASC); and (3) accordingly determine:

  • Whether written legal opinions required by section 847 were “being provided and retained in accordance with the requirements of this section.” (Public Law 110-181, section 847 [b][2]).
  • “The Department of Defense’s record of compliance with section 847 of Public Law 110-181.” (HASC Report on the National Defense Authorization Act For Fiscal Year 2013).
  • Quantitative data specified by the HASC, as follows:
    • “the total number of opinions issued,
    • the total number of opinions retained in accordance with section 847,
    • any instances in which a request for a written opinion pursuant to section 847 lacked a corresponding written opinion, or
    • in which the written opinion was not provided to the requesting official or former official of the Department of Defense by the appropriate ethics counselor within 30 days after the request for a written opinion.”

DoD did not retain all required section 847 records in its designated central repository, the After Government Employment Advice Repository (AGEAR).

This occurred because the Department did not:

  • implement the 2010 DoD Inspector General (IG) report recommendation to transfer historical records into AGEAR when the database became operational,
  • centrally supervise section 847 activities by its decentralized Components, and
  • comply with Deputy Secretary guidance making AGEAR use mandatory as of January 1, 2012.

As a result:

  • The AGEAR database was incomplete with limited or no use by specific DoD organizations with significant contracting activity.
  • Individual section 847 records were located in multiple or decentralized locations, and in a number of cases were inaccurate, incomplete, and not readily accessible for examination.

Commander’s Legal Handbook 2013

April 15, 2014 Comments off

Commander’s Legal Handbook 2013 (PDF)
Source: Judge Advocate General’s Legal Center and School, United States Army

This Handbook is designed to assist you in taking proper immediate action when faced with a variety of legal issues that might arise during your command. The purpose of your actions should be to preserve the legal situation until you can consult with your servicing Judge Advocate. However, like most aspects of your command responsibilities, you can fail if you just wait for things to come to you. You need to be proactive in preventing problems before they occur.

In the legal arena, this means establishing and enforcing high standards, ensuring your Soldiers are fully aware of those standards and properly trained to comply with them. You must also properly train your Soldiers on all Army policies and higher level command standards so that they also understand and comply with them. Soldiers must also be well-versed in the Army Values and be able to apply those values to real-world situations, which will usually keep them well within legal bounds.

All Soldiers have seen issues in the news that can occur when we are not proactive about discipline and standards: Abuse of prisoners, desecration of corpses, hazing, and sexual assault to name recent examples. All of these circumstances present serious legal issues. But, fundamentally, they also represent a breakdown in unit standards, training, and discipline. Your objective as a Commander should be to develop solid systems and a command climate that prevents legal issues, rather than just reacting to them. In sum, it is every bit as important to train your Soldiers to maintain a high level of discipline and compliance with law, policy, and military standards, as it is to train them to perform your Mission Essential Task List (METL). In legal circles, we call this effort to prevent legal problems before they arise by properly training Soldiers, “preventive law.” The responsibility to practice preventive law belongs to the Commander.

See also: 2013 Fiscal Law Deskbook (PDF)
See also: Military Citation Guide (PDF)

Identifying Personality Disorders that are Security Risks: Field Test Results

April 9, 2014 Comments off

Identifying Personality Disorders that are Security Risks: Field Test Results (PDF)
Source: Defense Personnel Security Research Center

Accurate identification and assessment of employees with risky personality disorders is imperative for programs that involve access to nuclear materials, weapons, and biological select agents which depend on personnel maintaining mental health and reliable behavior. Certain risky personality disorders, however, are especially difficult to diagnose with routine assessment tools that rely on the subject’s self-report. To combat this issue, PERSEREC, in collaboration with Department of Energy, initiated a field test that examined whether an improved screening tool has utility for clinicians who routinely evaluate personnel in a high-risk program. Five clinicians used the Shedler-Westen Assessment Procedure (SWAP), along with its Dispositional Indicators of Risk Exposure (DIRE) subscale developed earlier, for a period of 4 months to evaluate 26 new candidates and current employees of concern. Debriefing interviews indicated that SWAP/DIRE was more effective than clinicians’ existing tools for establishing a positive rapport with the subject, assessing personality disorders, and making legally-defensible recommendations. Findings also include recommendations for using SWAP/DIRE methodology for identifying risky personnel.

U.S. Army — Uniform Policy: Leaders Training

April 8, 2014 Comments off

Uniform Policy: Leaders Training (PDF of PPT slides)
Source: U.S. Army
Army’s new grooming/appearance regulations

Cyberculture and Personnel Security

April 8, 2014 Comments off

Cyberculture and Personnel Security
Source: Defense Personnel Security Research Center
Report I — Orientation, Concerns, and Needs (PDF)

Computers and related technologies, such as smart phones and video games, are now a common part of everyday life. Many people spend a large portion of their waking hours using and socializing through these devices, forming what is known as a cyberculture. Personnel security investigative and adjudicative standards were developed before these products were widely available; however, cyberculture bears relevance to personnel security due both to the presence of existing security issues and potential effects on psychological outcomes and workplace performance. Although cyberculture has many beneficial effects, this project evaluates how participation can negatively affect personnel security and employee performance. This initial report provides context, outlines presently actionable findings and strategies, highlights some questions that cannot yet be answered, and draws on outside research to guide future research. Information from many sources was examined, including academic research journals, other federal organizations, news reports, and cyber environments, to understand cyber activities relevant to personnel security. Participation is widespread in U.S. society and popular among all age groups. Some cyber activities, such as foreign associations, can be reportable per existing investigative criteria, so procedures should be updated appropriately and promptly. Other topics require research before action is recommended. One concern is how online disinhibition, where people who become more willing to disclose personal information, deceive, or become hostile, affects personnel security. Increased willingness to disclose may amplify the counterintelligence concerns for individuals targeted by hostile parties. There are also many potential negative effects on impulse control, mental health, physical health, and workplace behavior. Future research is intended to further guide policy, workforce awareness, investigations, and adjudications.

Report II – Ethnographic Analysis of Second Life (PDF)

This report presents the results from an ethnographic examination of a popular virtual social environment, Second Life, as the second part of a larger effort to study the impact of participation in cyber activities on personnel security and safety. Research has shown that cyber participation can spill over into individuals’ offline lives, which could be of security concern to the extent that their online behavior demonstrates poor judgment and/or undermines their reliability. Several immersive ethnographic methods were used in the present study, including participation observation, group discussions, and one-on-one interviews with 148 Second Life users who resembled the demographics of clearance holders. The reported findings include a description of behaviors of potential concern, a set of case studies that outline the behaviors of actual users, and a framework of user personas that attempts to distinguish between innocuous use of no apparent security concern from problematic use that may pose risks to national security. These findings contain implications for updating personnel security policy regarding cyber involvement.

Adjudicative Desk Reference: Assisting Security Clearance Adjudicators, Investigators, and Security Managers in Implementing the U.S. Government Personnel Security Program

April 8, 2014 Comments off

Adjudicative Desk Reference: Assisting Security Clearance Adjudicators, Investigators, and Security Managers in Implementing the U.S. Government Personnel Security Program (PDF)
Source: Defense Personnel and Security Research Center

The Adjudicative Desk Reference (ADR) is a comprehensive collection of background information on the 13 categories of behavior considered when determining an individual’s eligibility for a security clearance. For each category of behavior, the ADR provides information that an adjudicator or manager might want to know about that behavior before making a decision, or that an investigator should know in order to formulate appropriate questions. This background information is not U.S. Government policy and may not be cited as authority for denial or revocation of access. The ADR recently was updated to reflect changes in the adjudicative guidelines and new academic research on the topics covered by these guidelines. It has been recommended by the Security Executive Agent Advisory Committee as a job aid to assist security clearance adjudicators, personnel security investigators, and security managers in implementing personnel security policy. It has also proven useful to appeals panels and lawyers dealing with security clearance decisions, personnel officers making suitability and trustworthiness decisions, and Employee Assistance Program counselors.

Facts for Features — 2014 NCAA Men’s Final Four: April 5-7

April 4, 2014 Comments off

Facts for Features — 2014 NCAA Men’s Final Four: April 5-7
Source: U.S. Census Bureau

The NCAA Final Four men’s college basketball games will be played April 5 and April 7 at AT&T Stadium in Arlington, Texas. Sometimes known as March Madness or the Big Dance, the NCAA Division I Men’s Basketball Tournament has grown from an eight-team tournament in 1939 to a 68-team, single-elimination playoff with mass appeal. The semifinals and championship games are each expecting more than 100,000 fans, and about 15 million viewers are expected to watch each game on TV. To commemorate this occasion, the Census Bureau has compiled a collection of facts examining the demographics of the host city, as well as the cities represented by the four remaining teams — Madison, Wis. (University of Wisconsin), Gainesville, Fla. (University of Florida), Storrs, Conn. (University of Connecticut) and Lexington-Fayette, Ky. (University of Kentucky).

See also: 2014 NCAA Women’s Final Four: April 6-8

Subject Resource Guide: Intelligence, Surveillance, and Reconnaissance (ISR) Operations

April 3, 2014 Comments off

Subject Resource Guide: Intelligence, Surveillance, and Reconnaissance (ISR) Operations
Source: Air University (Muir S. Fairchild Research Information Center)
Topics covered:

  • Aerial Reconnaissance
  • Dissemination
  • Electronic Collection
  • Exploitation
  • Gathering
  • Integrated Planning
  • Intelligence
  • ISR
  • Military Intelligence
  • Military Surveillance
  • Military Reconnaissance
  • Network Centric
  • Reconnaissance
  • Surveillance

Use of Social Media Networks and Mobile Phone Applications for Reporting Suspicious and Criminal Activities on Mass Transit

March 24, 2014 Comments off

Use of Social Media Networks and Mobile Phone Applications for Reporting Suspicious and Criminal Activities on Mass Transit
Source: Naval Postgraduate School

From the thesis abstract: “The threat of terrorism remains in the forefront daily, and public transportation systems remain a preferred target for terrorist attacks. Mass transit customers have long served as the ‘eyes and ears’ of the public transportation environment. In support of the Department of Homeland Security’s See It Say It campaign, mass transit customers contribute to this effort by reporting suspicious and criminal activities on subways and buses. The use of social media networks and mobile phone applications by mass transit law enforcement is slowly evolving as a tool for reporting suspicious and criminal activities on subways and buses. By reviewing the data and current use of social media networks and smartphone applications such as by mass transit law enforcement agencies, this thesis demonstrates that citizens want to play a role in assisting law enforcement in solving crimes. Mass transit law enforcement agencies can leverage community involvement and reduce crime by providing customers with an anonymous means for reporting suspicious and criminal activities. However, whether the use of social media networks and smartphone applications have resulted in an increase in reporting suspicious and criminal activities and a reduction in crime is unresolved, warranting future study in this area.”

Defense Department Press Briefing on Implementation Plans as a Result of the Washington Navy Yard Shooting Investigations and Reviews by Secretary Hagel and Navy Secretary Mabus in the Pentagon Briefing Room

March 24, 2014 Comments off

Defense Department Press Briefing on Implementation Plans as a Result of the Washington Navy Yard Shooting Investigations and Reviews by Secretary Hagel and Navy Secretary Mabus in the Pentagon Briefing Room
Source: U.S. Department of Defense

Okay. Six months ago, the Department of Defense lost 12 members of its family in a senseless act of violence at the Washington Navy Yard. I said at the time that where there are gaps or inadequacies in the department’s security, we’ll find them and we’ll correct them.

And accordingly today, I’m announcing steps DoD is taking to enhance physical security at our installations and improve security clearance procedures responding to lessons learned from this terrible, terrible tragedy. These new measures are based on the recommendations of two reviews that I ordered in the aftermath of the shooting, including an internal review, led by Undersecretary of Defense for Intelligence Michael Vickers, and an outside review, led by former Assistant Secretary of Defense Paul Stockton, who is with us today, and retired Admiral Eric Olson.

Secretary Mabus, who joins me here this morning, also directed the Department of the Navy to conduct its own reviews of security standards, which complemented our work. I appreciate the hard work and the thorough analysis that went into all of these efforts by all of these people.

The reviews identified troubling gaps in DoD’s ability to detect, prevent, and respond to instances where someone working for us, a government employee, member of our military, or a contractor, decides to inflict harm on this institution and its people.

Senior Officer Talent Management: Fostering Institutional Adaptability

March 21, 2014 Comments off

Senior Officer Talent Management: Fostering Institutional Adaptability
Source: Strategic Studies Institute, U.S. Army War College

The Army has for years been successful at creating senior leaders adept in the art and science of land combat after honing their leadership at the direct and organizational levels. While those experiences remain invaluable, undue reliance upon them to create the Army’s future institutional leaders is increasingly risky in today’s rapidly changing world. The contemporary and future operating environments demand an innovative and highly adaptive Institutional Army, capable of rapidly responding to operational demands. Incremental adjustments to current senior officer management practices will not create that adaptability. An entirely new approach is required, one that unleashes the unique potential of each person—full-career officer talent management.

Suicide Terrorism: A Brief Bibliography of Scholarly Resources, Updated 2014

March 19, 2014 Comments off

Suicide Terrorism: A Brief Bibliography of Scholarly Resources, Updated 2014
Source: Naval Postgraduate School (Dudley Knox Library)

This bibliography, compiled by Greta E. Marlatt at the Naval Postgraduate School, contains a list of resources related to suicide terrorism. Resources include both books and periodicals. The list is organized alphabetically and links to resources are provided when available electronically.

Just Released by DoD — 2014 Military and Security Development Involving the Democratic People’s Republic of Korea

March 6, 2014 Comments off

2014 Military and Security Development Involving the Democratic People’s Republic of Korea (PDF)
Source: U.S. Department of Defense

The Democratic People’s Republic of Korea (DPRK) remains one of the United States’ most critical security challenges for many reasons. These include North Korea’s willingness to undertake provocative and destabilizing behavior, including attacks on the Republic of Korea (ROK), its pursuit of nuclear weapons and long-range ballistic missiles, and its willingness to proliferate weapons in contravention of United Nations Security Council Resolutions.

Under Kim Jong Il, DPRK strategy focused on internal security; coercive diplomacy to compel acceptance of its diplomatic, economic, and security interests; development of strategic military capabilities to deter external attack; and challenging the ROK and the U.S.-ROK Alliance. We anticipate these strategic goals will be consistent under North Korea’s current leader, Kim Jong Un.

North Korea fields a large, forward-deployed military that retains the capability to inflict serious damage on the ROK, despite significant resource shortfalls and aging hardware. The DPRK continues to be deterred from conducting large-scale attacks on the ROK primarily due to the strength of the U.S.-ROK Alliance. On a smaller scale, however, the DPRK has demonstrated its willingness to use military provocation to achieve national goals. In 2010, it sank the ROK naval vessel CHEONAN, killing 46 ROK Navy sailors, and shelled Yeonpyeong Island, killing two ROK Marines and two civilians.

North Korea’s continued pursuit of nuclear technology and capabilities and development of intermediate- and long-range ballistic missile programs, as reflected in the December 2012 Taepo Dong-2 missile launch and February 2013 nuclear test, underscore the threat to regional stability and U.S. national security posed by North Korea. These programs, and North Korea’s expressed hostility toward the ROK and proliferation of items prohibited under United Nations Security Council Resolutions 1718, 1874, 2087,and 2094, make the DPRK a continued security challenge for the United States and its Allies and partners.

North Korea’s third nuclear test in February 2013 and subsequent announcement of plans to restart and refurbish nuclear facilities at Yongbyon highlight the continued challenge posed by its nuclear programs. The September 19, 2005 Joint Statement of the Six-Party Talks, and United Nations Security Council Resolutions 1718, 1874, 2087, and 2094 call for the complete and verifiable denuclearization of North Korea. Given North Korea’s unwillingness to abide by these commitments, the U.S. Department of Defense will continue to manage the North Korean security challenge through close coordination and consultation with the international community, particularly with our ROK and Japanese Allies.

The United States remains vigilant in the face of North Korea’s continued provocations and steadfast in its commitments to Allies in the region, including the security provided by extended deterrence commitments through the nuclear umbrella and conventional forces.

DoD — Quadrennial Defense Review Charts Strategy Evolution

March 5, 2014 Comments off

Quadrennial Defense Review Charts Strategy Evolution
Source: U.S. Department of Defense

The 2014 version of the Quadrennial Defense Review takes the defense strategic guidance formulated in 2012 and evolves it through the future, a senior Pentagon official said.

The review lays out a complex and rapidly evolving security environment that includes changes in technology, demographic trends and other factors. The review stresses the importance of the Asia-Pacific region to the United States while acknowledging there are still many “friction points” in the Middle East, Wormuth said. “Terrorism remains a continuing, evolving, metastasizing threat,” she added.

The three “three muscle movements” for the department are protecting the homeland, building security globally, and projecting power and winning decisively, Wormuth noted, and another piece of the strategy is an increased emphasis on innovation and adaptability, particularly in a fiscally constrained environment.

DoD OIG — Assessment of DoD Wounded Warrior Matters: Managing Risks of Multiple Medications

March 2, 2014 Comments off

Assessment of DoD Wounded Warrior Matters: Managing Risks of Multiple Medications
Source: U.S. Department of Defense, Office of Inspector General

We found that the Department of Defense did not have overarching policies and procedures to ensure consistent medication management and reconciliation practices in the Wounded Warrior population. The Services have adopted policies at various command levels; however, there is wide variance across the Services in the policies and standards for medication reconciliation.

Additionally, Wounded Warriors did not have a reliable, safe, accessible, and accountable method to dispose of medications that were no longer needed for treatment. As a result, Wounded Warriors may be at risk for overdose or misuse of unneeded medications that could result in unnecessary hospitalization and death.

FY15 Budget Preview — As Delivered by Secretary of Defense Chuck Hagel, Pentagon Press Briefing Room, Monday, February 24, 2014

February 25, 2014 Comments off

FY15 Budget Preview — As Delivered by Secretary of Defense Chuck Hagel, Pentagon Press Briefing Room, Monday, February 24, 2014
Source: U.S. Department of Defense

Today I am announcing the key decisions I have recommended to the President for the Defense Department’s Fiscal Year 2015 budget and beyond.
These recommendations will adapt and reshape our defense enterprise so that we can continue protecting this nation’s security in an era of unprecedented uncertainty and change. As we end our combat mission in Afghanistan, this will be the first budget to fully reflect the transition DoD is making for after 13 years of war – the longest conflict in our nation’s history.

We are repositioning to focus on the strategic challenges and opportunities that will define our future: new technologies, new centers of power, and a world that is growing more volatile, more unpredictable, and in some instances more threatening to the United States.

The choices ahead will define our defense institutions for the years to come. Chairman Dempsey and I worked in a pragmatic and collaborative way to build the balanced force our nation must have for the future. I worked closely with the Chairman, Vice Chairman, Service Secretaries, and Service Chiefs in developing these recommendations, in a process that began with last summer’s Strategic Choices and Management Review. I also want to recognize today the senior enlisted leaders in each of the services for their contributions and their involvement and their leadership and what they continue to do every day for our country, but in particular their help and input in crafting this budget.Our recommendations were guided by an updated defense strategy that builds on the President’s 2012 Defense Strategic Guidance. As described in the upcoming Quadrennial Defense Review report, this defense strategy is focused on:

  • Defending the homeland against all strategic threats;
  • Building security globally by projecting U.S. influence and deterring aggression; and;
  • Remaining prepared to win decisively against any adversary should deterrence fail.

U.S. Army Field Manual — Cyber Electromagnetic Activities

February 20, 2014 Comments off

FM 3-38: Cyber Electromagnetic Activities (PDF)
Source: U.S. Army (via Federation of American Scientists)

United States (U.S.) forces operate in an increasingly network-based world. The proliferation of information technologies is changing the way humans interact with each other and their environment, including interactions during military operations. This broad and rapidly changing operational environment requires that today’s Army must operate in cyberspace and leverage an electromagnetic spectrum that is increasingly competitive, congested, and contested.

FM 3-38, Cyber Electromagnetic Activities, is the first doctrinal field manual of its kind. The integration and synchronization of cyber electromagnetic activities (CEMA) is a new concept. The Army codified the concept of CEMA in Army Doctrine Publication (ADP) 3-0, Unified Land Operations, and ADP 6-0, Mission Command. The mission command warfighting function now includes four primary staff tasks: conduct the operations process (plan, prepare, execute, assess), conduct knowledge management and information management, conduct inform and influence activities (IIA), and conduct CEMA. The purpose of FM 3-38 is to provide an overview of principles, tactics, and procedures on Army integration of CEMA as part of unified land operations.

At its heart, CEMA are designed to posture the Army to address the increasing importance of cyberspace and the electromagnetic spectrum (EMS) and their role in unified land operations. CEMA are implemented via the integration and synchronization of cyberspace operations, electronic warfare (EW), and spectrum management operations (SMO).

The Nexus of Extremism and Trafficking: Scourge of the World or So Much Hype?

February 17, 2014 Comments off

The Nexus of Extremism and Trafficking: Scourge of the World or So Much Hype? (PDF)
Source: Joint Special Operations University (DoD)

In a globalized and increasingly interconnected world, the transfer of information, expertise, and relationships are becoming more complex and more commonplace. The interconnectedness of criminal organizations that span not only countries but across regions of the globe is troubling. However, more troubling is the possibility of the linking of transnational criminal organizations with insurgent and terrorist organizations as addressed in this work by Brigadier General (retired) Russ Howard and Ms. Colleen Traughber. The radical ideologies propagating politically motivated violence now have the opportunity to leverage and participate in traditionally criminal enterprises. This melding of form and function provides criminals with new networks and violent extremists with new funding sources and potential smuggling opportunities.

General Howard and Ms. Traughber delve into the nexus between violent extremist elements and transnational criminal elements by first clarifying whether a real problem exists, and if so, what is the appropriate role for Special Operations Forces (SOF) in confronting it. The authors bring rigor to the subject matter by dissecting the issue of intention and opportunities of criminal organization and violent extremists. The question is confounded by the authors who note the wide variance in the motivations and opportunities of both different criminal organizations and extremist organizations. What the authors do make clear is that the trafficking of humans, weapons, drugs, and contraband (HWDC) is a natural way for the criminals and extremists to cooperate.

DoD 2014 Basic Allowance for Housing (BAH) Rates

February 12, 2014 Comments off

2014 Basic Allowance for Housing (BAH) rates
Source: Defense Travel Management Office (DoD)

The Department of Defense has released the 2014 Basic Allowance for Housing (BAH) rates. BAH rates will increase an average of 5 percent when the new rates take effect on January 1, 2014.

On average, BAH rates for members with dependents will increase approximately $79 per month and $76 for members without dependents. A typical mid-grade enlisted member with dependents, for example, will find his/her BAH about $79 per month higher than last year, while a typical junior officer without dependents will find his/her BAH about $76 higher than last year.


Get every new post delivered to your Inbox.

Join 776 other followers