Here’s when you know you’re probably an infantryman in the Army or Marine Corps, better known as a grunt.
#1: Whether it’s on the ground, in a bed, or in a helicopter, you can pass out ANYWHERE.
#2: You survive on this stuff, because it’s an amazing grunt power source.
#3: You have eaten way more of these than you’d care to remember.
#4: You wear camouflage uniforms so much, you wonder why they even issued you those dress uniforms that just sit in a wall locker.
#5: The aging of your body accelerates beyond what you imagined was possible.
#6: This is “the field,” and it’s your office.
#7: The guys in your fire team/squad/platoon know more about you than your own family. They are also willing to do anything for you.
#8: You have probably heard some crusty old enlisted guy say “all this and a paycheck too!”
#9: Your day often starts with a “death run” or a “fun run.” It is never actually fun.
#10: You watch “moto” videos of grunts in combat and get pumped up.
#11: A port-a-john in Iraq or Afghanistan (or anywhere really) has three purposes, not just “going #1 or #2.”
#12: If you are pumped up to deploy, you remember Iraq or Afghanistan is usually way more boring than people think, and the last time you went, your entire platoon watched “The O.C.” or some other show during free time.
Historically, the military has relied on clearly defined boundaries of acceptable interaction between the officer and enlisted ranks to maintain good order and discipline.
It is a long-standing custom that dates back hundreds of years and has proven itself effective time after time. But not everyone feels it’s a custom worth holding on to.
“I think there should not be a difference between officer and enlisted ranks,” said former Air Force officer Shannon Corbeil. “I believe we should all reach rank based on experience and accomplishment.”
On the other hand, Chase Millsap — another former officer — believes the military should maintain its course because officers bring leadership experience accomplished through higher learning and training.
The upcoming OA-X fly-off features the Textron Scorpion as one of the major contenders. This plane has been the subject of some hype since it first flew in 2013. However, if it wins the OA-X flyoff, it won’t be the first Scorpion to have flown for the United States.
In the 1950s and 1960s, the United States was looking to acquire interceptors to stop a horde of Soviet bombers. The big problem — the guns were just not packing enough punch. One answer to this was the F-89 Scorpion from Northrop.
The first definitive version of the Scorpion to achieve widespread service, the F-89D, addressed that problem by using air-to-air “Mighty Mouse” rockets. The Scorpions carried 104 of them, and had the option of firing all of them at once, or in up to three salvos. The F-89 Scorpion also had a lethal ground-attack capability, being able to carry 16 five-inch rockets and up to 3,200 pounds of bombs.
But the “Mighty Mouse” rockets proved to be more mouse than mighty, and the Scorpion’s armament was soon the subject of an upgrade. The F-89J was a F-89D modified to carry the AIR-2 Genie rocket — which carried a small nuclear warhead. The plane could also carry four AIM-4 Falcon missiles. The Genie had a warhead equivalent to 250 tons of TNT, and it had a range of six miles and a top speed of Mach 3. Early versions of the AIM-4 had a range of six miles, but later versions could go 7 miles. Most Falcons were heat-seekers, but some were radar-guided missiles.
The F-89 was eventually retired in favor of faster interceptors with more modern radars and missiles, but for most of two decades, it helped guard America’s airspace from Soviet aggression. Below is a video put out by the Air Force’s Air Defense Command about this plane.
A U.S. Air Force B-2 Spirit stealth bomber made an emergency landing on Oct. 23, 2018, at the Colorado Springs Airport following an unspecified inflight incident.
A number of local photographers have posted photos of the aircraft sitting on the tarmac at the joint use civilian/military airport located about 12 miles from downtown Colorado Springs.
An Air Force statement from Brig. Gen. John J. Nichols, 509th Bomb Wing commander, read, “Our aviators are extremely skilled; they’re trained to handle a wide variety of in-flight emergencies in one of the world’s most advanced aircraft and they perfectly demonstrated that today.”
Numerous media outlets and local news reports have said the two crew memberson board the aircraft were not injured in the incident.
The incident is unusual since there are only 18 known B-2s currently in operation with one additional aircraft allocated for dedicated testing purposes (and one crashed 10 years ago). The 18 operational aircraft are flown by the historic U.S. Air Force 509th Bomb Wing at Whiteman AFB, Missouri.
The unit is descended from the 509th Composite Group, the only aviation unit in the world to operationally employ nuclear weapons in combat using B-29 Superfortresses during the 1945 airstrikes on Hiroshima and Nagasaki.
A U.S. Air Force B-2 Spirit deployed from Whiteman Air Force Base, Mo., flies overhead after returning from a local training mission at Andersen Air Force Base, Guam, Jan. 12, 2017.
(U.S. Air Force photo by Airman 1st Class Jazmin Smith)
The 509th Bomb Wing and its Northrop Grumman B-2 Spirit are critical U.S. strategic strike assets. The loss of one aircraft, even if temporary, reduces the global precision low-observable strike capability by 5.5%. Because the aircraft have previously initiated ultra-long range strikes directly from their home base at Whiteman AFB, this reduction in capability is noteworthy.
Social media posts on Facebook shared parts of what is claimed to be radio communications from local air traffic control facilities during the incident. In the recordings, the controller is heard saying, “There is another issue with the aircraft coming in, they are unable to change radio frequencies”. The same tape also says the local fire department at the airport was called.
The B-2 was initially directed to runway 17L but actually landed on runway 35R, a runway at 6,134 feet of elevation that is 13,500 feet long, the longest runway available at Colorado Springs Airport.
B-2 Stealth Bomber emergency landing in Colorado Springs
The tower controller in the audio relays that, “I’m just relaying through Denver Center, all of the information, but as far as I now it is just the number 4 engine out”. Tower control finally says that he is unable to talk to the aircraft and is going to use a light gun to signal the aircraft, “But I am unable to talk to them. I’m just going to give them the light gun.” What appears to be an additional controller in the communications says, “No, they were unable to switch radio [frequencies] to me. I could only give them the light gun.”
Emergency response team on scene provided the pilot with oxygen, according to the reports but the reason for administering oxygen is unclear and subject to speculations.
On the other side, analysis of the (unusual) back shots of the aircraft: the U.S. Air Force usually prevents shorts at the rear of the aircraft.
“Photos taken of the B-2 on the ramp in Colorado show the aircraft’s auxiliary air inlet doors open on the left side and closed on the right. This is unusual. We don’t know if the right-side inlet doors were stuck closed during landing — they are open during terminal phases of flight — or if the left side failed to close upon shutting down,” Tyler Rogoway at The War Zone noticed.
As of Oct. 24, 2018, plane spotters in the area have since reported the B-2 is “gone”. The aircraft was not seen departing the airport so it is probable it has been moved discreetly to an indoor hangar.
On Feb. 26, 2010, a somehow similar incident occurred with a B-2 Spirit stealth bomber forward deployed in Guam. The aircraft aborted a takeoff with an engine fire. The official USAF spokesperson for the incident at the time, then- Lt. Col. Kenneth Hoffman, characterized the incident as “minor”. A subsequent report published on Jan. 6, 2014, in “War Is Boring” by writer David Axe went on to reveal the B-2 involved in that incident received more than minor damage. It took over two years to return the aircraft to operational flying condition.
Each of the B-2 spirit fleet aircraft has a name designated by state. In the case of the Feb. 26, 2010 incident, the aircraft involved was the “Spirit of Washington”, aircraft number 88-0332. The photos from Oct. 24, 2018’s incident may show aircraft number 89-0128, the “Spirit of Nebraska” being involved in Oct. 23, 2018’s emergency landing.
The future of the small and crucial B-2 fleet will certainly be influenced by the ability to maintain existing aircraft and repair any aircraft damaged in normal operations.
As the B-2 fleet continues to age and remain exposed to normal operational attrition the new, secretive B-21 Raider is expected to assume the low-observable strategic strike mission as it comes on line as early as 2025. Basing options for the B-21 Raider were announced earlier this year and could include Dyess Air Force Base in Texas, Ellsworth Air Force Base in South Dakota and Whiteman Air Force Base in Missouri as “reasonable alternatives ” to base the new B-21 bomber. These facilities already host strategic bomber assets including the B-1B Lancer long-range, supersonic heavy bomber.
The B-1B is also expected to be phased out in conjunction with the introduction and operational integration of the B-21 Raider. The plans for the B-21 Raider fleet include significantly more aircraft than the operational B-2 Spirit program with some estimates suggesting as many as “100-200” B-21 Raiders could be built. The unit cost of the B-21 could be half the single aircraft cost of the B-2 partially because the B-21 Raider will share the Pratt Whitney F135 engine with the F-35 Joint Strike Fighter program.
This article originally appeared on The Aviationist. Follow @theaviationist on Twitter.
IT jobs are some of the fastest growing, most secure jobs around today. Although they require a lot of education and experience, military veterans who held similar roles in the military tend to transfer extremely well. We did some research on the IT jobs the Bureau of Labor Statistics say are growing the fastest, and these are the most in demand, and will be in the future.
1. Software Developer
What software developers do
Software developers are the technical and creative minds who design and develop software for computer programs and applications.
Duties of software developers:
Analyze users’ needs and then design, test, and develop software to meet those needs
Recommend software upgrades for customers’ existing programs and systems
Design each piece of an application or system and plan how the pieces will work together
Create a variety of models and diagrams (such as flowcharts) that show programmers the software code needed for an application
Document every aspect of an application or system as a reference for future maintenance and upgrades
Collaborate with other computer specialists to create optimum software
Software developers are responsible for overseeing the entire development process for computer systems and applications. One of their main responsibilities is to identify how the users of the software will interact with it. Software developers must also keep in mind the type of security that their software will need in order to protect users.
Developers design and write the instructions for a program, and then give the instructions to the programmers to actually write the code. Some developers, however, might even write the code for the software.
(Photo by Farzad Nazifi)
Work environment of software developer jobs
Software developers typically work in teams that also consist of programmers. They must be able to work together and exchange ideas freely in order for the product to work. Typically, software developers work in an office and work 40 or more hours per week.
How to become a software developer
Software developers usually have a bachelors degree in computer science, software engineering or a related field. If you are going to school for software development you can expect to take courses that focus more on building the software. Many students gain experience by completing an internship with a software company while they are in college.
Even though writing code is typically not the responsibility of the developer, they still must have a strong background in computer programming. Through the course of their career developers will need to stay familiar with the newest computer tools and languages.
Software developers must also have knowledge of the industry they work in. For example, a developer working on digital recruitment software should probably have some knowledge about how the recruiting industry works.
Looking closer, the employment of applications developers is expected to grow by 31%, while system developers is expected to grow by 11%. The need for new applications on smart phones and tablets contributes to the high demand for applications developers.
The insurance industry is expected to need new software to help their policy holders enroll. As the number of people who use this software grows over time, so will the demand for developers.
Growing concerns with cybersecurity will contribute to the demand for software developers to design security systems and programs.
Job applicants who are proficient in multiple computer programs and languages will have the best opportunity to secure employment.
2. Information Security Analyst
What information security analysts do
Information security analysts are responsible for creating and overseeing security measures to protect an organization’s computer systems and digital assets from cyberattacks.
Duties of information security analysts:
Monitor their organization’s networks for security breaches and investigate a violation when one occurs
Install and use software, such as firewalls and data encryption programs, to protect sensitive information
Prepare reports that document security breaches and the extent of the damage caused by the breaches
Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
Research the latest information technology (IT) security trends
Develop security standards and best practices for their organization
Recommend security enhancements to management or senior IT staff
Help computer users when they need to install or learn about new security products and procedures
Information security analysts are heavily leaned upon to create their organization’s disaster recovery procedures, which allow an IT department to continue operating in the face of an emergency. Because cyberattacks are so common and dangerous now, these measures are extremely important to the stability of an organization.
Analysts must be familiar with how cyber attackers are operating, and be prepared for new ways they may infiltrate a computer system.
(Photo by Markus Spiske)
Work environment of information security analysts
The work environment of IT security analysts is typically set in the headquarters of a company so that they can monitor the computer systems, unless the company has a separate office strictly for their computer networks. As you can imagine, the majority of their work involves being on computers and monitoring for unusual activity.
Most IT security analysts work at least 40 hours per week, and some work more than that. They often work in teams and may even have specific people assigned to monitoring different aspects of a network.
How to become an information security analyst
To become an IT security analyst you will need at least a bachelor’s degree in a computer-focused field, and many employers prefer a masters degree and some work related experience. A Master of Business Administration in information systems is the preferred degree for upper level positions. This is where military experience comes into play. If you had experience in this field in the military, you will have a great edge over your competition.
Information security analysts are very well paid and will enjoy great job security and profession growth in the coming years. According to the Bureau of Labor Statistics, the average annual salary of information security analysts was ,510 as of May 2017. Employment of information security analysts is expected to increase 28% by 2026, which is considerable faster than the average occupation is expected to grow over that same time period.
Because cyberattacks are so common now, information security analysts will see a high demand for their job in the future. They will be expected to come up with innovative solutions to combat cyberattacks. As banks and other financial institutions continue to increase their online presence, they will need to ensure the safety of their own data and that of their users. This is true for many organizations, which makes information security analysts valuable.
Prospects who have prior experience, such as military veterans, are expected to have the best chance at gaining employment. Additionally, having special certifications and advanced degrees will be preferred moving forward.
Companies hiring for information security jobs
AECOM: AECOM is built to deliver a better world. We design, build, finance and operate infrastructure assets for governments, businesses and organizations in more than 150 countries.
ORACLE: At Oracle, our vision is to foster an inclusive environment that leverages the diverse backgrounds and perspectives of all of our employees, suppliers, customers and partners to drive a sustainable global competitive advantage.
Oracle: At Oracle, our vision is to foster an inclusive environment that leverages the diverse backgrounds and perspectives of all of our employees, suppliers, customers and partners to drive a sustainable global competitive advantage.
NATO allies and a handful of partner countries are gearing up for the alliance’s largest joint military exercises in decades.
Ahead of the Trident Juncture exercises, which are expected to include 45,000 troops, 10,000 vehicles, 60 ships, and 150 aircraft from 31 countries training side by side in and around Norway in fall 2018, the alliance is stressing strength and transparency, and just invited Russian observers so they can get the message up close.
The US Navy admiral commanding the exercise hopes Russia will take them up on the offer.
“I fully expect that they’ll want to come. It’s in their interests to come and see what we do,” Admiral James Foggo told reporters at the Pentagon on Oct. 5, 2018, “They’ll learn things. I want them to be there so they can see how well [NATO allies and partners] work together.”
“There’s a strong deterrent message here that will be sent,” he said. “They are going to see that we are very good at what we do, and that will have a deterrent effect on any country that might want to cross those borders, but especially for one nation in particular.”
Soldiers load an M777 howitzer during live-fire training at the Grafenwoehr Training Area in Germany, Sept. 10, 2018, as part of Exercise Saber Junction 18.
(Army photo by Markus Rauchenberger)
So far, Russia has yet to accept the offer.
The drills, Article 5 (collective defense) exercises, will include land, air, and amphibious assets training to repel an adversary threatening the sovereignty of a NATO ally or partner state. The admiral refused to comment on whether or not the exercise would include a nuclear element, as an earlier Russian drill did.
Although it was previously reported that these exercises are the largest NATO drills since the Cold War, they are actually the biggest since 2002, Foggo clarified at Oct. 5, 2018’s briefing. The allied drills come on the heels of massive war games in eastern Russia involving tens, if not hundreds, of thousands of Russian and Chinese troops preparing for large-scale military operations against an unspecified third country.
The purpose of Trident Juncture, according to handouts presented at Oct. 5, 2018’s briefing, is “to ensure that NATO forces are trained, able to operate together, and ready to respond to any threat from any direction.”
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
America was built on alcohol. Many of the founding fathers distilled or brewed their own booze because the ingredients needed to make it flourished perfectly in the soil of the newly formed United States. Remember, Samuel Adams isn’t just some fictional mascot made up to publicize a brewing company and Budweiser’s “George Washington recipe” is actually historically accurate.
Also, the terrible road conditions of the time made transporting grains the traditional way, you know, in bread and stuff, a true hardship. It was much easier to just turn whatever you grew into alcohol — which would net an even better profit.
All of this is key to understanding that the founding fathers would more than likely drink any modern military barracks under the table. No single moment best exemplifies this than the time George Washington and his Army buddies celebrated the signing of the Constitution by drinking enough booze to rack up a tab worth roughly $17,253 in today’s currency.
The tavern still exists and there’s still a bar. What could be more American than getting wasted where Washington and his boys drank?
(Photo by Lisa Andres)
It was the night of September 15, 1787, and George Washington had many reasons to celebrate. A few months earlier, in May, he was elected president at the Constitutional Convention. The United States Constitution had just been finalized and debates were finally settling as the momentous document cruised towards its eventual signing, just two days later. This night was also the farewell dinner for Washington before he set off to do bigger and better things.
Washington’s friends in the First Troop Philadelphia City Cavalry, along with several other framers of the Constitution, decided to throw a celebration at the City Tavern in Philadelphia.
All in all, a good night (This painting is actually from a different night at the Fraunces Tavern in New York. Celebrating with his troops was kind of his thing).
The party had roughly 55 guests, which included troops, politicians, friends, and family — along with 16 more people who were working that night, including musicians, servers, and hosts. The details of the night are hazy but the receipt for the night was saved in the First Troop Cavalry archives.
By the end of the night, Washington’s party drank: 54 bottle of Madeira wine, 60 bottle of Bordeaux wine, 8 bottles of old stock whiskey, 22 bottles of porter ale, 8 bottles of hard cider, 12 jugs of beer, and 7 large bowls of punch. The staff and musicians also drank 16 bottles of Bordeaux wine, 5 bottles of Madeira wine, and seven bowls of punch.
The bill also includes a tab for many broken glasses, which, adjusted for inflation, equals about 0 worth of reimbursements. The final bill came out to £89 and 4 schillings — or roughly ,253 in 2018 dollars.
The impressive part of this story isn’t that they drank it all — or the fact that drinks back then tended to be more potent than their modern counterparts — but the fact that Washington was functional enough just two days later to see the Constitution signed.
So, drink up! Enjoy the Constitution by celebrating its eventual 21st amendment!
H/T to We Are The Mighty reader Eric Carson for his comment that inspired for this article. Thank you very much! You’re awesome.
The media dubbed it “The Worm that Ate the Pentagon” and it was the most serious breach of the Pentagon’s classified computer systems. In November 2008, the Army caught a worm called Agent.btz crawling through the Defense Department’s Secret Internet Protocol Router Network – the classified SIPRNet – as well as the Joint Worldwide Intelligence Communication System used by the U.S. government’s top intel agencies.
No one knows if any information was taken or who its creator was. All they know is it took 14 months to eradicate.
The worst breach of U.S. military computers in history begins in 2008, in a parking lot at a U.S. military installation in the Middle East. A flash drive infected with a virus called “agent.btz” was inserted into a DoD computer network and quickly spread throughout the U.S. military’s classified and unclassified networks. Data – anything on these networks – could now be transferred to other servers under the control of agent.btz’s creator. The worst part is that no one knew it was there, what it might have sent, and to who the information went.
Once in place, the malicious code began to “beacon” out to its creator, letting whoever created it know that it was in place and ready for further instructions. That’s the only way analysts from the NSA’s Advanced Networks Operations team noticed it was there. At the height of the Global War on Terror, the Pentagon’s defense intelligence networks had been compromised.
“Go over to that village and get the wifi password. My USB drive isn’t working.”
The NSA and DoD quickly determined the cause of the infection, and banned thumb drives as a response. They then collected thousands of thumb drives from officers and other troops in the field, finding they were all infected with the worm as well. Reports of new infections to the network didn’t slow down until well into 2009. In an operation called “Buckshot Yankee,” the Defense Department led an all-out assault on the worm. The effort was so intense and deliberate that it led to the creation of the 11th military unified command – The U.S. Cyber Command.
Pentagon officials blame Russian agents for the virus, but individuals who worked on Buckshot Yankee dismiss that assertion, saying that the worm, though potentially destructive, ended up being “relatively benign.” Still, others assert that Russian intelligence agencies have used code similar to agent.btz before. Even with the concerted effort against the worm, Pentagon officials couldn’t answer the simplest of questions. How many computers were affected? How many drives were infected? Where was the virus’ patient zero?
No one knew. To this day, no one knows for sure.
The Air Force’s “silent service.”
In the end, it taught the Defense Department an important lesson. It was much more vulnerable to a small threat, even a cyber threat, than it should have been. Now the DoD claims it is better-equipped to detect such threats and infections, and to respond to them. The policy shift took the responsibility of protecting classified and unclassified Defense networks out of the hands of the local IT troops (or contractors) and put it in the hands of senior commanders.
In the shadowy world of nuclear operations, seconds count. America’s nuclear warriors train daily to deliver awesome firepower in less time than it takes to microwave a slice of pizza.
The United States introduced the atomic bomb in 1945. The Soviet Union followed suit in 1948. An arms race ensued, with each side trying to top each other in destructive power. The nuclear triad, a triumvirate of submarines, bombers, and long-range missiles, was the pinnacle of that arms race.
The name of the game in nuclear strategy is survivability. And that’s what the triad was designed to achieve. Quiet submarines can hide beneath the waves. Bombers can escape to the skies in the event of an incoming attack. And hardened intercontinental ballistic missiles, ICBMs, are so numerous it would require a massive nuclear first-strike to neutralize all of them.
So what does it take to unleash nuclear hell? The massive power lies in the hands of one man, the President of the United States. It’s a responsibility that Harry Truman, who ordered the nuclear strikes on Hiroshima and Nagasaki, said was the most difficult of his Presidency.
In the entire United States military, nowhere is the chain of command thinner than the nuclear command and control network. In a normal military unit, there are two dozen degrees of separation between the National Command Authority and the warfighter. In the shadowy world of nuclear operations, there’s perhaps 2 or 3. When the decision is made, the order shoots like a bolt from the blue to bomber, missile, and submarine crews. When they launch, only the bomber crews have the option of recall.
President Kennedy lamented the responsibility. He thought it “insane that two men, sitting on opposite sides of the world, should be able to decide to bring an end to civilization.”
After the US-Soviet arms race hit its apogee during the Cuban missile crisis, Kennedy reportedly asked a few common sense, but insightful, questions about the nuclear chain of command. He wanted to know how he would order the Pentagon to launch a nuclear strike. And he was curious how nuclear crews would know the order came from the President.
The answer became one of the most visible signs of the President’s authority, the nuclear football. It’s a briefcase carried by a rotating cast of President’s military aides, officers from each service handpicked for their competency.
The football’s small size, power, and mystery have created something of a mythos around the non-descript briefcase. The term “finger on the button” has become synonymous with awesome responsibility. And the assumption is that the football has a big red button inside, one where the President hits when he wants to unleash Armageddon.
The reality isn’t nearly as sexy. The football is in some ways like many briefcases. It holds documents. The term football came from the original nuclear war plan, code-named Dropkick by Defense Secretary Robert McNamara. The thinking was that in order to execute a dropkick, you need a football.
The contents are highly classified. But former military aides have revealed a few key details about the football’s mysterious contents. It contains, most importantly, the authentication codes to America’s atomic arsenal. Those authenticators are the classified realm’s holiest of the holy, quite literally the keys to the nuclear kingdom. The briefcase also contains a menu of retaliatory options for the President. Contrary to popular belief, there’s more to nuclear war than a massive retaliatory blow. Whether to hit big or hit small is the President’s alone.
Along with the football, the President carries with him a small identification card with a series of codes on it. The codes verify his identity, and must accompany the football’s authenticators and war plans when ordering a nuclear strike.
Almost every President has a football fumble. During LBJ’s tenure, a military aide was stunned when he discovered six months’ worth of changes to nuclear procedures were not in the briefcase. When Reagan was shot, his special identification card was stuck in a small plastic hospital bag along with his other personal effects. George HW Bush once left his military aide (and associated football) behind after a tennis match. So did President Clinton. His military aide had to spring several blocks back to the White House, football in tow.
During the heyday of the Cold War, the Soviets also had a small satchel that accompanied the General Secretary. The Russian version had an electronic device that generated an unlock code. During the 1991 coup, conspirators seized both the Russian football and Gorbachev’s aide. The device was reportedly sabotaged by loyal officers during the coup, leaving the fading Soviet Union without access to their nuclear forces.
In America’s case, the invention of nuclear weapons created an anomaly in US history. The Presidency was devised to operate under a series of checks and balances. It was the Founding Father’s way of restraining executive power. Nuclear launch authority has no such check and no such restraint. The power is the President’s alone, and today remains perhaps the most awesome responsibility in history.
Blood oaths, prophecies, and brutal life lessons propelled Genghis Khan into conquest, amassing the largest land empire in the history of mankind. As a boy, he was the illiterate son of a murdered chieftain and had everything he loved torn away from him. As an adult, through merciless leadership, he united the steppe tribes and instilled discipline into his warriors.
Genghis Khan established dedicated trade routes, promoted religious tolerance, and got so many women pregnant that you may be related to him. The effects of his rule can still be seen today and few have come close to his level of greatness or ruthlessness.
Leadership based on merit
Temüjin, Genghis Khan’s birth name, loosely translates to ‘of iron‘ or ‘ironworker.’ His leadership style reformed Mongol tradition by replacing the nobility rank structure with a merit-based promotion system. Though much of his army was “recruited” by threat of death, he earned loyalty by promising the spoils of war to his troops rather than hoarding it all himself — after all, he believed that excessive wealth was a weakness. Sure, your home and everything you knew just got rolled over by Genghis Khan, but hey, now you have the opportunity to fight by his side — or die.
The Yassa, a code of law written by Genghis Khan, and its enforcement was a non-negotiable condition of joining the Khan’s empire. Soldiers had to swear allegiance to Genghis Khan, to not steal livestock, to not steal another man’s woman, and, generally, to not be a thieving POS. You could pillage the enemies of the empire, but not the people inside the empire itself.
All hail the God Emperor
Adapt and overcome tactics
The Mongols learned mounted archery at an early age. They were taught to fire the arrow when the horse’s hooves were off the ground to achieve maximum accuracy. They adopted strategies against walls cities out of necessity because the steppes had no fortified towns. In China, the Mongols captured Chinese soldiers and tortured them until they gave them the knowledge to build the necessary siege engines.
Psychological warfare was the Khan’s bread and butter. His armies often used harassing techniques to lure the enemy into ambushes or tied sticks to the tails of their cavalry to exaggerate the size of cavalry charges. The night before battle, troops would burn five fire pits to further exaggerate their numbers.
He would give his opponents the opportunity to surrender and join him before murdering every living thing in their city. He tortured motivated his enemies to death by boiling them alive, had them suffocated, or, in the case of noble named Inalchuq, poured molten silver into the eyes and ears. Fear was an effective tactic that minimized loses in his conquest because cities would rather surrender than suffer the dire consequences.
You could keep your God, but not your shoes.
History remembers the Great Khan, mostly, as a warmongering sociopath, but his views on religious tolerance have influenced our own government’s Constitution. Thomas Jefferson’s view on the separation of church and state is eerily close to the Mongolian warlord’s idea of unifying the tribes (and subsequent territories), regardless of faith and orienting them toward greater ambitions.
Kill all humans.
Safe trade routes
His protections also extended to merchants traveling within his empire in what is now known as the Pax Mongolica (Mongol Peace). Some accounts go as far as to say that a maiden bearing a nugget of gold on her head could wander without fear throughout the realm.
Alpha male genetics..?
Let’s set something straight first. The Great Khan has 16 million living descendants as a direct result of his empire. And it was common for him to take many women from the vanquished. He, himself, was certainly not kind to women in general.
But his social policies supported women’s rights and, to this date, affect a woman’s role in Mongolian society. Though women were still subordinate to men in Mongol culture, they were less subdued than in other civilizations of the time. In fact, Sorkhaqtani, the wife of one of Genghis’ sons, was a trusted advisor played a crucial role in holding the empire together.
“No one left behind” is an often-heard mantra in military units. Popularized by feats like the ‘Black Hawk Down’ operation, it enhances esprit de corps in a unit. It also emboldens warriors to perhaps go a step further during combat, assured that they wouldn’t be left alone in case things turn sour. But how far would a unit go to recover one of its own?
Helmand Province, Afghanistan, January 15, 2007.
Royal Marines Commandos from Z Company of 45 Commando launch an assault on a Taliban fort. The 200 Commandos enjoy armor and 155mm artillery support. Overhead, U.S. B-1 bombers and British Apache Longbow AH-64 helicopters provide a silent assurance with their potent arsenal and infrared cameras.
The Jugroom Fort, a strategically vital position in Garmsir, Southern Helmand, overlooks the Helmand River. Today, it’s packed with Taliban fighters.
The Marines ford the river in their Viking APCs and assault the fortified structure. Heavy combat ensues. Despite their overwhelming firepower, the Commandos are forced to withdraw. Once back in their launching position, a muster goes around, and a grim discovery is made: Lance Corporal Mathew Ford is missing.
Using its infrared camera, one of the AH-64 Apaches spots a lone figure pulsing with a weak heat-signature tucked away in a corner of the Fort. The Taliban all around seem impervious to its existence—but for how long?
A rescue operation must be shift before the insurgents realize what’s going on.
The Commando officers argue for a ground rescue operation, but the higher-ups back in Camp Bastion waiver fearing more casualties. Meanwhile, LCpl. Ford’s brothers-in-arms fume. They decide to take the situation into their own hands. Alongside some of the Apache pilots, they devise a bold rescue plan. Four Commandos strap themselves to the wings of two of the Apaches. A third chopper will follow and try to suppress any Taliban.
The Army Air Corps’ pilots fly their Apaches just 20ft above the ground, at 60mph.
The British Commandos land within the Fort’s walls. The Commandos jump from the wings and begin searching for the missing comrade. A few of the pilots join them armed with their personal sidearms.
They find LCpl. Ford—he is unconscious.
Recovering their fallen comrade, they re-mount the choppers and safely fly back to their positions.
It was later discovered that the 30-year-old Ford was dead when the rescue force arrived. But the grimmest discovery came in the autopsy. Ford had been zipped by friendly-fire. It later became known that one of his buddies mistook a hand-grenade flash close to Ford’s position for gunfire and shot him.
Despite rumors of a court-martial for their actions, the whole rescue team was honored. Two of the Apache pilots received the Distinguished Flying Cross, one of the highest military awards. The rest of the pilots alongside the four Commandos received the Military Cross.
So, if you find yourself alongside Royal Marines Commandos or any British Apache pilots, you can rest assured that they won’t leave you behind.
It turns out some of the things that you do on a regular basis can actually help you become smarter. And if it is a goal that you’re trying to actively work towards, there are some techniques that you need to know about.
Becoming smarter might sound like a daunting task, but it actually might be easier than you think.
Your workout affects more than just your cardiovascular health, muscles, and mood.
“Exercise increases the blood supply to the brain, and it basically brings food to the brain, and this changes the brain from the molecular level to the behavioral level,” Aideen Turner, PT, Cert MDT, a physical therapist and the CEO of Virtual Physical Therapists, told INSIDER. “There’s something called neurogenesis. This is the process where you build new brain connections or neurons, and it’s enhanced with exercise. Exercise also helps to improve the brain plasticity, or the ability of the brain to change and adapt.”
So now you have another reason to make sure you don’t skip your workout too often. In addition to all of the other ways that exercise can benefit your body, it might also give your brain a serious boost.
2. Mimicking how smart people learn might, in turn, make you smarter.
It might sound sort of obvious but figuring out the ways that smart people think and learn can help you implement these same strategies yourself and, in turn, become smarter.
“Becoming smarter requires developing good learning strategies,” Nancy Cramer, a master practitioner and trainer in neuro-linguistic programming and leadership consultant, told INSIDER. “Learn how smart people learn and then you will be smarter, too. Good spellers, for example, are not necessarily smarter than someone else. They just have a better strategy for memorizing words and accessing them on command. To remember how to spell a word, good spellers take a picture of the word in their minds and then blow it up. When it is time to spell something, they recall the picture and literally see the word in front of them. The smarts is in the strategy. There are all kinds of strategies for learning. By learning the strategy, one can improve their results.”
If you really want to boost your brain, choose an activity that not only works your body, but also your brain. Turner said that activities like dancing and golf can be really good for the brain because they require thinking as well as movement. She noted that these kinds of activities have been found to even protect you against developing Alzheimer’s or another form of dementia as you age.
She also conducted a study that found that bilingual patients with Alzheimer’s seemingly handled the disease better than those who spoke only one language. They functioned at comparable levels, despite bilingual patients’ brains exhibiting more damage.
Bialystok said that it’s difficult to know for sure if you have to speak multiple languages from childhood in order for this to have an effect or if you can pick up languages later on and benefit in the same way. Either way, she encourages learning languages whenever you can.
In war games simulating a high-end fight against Russia or China, the US often loses, two experienced military war-gamers have revealed.
“In our games, when we fight Russia and China, ‘blue’ gets its ass handed to it,” David Ochmanek, a RAND warfare analyst, explained at the Center for a New American Security on March 7, 2019, Breaking Defense first reported. US forces are typically color-coded blue in these simulations.
“We lose a lot of people. We lose a lot of equipment. We usually fail to achieve our objective of preventing aggression by the adversary,” he said.
US stealth fighters die on the runway
At the outset of these conflicts, all five battlefield domains — land, sea, air, space, and cyberspace — are contested, meaning the US could struggle to achieve the superiority it has enjoyed in the past.
An F-35A joint strike fighter crew chief watches his aircraft approach for the first time at Eglin Air Force Base in Florida, July 14, 2011.
(US Air Force photo by Samuel King Jr.)
In these simulated fights, the “red” aggressor force often obliterates US stealth fighters on the runway, sends US warships to the depths, destroys US bases, and takes out critical US military systems.
“In every case I know of, the F-35 rules the sky when it’s in the sky,” Robert Work, a former deputy secretary of defense and an experienced war-gamer, said March 7, 2019. “But it gets killed on the ground in large numbers.”
Neither China nor Russia has developed a fifth-generation fighter as capable as the F-35, but even the best aircraft have to land. That leaves them vulnerable to attack.
US warships are wiped off the board
“Things that sail on the surface of the sea are going to have a hard time,” Ochmanek said.
Aircraft carriers, traditional beacons of American military might, are becoming increasingly vulnerable. They may be hard to kill, but they are significantly less difficult to take out of the fight.
USS Enterprise is underway with its strike group in the Atlantic Ocean.
(US Navy photo by Mass Communication Specialist Seaman Harry Andrew D. Gordon)
Naval experts estimate that US aircraft carriers now need to operate at least 1,000 nautical miles from the Chinese mainland to keep out of range of China’s anti-ship missiles, according to USNI News.
US bases burn
“If we went to war in Europe, there would be one Patriot battery moving, and it would go to Ramstein [in Germany]. And that’s it,” Work explained, according to Breaking Defense. “We have 58 Brigade Combat Teams, but we don’t have anything to protect our bases. So what difference does it make?”
Simply put, the US military bases scattered across Europe and the Pacific don’t have the anti-air and missile-defense capabilities required to handle the overwhelming volume of fire they would face in a high-end conflict.
US networks and systems crumble
In a conflict against a near-peer threat, US communications satellites, command-and-control systems, and wireless networks would be crippled.
Marines participate in Hatch Mounted Satellite Communication Antenna System training on an MV-22B Osprey at Marine Corps Air Station New River, North Carolina, Feb. 12, 2019.
(U.S. Marine Corps photo by Lance Cpl. Gumchol Cho)
“The brain and the nervous system that connects all of these pieces is suppressed, if not shattered,” Ochmanek said of this scenario. Work said the Chinese call this type of attack “system destruction warfare.”
The Chinese would “attack the American battle network at all levels, relentlessly, and they practice it all the time,” Work said. “On our side, whenever we have an exercise, when the red force really destroys our command and control, we stop the exercise and say, ‘let’s restart.'”
A sobering assessment
“These are the things that the war games show over and over and over, so we need a new American way of war without question,” Work stressed.
Six High Mobility Artillery Rocket Systems conduct a live-fire exercise as part of pre-deployment training at Ft. Bliss, Texas.
(Wisconsin National Guard photo by Staff Sgt. Alex Baum)
Ochmanek and Work have both seen US war games play out undesirably, and their damning observations reflect the findings of an assessment done from fall 2018.
“If the United States had to fight Russia in a Baltic contingency or China in a war over Taiwan, Americans could face a decisive military defeat,” the National Defense Strategy Commission — a bipartisan panel of experts picked by Congress to evaluate the National Defense Strategy — said in a November 2018 report.
The report called attention to the erosion of the US’s military edge by rival powers, namely Russia and China, which have developed a “suite of advanced capabilities heretofore possessed only by the United States.”
The commission concluded the US is “at greater risk than at any time in decades.”
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.