It’s not every day that you can say “Today I got a personalized tweet from someone claiming to be with ISIS.” And that’s probably a good thing.
It happened like this: The Twitter account of a military spouse who owns a spouse-focused non-profit was hacked by a group apparently affiliated with the Islamic State in Iraq and Syria (ISIS). The hackers then tweeted messages aimed at specific military spouses, including myself.
“Amy Bushatz! You think you’re safe but the IS is already here, #CyberCaliphate got into your PC and smartphone,” is, I’m told, what the tweet said (I did not actually see it before it was deleted, presumably by Twitter).
Not long thereafter I received a friend request from someone named “Gasper CyberCaliphate Sadz.” When I viewed their profile it was clear that they were not the sort of person I wanted to let into my social life. Within a few seconds the profile had been deleted. And yes, it was really creepy. The same photo and images were used in this account as were used during the CENTCOM hack.
You might be thinking “that’s what you get for being stupid enough to be quoted by name in a CNN article about ISIS and cyber threats.” However, the decision to have my name used in that story wasn’t a hard one. My name is everywhere — here, on Military.com and in other national publications. I am a public person. That ship has sailed.
I’m told the FBI is investigating the situation, and all the proper military officials have been notified by those of us involved. My husband suggested I not let anyone dressed as a terrorist into our house.
I want to face this whole situation with a resolute jaw and a loud “being afraid means the terrorists win.” I’m not the type of person to live in fear or change my life just because some person on the internet wants to scare me. I’ve never done that before and I have no intention of doing it now.
Personal attacks bring up a variety of feelings. On the one hand, I’m super pissed. How dare they threaten me and my friends? Then there’s the maniacal laughter and the semi-inappropriate jokes about not opening the door for anyone in a bomb vest. I’ve got lots of those.
But then, underneath all of that somewhere deep in my core, I am trying to shake off the tiniest bit of what feels an awful lot like fear.
Because being singled out by someone claiming to be with a fairly terrifying terrorist organization? That’s scary. Knowing that, thanks to my job and public profile, my town of residence, spouse’s name and occupation, base, kid’s names and more wouldn’t take a rocket scientist to locate online? More than unnerving.
But I don’t think it’s the fear itself that matters. I think it’s what I choose to do about the fear that is the key. Do I let it change my habits? Do I ignore it completely and hope nothing bad happens?
Do I use it as a cautionary tale to be more vigilant — much like you would react to a story of a home robbery in your neighborhood?
Or do I completely change my life, delete my social media presence and lock down my family because I am afraid?
Being afraid doesn’t mean the terrorists won — it’s the living in fear that gives them the victory. I’m not giving them the victory.
In World War II, an American aircrew found itself at the mercy of a German fighter and expected to be shot out of the sky. But something else happened entirely . . .
The American aircrew takes a heavy beating
The American crew on their first mission was limping after taking heavy flak damage during a bombing run over Germany on Dec. 30, 1943. It was supposed to be just behind and beside the flight leader in its formation, but it simply couldn’t keep up with two of its four engines severely damaged. 2nd Lt. Charles Brown, the pilot, watched his formation pull slowly away.
All alone in German skies, the situation got even worse for the crew when eight German fighters appeared ahead. The B-17 downed at least one of the attackers and possibly a second, but seven more fighters approached from the rear and began another attack.
Brown doesn’t remember exactly what happened next but thinks he must have lost oxygen and passed out.
“I either spiraled or spun and came out of the spin just above the ground,” he said in an interview on Military.com. “My only conscience memory was of dodging trees but I had nightmares for years and years about dodging buildings and then trees. I think the Germans thought that we had spun in and crashed.”
One crew member was dead and Brown was wounded with three others. Thinking the Germans had left after the plane nearly crashed, he ordered the crew in the cockpit to check on the wounded and the state of the plane. In the cockpit with the co-pilot, he looked out the window and saw a German fighter on his wing, a feared Messerschmitt Bf-109.
The German Ace
Oberleutnant Franz Stigler was a skilled pilot for the Luftwaffe. On the day of the incident, he had already shot down two B-17s and would automatically earn the Knight’s Cross, Germany’s highest military honors, if he got just one more that day. He was smoking a cigarette and watching his plane be rearmed and refueled when he looked up and saw the heavily damaged American bomber fly over him. He leaped into his cockpit and flew up to get the kill.
Approaching from the rear, he lined up his shot on the tail, but was surprised to notice that the tail guns were pointed down like no one was holding them. He abstained from his shot and flew closer. What he found shocked him.
Icicles of blood were hanging from the gun barrels and the tail gunner, dead, was visible through a hole in the tail. The tail itself was nearly half gone. Pulling even with the enemy plane, he saw the rest of the plane was damaged as well. Sunlight was passing through a massive hole in the side and the whole thing was peppered from flak and cannon fire. Still unopposed, he caught up to the cockpit and saw the American pilot.
Stigler could drop back at this moment, take out the plane and become a German war hero.
But, when he was starting his career, his commanding officer had told him that he had to follow the rules of war to protect his own humanity. He told Franz that if he ever heard Franz shot at a pilot descending in a parachute, he’d kill Franz himself. Franz later said that when he saw the extreme damage to the B-17, he couldn’t fire. “… for me, it would have been the same as shooting at a parachute,” he said in a video. “I just couldn’t shoot. I just hoped that he got his wounded men home.”
There was a complication though. If Franz was caught letting an Allied plane go, he could be executed on the ground. And the planes were drawing close to German shore defenses that would spot and report him. Also, at any moment the American crew could decide to kill the threat off their wing.
After watching this for a few moments, Brown realized that this pilot could kill him at any moment. He screamed back down the plane for the top gunner to get in the turret and shoot down the German. After he gave the order he turned back to look out the window.
Franz, already worried about how close they were getting to the German shore gunners, saw the turret begin to move. He looked Brown in the eyes, saluted the American, and flew away.
They meet again
Brown would wonder for years about what happened, but it wasn’t until 1990 that he learned what had become of the German pilot who spared him.
After placing an ad in a magazine for combat pilots, Brown received a letter in reply. He called Franz with a dose of skepticism about whether it was his real savior. Franz quickly convinced him by describing all the details of the event, right down to the salute.
They answered each others questions about the event. Franz explained that he didn’t fire because of his own morals in the war, that he had been gesturing and mouthing to try and get the American to fly to Switzerland because he was convinced the plane couldn’t make it to England, and that he had finally pulled away from the bomber because he was worried about being spotted by Germans or fired on by the Americans.
Franz had always wondered if the Americans made it back alive, if sacrificing his medal and risking his life had meant anything. Brown confirmed that the crew and the plane made it to England and were able to land. The tail gunner had died in the air, but the rest of them survived.
The two became friends. Franz had moved to Canada in 1953 and Brown lived in America, so they visited each other and fished together. Both died of heart attacks in 2008.
In Tom Clancy’s fictional “Rainbow Six” universe, customizable teams of special operatives use intelligence from around the world to strike at threats against NATO. Designated “Rainbow,” the team was originally 30 members and is comprised of the best Delta, SAS, and other top NATO-member special operations units have to offer.
Rainbow deploys on quick notice around the world, fulfilling both a deterrent and a direct action role, mostly against terrorists.
The real-world NATO must have seen all of this and — in light of recent Russian aggression — decided Rainbow just wasn’t big and strong enough for the real world.
Instead, NATO announced in February the planned components of their Very High Readiness Joint Task Force. As part of the overall NATO Response Force, the VJTF does have special operators from around the world supporting it and an international intelligence network.
But VJTF doesn’t end at special operations. Dubbed “Spearhead Force,” it centers on a land brigade of approximately 5,000 troops that can hit a target and begin operations within 48 hours of notification. The primary component of the Spearhead Force will change year-to-year, coming from whichever country is in primary command of the unit. Germany is taking the first turn and leading the force in 2015 and has already taken the interim VJTF out for a spin.
In addition to their special operators and land forces, the VJTF will have air assets and naval forces on the ready. Britain has volunteered four fighter jets to the air mission already, in addition to 1,000 troops for the land component.
What units will make up the rest of the air component, as well as the exact forces in the maritime and special operations components, have not been announced.
Of course, the special operations support could be coming from Rainbow — if you believe the government is hiding an international special operations force from the American public.
When American intelligence detected the massive buildup of North Vietnamese troops that preceded the 77-day siege of Khe Sanh in 1968, Gen. William Westmoreland gave the base priority access to all American airpower in theater, leading to Operation Niagara and a “waterfall of bombs.”
Khe Sanh was the westernmost base in a strong of installations along the crucial Route 9 in late 1967. It was in the perfect position to block North Vietnamese Army forces and other fighters moving in from Laos or other NVA areas.
But Westmoreland believed that Khe Sanh was crucial to victory and worth heavy investment despite its relatively small size as home to one Marine regiment and 5,000 support troops. To ensure the Marines could hold out against anything, he ordered improvements to infrastructure on the base and the installation of thousands of remote sensors in the surrounding jungle.
By the first week of January 1968, sensors and reconnaissance data made it clear that the NVA was conducting a massive buildup in the area of the base. All indications were that the North Vietnamese wanted to recreate their success at Diem Bien Phu in 1954 when a prolonged siege led to the withdrawal of French forces.
Artillery rounds were stockpiled at the base and intelligence was collected. The intel cells were able to get a good idea of where Communist forces were concentrating forces, artillery, and command elements. They were also able to track tunneling efforts by the North Vietnamese trying to get close to the base.
And the North Vietnamese were able to get close — in some cases within a few thousand meters.
On Jan. 21, 1968, the North Vietnamese launched a simultaneous attack against Khe Sanh itself and some of the surrounding hills. Their massed forces would eventually number 20,000, more than three times the number of the 6,000 defenders.
The U.S., with a mass of intelligence and stockpiled weapons, went on the offensive against the North Vietnamese. Artillery shells shot out of the base against pre-identified targets, and a waterfall of bombs started pouring from B-52s.
Initially, the bombs were dropped relatively far from the base. The B-52s tried to stay three miles out, but the communists figured out the restrictions and moved their fighters in close, forcing the B-52s to operate closer to the base and making the ground pounders rely more heavily on strike aircraft and the AC-47 gunship.
Of course, not everything went smoothly for the Marines and their support. An enemy artillery strike by the North Vietnamese managed to hit the ammo dump, destroying 90 percent of the stockpiled rounds in a single hit.
The U.S. Coast Guard was officially formed in 1915, but it traces its history to 1790 through the Lifesaving Service and the Revenue Cutter Service. Formerly part of the Treasury Department and now under the Department of Homeland Security, the Coast Guard is generally the butt of jokes from military branches under the Department of Defense.
Despite the comments about the ‘puddle pirates,’ Coast Guard history is filled with shocking exploits.
1. The Coast Guard conducted a World War II raid nearly three months before Pearl Harbor attack
The Coast Guard cutter USCG Northland was patrolling near Greenland under a defensive treaty between Greenland and the U.S. on Sep. 12, 1941, when it received a tip that a suspicious ship had put ashore a landing party in a nearby fjord. The Northland found the vessel, the Norwegian fishing boat SS Buskoe. The Northland crew boarded the ship and took the ship master to the Northland for questioning. The boarding party continued to search the Buskoe and found two sets of radio equipment, an indicator that the ship was handling communications for Nazi radio stations.
The Coast Guard conducted an interrogation of the ship master and learned the location of the landing party the ship had previously dropped off. Coast Guardsmen landed on the shore and conducted a nighttime raid against a radio station established by the enemy landing party. They captured three Norwegians, at least one acting under German orders. They also found German radio equipment, code words, and military instructions. Since the U.S. and Germany were not yet at war, the Norwegians were arrested as illegal immigrants.
2. Revenue cutters captured 18 ships during a quasi-war with France
America owed a significant amount of money to France when the French crown was overthrown during the French Revolution in 1794. The U.S. told the French Republic that they would not be repaying the debt since the money was owed to the crown.
Backlash from France resulted in the Quasi War from 1798-1799. Though neither nation declared war, naval battles became common with the French seizing American merchant ships by the hundreds. The Navy, which had been disbanded after the war of 1812, was re-instituted. While the Navy was standing up, eight Revenue Cutter Service ships were pressed into service against the French Navy.
3. A Coast Guard lieutenant commanded an Army company in combat
In 1855, Revenue Cutter 2nd Lt. James E. Harrison was ordered to accompany a U.S. Army company in the American-Indian Wars. In the Puget Sound area of Washington, the Army camp was ambushed by a group of Native Americans on December 3. The Army commander, Lt. W. A. Slaughter, was killed the next day in the fighting. Harrison assumed command of the company and beat off the attackers in a fierce firefight. He then led the company back to Fort Steilacoom, Washington on December 21.
4. The USRC Hudson rescued a Navy vessel while under heavy fire from Spanish artillery
On May 11, 1898, the USRC Hudson was part of the Navy fleet blockading Cuba during the Spanish-American War. A group of Spanish ships had attacked the blockade the day before and were now in harbor in Cardenas, a fortified port. Navy Cmdr. John Merry ordered the Hudson and the USS Winslow to enter the port and sink the ships.
The Winslow was faster and entered the port first, but was soon damaged due to fierce fire from shore batteries. The Hudson rushed to the defense of the damaged torpedo boat, laying down thick covering fire and attempting to secure a tow cable to the Navy vessel. After more than a half hour, the Winslow crew was finally able to secure the tow cable and the Hudson pulled her out of the port. The vessels sank two Spanish ships during the attack, but the Winslow suffered the deaths of an officer and multiple crewmen.
5. The Surveyor crew bravely fought back against a boarding party over three times its size
During the War of 1812, a boarding party of 50 British sailors from the HMS Narcissus used muffled oars to sneak up on the USRC Surveyor. The 15-man crew of the Surveyor saw the British approaching but could not bring the guns to bear due to the angle of approach of the boarding party.
Capt. Samuel Travis ordered his men to take two muskets each and wait quietly for the British to get within pistol range. The British were hampered by the surprise volley but kept coming, so the crew of the surveyor fought across the decks to retain control of the ship. The British were eventually able take the ship, but they suffered three dead and seven wounded to the Americans’ five wounded. The cutter’s defense was so fierce despite the numerical advantage of the British that British Capt. John Crerie returned the American captain’s sword the next morning with the following note.
“Your gallant and desperate attempt to defend your vessel against more than double your number excited such admiration on the part of your opponents as I have seldom witnessed, and induced me to return you the sword you had so ably used, in testimony of mine.
Our poor fellows have severely suffered, occasioned chiefly, if not solely, by the precaution you had taken to prevent surprise. In short, I am at a loss which to admire most-the previous arrangement on board the Surveyor, or the determined manner in which the deck was disputed inch by inch. You have my most sincere wishes for the immediate parole and speedy exchange of yourself and brave crew.”
6. A future commandant of the Coast Guard herded reindeer 1600 miles across Alaskan Arctic
The service accepted volunteers for the mission dubbed “The Overland Expedition” which departed Dec. 16, 1897. The men made their way through the Alaskan wilderness with dog and reindeer teams pulling sleds of supplies and mail. The amount of supplies needed and the scarcity of sleds and dogs meant the men had to run alongside the sleds for most of the 1600-mile trek in temperatures as low as -60 degrees Fahrenheit.
The expedition purchased reindeer and drove them north through the nearly complete darkness of the Alaskan winter. The men arrived at Point Barrow March 29, 1898 with 382 reindeer. Though many of the whalers had become sick or emaciated before the arrival of the rescue party, only three died and the rescue was a success. When the summer thaw completed, four of the ships were able to sail south. Four had been destroyed by the ice and their crews were transported south by the USRC Bear to San Francisco. The second-in-command of the operation, 2nd Lt. Ellsworth Berthoff, would go on to become the first commandant of the Coast Guard when the Revenue Cutter Service and the Lifesaving Service were combined in 1915.
7. A beached crew fired the enemy’s own cannonballs back at them
When the USRC Eagle found itself outmatched by the British HMS Dispatch during the War of 1812, the crew didn’t give up. They intentionally ran the cutter aground on Long Island and dragged some of its guns to a high bluff. From there, they teamed up with local militia and began firing on the British.
By mid-afternoon, they were out of shot. They reportedly began using sheets from their logbook as wadding and fired the enemy’s own cannonballs back at them. The enemy fire was so fierce, the cutter’s flag was shot off three times. The British eventually captured the Eagle.
8. Coast Guardsman destroyed a major pirate fort
Cape Breton Island in modern day Nova Scotia, Canada was a haven for pirates such as Captain Kidd for much of the 17th and 18th centuries. During operations in 1820, the USRC Alabama and USRC Louisianaattacked the pirate fort at Breton Island. Louisiana went on to capture five pirate vessels as part of a Caribbean task force with the British and U.S. navies.
9. The Coast Guard conducted more than 1,300 search and rescue missions during the Mariel Boatlift
On April 22, 1980, Cuban President Fidel Castro opened the Port of Mariel to Cubans who wished to emigrate from Cuba. Within hours, ships were headed from Miami to pick up the refugees. Over the next 45 days, an estimated 5,000 vessels pulled more than 100,000 Cubans from the island. The vessels were usually packed over capacity and had insufficient flotation devices. Over half of the vessels needed some sort of assistance from the Coast Guard.
The Coat Guard shifted many of its active duty assets to the Straits of Florida and called up its reserves. Many vessels began running 24-hour operations just to tow damaged ships or search for lost ones. The call for Coast Guard cutters became so dire that some ships stopped being able to maintain their logs. Still, the Coast Guard logged 1,300 search and rescue missions during the operation with an unknown number not being recorded.
The Air Force is performing key maintenance on the F-22 Raptor’s stealth materials and upgrading the stealth fighter with new attack weapons to include improved air-to-air and air-to-surface strike technology, service officials said.
“In the Summer of 2019, the F–22 fleet will begin to receive upgrades to its available weapons with the Increment 3.2B upgrade. This upgrade allows full functionality for the AIM-120D and AIM-9X Air-to-Air missiles as well as enhanced Air-to-Surface target location capabilities,” 1st Lt. Carrie J. Volpe, Action Officer, Air Combat Command Public Affaris, Joint Base Langley-Eustis, Va., told Scout Warrior.
The F–22 currently carries the AIM-9X Block 1 and the current upgrade will enable carriage of AIM-9X Block 2, Volpe added.
Raytheon AIM-9X weapons developers explain that the Block 2 variant adds a redesigned fuze and a digital ignition safety device that enhances ground handling and in-flight safety. Block II also features updated electronics that enable significant enhancements, including lock-on-after-launch capability using a new weapon datalink to support beyond visual range engagements, a Raytheon statement said.
Another part of the weapons upgrade includes engineering the F-22 to fire the AIM-120D, a beyond visual range Advanced Medium-Range Air-to-Air Missile (AMRAAM), designed for all weather day-and-night attacks; it is a “fire and forget” missile with active transmit radar guidance, Raytheon data states. The AIM-120D is built with upgrades to previous AMRAAM missiles by increasing attack range, GPS navigation, inertial measurement units and a two-way data link, Raytheon statements explain.
The AIM-120D also includes improved High-Angle Off-Boresight technology enabling the weapon to destroy targets at a wider range of angles.
Additional upgrades to the stealth fighter, slated for 2021, are designed to better enable digital communications via data links with 4th and 5th generation airplanes.
“The backbone of this upgrade also includes the installation of an open systems architecture that will allow for future upgrades to be done faster and at less expense than could be previously accomplished,” Volpe said.
Stealth Coating Maintenance
The Air Force has contracted Lockheed Martin to perform essential maintenance to the F-22’s low-observable stealth coating to ensure it is equipped to manage fast-emerging threats.
Lockheed Martin completed the first F–22 Raptor at the company’s Inlet Coating Repair (ICR) Speedline, a company statement said.
“Periodic maintenance is required to maintain the special exterior coatings that contribute to the 5th Generation Raptor’s Very Low Observable radar cross-section,” Lockheed stated.
The increase in F–22 deployments, including ongoing operational combat missions, has increased the demand for ICR. Additionally, Lockheed Martin is providing modification support services, analytical condition inspections, radar cross section turntable support and antenna calibration.
F-22 Attack Supercruise Technology
As a fifth-generation stealth fighter, the F-22 is specifically engineered for air supremacy and air dominance missions, meaning its radar-evading technology is designed to elude and destroy enemy air defenses. The aircraft is also configured to function as the world’s premier air-to-air fighter able to “dogfight” and readily destroy enemy aircraft.
“Air superiority, using stealth characteristics is our primary role. The air dominance mission is what we will always do first. Once we are comfortable operating in that battlespace, our airmen are going to find ways to contribute,” Col. Larry Broadwell, the Commander of the 1st Operations Group at Joint Base Langley-Eustis, Virginia, told Scout Warrior in a special pilot interview last year.
The F-22’s command and control sensors and avionics help other coalition aircraft identify and destroy targets. While some of the aircraft’s technologies are not “publically discussable,” Broadwell did say that the F-22’s active and passive sensors allow it to function as an “aerial quarterback” allowing the mission to unfold.
For example, drawing upon information from a ground-based command and control center or nearby surveillance plane – such as a Joint Surveillance and Target Attack Radar System – the F-22 can receive information or target coordinates from nearby drones, Broadwell explained.
At the moment, targeting information from drones is relayed from the ground station back up to an F-22. However, computer algorithms and technology is fast evolving such that aircraft like an F-22s will soon be able to quickly view drone video feeds in the cockpit without needing a ground station — and eventually be able to control nearby drones from the air. These developments were highlighted in a special Scout Warrior interview with Air Force Chief Scientist Greg Zacharias.
Zacharias explained that fifth generation fighters such as the F-35 and F-22 are quickly approaching an ability to command-and-control nearby drones from the air. This would allow unmanned systems to deliver payload, test enemy air defenses and potentially extend the reach of ISR misisons.
“Because of its sensors, the F-22 is uniquely able to improve the battlefield awareness – not just for airborne F-22s but the other platforms that are airborne as well,” he said. The Raptor has an F-22-specific data link to share information with other F-22s and also has the ability to use a known data link called LINK 16 which enables it to communicate with other aircraft in the coalition, Broadwell explained in an interview last year.
Newer F-22s have a technology called Synthetic Aperture Radar, or SAR, which uses electromagnetic signals or “pings” to deliver a picture or rendering of the terrain below, allow for better target identification.
The SAR technology sends a ping to the ground and then analyzes the return signal to calculate the contours, distance and characteristics of the ground below.
“The addition of SAR mapping has certainly enhanced our air-to-ground capability. Previously, we would have to take off with pre-determined target coordinates. Now, we have an ability to more dynamically use the SAR to pinpoint a target while airborne,” Broadwell added.
“The F-35 is needed because it is to global precision attack what the F-22 is to air superiority,” he added. “These two aircrafts were built to work together in concert. It is unfortunate that we have so few F-22s. We are going to ask the F-35 to contribute to the air superiority mission,” he said.
Overall, the Air Force operates somewhere between 80 and 100 F-22s. Dave Majumdar of The National Interest writes that many would like to see more F-22s added to the Air Force arsenal. For instance, some members of Congress, such as former Rep. Randy Forbes, R-Va., have requested that more F-22s be built, given its technological superiority.
Citing budget concerns, Air Force officials have said it is unlikely the service will want to build new F-22s, however it is possible the Trump administration could want to change that.
The F-22 is known for a range of technologies including an ability called “super cruise” which enables the fighter to reach speeds of Mach 1.5 without needing to turn on its after burners.
“The F-22 engines produce more thrust than any current fighter engine. The combination of sleek aerodynamic design and increased thrust allows the F-22 to cruise at supersonic airspeeds. Super Cruise greatly expands the F-22’s operating envelope in both speed and range over current fighters, which must use fuel-consuming afterburner to operate at supersonic speeds,” Broadwell explained.
The fighter jet fires a 20mm cannon and has the ability to carry and fire all the air-to-air and air-to-ground weapons including precision-guided ground bombs, such Joint Direct Attack Munitions called the GBU 32 and GBU 39, Broadwell explained. In the air-to-air configuration the Raptor carries six AIM-120 AMRAAMs and two AIM-9 Sidewinders, he added.
“The F-22 possesses a sophisticated sensor suite allowing the pilot to track, identify, shoot and kill air-to-air threats before being detected. Significant advances in cockpit design and sensor fusion improve the pilot’s situational awareness,” he said.
It also uses what’s called a radar-warning receiver – a technology which uses an updatable data base called “mission data files” to recognize a wide-range of enemy fighters, Broadwell said.
Made by Lockheed Martin and Boeing, the F-22 uses two Pratt Whitney F119-PW-100 turbofan engines with afterburners and two-dimensional thrust vectoring nozzles, an Air Force statement said. It is 16-feet tall, 62-feet long and weighs 43,340 pounds. Its maximum take-off weight is 83,500.
The aircraft was first introduced in December of 2005, and each plane costs $143 million, Air Force statements say.
“Its greatest asset is the ability to target attack and kill an enemy without the enemy ever being aware they are there,” Broadwell added.
The Air Force’s stealthy F-22 Raptor fighter jet delivered some of the first strikes in the U.S.-led attacks on the Islamic State in Iraq and Syria, when aerial bombing began in 2014, service officials told Scout Warrior.
After delivering some of the first strikes in the U.S. Coalition-led military action against ISIS, the F-22 began to shift its focus from an air-dominance mission to one more focused on supporting attacks on the ground.
“An F-22 squadron led the first strike in OIR (Operation Inherent Resolve). The aircraft made historic contributions in the air-to-ground regime,”
Even though ISIS does not have sophisticated air defenses or fighter jets of their own to challenge the F-22, there are still impactful ways in which the F-22 continues to greatly help the ongoing attacks, Broadwell said.
“There are no issues with the air superiority mission. That is the first thing they focus on. After that, they can transition to what they have been doing over the last several months and that has been figuring out innovative ways to contribute in the air-to-ground regime to support the coalition,” Broadwell said.
For Marine Corporal Alex Monaghan, who retired from the Corps in 2009 after four years as a rifleman during which he deployed twice (once to Iraq and once to Afghanistan), the phrase “boots on the ground” has taken on a far different meaning than those words typically suggest.
That’s because Alex is the first graduate of a brand-new Semper Fi Fund program: Semper Fi Fund Apprenticeship Program, which helps service members learn valuable skills that they could one day leverage to start a business.
In Alex’s case, that skill is making high-quality cowboy boots.
It all began when Alex was considering going on “one of these horse stints,” as he describes it, as part of the Jinx McCain Horsemanship Program. While filling out the paperwork, there was a question at the bottom asking, “Are you interested in learning any of these skills?” Among the skills listed were knife-making, silver-engraving, roping … and making cowboy boots.
“It was weird that it was on there,” Alex recalls. “I always wanted to design my own boots. It’s a two-week program in St. Jo, Texas. The days are long—12 hours a day, six days a week—and there’s a lot to learn in a short amount of time. You get a pair of customized boots when you’re done.”
The time may have been short, but Alex was learning from the best: The boot-making program is run by Carlton T. Chappell, a third-generation award-winning bootmaker who started in leathercraft in 1964 and has been recognized as one of the very best bootmakers in the world.
“It’s pretty neat,” Alex says. “You can’t learn everything in two weeks—Carl is in his 70s or 80s now, and he’s still learning new techniques every day–but it’s interesting. There’s always something new to learn, a new skill to master.”
While making a quality pair of cowboy boots is intricate and artistic work, Alex felt he had something of a head start over his half-dozen or so classmates.
“I did tattoo work for a couple of years,” he explains. “As far as working with machines and stuff, you have this huge thing on the table—you still have to draw out your sketch pattern and sew it up. I felt as if I had some advantage, because I’d been doing something similar to it.”
After finishing the two-week seminar, Alex went on to serve a month-long apprenticeship in Vernon, Texas, with award-winning bootmaker Dew Westover. Dew spent 20 years as a working cowboy, attended Carl’s seminar in 2002 and opened his own boot shop in 2004.
Alex made two pair of boots during his apprenticeship, and now he’s studying business at Texas AM as part of an entrepreneurship for veterans program.
Looking back over the years since he’s left active duty, Alex has seen a number of ups and downs in his own life, but he credits the Semper Fi Fund with helping him get out and get active—and he encourages his fellow veterans to do the same.
“If there are vets who are thinking about these sorts of programs, and they’re itchy or worried about it, I say just give it a try.”
“A lot of vets create a bubble and don’t go out in public,” Alex continues. “I think it’s a great experience—you have buddies to hang out with, you’re pushing yourself to do things that your anxiety or PTSD is preventing you from doing. I do these things, it pushes me to get out and go on the road and deal with people.”
“I would encourage more vets to get out there and find something they enjoy. Whether it’s bike riding or horseback riding or whatever—I’m sure the Semper Fi Fund has something for them.”
Special thanks to the incredible generosity of one very special family for helping to provide funding for this important program in memory of their brother who wished to remember whose who serve.
We Are The Mighty is teaming up with Semper Fi Fund and comedian Rob Riggle to present the Rob Riggle InVETational Golf Classic. The veteran-celebrity golf tournament will raise money and awareness for Semper Fi Fund, one of our nation’s most respected veteran nonprofit organizations, in support of wounded, critically ill and injured service members and their families. Learn more at InVETational.com.
Years of war have rendered Operation Iraqi Freedom (OIF) and Operation Enduring Freedom (OEF) service members with severe physical, mental and emotional scars that will likely impact them throughout their lives. The financial implications and consequences of these scars are well documented and can affect all aspects of their lives and lives of their family members to include housing, employment, and their financial well-being.
The PenFed Foundation’s Military Heroes Fund provides wounded veterans, military families, and caregivers with financial assistance and support that the Veterans Administration cannot offer due to budgetary and regulatory restrictions. These unmet needs are identified by VA advocates, National Guard case workers, the Army Wounded Warrior Program, and non-profit referral partners.
The Military Heroes Fund has two components:
Emergency financial assistance for OIF/OEF wounded warriors and their families facing short-term financial difficulties.
Family and Caregiver Transition Support
Child Care support provided for families of the wounded OIF/OEF families while receiving outpatient care at a VA medical facility, family visits, doctor visits, job-related.
Short term training or education expenses for job certification, licensure requirements and/or course materials such as course books technology fees, etc.
In-home health care for injured veteran to support caregiver respite needs.
The Military Heroes Fund gives grants to wounded veterans who:
Served in Operation Iraqi Freedom (OIF) or Operation Enduring Freedom (OEF)
Have been wounded, ill or injured during your OIF/OEF service
Have received an Honorable discharge
Are facing a financial emergency which is short-term
Can provide a DD214 and VA Disability Rating Certification or have one in progress
Can help us confirm your status by being referred by your Army Wounded Warrior advocate (AW2), Recovery Care coordinator (RCC), VA doctor or social worker, or another nonprofit advocacy organization
The Military Heroes Fund also gives grants to caregivers who:
Are a Family member and/or caregiver of an Operation Iraqi Freedom (OIF) or Operation Enduring Freedom (OEF) veteran
Can provide a DD214 and VA Disability Rating Certification for veteran, or have one in progress
Send copy of invoice or estimate for requested services from a licensed/certified individual, institution, or facility on official letterhead
Can help us confirm your status by being referred by your Army Wounded Warrior advocate (AW2), Recovery Care coordinator (RCC), VA doctor or social worker, or another nonprofit advocacy organization
The PenFed Foundation continuously examine potential grantees who meet all the above criteria. If you qualify, fill out and return the application form along with copies of your DD214, VA Disability Statement and the bill from the institution or creditor which you need assistance with. (From receipt of all documentation, it can take up to 10 days to process the grant. Grants are paid directly to the creditor.)
The men of the 2nd Armored Cavalry Regiment spearheaded one of the American columns that invaded Iraq on Feb. 23, 1991. After three days of light fighting they stumbled into one of the largest Iraqi armored formations and annihilated it with cannons, TOW missiles and mortars in the Battle of 73 Easting, often called “the last great tank battle of the 20th century.”
Then-Capt. (now Lt. Gen.) H.R. McMaster, commander of Eagle Troop, 2nd Squadron, 2nd ACR, literally wrote the book on the battle and commanded one of the lead elements in the fight.
Helicopters buzzed over Eagle Troop as the ground invasion of Iraq began on Feb. 23. The mission of the 2nd ACR was simple in theory but would be challenging to achieve. They were to cut off Iraqi retreat routes out of Kuwait and destroy the large armored formations thought to be hiding in the flat, featureless desert.
The empty desert could be challenging to navigate since there were no features to use for direction. Heavy rains and windstorms limited visibility as the tanks and other vehicles felt their way through the desert.
Fox troop made contact first, destroying a few enemy tanks. Over the next couple of days, 2nd Squadron tanks and vehicles would encounter enemy observation and scout vehicles and destroy them with missiles and cannons, but they couldn’t find the Iraqi Republican Guard divisions they knew were dug somewhere into the desert.
In the afternoon of Feb. 26, 1991, McMaster was pushing his troop through a sandstorm when he crested a rise and there, directly in front of him, was an entire division of Iraqi tanks with elite crews. Finding himself already in range of the enemy, he immediately gave the order to fire.
The enemy had parked themselves away from the slight rise so that they would be hidden and so incoming American tanks would be forced to drive down the hill towards them. This exposed the relatively weak top armor of the tank to the Iraqi guns.
But the Iraqis had lost most of their scout vehicles and so were just as surprised as the U.S. commanders when the two armored forces clashed, leaving them unable to capitalize on their position.
McMaster’s opening salvo set the tone for the battle. His first shot was a HEAT round that destroyed a tank cowering behind a berm. His second shot, a depleted uranium sabot shell, shot through an Iraqi tank that was swiveling to fire on him. As his crew targeted a third enemy, the driver realized they were driving through a minefield and began taking evasive action.
Enemy rounds began falling around the lead tank as the two tank platoons in Eagle Troop got on line to join the fight. Nine American tanks were now bearing down on the Iraqi positions, destroying enemy T-72s and armored vehicles. As McMaster described it in his first summary of the battle:
The few seconds of surprise was all we had needed. Enemy tanks and BMP’s (Soviet-made armored personnel carriers) erupted in innumerable fire balls. The Troop was cutting a five kilometer wide swath of destruction through the enemy’s defense.
The Bradley fighting vehicles joined the tanks, firing TOW missiles at the enemy armor and using their guns to cut down Iraqi infantry. Mortar and artillery support opened up, raining fire onto the remaining Iraqi positions.
The American forces cut down 30 tanks, 14 armored vehicles, and hundreds of infantrymen before reaching their limit of advance, the line they were originally told to halt at. But McMaster ordered the troop to continue attacking, fearful that the Iraqis would be able to regroup and wage a strong counterattack.
At 23 minutes since first contact, McMaster declared it safe to halt his troop’s advance. The single armored troop had crippled the Iraqi flank with zero casualties. One American tank from the 2nd Squadron headquarters had received light damage from a mine.
Near the Eagle Troop position, Ghost, Killer, and Iron troops were mixing it up other Iraqi units and trying to catch up to Eagle. The enemy made a few half-hearted attempts at counter-attacking the U.S. tanks, but they were quickly rebuffed.
That night, the U.S. called on the Iraqi’s to surrender and it was answered by droves of troops. About 250 survivors surrendered to Eagle Troop.
Up and down the U.S. lines, the story was similar to that of Eagle Troop. The Iraqis suffered nearly 1,000 casualties, 85 tanks destroyed, 40 armored vehicles destroyed, 30 wheeled-vehicles lost, and two artillery batteries annihilated. The U.S. suffered 12 men killed, 57 men wounded, and 32 vehicles destroyed or damaged.
In one fell swoop, a series of aerial strafing and bombing runs destroyed 83 oil tankers belonging to ISIS forces in Syria.
USA TODAY reports that after a pilot witnessed a gaggle of vehicles in the oil-rich, ISIS-held region of Deir ez-Zor province, US-led coalition forces sent a surveillance aircraft to provide intelligence on the area. After confirming the targets, A-10s and F-16s were scrambled to dispense more than 80 munitions against the vehicles.
After the dust settled, an estimated $11 million worth of oil and trucks were destroyed in the largest single airstrike against ISIS forces in Syria this year.
“You’re going to have multiple effects from this one strike,” said Air Force commander Lt. Gen. Jeffrey Harrigian.
The vehicles, which were reported to have been out in the open, may be indicative of the declining state of ISIS’ leadership and control. After a series of devastating airstrikes from both coalition and Russian forces, ISIS militants have grown accustomed to evade aerial threats by avoiding traveling in large convoys; however, this latest lapse in judgment could be a sign of worse things to come for the militants.
“This is a very good indication that they’re having trouble commanding and controlling their forces,” Harrigian explained to USA TODAY.
The bombing campaign, otherwise known as Tidal Wave II, was enacted to wipe out ISIS’ oil market that was generating more than $1 million a day during its peak.
At the beginning of this operation, coalition aircraft would drop leaflets on the oil tankers prior to their bombing runs to provide the option for drivers to escape. However, after new military rules were implemented, leaflets are no longer required to be dropped.
Instead, pilots are now firing warning shots to indicate their arrival.
At the Starbucks at the Langley headquarters of the Central Intelligence Agency it might be best to just remember your drink order because the baristas won’t remember your name.
“They could use the alias ‘Polly-O string cheese’ for all I care,” a food services supervisor at the CIA, told the Washington Post. “But giving any name at all was making people — you know, the undercover agents — feel very uncomfortable. It just didn’t work for this location.”
The agents don’t have to leave the building to get their daily fix, but they won’t get stars to add to their gold card requirements either. Tracking the agents preferences is strictly prohibited, as the Agency fears its data could be used to out secret agents. The receipts just say “Store Number 1.”
The baristas for what is now known as the “Stealthy Starbucks” go through a rigorous background investigation, but still can’t leave the Starbucks without a handler. They are frequently briefed about security risks. During the day, the vanilla latte is the winner. For agents working long hours and night shifts, double espressos and Frappuccinos are what the agents of the world’s most secret intelligence agency need to keep going.
“There’s caramel-macchiato guy” and “the iced white mocha woman,” one barista said. “But I have no idea what they do, I just know they need coffee. A lot of it.”
The cyber threat is now our greatest national security challenge, a 21st Century “weapon of mass destruction” that is currently having serious impacts on America and is getting worse – militarily and economically – across public and private sectors, and socially across all segments of society.
Our adversaries around the globe, from rivals like Russia and China to belligerents including ISIS, Iran, and North Korea, have developed significant cyber capabilities. This “global cyber proliferation” is serious and growing worse by the minute. In the late 1950s and early 1960s, the emerging Cold War’s battlefront included the Space Race with the Russians, and eventually a symbolic American on the moon. Today, we have a similar situation: A “Cyber Space Race” which will represent the dominant high ground for decades to come.
We are being hacked and attacked every day in America. Our personal accounts and lives, our critical infrastructures, and there are undoubtedly many serious incursions that we have not detected or have gone unreported. A few recent examples illustrate this point: State-backed Iranian hackers conducted a denial of service attack against US banks to attack United States infrastructure, and not just the banks themselves.
While America’s public and private sector cyber defenses have grown since the mid-1990s, the threat to all elements of national power has grown even more rapidly. America is at high risk. Of particular concern is our soft commercial-sector underbelly, which comprises 85% of Internet use in the United States. Cyber breaches present an unprecedented and often disastrous risk to the value of commercial entities.
Consider the Target, Home Depot, Sony, and Equifax cyber intrusions. Each cost the companies billions in market valuation, lost revenue, employee productivity, reputation, and expenses. While it is harder to quantify than a stock price, companies and institutions are successful in large part due to trust. An individual company violating that trust with their customers can have devastating effects for that company, but the magnitude of recent data breeches strikes fear in the hearts of all Americans and undermines trust in the fundamental institutions of our society.
Cadets, pay attention — our future could be in your hands. (U.S. AF photo by Raymond McCoy)
Just as techniques and technology developed in America’s space program resulted in innovations benefitting the full range of American life, so, too, can military-grade cyber capabilities be leveraged to harden vulnerable government and commercial entities. Techniques and technologies such as the commercial sector onboarding of military-grade technologies, implementing network segmentation to protect sensitive information, applying advanced encryption techniques to protect large databases, ensuring protection from insider threats, and using advanced analytics to uncover risks to commercial internal or external networks.
America must win the 21st Century “Cyber Space Race.” We must mobilize the entire spectrum of American enterprise, from the cyber education of our children to the highest levels of academia, business, and government. The US commercial sector must do everything possible to protect themselves, their customers, and this nation. This includes using military-grade cyber defense capabilities to ensure commercial viability, thus securing America’s increasingly vulnerable economic engine.