Unit mottos are usually written in Latin and framed by the core values of the group.
The motto is like a mission statement and a battle cry in one. It also serves to boost morale and in some cases, to initiate fear in the enemy. To some, like Lt. Gen. Norman Seip, a motto is more than just a catchy phrase, it represents a unit’s work. In short, these are the words a unit lives by.
Here’s our list of the seven coolest unit mottos in the Air Force:
Motto: Kiai O Ka Lewa (Hawaiian for “Guardians of the Upper Realm”)
5th Bomb Wing: Stationed at Minot Air Force Base, North Dakota, it’s one of the only two B-52H Stratofortress wings in the Air Force.
Motto: Mors Ab Alto (Latin for “Death from Above”)
7th Bomb Wing: Stationed at Dyess Air Force Base, Texas, it’s one of only two B-1B Lancer bomber wings in the Air Force.
Motto: Aut Vincere Aut Mors (Latin for “Conquer or Die”)
1st Fighter Wing: Stationed at Langley Air Force Base, Virginia, it’s the first operational wing flying the F-22A Raptor.
Motto: Attaquez et Conquerez (Latin for “Attack and Conquer”)
8th Fighter Wing: Stationed at Kunsan Air Base, Republic of Korea, the wing flies the F-16 Fighting Falcon.
Motto: Tutor et Ultor (Latin for “Protector and Defender”)
49th Fighter Wing: Stationed at Holloman Air Force Base, New Mexico, the wing flies the F-22 Raptor.
Motto: “Seek, Attack, Destroy”
52nd Fighter Wing: Stationed at Spangdahlem Air Base, Germany, the unit is flies the F-16 Fighting Falcon.
Motto: “Fire From The Clouds”
33rd Fighter Wing: Stationed at Eglin Air Force Base, Florida, the wing’s mission is to train F-35 pilots and maintainers.
The fate of two Turkish soldiers now hangs in the balance as they have become the unwilling guests of the Islamic State of Iraq and Syria (also known as ISIS).
Supporters of the terrorist group have reportedly been debating what to do with the captured soldiers.
According to a report by al Jazeera, the two Turkish troops were captured during a battle near the Syrian village of Elbab. The announcement from the terrorist group about the captives caused a celebration on Facebook and other social media sites.
The celebration then turned to into a debate when one ISIS dirtbag solicited opinions on what to do with the prisoners.
“Expect a nifty video with the soldiers of the tyrant infidel Erdogan,” one ISIS supporter tweeted, adding two knife emojis. ISIS has routinely beheaded some of its captives, including American journalist James Foley. “Jihadi John,” the ISIS jihadist who was responsible for the terrorist group’s most notorious beheadings, became a good jihadist in Nov. 2015.
Others advocated not beheading them, but treating them humanely and educating them about Islam, with one saying, “it would only give the members a momentary boost of adrenaline but not much more.”
Most followers of jihadists, though, were calling for the summary execution of the Turkish troops, whom they deemed “nonbelievers.” One of the senior terrorists claimed, “All the options are on the table for the Islamic State organization to decide what to do with the two Turkish soldiers.”
The terrorist group burned a captured Royal Jordanian Air Force pilot alive in February 2015 after his F-16 crashed due to a mechanical failure.
The F-22 Raptor is already the most lethal fighter jet ever built, severely outclassing virtually every other aircraft of a similar class fielded by the rest of the world’s air forces.
But with the advent of newer anti-aircraft defense systems, stealth-defeating tracking technologies and the entrance of countries such as China and Russia into the stealth fighter foray, the F-22 will eventually need to be replaced with something even more powerful.
With the looming retirement of the F-15C/D Eagle, its secondary air superiority fighter, in the next decade, the Air Force has begun taking strides towards designing the F-22’s follow-on in order to maintain its combat edge over every other air force in the world.
Throughout the USAF’s history, each of its fighter jets have built upon the aircraft they replaced, incorporating lessons learned and proven concepts, while expanding on their capabilities with new technology and methods of prosecuting aerial combat. The F-22’s replacement, currently known as “Penetrating Counter Air,” will take shape in much the same way.
It will likely be highly stealthy, carrying its weapons internally in order to minimize radar detection. It will also probably be supersonic, and able to actively defeat enemy sensors in a similar manner to the F-22 and F-35.
Among the most noticeable differences between the F-22 and its replacement will be the lack of tails. Every American fighter jet ever built has featured one or two vertical stabilizers which, as their names suggest, provide stability and yaw control in flight.
Instead, the PCA will likely remove the vertical stabilizers altogether to enhance stealth by decreasing the aircraft’s overall radar signature. The end result will look more like a sleeker and faster B-2 Spirit or a X-47B drone, instead of something similar to the twin-tailed F-35 Lightning II, or the single-tailed F-16 Fighting Falcon.
Additionally, the new fighter be built for long-range missions — especially escorting larger bomber aircraft like the B-2, or the upcoming B-21 Raider, deep behind the front lines to strike at the heart of the enemy’s war machine. This is a much-needed capability the USAF has sorely lacked for decades.
The PCA will be designed to work alongside the F-35 Lightning II, with both aircraft drawing upon each other’s strengths while mitigating weaknesses in capability. Given that the Air Force plans on retaining its F-16 Fighting Falcon fleet long for years and years to come, the PCA will likely also be capable of working with older “legacy” aircraft.
One of the key focal points of the PCA program will be developing an engine that gives the new fighter unprecedented range, while maximizing operational fuel efficiency.
The PCA program seeks nearly $300 million in funding from Congress over the next few years in order to complete its research and analysis goals while developing and investigating new technologies that will make the F-22’s replacement arguably the deadliest and most powerful fighter aircraft ever conceived.
Haig Prieste was born in 1896 in Fresno, California. His parents were Armenian immigrants who gave up their original surname of Keshishian. Prieste changed his birth name, a traditional Armenian name, to Harry and later Hal.
Upon America’s entry into WWI, Prieste joined the Navy. It was during his service that he discovered his natural ability for swimming and diving. A shipmate reportedly teased Prieste that he should try out for the Olympics. So… he did.
After he left the Navy, Prieste attended the Olympic tryouts in Alameda, California. There, he came first in diving, beating out national champion Clyde Swendsen. From there, Prieste went to New York to prepare for the Olympics.
At the 1920 Antwerp games, Prieste was part of the U.S. diving team. After three compulsory dives at 16 feet, Prieste was in last place. However, things changed with the 32-foot dive.
“They let you do whatever you wanted. You could get more points by doing harder dives,” Prieste recalled. “I did the hardest because I wanted to get the most points.” With this, Prieste came back from last place and took home a bronze medal for the USA.
Prieste became good friends with surf legend and fellow Olympic medal winner Duke Kahanamoku. The Hawaiian swimmer dared Prieste to steal the Olympic flag before they left the games. Not one to back down from a challenge, Prieste took the dare. Near the end of the games, he climbed the 15-foot flagpole and retrieved the Irish linen flag. Along with his medal, Prieste brought the flag home with him to Los Angeles.
It wasn’t until 1997 that the stolen flag resurfaced. That year, the U.S. Olympic Committee hosted a banquet which Prieste attended. A reporter brought up the missing flag and wondered where it had been for nearly 80 years. “I can help you with that,” Prieste told the reporter. “It’s in my suitcase.” Prieste did not realize the importance of the 1920 flag, the first to bear the now iconic five Olympic rings.
In fact, he would often show it to his guests as a souvenir of his Olympic experience and a great story with the Duke. “I had it a long time,” Prieste said. “A lot of my friends have seen it. You can’t be selfish about these things. It’s no good to me. I can’t hang it in my room. People will think more of me by giving it away than by keeping it.” And that’s exactly what he did.
At the 2000 Sydney Olympics, Prieste returned the flag to the International Olympic Committee. In return, the IOC honored Prieste, the oldest living Olympic medalist at the time, with a commemorative Olympic medal. Today, Prieste’s flag is on display at the Olympic Museum in Lausanne, Switzerland.
Prieste passed away the next year at the age of 104. He is the first known Olympian whose lifespan covered three centuries from 1896 to 2001.
An F-35 fighter pilot says he would be confident flying the Joint Strike Fighter against any enemy in the world, including Russian and Chinese 5th Generation stealth fighters.
An F-35 Joint Strike Fighter would be able to use its sensors, weapons, and computer technology to destroy Russian and Chinese 5th-Generation Stealth fighters in a high-end combat fight, service officials said.
“There is nothing that I have seen from maneuvering an F-35 in a tactical environment that leads me to assume that there is any other airplane I would rather be in. I feel completely comfortable and confident in taking that airplane into any combat environment,” Lt. Col. Matt Hayden, 56th Fighter Wing, Chief of Safety, Luke AFB, Arizona, told Scout Warrior in a special pilot interview.
Furthermore, several F-35 pilots have been clear in their resolve that the multi-role fighter is able to outperform any other platform in existence.
Hayden was clear to point out he has not, as of yet, flown simulated combat missions against the emerging Russian Sukhoi T-50 PAK FA 5th-Generation stealth fighter now in development or the Chinese Shenyang J-31 5th Generation Stealth aircraft.
While he said he did not personally know all of the technologies and capabilities of these Russian and Chinese aircraft, he was unambiguous in his assertion regarding confidence in the F-35.
Available information says the Russians have built at least 6 prototype T-50 PAK FAs for their Air Force and Navy; the Chinese conducted a maiden test flight of its J-31 in 2012. In addition, China is in pre-production with its J-20 5th-Generation stealth fighter.
This fighter, called the Chengdu J-20, made its first flight in 2011, and is expected to be operational by 2018, according to publicly available information and various news reports.
While Hayden did not elaborate on aspects of the J-20, he did say he would be confident flying the F-35 against any aircraft in the world.
“All those other countries (Russia and China) are trying to develop airplanes that are technologically capable as well — from an F-35 perspective. We are no less capable than any airplane and any fighters out there,” Hayden described.
In addition to leveraging the best available technologies on a fighter jet, winning a dog-fight or combat engagement would depend just as much on the air-tactics and decisions made by a pilot, Hayden explained.
“I have not flown against some of those aircraft. When you fight against an airplane, it depends upon the airspeed. If I maximize the effectiveness of an F-35, I can exploit the weaknesses of any other aircraft,” he said.
Many analysts have made the assessment that the J-20 does appear to be closely modelled after the F-35.
In fact, a Defense Science Board report, cited in a 2014 Congressional assessment of the Chinese military, (US-China Economic Security and Review Commission) makes reference to specific developmental information and specs of numerous U.S. weapons systems believed to be stolen by Chinese computer hackers; design specs and technologies for the F-35 were among those compromised by Chinese cyber-theft, according to the report.
An AIN Online report from the Singapore Air Show in February of last year catalogues a number of J-20 features and technologies – including those believed to be quite similar to the F-35.
“The J-20 is a large multi-role fighter with stealthy features similar to those found in the American F-22 and F-35. Although very little is known about its intended purpose, the aircraft appears to offer capability in a number of roles, including long-range interception and precision attack.
In terms of weapon carriage the J-20 has a similar arrangement to that of the Lockheed Martin F-22, comprising two lateral bays for small air-to-air missiles such as the agile, imaging-infrared PL-10, and a large under-fuselage bay for accommodating larger missiles and precision-guided surface attack weapons. The 607 Institute’s new PL-15 active-radar missile is thought to be the primary long-range air-to-air weapon, reportedly having been test-fired from a Shenyang J-16 platform last year. The PL-21, a ramjet-powered weapon in the same class as the MBDA Meteor, is another possibility for the J-20.
The sensor suite includes an electro-optical targeting system (EOTS) and a large-array AESA radar, which was developed by the 14th Institute at Nanjing Research Institute of Electronics Technology (NRIET, 14th Institute), and is possibly designated Type 1475/KLJ-5. Diamond-shaped windows around the fuselage suggest that a distributed aperture infrared vision system is installed.
In the cockpit, the J-20 sports three large color displays, plus other small screens, and a holographic wide-angle head-up display. An advanced datalink has been developed, and a retractable refueling probe is located on the starboard side of the forward fuselage. Much of the avionics suite has been tested by the CFTE (China flight test establishment) aboard a modified Tupolev Tu-204C, in much the same way as the systems of the F-22 were tested in a Boeing 757.”
Regarding the Russian T-50 PAK FA Stealth fighter, numerous reports suggest the aircraft has numerous technological problems and is a 5th generation plane “in name only.”
“Reporting from the Singapore Airshow 2016, IHS Jane’s reports that “Russian industry has consistently referred to the Sukhoi T-50 PAK FA as a fifth-generation aircraft, but a careful look at the program reveals that this is an ‘in name only’ designation.”
This is largely because of a lack of evolutionary technology aboard the plane compared with previous jets that Russia and the US have designed. Indeed, the PAK FA’s engines are the same as those aboard Russia’s 4++ generation (a bridging generation between fourth- and fifth-generation aircraft) Su-35. Additionally, the PAK FA and the Su-35 share many of the same onboard systems.
And even when the PAK FA’s systems are different from the Su-35’s, the plane’s specifications are still not up to true fifth-generation standards.
RealClearDefense, citing Indian media reports that are familiar with a PAK FA variant being constructed in India, notes that the plane has multiple technological problems. Among these problems are the plane’s “engine performance, the reliability of its AESA radar, and poor stealth engineering.”
F-35 Sensor Fusion
Despite various reports about technologies being engineered into the Russian and Chinese 5th-Generation Stealth Fighters, it is in no way clear that either aircraft is in any way comparable to the F-35. Most publicly available information seems to indicate that the F-35 is superior – however, to some extent, the issue remains an open question. More information is likely to emerge once the Russian and Chinese aircraft are operational and deployed.
For example, the Chinese J-20 is cited as having an Electro-Optical targeting system, stealth configuration, datalink, AESA radar and precision weaponry quite similar to the F-35, according to the AIN report.
The computer algorithms woven into the F-35 architecture are designed to leverage early iterations of what could be described as early phases of “artificial intelligence.” Broadly speaking, artificial intelligence refers to fast-evolving computer technology and processors able to gather, assess and integrate information more autonomously in order to help humans make decisions more quickly and efficiently from a position of command-and-control.
“If there is some kind of threat that I need to respond to with the airplane, I don’t have to go look at multiple sensors and multiple displays from multiple locations which could take my time and attention away from something else,” Hayden added.
The F-35 software, which shows images on display screens in the cockpit as well as on a pilot’s helmet-mounted-display, is able to merge results from various radar capabilities onto a single screen for the pilot.
For instance, the F-35’s Electro-Optical Target System, or EOTS, is an infrared sensor able to assist pilots with air and ground targeting at increased standoff ranges while also performing laser designation, laser range-finding and other tasks.
In addition, the plane’s Distributed Aperture System, or DAS, is a series of six electro-optical sensors also able to give information to the pilot. The DAS includes precision tracking, fire control capabilities and the ability to warn the pilot of an approaching threat or missile.
The F-35 is also engineered with an Active Electronically Scanned Array Radar, which is able to track a host of electromagnetic signals, including returns from Synthetic Aperture Radar, or SAR. This paints a picture of the contours of the ground or surrounding terrain and, along with Ground Moving Target Indicator, or GMTI, locates something on the move on the ground and airborne objects or threats.
Hayden added that the F-35 has been training against other F-35s in simulated combat situations, testing basic fighter maneuvers. Having himself flown other fighter aircraft, he explained that many other F-35 pilots also fly the airplane after having experience flying an F-16, A-10 or other combat aircraft.
“The F-35’s low-observable technology can prevent detection. That is a strength that other airplanes do not have,” he said.
F-35 and F-22
At the same time, senior Air Force leaders have made the point that F-35 technological superiority is intended to be paired with the pure air-to-air dogfighting ability of the service’s F-22 – a stealth aircraft, with its speed, maneuverability and thrust-to-weight ratio, is believed by many to be the most capable air-to-air platform in the world.
“Every airplane has flaws. When you design an airplane, you design an airplane with tradeoffs – give something else up. If I was flying against an adversary in actual combat, my job would be to exploit the enemy weakness and play to my strength. I can compensate for certain things,” Hayden explained. “There is a certain way to fly and fight in an airplane, using airspeed to maximize the turning performance of the airplane.”
During a public speech in 2015, the Air Forces Air Combat Commander, Gen. Hawk Carlisle, said the F-22 is engineered such that it can complement the F-35.
“You will use the F-35 for air superiority, but you will need the raptors to do some things in a high-end fight to penetrate denied airspace,” he said. “The airplane is designed for multi-role capability, electronic warfare and sensors. The F-35 will win against any fourth-generation airplane — in a close-in fight, it will do exceedingly well. There will be a combination of F-22s and F-35s in the future.”
“As an F-35 pilot, I can carry bombs to a target area where I can now take out air-to-ground threats. You have to look at the overall picture of the airplane. The airplane was designed to overwhelm the battlespace in a non-permissive threatening environment where 4th-gen fighters are not going to persist,” he added.
The F-35 is engineered with a 25-mm gun and has the ability to carry and fire a wide range of weapons. The aircraft has already demonstrated an ability to fire an AMRAAM (Advanced Medium Range Air to Air Missile), JDADM (Joint Direct Attack Munition) or GBU 12 (laser-guided aerial bomb), and AIM 9X Sidewinder air-to-air missile.
So-called “Block 3F” software for the F-35 increases the weapons delivery capacity of the JSF as well, giving it the ability to drop a Small Diameter Bomb and 500-pound JDAM.
The F-35. (Photo: Lockheed Martin)
As a multi-role fighter, the F-35 is also engineered to function as an intelligence, surveillance and reconnaissance platform designed to apprehend and process video, data and information from long distances. Some F-35 developers have gone so far as to say the F-35 has ISR technologies comparable to many drones in service today that are able to beam a “soda straw” video view of tactically relevant combat locations in real time.
Finally, regarding dogfighting, it is pertinent to point out a “War is Boring” report from 2015 which cited an F-35 fighter pilot explaining how an F-16 was able to win a “mock dogfight” against an F-35; the F-35 Joint Program Office disputed this claim, saying the F-35 used in the scenario was in no way representative of today’s operational F-35s. The software, weapons and sensor technologies used in the mock dogfight were not comparable to the most evolved F-35.
Furthermore, F-35 proponents maintained that the aircraft’s advanced computer technology and sensors would enable it to see and destroy enemy fighters from much longer ranges – essentially destroying enemy fighters before they are seen.
The idea is to enable F-35 pilots to see and destroy enemies in the air, well in advance of a potential dogfight scenario. This can be explained in terms of a well-known Air Force strategic concept pioneered years ago by air theorist and pilot Col. John Boyd, referred to as the “OODA Loop,” — for observe, orient, decide and act. The concept is to complete this process quickly and make fast decisions while in an air-to-air dogfight — in order to get inside the enemy’s decision cycle, properly anticipate, and destroy an enemy before they can destroy you.
The F-35 is designed with long-range sensors and data fusion technologies such that, as a fifth-generation aircraft, it can complete the OODA Loop much more quickly than potential adversaries, F-35 advocates claim.
Mission Data Files
Described as the brains of the airplane, the mission data files are extensive on-board data systems compiling information on geography, air space and potential threats in known areas of the world where the F-35 might be expected to perform combat operations, Air Force officials explained.
Consisting of hardware and software, the mission data files are essentially a database of known threats and friendly aircraft in specific parts of the world. The files are being worked on at a reprogramming laboratory at Eglin Air Force Base, Fla., Air Force officials told Military.com last year. The mission data files are designed to work with the aircraft’s Radar Warning Receiver engineered to find and identify approaching enemy threats and hostile fire.
The mission data packages are loaded with a wide range of information to include commercial airliner information and specifics on Russian and Chinese fighter jets. For example, the mission data system would enable a pilot to quickly identify a Russian MiG-29 if it were detected by the F-35’s sensors.
The mission data files are being engineered to adjust to new threat and intelligence information as it emerges. For instance, the system is engineered to one day have all the details on a Chinese J-20 stealth fighter or Russian T-50 PAK FA stealth aircraft.
As a high-visibility, expensive acquisition program, the F-35 has many vocal detractors and advocates; the aircraft has, to be sure, had its share of developmental problems over the years. some of these problems include complications with its main computer system, called ALIS, and a now-corrected engine fire aboard the aircraft. Overall, most critics have pointed to the program’s growing costs, something program officials claim has vastly improved through various money-saving initiatives and bulk-buys.
First World War hero Sgt. Stubby, a Boston Terrier who fought in the trenches with the American 26th Infantry Division and was credited with saving many of their lives, is the titular character and focus of a new animated movie hitting screens in 2018.
Then-Pvt. Robert Conroy assumed responsibility for Stubby and smuggled him onto the SS Minnesota with the 102nd. Stubby served predominantly as a mascot when the unit arrived in France, but began to take a more active role as a sentry.
He remained at the front and later caught a German spy attempting to slip into the American lines in the Argonne Forest. Stubby held the spy until humans could complete the capture.
Despite the grenade wounds and damage from multiple gas attacks, Stubby continued to serve until the end of the war and was once again smuggled across the ocean. Back in America, he rose to prominence as a celebrity.
He was made a lifetime member of the American Legion, Red Cross, and YMCA. The YMCA even put him on a three bones a day salary in exchange for his assistance recruiting members. General of the Armies John J. Pershing, former commander of all U.S. forces in Europe, personally pinned a medal on Stubby’s vest.
That vest has been well decorated with awards, some granted during the war and some, like the gold medal presented by Pershing, were granted after the war.
Stubby continued to live with Conroy until he died in the veteran’s arms in 1926.
The Roman loss to Carthage at the Battle of Cannae pretty much broke Rome, spiritually, mentally and physically. The historian Livy mentions Hannibal killing some 200,000 Roman soldiers. If that wasn’t bad enough, Roman citizens went on to do their worst – to themselves.
In some of the worst displays of Roman human sacrifice, Livy says citizens of Rome threw an “oversized baby” into the Adriatic Sea while burying others alive in the Forum in an attempt to appease the gods. Panic struck the citizens of Rome as they wondered when Hannibal would besiege the capital.
The Battle of Cannae came during the Second Punic War between the Roman Republic and Carthage, the two most powerful entities on the Mediterranean Sea. Rome spent the first half of the war getting their asses handed to them, losing two important battles in as many years. Cannae was Rome’s opportunity to redeem itself. They blew it.
Rome came to the field with 86,000 troops, with its heavy infantry massed deeper than usual. Hannibal used his infantry in a much different formation, massing his troops on the wings of his line, instead of the center.
When the fighting started, the heavy Roman force thinned out the middle of the Carthaginian lines while the Carthaginians’ wings extended and surrounded the advancing Romans. It was a classic double envelopment tactic and the Roman legions walked right into it. An estimated 48,000 legionnaires were slaughtered.
It’s remembered as the most perfect defeat of an enemy army ever. The resulting loss nearly broke the Roman Republic. Philip V of Macedon declared loyalty to Hannibal, as did King Hieronymus of Syracuse, the provinces of Arpi, Capua, Salapia, Herdonia and Uzentum.
There are many reasons for the Roman loss, aside from the army’s major formation. By Roman law, the army had to be co-led by the two Consuls of Rome, in this case, Lucius Aemilius Paullus and Gaius Terentius Varro swapped command of it day after day. It was Paullus’ turn during the Battle of Cannae, and he died there. Varro was recalled to Rome in a panic.
The Roman army was completely remodeled following the defeat at Cannae to increase its mobility and make it less susceptible to the double envelopment. There would also never again be two commanders of the same army. Finally, the Roman army would not be made up of hastily formed militia. Rome would pay for a professional force of soldiers in the future.
As for the Roman survivors of the battle, they were formed into two legions and all but exiled to the island of Sicily, forbidden to ever take part in any Roman military operations ever again. The disgraced legions could not participate in the Roman army’s later eviction of Hannibal from the Italian peninsula or the conquest of the Iberian peninsula.
The republic was ashamed of the legionnaires who were so soundly defeated at the hands of Rome’s worst (but most capable) enemy. They were a walking reminder of the failure of Rome’s old ways and how that failure gave Hannibal free reign over the entirety of Southern Italy.
But their exile wouldn’t last forever. The hero of Rome’s redemption in the Second Punic War, Publius Cornelius Scipio, was a veteran of the Battle of Cannae who managed to fight his way out of the envelopment. Scipio traveled through Sicily on his way to bring the war home to Carthage and he needed men to bolster his numbers.
The surviving veterans of Cannae were ready to give Hannibal what he had coming. When Scipio led the Roman army against Hannibal at Zama, he did it with survivors from Cannae. Hannibal’s defeat at Zama ended the Second Punic War. Scipio returned to Rome in a Triumph and was given the title Scipio Africanus for his performance.
Feature image: “The Death of Aemelius Paulus,” John Trumbull, The Athenaeum / Yale University Art Gallery
Over the last several years, we’ve seen a significant increase in the number of veterans looking to service and therapy animals to aid them through daily life. These faithful companions help vets navigate through various environments, provide crucial emotional support, and retrieve beers from the fridge (we wish).
Now, before anything else, let’s answer the important question: Yes, you can still pet these animals as long as the owner gives you permission.
Since our little buddies have thoughts and emotions just like us, they need to find a way to relay information. After a while, humans pick up on the little personality quirks that our furry friends put out there, like tapping the water bowl with a paw when they’re thirty or standing next to the door when it’s time to pee.
These tiny messages are easy to pick up if you’re paying attention, but some other messages are so subtle that you need to be a dog whisperer to understand. So, to help you out, we’ve compiled a brief list of those important messages.
We’ve all seen a happy puppy quickly wag their tail when excited to see their owner. On the contrary, when a pup’s tail slows down, it’s not because they’re tired — it’s because you confused the sh*t out of them. They don’t know what you want them to do. Slow down and be clear with your commands.
A tucked tail
While humans show emotion using their eyes, a dog shows it through their tail. If your service animal tucks their tail between their legs, it’s a sign that they’re nervous and afraid of feeling pain.
Dogs carefully examine new environments. When they’re settling in and paying close attention, they’ll shift their ears up and forward.
Resting their head on you
Humans require attention from their peers every now and then — your service animal is no different. When your little best friend walks up to you and puts his or her head on you, it’s because they want to be noticed.
From 1936 through 1939, the Nationalist rebels warred against the government of the Second Republic of Spain. During the war, Francisco Franco ascended above other Nationalist generals and was recognized by Nationalist Spain — and fascist Germany and Italy — as the undisputed Generalissimo of Spain. In March 1939, the Republic of Spain surrendered to the Nationalists, ushering in Francisco Franco’s fascist dictatorial regime.
By no means was the Spanish Civil War a fight of gentlemen — if war can ever be pure and honorable. Quite the opposite, the Spanish Civil War was filled with atrocities on both the Republican and Nationalist sides, rivaling the horrors of World War II. Both sides used torture, humiliation, and execution during the war, and the Franco Regime continued to execute dissidents well after the war was over; many mass graves are just now being uncovered.
Surprisingly, the Spanish Civil War turned Catholic laymen and priests into executioners and the executed. They cheered on the Nationalist rebels and were killed by Republican forces. The hands of priests were covered with blood — either their own or their enemy’s.
Religious Persecution in the Spanish Republic
At the outbreak of the Spanish Civil War, the Spanish Republic was governed by a leftist coalition. Among the coalition, some political parties were deeply suspicious of the Catholic Church. The hostility toward religion, specifically held by some socialists, communists, and anarchists in the Republic, allowed for many executions of Catholics to go unpunished. Spanish Civil War historian Paul Preston records in his book, The Spanish Holocaust: Inquisition and Extermination in Twentieth-Century Spain, a staggering 4,184 lay clergy were killed (18% of laymen in Republican territory), 2,365 monks were killed (30% of their population in Republican territory) and 296 nuns were killed (1.3% of the nun population in Republican territory).
These tragic numbers piled ever higher because of mass executions of religious people, as happened in Lleida near the Aragon front—in one night 73 people were killed simply because of their religion (Preston The Spanish Holocaust 243). After execution, the bodies may have been further humiliated, for the region of Aragon had an unfortunate practice of burning the gasoline-soaked corpses of executed priests. Aragon also participated in the killing of religious women—in 1936, three nuns were raped and killed at Peralta de la Sal (Preston The Spanish Holocaust 249). Understandably, these killings made religious Spaniards angry and defensive. Justified or not, some priests did much more than turn the other cheek.
Father Martínez Laorden
One priest who was heavily supportive of, but not involved in, the brutalities of the Nationalist rebels was Father Martínez Laorden. After supporters of the Spanish Republic burned his church, the father fled to the Nationalist forces, along with his niece and his niece’s daughter. After Nationalist forces executed 60 people over a three-month period, Father Martínez Laorden called for the Nationalists to be more thorough in their repression. He even shouted an impassioned speech from atop a town hall balcony: “You all no doubt believe that, because I am a priest, I have come with words of forgiveness and repentance. Not at all! War against all of them until the last trace has been eliminated” (PrestonThe Spanish Holocaust 148).
A more active priest, but still somewhat restrained, who supported the Nationalist rebels was Father Vicente. Peter Kemp, a British volunteer who joined the Nationalists wrote of the enthusiastic priest:
“He was the most fearless and the most bloodthirsty man I ever met in Spain; he would, I think, have made a better soldier than a priest. ‘Hola, Don Pedro!’ he shouted to me. ‘So you’ve come to kill some Reds! Congratulations! Be sure you kill plenty!…Whenever some wretched militiaman bolted away from cover to run madly for safety, I would hear the good Father’s voice raised in a frenzy of excitement: ‘Don’t let him get away — Ah! Don’t let him get away! Shoot, man, shoot! A bit to the left! Ah! That’s got him,’ as the miserable fellow fell and lay twitching” (Preston The Spanish Holocaust183).
Few priests, however, supported the Nationalist cause more than the odd cleric, Benito Santesteban, who worked alongside a Nationalist group known as the Requeté, a particularly ruthless group in Navarre. The Requeté scoured the land for Republican sympathizers, leading to around 3,127 people being killed in the region of Navarre. Benito Santesteban claimed that he, himself, killed more than 15,000 communists in the areas of Navarre, Sebastían, Billbao and Santander, though the figure is clearly inflated (Preston The Spanish Civil War 183). Santesteban, despite claiming to have killed thousands of people, was not completely heartless — as he saved several people from execution. Saving a few, while helping kill many, however, is unlikely to have redeemed Benito Santesteban.
Navarre, specifically the city of Pamplona, emphasized a sad truth about the Spanish Civil War — it was dangerous to criticize brutality on both sides of the war. Most priests did not fall into a bloodlust during the Spanish Civil War, but it was dangerous for them to speak out against the violence. A perfect example was the tragic death of Father Eladio Celaya, a 72-year-old priest of Cáseda. In 1936, disapproving of the actions of Benito Santesteban and the Requeté in Navarre, Eladio Celaya traveled to Pamplona to speak out against the executions and murders — he arrived in Pamplona on August 8thand by August 14th Eladio Celaya was dead and decapitated by Nationalist zealots (Preston The Spanish Holocaust 184).
Blood on all sides
The religious people of Spain were in a terrible position during the Spanish Civil War. They were often supportive of and targeted by executions and persecutions. The Spanish Civil War was a crusade of passions on both side of the war, with conflicting philosophies and lifestyles leading to overzealous, fanatical fighters. As in every crusade, the Spanish Civil War left religion unnaturally tainted with blood.
Read all of C. Keith Hansley’s articles here, where royalty-free images, recommended books, and keen quotes can also be found.
The Modern Army Combatives Program was started by the service in 1995 at Fort Benning, Georgia, with a mission to train soldiers to fight hand-to-hand and to sharpen the warrior mind.
Rather than beat the enemy into a pulp, MACP is intended to teach a soldier to subdue the enemy enough to grab another weapon.
It’s not like the Army is training MMA fighters here.
The average infantry trooper learns the basics of combatives, such as grappling and controlling a resisting opponent’s body. Soldiers who compete in the tournaments held by the Army are those who take their Modern Army Combatives skills to the next level.
More advanced combatives skills draw from Muay Thai, Boxing, Greco-Roman Wrestling, Brazilian Jiu-Jitsu, and Sambo martial arts styles, among others. It becomes more complex when training with weapons as well.
The footage compilation below comes from the 2015 Modern Army Combatives Tournament held at Joint Base Lewis-McChord, Wash. The first round of competition was for basic combatives, the second round through the finals featured more advanced techniques.
The finals featured a “Tactical Enclosure” – also known as a cage – with open striking.
A report from the U.S. Department of Housing and Urban Development’s HUD Exchange estimates that there are slightly more than 39,000 homeless veterans (both in shelters and without shelter). While still a significant number, that number has seen huge decreases in the last few years thanks in part to partnerships with programs like Built for Zero.
Built for Zero is an intense national program that helps communities develop and implement drastic plans to address the issue of veteran and chronic homelessness, and “the conditions that create it.” The motivation is two-fold: homelessness costs local economies more money by sustaining shelters and emergency medical care, and that veterans who’ve defended this country shouldn’t be homeless in it.
“Homelessness is a manmade disaster, and it can be solved,” Community Solutions president Rosanne Haggerty wrote in the nonprofit’s 2015 Annual Report.
Built for Zero partners with communities and teaches them how to come up with ways to pool and manage their resources, tapping into previously non-traditional homelessness-fighting resources, like businesses, churches, and even real estate companies in order to address some of the conditions that impact homeless veterans.
Employment, transportation and healthcare are just some of the issues that the project addresses when fighting homelessness.
“Community Solutions works upstream and downstream of the problem by helping communities end homelessness where it happens and improve the conditions of inequality that make it more likely to happen in the future,” Haggerty wrote in the report.
Rather than make homelessness just a crime-fighting task, Built for Zero makes it a community task.
In 2015 alone, Community Solutions raised over $9 million through donations and grants. That money assisted in housing over 20,000 homeless veterans in 75 communities- and it saved tax payers an estimated $150 million doing it.
The moment newly-arrived Marines entered the jungles of Vietnam, they were faced with a question from the most persistent recruiter. The call of the Blue-Eared Barbet, a bird indigenous to southeast Asia and beyond, has a distinctive, high-pitched warble:
In the elephant grass, there lives a bird whose call sounds like reeeuhuuup, and of course Marines call it the RE-Up Bird. As I am sure you know, re-up means to re-enlist, an idea not popular with the Marines over here.
It was the question no one was ready to answer right away. Luckily for the soldiers and Marines in the Vietnamese jungles, night time brought out the Tokay Gecko, who had the perfect answer to the Re-Up Bird.
Yes, the nocturnal lizard’s own distinctive call earned it a nickname as well. And the nights in the central highlands of Vietnam were filled with the refrain of this continual question-and-answer game.
Elbert Franklin Evans recounted his earliest encounters with Vietnam’s nighttime sign-countersign between the Barbet and the Gecko in his 1997 book, “Night On The Perimeter:”
“I heard the snickers from the soldiers on the bunker on my left. They enjoyed this jungle sonata, which echoed their own sentiments. Re-up? F*** you. You found humor in unlikely places in the bush, and this small bit of humor was peculiarly calming.”
Vietnam veteran John Podlaski writes extensively about the sounds of the jungle at night on his blog, which is named after his book, “Cherries, a Vietnam War story,” about his 1970 deployment to the country.