Commanding Officer: Commander Brian C. Erickson CMC: Command Master Chief Rob Enquist Executive Officer: Commander Matthew F. Rutherford

Home
Leadership The Squadron Gallery New Arrivals Links Prodev Contact Us

 

New Arrivals

Congratulations on your orders to the finest P-3 squadron in the Navy, and to the beautiful state of Hawaii!

This page is designed to help you with your transition to Kaneohe Bay, Hawaii. All of the information below has been provided by the VP-47 Sponsorship Team. If you have any questions, please contact the Sponsor Program Coordinators, LTJG Gallant, daniel.gallant@navy.mil, or AD1 Klempke, chiann.klempke@navy.mil. Our Sponsorship Team will assign all new personnel a sponsor who will be in touch with you prior to your arrival at VP-47. The sponsor's sole goal is to aid in your smooth transition to Hawaii. The primary guide available online at a dod.mil website located here.


MILITARY PAY/ALLOWANCES

Military Pay Chart
Basic Allowance for Housing (BAH)
Cost of Living (COLA)
Temporary Lodging Allowance

For BAH use ZIP Code 96863
For COLA use HI009

LOCAL INFORMATION
State of Hawaii
HEALTH
Tricare
Tripler

 

External Link Disclaimer Freedom of Information Act US Navy US Navy Recruiting

For questions, comments or concerns regarding this site please contact the Squadron.


Notice: This is a U.S. Government Web Site


1. This is a World Wide Web site for official information about Patrol Squadron 47. It is provided as a public service by Patrol Squadron 47. The purpose is to provide information and news about Patrol Squadron 47 to the general public.

2. All information on this site is public domain and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested.

3. Unauthorized attempts to upload information or change information on this Web site are strictly prohibited and may be punishable under the Computer Fraud and Abuse Act of 1987 and the National Information Infrastructure Protection Act.

4. For site security purposes and to ensure that this service remains available to all users, this government computer system employs software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.

5. Except for authorized law enforcement investigation and to maintain required correspondence files, no other attempts are made to identify individual users or their usage habits. Raw data logs are used to simply determine how many users are accessing the site, which pages are the most popular, and, from time to time, from which top level domain users are coming. This data is scheduled for regular destruction in accordance with National Archives and Records Administration guidelines.