• cobysev@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    1
    ·
    1 day ago

    The branch you join does make a difference in experience. I was in the Air Force, which is one of the most chill branches to serve in.

    Despite the name, most Air Force members are not pilots. In fact, only about 5% are pilots, while the rest work in careers that either directly or indirectly support those pilots. We have doctors, lawyers, accountants, police, cooks, engineers, teachers, etc. I was an IT professional in my service, so my job was basically to sit at a desk and fix computers.

    The Army and Marines tend to abuse their members, both mentally and physically, so I wouldn’t be surprised if those guys don’t recommend military service to others. I’ve heard horror stories from my Marine buddies, and I’ve personally witnessed some of the harassment/hazing rituals Army members go through.

    They have a lot of toxic behaviors that keep getting passed down to the next generation. Surviving it and promoting above it is more a badge of honor than anything, so they subject the new guys to the same abuses to “toughen them up” or something.

    The Department of Defense also uses it as an excuse to give them the worst equipment and hand-me-downs in the military, so they tend to operate with old and barely serviceable gear, while the Navy and Air Force tend to get the newest equipment.

    But the Air Force was pretty fun. The Navy is pretty good too. They have some of the best technical schools in the armed forces, so they set you up with plenty of opportunities when you leave the service.

    The Space Force is basically Air Force 2.0. All our space programs were under the Air Force until the Space Force was officially created, so they just transitioned those members into the new branch and copied Air Force regulations over until they could define their own unique requirements.

    • myszka@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      18 hours ago

      Considering it was still military, how much different was your experience working as an IT professional from the usual experience of someone working in IT outside of the military? I imagine there still is some tension, maybe occasional harassment? Or is it just like any regular job? Sorry if it is a stupid question, I literally know nothing about the military

      • cobysev@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        17 hours ago

        Being in the Air Force, the job was mostly like any civilian IT job. We worked off a ticket system to resolve computer issues, dealt with “customers” (other military members), managed servers, satellites, networks, etc. The specifics depended on the exact job; it seemed like every base I was assigned to had different equipment or mission requirements, so I was always learning some new system to manage.

        Probably the biggest difference from the civilian sector was that military networks were severely locked down. There were approved software lists that were managed from much higher levels in the Air Force and only that software was allowed to be installed on computers. Half the time, even us administrators at the base level couldn’t mess with installed software.

        There were software scans that would detect unauthorized software and boot computers off the network until it was resolved. Most places I worked, you couldn’t bring CDs or flash drives with your own programs on them. USB devices would be flagged instantly and get your account kicked off the network until you completed remedial training through your local IT office.

        Our web browsing was severely limited too. Some bases only allowed official military website access; others would allow access to the web but only from an approved white list of sites. It depended on the job and the classification of the network.

        Also, they believed that the best security was older systems that had been thoroughly tested for vulnerabilities, so we were usually a step or two behind the civilian sector in terms of operating systems and software/hardware. They preferred that new systems were thoroughly tested in the civilian sector first, most vulnerabilities identified and remedied, and then we would trust it. So I rarely got to learn about modern IT technologies unless I researched it myself in my own free time.

        EDIT: In terms of harassment, there was sometimes a lack of respect for the IT guys. Lots of higher-ranking officers made unreasonable demands, expecting us to make some impossible network requirement magically work because “that’s your job.” Or just getting mad when things were broken, because “Why do we have IT guys if things are always broken?” Or the same if things work: “Why do we have so many IT guys when nothing ever breaks?” We had our own leadership in the IT field whose job was to explain to other leaders exactly what we did and how it benefits them, so the rest of us could focus on the job.

        • myszka@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          11 hours ago

          That is very interesting, thank you for the detailed response!

          they believed that the best security was older systems that had been thoroughly tested for vulnerabilities

          Oh no 😅 I am not a cyber security expert but that seems to me like a recipe for a disaster

          Speaking of systems, what OS do they use in the military?

          • cobysev@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            8 hours ago

            what OS do they use in the military?

            It depended on the function, but most computers were Windows. Historically, Windows has had the most versatility with other common file systems that we and our allies/enemies used, plus it was easy enough for any service member to pick up and use with minimal training.

            However, we always had custom-configured Windows images; we didn’t just install a blank copy. Like I mentioned, our systems were severely locked down, so there were plenty of registry configurations and custom software suites that would take us a few days per computer to install manually. So we would build one that met our requirements, then create an image of it and copy that to every other computer in our unit.

            Depending on the unit, there might be custom software builds to meet a particular mission requirement, so there were always several images ready to be pushed to specific computers.

            they believed that the best security was older systems that had been thoroughly tested for vulnerabilities

            Oh no 😅 I am not a cyber security expert but that seems to me like a recipe for a disaster

            It worked well enough for a while, but computer technology kept evolving, so we were constantly playing catch-up.

            For the first half of my career, we were always at least one OS behind the civilian sector. When I joined in 2002, we were just phasing out Windows 95/98 and replacing it with Windows 2000.

            Then in 2008, we were on Windows XP and Microsoft was trying to get us to upgrade to Windows Vista. Vista was a terrible OS, so we decided to just skip it and go for the new Windows 7 that was supposed to be coming out a year later.

            Then Microsoft announced an end to support for Windows XP in a few months. We can’t have an OS without any support, so we quickly signed a contract to upgrade to Windows Vista. Before the ink dried on the new contract, Microsoft announced that they would be extending support on XP for 4 more years.

            So we got suckered into a Vista contract, and as soon as Windows 7 dropped, we switched to that. We stayed mostly caught up ever since, although it could take up to a year before we switched to the latest OS. Our own cyber security teams did their own vulnerability assessments before pushing out a new OS across the Air Force, and that could easily take them months of testing and research.


            In the last few years before I retired, the Air Force started testing the concept of handing computer support functions over to civilian companies. This was something they had been talking about long before I joined the military, but they were finally pushing forward with it. My last base was one of the test beds in the US, and AT&T took on the contract at that particular site.

            Our base-wide IT unit had to hand over administrative access to our unclassified network to them, and as the civilian company took charge of more functions (and had security clearance investigations completed), we started handing over classified networks too. Which seemed wrong to me; we had always kept our classified networks secure by managing them ourselves, so handing it over to a civilian company felt like trouble.

            It was even worse when Trump became president the first time and started discussing classified operations on Twitter. Dude had no concept of security protocols and messed up a lot of missions we had overseas, putting our members’ lives at risk so he could brag about secrets he knew.

            He ordered us to give security clearances to a bunch of civilians whom we had already refused in the past for being a threat to national security. But you don’t say no to the president, so we started handing over classified access and before long, a bunch of our foreign operations started getting compromised. It was an absolute clusterfuck.

            Things mostly went back to normal under Biden and I soon retired. I can’t imagine how messed up my old career field must be now, since Trump got back in office. All I can say is I’m glad it’s not my problem anymore.

            • myszka@lemmy.ml
              link
              fedilink
              arrow-up
              1
              ·
              5 minutes ago

              Wow, I didn’t know a president could mess up his own state so much. Thanks!