The Arctic could become the location of the next phase of an arms race between the United States and Russia – and the Russians have taken an early lead.
According to a report by Reuters, Russian military assets, including Cold War-era bases in the Arctic, are being brought back into service as Vladimir Putin makes a play to control what could be massive reserves of oil. The Russian build-up reportedly includes effort to winterize modern weapons, like the Su-34 “Fullback” strike aircraft and the MiG-31 “Foxhound” interceptor.
According to Globalsecurity.org, the Su-34 is capable of carrying up to eight tons of weapons or a dozen air-to-air missiles, has a crew of two, and saw some combat action over Syria. The Fullback is slated to replace Su-24 Fencers currently serving with the Russian Air Force and Russian Naval Aviation. That site also notes that the MiG-31, an improved development of the MiG-25 Foxbat interceptor, also has a two-person crew, and is capable of firing the AA-9 “Amos” air-to-air missile, which has a range of just under 100 miles. The Foxhound has been upgraded with a new radar.
Also included in the buildup are new icebreakers – including three nuclear-powered icebreakers according to a 2014 World Nuclear News report. In 2015, Port News reported that construction had started on two conventionally-powered icebreakers, while the Barents Observer reported in 2014 that the LK-25 would be delayed by up to two years from a planned delivery date of 2015.
Port News reported in December 2016 that the vessel, now named Viktor Chernomyrdin, wouldn’t be completed until sometime in 2018.
The British news agency noted that the push comes even though a combination of economic sanctions and low oil prices have shelved Russian plans to explore for some of the massive oil and natural gas reserves in the Arctic.
A firewall used by the CIA to communicate with its spies in China compromised their identities and contributed to their executions by the Chinese government, several current and former intelligence officials told Foreign Policy magazine in a report published Aug. 15, 2018.
In a two-year period starting in 2010, Chinese officials began accurately identifying spies working for the US.
Chinese authorities rounded up the suspects and executed or imprisoned them before their handlers were able to determine what was going on.
“You could tell the Chinese weren’t guessing,” one of the US officials said in the report. “The Ministry of State Security were always pulling in the right people.”
“When things started going bad, they went bad fast.”
US intelligence officials cited in the report are now placing the lion’s share of the blame on what one official called a “f—– up” communications system used between spies and their handlers.
This internet-based system, brought over from operations in the Middle East, was taken to China under the assumption that it could not be breached and made the CIA “invincible,” Foreign Policy reported.
Police officer, Beijing, China.
(Photo by Shawn Clover)
“It migrated to countries with sophisticated counterintelligence operations, like China,” an official said.
“The attitude was that we’ve got this, we’re untouchable.”
Intelligence officers and their sources were able to communicate with each other using ordinary laptops or desktop computers connected to the internet, marking a stark departure from some of the more traditional methods of covert communication.
This “throwaway” encrypted program, which was assumed to be untraceable and separate from the CIA’s main communication line, was reportedly used for new spies as a safety measure in case they double-crossed the agency.
Unbeknownst to the CIA, however, this system could be used to connect with mainstream CIA communications, used by fully vetted CIA sources.
According to the report, the vulnerability would have even allowed Chinese intelligence agencies to deduce it was being used by the US government.
The Chinese set up a task force to break in to the throwaway system, Foreign Policy said, but it was unclear how they ultimately identified people.
The consequences for this breach were grim.
About 30 spies were reportedly executed, though some intelligence officials told Foreign Policy that 30 was a low estimate.
The US officials were reportedly “shell-shocked” by the speed and accuracy of Chinese counterintelligence, and rescue operations were organized to evacuate their sources.
The last CIA case officer to meet with sources in China reportedly handed over large amounts of cash in hopes that it would help them escape, Foreign Policy said.
The CIA has since been rebuilding its network in China, but the process has been an expensive and long endeavor, according to The New York Times, which in 2017 first reported on the suspected vulnerability and sources’ deaths.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
The Battle of Stalingrad is widely considered the turning point for the Soviets on World War II’s Eastern Front, and maybe the entire war. From the rubble of Stalingrad came hundreds of small stories each more difficult to believe – yet, still true.
Another eerie, true story to come from the fighting there was the music the Red Army played as propaganda as the two sides fought over the now-infamous city.
In “Stalingrad: The Fateful Siege 1942-1943,” Antony Beevor describes how the NKVD, the Soviet secret police and forerunner to the KGB, set up loudspeakers throughout the city. For weeks, the Soviets played a tango they believed conveyed a sinister mood: “The Tango of Death”
Interspersed with the music was the sounds of a ticking clock and messages in German about how hopeless their position in the city really was or that a German soldier died every seven seconds.
These musical programs were also driven around on vans throughout the city streets. They began with quotes like “Stalingrad, mass grave of Hitler’s army!” then go into the music, clock, and demoralizing quotes. Often times, the ends would be punctuated by the firing of Katyusha rockets at Nazi positions.
The propaganda effect may not have worked the way it was supposed to, but the constant bombardment of audio sure did. The Nazis became increasingly exhausted in “Counting Sheep, the Science and Pleasures of Sleep and Dreams,” Paul Martin quotes German soldiers at Stalingrad, who suffered from extreme exhaustion waiting for the Soviet broadcasts to end.
Doing the math, if a song is roughly four minutes, it will play 15 times in an hour, 360 times in a day, 2,520 times in a week – or 58,680 during the 163-day Battle of Stalingrad. Beevor also notes that the Red Army’s favorite song to play for the visiting Germans was “Zemlyanka” by Aleksey Surkov.
Just in case the Germans found “Tango de la Muerte” more than a little upbeat, that is.
Two U.S. F-22 Raptor stealth fighters intercepted two Russian Su-25 fighter jets Dec. 13, conducting multiple maneuvers, firing warning flares, and, in one instance, aggressively flying to avoid colliding with one another, U.S. officials tell Military.com.
The Su-25s — single-seat, twin-engine aircraft — “flew into coordinated coalition airspace on the east side of the Euphrates River near Abu Kamal, Syria, and were promptly intercepted,” Air Forces Central Command spokesman Lt. Col. Damien Pickart told Military.com in an email.
The F-22s, the U.S.’ most advanced fighter aside from the F-35 Joint Strike Fighter, were in the area providing air cover for partner ground forces conducting operations against the Islamic State, he said.
“The F-22s conducted multiple maneuvers to persuade the Su-25s to depart our deconflicted airspace, including the release of chaff and flares in close proximity to the Russian aircraft and placing multiple calls on the emergency channel to convey to the Russian pilots that they needed to depart the area,” Pickart said.
During one maneuver, a Su-25 flew so close to an F-22 “that it had to aggressively maneuver to avoid a midair collision,” he said.
The F-22 also trailed a Su-35 after it flew across the river into territory deemed unsafe to coalition aircraft.
“The incident lasted approximately 40 minutes before the Russian aircraft flew to the west side of the river. During and following the encounter, coalition leaders at the [Combined Air Operations Center in Al Udeid, Qatar] contacted the Russians on the deconfliction line to de-escalate the situation and avert a strategic miscalculation,” Pickart said.
AFCENT officials said the Russians had “verbally agreed” in November through the deconfliction line that they would remain west of the Euphrates River, and the coalition would operate to the East, he said.
“Since agreeing to this deconfliction arrangement, the Russians have flown into our airspace on the east side of the river 6-8 times per day, or approximately 10 percent of the Russian and Syrian flights,” Pickart noted.
“If either of us needs to cross the river for any reason, we’re supposed to first deconflict via the line,” he said. “It’s become increasingly tough for our pilots to discern whether Russian pilots’ actions are deliberate or if these are just honest mistakes.”
Officials have said recently that coalition aircraft — more than a dozen air forces cooperating to defeat ISIS in Iraq and Syria — are concerned about the shrinking airspace.
“The coalition’s greatest concern is that we could shoot down a Russian aircraft because its actions are seen as a threat to our air or ground forces,” Pickart said. “We train our aircrew to take specific actions and to make every attempt possible to de-escalate the situation wherever possible.”
He continued, “We are not here to fight the Russians and Syrians — our focus remains on defeating ISIS. That said, if anyone threatens coalition or friendly partner forces in the air or on the ground, we will defend them.”
Arcadia, California’s beautiful Santa Anita Racetrack had a different name in 1942: The Santa Anita Assembly Center. It was the largest assembly point for Japanese-Americans on the U.S. West coast as they were forced into internment camps. 19,000 people passed through here on their way to the camps.
In February 1942,then-President Franklin D. Roosevelt issued Executive Order 9066, ordering Japanese Americans to be interned in camps along the west coast. While these camps were being built, those who would be interned were housed at assembly centers like Santa Anita, living in converted horse stalls and other hastily built structures. Santa Anita was guarded, surrounded with barbed wire and filled with searchlights to light the dark nights. In all 110,000 Japanese-Americans were interned on short-notice, closing farms and businesses and abandoning their homes. Eventually, some even enlisted in the Army.
Internees at Santa Anita were told to bring blankets and linens, toiletries, clothing, dishes and cookware, and anything else they could carry. They were forbidden from having anything written in Japanese. The people of Santa Anita developed a large internal economy, complete with jobs, businesses, and a local newspaper. They developed a unique culture of music, arts, and softball teams.
In September 1942, those in Santa Anita were moved to other camps. By November 1942, Santa Anita was completely emptied of internees and then became an Army training camp.
In 1944, the Supreme Court struck down the government’s ability to hold Americans indefinitely and the internees were released. The last of all the camps closed in 1946 and the U.S. government has since paid $1.6 billion in reparations. Now, a simple plaque near the track’s entrance is the only reminder of its place in the history of WWII.
In the video below, James Tsutsui of Laguna Woods, California discusses his experiences at Santa Anita Racetrack during World War II.
I was made aware of the stunning video below by my son Lorenzo, who’s a big LEGO fan. The footage has just been posted by the “Beyond the Brick” Youtube channel and shows the crazy cool MCAS Marine Corps Air Station that Paul Thomas put on display at Bricks by the Bay 2019, an annual gathering of LEGO builders, enthusiasts and fans held in Santa Clara in mid-July.
The LEGO diorama was inspired by Marine Corps Air Ground Combat Center Twentynine Palms but it’s (obviously) not a replica: it is a fictional representation of a U.S. Marine Corps base with aircraft and vehicles that you could find at an MCAS. Thomas created the 10 x 7.5 feet diorama in modules (since his garage could not accommodate it all) in about 6 months.
Another view of the Marine Corps Air Station by Paul Thomas.
(Screenshot from Beyond the Brick’s YT video)
Along with F-35B Lightning II jets, there are MV-22 Osprey tilt-rotor aircraft, CH-53E Super Stallion and AH-1Z Viper helicopters as well as a rotating radar, a security checkpoint at the gate of the base, hangars used for inspection and maintenance activities, various vehicles and much more.
Pretty impressive, isn’t it?
US Marines Air Base in LEGO | Bricks by the Bay 2019
The Turkish military apparently staged a coup on Friday night,deploying military into the streets of Istanbul and Ankara, Turkey’s largest city and capital, respectively.
“Turkish Armed Forces have completely taken over the administration of the country to reinstate constitutional order, human rights and freedoms, the rule of law, and the general security that was damaged,” a statement, published by a group calling itself the “Peace at Home Council” on TRT, Turkey’s state-run broadcaster, read.
But Turkish citizens began flooding the streets in support of President Tayyip Recep Erdogan after he called for citizens to gather and repel the coup.
The military in Turkey has forced out four civilian governments since 1960.
1971: The military stepped in amid economic and socio-political troubles. The chief of the general staff gave a memorandum to the prime minister, who resigned shortly thereafter. The military then had a “caretaker” government installed.
1980: The chief of the general staff announced the coup on the national channel during a time of economic stress. The years following this coup “did bring some stability,”according to Al Jazeera, but the “military also detained hundreds of thousands of people; dozens were executed, while many others were tortured or simply disappeared.” Notably, while this was “the bloodiest military takeover in Turkey’s history,” it was also “highly supported by the public, which viewed military intervention as necessary to restore stability,” according to Dr. Gonul Tol, writing in Foreign Affairs.
1997: The military issued “recommendations” during the National Security Council meeting. Al Jazeera writes that the prime minister agreed to some measures, such as compulsory eight-year education. He resigned soon after. This is often referred to as the “post-modern” coup.
“E-coupe” in 2007: The military posed an ultimatum on its website to warn the Justice and Development Party (AKP) against backing Abdullah Gul for president. He belonged to an Islamist government. “The public and the AKP were outraged, and Gul was elected,” noted Tol in Foreign Affairs. “The military’s attempt to intervene against a popular party dealt a serious blow to its standing in society, and in an early vote held right after the e-coup, the AKP increased its vote share by 13%.”
As for 2016 …
Even though Turkey has seen a few military coups in recent decades, there are some notable differences between the ones in the past and the current one.
“[T]he situation is still very fluid but this is a very atypical coup. In the past, the military acted on calls from the people and staged a coup against an unpopular government. That is not [the] case today. The AKP and Erdogan might be very polarizing and might have alienated an important segment of society, but they still have the backing of almost 50% of the population. And we also have not seen large-scale calls for a military intervention, security collapse, chaos, the factors that played an important role in past coups. Also missing in this coup is the chain of command. In the past, the top brass went on TV right after the coups and explained [to] the public the reasons for the intervention. That has not happened yet. So this coup might not have the backing of the top brass.”
As an endnote, Tol added that “if Erdogan survives this, his hand will be even more strengthened and he will be able to convince people more easily that a presidential system is necessary.”
The first new National Cyber Strategy in 15 years is built on four pillars: protecting the American people, the homeland and the American way of life; promoting American prosperity; preserving peace through strength; and advancing American influence.
“We cannot ignore the costs of malicious cyber activity — economic or otherwise — directed at America’s government, businesses and private individuals,” President Donald J. Trump said in a statement Sept. 20, 2018, announcing the new strategy. “Guided by this [strategy], the federal government will be better equipped to protect the American people, the American homeland, and the American way of life.
“Through it,” he continued, “we will accomplish critical security objectives while supporting American prosperity, preserving peace through strength and advancing American influence. Informed by the strategy’s guidance, federal departments and agencies will more effectively execute their missions to make America cyber secure.”
The strategy highlights the critical and growing threat that malicious cyber actors pose to U.S. national security. “The Defense Department stands ready, as part of the synchronized whole-of-government approach articulated in the National Cyber Strategy, to preserve peace through strength by identifying, countering, disrupting, degrading, and deterring behavior in cyberspace that is destabilizing and contrary to U.S. national interests,” DoD officials said in a statement, adding that the department’s focus is on preserving U.S. superiority in cyberspace and defending forward to disrupt the activities of malicious cyber actors before they reach U.S. networks.
Cyber professionals discuss best practices for cyber protection teams during Cyber Protection Team Conference 18-1 at Joint Base San Antonio-Lackland, Texas, June 27, 2018. U.S. Cyber Command cyber protection teams defend national and Defense Department networks and systems against threats.
(Air Force photo by Tech. Sgt. R.J. Biermann)
DoD also is strengthening its defensive posture through network hardening, improved cybersecurity and working with its international allies and partners, in addition to its Defense Industrial Base and Defense Critical Infrastructure partners to secure critical information and infrastructure, the Pentagon statement noted.
Protecting America’s networks
Officials said the strategy will:
Protect American networks by securing federal networks and information and the nation’s critical infrastructure;
Combat cybercrime and improve incident reporting;
Promote American prosperity by fostering a vibrant and resilient digital economy;
Protect American ingenuity from threats such as intellectual property theft;
Develop a superior cybersecurity workforce through education and recruitment; and
Stand up to destabilizing behavior in cyberspace by promoting responsible behavior among nation states, working to ensure consequences exist for irresponsible cyber behavior, launching an international Cyber Deterrence Initiative and exposing and countering online malign influence and information campaigns.
The National Cyber Strategy will promote an open and secure internet by encouraging other nations to advance internet freedom and advance a multi-stakeholder model of internet governance, officials said, and also will promote open, interoperable, reliable and secure communications infrastructure in addition to opening overseas markets for American ingenuity and building international cyber capacity.
Protecting the people, homeland, way of life
The strategy notes that pursuing the objectives of the first pillar will require the U.S. government, private industry and the public to take immediate and decisive actions to strengthen cybersecurity, with each working on securing the networks under their control and supporting each other as appropriate.
For the government’s part in that effort, the strategy says, the administration will act to further enable the Department of Homeland Security to secure federal department and agency networks, with the exception of national security systems and Defense Department and Intelligence Community systems.
The government also will align its risk-management and information technology technologies, improve risk management in the federal supply chain, strengthen federal contractor cybersecurity, and ensure the government leads in best and innovative practices.
Promoting American prosperity
The strategy’s second pillar seeks to preserve U.S. influence in the technological ecosystem and the development of cyberspace as an open engine of economic growth, innovation and efficiency.
To enhance the resilience of cyberspace, the administration expects the technology marketplace to support and reward the continuous development, adoption and evolution of innovative security technologies and processes and will work across stakeholder groups, including the private sector and civil society, to promote best practices and develop strategies to overcome market barriers to the adoption of secure technologies.
Preserving peace through strength
Challenges to U.S. security and economic interests from nation states and other groups, which have long existed in the offline world, are now increasingly occurring in cyberspace, the new strategy notes, adding that this now-persistent engagement in cyberspace is altering the strategic balance of power.
As part of the National Cybersecurity Strategy’s third pillar, cyberspace will no longer be treated as a separate category of policy or activity disjointed from other elements of national power. The United States will integrate the employment of cyber options across every element of national power to Identify, counter, disrupt, degrade, and deter behavior in cyberspace that is destabilizing and contrary to national interests, while preserving United States overmatch in and through cyberspace.
Advancing American influence
In outlining its fourth pillar, the strategy says the world looks to the United States, where much of the innovation for today’s internet originated, for leadership on a vast range of transnational cyber issues.
The United States will maintain an active international leadership posture to advance American influence and to address an expanding array of threats and challenges to its interests in cyberspace, the strategy says. Collaboration with allies and partners is part of this pillar, which the strategy says is essential to ensuring continued benefit from cross-border communications, content creation and commerce generated by the internet’s open, interoperable architecture.
This pillar’s objective, the strategy says, is to preserve the internet’s long-term openness, interoperability, security, and reliability, which supports and is reinforced by U.S. interests.
According to press reports and official reports, two drones armed with explosives detonated near Venezuelan President Nicolas Maduro on Aug. 4, 2018, in an apparent assassination attempt that took place while he was delivering a speech to hundreds of soldiers, live on television.
The assailants flew two commercial drones each packed with 1 kilogram of C-4 plastic explosive toward Maduro: one of the drones was to explode above the president while the other was to detonate directly in front of him, said Interior Minister Nestor Reverol who also added the military managed to divert one of the drones off-course electronically whereas the other one crashed into apartment building two blocks away.
After a series of conflicting reports (the thruthfulness of the official claims is still debated), a video allegedly showing the detonation of the second of two commercial drones carrying explosive was published by Caracas News 24 media outlet:
Whilst some sources have contested the official line on the event saying the Venezuelan president might have staged the attack to purge disloyal officials and journalists, David Smilde of the Washington Office on Latin America said the amateurish attack doesn’t appear to be staged by Maduro’s government for political gain. This would confirm the one in Caracas on Aug. 4, was the first use of drone on a Head of State.
“The history of commercial drone incidents involving heads of state goes back to September 2013 when the German Chancelor Angela Merkel’s public appearance was disrupted by a drone, which was apparently a publicity stunt by a competing political party,” says Oleg Vornik, Chief Executive Officer at DroneShield, one of the companies that produce counterdrone systems, in an email. “Yesterday’s apparent drone assassination attempt on Venezuelan President Maduro is the first known drone attack on a head of state. An attempted drone assassination of a sitting sovereign leader demonstrates that, sadly, the era of drone terrorism has well and truly arrived”, Vornik comments.
Currently available counterdrone (C-UAS) systems provide early detection, analysis and identification, alerting and termination of the threatening drones by means of portable or highly mobile solutions (even though there are also C-UAS systems in fixed configuration). The drone is usually disabled by means of EW (Electronic Warfare), by disrupting multiple RF frequency bands simultaneously denying radio signals from the controller, making Live Video Feed and GPS signal unavailable to the remote operator.
China’s first homegrown aircraft carrier and the first of the country’s new missile destroyers set sail for sea trials recently, sparking speculation that a new carrier battle group may be in the making.
The first of China’s advanced Type 055-class guided-missile destroyers — apparently the Nanchang — set sail Aug. 24, 2018, from the Jiangnan Shipyard in Shanghai, according to the China Daily. The Type 001 aircraft carrier, China’s first indigenously produced carrier and the country’s second after the Liaoning, followed suit Aug. 27, 2018.
The focus of the carrier trials, the second in 2018, will be the ship’s propulsion systems, but Chinese analysts believe these trials could also look at command, communication, and management systems, as well as the ship’s navigation and weapons systems, the Global Times reported.
The Type 055 destroyer displaces 10,000 tons and is considered to be the largest and one of the most advanced noncarrier warships in Asia. The ship is expected to play a role similar to that of America’s Ticonderoga-class cruisers and Arleigh Burke-class destroyers and serve as a key escort for China’s aircraft carrier battle groups, according to the South China Morning Post.
The powerful Chinese destroyers, which are closer in size to cruisers, feature X-band radar and 112 vertical launch cells set up to fire HHQ-9 long-range surface-to-air missiles, YJ-18 anti-ship cruise missiles, CJ-10 land-attack cruise missiles, and missile-launched submarine torpedoes. The ships are also armed with 130 mm dual-purpose naval guns and carry two anti-submarine helicopters.
The Type 055 destroyer’s primary rival is said to be the US Navy’s Zumwalt-class destroyer, which boasts a wide range of advanced capabilities superior to anything China possesses.
The Type 001A aircraft carrier, while similar to its refitted Soviet-era predecessor, is “improved in some places,” Matthew Funaiole, a fellow with the China Power Project at the Center for Strategic and International Studies, recently told Business Insider. “It has a newer radar, it’s a little bit bigger, the flight deck is a little bit bigger, the island is a bit smaller, so they have more space. It definitely has some upgrades on it.”
More advanced carrier capabilities are unlikely, though, until the unveiling of China’s third carrier, which is commonly referred to as the Type 002.
The two ships, the Type 001A and the Type 055 destroyer, are expected to be delivered to the People’s Liberation Army Navy within the next year or so, according to Chinese military experts. The Type 055 destroyer would most likely serve as an escort ship for the Type 001A carrier, creating a new carrier battle group with advanced combat capabilities.
The development of such platforms allows China to gain greater experience with carrier operations as it seeks to project power at greater distances beyond its shores.
Featured image: Artist’s impression of type 055 destroyer.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
So, everyone thinks they want to retire, right? And, eventually, we all have to, but there’s a bunch of stuff TAPS and all those other “courses” just don’t prepare you for. Life changes in some pretty big ways that have absolutely nothing to do with pay and benefits.
We are required to attend the out-briefing classes: the financial preparedness (yawn) death-by-lectures, differences between all the different Tricare options (pick Prime), how your BAH stops (Wait. What?), and the drop-dead date you have to go get your new, shiny retirement ID.
Which is no joke, because I totally ignored it. Then a month later, I couldn’t get on base because that new little scanner gizmo the gate guards all now use said, *BEEP!* Intruder alert! This lady needs a retired ID. She’s being an active duty poser.”
I was rebuffed. Shocked. Pissed off just a bit. But, then I got my stupid retired ID like they told us to. (Not without rolling my eyes, though.)
Here are the main things I wish they had told me:
1. For the first year, there was a part of my husband that just wanted to go back on active duty
Maybe it was the familiarity, or the “dudes,” or the routine lunches at McAlister’s Sandwich Shop, but he honestly missed the Navy. It wasn’t until we got over the first year that who he is as a retired Navy pilot began to form and shape who he is now. It was hard to watch him navigate his life without the true north being the US Navy. (Note: that goes away eventually, by the way. Then, you’ll wonder why the hell you didn’t retire sooner.)
2. While I missed him when he was deployed, him being around all the time has its downsides
While I, honestly and for true, really, really did miss him when he was deployed, I had also gotten used to not having him around all the time. So, the first month of him being retired was a huge adjustment. I actually had to cook every morning, noon and night. And, I had to adjust to him just being there all the time. All. The. Time. “What’s for lunch?” (Me: looking around thinking ‘who is this guy wanting food in the middle of the day?’) Trust me. We were all safer removing all weapons and dulling down any sharp objects that first month or six months or year.
3. It might sound weird, but I miss the smell of the military
I miss the smell of the Navy. I know, it’s weird. But, it’s also true. Smell is the strongest sensory trigger for memory. There was something in the clothes (JP5?), or in the air, (also JP5) or something (it’s totally JP5) … whatever it was, the allure of Au De Navy was and is sorely missed. Our house just smells so civilian now.
4. At the moment your husband retires, your former shipmates will consider you struck stupid on military topics
All your knowledge and infinite wisdom somehow evaporated, or was some way captured in the picture they used for that retired ID I mentioned above. Whatever the phenomenon, it’s a real thing. Within the first 48 hours, I heard, “How would you know? Your husband is REEE-TIIIIRREEDD” at least twice.
5. He’s going to grow a beard. So, suck it up and deal
Now, me personally, I love beards. It was not some sort of hardship on me. Quite the contrary. But, give it a rest and let him do it. Don’t bitch. Just let him grow the damn beard and be grateful he isn’t a man-baby with no whiskers. He’ll have to shave it (probably) eventually, but this is his last stand. Let him have this moment.
The Army is working on a future Bradley Fighting Vehicle variant possibly armed with lasers, counter-drone missiles, active protection systems, vastly improved targeting sights, and increased on-board power to accommodate next-generation weapons and technologies.
Also designed to be lighter weight, more mobile, and much better protected, the emerging Bradley A5 lethality upgrade is already underway — as the Army works vigorously to ensure it is fully prepared if it is called upon to engage in major mechanized, force-on-force land war against a technically advanced near-peer rival.
As the Army pursues a more advanced A5, engineered to succeed the current upgraded A4, it is integrating 3rd Generation Forward Looking Infrared sensors for Commanders and Gunners sights, spot trackers for dismounted soldiers to identify targets and an upgraded chassis with increased underbelly protections, and a new ammunition storage configuration, Col. James, Schirmer Project Manager Armored Fighting Vehicles, said earlier this Fall at AUSA.
BAE Systems, maker of the Bradley, told Warrior the platform’s modernization effort is designed in three specific stages. The first stage in the modernization process was the Bradley Track Suspension to address suspension upgrades, BAE statements said. The subsequent Bradley A4 Engineering Change Proposal, soon to enter production, improves mobility and increases electrical power generation. More on-board power can bring the technical means to greatly support advanced electronics, command and control systems, computing power, sensors, networks, and even electronic warfare technologies.
Maj. Gen. David Bassett, former Program Executive Officer for Ground Combat Systems, described the upgrades in terms of A3 and A4 focusing upon the Bradley from the turret ring down — leading the A5 effort to more heavily modernize Bradley systems from the turret up. This includes weapons sights, guns, optics, next-generation signals intelligence, and even early iterations of artificial intelligence, and increased computer automation.
During several previous interviews with Warrior, Bassett has explained that computer-enabled autonomous drones will likely be operated by nearby armored combat vehicles, using fast emerging iterations of artificial intelligence. These unmanned systems, operated by human crews performing command and control from nearby vehicles, could carry ammunition, conduct reconnaissance missions, test enemy defenses or even fire weapons – all while allowing manned crews to remain at a safer stand-off distance. At one point, Bassett told Warrior that, in the future, virtually all armored vehicles will have an ability to be tele-operated, if necessary.
Also, while Army Bradley developers did not specifically say they planned to arm Bradleys with laser weapons, such innovation is well within the realm of the possible. Working with industry, the Army has already shot down drone targets with Stryker-fired laser weapons, and the service currently has several laser weapons programs at various stages of development. This includes ground-fired Forward Operating Base protection laser weapons as well as vehicle-mounted lasers. A key focus for this effort, which involves a move to engineer a much stronger 100-kilowatt vehicle-fired laser, is heavily reliant upon an ability to integrate substantial amounts of mobile electrical power into armored vehicles.