recommended reading

Air Force Yanks 17 Officers From Nuclear Missile Launch Posts

An Intercontinental ballistic missile control team at Minot Air Force Base, N.D., demonstrated a poor understanding of missile firing procedures during a March audit, prompting the Air Force to pull 17 personnel from their assignments , the Associated Press reported on Wednesday.

The incident marked the service's largest removal to date of missile control personnel, Air Force Global Strike Command spokeswoman Lt. Col. Angie Blair said. The 91st Missile Wing earned a rating analogous to a  "D" for its grasp of Minuteman 3 ICBM firing activities; the unit contains 150 senior-level service members charged with overseeing such weapons on an ongoing basis.

One more unit staffer could face punishment for purportedly violating operating standards through an unidentified action that threatened the security of codes for firing the weapons. None of the issues endangered nuclear arms at the base, according to the Air Force.

The unit faces internal "rot" and a state of "crisis," deputy chief Lt. Col. Jay Folds stated by e-mail. "You will be a bench warmer for at least 60 days," he wrote to team members.

The development follows a series of embarrassing nuclear mishaps for the Air Force in past years, including the unintended 2007 flight of six nuclear-armed cruise missiles across several U.S. states and the accidental 2006 shipment to Taiwan of ICBM nuclear fuses. Those incidents led to the 2008 dismissals of the service's civilian and military leaders and caused the Air Force to consolidate its bomber wings and nuclear missile squadrons under the Global Strike Command.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.