35th Combat Aviation Brigade (United States)

The Combat Aviation Brigade, 35th Infantry Division

35th Combat Aviation Brigade
35th ID Shoulder Sleeve Insignia
Active1997 – present
Country United States
Allegiance Missouri
Branch Army National Guard
TypeAviation
RoleHeadquarters
SizeBrigade
Part of35th Infantry Division
Garrison/HQSedalia, Missouri
Commanders
Current
commander
Colonel Charles D. Hausman

Shoulder sleeve insignia

The division's shoulder patch, a white Santa Fe cross on a blue disc with a green border, was originally approved for the 35th Division on 29 October 1918.

The Santa Fe cross was a symbol used to mark the Santa Fe Trail, an area where the unit trained, and was designated as an identifying device for the unit by Headquarters, 35th Division General Orders 25, dated March 27, 1918. The division is referred to as the Santa Fe Division.[1]

History

The 35th Combat Aviation Brigade was constituted in October 1988 as the 635th Aviation Group by authority ofm the National Guard Bureau. Between April and August 1989, the unit assumed command and control of 3rd Battalion, 135th Aviation Regiment, 205th Medical Battalion, and 1st Battalion, 135th Aviation. The unit was officially activated as a component of the Missouri Army National Guard on 16 September 1989. The 635th Aviation Group was inactivated on 8 August 1993 at Jefferson City Army Aviation Support Facility.

On 24 March 1997, the unit was reorganized and federally recognized as HHC Aviation Brigade, 35th Infantry Division in Warrensburg, Missouri. In 2003, the unit moved to Sedalia, Missouri, and was redesignated the 20th Aviation Brigade (Theater). The unit moved into a new facility at the Missouri State Fairgrounds in Sedalia around October 2005. On 2 January 2009, the unit was redesignated as HHC, Combat Aviation Brigade, 35th Infantry Division, although it is commonly referred to simply as the "35th CAB."

The CAB, 35th Infantry Division concluded a nine-month deployment rotation to Kuwait in support of Operation Spartan Shield and Operation Enduring Freedom on April 18, 2013.[2]

The CAB was deployed in support of Operation Inherent Resolve and Operation Spartan Shield in 2018–2019.[3] Attached units were:

Soldiers are from 14 states' National Guard: Alabama, Arkansas, Connecticut, Georgia, Hawaii, Illinois, Kansas, Louisiana, Minnesota, Missouri, South Dakota, Texas, Utah, and Vermont.[4]

Organization

The current configuration is as follows:

gollark: You can also get a ***!!FREE!!*** PotatOS OmniDisk\™ for debugging or random fiddling around or whatever.
gollark: https://pastebin.com/RM13UGFaAt the top of this code file.
gollark: From the official docs.
gollark: "Features:- Fortunes/Dwarf Fortress output/Chuck Norris jokes on boot (wait, IS this a feature?)- (other) viruses (how do you get them in the first place? running random files like this?) cannot do anything particularly awful to your computer - uninterceptable (except by crashing the keyboard shortcut daemon, I guess) keyboard shortcuts allow easy wiping of the non-potatOS data so you can get back to whatever nonsense you do fast- Skynet (rednet-ish stuff over websocket to my server) and Lolcrypt (encoding data as lols and punctuation) built in for easy access!- Convenient OS-y APIs - add keyboard shortcuts, spawn background processes & do "multithreading"-ish stuff.- Great features for other idio- OS designers, like passwords and fake loading (est potatOS.stupidity.loading [time], est potatOS.stupidity.password [password]).- Digits of Tau available via a convenient command ("tau")- Potatoplex and Loading built in ("potatoplex"/"loading") (potatoplex has many undocumented options)!- Stack traces (yes, I did steal them from MBS)- Backdoors- er, remote debugging access (it's secured, via ECC signing on disks and websocket-only access requiring a key for the other one)- All this useless random junk can autoupdate (this is probably a backdoor)!- EZCopy allows you to easily install potatOS on another device, just by sticking it in the disk drive of any potatOS device!- fs.load and fs.dump - probably helpful somehow.- Blocks bad programs (like the "Webicity" browser).- Fully-featured process manager.- Can run in "hidden mode" where it's at least not obvious at a glance that potatOS is installed.- Convenient, simple uninstall with the "uninstall" command.- Turns on any networked potatOS computers!- Edits connected signs to use as ad displays.- A recycle bin.- An exorcise command, which is like delete but better.- Support for a wide variety of Lorem Ipsum."
gollark: You would need to get rid of the autoupdate capabilities of potatOS itself, or swap them to your own pastebins/github stuff, and then keep everything in line with the current versions.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.