Reports that the Jan. 19 special operations intelligence-gathering raid in Yemen that left a Navy SEAL and 30 local civilians dead and six more troops injured was a result of hasty planning are “absolutely incorrect,” the head of U.S. Special Operations Command said Tuesday.
Army Gen. Raymond Thomas briefly addressed reporters after speaking at the National Defense Industrial Association’s Special Operations/Low Intensity Conflict conference outside Washington, D.C. He declined to go into operational details but emphasized that such raids are common and infrequently reported.
The White House has maintained that the raid, which resulted in the first military casualty of President Donald Trump’s administration, was well-planned and executed, but multiple news outlets have cited military sources complaining that the raid was hastily assembled and poorly planned.
Thomas told Military.com he does not categorize such operations as successes or failures, a hotly debated question surrounding the Yemen operation. He said discussion of the raid lacked the context of the frequency of such U.S. operations around the world.
“I don’t think that there’s awareness in the great American public that we’re a country at war, that ISIL and al-Qaida are in countless countries,” he said, using an acronym for the Islamic State. “That an operation like Yemen is what goes on any given night out there. And unfortunately it wasn’t in that context.”
“But in context, I think America needs to know we’re in a tough fight right now,” Thomas said. “We’re making progress, but unless we get governance on the backside of our military efforts, this is going to be a long struggle.”
Thomas, who replaced Army Gen. Joseph Votel as head of SOCOM last March, repeatedly declined to comment on the workings and decision-making of the Trump administration.
But, speaking just hours after news broke late Monday night that retired Army Gen. Michael Flynn had resigned as national security adviser after 24 days in the position, he gave a nod to the tumult at the highest levels of leadership.
“Our government continues to be in unbelievable turmoil. I hope we sort it out soon, because we’re a country at war,” he said.
We Are The Mighty had the great privilege of attending the 2016 DoD Warrior Games to support wounded warriors as they competed with their fellow servicemembers.
The DoD Warrior Games is an adaptive sports competition for wounded, ill and injured service members and veterans. Each year, a different branch of the U.S. Armed Forces hosts the Warrior Games — and this year the Army invited the athletes to compete at the U.S. Military Academy at West Point.
The Warrior Games has athletes representing the Army; Navy; Air Force; Marine Corps; SOCOM and the United Kingdom, competing across several events: sitting volleyball; track and field; archery; wheelchair basketball; shooting and swimming.
Comedian and veteran advocate Jon Stewart emcee’d the Opening Ceremony.
“You are not alone, none of us here are alone,” said Rocky Marciano of Team SOCOM. “This has been a ten-day therapy session for me and I love it.”
Adaptive sports programs have proven to be an excellent form of rehabilitation for service members, providing these wounded warriors with an incredibly supportive community that focuses on performing at a high level despite injuries and illnesses.
The United Kingdom’s participation has been particularly impactful since they’ve been invited to the Warrior Games for the past four years. Brian Seggie of Team UK remarked, “If we’re on the same side, we should not only fight on the same side, we should recover together as well.”
This remarkable community is made possible by the efforts of each branch’s Wounded Warrior program, dedicated sponsors like Deloitte who bring in dozens of volunteers, enthusiastic family and friends and the incredible attitudes of each and every servicemember with the determination to keep moving forward.
The Air Force is now testing new, high-tech sensors, software, electronics and other enemy radar-evading upgrades for its B-2 stealth bomber to preserve its stealth advantages and enable the aircraft to operate more effectively against increasingly capable modern air defenses.
The massive upgrade, designed to improve what’s called the bomber’s Defensive Management System, is described by Air Force developers as “the most extensive modification effort that the B-2 has attempted.”
The Defensive Management System is a technology designed to help the B-2 recognize and elude enemy air defenses, using various antennas, receivers and display processors to detect signals or “signatures” emitting from ground-based anti-aircraft weapons, Air Force Spokesman Capt. Michael Hertzog said in a written statement.
The modernized system, called a B-2 “DMS-M” unit, consists of a replacement of legacy DMS subsystems so that the aircraft can be effective against the newest and most lethal enemy air defenses.
“This system picks up where mission planning ends by integrating a suite of antennas, receivers, and displays that provide real-time situational awareness to aircrew. The DMS-Modernization program addresses shortcomings within the current DMS system,” Hertzog added.
Upgrades consist of improved antennas with advanced digital electronic support measures, or ESMs along with software components designed to integrate new technologies with existing B-2 avionics, according to an Operational Test Evaluation report from the Office of the Secretary of Defense.
The idea of the upgrade is, among other things, to inform B-2 crews about the location of enemy air defenses so that they can avoid or maneuver around high-risk areas where the aircraft is more likely to be detected or targeted. The DMS-M is used to detect radar emissions from air defenses and provide B-2 air crews with faster mission planning information – while in-flight.
Air Force officials explain that while many of the details of the upgraded DMS-M unit are not available for security reasons, the improved system does allow the stealthy B-2 to operate more successfully in more high-threat, high-tech environments – referred to by Air Force strategists as highly “contested environments.”
Many experts have explained that 1980s stealth technology is known to be less effective against the best-made current and emerging air defenses – newer, more integrated systems use faster processors, digital networking and a wider-range of detection frequencies.
Upon its inception, the B-2 was engineered to go against and defeat Soviet air-defenses during the Cold War; the idea was to operate above enemy airspace, conduct attack missions and then return without the adversary even knowing the aircraft was there. This mission, designed to destroy enemy air defenses, was designed to open up a safety zone or “air corridor” for other, less stealthy aircraft to conduct attacks.
In order to accomplish this, B-2 stealth technology was designed to elude lower-frequency “surveillance” radar – which can detect the presence of an aircraft – as well as higher-frequency “engagement” radar precise enough to allow air defenses to track, target and destroy attacking aircraft, developers explained.
It is widely believed that modern air defenses such as these are now able to detect many stealth aircraft, therefore complicating the operational equation for bombers such as the B-2, senior Air Force officials have acknowledged.
These newer air defense technologies are exhibited in some of the most advanced Russian-built systems such as the S-300 and S-400. In fact, according to a report from Dave Majumdar in The National Interest and reports in the Russian media, the Russians are now engineering a new, more effective S-500 system able to hit some stealthy targets out to 125 miles or further.
In fact, The National Interest once cited a Russian media report claiming that “stealth” technology was no longer useful or relevant – a claim that is not believed to be true at all, or is at least unambiguously disputed by many experts and developers familiar with stealth technology.
For this reason, many senior Air Force developers have explained that – moving into the future – stealth technology is merely one arrow in a metaphorical “quiver” of offensive attack capabilities used by the B-2.
Nonetheless, Hertzog explained that upgraded B-2 stealth technology will have a much-improved operating ability and “strategic advantage” against a vastly wider range of air defenses.
“With necessary upgrades, the B-2 can perform its mission regardless of location, return to base safely, and permit freedom of movement for follow-on forces, including other long range strike platforms. Modifications such as the DMS-M are necessary to preserve this strategic advantage against 21st century threats,” Hertzog added.
The DMS-M upgrade does not in any way diminish the stealth properties of the aircraft, meaning it does not alter the contours of the fuselage or change the heat signature to a degree that it would make the bomber more susceptible to enemy radar, developers said.
Many advanced air defenses use X-band radar, a high-frequency, short-wavelength signal able to deliver a high-resolution imaging radar such as that for targeting. S-band frequency, which operates from 2 to 4 GHz, is another is also used by many air defenses, among other frequencies.
X-band radar operates from 8 to 12 GHz, Synthetic Aperture Radar, or SAR, sends forward and electromagnetic “ping” before analyzing the return signal to determine shape, speed, size and location of an enemy threat. SAR paints a rendering of sorts of a given target area. X-band provides both precision tracking as well as horizon scans or searches. Stealth technology, therefore, uses certain contour configurations and radar-absorbing coating materials to confuse or thwart electromagnetic signals from air defenses.
These techniques are, in many cases, engineered to work in tandem with IR (infrared) suppressors used to minimize or remove a “heat” signature detectable by air defenses’ IR radar sensors. Heat coming from the exhaust or engine of an aircraft can provide air defense systems with indication that an aircraft is operating overhead. These stealth technologies are intended to allow a stealth bomber to generate little or no return radar signal, giving air dense operators an incomplete, non-existent or inaccurate representation of an object flying overhead.
Also, the B-2 is slated to fly alongside the services’ emerging B-21 Raider next-generation stealth bomber; this platform, to be ready in the mid-2020s, is said by many Air Force developers to include a new generation of stealth technologies vastly expanding the current operational ranges and abilities of existing stealth bombers. In fact, Air Force leaders have said that the B-21 will be able to hold any target in the world at risk, anytime.
While many senior Air Force officials have made this point in recent years, the ability of the B-21 to strike anywhere in the world, was something emphasized by Lt. Gen. Arnold Bunch, Military Deputy, Office of the Assistant Secretary of the Air Force for Acquisition, told Scout Warrior last year in an exclusive interview.
Naturally, many of the details of these stealth innovations are, by design, not available for public discussion – according to Air Force and Northrop Grumman developers.
The DMS-M program achieved a key acquisition milestone last year, authorizing the program to enter what’s called the Engineering Manufacturing and Development (EMD) phase.
“Major efforts during the EMD phase include the system Critical Design Review, completion of hardware and software development efforts, Integrated Test, and Initial Operational Test and Evaluation. Three aircraft will be modified during EMD to support the successful completion of this phase,” Hertzog explained.
The program plans on achieving 2019 Full Rate Production following this phase in 2019.
The total Research Development, Test and Evaluation funding for B-2 DMS-M is $1.837B to develop four units, Hertzog added.
The B-2 is engineered and built by Northrop Grumman; the major subcontractors on the program are BAE (receivers), Ball Aerospace and L-3 Randtron (antennas), and Lockheed Martin (display processors).
Total procurement funding for the B-2 DMS-M program is $832M to procure 16 additional units.
The Air Force currently operates 20 B-2 bombers, with the majority of them based at Whiteman AFB in Missouri. The B-2 can reach altitudes of 50,000 feet and carry 40,000 pounds of payload, including both conventional and nuclear weapons.
The aircraft, which entered service in the 1980s, has flown missions over Iraq, Libya and Afghanistan. In fact, given its ability to fly as many as 6,000 nautical miles without need to refuel, the B-2 flew from Missouri all the way to an island off the coast of India called Diego Garcia – before launching bombing missions over Afghanistan.
The Air Force plans to arm its fleet of drones and fighter jets with high-tech laser weapons able to incinerate enemy targets from the sky, service officials said.
Aircraft-launched laser weapons could eventually be engineered for a wide range of potential uses, including air-to-air combat, close air support, counter-UAS(drone), counter-boat, ground attack and even missile defense, officials said.
Lasers use intense heat and light energy to precisely incinerate targets without causing a large explosion – and they operate at very high speeds, giving them a near instantaneous ability to destroy fast-moving targets and defend against incoming enemy attacks, Air Force Chief Scientist Dr. Greg Zacharias told Scout Warrior in an interview.
“The promise of directed energy is that electricity is cheap. Plus, you get the speed of light working for you so incoming missiles are easier to shoot at,” Zacharias said.
Air Force Research Laboratory officials have said they plan to have a program of record for air-fired laser weapons in place by 2023.
Ground testing of a laser weapon called the High Energy Laser, or HEL, was slated to take place last year at White Sands Missile Range, N.M., service officials said. The High Energy Laser test is being conducted by the Air Force Directed Energy Directorate, Kirtland AFB, New Mexico.
The first airborne tests are expected to take place by 2021, Air Force officials have said.
The developmental efforts are focused on increasing the power, precision and guidance of existing laser weapon applications with the hope of moving from 10-kilowatts up to 100 kilowatts, Air Force leaders said.
Air Force weapons developers are also working on the guidance mechanisms to enable laser weapons to stay on-track on a particular target, Zacharias added.
Zacharias explained that much of the needed development involves engineering the size weight and power trades on an aircraft needed to accommodate an on-board laser weapon. Developing a mobile power-source small enough to integrate onto a fast-moving fighter jet remains a challenge for laser technology, he added.
“The other part is all the component technology. You are going to give up fuel or some armaments. It is not just getting enough power on board it is getting the aiming technology. Its dealing with turbulent air flow on a high-speed platform,” Zacharias said.
Air Force leaders have said that the service plans to begin firing laser weapons from larger platforms such as C-17s and C-130s until the technological miniaturization efforts can configure the weapon to fire from fighter jets such as an F-15, F-16 or F-35.
Air Combat Command has commissioned the Self-Protect High Energy Laser Demonstrator Advanced Technology Demonstration which will be focused on developing and integrating a more compact, medium-power laser weapon system onto a fighter-compatible pod for self-defense against ground-to-air and air-to-air weapons, a service statement said.
Air Force Special Operations Command has commissioned both Air Force Research Laboratory and the Naval Support Facility Dahlgren to examine placing a laser on an AC-130U gunship to provide an offensive capability.
A key advantage of using laser weapons would include an ability to melt or incinerate an incoming missile or enemy target without necessarily causing an explosion.
Another advantage is an ability to use a much more extended magazine for weapons. Instead of flying with six or seven missiles on or in an aircraft, a directed energy weapons system could fire thousands of shots using a single gallon of jet fuel, Air Force experts explained.
Drones Fire Lasers
Air Force drones will also one day fire high-tech laser weapons to destroy high-value targets, conduct precision strikes and incinerate enemy locations from the sky, senior service officials told Scout Warrior.
When it comes to drones, there does not yet appear to be a timetable for when fired lasers would be operational weapons – however weapons technology of this kind is moving quickly.
Zacharias also said future laser weapons could substantially complement existing ordnance or drone-fired weapons such as a Hellfire missile.
Laser weapons allow for an alternative method of destroying targets, rapid succession of fire, reduced expenditure of dollars and, quite possibly, increased precision, service officials have explained.
For instance, a key advantage of using laser weapons would include an ability to melt or incinerate an incoming missile or enemy target without necessarily causing an explosion. This would be of particular relevance, for example, in air attack such as the current campaign against ISIS over Iraq and Syria.
ISIS fighters are known to deliberately blend in among civilians, therefore making it difficult to pinpoint enemy targets without endangering innocent civilians. Precision attacks without an explosion, therefore, would provide a useful additional tactical option.
Zacharias said laser-armed drones could likely provide an impactful part of an on-the-move arsenal of weapons.
“You might want to put lasers on board so you have a distributed package when you have a bunch of different platforms carrying different parts – of weapons, sensors and even fuel in one very expensive fighter package. It is like having distributed satellite. You could have distributed fighter packages as well,” Zacharias said.
Firing laser weapons would certainly provide a different option than a 100-pound, explosive, tank and building-killing Hellfire missile.
Although firing lasers from drones is expected to be more complicated than arming fighter jets or aircraft with lasers, the existing development of laser weapon technology is quite likely to inform drone-laser development as well.
As technology progresses, particularly in the realm of autonomous systems, many wonder if a drone will soon have the ability to find, acquire, track and destroy and enemy target using sensors, targeting and weapons delivery systems – without needing any human intervention.
While that technology is fast-developing, if not already here, the Pentagon operates under and established autonomous weapons systems doctrine requiring a “man-in-the-loop” when it comes to decisions about the use of lethal force, Zacarias explained.
“There will always be some connection with human operators at one echelon or another. It may be intermittent, but they will always be part of a team. A lot of that builds on years and years of working automation systems, flight management computers, aircraft and so forth,” he said.
Although some missile systems, such as the Tomahawk and SM-6 missiles, have sensor and seeker technologies enabling them to autonomously, or semi-autonomously guide themselves toward targets – they require some kind of human supervision. In addition, these scenarios are very different that the use of a large airborne platform or mobile ground robot to independently destroy targets.
The military has very talented photographers in the ranks, and they constantly attempt to capture what life as a service member is like during training and at war. Here are the best military photos of the week:
The sun rises behind an F-35A Lightning II Aug. 2, 2016, at Eglin Air Force Base, Fla. The F-35A is the latest deployable fifth-generation aircraft capable of providing air superiority, interdiction, suppression of enemy air defenses and close air support, as well as great command and control functions through fused sensors, and will provide pilots with unprecedented situational awareness of the battlespace.
Staff Sgt. Corey Blanar, 455th Expeditionary Communications Squadron, cable and antenna maintenance noncommissioned officer in charge and Patrick Casket, 455th Expeditionary Communications Squadron, cable and antenna maintenance technician, roll a cable reel, Bagram Airfield, Afghanistan, July 30, 2016. The cable team ensures that all cable and wireless systems are installed and maintained and provide command and control (C2) capabilities throughout the base.
Soldiers assigned to 4th Brigade Combat Team move to an assembly area after executing a joint forcible entry exercise at Malemute Drop Zone on Joint Base Elmendorf-Richardson JBER, Alaska, Aug. 23, 2016.
A soldier currently deployed to Kosovo with the KFOR Multinational Battle Group-East, fires at a target during the stress shoot portion of the MNBG-E Best Warrior Competition, Aug. 28, 2016.
PACIFIC OCEAN (Aug. 29, 2016) Marines, assigned to the 31st Marine Expeditionary Unit (MEU), depart the well deck of the amphibious transport dock ship USS Green Bay (LPD 20) in a combat rubber raiding craft (CRRC). Green Bay, part of the Bonhomme Richard Expeditionary Strike Group, is operating in the U.S. 7th Fleet area of operations in support of security and stability in the Indo-Asia-Pacific region.
PACIFIC OCEAN (Aug. 30, 2016) Sailors on board the aircraft carrier USS Carl Vinson (CVN 70) render passing honors to the fast-attack submarine USS Pasadena (SSN 752) as it transits the San Diego Bay. Carl Vinson is currently underway in preparation for an upcoming deployment.
The sun sets over the USS Green Bay (LPD-20) at White Beach Naval Base, Okinawa, Japan, August 21, 2016. Marines of the 31st MEU are currently embarked on ships of the USS Bonhomme Richard Expeditionary Strike Group for a scheduled fall patrol of the Asia-Pacific Region.
Marines with Battalion Landing Team 1st Battalion, 4th Marines and Marine Medium Tiltrotor Squadron 163 (Reinforced), set up security around the back of an MV-22 Osprey during the 11th Marine Expeditionary Unit’s Composite Training Unit Exercise aboard Marine Corps Base Camp Pendleton, California, August 23, 2016. TRAP is one of the standing missions a MEU must be capable of executing during its deployment.
Red Man training held during our in-port time helps keep our law enforcement personnel proficient and trains new members on Coast Guard law enforcement techniques.
On April 1, 1967, the Coast Guard was transferred from the Treasury Department to the newly-formed Department of Transportation, and then to the Department of Homeland Security in 2003, but we have continued our wartime roles in modern conflicts as well.
Hollywood loves to make old fashion bloody war movies that have plenty of entertaining explosions and dramatic death scenes. While entertaining, these can hit pretty close to home for someone who’s been in the fight.
The graphic ones can be particularly realistic, but no matter what, they all represent the sucktitude of war.
Here are five you may want to stay away from before deploying to a combat zone.
1. Saving Private Ryan
Known as one of the most authentic and gruesome openings to a film ever, this Steven Spielberg-directed classic put audiences inside the minds of war-hardened characters as they storm the beaches of Normandy.
I think that guy had eggs for breakfast. (Image by Giphy)
2. Casualties of War
Marty McFly, I mean Michael J. Fox, plays an Army soldier who is coerced by Sgt. Tony Meserve (Sean Penn) to take advantage of a Vietnamese hostage-turned-sex-slave. When he refuses, the whole squad turns against him.
We guess they missed those team building exercises stateside. (Image via Giphy)
3. Hamburger Hill
John Irvin’s 1987 war epic depicts one of the most disastrous friendly fire accidents in the military in the Vietnam war.
Could you imagine that sh*t. (Image via Giphy)
4. The Deer Hunter
Because no one wants to think about the dangers of being a prisoner of war and playing Russian roulette at the same time.
No one wants to get left behind and eventually gunned down by the bad guys.
WHY ME?! (Image via Giphy)
Bonus: Pearl Harbor
This is a good one if you join the service with a buddy. In Micheal Bay’s “Pearl Harbor,” two childhood friends join the military as pilots. As one is off fighting in an aerial dogfight, the other stays back keeping his girlfriend company — eventually knocking her up.
Spoiler alert — he takes about a half dozen bullets for his buddy to buy himself some redemption. That is all.
It’s actually a good way to make things even. (Image via Giphy)
The military has very talented photographers in its ranks, and they constantly attempt to capture what life as a service member is like during training and at war. This is the best of what they shot this week:
An F-16 Fighting Falcon with the 18th Aggressor Squadron prepares to take off from Eielson Air Force Base, Alaska, shortly after sunrise Jan. 24, 2016, in transit to Kadena Air Base, Japan, to participate in training exercises. More than 150 maintainers from the 354th Fighter Wing will keep the Aggressors in the air and prepare U.S. Airmen, Sailors and Marines for contingency operations along with coalition partners in the Pacific theater.
A mine-resistant, ambush protected vehicle, driven by a member of the 451st Expeditionary Support Squadron Security Forces Flight, patrols the flightline as the sun sets on Kandahar Airfield, Afghanistan, Jan. 20, 2016. Security forces members at the airfield are responsible for the security of more than 150 aircraft and $2.2 billion in resources.
Senior Airman Ian Kuhn, a survival, evasion, resistance, and escape (SERE) instructor with the 103rd Rescue Squadron, demonstrates how to build a concealed shelter during a combat and water survival training course at Homestead Air Reserve Base, Fla., Jan. 20, 2016. During this training, aircrew members gained refresher training on using their emergency radios, tactical movements through difficult terrain, how to build shelters, ways to build fires and methods for evading the enemy.
Senior Airman Christopher Gonzales, of the 144th Security Forces Squadron, is welcomed home by Megan Woodby at the Fresno Yosemite International Airport, Calif., Jan. 21, 2016. Gonzales was deployed for more than seven months in support of Operation Freedom’s Sentinel.
Green Berets, assigned to 3rd Special Forces Group-Airborne, exit the water during a beach infiltration training exercise, part of Combat Diver Requalification, in Key West, Fla., Jan. 20, 2016.
Snipers, assigned to 2d Cavalry Regiment, make adjustments on the scope of an M110 semi-automatic sniper system during a field training exercise at Adazi Training Center in Latvia, Jan. 27, 2016.
Soldiers, attached to SOCEUR, U.S. European Command (EUCOM), participate in a night airborne operation near Malmsheim, Germany, Jan. 21, 2016.
Aviation Ordnanceman Airman Valentin Sanchez, from Brownsville, Texas, and Aviation Ordnanceman 3rd Class Zack Smith, from New Caney, Texas, prepare launchers for F/A-18E Super Hornets on USS John C. Stennis’ (CVN 74) flight deck. Providing a combat-ready force to protect collective maritime interests, Stennis is operating as part of the Great Green Fleet on a regularly scheduled Western Pacific deployment.
Personnel Specialist Seaman Dennis Tran, from Riverside, Calif., and Sonar Technician (Surface) 2nd Class Darryl Roberson, from Joliet, Ill., fish off the stern of the guided-missile destroyer USS Stockdale (DDG 106) during a fish call. Providing a combat-ready force to protect collective maritime interests, Stockdale, assigned to the Stennis strike group, is operating as part of the Great Green Fleet on a regularly scheduled Western Pacific deployment.
A Marine undergoing the 2nd Marine Division Combat Skills Center’s Pre-Scout Sniper Course prepares to move during a stalking exercise at Camp Lejeune, North Carolina, Jan. 22, 2016. The exercise required students to traverse approximately 1,000 meters of high grass and fire on a target, all without being detected.
Marines with the Combined Arms Company, Black Sea Rotational Force Bulgarian and Romanian Forces conduct a joint exercise utilizing Bulgarian and U.S. main battle tanks, indirect fire, mechanized infantry, and close air support from U.S. Air Force assets during Platinum Lion 16-2 at Novo Selo Training Area, Bulgaria, Jan. 15, 2016. Exercise Platinum Lion increases readiness and demonstrates our collective ability to operate as a single force committed to protecting the sovereignty of NATO allies and other European partners.
At Air Station New Orleans, we are one of the few units who train for and help support the Rotary Wing Air Intercept (RWAI) mission primarily carried out by Air Station Atlantic City. This National Capital Region air defense mission provides safety and security to not only the federal government and entities within Washington DC but its citizens as well.
Take a ride with U.S. Coast Guard Hawaii Pacific Air Station Barbers Point and Maritime Safety and Security Team Honolulu crews as they train doing hoists.
The cyber threat is now our greatest national security challenge, a 21st Century “weapon of mass destruction” that is currently having serious impacts on America and is getting worse – militarily and economically – across public and private sectors, and socially across all segments of society.
Our adversaries around the globe, from rivals like Russia and China to belligerents including ISIS, Iran, and North Korea, have developed significant cyber capabilities. This “global cyber proliferation” is serious and growing worse by the minute. In the late 1950s and early 1960s, the emerging Cold War’s battlefront included the Space Race with the Russians, and eventually a symbolic American on the moon. Today, we have a similar situation: A “Cyber Space Race” which will represent the dominant high ground for decades to come.
We are being hacked and attacked every day in America. Our personal accounts and lives, our critical infrastructures, and there are undoubtedly many serious incursions that we have not detected or have gone unreported. A few recent examples illustrate this point: State-backed Iranian hackers conducted a denial of service attack against US banks to attack United States infrastructure, and not just the banks themselves.
While America’s public and private sector cyber defenses have grown since the mid-1990s, the threat to all elements of national power has grown even more rapidly. America is at high risk. Of particular concern is our soft commercial-sector underbelly, which comprises 85% of Internet use in the United States. Cyber breaches present an unprecedented and often disastrous risk to the value of commercial entities.
Consider the Target, Home Depot, Sony, and Equifax cyber intrusions. Each cost the companies billions in market valuation, lost revenue, employee productivity, reputation, and expenses. While it is harder to quantify than a stock price, companies and institutions are successful in large part due to trust. An individual company violating that trust with their customers can have devastating effects for that company, but the magnitude of recent data breeches strikes fear in the hearts of all Americans and undermines trust in the fundamental institutions of our society.
Cadets, pay attention — our future could be in your hands. (U.S. AF photo by Raymond McCoy)
Just as techniques and technology developed in America’s space program resulted in innovations benefitting the full range of American life, so, too, can military-grade cyber capabilities be leveraged to harden vulnerable government and commercial entities. Techniques and technologies such as the commercial sector onboarding of military-grade technologies, implementing network segmentation to protect sensitive information, applying advanced encryption techniques to protect large databases, ensuring protection from insider threats, and using advanced analytics to uncover risks to commercial internal or external networks.
America must win the 21st Century “Cyber Space Race.” We must mobilize the entire spectrum of American enterprise, from the cyber education of our children to the highest levels of academia, business, and government. The US commercial sector must do everything possible to protect themselves, their customers, and this nation. This includes using military-grade cyber defense capabilities to ensure commercial viability, thus securing America’s increasingly vulnerable economic engine.
The US Air Force’s push to develop operational flying saucers 60 years ago laid the conceptual groundwork for one of the variants of Lockheed Martin’s F-35, MIT Technology Review reports.
The F-35 comes in three variants, with key mechanical differences for the Air Force, Marines, and Navy – the F-35A, F-35B, and F-35C respectively.
Of the three models, the F-35B is the most technologically different.
Unlike the F-35A and F-35C, the Marines needed their variant to be capable of conducting short take-off and vertical landing (STOVL) operations.
This request necessitated that the F-35B be given a lifting fan. And, as Desire Francine G. Fedrigo, Ricardo Gobato, Alekssander Gobato note in a paper at the Cornell University Library, the F-35B’s lifting fan has its conceptual roots in flying saucers.
Between 1954 and 1961, the US Air Force spent $10 million attempting to develop a flying saucer that became known as an Avrocar. The Avrocar was a vertical and/or short take-off and landing (V/STOL) saucer that was powered by one giant central fan.
Despite its seven years of development, the Air Force failed to make the Avrocar into a mission capable vehicle that could potentially replace helicopters.
MIT Technology Review notes that the aircraft was “hot and almost unbearably uncomfortable for the pilot. And it demonstrated various idiosyncrasies such as taking five seconds to turn 90 degrees to the left but 11 seconds to turn the same amount to the right, presumably because of its central rotating fan.”
However, despite the Avrocars’ failings, the technology did point researchers towards the feasibility of developing and embedding a central lift fan turbine within an aircraft for variations of vertical take-off and landing (VTOL) technology.
“The concept of a lift fan, driven by a turbojet engine is not dead, and lives today as a key component of Lockheed X-35 Joint Strike Fighter contender,” Fedrigo notes, adding that the conceptual framework of the Avrocar helped General Electric’s own development of a booster fan propulsion system.
Whereas the Avrocar’s development ultimately failed, though, GE’s “Vertifan” went on to prove the concept of successful lifting fan technology. This in turn lead to a DARPA sponsored development challenge that gave birth to lifting fans being used in the F-35B.
The F-35B was declared ready for combat by the Marine Corps on July 31.
All Coast Guard National Security Cutters should have ScanEagle drones aboard and available for launch to boost high seas surveillance and aid in drug interdictions and arrests, according to Commandant Adm. Karl Schultz.
Commanders who have used the ScanEagle Unmanned Aerial System, or UAS, have told him, ” ‘I don’t ever want to sail without ScanEagle again,’ ” Schultz said Dec. 7, 2018, at the National Press Club. “I’d like to see every national security cutter have one on the back.”
For the past 17 years, the Coast Guard Research and Development Center has experimented with various types of UAS, including a helicopter drone and MQ-1 Predator, for cutters but found them unsuited for the Coast Guard‘s dual mission of national security and law enforcement.
A ScanEagle unmanned aerial vehicle from ScanEagle Guardian Eight Site sits ready for launch.
(U.S. Navy photo by Lt. Kristine Volk, Resolute Support Public Affairs)
In 2017, the Coast Guard tested a ScanEagle aboard the cutter Stratton on a six-week deployment to the Eastern Pacific. By the end of the deployment, the drone had flown 39 sorties for a total of 279 hours and assisted the crew in seizing 1,676 kilograms of contraband, valued at million. It also aided in the arrests of 10 alleged drug traffickers, according to the service.
The ScanEagle, made by Insitu, a Boeing subsidiary, was developed from a commercial version designed to collect weather data and scan the ocean for schools of fish. The Coast Guard version is about 8 feet long, with a wingspan of 16 feet. The drone is sent aloft by a pneumatic launcher and recovered using a hook and arresting wire.
In June 2018, Insitu announced the signing of a 7 million contract with the Coast Guard for the installation of ScanEagles aboard cutters. In a statement, Don Williamson, vice president and general manager of Insitu Defense, said when ScanEagle initially deployed with the Stratton, “We recognized what an incredible opportunity we had to partner with the U.S. Coast Guard to bring dynamic improvements to mission effectiveness and change aviation history.”
ScanEagle unmanned aerial vehicle conducts flight operation over the USNS Spearhead.
The contract was “an incredibly important first step in realizing the Coast Guard’s vision of fleet-wide UAS implementation,” said Cmdr. Daniel Broadhurst, who has served as unmanned aircraft systems division chief in the Coast Guard’s Office of Aviation Forces.
The fate of the UAS plan and other Coast Guard projects largely will depend on the outcome of the upcoming budget battles in the new Congress, Schultz said Dec. 7, 2018.
Currently, “we’re faced with more demands for Coast Guard services than fiscal resources,” he said.
This article originally appeared on Military.com. Follow @militarydotcom on Twitter.
If there’s any single artistic medium that draws in a remarkable amount of veterans, it’s comic books. Oftentimes, it takes the mind of someone who has served in the military to create a truly believable, relatable superhero.
It’s widely known that many of the godfathers of the comic book industry served in the U.S. military. Stan Lee, Jack Kirby, and Syd Shores, for example, all fought in the Western Front in WWII. But many of the other writers and artists served, too — like these 6 creative minds.
Jim Starlin — Navy
Many of Marvel’s space-themed comics come from the mind of Vietnam War photographer and Navy veteran Jim Starlin. After returning home to Detroit, he initially made a living working on cars. Eventually, he broke into the comic book industry with many originals and revisions to existing cosmic characters.
Drax the Destroyer, Gamora, and even Thanos were all co-created by him. The Marvel Cinematic Universe’s ultimate MacGuffins, the Infinity Stones, and the much of the basis for the latest blockbuster, Avengers: Infinity War, come from Starlin’s storylines.
Humbly enough, she never wrote herself into a comic… even though she kinda earned it.
Alice Marble — OSS
Before becoming one of the first women to play a prominent role in comic books, Alice Marble lived an insane life. Not only was she a world-class tennis player but, during World War II, she served as a spy for the American government. She recovered from being shot in the back by a German agent and started to share her life through the adventures of Wonder Woman.
She served as the associate editor for Wonder Woman and was the creator of the Wonder Women of History strips. These shorts were page-long bookends attached to the end of each Wonder Woman issue that showcased the badassery of one woman per issue.
He’s also responsible for making superheroes jacked as hell under their spandex.
(Photo by Alan Light)
Curt Swan — Army
DC’s most respected artist of the Silver Age served in the Minnesota National Guard during WWII. Curt Swan was activated and deployed to Europe when his peers discovered his amazing gift for drawing. He was immediately reassigned by his superiors to make comics for Stars and Stripes.
After falling in love with a Red Cross worker (who he would eventually marry), Swan got a job at DC Comics, drawing Superman from 1948 until 1986. His ability to convey frenetic superpowers in print, like the iconic wooshings that show speed or the powerful impact bubbles that denote heavy punches, was heavily imitated.
He worked on ‘The ‘Nam’ with the next entry on this list…
Doug Murray — Army
Doug Murray served in Vietnam and later crafted what is considered one of the truest depictions of the war through his series, The ‘Nam. Remarkably, Murray was clever enough to stay true to the horrors and ugly sides of war while also keeping the Comics Code Authority happy.
The ‘Nam wasn’t pretty and touched on many horrific truths of war, but it cleverly hid its punches to get approved for publication. Outside of The ‘Nam, Murray also wrote the Weapon X series, which gave Wolverine his definitive backstory.
The ‘G.I. Joe’ character Tunnel Rat is entirely based on him and his life.
Larry Hama — Army
After fighting in Vietnam as a combat engineer and “tunnel rat,” Larry Hama began a career in acting before coming back to his childhood passion, comic books.
Not only did he work on The Warlord, Wonder Woman, and Batman for DC, but he earned his place as one of the Marvel greats when he took over the G.I. Joe comics and turned it into the deep franchise fans love today instead of just a line of generic military toys. He also co-created The ‘Nam, Wolverine, Punisher: War Zone, and Venom.
Sgt. Rock’s service number was Kanigher’s in real life.
Bob Kanigher — Army
There was a drastic dip in comic book popularity in the 1950s that nearly destroyed the industry. Only kids and troops read comics — and kids started losing interest. The day was saved when an Army veteran by the name of Robert Kanigher burst onto the scene.
He took over Wonder Woman after William Moulton Marston’s death and ushered in the Silver Age of Comics. His works include nearly everything in DC that wasn’t created during the Golden Age. His artistic baby, however, is one of the military and veteran community’s favorite comics, Sgt. Rock.
If you were among the millions of Americans that tuned into the Super Bowl last night, you probably saw the powerful, patriotic ad in the lead up to kick off. Featuring Marine and Medal of Honor recipient Kyle Carpenter, the NFL spot is a video set to Johnny Cash’s spoken word song, “Ragged Old Flag.”
Tracing the flag’s (and America’s) journey through major wars and events, the video also shows images of protest and anger with several shots of the flag being burned before going back to images of the military, first responders and ordinary, everyday Americans.
The video spot struck a nerve immediately with some saying it was a dig at Colin Kaepernick.
Cash released the song as part of his 47th album in 1974, at a time during great turmoil in the USA, much like today. The U.S. was winding down its involvement in Vietnam and was dealing with the Watergate scandal with President Richard Nixon just resigning the office. The song was penned to be an optimistic song for Americans dealing with such tumultuous times.
Cash, an opponent of the war and believer in social justice, had actually met Richard Nixon a couple of years before and performed several songs for him, including an anti-Vietnam War song, “What is Truth” and “The Ballad of Ira Hayes,” a heartbreaking song about one of the Flag Raisers of Iwo Jima and his life as a Pima Indian.
Cash himself would open his concerts with the song and preface it with the following:
“I thank God for all the freedom we have in this country, I cherish them and treasure them – even the right to burn the flag. We also got the right to bear arms and if you burn my flag – I’ll shoot you.”
“Ragged Old Flag” was a hit upon its release with his fans who embraced the message that one can have criticisms of this country but should still respect those people and images that symbolize it. It is a message that resonates with many to this day.
The moving lyrics of the song:
I walked through a county courthouse square On a park bench an old man was sitting there I said, your old courthouse is kinda run down He said, naw, it’ll do for our little town I said, your old flagpole has leaned a little bit And that’s a ragged old flag you got hanging on it.
He said, have a seat, and I sat down Is this the first time you’ve been to our little town? I said, I think it is He said, I don’t like to brag But we’re kinda proud of that ragged old flag
You see, we got a little hole in that flag there when Washington took it across the Delaware And it got powder-burned the night Francis Scott Key Sat watching it writing say can you see And it got a bad rip in New Orleans With Packingham and Jackson tuggin’ at its seams.
And it almost fell at the Alamo
Beside the texas flag, but she waved on though She got cut with a sword at Chancellorsville And she got cut again at Shiloh Hill There was Robert E. Lee, Beauregard, and Bragg And the south wind blew hard on that ragged old flag
On Flanders field in World War one She got a big hole from a Bertha gun She turned blood red in World War Two She hung limp and low a time or two She was in Korea and Vietnam She went where she was sent by Uncle Sam
She waved from our ships upon the Briny foam And now they’ve about quit waving her back here at home In her own good land here she’s been abused She’s been burned, dishonored, denied, and refused
And the government for which she stands
Is scandalized throughout the land And she’s getting threadbare and wearing thin But she’s in good shape for the shape she’s in ‘Cause she’s been through the fire before And I believe she can take a whole lot more
So we raise her up every morning We take her down every night We don’t let her touch the ground and we fold her up right On second thought, I do like to brag ‘Cause I’m mighty proud of that ragged old flag
Ching Shih was born around 1775 in China and became a prostitute in Canton, a province in southwest China, before marrying a pirate leader, taking over his fleet, and growing it until it was able to destroy a combined fleet of Chinese, British, and Portuguese navy ships as well as Dutch mercenary vessels.
Then she accepted amnesty from the Chinese government and walked away with her ill-gotten fortune and a title as Chinese nobility.
Ching attracted the eye of Zheng Yi Sao — a pirate leader with a fleet of a few hundred ships — when she was 26 years old and working as a prostitute. Zheng became smitten with her and either proposed to her in the brothel or ordered her abducted in a raid. (Both stories have been passed forward in the years since the incident.)
Either way, Ching agreed to marriage with a couple of specific requirements, the most important one being that she gain some control over the fleet and a share of its profits.
For the next six years, Ching and Zheng managed the “Red Flag Fleet” together. But Zheng died in a tsunami, leaving Ching in the dangerous position of being a woman atop 600 ships and their crews of outlaws.
Ching focused on the business dealings of the fleet and Chang led the troops in combat. They employed shallow-bottomed boats that attacked coastal villages and conducted raids in rivers while larger junks, the premiere war-fighting and commerce ship in the area at the time, raided merchant shipping and fought the Chinese navy.
The really revolutionary part of their partnership was Ching’s economic foresight. She extorted protection payments on a larger scale than most others and she formed a network of farmers, fisherman, and spies to keep the fleet well supplied and informed. Eventually, Ching took over control of the entire Red Flag Fleet from Chang.
This massive force posed a serious threat to the Qing dynasty, which ordered a fleet constructed to destroy the pirates. Instead, Ching led the combined fleets out and easily dispatched the government forces.
Ching even captured about 63 of the Chinese ships, more than she lost of her own vessels, and pressed most of the crews into service with her own forces. She won the battle so hard, she came out of it with more forces than when she started.
Unsurprisingly, the emperor took his loss personally and ordered the Chinese navy to challenge her fleet. He enlisted the aid of the British and Portuguese navies in the effort and hired Dutch mercenaries to assist.
For the next two years, Ching’s fleets fought their way through the enemy forces, still gaining power and loot despite the ships arrayed against them.
But the writing was on the wall. The dangerous business would hove to end sooner or later, and Ching wanted her and her pirates well set up for it. Some articles on Ching also point to a conflict between the Red and Black Fleets for what happened next.
The emperor offered an amnesty to draw away many of the pirates working in his territory, and Ching herself took him up on it. But, like when she married Zheng, she required a few additional incentives.
First, nearly all of her workers, from the pirates who engaged in combat to the farmers who supplied them, were to get off without punishment. Second, the government had to provide money to help the pirates transition to shore life.
Third, Ching was to receive a title in the Chinese nobility.