Tuesday, September 16, 2025

Legendary submarine commander Charlie MacVean dies in San Diego at 88 – San Diego Union-Tribune


In Memoriam: Captain Charles R. MacVean, USN (Ret.)

The Silent Warrior Who Led with Humanity and Humor

Proceedings Staff | September 2025

Captain Charles Robert MacVean, USN (Ret.), commanding officer of USS Seawolf (SSN-575) during some of the Cold War's most perilous submarine espionage operations, died of natural causes in San Diego on 10 September 2025. He was 88.

There was something about Commander Charlie MacVean that inspired legend even among the Silent Service's most storied warriors. It wasn't his appearance—tall, chunky, crowned by thinning gray hair in his late thirties. Rather, it was his remarkable combination of unflappable composure, dry humor, and profound humanity that set him apart from the stereotypical submarine commander of his era.

As the authors of Blind Man's Bluff so memorably captured: "This was a man who could stand beneath a hatch after being doused with a column of water, dead-pan and still chewing his dripping pipe." More significantly, "This was also the man who had just led the nuclear attack submarine USS Seawolf on one of the most dangerous operations of the Cold War. She had slipped inside a Soviet sea and eavesdropped on the enemy in a way most other subs could never dare."

Early Life and Naval Academy Years

Born 22 March 1937 in Paterson, New Jersey, to Homer (a mortgage broker) and Jane MacVean (a homemaker), Charlie's path to submarine warfare began at Dartmouth College, where he enrolled as a Navy ROTC student in 1955. By his own cheerful admission, MacVean caused the college administration some headaches, landing on the school's police blotter as a member of Alpha Delta Phi—the very fraternity that would later inspire the raucous film Animal House. Despite his extracurricular adventures, he graduated summa cum laude in 1959, the same year he married his high school sweetheart, Ellen Wollemann, whom he had met when they were both juniors in 1954.

MacVean's academic prowess led him to Cornell University, where he earned a doctorate in nuclear science and engineering—the perfect credentials for Admiral Hyman G. Rickover's expanding nuclear submarine program. The timing was fortuitous; Rickover was actively seeking talented officers to man his revolutionary nuclear fleet, and MacVean's combination of technical expertise and natural leadership made him an ideal candidate.

Rising Through the Ranks

MacVean's submarine career began during the height of Cold War tensions, when American submarines were conducting some of the most classified and dangerous missions in naval history. He served with distinction aboard several boats, eventually becoming executive officer of USS Parche (SSN-683), which would later earn fame for its cable-tapping missions and recovery of Soviet missile fragments.

His performance aboard Parche caught the attention of senior leadership, leading to his appointment as commanding officer of USS Seawolf (SSN-575) in 1975. The Seawolf was no ordinary submarine—she was America's second nuclear-powered submarine, equipped with an experimental sodium-cooled reactor that proved both revolutionary and problematic. MacVean would need every ounce of his engineering expertise and leadership skills to manage both the boat's temperamental nuclear plant and her highly classified missions.

Operation Ivy Bells and the Art of Submarine Espionage

Under MacVean's command from 1975 to 1978, USS Seawolf participated in Operation Ivy Bells, one of the most audacious intelligence operations of the Cold War. This joint CIA-Navy-NSA mission involved placing sophisticated wiretaps on Soviet underwater communications cables in the Sea of Okhotsk, deep within Soviet territorial waters. The operation required Seawolf to surface near the ocean floor at depths of 400 feet while Navy saturation divers, breathing experimental gas mixtures, worked in near-freezing darkness to install and service massive recording devices on Soviet communication cables.

The intelligence gathered from these taps was invaluable, providing unencrypted Soviet naval communications about Pacific Fleet operations, ballistic missile submarine activities, and strategic nuclear capabilities. The information proved crucial during SALT II negotiations, giving American diplomats unprecedented insight into Soviet fears and intentions.

MacVean's leadership during these missions was exemplary. On one particularly harrowing operation, Seawolf became mired on the ocean floor for nearly two days during a storm, with Soviet ships potentially nearby. The crew faced the real possibility of having to use the boat's self-destruct charges rather than risk capture. MacVean's calm demeanor and engineering expertise proved crucial in working the boat free while maintaining the crew's morale and operational security.

Record-Breaking Endurance

In 1976, MacVean achieved a Navy record that demonstrated both Seawolf's capabilities and his crew's exceptional training and discipline. He kept Seawolf submerged for 89 consecutive days—a remarkable achievement that showcased not only the boat's nuclear endurance but also the crew's ability to function effectively in the confined, stressful environment of a submerged submarine for nearly three months.

This record deployment likely occurred during one of Seawolf's Ivy Bells missions, requiring the boat to remain undetected in Soviet waters for extended periods while conducting intelligence gathering operations. The achievement stands as a testament to MacVean's leadership and his crew's professionalism under extraordinary circumstances.

The Human Side of Command

What distinguished MacVean from many of his contemporaries was his profoundly human approach to command. John Freeman, who co-authored MacVean's biography Down Deep, described him as "one of the most extraordinary people I've ever met. He was so kind and understanding and empathetic—so different than the Capt. Blighs that used to dominate the Navy."

This humanity manifested itself in memorable ways. When one of his sailors, emboldened by alcohol and classified knowledge, attempted to call the White House from a phone booth outside the Horse and Cow tavern in Vallejo—the legendary submarine haunt—MacVean personally drove to retrieve the man. Instead of disciplinary action, the captain bought his sailor a beer, understanding that the stress of classified operations could affect even the most professional sailors in unexpected ways.

Relationship with Admiral Rickover

MacVean's stewardship of Seawolf brought him into regular contact with Admiral Rickover, the formidable father of the nuclear Navy known for his abrasive personality and uncompromising standards. Ellen MacVean recalled heated telephone exchanges between her husband and Rickover, particularly regarding the Seawolf's troublesome sodium-cooled reactor. "Rickover was yelling at Charlie about something involving his sub's reactor," she remembered. "He wanted things done his way. But they got it worked out. They actually had a good relationship. He liked Charlie."

This relationship speaks to MacVean's character—few officers managed to maintain Rickover's respect while also earning the affection of their crews, yet MacVean somehow bridged that difficult gap between technical excellence and human compassion.

Final Commands and Retirement

MacVean's exceptional performance as commanding officer of Seawolf led to his final promotion in 1978 to commander of Submarine Development Group ONE in San Diego. This specialized command conducted deep-ocean search, location, and recovery work—missions that remained largely classified but were crucial to America's underwater warfare capabilities during the final decade of the Cold War.

He retired from the Navy in 1981 after a distinguished career that earned him two Distinguished Service Medals for meritorious service, along with numerous other decorations that remain classified to this day. His crews remembered him not as a martinet but as a leader they never wanted to disappoint—the hallmark of truly exceptional command presence.

Life After the Navy

Following his retirement, MacVean settled in Point Loma, California, where he lived for nearly 50 years. He remained active in veteran organizations and eventually worked with biographer John Freeman on Down Deep, a memoir that captured his extraordinary career while maintaining appropriate operational security about classified missions.

True to the traditions of the Silent Service, MacVean rarely spoke publicly about his wartime experiences. The specific details of most of his submarine operations remain classified, and as a member of the Silent Service, he avoided discussing what he had done, even with family members.

The Ballad of Whitey Mack

In the submarine community, legendary commanders are sometimes honored in verse. Tommy Cox, a submariner and intelligence specialist, penned "The Ballad of Whitey Mack," which included the prophetic lines: "And every man on board knew, When the going got rough, In this game of 'Blind Man's Bluff,' Somehow he'd pull her through."

These words could have been written about Charlie MacVean, who embodied the very best of submarine leadership during one of the most dangerous periods in naval history.

Legacy and Recognition

MacVean's contributions to submarine warfare and intelligence operations cannot be fully measured in the public record—too much remains properly classified. However, his influence on submarine tactics, crew training, and operational procedures during the Cold War was profound. The techniques developed and refined during his command of Seawolf influenced a generation of submarine operations.

Perhaps more importantly, MacVean demonstrated that exceptional military leadership need not require sacrificing one's humanity. His crews served with distinction not out of fear, but out of respect and genuine affection for their commander. In an era when submarine captains were often viewed as aloof and intimidating figures, MacVean proved that empathy and humor could coexist with operational excellence and tactical brilliance.

Personal Remembrance

Captain MacVean is survived by his wife Ellen and two children: Amy Perez of La Habra Heights, California, and David MacVean of Southport, North Carolina. A third child, Lynne MacVean, predeceased him in February 2025.

Those who served with MacVean remember not just a commanding officer, but a mentor who shaped their understanding of leadership and service. Former crew members describe him as someone who "didn't act like a commander" but rather "conveyed an aura of calm reassurance"—the kind of leader who inspired excellence through example rather than intimidation.

The Silent Service Remembers

The submarine community has lost one of its most distinguished leaders, but Charlie MacVean's influence will continue through the officers and sailors he mentored, the operational procedures he developed, and the standard of humane leadership he established. In the dangerous game of "blind man's bluff" that defined Cold War submarine operations, MacVean proved that the best commanders lead not just with skill and courage, but with compassion and humor.

As the submarine community bids farewell to Captain MacVean, we remember not only his operational achievements—which must remain largely unspoken—but his demonstration that strength and kindness, professionalism and humanity, tactical brilliance and personal warmth can coexist in a single remarkable leader.

The Silent Service has lost a legend, but the Navy has gained an eternal example of leadership at its finest.

Fair winds and following seas, Captain MacVean. Well done.


Sources:

  1. Robbins, Gary. "Legendary submarine commander Charlie MacVean dies in San Diego at 88." San Diego Union-Tribune, 16 September 2025. https://www.sandiegouniontribune.com/2025/09/16/legendary-submarine-commander-charlie-macvean-dies-in-san-diego-at-88/
  2. Sontag, Sherry, Christopher Drew, and Annette Lawrence Drew. Blind Man's Bluff: The Untold Story of American Submarine Espionage. New York: PublicAffairs, 1998.
  3. Freeman, John, and C. Gresham Bayne, eds. Down Deep: Captain Charles R. MacVean, U.S. Navy (Ret.), PhD: Courage - Leadership - Hijinks. 2019.
  4. "Operation Ivy Bells." Wikipedia. Last modified 15 June 2025. https://en.wikipedia.org/wiki/Operation_Ivy_Bells
  5. Naval History and Heritage Command. "USS Seawolf (SSN-575)." https://www.history.navy.mil/
  6. "The Mission Behind Operation Ivy Bells and How It Was Discovered." Military.com, 29 June 2022. https://www.military.com/history/operation-ivy-bells.html
  7. "National History Day Winner 2021 Operation Ivy Bells." Naval Order. https://www.navalorder.org/national-history-day-winner-2021-operation-ivy-bells
  8. United States Navy Memorial. "MacVean-Charles." Navy Log. https://navylog.navymemorial.org/macvean-charles
  9. HI Sutton. "Spy Sub - USS Seawolf (SSN-575)." http://www.hisutton.com/Spy%20Sub%20-%20USS%20Seawolf%20(SSN-575).html
  10. "Malicious Life Podcast: Operation Ivy Bells." Cybereason Blog. https://www.cybereason.com/blog/malicious-life-podcast-operation-ivy-bells
  11. Legendary submarine commander Charlie MacVean dies in San Diego at 88 – San Diego Union-Tribune

Monday, September 15, 2025

The Navy Officer Ladder


So You Wanted to Be a Navy Officer… Big Mistake - YouTube

Fantasy vs. Reality (The Complete Hierarchy)

So you think being a Navy officer is all about commanding ships, sipping coffee on the bridge, and shouting "full speed ahead" like you're in a Hollywood blockbuster? Well, let's compare what the Navy officially says these ranks do versus what actually happens when you pin on those shiny new insignia – plus the brutal politics of promotion boards and the forgotten warriors of the warrant officer community.

From the mysterious warrant officers who actually know how everything works, to the bottom rung ensign who looks like a lost intern, to the admirals who spend more time in meetings than on the ocean, every officer rank comes with its own special mix of responsibility, confusion, guaranteed embarrassment, and surprisingly cutthroat promotion politics.

Let's examine what the Navy's official descriptions promise versus the comedy that unfolds in reality – with the cold, hard numbers and the backroom politics that actually determine who climbs the ladder.

The Forgotten Warriors: Warrant Officers (W-2 through W-5)

Before we dive into the commissioned officer circus, let's talk about the Navy's best-kept secret: warrant officers. These are the technical wizards who actually keep the Navy running while everyone else is playing politics.

W-2: Chief Warrant Officer 2 (CWO2) - The Technical Savant

Official Navy Description: "Technical specialists appointed from the most experienced and technically proficient petty officers. They provide technical leadership and expertise in their specialty areas."

Official Pay (2025):

  • Base Pay: $4,791.90/month ($57,503/year)
  • With BAH/BAS: ~$68,000-85,000/year depending on location

Reality Check: CWO2s are the people who actually know how to fix things when they break. While ensigns are trying to figure out which end of the ship goes forward, warrant officers are quietly solving problems that would stump half the wardroom. They're technical specialists who've been promoted from the enlisted ranks because they're simply too valuable to lose to retirement or civilian jobs.

Selection Process:

  • Official: Competitive selection from senior petty officers with demonstrated technical expertise and leadership potential
  • Reality: You need to be the person everyone calls when stuff breaks, have the respect of both enlisted and officers, and convince a board that you're more valuable as a warrant than as a senior enlisted sailor

W-3: Chief Warrant Officer 3 (CWO3) - The Subject Matter Expert

Official Pay (2025):

  • Base Pay: $5,278.50/month ($63,342/year)
  • With BAH/BAS: ~$75,000-92,000/year

Reality Check: By CWO3, you're the person junior officers whisper questions to when they don't want to look stupid in front of their boss. You're earning more than many lieutenants while actually knowing what you're doing.

W-4: Chief Warrant Officer 4 (CWO4) - The Gray-Haired Wizard

Official Pay (2025):

  • Base Pay: $5,830.80/month ($69,970/year)
  • With BAH/BAS: ~$82,000-100,000/year

W-5: Chief Warrant Officer 5 (CWO5) - The Legend

Official Pay (2025):

  • Base Pay: $8,296.20/month ($99,554/year)
  • With BAH/BAS: ~$115,000-135,000/year

Reality Check: CWO5s are unicorns – senior warrant officers who've reached the top of their technical field and command respect from admirals. They're making captain-level money while actually knowing how to fix things.

The Warrant Officer Paradox: These officers have the most practical knowledge, often earn more than the commissioned officers they advise, and are absolutely critical to operations – yet they're largely invisible in the Navy's promotional materials and completely absent from most discussions of "officer career paths."


Now, on to the commissioned officer circus, where politics matter more than competence and promotion boards determine your fate...

O-1: Ensign (ENS) - The Golden Guinea Pig

Official Navy Description: "The most junior commissioned officer rank in the U.S. Navy. Ensigns serve as division officers and are responsible for leading and managing enlisted personnel while learning leadership and naval warfare skills."

Official Pay (2025):

  • Base Pay: $3,826.20/month ($45,914/year)
  • With BAH/BAS: ~$55,000-70,000/year depending on location
  • Benefits: Full medical/dental, 30 days leave, commissary privileges

Reality Check: Welcome to the Navy Officer Club! You're an ensign now, which means two things: you've got a shiny gold stripe on your sleeve and absolutely no idea what you're doing. That official description about "leading and managing enlisted personnel" is adorable – you'll be lucky if you can manage to find the head without getting lost, and you're making less money than the warrant officers who are quietly fixing your mistakes.

Promotion to LTJG:

  • Official Process: Automatic promotion after 18-24 months with satisfactory performance
  • Political Reality: This is the only "gimme" promotion in your career. Don't assault anyone, don't sink anything expensive, don't call the captain "dude," and you'll get promoted. The Navy invested too much in your training to let you fail here.
  • Selection Rate: ~98% (you'd have to work hard to fail this one)

Think of ensign as the Navy's polite way of saying, "Here's your gold stripe and $45K. Try not to embarrass us."

O-2: Lieutenant Junior Grade (LTJG) - The Awkward Middle Child

Official Navy Description: "Junior officers who typically serve as assistant department heads, division officers, or in specialized roles. They have gained initial experience and are developing their leadership capabilities."

Official Pay (2025):

  • Base Pay: $4,413.00/month ($52,956/year)
  • With BAH/BAS: ~$62,000-78,000/year depending on location

Reality Check: You've earned yourself a slightly thicker stripe, a $7K pay bump, and the unofficial nickname "Lieutenant Just Got Here." You're still making less than a senior warrant officer, but hey, at least you have that college degree!

Promotion to Lieutenant:

  • Official Process: Promotion board review after 2 years time in grade
  • Political Reality: Still mostly automatic if you haven't screwed up majorly. The board is looking for basic competence and whether you've completed your surface warfare qualification (or aviation/submarine equivalent). Having a good relationship with your department head and XO helps.
  • Selection Rate: ~95% (still hard to fail, but possible)
  • Board Politics: Your fitness reports matter now. A single "fair" instead of "good" can derail you.

O-3: Lieutenant (LT) - Middle Management Mayhem

Official Navy Description: "Experienced junior officers who serve as department heads on smaller ships, division officers on larger vessels, or in command of smaller units. They are expected to demonstrate strong leadership and technical competence."

Official Pay (2025):

  • Base Pay: $5,111.40/month ($61,337/year)
  • With BAH/BAS: ~$72,000-88,000/year depending on location

Reality Check: You're the Navy's middle management, earning $61K to juggle sailors' problems and endless admin work. The good news? You're finally making more than most warrant officers. The bad news? They still know more than you do.

Promotion to Lieutenant Commander:

  • Official Process: Highly competitive selection board after 3-4 years time in grade
  • Political Reality: This is where the games begin. You need strong fitness reports, successful completion of department head tour, and the right kind of mentor. Your commanding officer's endorsement carries huge weight.
  • Selection Rate: ~80% (the first real cut)
  • Board Politics:
    • Timing matters: Early promotes get the best jobs
    • Warfare qualification essential: No SWO pin? No promotion
    • Geographic assignment politics: Some ships/commands are promotion killers
    • The "golden path" emerges: Certain career tracks (destroyer department head, carrier air wing, etc.) are heavily favored

O-4: Lieutenant Commander (LCDR) - The Career Crossroads

Official Navy Description: "Senior officers who typically serve as executive officers on smaller ships, department heads on larger vessels, or commanding officers of smaller units. They are considered experienced leaders ready for significant operational responsibility."

Official Pay (2025):

  • Base Pay: $5,951.40/month ($71,417/year)
  • With BAH/BAS: ~$82,000-98,000/year depending on location

Reality Check: Welcome to "the career gate." This is where the Navy decides if you're command material or if you'll be quietly shuffled toward retirement. You're making decent money, but the stress is starting to match the paycheck.

Promotion to Commander:

  • Official Process: Extremely competitive selection board after 3-4 years time in grade
  • Political Reality: This is where politics become everything. You need:
    • The right mentor: A senior captain or admiral who knows your name
    • The right jobs: XO tours on "right" ships, major staff assignments
    • The right timing: Promotion board composition changes yearly
    • No black marks: One bad fitness report can end your career
  • Selection Rate: ~70% (welcome to the real competition)
  • Board Politics:
    • The "deep select" game: Some officers get promoted early (great career boost) vs. others barely make it (career limiting)
    • Community politics: Surface warfare vs. aviation vs. submarines compete for slots
    • Congressional influence: Flag officers on boards have their own agendas
    • The "golden path" narrows: Only specific career tracks lead to command

O-5: Commander (CDR) - Real Power, Real Politics

Official Navy Description: "Senior officers who command destroyers, submarines, aviation squadrons, or serve as executive officers on major combatant ships. They are responsible for the operational readiness and effectiveness of their commands."

Official Pay (2025):

  • Base Pay: $6,931.50/month ($83,178/year)
  • With BAH/BAS: ~$94,000-115,000/year depending on location

Reality Check: You're finally the boss of something significant, earning $83K to match. But with great power comes great paranoia – one mistake ends careers at this level.

Promotion to Captain:

  • Official Process: Ultra-competitive selection board after 3-4 years time in grade
  • Political Reality: This is where careers go to die. You need:
    • Flawless command tour: Zero incidents, high readiness scores, happy crew
    • Joint experience: Pentagon or combatant command staff time
    • Advanced education: War college or equivalent
    • Powerful sponsors: Flag officers who will advocate for you
  • Selection Rate: ~50% (half of all commanders will never see captain)
  • Board Politics:
    • The "below zone/in zone/above zone" game: Being selected early is career gold; being passed over twice means forced retirement
    • Community quotas: Each warfare community gets specific numbers of promotions
    • Political appointments: Some slots go to officers with congressional connections
    • The "joint mafia": Officers with joint experience have significant advantages
    • Regional politics: Pacific Fleet vs. Atlantic Fleet competitions for slots

O-6: Captain (CAPT) - The Political Sea Lords

Official Navy Description: "Senior officers who command major combatant ships such as cruisers and aircraft carriers, or serve as commanding officers of major shore installations. They are responsible for the overall operational effectiveness of large, complex organizations."

Official Pay (2025):

  • Base Pay: $8,422.80/month ($101,074/year)
  • With BAH/BAS: ~$115,000-135,000/year depending on location

Reality Check: You've made it to the $100K club! You're commanding floating cities or major installations, but you're also living in constant terror of the headline that ends your career.

Promotion to Rear Admiral (Lower Half):

  • Official Process: The most competitive selection board in the Navy
  • Political Reality: This is pure politics. You need:
    • Perfect command tour: Major command (carrier, cruiser, major shore command) with zero negative press
    • Washington experience: Pentagon senior staff, Navy staff, or joint staff
    • Advanced joint education: Often multiple degrees and fellowships
    • Political connections: Relationships with civilian leadership
    • Media management: Ability to handle congressional testimony and press
  • Selection Rate: <5% (fewer than 1 in 20 captains make flag rank)
  • Board Politics:
    • The "Golden 20": Roughly 20-25 captains get selected for admiral each year Navy-wide
    • Community politics intensify: Surface, aviation, submarine, and special operations compete for limited slots
    • Civilian oversight: Secretary of the Navy and civilian leadership heavily influence selections
    • Congressional politics: Some selections are essentially political appointments
    • The "diversity mandate": Modern boards consider demographics alongside performance
    • Risk aversion: Any hint of controversy disqualifies candidates

O-7: Rear Admiral (Lower Half) (RDML) - Baby Admiral Politics

Official Navy Description: "Flag officers who typically command task forces, serve as major staff officers, or lead specialized warfare communities. They are responsible for strategic planning and execution of naval operations across multiple commands."

Official Pay (2025):

  • Base Pay: $10,399.50/month ($124,794/year)
  • With BAH/BAS: ~$140,000-165,000/year depending on location

Reality Check: Welcome to flag rank, where you're making corporate executive money but every decision gets scrutinized by Congress, the media, and your boss's boss's boss. That "Lower Half" designation still stings, but the six-figure salary helps.

Promotion to Rear Admiral (Upper Half):

  • Official Process: Senior flag selection board review
  • Political Reality: You're now playing in the big leagues where:
    • Performance matters less than perception: Headlines can kill careers instantly
    • Civilian relationships crucial: Defense contractors, congressional staff, think tanks all matter
    • Media training essential: Every public appearance is career-affecting
    • Inter-service politics: You're competing with Army and Air Force generals for attention and resources
  • Selection Rate: ~70% of lower half admirals make upper half
  • Board Politics:
    • The "joint requirement": Must have significant joint experience
    • Geographic politics: Pacific vs. Atlantic commands compete for prestige
    • Specialty politics: Operations vs. intelligence vs. logistics admirals compete for top spots

O-8: Rear Admiral (Upper Half) (RADM) - The Real Political Deal

Official Navy Description: "Senior flag officers who command numbered fleets, major operational commands, or serve in key staff positions. They are responsible for theater-level operations and strategic military planning."

Official Pay (2025):

  • Base Pay: $11,329.50/month ($135,954/year)
  • With BAH/BAS: ~$155,000-180,000/year depending on location

Reality Check: You've graduated from "Lower Half" to "Upper Half" and your salary reflects it. You're commanding entire fleets while navigating politics that would make a senator dizzy.

Promotion to Vice Admiral:

  • Political Reality: At this level, it's almost entirely political:
    • White House relationships: You need to be known by National Security Council staff
    • Congressional testimony skills: You'll be grilled by politicians regularly
    • Alliance management: International relationships matter enormously
    • Crisis management: How you handle disasters defines your career
  • Selection Rate: ~50% of upper half admirals make three stars
  • Board Politics:
    • Presidential influence: The President's national security priorities affect selections
    • Think tank connections: Relationships with policy institutes matter
    • Media savvy: Ability to represent the Navy in public becomes crucial

O-9: Vice Admiral (VADM) - The Strategic Political Masterminds

Official Navy Description: "Three-star flag officers who command major fleets, unified combatant commands, or serve as senior staff officers in joint commands. They are responsible for regional military strategy and major operational planning."

Official Pay (2025):

  • Base Pay: $12,398.70/month ($148,784/year)
  • With BAH/BAS: ~$170,000-200,000/year depending on location

Reality Check: Nearly $150K base pay to play chess with fleets while managing relationships with world leaders. You're not just part of the Navy anymore – you ARE the Navy's face to the world.

Promotion to Admiral:

  • Political Reality: Pure politics at the highest level:
    • Presidential approval: The President personally knows who you are
    • Senate confirmation: Your promotion requires congressional approval
    • International reputation: Foreign allies and competitors know your name
    • Crisis leadership: Your response to international incidents matters more than anything
  • Selection Rate: ~30% of vice admirals make four stars (only ~8-12 four-star admirals in the entire Navy at any time)

O-10: Admiral (ADM) - The Ultimate Political Ocean Gods

Official Navy Description: "Four-star flag officers who serve as senior leaders of major commands, unified combatant commands, or as senior staff officers in joint and combined commands. They are responsible for strategic military planning at the highest levels."

Official Pay (2025):

  • Base Pay: $16,774.20/month ($201,290/year)
  • With BAH/BAS: ~$230,000-260,000/year depending on location

Reality Check: You're earning more than most Fortune 500 CEOs to command oceans and advise presidents. At this level, you're not just a naval officer – you're a global strategic leader whose decisions affect international relations.

The Ultimate Political Reality: Admirals are nominated by the President and confirmed by the Senate. Every decision you make gets analyzed by foreign intelligence services, congressional committees, and international media. Your phone calls move markets and militaries.


The Brutal Truth About Navy Promotion Boards

How Selection Boards Really Work:

  1. The Numbers Game: Each promotion board has specific quotas by community. Surface warfare, aviation, submarines, and special operations fight for limited slots.

  2. The "Golden Path" Reality: Certain career progressions are heavily favored:

    • Surface: DDG department head → DDG XO → DDG CO → Major staff → Cruiser/LHD CO
    • Aviation: Squadron department head → Squadron XO → Squadron CO → Major staff → Air wing command
    • Submarines: Department head → XO → CO → Major staff → Squadron command
  3. The Fitness Report Game: Your promotion depends entirely on how well your boss writes. A single poorly written fitness report can end a 15-year career.

  4. The Mentor Network: Officers without flag officer mentors rarely make it past commander. The informal "old boys network" is alive and well.

  5. Geographic Politics: Some commands are promotion enhancers, others are career killers. Everyone knows which is which.

  6. The Risk Aversion Factor: Modern promotion boards are terrified of controversy. Any hint of scandal, media attention, or congressional inquiry kills careers.

  7. The Joint Requirement: You cannot make flag rank without significant joint assignments, but joint assignments often hurt your warfare community credibility.

The Unspoken Rules:

  • Never embarrass the Navy: Headlines end careers faster than poor performance
  • Timing is everything: Being promoted early creates a career snowball effect
  • Politics matter more than competence: Especially at senior levels
  • The "diversity initiative" is real: Modern boards consider demographics alongside performance
  • Congressional connections help: Sadly, it's often who you know, not what you know
  • Media training is essential: One bad interview can torpedo decades of service

The Warrant Officer Alternative:

While commissioned officers play political games, warrant officers focus on technical expertise and often have more job satisfaction, better work-life balance, and competitive pay without the political stress. They're the Navy's best-kept secret for a reason.


The Bottom Line: The Navy's promotion system is a complex political machine wrapped in the veneer of meritocracy. While competence matters, politics, timing, and luck often determine who climbs the ladder. The official descriptions paint a picture of systematic career progression, but the reality is a cutthroat competition where only the politically savvy survive to the top.

Fair winds, following seas, and may the promotion board politics be ever in your favor!

 

Sunday, September 7, 2025

Decades-Old Windows Accessibility Feature Continues to Enable System Breaches Despite Security Awareness

Legacy "Sticky Keys" exploit remains a persistent threat vector for attackers with physical device access

A critical Windows accessibility feature designed to assist users with disabilities continues to serve as a reliable attack vector for cybercriminals and nation-state actors seeking to bypass login screens and escalate privileges on targeted systems, according to recent security research and threat intelligence reports.

The Sticky Keys exploit, which leverages the Windows accessibility program sethc.exe activated by pressing the Shift key five times consecutively, has been actively exploited by attackers for over two decades—from Windows XP through the latest Windows 11 installations. Despite Microsoft's ongoing security improvements, this technique remains valid on the latest version of Windows 11.

Recent Exploitation Activity

Security researchers have documented multiple instances of Sticky Keys exploitation in 2025, including its use by Chinese nation-state actors. The MITRE ATT&CK framework classifies this technique under T1546.008, noting that adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by accessibility features.

Microsoft security researchers have observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting vulnerabilities targeting internet-facing SharePoint servers, while also leveraging traditional accessibility exploits as part of broader attack campaigns.

In corporate environments, security teams report detecting attempted Sticky Keys binary hijacking attacks against end-user laptops. Microsoft's AccessibilityEscalation trojan detection system identifies when accessibility utilities are being changed to attempt password resets, though this typically represents attacks from inside the system rather than network-based intrusions.

Technical Implementation and Impact

The exploit functions by replacing the legitimate sethc.exe binary with cmd.exe or another malicious executable. When attackers replace the Sticky Keys executable file with the command prompt executable, pressing Shift five times at the login screen launches a command prompt with SYSTEM-level privileges.

Research published in July 2022 by Cyberis demonstrates that this technique requires physical access to a device with limited configuration hardening and the ability to boot it into Windows Recovery Environment (WinRE) or access the operating system disk in an unencrypted format.

The attack's persistence stems from its exploitation of legitimate system functionality. Two common accessibility programs are C:\Windows\System32\sethc.exe, launched when the shift key is pressed five times and C:\Windows\System32\utilman.exe, launched when the Windows + U key combination is pressed.

Enterprise Security Implications

The vulnerability poses significant risks to enterprise environments, particularly those with inadequate physical security controls. The Sticky Keys exploit poses several significant risks to systems, including unauthorized access allowing attackers to bypass login credentials, data theft or loss with administrative privileges, and malware installation compromising system security and integrity.

Recent threat intelligence indicates the exploit's continued relevance in modern attack campaigns. A May 2025 security analysis revealed that Microsoft considers physical access exploits outside their threat model, stating that issues requiring physical access are not considered security vulnerabilities unless they allow direct code execution bypassing the logon screen.

Modern Mitigation Strategies

Security experts recommend multiple layers of protection against accessibility-based attacks. BitLocker's full operating system disk encryption with recovery keys that are only accessible to key personnel or administrators provides the most comprehensive solution.

Organizations should implement several protective measures including disabling the Sticky Keys activation shortcut through Windows settings, using full disk encryption like BitLocker, setting BIOS passwords to restrict unauthorized access to system settings, and maintaining regular system updates.

Endpoint Detection and Response (EDR) solutions provide additional protection layers. Microsoft Defender for Endpoint and similar EDR tooling can detect Sticky Keys attacks and stop malicious activity, though if an attacker successfully replaces sethc.exe, they have likely already modified the disk and potentially disabled other controls.

Broader Context: Windows Accessibility Security

The Sticky Keys exploit represents part of a broader pattern of accessibility feature abuse in modern operating systems. In January 2025, Cyberis discovered a local privilege escalation vulnerability (CVE-2025-27582) in One Identity Secure Password Extension that similarly exploits accessibility features available on the Windows lock screen.

Security researchers note that this attack vector highlights fundamental tensions between accessibility and security. One security researcher observed in May 2025 that "Windows has many hidden doors—some are there for accessibility, others unintentionally enable powerful bypasses".

Current Threat Landscape

While Microsoft addressed 111 vulnerabilities in its August 2025 Patch Tuesday release, including 13 rated critical and 91 rated as important, elevation of privilege vulnerabilities accounted for 39.3% of the vulnerabilities patched, the Sticky Keys exploit persists due to its reliance on legitimate system functionality rather than traditional software vulnerabilities.

CISA's threat intelligence documentation confirms that adversaries continue to leverage accessibility features, noting that "the sethc.exe program is often referred to as 'sticky keys', and has been used by adversaries for unauthenticated access through a remote desktop login screen".

The persistence of this decades-old technique underscores the ongoing challenges security teams face in balancing accessibility requirements with robust security controls, particularly in environments where physical device access cannot be comprehensively controlled.

Beyond Sticky Keys: The Broader Accessibility Attack Surface

The Sticky Keys exploit represents just one component of a comprehensive attack surface targeting Windows accessibility features. Security researchers have documented similar vulnerabilities affecting multiple accessibility programs that can be triggered from the login screen, creating what the MITRE ATT&CK framework categorizes as "Event Triggered Execution: Accessibility Features" (T1546.008).

Additional Vulnerable Accessibility Programs

Beyond the well-known sethc.exe (Sticky Keys), attackers can exploit several other accessibility binaries using identical replacement or registry modification techniques:

  • Utility Manager (utilman.exe): Activated by Windows+U key combination, manages accessibility options
  • On-Screen Keyboard (osk.exe): Virtual keyboard accessible via touch interfaces and accessibility menu
  • Magnifier (Magnify.exe): Screen magnification tool for visually impaired users
  • Narrator (Narrator.exe): Screen reader that announces text and interface elements
  • Display Switcher (DisplaySwitch.exe): Manages multiple monitor configurations
  • App Switcher (AtBroker.exe): Assistive Technology broker for application switching

Research published in May 2025 demonstrates that these accessibility features follow identical exploitation patterns, with attackers replacing legitimate binaries with cmd.exe or configuring Image File Execution Options (IFEO) registry entries to launch malicious debuggers.

Registry-Based Attack Methods

Modern accessibility exploits increasingly rely on registry manipulation rather than file replacement, using the Image File Execution Options mechanism. This approach configures malicious "debuggers" for accessibility programs without replacing the original binaries, making detection more challenging.

The registry-based method involves creating entries under: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\[program].exe

With a "Debugger" value pointing to cmd.exe or other malicious executables. This technique bypasses Windows File Protection (WFP) and Windows Resource Protection (WRP) mechanisms that protect system files in newer Windows versions.

Microsoft's Detection and Mitigation Responses

Microsoft has implemented several defensive measures to counter accessibility-based attacks, though their effectiveness varies across different Windows versions and security configurations.

Windows Defender Detection: Since September 2018, Windows Defender includes signatures for Win32/AccessibilityEscalation that detect when accessibility programs have been hijacked through IFEO registry modifications. The detection automatically removes malicious debugger entries and restores normal functionality.

Security researchers report that Windows Defender monitors the following accessibility programs for suspicious debugger configurations:

  • Display Switcher (DisplaySwitch.exe)
  • On-Screen Keyboard (osk.exe)
  • Magnifier (Magnify.exe)
  • Narrator (Narrator.exe)
  • Sticky Keys (sethc.exe)
  • Utility Manager (utilman.exe)

System File Protection: Modern Windows versions implement enhanced code signing requirements and system file protection. In newer Windows versions, replaced binaries must be digitally signed for x64 systems, reside in the system directory, and remain protected by Windows File or Resource Protection mechanisms.

Real-Time Monitoring: Enterprise security solutions can monitor for file integrity changes and registry modifications affecting accessibility programs. Windows System File Checker (sfc.exe) can detect unauthorized modifications to system binaries, though it cannot identify permission-based attacks or registry modifications.

Limitations of Current Defenses

Despite Microsoft's defensive improvements, significant gaps remain in accessibility exploit prevention. Windows Defender detection can be bypassed in Safe Mode, where the antivirus service starts with reduced functionality, providing attackers with approximately 30 seconds to complete modifications before detection activates.

The registry-based IFEO method remains effective even with file protection mechanisms enabled, as it doesn't require modifying protected system files. Additionally, permission-based attacks that modify file ACLs (Access Control Lists) to grant write access to accessibility binaries often evade traditional detection mechanisms.

Recent security research indicates that while direct binary replacement triggers Windows Defender alerts, subtle permission modifications and alternative debugger configurations may still succeed on fully patched systems with endpoint protection enabled.

Enterprise Implications and Advanced Mitigations

Organizations face heightened risks from accessibility-based attacks due to their legitimate business requirements for accessibility compliance and remote access capabilities. The techniques work effectively against Remote Desktop Protocol (RDP) connections, expanding the attack surface beyond physical access scenarios.

Advanced Protection Strategies include implementing application allowlisting through Windows Defender Application Control or AppLocker to prevent unauthorized executable launches, deploying Host-based Intrusion Prevention Systems (HIPS) that monitor registry modifications and file integrity changes, and configuring audit policies to log accessibility feature usage and registry modifications.

Detection Capabilities should include monitoring for unusual accessibility program launches outside normal user sessions, tracking file modification timestamps for system accessibility binaries, and implementing behavioral analysis to identify abnormal command prompt launches from login screens.

Security teams report that comprehensive protection requires layered defenses combining disk encryption, endpoint detection and response (EDR) solutions, and physical security controls. Organizations must balance accessibility compliance requirements with security restrictions, often implementing separate accessibility workstations with enhanced monitoring rather than disabling features entirely.


SIDEBAR: Understanding the Sticky Keys Exploit

How the Attack Works

Step 1: Physical Access Required

  • Attacker needs physical access to the target device
  • Device must be powered off or restarted
  • Works on all Windows versions from XP through Windows 11

Step 2: Boot into Recovery Environment

  • Restart Windows while holding Shift key
  • Select: Troubleshoot → Advanced Options → Command Prompt
  • Access Windows Recovery Environment (WinRE)

Step 3: File Replacement

  • Navigate to C:\Windows\System32\
  • Backup original sethc.exe file
  • Replace sethc.exe with cmd.exe (or malicious executable)

Step 4: Exploitation

  • Restart into normal Windows
  • At login screen, press Shift key 5 times
  • Command prompt opens with SYSTEM privileges
  • Create new administrator account or reset passwords

Consumer Protection Measures

Essential Safeguards:

🔒 Enable Full Disk Encryption

  • Windows: Enable BitLocker on all drives
  • How: Settings → Update & Security → Device Encryption
  • Why: Even with physical access, encrypted drives remain protected
  • Key Management: Store recovery keys securely, separate from device

🚫 Disable Sticky Keys Shortcut

  • Path: Settings → Ease of Access → Keyboard
  • Action: Turn off "Use Sticky Keys" shortcut
  • Impact: Prevents Shift-key activation without affecting accessibility

🔐 Set BIOS/UEFI Password

  • Access: Press F2/F12/Delete during boot (varies by manufacturer)
  • Function: Prevents unauthorized boot device changes
  • Backup: Document password in secure location

📱 Physical Security Best Practices

  • Never leave devices unattended in public spaces
  • Use cable locks for desktop computers
  • Enable automatic screen locks (maximum 15 minutes)
  • Consider laptop tracking software

🛡️ Additional Security Layers

  • Windows Defender: Ensure real-time protection enabled
  • User Account Control (UAC): Keep at default or higher
  • Windows Updates: Enable automatic installation
  • Secure Boot: Verify enabled in UEFI settings

Detection and Response

Warning Signs:

  • Unexpected administrative accounts
  • Modified system files (sethc.exe timestamp changes)
  • Unusual login attempts or system behavior
  • EDR alerts for accessibility file modifications

If Compromised:

  1. Immediately disconnect from network
  2. Boot from external antivirus rescue disk
  3. Check for unauthorized user accounts
  4. Restore sethc.exe from backup
  5. Change all passwords after verification
  6. Consider complete system reimaging

Enterprise Considerations:

  • Deploy endpoint detection and response (EDR) solutions
  • Implement device compliance policies
  • Regular security awareness training
  • Physical security assessments for workstations

Sources

  1. Twingate. (2025). "What Is The Sticky Keys Exploit? How It Works & Examples." https://www.twingate.com/blog/glossary/sticky%20keys%20exploit
  2. MITRE Corporation. (2025). "Event Triggered Execution: Accessibility Features, Sub-technique T1546.008." ATT&CK Enterprise Framework. https://attack.mitre.org/techniques/T1546/008/
  3. Payne, B. (2025). "Ethical hacking: How to conduct a Sticky Keys hack." TechTarget SearchSecurity. https://www.techtarget.com/searchsecurity/feature/Ethical-hacking-How-to-conduct-a-Sticky-Keys-hack
  4. Microsoft. (2025). "Need help determining the root cause of a Security Incident M365 Defender." Microsoft Q&A Community. https://learn.microsoft.com/en-us/answers/questions/918335/need-help-determining-the-root-cause-of-a-security
  5. Cyberis Limited. (2022). "Sticky Keys - classic EUD device privilege escalation." https://www.cyberis.com/article/sticky-keys-classic-eud-device-privilege-escalation
  6. Salas, E. (2024). "Exploiting Sticky Keys via Sethc.exe for Privilege Escalation on Windows." Medium. https://medium.com/@enyel.salas84/exploiting-sticky-keys-via-sethc-exe-for-privilege-escalation-on-windows-03a15f2fd560
  7. Alert Logic. (2025). "Windows Sticky Keys/Utilman Registry cmd.exe Backdoor." Alert Logic Support Center. https://support.alertlogic.com/hc/en-us/articles/360007307931-Windows-Sticky-Keys-Utilman-Registry-cmd-exe-Backdoor
  8. Data Luthier. (2025). "The Sticky Keys Hack: BitLocker Unlocked in Seconds." https://dataluthier.com/2025/05/21/the-sticky-keys-hack/
  9. Narang, S. (2025). "Microsoft's August 2025 Patch Tuesday Addresses 107 CVEs." Tenable. https://www.tenable.com/blog/microsofts-august-2025-patch-tuesday-addresses-107-cves-cve-2025-53779
  10. Cybersecurity and Infrastructure Security Agency. (2025). "Event Triggered Execution: Accessibility Features." CISA Eviction Strategies Tool. https://www.cisa.gov/eviction-strategies-tool/info-attack/T1015
  11. Microsoft Security. (2025). "Disrupting active exploitation of on-premises SharePoint vulnerabilities." Microsoft Security Blog. https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/