This week’s Borne the Battle episode features Navy Veteran and New York Times bestselling author Jack Carr. He discusses his dreams of becoming a Navy SEAL and author. Through his enthusiasm for reading and on military-science novels, Carr’s dreams became a reality.
Carr’s two career goals were inspired by two people. The first person was his grandfather, a Marine who fought and died during World War II. The second person was his mother, a librarian who instilled in him a love of reading. It was this love that helped him on his path to reading about and eventually joining Navy SEAL teams.
During his Navy SEAL career, Carr led special operations teams as a team leader, platoon commander, troop commander, task unit commander, operations officer and executive officer. In the interview, he shares how his military experience and travels allowed him to develop and share realistic stories for his novels.
Additionally, he shares his mindset about his military transition, tips for entering the publishing world and how combining all his previous experiences led him to publish three political thrillers. His fourth novel is scheduled to be released in April.
In addition, he supports Veterans through his own unique merchandise, where 100% of the profits go to Veteran-related charities. He is also an ambassador for theRescue 22 Foundation. A SEAL teammate who trained a service dog for Jack’s special needs child introduced him to the foundation.
Finally, he shared the story and business behind Chris Pratt optioning his book for an upcoming series on Amazon Prime.
As anti-ISIS forces retake Mosul and march on Raqqa, more and more of the terror group’s mystique is falling away. It’s hard to be the international bogeyman when your forces are suffering defeats across your caliphate.
But one of ISIS’s most prominent battlefield weapons is still deadly frightening, the armored vehicle-borne improvised explosive device. While VBIEDs were already common in Iraq and Afghanistan, ISIS upped the ante by creating especially effective armored versions and then employing them like artillery — softening their enemy’s lines and breaking up attacks.
For the Iraqi Army, the Kurdish Peshmerga, and other anti-ISIS forces, understanding these weapons is a matter of life or death. But typically, the weapons are destroyed before they can be captured, either because the soldiers hit it with a rocket, tank, or artillery round, or because the operator triggers his explosive cargo.
This makes it relatively rare that a suicide vehicle is captured intact. But there have been a few, and Sky News got the chance to tour one of these captured vehicles during the Iraqi military’s initial punch into Mosul.
The vehicle, captured by Kurdish Peshmerga, had been heavily modified with the removal of any unnecessary weight, the addition of thick, heavy armor, and the installation of a massive amount of explosives.
See the full tour of the vehicle in the video below:
In early 1943, the 1st Ranger Battalion, known as Darby’s Rangers, was still relatively unknown and rather untested. All of that was about to change.
The Rangers had been formed less than a year before at the insistence of Gen. George Marshall. Marshall believed that the Americans needed a commando unit and ordered Major Orlando Darby to make it happen. On June 19, 1942, the 1st Ranger Battalion was activated from “volunteers not adverse to dangerous action.”
Though over 2,000 men had volunteered, only 575 officers and enlisted men were accepted into the battalion. The British Commandos then trained these men at their training facility at Achnacarry, Scotland.
Less than six months after their formation, the Rangers spearheaded the Allied invasion of North Africa by taking out Vichy French artillery batteries at Arzew, Algeria. In a quick but decisive move, the Rangers captured the guns and some 60 prisoners.
After helping secure the port facilities and a nearby town, the Rangers were withdrawn from action. They began an intense training period, focusing on forced marches and night fighting. Both would prove useful in the near future.
With the rapid advance of Allied forces across North Africa, and commanders unsure of what to do with a specialized raiding force like the Rangers, they were not involved in the ongoing combat.
That changed in February when the Rangers were called upon to conduct raids against Axis forces to gather intelligence and weaken enemy morale.
Darby devised a plan to attack the Italians at Sened Station.
Trucked to within 20 miles of their objective the Rangers set off in total darkness. The Rangers set a blistering pace and stealthily covered some fourteen miles before taking shelter among the rocks for the day.
Word was passed around for that night’s mission — the Rangers would leave their mark.
“They’ve got to know that they’ve been worked over by Rangers,” Capt. Roy Murray said. “Every man is to use his bayonet as much as he can. Those are our orders.”
While his men concealed themselves among rocks and brush, Darby and his executive officer, Major Herman Dammer, conducted a leaders’ reconnaissance of the Italian outpost.
With the final plan set, the Rangers prepared to move out as the sun set. Faces were blackened and anything that jingled or rattled was secured to ensure silence. Helmets had been traded for wool caps the night before.
Once the moon set, the Rangers began their movement toward the objective.
The raiding force consisted of three line companies and a detachment of 81mm mortars. They moved out three companies abreast, toward positions within 500 yards of the outpost.
Darby was able to track the movement of his men by an ingenious method. Using red-lensed flashlights covered with a shroud mounted on the pack of a few men, he was able to see when his units were in position. This also ensured that no man wondered off course.
When all was ready, Darby sent forward the order to fix bayonets and move out.
Slowly, silently, the Rangers crept toward the unsuspecting Italian garrison.
Some amount of noise must have made it to the Italians at their posts because they became suspicious. With the Rangers still some 200 yards out, Italian machine guns opened fire. In the pitch black, their fire was wild and inaccurate. The Rangers held their fire and continued to creep forward.
As the Rangers made it to within 50 yards of the wire, the Italian’s fire became too close for comfort. Italian sentries called out into the night, “Qui va la? Qui va la?” (“Who goes there?”)
All at once the Americans responded. The Rangers leapt up and charged across the short distance to the Italian perimeter. American Tommy Guns riddled the outpost as riflemen tossed hand grenades and stormed across the Italian defenses with their bayonets.
One Ranger, Cpl. James Altieri, stumbled into a trench and right on top of an Italian soldier. In the brief struggle, Altieri dispatched the man by stabbing him in the stomach. It was his first hand-to-hand kill. He immediately vomited before continuing the fight.
Altieri later described the fighting by saying, “We worked them over furiously, giving no quarter.”
As the Rangers cleared the outpost, the 81mm mortars pounded the Italian positions and cut off their retreat.
The victory had cost the Rangers one man and another 20 wounded.
As Darby conferred with the assault commanders and consolidated his position, he could hear the distant rumble of tracked vehicles — German armor. This was expected; the raid had been intended to draw out the Germans to help commanders determine their strength. But it also meant it was time for the Rangers to get out of Dodge.
The words “Pearl Harbor” evoke images and emotions only rivaled in American history by “The Alamo,” and “9-11.” As President Franklin Delano Roosevelt put it in the wake of the surprise attack, December 7, 1941 is “a day that will live in infamy.” Here’s WATM’s brief look at how it went down.
The Japanese task force was comprised of six carriers — Akagi, Kaga, Sōryū, Hiryū, Shōkaku, and Zuikaku — carrying a total of 408 airplanes (360 bombers, 48 fighters).
The attack on Pearl Harbor came in two waves. The first wave of 183 planes (six failed to launch because of maintenance issues) crossed into American airspace on December 7, 1941 at 7:48 local time. Ironically and tragically, as the first wave approached Oahu, it was detected by the U.S. Army SCR-270 radar at Opana Point near Oahu’s northern tip. The operators reported a target, but their superior, a newly assigned officer at the thinly manned Intercept Center, presumed it was the scheduled arrival of six B-17 bombers from California.
The Japanese fighters shot down several American airplanes on the way in.
The first wave bombers were supposed to take out ‘capital ships’ — aircraft carriers (famously not in port) and battleships, while the Zeros strafed Ford Field in an effort to keep American fighters from launching.
The famous message, “Air raid Pearl Harbor. This is not drill,” was sent from the headquarters of Patrol Wing Two, the first senior Hawaiian command to respond.
Despite this low alert status, many American military personnel responded effectively during the attack. Ensign Joe Taussig Jr., aboard the USS Nevada, commanded the ship’s antiaircraft guns and was severely wounded, but continued to be on post. Lt. Commander F. J. Thomas commanded Nevada in the captain’s absence and got her under way until the ship was grounded at 9:10 a.m. One of the destroyers, USS Aylwin, got underway with only four officers aboard, all ensigns, none with more than a year’s sea duty; she operated at sea for 36 hours before her commanding officer managed to get back aboard. Captain Mervyn Bennion, commanding the USS West Virginia, led his men until he was cut down by fragments from a bomb which hit USS Tennessee, moored alongside.
The second wave of 171 planes (four others didn’t get airborne) came shortly after the first had egressed and focused on the airfields at Hickham, Kanehoe, and Ford (right in the middle of Pearl Harbor), taking out hangars and strafing airplanes on flight lines. The second wave also went after the battleships that had survived the first wave.
In total, 2,403 Americans died and 1,178 were wounded. Eighteen ships were sunk or run aground, including five battleships. All of the Americans killed or wounded during the attack were non-combatants, given the fact there was no state of war when the attack occurred. (The attack was later ruled a war crime because occurred without a declaration of war from Japan.)
In the wake of the attack, 15 Medals of Honor, 51 Navy Crosses, 53 Silver Stars, four Navy and Marine Corps Medals, one Distinguished Flying Cross, four Distinguished Service Crosses, one Distinguished Service Medal, and three Bronze Star Medals were awarded to the American servicemen who distinguished themselves in combat at Pearl Harbor.
The following day President Roosevelt asked Congress to declare war on Japan, and Congress obliged an hour later.
On December 11, Germany and Italy — honoring their treaty with Japan — declared war on the U.S., so Congress issued a declaration of war on them in return.
The United States was now fully involved in World War II.
Former NSA contractor Edward Snowden’s first leak is coming full circle.
Last month a US appeals court ruled the NSA’s post-9/11 dragnet of millions of Americans’ phone-call records is illegal, noting that a secret Foreign Intelligence Surveillance Court (FISC) order “leaked by former government contractor Edward Snowden” and published by The Guardian served as the catalyst for the decision.
The FISC order directed Verizon to produce to the NSA “on an ongoing daily basis … all call detail records or ‘telephony metadata’ created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls.”
The US government had justified the program by saying it was covered under Section 215 of the USA Patriot Act, but the court ruled that “the bulk telephone metadata program is not authorized by § 215.”
On Monday, Section 215 and two other provisions of the Patriot Act expired — at least temporarily.
So for the first time since 9/11, partly thanks to Snowden, 31, the phone records of US citizens are not being scooped en masse under a law ruled illegal.
But the order comes from just one of as many as 1.77 million NSA documents Snowden allegedly stole while working at two consecutive jobs for US government contractors in Hawaii between March 2012 and May 2013. And he gave only an estimated 200,000 documents to American journalists Glenn Greenwald and Laura Poitras.
On June 9, 2013, four days after The Guardian published the Verizon order, Snowden revealed himself in a video before going underground to seek asylum.
Snowden’s epic heist and search for asylum spans more than 10,000 miles, and there are a lot of blanks to fill in after Snowden decided to expose NSA spying.
Now that Snowden’s first leak is vindicated, here’s a look at three of the outstanding questions about his journey:
Whom did Snowden contact when he arrived in Hong Kong?
Snowden says he “clearly and unambiguously acted alone, with no assistance from anyone” — at least until Hong Kong.
“When Mr. Snowden came to Hong Kong from Hawaii in late May, he looked up a person whom he had met on a previous vacation here,” The New York Times reported on June 24, 2013, the day after Snowden flew from Hong Kong to Moscow.
Albert Ho, one of Snowden’s Hong Kong lawyers, told The Times the person was a well-connected Hong Kong resident and became Mr. Snowden’s “carer.”
Snowden told The Guardian that after the “very carefully planned and orchestrated” theft of NSA information, he didn’t cover his traces in Hong Kong.
“I only tried to avoid being detected in advance of travel … on the other side I wanted them to know where I was at,” Snowden said. “I wanted them to know.”
In his book, Glenn Greenwald wrote that Snowden “arrived in Hong Kong from Hawaii on May 20, checking into the Mira Hotel under his own name.”
Where did Snowden spend the first 11 days?
Edward Jay Epstein of The Wall Street Journal, however, went to Hong Kong and reported that Snowden didn’t check into the Mira Hotel until June 1, a couple of days before he met Poitras and Greenwald.
“Mr. Snowden would tell Mr. Greenwald on June 3 that he had been ‘holed up’ in his room at the Mira Hotel from the time of his arrival in Hong Kong. But according to inquiries by Wall Street Journal reporter Te-Ping Chen, Mr. Snowden arrived there on June 1,” Epstein reported.
“I confirmed that date with the hotel’s employees,” Epstein wrote.” A hotel security guard told me that Mr. Snowden was not in the Mira during that late-May period and, when he did stay there, he used his own passport and credit card.”
Epstein also cited a source familiar with the Defense Intelligence Agency report on the Snowden affair, writing that “US investigative agencies have been unable to find any credit-card charges or hotel records indicating his whereabouts” between May 20 and June 1.
What exactly happened to the documents Snowden didn’t give to journalists?
After checking out of the Mira Hotel on June 10, Ho said, Snowden accepted an invitation to stay in the home of one of his carer’s friends.
On June 12, Snowden showed The South China Morning Post (SCMP) an unknown number of documents revealing “operational details of specific [NSA] attacks on [Chinese] computers, including internet protocol (IP) addresses, dates of attacks, and whether a computer was still being monitored remotely.”
Snowden told Lana Lam of SCMP that he possessed more NSA intel.
“If I have time to go through this information, I would like to make it available to journalists in each country to make their own assessment, independent of my bias, as to whether or not the knowledge of US network operations against their people should be published.”
Eleven days later, Snowden got on a plane to Moscow.
In October 2013, James Risen of The Times reported that Snowden told him over encrypted chat that “he gave all of the classified documents he had obtained to journalists he met in Hong Kong.” (ACLU lawyer and Snowden legal adviser Ben Wizner subsequently told me that the report was inaccurate.)
Snowden would later tell NBC that he “destroyed” all documents in his possession before he spoke with the Russians in Hong Kong.
“The best way to make sure that for example the Russians can’t break my fingers and — and compromise information or — or hit me with a bag of money until I give them something was not to have it at all,” he told Brian Williams of NBC in Moscow in May 2014. “And the way to do that was by destroying the material that I was holding before I transited through Russia.”
More to come
Snowden, who appears via video conference semi-frequently, has not explained these discrepancies yet.
In the meantime, as the effects of Snowden’s leaks reverberate in the US and the world, the saga continues.
An Iraqi outpost with US and Australian military advisers in western Mosul was hit with an ineffective “low grade” mustard agent by Islamic State forces on Sunday, according to CBS News.
At least six Iraqis were treated for breathing issues at a field clinic, while none of the advisers were believed to have been injured.
The Pentagon released a statement saying that the ineffective attack “further displays the desperation of ISIS as they seek to hold an untenable position in Mosul,” ABC Australia reported.
“My advice right at the moment is no Australian troops were affected but Australian forces did provide assistance following the attack, said Australian Prime Minister Malcolm Turnbull. “That’s my current advice received in last few minutes.”
US defense officials in Iraq could not be reached for comment.
This was reportedly the second chemical attack in recent days — an Iraqi military officer also claimed that ISIS forces launched a rocket loaded with chlorine in the al-Abar district in West Mosul, one Associated Press report said.
This wouldn’t be the first time ISIS militants were allegedly using chemical agents to fend off coalition fighters. Troops embedded with the Kurdish forces also reported that ISIS was using chemicals in their mortar attacks, judging by the coloration of its plumes of smoke.
Mosul, the second-largest city in Iraq, has seen heavy action since Iraqi Security Forces launched their campaign earlier this year to liberate the ISIS-controlled city.
Since then, ISF troops, backed by the coalition forces, have managed to reclaim the sparsely populated areas of eastern Mosul, however, the battle to retake western Mosul still rages on — with large portions of it requiring door-to-door combat. Some reports claim that more than half of western Mosul has been liberated.
Billy kept a Brit-style stiff upper lip even when an IED struck the vehicle he was riding in. Click through the photos above to see Billy’s deployment. And check out the original reddit post to see a ton of bear puns about warfare.
North Korea celebrated decades of hard work on its first-ever intercontinental ballistic missile with a giant concert complete with pyrotechnics, an orchestra, and a simulation video of its missile destroying the entire U.S. mainland.
The concert not only featured the simulation video, but photos of the real missile tested by the North Koreans, providing missile analysts in the U.S. and elsewhere tons of hidden details to study.
Because North Korea remains one of the most closed-off nations on earth, the imagery it posts of its missiles is an excellent source of intelligence for civilian and military analysts alike.
Watch the clip below:
USA is destroyed by an HS-14- as seen at the triumph concert. Turn the music on, and let the North Koreans pimp the missile…. pic.twitter.com/dQMK9yOi8I
Russian strategic bombers on July 5 struck the Islamic State group in Syria with cruise missiles, the military said.
The Defense Ministry said that Tu-95 bombers launched Kh-101 cruise missiles on IS facilities in the area along the boundary between the Syrian provinces of Hama and Homs. The ministry said three ammunition depots and a command facility near the town of Aqirbat were destroyed.
It said the bombers flew from their base in southwestern Russia and launched the missiles at a distance of 1,000 kilometers (620 miles) from the target.
Russia has waged an air campaign in support of Syrian President Bashar Assad since September 2015. The Russian military has used the campaign to test its latest weapons, including long-range cruise missiles, in combat for the first time.
Meanwhile, a two-day round of Syria cease-fire talks in Kazakhstan’s capital, Astana, ended without conclusive results. The Syrian government and the opposition blamed each other for the failure to reach agreement.
The negotiations, brokered by Russia, Turkey, and Iran, were to finalize specifics related to so-called de-escalation zones, including their boundaries and monitoring mechanisms. But the talks failed to produce a deal, with the parties agreeing only to set up a working group to continue discussions.
“We so far have failed to agree on de-escalation zones, but we will continue efforts to achieve that goal,” Russian envoy Alexander Lavrentyev said after the talks, according to Russian news reports.
Lavrentyev said that Russia plans to deploy its military police to help monitor de-escalation zones and called on Kazakhstan and other ex-Soviet nations to also send monitors. He said police will have light arms to protect themselves.
Lavrentyev also noted that the involvement of the United States and Jordan would be essential for setting up a de-escalation zone in southern Syria near the border with Jordan.
Syria’s warring sides have held four previous rounds of talks in Kazakhstan since January, in parallel to the UN-brokered peace talks in Geneva. Neither process has made much progress. A cease-fire declared in May, has been repeatedly violated.
In a script flipped from previous elections, Democratic presidential nominee Hillary Clinton styled herself as the candidate defending American exceptionalism, international alliances and the military in a speech to thousands of veterans Wednesday.
Speaking here at the American Legion National Convention, Clinton highlighted her personal and professional military bona fides, describing her upbringing as the daughter of a Navy chief petty officer and invoking her role as an adviser in the May 2011 Navy SEAL raid that killed al-Qaida founder Osama bin Laden.
“I was deeply honored to be part of that small group advising the president,” she said. “I brought to those discussions my experience as a senator from New York on 9/11 and my commitment to do whatever I could in whatever role I had to bring bin Laden to justice.”
She recalled watching the SEALs adapt and carry on with the mission as one of the Black Hawk helicopters clipped the wall of bin Laden’s compound and was disabled.
“I was holding my breath for the entire operation,” she said.
Although the SEALs were racing against the clock to destroy the damaged chopper and depart after taking out bin Laden, Clinton said, they took time to move women and children — bin Laden’s family members — to safety.
“That is what honor looks like,” she said. “Maybe the soldiers of other nations wouldn’t have bothered. Or maybe the’d have taken revenge on those family members of terrorists. But that is not who we are. And anyone who doesn’t understand that, doesn’t understand what makes our nation great.”
The statement was one of many pointed rebukes to Republican presidential nominee Donald Trump, who is set to address the convention on Thursday.
Last December, Trump said on a Fox News talk show that U.S. leaders had to “take out [the] families” of terrorists to be effective against them. He later would walk the remark back.
Clinton also took Trump to task for comments disparaging Gold Star father Khizr Khan, who spoke in Clinton’s support at the Democratic National Convention in July, and former prisoner of war Sen. John McCain, whose heroism Trump has questioned, saying in 2015: “I like people who weren’t captured.”
“I will never disrespect Gold Star families or prisoners of war,” Clinton said. “To insult them is just so wrong, and it says a lot about the person doing the insulting.”
Clinton struck a centrist note, acknowledging she spoke to an audience that tended to lean conservative. And she emphasized her commitment to the ideas of American exceptionalism and military strength.
She called her father, Navy veteran Hugh Rodham, a “rock-ribbed” Republican with whom she had never agreed on politics but had learned to converse with civilly.
“I believe we are still Lincoln’s last best hope of Earth … Still Reagan’s shining city on a hill,” she said. “Part of what makes America an exceptional nation is that we are also an indispensable nation. In fact, we are the indispensable nation. My friends, we are so lucky to be American when so many people want to be Americans too.”
She promised to send troops into harm’s way only as a last resort — a statement that drew applause from the convention — and promised to support and develop U.S. alliances, saying they were unmatched by those of competing global powers Russia and China.
“You don’t build a coalition by insulting our friends and acting like a loose cannon,” she said, subtly rebuking Trump, who has been critical of U.S. allies and NATO for not paying their share of defense costs. “You do it by putting in the slow, hard work of building relationships.”
On veterans’ issues, Clinton emphasized her support for reforming the Department of Veterans Affairs, rather than privatizing the system, and pledged to fight to end the national “epidemic” of veterans’ suicide.
Clinton said she would support expanded tax credits for businesses that hire veterans and would promote policies that allow veterans to get credit for military job skills as they transition into the civilian workforce.
She also promised a crackdown on for-profit schools and organizations that prey on veterans and military families. “They should be ashamed of themselves, and we’re going to hold them accountable,” she said.
Clinton touted the endorsements she has received from retired military leaders and Republican national security experts, and promised to cross the aisle to work out a sustainable defense budget plan, denouncing the sequestration cuts, enacted through the bipartisan Budget Control Act, that placed arbitrary caps on defense spending.
“The last thing we need is a president who brings more name-calling and temper tantrums to Washington,” she said.
Most outsiders may not know about an Air Force tradition that gives the hard-charging crew chiefs of some of the most high-tech airplanes in the world a chance to show a little personality.
You might have seen some funny videos or gifs here and there featuring Air Force maintainers directing taxiing aircraft with the flair of a funny dance or outrageous outfit, and you might have wondered how they got away with it without their commander coming down on them like a ton of bricks.
What you’re seeing is “Freestyle Friday,” a military version of “casual Fridays” where Air Force crew chiefs – the tactical aircraft maintainers who coordinate the maintenance and care of the world’s most expensive airframes — are allowed to have a little fun on the job.
Crew chiefs have one of the hardest jobs in the Air Force; one that requires a lot of training, long hours, and a lot of responsibility to make sure the planes are in tip-top shape for their dangerous missions. There’s a reason the crew chief often gets his name on the nose of a plane with the pilot’s.
Some consider Air Force crew chiefs and maintainers the “grunts” of the Air Force, and no one should be surprised when they have a little fun on the flightline during Freestyle Fridays to blow off a little steam.
Crew chiefs have to deal with exhaustion from a high operational tempo, hearing loss from the jet noise on the flightline, and may sometimes feel a little underappreciated by the rest of the maintenance group.
Like most enlisted folks with this level of responsibility, they’re known for blunt talk and a no-nonsense attitude. They take care of the planes they’re charged to maintain very seriously. So it’s no surprise they’re known to be hardasses for doing things their way.
An F-35 Joint Strike Fighter would be able to use its sensors, weapons and computer technology to destroy Russian and Chinese 5th-Generation Stealth fighters in a high-end combat fight, service officials said.
“There is nothing that I have seen from maneuvering an F-35 in a tactical environment that leads me to assume that there is any other airplane I would rather be in. I feel completely comfortable and confident in taking that airplane into any combat environment,” Lt. Col. Matt Hayden, 56th Fighter Wing, Chief of Safety, Luke AFB, Arizona, told Scout Warrior in a special pilot interview.
Furthermore, several F-35 pilots have been clear in their resolve that the multi-role fighter is able to outperform any other platform in existence.
While Hayden was clear to point out he has not, as of yet, flown simulated combat missions against the emerging Russian Sukhoi T-50 PAK FA 5th-Generation stealth fighter now in development or the Chinese Shenyang J-31 5th Generation Stealth aircraft. While he was clear to point out he did not personally know all of the technologies and capabilities of these Russian and Chinese aircraft, he was unambiguous in his assertion regarding confidence in the F-35. In addition, many Air Force officials have cited a strong belief that the F-35 is the best fighter in the world.
Available information says the Russians have built at least 6 prototype T-50 PAK FAs for their Air Force and Navy; the Chinese conducted a maiden test flight of its J-31 in 2012. In addition, China is in pre-production with its J-20 5th-Generation stealth fighter. This fighter, called the Chengdu J-20, made its first flight in 2011, and is expected to be operational by 2018, according to publicly available information and various news reports.
While Hayden did not elaborate on aspects of the J-20, he did say he would be confident flying the F-35 against any aircraft in the world.
“All those other countries (Russia and China) are trying to develop airplanes that are technologically capable as well — from an F-35 perspective. We are no less capable than any airplane and any fighters out there,” Hayden described.
In addition to leveraging the best available technologies on a fighter jet, winning a dog-fight or combat engagement would depend just as much on the air-tactics and decisions made by a pilot, Hayden explained.
“I have not flown against some of those aircraft. When you fight against an airplane, it depends upon the airspeed. If I maximize the effectiveness of an F-35, I can exploit the weaknesses of any other aircraft,” he said.
Many analysts have made the assessment that the J-20 does appear to be closely modelled after the F-35.
In fact, a Defense Science Board report, cited in a 2014 Congressional assessment of the Chinese military, (US-China Economic Security and Review Commission) makes reference to specific developmental information and specs of numerous U.S. weapons systems believed to be stolen by Chinese computer hackers; design specs and technologies for the F-35 were among those compromised by Chinese cyber-theft, according to the report.
An AIN Online report from the Singapore Air Show in February of this year catalogues a number of J-20 features and technologies – including those believed to be quite similar to the F-35.
“The J-20 is a large multi-role fighter with stealthy features similar to those found in the American F-22 and F-35. Although very little is known about its intended purpose, the aircraft appears to offer capability in a number of roles, including long-range interception and precision attack.
In terms of weapon carriage the J-20 has a similar arrangement to that of the Lockheed Martin F-22, comprising two lateral bays for small air-to-air missiles such as the agile, imaging-infrared PL-10, and a large under-fuselage bay for accommodating larger missiles and precision-guided surface attack weapons. The 607 Institute’s new PL-15 active-radar missile is thought to be the primary long-range air-to-air weapon, reportedly having been test-fired from a Shenyang J-16 platform last year. The PL-21, a ramjet-powered weapon in the same class as the MBDA Meteor, is another possibility for the J-20.
The sensor suite includes an electro-optical targeting system (EOTS) and a large-array AESA radar, which was developed by the 14th Institute at Nanjing Research Institute of Electronics Technology (NRIET, 14th Institute), and is possibly designated Type 1475/KLJ-5. Diamond-shaped windows around the fuselage suggest that a distributed aperture infrared vision system is installed.
In the cockpit, the J-20 sports three large color displays, plus other small screens, and a holographic wide-angle head-up display. An advanced datalink has been developed, and a retractable refueling probe is located on the starboard side of the forward fuselage. Much of the avionics suite has been tested by the CFTE (China flight test establishment) aboard a modified Tupolev Tu-204C, in much the same way as the systems of the F-22 were tested in a Boeing 757.”
Regarding the Russian T-50 PAK FA Stealth fighter, numerous reports suggest the aircraft has numerous technological problems and is a 5th generation plane “in name only.”
“Reporting from the Singapore Airshow 2016, IHS Jane’s reports that “Russian industry has consistently referred to the Sukhoi T-50 PAK FA as a fifth-generation aircraft, but a careful look at the program reveals that this is an ‘in name only’ designation.”
This is largely because of a lack of evolutionary technology aboard the plane compared with previous jets that Russia and the US have designed. Indeed, the PAK FA’s engines are the same as those aboard Russia’s 4++ generation (a bridging generation between fourth- and fifth-generation aircraft) Su-35. Additionally, the PAK FA and the Su-35 share many of the same onboard systems.
And even when the PAK FA’s systems are different from the Su-35’s, the plane’s specifications are still not up to true fifth-generation standards.
RealClearDefense, citing Indian media reports that are familiar with a PAK FA variant being constructed in India, notes that the plane has multiple technological problems. Among these problems are the plane’s “engine performance, the reliability of its AESA radar, and poor stealth engineering.”
F-35 Sensor Fusion
Despite various reports about technologies being engineered into the Russian and Chinese 5th-Generation Stealth Fighters, it is in no way clear that either aircraft is in any way comparable to the F-35. Most publicly available information seems to indicate that the F-35 is superior – however, to some extent, the issue remains an open question. More information is likely to emerge once the Russian and Chinese aircraft are operational and deployed.
For example, the Chinese J-20 is cited as having an Electro-Optical targeting system, stealth configuration, datalink, AESA radar and precision weaponry quite similar to the F-35, according to the AIN report.
The computer algorithms woven into the F-35 architecture are designed to leverage early iterations of what could be described as early phases of “artificial intelligence.” Broadly speaking, artificial intelligence refers to fast-evolving computer technology and processors able to gather, assess and integrate information more autonomously in order to help humans make decisions more quickly and efficiently from a position of command-and-control.
“If there is some kind of threat that I need to respond to with the airplane, I don’t have to go look at multiple sensors and multiple displays from multiple locations which could take my time and attention away from something else,” Hayden added.
The F-35 software, which shows images on display screens in the cockpit as well as on a pilot’s helmet-mounted-display, is able to merge results from various radar capabilities onto a single screen for the pilot.
“The F-35 takes from multiple sensors around the airplane and combines them together in a way that is much more manageable and accessible — while not detracting from the other tasks that the pilot is trying to accomplish,” Hayden said.
For instance, the F-35’s Electro-Optical Target System, or EOTS, is an infrared sensor able to assist pilots with air and ground targeting at increased standoff ranges while also performing laser designation, laser range-finding and other tasks.
In addition, the plane’s Distributed Aperture System, or DAS, is a series of six electro-optical sensors also able to give information to the pilot. The DAS includes precision tracking, fire control capabilities and the ability to warn the pilot of an approaching threat or missile.
The F-35 is also engineered with an Active Electronically Scanned Array Radar, which is able to track a host of electromagnetic signals, including returns from Synthetic Aperture Radar, or SAR. This paints a picture of the contours of the ground or surrounding terrain and, along with Ground Moving Target Indicator, or GMTI, locates something on the move on the ground and airborne objects or threats.
Hayden added that the F-35 has been training against other F-35s in simulated combat situations, testing basic fighter maneuvers. Having himself flown other fighter aircraft, he explained that many other F-35 pilots also fly the airplane after having experience flying an F-16, A-10 or other combat aircraft.
“The F-35’s low-observable technology can prevent detection. That is a strength that other airplanes do not have,” he said.
F-35 and F-22
At the same time, senior Air Force leaders have made the point that F-35 technological superiority is intended to be paired with the pure air-to-air dogfighting ability of the service’s F-22 – a stealth aircraft, with its speed, maneuverability and thrust-to-weight ratio, is believed by many to be the most capable air-to-air platform in the world.
“Every airplane has flaws. When you design an airplane, you design an airplane with tradeoffs – give something else up. If I was flying against an adversary in actual combat, my job would be to exploit the enemy weakness and play to my strength. I can compensate for certain things,” Hayden explained. “There is a certain way to fly and fight in an airplane, using airspeed to maximize the turning performance of the airplane.”
During a public speech in 2015, the Air Forces Air Combat Commander, Gen. Hawk Carlisle, said the F-22 is engineered such that it can complement the F-35.
“You will use the F-35 for air superiority, but you will need the raptors to do some things in a high-end fight to penetrate denied airspace,” he said. “The airplane is designed for multi-role capability, electronic warfare and sensors. The F-35 will win against any fourth-generation airplane — in a close-in fight, it will do exceedingly well. There will be a combination of F-22s and F-35s in the future.”
Hayden further elaborated upon these claims, arguing that the F-35 has another set of strategic advantages to include an ability to use internally built sensors. This prevents the need to use external pods on a fighter jet which can add drag, slowing down and restricting maneuverability for an aircraft.
“As an F-35 pilot, I can carry bombs to a target area where I can now take out air-to-ground threats. You have to look at the overall picture of the airplane. The airplane was designed to overwhelm the battlespace in a non-permissive threatening environment where 4th-gen fighters are not going to persist,” he added.
The F-35 is engineered with a 25-mm gun and has the ability to carry and fire a wide range of weapons. The aircraft has already demonstrated an ability to fire an AMRAAM (Advanced Medium Range Air to Air Missile), JDADM (Joint Direct Attack Munition) or GBU 12 (laser-guided aerial bomb), and AIM 9X Sidewinder air-to-air missile.
So-called “Block 3F” software for the F-35 increases the weapons delivery capacity of the JSF as well, giving it the ability to drop a Small Diameter Bomb and 500-pound JDAM.
As a multi-role fighter, the F-35 is also engineered to function as an intelligence, surveillance and reconnaissance platform designed to apprehend and process video, data and information from long distances. Some F-35 developers have gone so far as to say the F-35 has ISR technologies comparable to many drones in service today that are able to beam a “soda straw” video view of tactically relevant combat locations in real time.
Finally, regarding dogfighting, it is pertinent to point out a “War is Boring” report from 2015 which cited an F-35 fighter pilot explaining how an F-16 was able to win a “mock dogfight” against an F-35; the F-35 Joint Program Office disputed this claim, saying the F-35 used in the scenario was in no way representative of today’s operational F-35s. The software, weapons and sensor technologies used in the mock dogfight were not comparable to the most evolved F-35.
Furthermore, F-35 proponents maintained that the aircraft’s advanced computer technology and sensors would enable it to see and destroy enemy fighters from much longer ranges – essentially destroying enemy fighters before they are seen.
The idea is to enable F-35 pilots to see and destroy enemies in the air, well in advance of a potential dogfight scenario. This can be explained in terms of a well-known Air Force strategic concept pioneered years ago by air theorist and pilot Col. John Boyd, referred to as the “OODA Loop,” — for observe, orient, decide and act. The concept is to complete this process quickly and make fast decisions while in an air-to-air dogfight — in order to get inside the enemy’s decision cycle, properly anticipate, and destroy an enemy before they can destroy you.
The F-35 is designed with long-range sensors and data fusion technologies such that, as a fifth-generation aircraft, it can complete the OODA Loop much more quickly than potential adversaries, F-35 advocates claim.
Mission Data Files
Described as the brains of the airplane, the mission data files are extensive on-board data systems compiling information on geography, air space and potential threats in known areas of the world where the F-35 might be expected to perform combat operations, Air Force officials explained.
Consisting of hardware and software, the mission data files are essentially a database of known threats and friendly aircraft in specific parts of the world. The files are being worked on at a reprogramming laboratory at Eglin Air Force Base, Fla., Air Force officials toldMilitary.com last year. The mission data files are designed to work with the aircraft’s Radar Warning Receiver engineered to find and identify approaching enemy threats and hostile fire.
The mission data packages are loaded with a wide range of information to include commercial airliner information and specifics on Russian and Chinese fighter jets. For example, the mission data system would enable a pilot to quickly identify a Russian MiG-29 if it were detected by the F-35’s sensors.
The mission data files are being engineered to adjust to new threat and intelligence information as it emerges. For instance, the system is engineered to one day have all the details on a Chinese J-20 stealth fighter or Russian T-50 PAK FA stealth aircraft.
As a high-visibility, expensive acquisition program, the F-35 has many vocal detractors and advocates; the aircraft has, to be sure, had its share of developmental problems over the years. some of these problems include complications with its main computer system, called ALIS, and a now-corrected engine fire aboard the aircraft. Overall, most critics have pointed to the program’s growing costs, something program officials claim has vastly improved through various money-saving initiatives and bulk-buys.