With small arms gunfire, mortar rounds and Rocket Propelled Grenades from hundreds of Taliban firing into a small U.S. Army outpost in Northeastern Afghanistan, Staff Sgt. Clint Romesha asked his fellow soldiers if there were any volunteers to help him lead a counterattack to take back the front gate.
He was surprised by the response — a powerful moment of truth which he would later call the proudest moment of his Army career.
Their outpost had been overrun, Army soldiers had been killed, remaining fighters had been unable to get to ammunition supplies and Taliban fighters had breached the front gate, Romesha explained.
“I said I need a group of volunteers. Five guys who did not even know what the plan was and did not know what I was about to ask stood up with pure grit and determination and said they would follow me anywhere. I told them the counterattack plan,” Romesha told Scout Warrior in an interview.
Romesha helped lay down suppressive fire so that fallen soldiers could be recovered during the attack, destroyed numerous Taliban fighters coming through the gate, directed air support from Apache helicopters once they arrived and led an impactful counterattack which turned the tide of the deadly battle on that morning of October 3, 2009.
Romesha and his fellow soldiers, who spent months on a small, 52 soldier-strong fighting position in the Nuristan Province of Afghanistan called Combat Outpost Keating, were used to daily attacks from Taliban fighters.
“All of a sudden we were overwhelmed with machine guns, mortars and RPGs. We’d been there three months and had gotten attacked pretty much on a daily basis, so it would not have been unusual to wake up to something like that. When these rounds came in, we knew it was something totally different,” He explained.
Romesha explained that every defensive position went into a cyclic rate of fire to try to defend as fast as they could shoot back — but the enemies overwhelming fire was too much for them.
“Soldiers started running out of ammunition at the battle positions and we could not get resupplies to them because the outpost sat at the bottom of a valley. Anytime you step outside into the open, you were a target. No matter where we stood, bullets were just raining down on us,” he explained.
Romesha’s counterattack plan was both risky and ambitious because he wanted to lead a small team of soldiers to take back ammunition points, close off the front gate to Taliban fighters pouring in, get to a mortar position, and perform a crucially important casualty recovery of the fallen soldiers.
“The Lieutenant gave me a go ahead on the plan. The Taliban fighters that had breached the wire had started torching all the hard structures in the buildings and burning them. The whole outpost was on fire,” Romesha recalled.
Due to resilience and combat determination from Romesha and other soldiers, they were able to fight their way back toward ammunition supply points on the outpost and take back the front gate. This counterattack push resulted in close-quarter battle wherein Taliban fighters were often less than 20-meters away, Romesha explained.
“We started pushing ammo back and started reinforcing positions which allowed us a little more freedom of maneuver,” he said.
As this was happening, air support from Apache attack helicopters arrived along with some eventual reinforcements from the Army’s 10th Mountain Division.
While he may not choose to explain things this way, it seems clear from the events that day that the whole outpost would not likely have survived – and casualties would have been far greater – had Romesha not shown such courage, spirit and leadership in battle. His counterattack saved the Outpost from complete destruction.
While confronting a deadly blaze of gunfire and repeatedly risking his life to save, defend and recover his fellow soldiers, Romesha was not thinking of recognition on the day of the battle. In fact, upon learning years later that he would receive the Medal of Honor for his heroism during the battle, Romesha was surprised.
“It was definitely a team effort that day. If it was not for those 52 guys I would not be here. I’d rather die today than take one shred of credit for doing nothing more than doing my job like everyone else was doing,” he said.
Romesha went on to emphasize that, in his mind, the real heroes are the eight soldiers who died in battle that day.
“They are only gone unless we do not remember them. In my humble opinion, true heroes are those that don’t come home. Those are the only ones that deserve that title of hero. They gave up everything and more than could ever be asked of them,” he explained.
While he is still reluctant to acknowledge his own heroism on that day in 2009, called the Battle of Kamdesh in Afghanistan, Romesha received the Medal of Honor from President Barack Obama in February, 2013.
On the day of the battle, Romesha was assigned to the 3rd Squadron, 61st Cavarly Regment, 4th Brigade Combat Team, 4th Infantry Division. He fought alongside fellow soldiers and insists on remembering his fellow American soldiers who died that day.
In order to recognize and pay tribute to Romesha’s emphasis – the names of the eight soldiers who died during the attack are: Vernon Martin, Justin Gallegos, Joshua Kirk, Josh Hardt, Michael Scusa, Stephen Mace, Christopher Griffin and Kevin Thompson.
The intensity of devotion to his fellow soldiers, motivated by loyalty, love and protective instinct, provided the inspiration for Romesha’s actions in combat
“It wasn’t a day of hatred toward the enemy. It did not matter about the politics. It mattered about those brothers to your left and your right – we did not fight because we hated the guys who were attacking us, we did it more because we loved the guys that were on our left and right. Love will win out over hate and anger any day of the week,” Romesha said.
Romesha is the son of a Vietnam veteran and a grandson of a World War II veteran. He lives in North Dakota.
Troops rarely get a say in anything. As a lower-enlisted, your opinion is often discounted and–not to burst any bubbles–as you climb higher, you’ll likely find more of the same. One of the rare exceptions, however, is in determining the conditions of your reenlistment.
Nine times out of ten, a reenlisting troop will say, “screw it, just give me the paperwork” without testing the limits of exactly how far a commander is willing to go to keep them in. Commanders can shoot down the silly requests, sure, but on rare, beautiful occasions, a troop will get exactly what they want.
These are a few of those moments:
While putting out a fire
It makes perfect sense if you’re a firefighter to have your reenlistment in the middle of a simulated fire. The key word here is ‘simulated.’ If it wasn’t, you probably should focus on, you know, the task at hand.
On an anchor
This one seems fitting as you’re tying your career down for a few more years.
Why reenlist before your jump or after you land when you can save time and take the Oath right in the middle?
At a Gamestop
Deep down, we all know that dude’s reenlistment bonus is going towards video games. Let’s just cut out the middleman and hand the check directly to the guy behind the counter.
At a football game
You and your buddies might as well get free tickets to a football game while you give Uncle Sam a few more years of your life.
In the gas chamber
This may seem like a terrible idea, but with all that CS gas, you can try and pull the “I didn’t make the oath. I was coughing too much!” line if you change your mind.
Pro tip: It won’t work.
At the South Pole
On the bright side, they got an Antarctica Service Medal in exchange for giving a few additional years to Uncle Sam.
By Jon motherf*cking Bon Jovi at the One World Trade Center
I’m not even mad. This is just impressive. She forever has a one-up on anyone trying to outdo her reenlistment.
“You just want a reenlistment on the bow of the ship? Oh, that’s neat…”
When ground fighting gets close, warfighters reach for their sidearms to save the day. Here are five of the most widely used and beloved pistols in U.S. military history:
1. Harper’s Ferry Model 1805
The first pistol manufactured by a national armory, the Model 1805 was a. 54 caliber, single-shot, smoothbore, flintlock issued to officers. Known as “horsemen’s pistols,” they were produced in pairs, each one bearing the same serial number. The “brace,” as the pair was labeled, was required for more immediate firepower since each pistol had to be reloaded after a single shot. The heritage of the pistol is recognized today in the insignia for the U.S. Army Military Police Corps, which depicts crossed Model 1805s.
2. Colt Revolvers (1851 Navy and M1873)
A widely manufactured sidearm with over 250,000 made, the 1851 is the pistol that gave Confederate officers the in-close firepower they preferred. This .38 caliber six shot revolver was used by famous gunslingers like Doc Holiday and Wild Bill Hickok as well as military leaders like Gen. Robert E. Lee and Gen. Nathan B. Forrest. Although the pistol used the “Navy” name as a tribute to the mid-19th Century Texas Navy, it was mostly used by land forces, including the pre-Civil War Texas Rangers.
Another popular Colt revolver was the M1873, known as the pistol that won the west because of its wide use among U.S. Army cavalry forces across the American frontier. The M1873 (with a pearl handle) was also famously carried by Gen. George S. Patton during World War II.
3. Colt M1911 pistol
Arguably the most popular military sidearm in the history of warfare, the M1911 is a single-action, semi-automatic, magazine-fed, recoil-operated pistol. The M1911 (more commonly known as “the forty-five,”) was the U.S. military’s standard issue sidearm from 1911 until 1986, which means it saw action in every major war and contingency operation from World War I until near the end of the Cold War. The M1911 was replaced as standard issue by the Beretta M9, which was for the most part a very unpopular decision across the military because of the associated reduction in firepower. Modernized derivative variants of the M1911 are still in use by some units of the U.S. Army Special Forces, the U.S. Navy and U.S. Marine Corps.
4. Heckler & Koch Mark 23
The fact that this is SOCOM’s sidearm of choice says a lot about the offensive power and high-tech features of this pistol. First produced in 1991, this is basically an M1911 on steroids. The standard package comes with a suppressor and laser aiming module — necessary gear for the special operations mission suite.
5. Sig Sauer P226
The P226 has been standard issue for U.S. Navy SEALs since the 1980s. The SEALs like the trigger locking mechanism, which makes the 9mm pistol “drop proof” — a nice feature to have in the dynamic world of the frogman — and the higher capacity magazine designed for this model.
The Air Force is working closely with industry partners to strengthen cybersecurity for larger service platforms such as an F-22 or F-35 fighters.
“We have to understand that today’s weapons systems are not operating in isolation. They are operating as part of a netted enterprise. Each weapons system will interface with a broader DOD network,” Allan Ballenger, vice president of the Air Force division at Engility Corp, told Scout Warrior.
Engility was recently awarded a $31 million task order deal from the Air Force Life Cycle Management Center, at Hanscom AFB, Mass.
The F-22, often referred to by Air Force developers as an “aerial quarterback,” relies upon data link technology connecting to other aircraft and ground stations as more of the F-22’s technologies and avionics–such as radar warning receivers, mission data files, navigation and target mapping systems–are computer based.
The emerging F-35’s “sensor fusion” is entirely contingent upon modernized computer algorithms able to help gather, organize and present combat-relevant information to a pilot by synthesizing otherwise disparate data such as targeting, mapping and sensor data onto a single screen.
“The real focus is on the cyber vulnerability assessments across many Air Force platforms, such as command-and-control and battle management systems,” Ballenger said.
Engility’s focus is closely aligned with cybersecurity priorities recently articulated by senior Air Force leaders.
Air Force Chief Information Security Officer, Peter Kim, recently told Scout Warrior that the service was vigorously invovled in expanding cyber security beyond IT to inlcude larger platforms.
Gen. Ellen Pawlikowski, Commander of Air Force Material Command, has articulated seven lines of attack that are essential to better securing networks, data and command-and-control systems. One of the key intiatives informing this effort is an attempt to “bake-in” cyber security provisions into the earliest phases of weapons development.
Part of the focus, Ballenger explained, is to examine trends and current security controls with a mind to the kinds of attacks likely to emerge in the future against IT systems, platforms and networked weapons.
While increased interoperability among networks, weapons and platforms vastly expedites combat efficacy in a wide range of scenarios, Ballenger emphasized that greater connectivity can also increase vulnerability to malicious penetration and server attacks, among other problems.
“We are looking much earlier in the life cycle of these systems with a concern not just about their security but how they interface with other elements of the network. We want to embed cybersecurity earlier in the process,” Ballenger added.
Seeking to emulate threat vectors and anticipate potential methods of attack — such as how a web-based application could be exploited or the extent to which a trap door may interact with other elements – is an important ingredient in establishing the most effective security protocols.
Also, much of this begins and ends with network IP protocol–codes which can both further enable interoperability between networks and systems while also possibly exposing networks to additional vulnerabilities
“When you have an IP address that is assigned to you, you need to have the appropriate controls in place to reduce that vulnerability,” Ballenger added.
The need for better information security extends from larger systems down to an individual soldier or airmen on a particular combat mission. Tactical Air Controllers are an instance cited where ground targeting technology is used to identify and secure targets for nearby air assets. This kind of air-ground synergy is itself reliant upon computer networking technologies, he explained.”You do not want someone to manipulate data going from airmen on the ground to a shooter in the air,” Ballenger said.
F-22 and Air Superiority
As a fifth-generation stealth fighter, the F-22 is specifically engineered for air supremacy and air dominance missions, meaning its radar-evading technology is designed to elude and destroy enemy air defenses. The aircraft is also configured to function as the world’s premier air-to-air fighter able to “dogfight” and readily destroy enemy aircraft.
“Air superiority, using stealth characteristics is our primary role. The air dominance mission is what we will always do first. Once we are comfortable operating in that battlespace, our airmen are going to find ways to contribute,” Col. Larry Broadwell, the Commander of the 1st Operations Group at Joint Base Langley-Eustis, Virginia, told Scout Warrior in a special pilot interview last year.
The F-22’s command and control sensors and avionics help other coalition aircraft identify and destroy targets. While some of the aircraft’s technologies are not “publically discussable,” Broadwell did say that the F-22’s active and passive sensors allow it to function as an “aerial quarterback” allowing the mission to unfold.
Drawing upon information from a ground-based command and control center or nearby surveillance plane – such as a Joint Surveillance and Target Attack Radar System – the F-22 can receive information or target coordinates from nearby drones, Broadwell explained.
At the moment, targeting information from drones is relayed from the ground station back up to an F-22. However, computer algorithms and technology is fast evolving such that aircraft like an F-22s will soon be able to quickly view drone video feeds in the cockpit without needing a ground station — and eventually be able to control nearby drones from the air. These developments were highlighted in a special Scout Warrior interview with Air Force Chief Scientist Greg Zacharias last year.
Zacharias explained that fifth generation fighters such as the F-35 and F-22 are quickly approaching an ability to command-and-control nearby drones from the air. This would allow unmanned systems to deliver payload, test enemy air defenses and potentially extend the reach of ISR misisons.
U.S. Air Force F-22 Raptor. (U.S. Air Force photo by Staff Sgt. Corey Hook)
“Because of its sensors, the F-22 is uniquely able to improve the battlefield awareness – not just for airborne F-22s but the other platforms that are airborne as well,” he said. The Raptor has an F-22-specific data link to share information with other F-22s and also has the ability to use a known data link called LINK 16 which enables it to communicate with other aircraft in the coalition, Broadwell explained in an interview last year.
Newer F-22s have a technology called Synthetic Aperture Radar, or SAR, which uses electromagnetic signals or “pings” to deliver a picture or rendering of the terrain below, allow for better target identification.
The SAR technology sends a ping to the ground and then analyzes the return signal to calculate the contours, distance and characteristics of the ground below.
“The addition of SAR mapping has certainly enhanced our air-to-ground capability. Previously, we would have to take off with pre-determined target coordinates. Now, we have an ability to more dynamically use the SAR to pinpoint a target while airborne,” Broadwell added.
“The F-35 is needed because it is to global precision attack what the F-22 is to air superiority,” he added. “These two aircrafts were built to work together in concert. It is unfortunate that we have so few F-22s. We are going to ask the F-35 to contribute to the air superiority mission,” he said.
The F-22 is known for a range of technologies including an ability called “super cruise” which enables the fighter to reach speeds of Mach 1.5 without needing to turn on its after burners.
“The F-22 engines produce more thrust than any current fighter engine. The combination of sleek aerodynamic design and increased thrust allows the F-22 to cruise at supersonic airspeeds. Super Cruise greatly expands the F-22’s operating envelope in both speed and range over current fighters, which must use fuel-consuming afterburner to operate at supersonic speeds,” Broadwell explained.
The fighter jet fires a 20mm cannon and has the ability to carry and fire all the air-to-air and air-to-ground weapons including precision-guided ground bombs, such Joint Direct Attack Munitions called the GBU 32 and GBU 39, Broadwell explained. In the air-to-air configuration the Raptor carries six AIM-120 AMRAAMs and two AIM-9 Sidewinders, he added.
“The F-22 possesses a sophisticated sensor suite allowing the pilot to track, identify, shoot and kill air-to-air threats before being detected. Significant advances in cockpit design and sensor fusion improve the pilot’s situational awareness,” he said.
It also uses what’s called a radar-warning receiver – a technology which uses an updateable data base called “mission data files” to recognize a wide-range of enemy fighters, Broadwell said.
Made by Lockheed Martin and Boeing, the F-22 uses two Pratt Whitney F119-PW-100 turbofan engines with afterburners and two-dimensional thrust vectoring nozzles, an Air Force statement said. It is 16-feet tall, 62-feet long and weighs 43,340 pounds. Its maximum take-off weight is 83,500.
The aircraft was first introduced in December of 2005, and each plane costs $143 million, Air Force statements say.
“Its greatest asset is the ability to target attack and kill an enemy without the enemy ever being aware they are there,” Broadwell added.
The Air Force’s stealthy F-22 Raptor fighter jet delivered some of the first strikes in the U.S.-led attacks on the Islamic State in Iraq and Syria, when aerial bombing began in 2014, service officials told Scout Warrior.
After delivering some of the first strikes in the U.S. Coalition-led military action against ISIS, the F-22 began to shift its focus from an air-dominance mission to one more focused on supporting attacks on the ground.
“An F-22 squadron led the first strike in OIR (Operation Inherent Resolve). The aircraft made historic contributions in the air-to-ground regime,”
Even though ISIS does not have sophisticated air defenses or fighter jets of their own to challenge the F-22, there are still impactful ways in which the F-22 continues to greatly help the ongoing attacks, Broadwell said.
“There are no issues with the air superiority mission. That is the first thing they focus on. After that, they can transition to what they have been doing over the last several months and that has been figuring out innovative ways to contribute in the air-to-ground regime to support the coalition,” Broadwell said.
With the assistance of allied hackers, Russia has developed a cyberweapon capable of destroying an electricity grid, US researchers report that such a weapon could be used to upset the American electric system.
The reports say that the devise was used to disrupt energy system in Ukraine December in 2015.
According to the Washington Post, the cyberweapon has the potential to be the most disruptive yet against electric systems that Americans depend on for daily life.
The malware, which researchers have dubbed CrashOverride, is known to have disrupted only one energy system — in Ukraine in December, 2015.
In that incident, the hackers briefly shut down one-fifth of the electric power generated in Kiev.
But with modifications, it could be deployed against US electric transmission and distribution systems to devastating effect, said Sergio Caltagirone, director of threat intelligence for Dragos, a cybersecurity firm that studied the malware and issued a report on June 12th.
And Russian government hackers have shown their interest in targeting US energy and other utility systems, researchers said.
“It’s the culmination of over a decade of theory and attack scenarios,” Caltagirone warned. “It’s a game changer.”
The revelation comes as the US government is investigating a wide-ranging, ambitious effort by the Russian government last year to disrupt the US presidential election and influence its outcome.
Dragos has named the group that created the new malware Electrum, and it has determined with high confidence that Electrum used the same computer systems as the hackers who attacked the Ukraine electric grid in 2015.
That attack, which left 225,000 customers without power, was carried out by Russian government hackers, other US researchers concluded.
US government officials have not officially attributed that attack to the Russian government, but some privately say they concur with the private-sector analysis.
“The same Russian group that targeted US [industrial control] systems in 2014 turned out the lights in Ukraine in 2015,” said John Hultquist, who analyzed both incidents while at iSight Partners, a cyber-intelligence firm now owned by FireEye, where he is director of intelligence analysis. Hultquist’s team had dubbed the group Sandworm.
“We believe that Sandworm is tied in some way to the Russian government — whether they’re contractors or actual government officials, we’re not sure,” he said. “We believe they are linked to the security services.”
Sandworm and Electrum may be the same group or two separate groups working within the same organization, but the forensic evidence shows they are related, said Robert M. Lee, chief executive of Dragos.
The Department of Homeland Security, which works with the owners of the nation’s critical infrastructure systems, did not respond to a request for comment.
Early results came in from the US Air Force’s realistic, challenging Red Flag air combat exercise — and it looks like the F-35 slaughtered the competition.
Aviation Week reports that the Joint Strike Fighter killed 15 aggressors for each F-35 downed. The F-35 achieved this remarkable ratio in a drastically increased threat environment that included radar jamming, increased air threats, and surface-to-air missile batteries.
“In the past, the non-kinetic effects were not fully integrated into the kinetic fight,” Col. Robert Cole, the Air Force Cyber Forward director, said in a statement.
But now, F-35s take on cyberthreats and electronic warfare in addition to enemy surveillance and conventional, or kinetic, threats.
“This integration in an exercise environment allows our planners and warfighters to understand how to best integrate these, learn their capabilities and limitations, and become ready to use [these combined resources for maximum] effect against our adversaries,” Cole said.
But the F-35s didn’t just shoot down the enemy — they used their sensor-fusion and datalink abilities to talk to other planes and help them sniff out threats they wouldn’t have seen on their own.
“Before, where we would have one advanced threat and we would put everything we had — F-16s, F-15s, F-18s, missiles, we would shoot everything we had at that one threat just to take it out — now we are seeing three or four of those threats at a time,” Lt. Col. George Watkins, 34th Fighter Squadron commander, told Aviation Week.
“Just between [the F-35] and the [F-22] Raptor we are able to geolocate them, precision-target them, and then we are able to bring the fourth-generation assets in behind us after those threats are neutralized. It’s a whole different world out there for us now.”
The ability for fifth-generation US aircraft to detect threats and send that information to legacy planes meets an urgent need for the US military.
The F-35 has repeatedly hit cost and schedule overruns during its production and is now years behind schedule. But the latest performance at Red Flag proves that even a handful of F-35s can improve an entire squadron’s performance.
The current Red Flag exercise will conclude on February 10.
1. A POW escaped prison to have an affair with the daughter of a Nazi worker
When Hitler invaded Czechoslovakia on September 1, 1939, 20-year-old British hairdresser Horace Greasley was drafted into the British Army.* Unfortunately, the aspiring barber was better with scissors than he was with a rifle, and he was captured and sent to a Polish POW camp almost immediately. Most people would be too devastated by this turn of events to even think about scoping out potential romantic opportunities, but Horace Greasley is not most people.
A few days into his imprisonment he met Rosa Raubach, the beautiful daughter of the camp’s quarry director, and the two began a secret affair that lasted for nearly a year before he was transferred to a different prison. But the story doesn’t end here — instead of giving up on his prison girlfriend, Horace decided he was up for a challenge, and continued the relationship under the Nazis’s noses. With the help of his friends he would crawl under a section of barbed wire fencing to escape back into his old prison and reunite with his lady love, rather than search for a way to neutral territory.
The pair kept up this forbidden rendezvous about three times a week for five years. Amazingly, Horace and Rosa were never found out by the Nazis — the only thing that stopped the couple was the liberation of Poland at the end of the war, when they went their separate ways.
2. This Civil War couple cross-dressed and became Union outlaws to defy the Confederacy
Keith and Linda Balock loved the Union just as much as they loved each other, so when their home state of North Carolina sided with the Confederacy, they knew it was time to take drastic measures. Realizing that Keith would have to enlist in the Confederate army or risk imprisonment (and probably worse), the husband and wife swore to stay together — even on the front lines. Linda donned men’s clothes and posed as “Sam” Balock, Keith’s fictitious brother, and the pair entered the army together, planning to defect to the Union as soon as they reached Northern territory.
Before they could cross Union lines, however, Linda’s true identity was discovered, and she was forced to leave. Unwilling to be apart from his wife, Keith decided he would get himself discharged too. The next day he went out to the forest, stripped naked, and rolled around in poison ivy until he could convince Confederate doctors that he had an incurable disease. Once released, the pair fled to the Appalachian mountains, where they lived as Union raiders for the rest of the war and worked to sabotage Confederate military efforts.
3. Two Jewish resistance leaders met in a concentration camp, fell in love, and planned their escape together
When 24-year-old Marla Zimetbaum was arrested and sent to Auschwitz-Birkenau because of her Jewish heritage, she vowed to do whatever it took to bring her Nazi oppressors down. What she didn’t realize at the time, however, was that she wouldn’t have to do it alone. While working as a prison interpreter, she met fellow inmate Edward Gilenksi, a young Polish man who was plotting his escape from the camp. She began crafting the escape plan with him, and the two young people, who were both rumored to have been part of Jewish resistance groups, fell in love.
In June of 1944, Gilenski disguised himself as an SS guard and Zimetbaum as a male prisoner, and they made it outside of the camp’s perimeter gate. Once there, Zimetbaum changed out of her men’s clothes and the pair pretended to be a Nazi and his girlfriend out for a walk. They swore to stay together no matter what happened, and lived together in freedom for four days before Zimetbaum was discovered buying groceries and arrested. Keeping his promise, Gilenski turned himself in, and the two were tragically executed on the same day. Before their deaths the two reportedly rallied their fellow prisoners to continue the resistance against the Nazis, and became symbols of Jewish resistance against the Nazi regime.
4. 60 years after Stalin banished her family to Siberia, this Russian woman reunited with her husband
Only three days after his marriage to Anna Kozlov in 1946, Boris Kozlov had to return to fight with his Red Army unit in Communist Russia. The couple kissed goodbye and waved as Boris returned to his post, expecting to see each other again in a few weeks. They had no idea that they would not be reunited until 60 years later. After Boris left, Anna and her family were banished to Siberia during Stalin’s purges, and they were unavailable to leave word for any of their family or friends. When Boris returned home, expecting to be greeted by his beautiful young bride, he was crushed — she was nowhere to be found. Desperate, he scoured the town for news of her disappearance, but found nothing.
Meanwhile, Anna considered suicide, convinced she would never again see the love of her life. After a while and at the pressure of their families, they both reluctantly moved on and remarried, resigned to the fact that their marriage was not meant to be. Half a century later however, after the fall of the Soviet Union and the deaths of both their spouses, Anna returned to her hometown — and ran into Boris. She saw him getting out of his car while she walked about her old street, and the two miraculously recognized each other. They married each other again days later — finally leading the life they had dreamed of as young newlyweds.
5. 20-year-old Olga Watkins infiltrated Dachau to find her Jewish fiance
Olga Watkins was leading an ordinary, happy life when her fiance Julius Koreny was arrested by the Gestapo in 1943 and taken away. Devastated, she ignored the pleas of her family and friends to give up on Julius — who had surely been killed by the the Nazis — and instead set out to find him herself. Her quest led her on a 2,000 mile journey from Zagreb through Nazi-occupied Europe, to the gates of Dachau and finally Buchenwald, one of The Third Reich’s most notorious concentration camps.
Terrified but determined to free Julius, Olga asked for a job as a secretary in the camp offices and began searching for clues amongst the Nazis who captured her lover. Finally, with the American liberation only days away, Olga got her hands on Julius’s documentation — only to find he’d been transferred to Buchenwald. Only half-hoping he’d be alive, Olga rushed to the now liberated and nearly desolate camp — and against all odds — found Julius, who was recovering from typhus. A few days later, the remaining survivors of the camp joined together to help throw them a wedding, and the star-crossed lovers were married.
6. “Stonewall” Jackson’s last words were for his beloved wife
Most people know Confederate General Thomas Jackson, AKA the notorious “Stonewall” Jackson, for his often ruthless battle tactics and dauntless leadership. Few, however, know of his passionate love for his wife. A devout Christian, Jackson was incredibly devoted to his marriage to the love of his life, a woman named Mary Anna Morrison. Though he was smitten with her from the beginning, they hit some obstacles when they first began courting — Mary Anna had sworn she would never marry a soldier, Democrat, or a widower, and Jackson was three for three. She soon got over these concerns, however, and the two were married in 1857.
The couple was inseparable, and Jackson was overjoyed when Mary Anna gave birth to their baby daughter, Julia, in 1862. Sadly, he was wounded in friendly fire at the Battle of Chancelorville just a few weeks later, but Mary Anna raced to his location and was with him as he drew his last breath. Before he closed his eyes for the last time, Jackson whispered to his wife, “Let us pass over the river and rest under the shade of the trees.” Mary Anna chose to dress in mourning black for the rest of her life to honor her beloved husband, and never remarried.
Editor’s note: An original version of this post contained wording that made it sound like Horace Greasley was drafted by the Czech Army. Though he was called up after the invasion of Czechoslovakia, he was a Briton called up by the British Army for service. The wording updated to make this more clear.
U.S. Army Special Operations Command is dumping its Android tactical smartphone for an iPhone model.
The iPhone 6S will become the end-user device for the iPhone Tactical Assault Kit – special-operations-forces version Army’s Nett Warrior battlefield situational awareness tool, according to an Army source, who is not authorized to speak to the media. The iTAC will replace the Android Tactical Assault Kit.
The iPhone is “faster; smoother. Android freezes up” and has to be restarted too often, the source said. The problem with the Android is particularly noticeable when viewing live feed from an unmanned aerial system such as Instant Eye, the source said.
When trying to run a split screen showing the route and UAS feed, the Android smartphone will freeze up and fail to refresh properly and often have to be restarted, a process that wastes valuable minutes, the source said.
“It’s seamless on the iPhone,” according to the source. “The graphics are clear, unbelievable.”
Nett Warrior, as well as the ATAC and soon-to-be-fielded iTAC, basically consist of a smartphone that’s connected to a networked radio. They allow small unit leaders to keep track of their location and the locations of their soldiers with icons on a digital map.
They are also designed to help leaders view intelligence, surveillance, reconnaissance sensor feeds such as video streams from unmanned aerial systems.
The Nett Warrior system uses a Samsung smartphone worn in a chest-mounted pouch and connected to networked radio General Dynamics AN/PRC-154A Rifleman Radio. Nett Warrior evolved from the Army’s long-gestating Land Warrior program. Army officials began working on that system in the mid-1990s and over the next decade struggled with reliability and weight problems.
The special operations forces’ ATAC and iTAC use a smartphone connected to a Harris AN/PRC 152A radio.
Both radios are part of the Joint Tactical Radio System, but the PRC-152A allows operators to automatically move across different waveforms to talk to units in other services. The Rifleman Radio does not have this capability, the source said.
This is a problem, the source said, because SOF units can communicate with conventional soldiers using Nett Warrior, but it’s only one-way communications. Nett Warrior-equipped soldiers can only receive communications from SOF; they cannot initiate or answer SOF units with the Rifleman Radio, the source said.
Military.com reached out to Program Executive Office Soldier’s Project Manager Soldier Warrior to talk about this problem and to see if it was considering changing to the iPhone and possibly trading in the Rifleman Radio for the PRC-152A.
We received the following mail response:
“PEO Soldier has no response to the questions” posed by Military.com, according to PEO Soldier officials.
The Army does have plans to move the AN/PRC-159 radio as a fix to the one-way communications problem, but that is not supposed to happen until 2020 at the earliest, the source said.
As a short-term fix, the Rapid Equipping Force is looking at fielding Harris PRC-152A radio to units such as the 82nd Airborne Division that make up the Global Response Force, the source said.
Two U.S. Army soldiers will finally be awarded the nation’s highest military award, nearly a century after they displayed incredible bravery during World War I.
Sgt. Henry Johnson, a black soldier assigned to the “Harlem Hellfighters” of the 369th U.S. Infantry Regiment, and Sgt. William Shemin, a Jewish soldier with the 47th Infantry Regiment, will receive the Medal of Honor (posthumously) on Tuesday. Ninety-seven years after they were denied the award due to discrimination, the pair of soldiers will finally be recognized in a ceremony at The White House.
While serving as a sentry in the Argonne Forest with another soldier on May 15, 1918, then-Pvt. Johnson came under heavy enemy fire after a raiding party of 12 German soldiers came upon his position. Despite receiving significant injuries, Johnson held off the Germans using grenades, a rifle, a knife, and even his bare hands.
“The Germans came from all sides,” Johnson told an interviewer after the war, according to The Daily Beast. “Roberts kept handing me the grenades and I kept throwing them, and the Dutchmen kept squealing but jes’ the same, they kept comin’ on. When the grenades were all gone I started in with my rifle.”
Johnson exposed himself to enemy fire and held back the German forces until they retreated, according to the U.S. Army.
On Aug. 7, 1918 in an area southeast of Bazoches, France, Sgt. Sgt. Shemin left the safety of his platoon’s trench and repeatedly crossed an open area to rescue wounded soldiers, despite the threat of heavy machine gun and rifle fire. Then after his officers and senior non-commissioned officers were wounded or killed, Shemin took command of the platoon and “displayed great initiative under fire” until he was wounded himself on Aug. 9, according to the U.S. Army.
Why did it take almost a century for Shemin to be recognized with the highest U.S. military award for valor in combat? Perhaps because of widespread discrimination in the military during that period of history; Shemin was Jewish.
“Anti-Semitism was a way of life in the Army in World War I,” said Mrs. Roth, who has been waging the campaign on behalf of her father’s honor since 2002. “They’re making a wrong right, 97 years later. The discrimination hurts, but all has been made right.”
Their recognition comes as a result of a 2002 move by Congress to review combat actions of Jewish and Hispanic veterans and ensure “those deserving the Medal Of Honor were not denied because of prejudice,” the White House explained to CNN. The act was later amended to review all possible cases of discrimination.
In March, President Obama awarded the Medal of Honor to 24 soldiers who had been denied the award due to prejudice, NBC reported.
The Coast Guard has been on patrol since 1790, and it has often had to do a lot with very little in the way of assets. Now, some of the assets it does have may be relatively useless.
According to a veteran Coast Guard officer who published his concerns in Proceedings magazine, a number of the major cutters (those over 210 feet in length) are “ill-equipped—and often ill-suited—to handle the challenges and dangers in their areas of operation.” Furthermore, one 210-foot cutter was in dry dock for six months, with two more months at the pier when it should have deployed, due to “unplanned maintenance.”
Drills for the crew are focused more on damage control than maritime law enforcement.
“By continuing its over reliance on the cutter—specifically, large cutters measuring 210 feet and longer—the Coast Guard has fallen behind and become a stagnant force in the maritime domain,” write Lt. David Allan Adams, Jr. “This is, of course, not because of a lack of effort by the hardworking Coasties stationed on cutters, but rather because the white hull fleet is well over 50 years old and ill-equipped—and often ill-suited—to handle the challenges and dangers in their areas of operation.”
Even the newest Coast Guard cutters, the Legend-class National Security Cutters that are replacing the Hamilton-class high-endurance cutters, have had issues, with a 2016 report from McClatchy news service noting that the new ships suffered four cracked cylinder heads a year.
“Junior officers stationed on cutters can testify to the poor material condition of the cutters and the disillusionment cutter life can instill,” Adams wrote. “The life of a JO is not about conducting law enforcement or conning the cutter — as promised at recruitment — but more about routing and correcting memorandums, being held accountable should an inspection go poorly, and striving to perform in the arena in which the JOs’ future is truly held: the underway wardroom.”
The problem has been widespread. A 2014 NJ.com report noted that 34 cutters and 37 patrol boats were unable to deploy for a combined total of 1,654 days. The Coast Guard has also been very short on icebreakers, with one of its most capable vessels in that mission stuck at the pier.
The Coast Guard, of course, has a substantial job, with a mission to secure America’s maritime borders, which run six times the length of the U.S.-Mexico border, and it does so with two-thirds of the personnel of United States Customs and Border Protection.
The Coast Guard is planning to build 25 Offshore Patrol Cutters to replace the aging medium endurance cutters, a deal expected to cost $10.5 billion, roughly $420 million per vessel. By comparison, a Freedom-class littoral combat ship sets taxpayers back $362 million.
“That was the greatest and finest moment of my life,” one of the world’s most brutal tyrants reportedly said after touring the newly Nazi-occupied French capital.
The day after Germany signed an armistice with France, Hitler and his cronies toured the Dôme des Invalides which holds Napoleon’s tomb, the Paris opera house, Champs-Elysees, Arc de Triomphe, Sacre Coeur, and the Eiffel Tower on June 23, 1940.
In all, Hitler spent three hours in the “City of Light,” but spent four years occupying northern France until Allied Forces liberated Paris, 71 years ago on Tuesday.
“The Germans were driven from many strategic parts of the city by the combined onslaught of the French military and the fury of citizens fighting for their liberties,” the Associated Press reports.
During Hitler’s brief tour, he instructed friend and architect Albert Speer to take note of the city’s design to recreate similar yet superior German buildings.
“Wasn’t Paris beautiful?” Hitler reportedly asked Speer.
“But Berlin must be far more beautiful. When we are finished in Berlin, Paris will only be a shadow.”
While sightseeing, Hitler also ordered the destruction of two French World War I monuments that reminded him of Germany’s bitter defeat.
With its fly-by-wire avionics and distinctive delta wing design, the Gripen E is similar to its predecessors. The difference is in its increased fuel capacity, 20 percent more thrust, extra pylons for carrying more weapons, and advanced electronics that feed tactical information to the pilot and co-op forces at all times. It’s also designed for quick and efficient maintenance, Saab claims the turnaround time between missions is 10 minutes and that the entire engine can be replaced in an hour.
Some other Saab Gripen E features:
The fighter’s Active Electronically Scanned Array (AESA) antennas—called elements—work together or independently to track different targets.
Its Infrared Search and Track (IRST) system looks for heat emissions from other aircraft, helicopters and from objects on the ground and sea surface without giving its position away.
Its Electronic Warfare system alerts the pilot when it has been detected by radar, warns for incoming missiles, and used for electronic attacks.
The pylons give it the flexibility to carry an array of weapons, making it deadlier than previous versions.
The Gripen’s multi-frequency data links provide situational awareness to other fighters.
Its Radar Warning Receiver and Missile Approach Warning systems increase the Gripen’s survivability in combat.
At $85 million apiece, the Gripen E is significantly cheaper than the F-35, making it an attractive alternative for any military.