The military has very talented photographers in the ranks, and they constantly attempt to capture what life as a service member is like during training and at war. Here are the best military photos of the week:
A formation of F-15C Eagles, assigned to the 493rd Fighter Squadron, and an F-15E Strike Eagle, assigned to the 492nd Fighter Squadron, fly over Gloucestershire, England, to attend the Royal International Air Tattoo air show at Royal Air Force Fairford July 7, 2016. The RAF Lakenheath aircraft were on public display, along with many other military aircraft from around the U.K., to provide an opportunity for the U.S. military and its allies to showcase their capabilities.
Airmen complete the Grog Bowl ritual during a combat dining out at MacDill Air Force Base, Florida, July 9, 2016. The combat dining out is a modern informal twist on the ancient tradition of the military dining in.
Soldiers assigned to 1st Armored Division, Task Force Al Taqaddum, fire an M109A6 Paladin howitzer during a fire mission at Al Taqaddum Air Base, Iraq, June 27, 2016. The strikes were conducted in support of Operation Inherent Resolve and aimed at eliminating the Islamic State of Iraq and the Levant.
A soldier assigned to the Airborne and Ranger Training Brigade, crosses a river using a single line rope bridge at Camp Rudder, Eglin Air Force Base, Fla., July 7, 2016. The Florida Phase of Ranger School is the third and final phase that Ranger students must complete to earn the coveted Ranger Tab.
NAVAL STATION ROTA, Spain (July 10, 2016) President Barack Obama departs USS Ross (DDG 71) after a tour aboard the ship. During the president’s visit to Naval Station Rota, he met with base leadership, toured USS Ross (DDG 71) and spoke to service members and their families during an all hands call. Naval Station Rota enables and supports operations of U.S. and allied forces and provides quality services in support of the fleet, fighter, and family for Commander, Navy Installations Command in Navy Region Europe, Africa, Southwest Asia.
AMSTERDAM (June 21, 2016) Amphibious dock landing ship USS Carter Hall (LSD 50) makes its way through the locks of the North Sea Canal enroute to Amsterdam for its second port visit after the ship’s participation in exercise BALTOPS 2016. BALTOPS is an annually recurring multinational exercise designed to enhance flexibility and interoperability, and demonstrate the capability and resolve of allied and partner forces to defend the Baltic region.
Lance Cpl. Mackinnly Lewis, a landing support specialist with Combat Logistics Battalion 2, Special Purpose Marine Air-Ground Task Force-Crisis Response-Africa, guides an MV-22B Osprey during a helicopter support team exercise aboard Naval Station Rota, Spain, July 6, 2016. This training prepares Marines to deliver and recover supplies and equipment quickly and efficiently in potential future missions around Europe and Africa.
Marines with Headquarters and Service Company, 1st Battalion, 1st Marine Regiment, Marine Rotational Force Darwin, fix a humvee during Exercise Hamel at Cultana Training Area, South Australia, Australia, July 8, 2016. Exercise Hamel is a trilateral training exercise with Australian, New Zealand, and U.S. forces to enhance cooperation, trust, and friendship.
Twenty-six nations, 49 ships, six submarines, about 200 aircraft, and 25,000 personnel are participating in the Rim of the Pacific exercise, the world’s largest international maritime exercise, from June 29 to Aug. 4 in and around the Hawaiian Islands and Southern California.
The Maritime Security Response Team is a highly specialized team with advanced counterterrorism skills and tactics.
The United States was the “Arsenal of Democracy” in World War II, but even this arsenal had to get a little help from allies. The British, in fact, loaned us some of their planes during that conflict. Here are four planes we borrowed from the Brits.
1. Supermarine Spitfire
Yes, even though the United States had the P-40, P-38, P-47, P-51, F4F Wildcat, F6F Hellcat, and the F4U Corsair, they had to acquire the plane that won the Battle of Britain.
The American Spitfires mostly saw service in North Africa and Italy, according to SpitfireSite.com, until they were replaced by P-51s. United States Army Air Force Spitfires scored almost 350 kills during World War II.
The Spitfire is also notable for being the plane that got Jimmy Doolittle chewed out by Eisenhower.
2. Airspeed Horsa
Okay, this is technically a glider. Still, the United States needed a glider to bring in heavy gear for units like the 82nd and 101st Airborne Divisions. The Airspeed Horsa fit the bill with its ability to carry a lot of troops and gear, and the United States got 301 of the planes for D-Day, according to the book World War II Glider Assault Tactics.
3. Bristol Beaufighter
This was a multi-role heavy fighter, which packed a huge punch (four 20mm cannon, six .303-caliber machine guns). According to Combat Squadrons of the Air Force, the United States operated four squadrons of Beaufighters in the night-fighter role. These squadrons operated in the Mediterranean Theater of Operations, eventually switching to the P-61 Black Widow.
4. De Havilland Mosquito
This plane was very versatile, used for photo reconnaissance, as a night-fighter, as a heavy fighter, and even as a light bomber. The Army Air Force used a number of these planes in all of those roles during World War II, but historynet.com noted that most of them were crashed because this airborne hot rod was difficult to fly.
America may have missed out — the Mosquito is considered a legend.
Even today, America’s importing warplanes: The A-29 Super Tucano is a Brazilian design, while the AV-8 Harrier was British.
Great thinkers through history have written for centuries that there is nothing more wasteful of potential talent than war. Young men and women who might have gone on to do great things are mowed down senselessly in wartime, and what we may have gained is forever lost to speculation. Few embody this more than Henry Moseley, a physicist killed by a sniper at the age of 27 during World War I.
Born into a privileged family with both parents being highly educated scientists themselves, Moseley attended the standard progression of private schools, including Eton, as any English boy of social rank would be expected to. He demonstrated his brilliance from an early age, and eventually studied under the famed Sir Ernest Rutherford, considered by many scientists to be the father of modern nuclear physics.
At Oxford, Moseley personally built X-ray spectrometers to study atomic structures. During this process, he also invented the first atomic battery, which is used to this day to power pacemakers and other specialized devices that need compact, long-lasting power sources.
During his research, Moseley built on a number of theories proposed by other scientific giants like Dmitri Mendeleev, the creator of the periodic table of elements. The periodic table was riddled with inconsistencies, and it was Moseley who refined it using the number of protons to classify elements by atomic number rather than atomic mass, giving much more precise measurements. He even used this method to predict the existence of elements that had not been discovered yet. Moseley’s Law, concerning the X-rays emitted by atoms which could be used to quantify their structures, is one of the greatest breakthroughs in the history of physics.
Moseley was considering where to move forward with his burgeoning career when World War I broke out in 1914. To the considerable dismay of his family, friends and colleagues who tried their best to convince him to stay, he decided to enlist in the British Army. He considered it his duty to go. He joined the Royal Engineers as a telecommunications specialist, which put his considerable skill with technical equipment to good use.
Moseley eventually deployed to the disastrous Gallipoli campaign in Turkey, where he served as a communications officer. Intended to knock the Ottoman Empire out of the war, the campaign turned into a slaughterhouse for British and Commonwealth forces and is considered one of Winston Churchill’s greatest mistakes.
During the Battle of Suvla Bay, Moseley was transmitting orders over a radio telephone when a Turkish sniper shot him in the head on Aug. 10, 1915. The scientific community had lost one of its most promising members in a ditch at the Dardanelles. Moseley clearly felt that he was fulfilling an obligation to his country.
Following his death, the British government made it policy that distinguished scientists would not be allowed to sign on for combat duty. His loss was felt keenly by many of his colleagues. Nobel Prize-winning physicist Robert Millikan said in 1923:
“In a research which is destined to rank as one of the dozen most brilliant in conception, skillful in execution, and illuminating in results in the history of science, a young man but twenty-six years old threw open the windows through which we can now glimpse the subatomic world with a definiteness and certainty never even dreamed of before. Had the European war had no other result than the snuffing out of this young life, that alone would make it one of the most hideous and most irreparable crimes in history.”
Henry Moseley is buried in a military cemetery in Turkey near where he died. He has a fellowship in his honor at the University of Oxford.
What he may have accomplished if the war had not come along, we will never know. But he died doing what he thought needed to be done. He is remembered as a man who expanded our understanding of the universe while showing great courage.
Along with the USO, the company delivered 32,000 three-pack servings of its ready-brew coffee to Bagram Airfield, where it could then be further distributed to the approximately 9,800 service members stationed throughout the country.
“Getting a cup of coffee is something your average American takes for granted. But for our troops a cup of coffee is a special taste of home,” Alan Reyes, USO Senior Vice President of Operations, said in a statement. “Imagine a soldier coming off an arduous patrol or hostile fire, and then seeing that Starbucks logo – it takes their minds out of the war zone, even for a few minutes.”
The coffee giant is providing much more than just free coffee for U.S. troops. In March 2014, the company donated $30 million for research into post-traumatic stress and traumatic brain injury, and promised to hire 10,000 veterans or their spouses over the next five years.
“This is not charity, this is not pity. This is the right thing to do for them and for us,” Howard Schultz, CEO of Starbucks, told NPR’s Marketplace.
Schultz recently wrote a book with Washington Post reporter Rajiv Chandrasekaran that highlights the courage and sacrifices of Post 9/11 troops entitled “For Love of Country: What Our Veterans Can Teach Us About Citizenship, Heroism, and Sacrifice.”
As the US still attempts to formulate a response to China’s massive hack of the US government’s Office of Personnel Management — a breach that affected some 22 million people, including federal employees with security clearances — the massive size and scope of Beijing’s intelligence gathering operations continues to come into focus.
Unlike other nations, China uses a broad array of both professional and citizen spies to gather data, Peter Mattis explains for War On The Rocks.
As Mattis describes it, the first level of Chinese intelligence-gathering resembles that of just about any other government. A Ministry of State Security carries out surveillance of targets within China and monitors potential threats, while the Ministry of Public Security has control over China’s national databases and surveillance networks.
China also has various levels of military intelligence organizations within the People’s Liberation Army. Most of the operatives for these organizations are also based in China, although Mattis notes that “defense attachés and clandestine collectors do operate abroad.”
This also isn’t all that different from how countries normally operate. The US has some 17 intelligence agencies, several of which are organized under branches of the military. They weren’t under the oversight of a single Director of National Intelligence until 2005.
Where China begins to differ from other nations is its use of operatives who aren’t intelligence professionals and who may technically be outside Beijing’s already sprawling security sector. According to Mattis, Chinese media agencies and their foreign-based journalists have likely collected non-classified data on such sensitive topics as foreign governments’ stances towards Tibet or the South China Sea. These journalists then file reports directly to the Central Committee in Beijing.
“Although most Chinese journalists are not intelligence officers and do not recruit clandestine sources, good journalists can provide information that is not publicly available, but also not classified,” Mattis writes.
Mattis also describes “market incentives for economic espionage:” The process by which Beijing facilitates the theft of intellectual property from other countries by providing state support for their cover activities.
In July of 2014, Canadian authorities arrested a Chinese entrepreneur at the request of the FBI. The entrepreneur, Su Bin, and two China-based accomplices hacked into the networks of Boeing and other US defense contractors from 2009 to 2013.
Bin allegedly stole data for 32 different US projects, including data related the F-22 and the F-35 fighter jets, as well as Boeing’s C-17 cargo plane. US authorities believe Bin and his colleagues tried to sell the stolen intelligence to state-owned companies within China.
China’s People’s Liberation Army also carries out cyber attacks and cyber espionage against US companies in order to help boost the Chinese economy. In particular, Chinese hackers have been proven to have stolen US trade secrets related to nuclear power, metal, solar production, and the defense industries.
In addition to using civilians to gather non-classified but sensitive material, Beijing has also facilitated a process for Chinese academics to gather potentially sensitive technological information, and built up institutions capable of rapidly building upon technological espionage gains.
For instance, the Institute of Scientific and Technical Information of China (ISTIC) catalogues foreign scientific publications, facilitates graduate programs for research around the world, and supports the professional development of academics throughout the country. This centralization of technological information has played an important role in China’s rapid modernization, and sources tell Mattis that ISTIC likely reduced the cost of scientific research by 40-50%, while cutting research time by upwards of 70%.
The Army in April will begin sending hand-picked female soldiers through its physically demanding Ranger school, where some may earn the Ranger tab as part of an overall military assessment of the fitness of women for the combat arms.
About 60 female soldiers will take part alongside male soldiers in the program that begins April 20 – Ranger Course 06-15, Army spokesman Lt. Col. Benjamin Garrett said in a statement.
“Those who meet the standards and graduate from the course will receive a certificate and be awarded the Ranger tab,” he said.
About half the volunteers – 20 noncommissioned officers and 11 officers – will serve as observers and advisors. Females who successfully complete the course will not be awarded associated Ranger skill identifiers because the law does not currently allow it. The additional skill identifier is added to a soldier’s military occupational specialty.
“The decision to change that or not … will be made by the Secretary of Defense no later than Jan. 1, 2016 when he determines if women will be permitted to become infantry soldiers and serve in other closed military occupational specialties,” the Army said in September.
The historic trial pilot program and assessment comes amid increasing demand in recent years to open up to women all military specialties, including infantry. Army leadership is open to the idea, but insists there will be no lowering of standards.
“We’re just going to let the statistics speak for themselves as we go through this,” Army Chief of Staff Gen. Ray Odierno said during a virtual town hall meeting with soldiers earlier this month. “The main thing I’m focused on is the standards remain the same. In order to earn that tab, you have to do all the things necessary to earn that tab. We want to try a pilot to let women have the opportunity to do that.”
The training is physically grueling, with soldiers required to pass a fitness test that includes 49 push-ups within 2 minutes, 59 sit-ups, a 5 mile run within 40 minutes and six chin-ups. Additionally, would-be Rangers must be able to remove their gear in water and then swim 15 meters in their uniform and boots.
Army statistics show that only about 45 percent of those attending Ranger school graduate, and about 60 percent of those who wash out do so in the first four days.
How female students will fare remains to be seen, but past studies have indicated they are likely more often to sustain injuries associated with combat training and combat than their male counterparts.
The problem is simply body size and mechanics, according to Department of Veterans Affairs’ doctors who have dealt with and studied injuries, including the kind most often sustained by troops in Iraq and Afghanistan – musculoskeletal.
These are incurred simply by carrying heavy loads during long patrols over rugged country, while getting down from a vehicle or simply falling.
“I don’t think there is a way now to say exactly what the experience will be, but I expect as more and more women go into these physically demanding roles, we may see an increase in [these] injuries,” Dr. Sally Haskell, deputy chief consultant for women’s health services and director of comprehensive women’s health at the Veterans Affairs Department told Military.com a year ago.
The VA’s national director of physical medicine and rehabilitation said in April 2013 that he “was certain the majority of women doing this [combat arms specialty] won’t be physically able to do it as long as the men. It’s a matter of body size and body mechanics.”
One study found that between 2004 and 2007 about a third of medical evacuations from the Iraq and Afghan theaters were due to musculoskeletal, connective tissue and spinal injuries, Dr. David Cifu told Military.com.
Troops may carry 80 pounds or more of gear in theater. Cifu said women carrying the same loads as men will be more at risk of these kinds of injuries.
The pilot Ranger School program has been made open to enlisted women from grades E-4 up to Warrant Officer 02. Additionally, the Army drew on female volunteers in grades E-6 to E-8, Warrant Officer 2 and 3, and first lieutenant through major to serve as observers and advisors.
All the volunteers will be required to take the Army National Guard Ranger Training and Assessment Course at Fort Benning, Georgia, before the assessment course, the Army said when it announced the program in September.
The course observers will be required to pass a fitness test, land navigation, a combat water survival assessment, an operations order test, 12-mile road march with 35-pound rucksack, and review boards. As observers they must be able to keep up to the Ranger School students and instructors, the announcement said.
As the U.S. starts to forward-deploy more of its F-35 Lightning, China and Russia have been putting the finishing touches on their own batches of fifth-generation aircraft — and they all express vastly different ideas about what the future of air combat will look like.
For the U.S., stealth and sophisticated networks define its vision for the future of air combat with the F-22 and F-35.
For China, the plan is to use range to take out high-value targets with the J-20.
For Russia, the PAK-FA shows that it seems to think dogfighting isn’t dead.
Here’s how the F-35 stacks up to the competition.
The F-35 Lightning II
An F-35B begins its short takeoff from the USS America with an external weapons load. (Photo courtesy of Lockheed Martin)
The U.S.’s F-35 isn’t an airplane — it’s three airplanes.
And it isn’t a fighter — it’s “flying sensor-shooters that have the ability to act as information nodes in a combat cloud universe made up of platforms, not just airborne, but also operating at sea and on land that can be networked together,” retired U.S. Air Force Lt. Gen. David Deptula told Defense Aerospace Report in November.
In a discussion with four F-35 pilots that was also produced by Defense Aerospace Report, a clear consensus emerged: The difference between an F-35 and an F-15 is like the difference between an iPhone and a corded wall phone. Phones of the past might have had crystal-clear call quality and the ability to conference call, but the iPhone brought with it unprecedented networking and computing capability that has changed life as we know it.
That said, the F-35 doesn’t offer any significant upgrades in range, weapons payload, or dogfighting ability over legacy aircraft, while its competition does.
The Chengdu J-20
China’s Chengdu J-20 has one thing in common with the F-35 — it’s not a fighter.
Malcolm Davis, a senior analyst at the Australian Strategic Policy Institute, told Business Insider that the J-20 is “not a fighter, but an interceptor and a strike aircraft” that doesn’t seek to contend with U.S. jets in air-to-air battles.
Instead, “the Chinese are recognizing they can attack critical airborne support systems like AWACS” — airborne early-warning and control systems — “and refueling planes so they can’t do their job,” Davis said. “If you can force the tankers back, then the F-35s and other platforms aren’t sufficient because they can’t reach their target.”
On the J-20’s stealth, a senior U.S. low-observable-aircraft design engineer working in the industry told Business Insider that “the J-20 has many features copied from U.S. fifth-gen aircraft; however, it’s apparent from looking at many pictures of the aircraft that the designers don’t fully understand all the concepts of LO” — low-observable, or stealth — “design.”
The real danger of China’s J-20 lies not with its ability to fight against U.S. fighters, but with its laserlike focus on destroying the slower, unarmed planes that support U.S. fighters with its long range and long-range missiles, thereby keeping them out of fighting range.
Shenyang J-31 (F60) at the 2014 Zhuhai Air Show. (Photo courtesy of Wikimedia Commons)
China’s J-31 looks a lot like the F-35, and one Chinese national has pleaded guilty to stealing confidential information about the F-35 program.
That said, the J-31 suffers from China’s inferior composite-materials technology and its inability to build planes in the precise way a stealth airplane needs to be built. Additionally, there’s reason to suspect the avionics in the Chinese programs significantly lag the F-35.
But the J-31, like the J-20, still poses a significant threat because China has developed long-range missiles, which combined with their ground-based radars and radar sites in the South China Sea could potentially pick off U.S. stealth aircraft before the F-35s and F-22s could fire back.
Davis told Business Insider that the J-31 doesn’t just seek to compete with the U.S. militarily, but that the J-31 “very clearly is an F-35 competitor in a commercial sense.” Nations that weren’t invited to participate in the F-35 program may seek to buy China’s cheaper and somewhat comparable J-31.
A fleet of J-31s in the hands of Iran, for example, could pose a serious threat to U.S. interests abroad.
The PAK-FA/T-50. (Photo courtesy of Wikipedia Commons)
Russia’s PAK-FA, also known as the T-50, has been criticized as being fifth-generation “in name only,” but as Russia proves time and time again, it doesn’t need the best and most expensive technology to pose a real threat to U.S. aircraft.
The PAK-FA’s greatest failure is in the stealth arena. While the PAK-FA has some stealth from the front angle, “it’s a dirty aircraft,” said a person who helps build stealth aircraft, speaking on condition of anonymity because of the classified nature of the work.
But stealth represents just one aspect of air combat, and the Russians have considerable counterstealth technologies. So while the PAK-FA fails to deliver the stealth or total networking capacity of the F-35, it is a fighter — and a damn good one.
The U.S.’s F-22 has 2D thrust-vectoring nozzles at the engines and is the most agile plane the U.S. has ever built. The PAK-FA has 3D thrust-vectoring nozzles and is even more agile.
Additionally, the PAK-FA can be armed to the teeth with infrared missiles that focus on heat and ignore the U.S.’s stealth. So while the U.S.’s fifth generation hinges on controlling the battle from range and at the jump-off point, Russia’s PAK-FA seems to focus on close-up fights, which the designers of the F-35 didn’t concentrate on.
The first F-35 to arrive at the 33rd Fighter Wing was on display during the aircraft’s official rollout ceremony on August 26 at Eglin Air Force Base. (The first F-35 to arrive at the 33rd Fighter Wing was on display during the aircraft’s official rollout ceremony on August 26 at Eglin Air Force Base. (U.S. Air Force photo by Samuel King Jr.)
China and Russia have both shown the world something new in their fifth-generation aircraft. No longer will these rising powers look to advance the capabilities they currently have — they will actively seek to enter new areas of aerial combat.
Both Russian and Chinese entries seem to focus on key weak points in the U.S.’s force structure by using specialized aircraft.
But the U.S. doesn’t specialize. The F-35 does everything well and seeks the informational high ground with massive computing power, all-aspect stealth, and the ability to network with almost every set of eyes and ears in the U.S. military.
The F-35 has limited range and ability for close combat, but unlike the Chinese and Russian fifth-gens that try to score kills on their own, the F-35 plays like a quarterback, sending targeting information to any platform available.
As the F-35 software develops, pilots will be free to take on more demanding missions, but China’s and Russia’s fifth-gens will still be confined to relatively narrow ones.
You might think a third-party candidate who in some surveys is ahead of the Democrat and Republican presidential frontrunners would be included in a conversation about veterans.
You’d think that, but you’d be wrong.
Libertarian Presidential candidate Gary Johnson won’t be sharing the stage with Donald Trump and Hillary Clinton Sept. 7 during a nationally-televised town hall meeting. The veteran service organization Iraq and Afghanistan Veterans of America is hosting the so-called “Commander in Chief Forum” on NBC and MSNBC that will focus on issues affecting the military-veteran community.
A non-scientific survey conducted in July by the influential blogger Doctrine Man showed Johnson polling at 39 percent among active duty troops, five points ahead of Trump in the same survey. Clinton garnered just 14 percent of those surveyed.
Broken down by service, only the Navy had Johnson in second place by a slim margin.
A more recent poll conducted by NBC on the eve of the Commander-in-Chief Forum showed Trump polling at 55 percent among active-duty military and veterans, 19 points ahead of Hillary Clinton. Libertarian Gary Johnson pulls in only 12 percent nationally among all likely voters.
The head of IAVA, Paul Rieckhoff said in a statement he had invited Johnson and Green Party candidate Jill Stein for a separate Commander-in-Chief Forum to discuss military and veterans issues. It is unclear if either will participate.
Neither candidate is polling high enough nationally to qualify for the upcoming presidential debates.
Johnson has made helping vets a cornerstone of his campaign, even banging out 22 Pushups for veteran suicide awareness on the streets of Cleveland (an admittedly small feat for Johnson, an Iron Man Triathlete who also climbed Mount Everest).
“…in my lifetime I can’t think of one example of regime change making things better. And of course that’s (affecting) our military, our men and women on the front line. I get incensed over politicians that beat their chest over going out to fight terrorism at the cost of our service men and women.”
Johnson repeated that the Libertarian platform is “non-interventionist, not isolationist.”
He believes in a U.S. military response to an attack, repeating the mantra “We get attacked, we attack back,” time and again. He says he supported the invasion but does not support the extended stay — wondering if the U.S. will “stay there forever.”
“I do believe we are going to defeat ISIS, but let’s not be naive. We are going to create a void that’s going to get filled with the name of some other organization.”
4. North Korea
Johnson, in a Libertarian debate, called North Korea “the greatest threat in the world.” He says he wants to team with China to get rid of the Kim family dynasty.
According to Brian Doherty of the Hit and Run Blog, to Johnson, the move has the dual purpose of bringing down the regime and bringing 40,000 American troops off the Korean Peninsula.
5. Leadership style
“It’s not my way or the highway,” he told Military Times. “If I am presented with evidence that would say categorically, ‘this is not something we should do’ … I’ll listen. I do listen.”
Johnson also believes that combating radical Islam, like all uses of the military, is something that the chief executive should do with the collaboration of Congress.
6. Libertarian-style budget cuts
Johnson believes in a 20 percent cut in government spending. The Department of Veterans Affairs would be exempt from those cuts.
“We need to draw a line with regards to the obligation we have to those who are serving and have served,” Johnson said in Military Times. “That’s not a cut ever.”
Johnson was a part of the Base Closure and Realignment Commission in the 1990s. He recalls a Pentagon recommendation to close 25 percent more than the BRAC actually did. He would implement those recommendations. He still favors a strong national defense, but wants American allies pay for a greater share of the cost.
“I intend to honor all treaties and obligations that are in effect,” he said in the interview. “But with regard to Europe, they’ve had this free go of being able to grow their welfare programs on the back of us coming in and covering their back with our military.”
7. Nuclear weapons
The elimination of nuclear weapons is part of his plan to cut 2 percent of defense spending.
“I don’t think that anyone can argue that government is 20 percent fat in every category,” he said. “But I don’t think the military is exempt from that either.”
8. The Department of Veteran’s Affairs
“… they are taxed and they often times are not able to keep up with the demand,” the candidate said. “If that is the case, it would not be difficult to implement a health card or a health services [plan] that would go outside the VA that would make up for deficiencies.”
The Johnson campaign advocates a public-private partnership for the VA’s shortcoming, not a privatization of the department’s facilities. This means that Johnson wants to make it possible for veterans with a long wait time to see a private doctor, similar to the Veteran’s Choice program launched in 2014.
In an interview with MSNBC in May, Johnson and his running mate Bill Weld described their view of the VA in terms of the returning veterans of WWII. Where the GI Bill was a “voucher system,” using government money to pay for existing schools, the VA medical benefits were designed “the other way,” using government money, facilities, and oversight.
10. The Defense and VA secretaries in a Johnson administration
“I’ve made a career out of showing up on time and telling the truth, because if you tell the truth you admit the mistakes you’ve made,” he said. “More than anything, I’m looking for people who are qualified and have that kind of a resume similar to my own, which is being accountable.”
In December 2015, Defense Secretary Ashton B. Carter announced that the Pentagon would open all combat jobs to women. Why was this such a massive deal? Because it shattered the U.S. military’s final “brass ceiling.” Even though women have been fighting in Iraq and Afghanistan for the past 15 years, thousands of jobs remained off-limits until this year. We’re pretty sure that the badass women on this list would approve of the decision. Why’s that? Because they had to cross-dress in order to fight on the frontlines.
1. Hannah Snell
On June 2, 1750, a Marine named James Gray made the following announcement in a London pub:
“Why gentlemen, James Gray will cast off his skin like a snake and become a new creature. In a world, gentlmen, I am as much a woman as my mother ever was, and my real name is Hannah Snell.”
As you can probably imagine, the gentlemen were gobsmacked by the news that their good friend James was actually a chick named Hannah Snell. Never heard of her? You’re in for a treat. Born in 1723, Hannah was an Englishwoman who disguised herself as a man so she could fight for King and Country. How’d she alight on such an unconventional career path? Her husband ran out on her after their infant daughter died. Snell heard a rumor that he was in the military, so she borrowed her brother-in-law’s identity so she could give him a well-deserved ass whooping. She later discovered that her hubbie had been executed for murder. But that didn’t stop her from pursuing an adventurous military career disguised as James Gray. Snell eventually sold her story to the London publisher Robert Walker, who published her account, The Female Soldier, to great acclaim. It’s a page-turner.
2. The Chevalier d’Éon
The Chevalier d’Éon | Wikimedia Commons
The Chevalier d’Éon was a famous French spy with androgynous physical characteristics and a razor-sharp mind. Born in 1728, D’Éon played a key role in negotiating the Peace of Paris in 1763, whichformally ended the Seven Years’ War between France and Britain. In addition to being a skilled diplomat, D’Éon was, by most accounts, one of the more fascinating figures of the 18th-century. Hesuccessfully infiltrated Empress Elizabeth of Russia‘s court by posing as a woman, but publicly identified as a man for the first 49 years of his life. In 1777, he began dressing as a woman—claiming to have been female at birth. When Louis XVI told the decorated spy to pick a gender and stick to it,D’Éon defected to England. London society welcomed D’Eon with open arms and she dressed as a woman for the next 33 years. A post-mortem autopsy reportedly concluded that D’Éon was anatomically male. Was the Chevalier transgender? It’s hard to say. Here’s what we do know: theChevalier d’Éon was a grade-A badass.
3. Loretta Janeta Velazquez:
Loreta Janeta Velázquez as herself (right) and disguised as “Lieutenant Harry Buford” (left)
Did you know that as many as 400 women cross-dressed so they could fight on the frontlines during the Civil War? All of these women were hardcore badasses, but Loretta Janeta Velazquez took it to a whole ‘nother level. Born in 1824 to a rich Cuban family, she got super annoyed when her husband joined up with the Confederates in 1861. Why? Because she wanted to go with him. She found a novel way of getting around the problem:
“Not content with life alone, Velazquez decided to use her wealth to finance and equip an infantry battalion, which she would bring to her husband to command. She cut her hair, tanned her skin, and went by the name Lt. Harry T. Buford. She went on to fight in various battles, including Bull Run and Shiloh, but her gender was twice discovered and she was discharged.”
What’d she do once her cover was blown? She became a cross-dressing spy. Some people are just more interesting than the rest of us.
Air Force pilots of the 1980s-era stealthy B-2 Spirit bomber plan to upgrade and fly the aircraft on attack missions against enemy air defenses well into the 2050s, service officials said.
“It is a dream to fly. It is so smooth,” Maj. Kent Mickelson, director of operations for 394th combat training squadron, told Scout Warrior in an interview.
In a special interview designed to offer a rare look into the technologies and elements of the B-2, Mickelson explained that the platform has held up and remained very effective – given that it was designed and built during the 80s.
Alongside his current role, Mickelson is also a B-2 pilot with experience flying missions and planning stealth bomber attacks, such as the bombing missions over Libya in 2011.
“It is a testament to the engineering team that here we are in 2016 and the B-2 is still able to do its job just as well today as it did in the 80s. While we look forward to modernization, nobody should come away with the thought that the B-2 isn’t ready to deal with the threats that are out there today,” he said. “It is really an awesome bombing platform and it is just a marvel of technology.”
The B-2 is engineered with avionics, radar and communications technologies designed to identify and destroy enemy targets from high altitudes above hostile territory.
“It is a digital airplane. We are presented with what is commonly referred to as glass cockpit,” Mickelson said.
The glass cockpit includes various digital displays, including one showing Synthetic Aperture Radar (SAR) information which paints a rendering or picture of the ground below.
“SAR provides the pilots with a realistic display of the ground that they are able to use for targeting,” Mickelson said.
The B-2 has a two-man crew with only two ejection seats. Also, the crew is trained to deal with the rigors of a 40-hour mission.
“The B-2 represents a huge leap in technology from our legacy platforms such as the B-52 and the B-1 bomber. This involved taking the best of what is available and giving it to the aircrew,” Mickelson said.
The Air Force currently operates 20 B-2 bombers, with the majority of them based at Whiteman AFB in Missouri. The B-2 can reach altitudes of 50,000 feet and carry 40,000 pounds of payload, including both conventional and nuclear weapons.
The aircraft, which entered service in the 1980s, has flown missions over Iraq, Libya and Afghanistan. In fact, given its ability to fly as many as 6,000 nautical miles without need to refuel, the B-2 flew from Missouri all the way to an island off the coast of India called Diego Garcia – before launching bombing missions over Afghanistan.
“Taking off from Whiteman and landing at Diego Garcia was one of the longest combat sorties the B-2 has ever taken. The bomber was very successful in Afghanistan and very successful in the early parts of the wars in Iraq and Libya,” Michelson added.
The B-2 crew uses what’s called a “long-duration kit,” which includes items such as a cot for sleeping and other essentials deemed necessary for a long flight, Mickelson explained.
As a stealth bomber engineered during the height of the Cold War, the B-2 was designed to elude Soviet air defenses and strike enemy targets – without an enemy ever knowing the aircraft was even there. This stealthy technological ability is referred to by industry experts as being able to evade air defenses using both high-frequency “engagement” radar, which can target planes, and lower frequency “surveillance” radar which can let enemies know an aircraft is in the vicinity.
The B-2 bomber is described as a platform which can operate undetected over enemy territory and, in effect, “knock down the door” by destroying enemy radar and air defenses so that other aircraft can fly through a radar “corridor” and attack.
However, enemy air defenses are increasingly becoming technologically advanced and more sophisticated; some emerging systems are even able to detect some stealth aircraft using systems which are better networked, using faster computer processors and able to better detect aircraft at longer distances on a greater number of frequencies. The Russian-built S-300 and S-400 air defenses, for example, are among the most advanced in the world today.
The Air Force plans to operate the B-2 alongside its new, now-in-development bomber called the Long Range Strike – Bomber, or LRS-B. well into the 2050s.
B-2 modernization upgrades – taking the stealth bomber into the 2050s
As a result, the B-2 fleet is undergoing a series of modernization upgrades in order to ensure the aircraft can remain at its ultimate effective capability for the next several decades, Mickelson said.
One of the key upgrades is called the Defensive Management System, a technology which helps inform the B-2 crew about the location of enemy air defenses. Therefore, if there are emerging air defenses equipped with the technology sufficient to detect the B-2, the aircraft will have occasion to maneuver in such a way as to stay outside of their range.
The Defensive Management System is slated to be operational by the mid-2020s, Mickelson added.
“The whole key is to give us better situational awareness so we are able to make sound decisions in the cockpit about where we need to put the aircraft,” he added.
The B-2 is also moving to an extremely high frequency satellite in order to better facilitate communications with command and control. For instance, the communications upgrade could make it possible for the aircraft crew to receive bombing instructions from the President in the unlikely event of a nuclear detonation.
“This program will help with nuclear and conventional communications. It will provide a very big increase in the bandwidth available for the B-2, which means an increased speed of data flow. We are excited about this upgrade,” Mickelson explained.
The stealth aircraft uses a commonly deployed data link called LINK-16 and both UHF and VHF data links, as well. Michelson explained that the B-2 is capable of communicating with ground control stations, command and control headquarters and is also able to receive information from other manned and unmanned assets such as drones.
Information from nearby drones, however, would at the moment most likely need to first transmit through a ground control station. That being said, emerging technology may soon allow platforms like the B-2 to receive real-time video feeds from nearby drones in the air.
The B-2 is also being engineered with a new flight management control processor designed to expand and modernize the on-board computers and enable the addition of new software.
This involves the re-hosting of the flight management control processors, the brains of the airplane, onto much more capable integrated processing units. This results in the laying-in of some new fiber optic cable as opposed to the mix bus cable being used right now – because the B-2’s computers from the 80s are getting maxed out and overloaded with data, Air Force officials told Scout Warrior.
The new processor increases the performance of the avionics and on-board computer systems by about 1,000-times, he added. The overall flight management control processor effort, slated to field by 2015 and 2016, is expected to cost $542 million.
B-2 weapons upgrades
The comprehensive B-2 upgrades also include efforts to outfit the attack aircraft with next generation digital nuclear weapons such as the B-61 Mod 12 with a tail kit and Long Range Stand-Off weapon or, LRSO, an air-launched, guided nuclear cruise missile, service officials said.
The B-61 Mod 12 is an ongoing modernization program which seeks to integrate the B-61 Mods 3, 4, 7 and 10 into a single variant with a guided tail kit. The B-61 Mod 12 is being engineered to rely on an inertial measurement unit for navigation.
In addition to the LRSO, B83 and B-61 Mod 12, the B-2 will also carry the B-61 Mod 11, a nuclear weapon designed with penetration capabilities, Air Force officials said.
The LRSO will replace the Air Launched Cruise Missile, or ALCM, which right now is only carried by the B-52 bomber, officials said.
Alongside its nuclear arsenal, the B-2 will carry a wide range of conventional weapons to include precision-guided 2,000-pound Joint Direct Attack Munitions, or JDAMs, 5,000-pound JDAMs, Joint Standoff Weapons, Joint Air-to-Surface Standoff Missiles and GBU 28 5,000-pound bunker buster weapons, among others.
The platform is also preparing to integrate a long-range conventional air-to-ground standoff weapon called the JASSM-ER, for Joint Air-to-Surface Standoff Missile, Extended Range.
The B-2 can also carry a 30,000-pound conventional bomb known as the Massive Ordnance Penetrator, Mickelson added.
“This is a GBU-28 (bunker-buster weapon) on steroids. It will go in and take out deeply buried targets,” he said.
Relatively little is known about Abu Bakr al-Baghdadi, the leader of the jihadist group Islamic State (also known as ISIS and ISIL). However, newly declassified military documents obtained by Business Insider on Wednesday reveal several new details about the ISIS leader.
The records come from time Baghdadi spent in US Army custody in Iraq. They were released through a Freedom of Information Act request. In these files, Baghdadi was identified by his birth name, Ibrahim Awad Ibrahim Al Badry.
There have been conflicting reports about the time Baghdadi spent as a US detainee. These files identify his “capture date” as Feb. 4, 2004 and the date of his “release in place” as Dec. 8, 2004. According to the records, Baghdadi was captured in Fallujah and held at multiple prison facilities including Camp Bucca and Camp Adder.
In the book “ISIS: Inside The Army of Terror,” Michael Weiss and Hassan Hassan relay an account of Baghdadi’s capture from ISIS expert Dr. Hisham al-Hashimi. In the interview, al-Hashimi said Baghdadi was captured by US military intelligence while visiting a friend in Fallujah named Nessayif Numan Nessayif.
“Baghdadi was not the target — it was Nessayif,” said al-Hashimi, who consults with the Iraqi government and claims to have met the ISIS leader in the 1990s.
Baghdadi’s detainee I.D. card lists him as a “civilian detainee,” which means he was not a member of a foreign armed force or militia, but was still held for security reasons. His “civilian occupation” was identified as “ADMINISTRATIVE WORK (SECRETARY).” As of 2014, he was listed as being 43 years old though his birth date was redacted. Baghdadi’s birthplace was identified as Fallujah.
These records also provide some details about Baghdadi’s family. His file identifies him as married and his next of kin was an uncle. The names of his family members were redacted from the records.
View the Baghdadi files below. According to Army Corrections Command, some of the records requested by Business Insider remain classified. We are working to obtain all possible files from Baghdadi’s detention.