Skip to main content

Dogs in U.S. Army



Army Colonel David Rolfe thought to use dogs for military purpose. Rolfe and his staff, as director of the Defense Department's Military Working Dog Program, are responsible for the health and welfare of some of the most unheralded members of the fighting force: its estimated 2,300 working dogs.

These dogs, are deployed worldwide to support the war on terror  along with their handlers from every military service, helping to safeguard military bases and activities and to detect bombs and other explosives before they inflict harm.

Why Use Working Dogs?

Rolfe explained, with an acute sense of smell  and five to ten times stronger than a human' working dogs can detect minute traces of explosives or drugs and alert the handlers of their presence.

Many people think that the dog-handler profession is  an art form as there are so many nuances that the human must be able to interpret. Not just anyone can step in and perform the job, the missions require the kind of autonomy that not everyone is mature enough to handle and the hours are long too .

The dogs have the ability to inflict fear in an aggressor in a way a human ,even if armed , often can't , Staff Sgt. Andrew Mier , military working dog trainer  said "People see a dog and don't want to mess with it" ."A dog creates a strong psychological deterrent."

BREEDS OF WORKING DOGS

Majority of U.S. military working dogs are German, Belgian Malinois and Dutch shepherds and these breeds are  very smart, very aggressive,  very athletic and very  loyal .

WORKING DOGS HISTORY

The U.S. military has used working dogs since the Revolutionary War, initially as cover animals, and later, for more advanced uses, such as killing rats in the trenches.

TRAINING PROGRAM

The 120-day program teaches the dogs basic obedience as well as more advanced skills, such as how to sniff for specific substances and how to attack. Rolfe said the initial training program, conducted by the 341st Training Squadron team, is based on "positive rewards" -- generally a rubber toy or ball rather than food. They learned long ago that food works only for some time not so long. What the dog really wants us to do is play with it.

Members of the 37th Security Forces teach the dogs and their trainers to work as a team, after the dogs receive their initial training. Air Force Staff Sgt. Sean Luloffs, an instructor at the school,said that “one of the biggest challenges is getting a handler to recognize what a dog is showing him". 

Comments

Popular posts from this blog

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the...

HOW TO SEE INCOGNITO HISTORY AND DELETE IT

We have heard about private or incognito browsing. It’s the mode that doesn’t store anything in history. While it does store cookies, but are deleted after the session is exited. This mode is known as Incognito browsing in Google Chrome, Private Browsing in Mozilla Firefox, and InPrivate Browsing in Internet Explorer. Whatever we may want to call it, the mode works the same in all browsers. However, sometimes we might want to go back to a page that you previously opened. The question is – can you check your incognito history? Problem is, there is no easy way to go back to that page. So all are search queries we saw is effectively lost. Unless you can Google it up and it shows again. But if it’s not there on the first page of Google, it’s gone forever. But we can still get to know about the websites that have been browsed under the incognito mode. Yes, the private browsing mode has a loophole. You can see the browsing history of someone using incognito mode but only if you h...

Difference Between Analysts and Statisticians

DIFFERENCE BETWEEN ANALYSTS AND STATISTICIANS In today’s digital landscape, data has become one of the biggest and most important assets for almost all organizations. Data can be fetched from anywhere and it’s actually transforming the way we live. Statistics and analytics are two branches of data science. Analysts specialize in exploring what’s in your data, statisticians focus more on inferring what’s beyond it. Let’s have a look at basic analytics? Try googling the weather. Whenever you use a search engine, you’re doing basic analytics. You’re pulling up weather data and looking at it. What expert analysts do? They’re all about taking a huge unexplored dataset and mining it for inspiration. Analysts are lightning-fast coders who can surf vast datasets quickly, they are data storytellers. Their mandate is to summarize interesting facts and to use data for inspiration. In some organizations those facts and that inspiration become input for human deci...