An F/A-18 Super Hornet landed on the ship at 3:10 p.m. July 28, catching the No. 2 arresting wire of the Ford’s Advanced Arresting Gear system, and took off at 4:37 p.m., launched from catapult one of the Ford’s Electromagnetic Launch System.
“Today, USS Gerald R. Ford made history with the successful landing and launching of aircraft from VX-23 using the AAG and EMALS,” said Adm. Phil Davidson, commander of US Fleet Forces, referring to Air Test and Evaluation Squadron 23. “Great work by the Ford team and all the engineers who have worked hard to get the ship ready for this milestone.”
The July 28 tests appear to show the AAG and EMALS have overcome issues that cropped up during their development — issues with the EMALS prompted President Donald Trump earlier this year to admonish the Navy to return to steam-powered catapults.
The tests were the Ford’s first shipboard recovery and launch of fixed-wing aircraft, said Capt. Rick McCormack, the Ford’s commanding officer. By the end of the day, the Ford had completed four arrested landings and catapult launches.
The Navy says the AAG, a software-controlled system, will offer greater reliability and more safety and interoperability with more aircraft. It also has built-in testing and diagnostic features, meant to reduce maintenance and lower manpower needs.
Navy officials have said the EMALS is designed to provide more energy, reliability, and efficiency while moving away from the traditional steam-powered launching system. In addition to more accurate speed control and better acceleration, the EMALS is designed to work with all current and future carrier aircraft.
Those systems are two of 23 new or modified technologies installed on the Ford, which is the first Ford-class carrier. Two more in-class carriers are planned: the USS John F. Kennedy and the USS Enterprise.
While the World Wide Web was initially invented by one person (see: What was the First Website?), the genesis of the internet itself was a group effort by numerous individuals, sometimes working in concert, and other times independently. Its birth takes us back to the extremely competitive technological contest between the US and the USSR during the Cold War.
The Soviet Union sent the satellite Sputnik 1 into space on October 4, 1957. Partially in response, the American government created in 1958 the Advanced Research Project Agency, known today as DARPA—Defense Advanced Research Projects Agency. The agency’s specific mission was to
…prevent technological surprises like the launch of Sputnik, which signaled that the Soviets had beaten the U.S. into space. The mission statement has evolved over time. Today, DARPA’s mission is still to prevent technological surprise to the US, but also to create technological surprise for our enemies.
To coordinate such efforts, a rapid way to exchange data between various universities and laboratories was needed. This bring us to J. C. R. Licklider who is largely responsible for the theoretical basis of the Internet, an “Intergalactic Computer Network.” His idea was to create a network where many different computer systems would be interconnected to one another to quickly exchange data, rather than have individual systems setup, each one connecting to some other individual system.
He thought up the idea after having to deal with three separate systems connecting to computers in Santa Monica, the University of California, Berkeley, and a system at MIT:
For each of these three terminals, I had three different sets of user commands. So if I was talking online with someone at S.D.C. and I wanted to talk to someone I knew at Berkeley or M.I.T. about this, I had to get up from the S.D.C. terminal, go over and log into the other terminal and get in touch with them…. I said, oh man, it’s obvious what to do: If you have these three terminals, there ought to be one terminal that goes anywhere you want to go where you have interactive computing. That idea is the ARPAnet.”
So, yes, the idea for the internet as we know it partially came about because of the seemingly universal human desire to not have to get up and move to another location.
With the threat of a nuclear war, it was necessary to decentralize such a system, so that even if one node was destroyed, there would still be communication between all the other computers. The American engineer Paul Baran provided the solution to this issue; he designed a decentralized network that also used packet switching as a means for sending and receiving data.
Many others also contributed to the development of an efficient packet switching system, including Leonard Kleinrock and Donald Davies. If you’re not familiar, “packet switching” is basically just a method of breaking down all transmitted data—regardless of content, type, or structure—into suitably sized blocks, called packets. So, for instance, if you wanted to access a large file from another system, when you attempted to download it, rather than the entire file being sent in one stream, which would require a constant connection for the duration of the download, it would get broken down into small packets of data, with each packet being individually sent, perhaps taking different paths through the network. The system that downloads the file would then re-assemble the packets back into the original full file.
The platform mentioned above by Licklider, ARPANET was based on these ideas and was the principle precursor to the Internet as we think of it today. It was installed and operated for the first time in 1969 with four nodes, which were located at the University of California at Santa Barbara, the University of California at Los Angeles, SRI at Stanford University, and the University of Utah.
The first use of this network took place on October 29, 1969 at 10:30 pm and was a communication between UCLA and the Stanford Research Institute. As recounted by the aforementioned Leonard Kleinrock, this momentous communiqué went like this:
We set up a telephone connection between us and the guys at SRI… We typed the L and we asked on the phone,
“Do you see the L?”
“Yes, we see the L,” came the response.
We typed the O, and we asked, “Do you see the O.”
“Yes, we see the O.”
Then we typed the G, and the system crashed… Yet a revolution had begun.
By 1972, the number of computers that were connected to ARPANET had reached twenty-three and it was at this time that the term electronic mail (email) was first used, when a computer scientist named Ray Tomlinson implemented an email system in ARPANET using the “@” symbol to differentiate the sender’s name and network name in the email address.
Alongside these developments, engineers created more networks, which used different protocols such as X.25 and UUCP. The original protocol for communication used by the ARPANET was the NCP (Network Control Protocol). The need for a protocol that would unite all the many networks was needed.
In 1974, after many failed attempts, a paper published by Vint Cerf and Bob Kahn, also known as “the fathers of the Internet,” resulted in the protocol TCP (Transmission Control Protocol), which by 1978 would become TCP/IP (with the IP standing for Internet Protocol). At a high level, TCP/IP is essentially just a relatively efficient system for making sure the packets of data are sent and ultimately received where they need to go, and in turn assembled in the proper order so that the downloaded data mirrors the original file. So, for instance, if a packet is lost in transmission, TCP is the system that detects this and makes sure the missing packet(s) get re-sent and are successfully received. Developers of applications can then use this system without having to worry about exactly how the underlying network communication works.
On January 1, 1983, “flag day,” TCP/IP would become the exclusive communication protocol for ARPANET.
Also in 1983, Paul Mockapetris proposed a distributed database of internet name and address pairs, now known as the Domain Name System (DNS). This is essentially a distributed “phone book” linking a domain’s name to its IP address, allowing you to type in something like todayifoundout.com, instead of the IP address of the website. The distributed version of this system allowed for a decentralized approach to this “phone book.” Previous to this, a central HOSTS.TXT file was maintained at Stanford Research Institute that then could be downloaded and used by other systems. Of course, even by 1983, this was becoming a problem to maintain and there was a growing need for a decentralized approach.
This brings us to 1989 when Tim Berners-Lee of CERN (European Organization for Nuclear Research) developed a system for distributing information on the Internet and named it the World Wide Web.
What made this system unique from existing systems of the day was the marriage of the hypertext system (linked pages) with the internet; particularly the marriage of one directional links that didn’t require any action by the owner of the destination page to make it work as with bi-directional hypertext systems of the day. It also provided for relatively simple implementations of web servers and web browsers and was a completely open platform making it so anyone could contribute and develop their own such systems without paying any royalties. In the process of doing all this, Berners-Lee developed the URL format, hypertext markup language (HTML), and the Hypertext Transfer Protocol (HTTP).
Around this same time, one of the most popular alternatives to the web, the Gopher system, announced it would no longer be free to use, effectively killing it with many switching to the World Wide Web. Today, the web is so popular that many people often think of it as the internet, even though this isn’t the case at all.
Also around the time the World Wide Web was being created, the restrictions on commercial use of the internet were gradually being removed, which was another key element in the ultimate success of this network.
Next up, in 1993, Marc Andreessen led a team that developed a browser for the World Wide Web, named Mosaic. This was a graphical browser developed via funding through a U.S. government initiative, specifically the “High Performance Computing and Communications Act of 1991.″
This act was partially what Al Gore was referring to when he said he “took the initiative in creating the Internet.” All political rhetoric aside (and there was much on both sides concerning this statement), as one of the “fathers of the internet,” Vincent Cerf said, “The Internet would not be where it is in the United States without the strong support given to it and related research areas by the Vice President [Al Gore] in his current role and in his earlier role as Senator… As far back as the 1970s, Congressman Gore promoted the idea of high speed telecommunications as an engine for both economic growth and the improvement of our educational system. He was the first elected official to grasp the potential of computer communications to have a broader impact than just improving the conduct of science and scholarship… His initiatives led directly to the commercialization of the Internet. So he really does deserve credit.” (For more on this controversy, see: Did Al Gore Really Say He Invented the Internet?)
As for Mosaic, it was not the first web browser, as you’ll sometimes read, simply one of the most successful until Netscape came around (which was developed by many of those who previously worked on Mosaic). The first ever web browser, called WorldWideWeb, was created by Berners-Lee. This browser had a nice graphical user interface; allowed for multiple fonts and font sizes; allowed for downloading and displaying images, sounds, animations, movies, etc.; and had the ability to let users edit the web pages being viewed in order to promote collaboration of information. However, this browser only ran on NeXT Step’s OS, which most people didn’t have because of the extreme high cost of these systems. (This company was owned by Steve Jobs, so you can imagine the cost bloat… ;-))
In order to provide a browser anyone could use, the next browser Berners-Lee developed was much simpler and, thus, versions of it could be quickly developed to be able to run on just about any computer, for the most part regardless of processing power or operating system. It was a bare-bones inline browser (command line / text only), which didn’t have most of the features of his original browser.
Mosaic essentially reintroduced some of the nicer features found in Berners-Lee’s original browser, giving people a graphic interface to work with. It also included the ability to view web pages with inline images (instead of in separate windows as other browsers at the time). What really distinguished it from other such graphical browsers, though, was that it was easy for everyday users to install and use. The creators also offered 24 hour phone support to help people get it setup and working on their respective systems.
And the rest, as they say, is history.
Bonus Internet Facts:
The first domain ever registered was Symbolics.com on March 15, 1985. It was registered by the Symbolics Computer Corp.
The “//” forward slashes in any web address serve no real purpose according to Berners-Lee. He only put them in because, “It seemed like a good idea at the time.” He wanted a way to separate the part the web server needed to know about, for instance “www.todayifoundout.com”, from the other stuff which is more service oriented. Basically, he didn’t want to have to worry about knowing what service the particular website was using at a particular link when creating a link in a web page. “//” seemed natural, as it would to anyone who’s used Unix based systems. In retrospect though, this was not at all necessary, so the “//” are essentially pointless.
Berners-Lee chose the “#” for separating the main part of a document’s url with the portion that tells what part of the page to go to, because in the United States and some other countries, if you want to specify an address of an individual apartment or suite in a building, you classically precede the suite or apartment number with a “#”. So the structure is “street name and number #suite number”; thus “page url #location in page”.
Berners-Lee chose the name “World Wide Web” because he wanted to emphasize that, in this global hypertext system, anything could link to anything else. Alternative names he considered were: “Mine of Information” (Moi); “The Information Mine” (Tim); and “Information Mesh” (which was discarded as it looked too much like “Information Mess”).
Pronouncing “www” as individual letters “double-u double-u double-u” takes three times as many syllables as simply saying “World Wide Web.”
Most web addresses begin with “www” because of the traditional practice of naming a server according to the service it provides. So outside of this practice, there is no real reason for any website URL to put a “www” before the domain name; the administrators of whatever website can set it to put anything they want preceding the domain or nothing at all. This is why, as time goes on, more and more websites have adopted allowing only putting the domain name itself and assuming the user wants to access the web service instead of some other service the machine itself may provide. Thus, the web has more or less become the “default” service (generally on port 80) on most service hosting machines on the internet.
The earliest documented commercial spam message on an internet is often incorrectly cited as the 1994 “Green Card Spam” incident. However, the actual first documented commercial spam message was for a new model of Digital Equipment Corporation computers and was sent on ARPANET to 393 recipients by Gary Thuerk in 1978.
The famed Green Card Spam incident was sent April 12, 1994 by a husband and wife team of lawyers, Laurance Canter and Martha Siegal. They bulk posted, on Usenet newsgroups, advertisements for immigration law services. The two defended their actions citing freedom of speech rights. They also later wrote a book titled “How to Make a Fortune on the Information Superhighway“, which encouraged and demonstrated to people how to quickly and freely reach over 30 million users on the Internet by spamming.
Though not called spam, back then, telegraphic spam messages were extremely common in the 19th century in the United States particularly. Western Union allowed telegraphic messages on its network to be sent to multiple destinations. Thus, wealthy American residents tended to get numerous spam messages through telegrams presenting unsolicited investment offers and the like. This wasn’t nearly as much of a problem in Europe due to the fact that telegraphy was regulated by post offices in Europe.
The word “internet” was used as early as 1883 as a verb and adjective to refer to interconnected motions, but almost a century later, in 1982, the term would, of course, be used to describe a worldwide network of fully interconnected TCP/IP networks.
In 1988, the very first massive computer virus in history called “The Internet Worm” was responsible for more than 10 percent of the world’s Internet servers shutting down temporarily.
The term “virus,” as referring to self-replicating computer programs, was coined by Frederick Cohen who was a student at California’s School of Engineering. He wrote such a program for a class. This “virus” was a parasitic application that would seize control of the computer and replicate itself on the machine. He then specifically described his “computer virus” as: “a program that can ‘infect’ other programs by modifying them to include a possibly evolved copy of itself.” Cohen went on to be one of the first people to outline proper virus defense techniques. He also demonstrated in 1987 that no algorithm could ever detect all possible viruses.
Though it wasn’t called such at the time, one of the first ever computer viruses was called “Creeper” and was written by Bob Thomas in 1971. He wrote this virus to demonstrate the potential of such “mobile” computer programs. The virus itself wasn’t destructive and simply printed the message “I’m the creeper, catch me if you can!” Creeper spread about on ARPANET. It worked by finding open connections and transferring itself to other machines. It would also attempt to remove itself from the machine that it was just on, if it could, to further be non-intrusive. The Creeper was ultimately “caught” by a program called “the reaper” which was designed to find and remove any instances of the creeper out there.
While terms like “Computer Worm” and “Computer Virus” are fairly commonly known, one less commonly heard term is “Computer Wabbit.” This is a program that is self-replicating, like a computer virus, but does not infect any host programs or files. The wabbits simply multiply themselves continually until eventually causing the system to crash from lack of resources. The term “wabbit” itself references how rabbits breed incredibly quickly and can take over an area until the environment can no longer sustain them. Pronouncing it “wabbit” is thought to be in homage to Elmer Fudd’s pronunciation of “rabbit.”
Computer viruses/worms don’t inherently have to be bad for your system. Some viruses are designed to improve your system as they infect it. For instance, as noted previously, the Reeper, which was designed to go out and destroy all instances of the Creeper it found. Another virus designed by Cohen would spread itself on a system to all executable files. Rather than harm them though, it would simply safely compress them, freeing up storage space.
Al Gore was one of the so called “Atari Democrats.” These were a group of Democrats that had a “passion for technological issues, from biomedical research and genetic engineering to the environmental impact of the greenhouse effect.” They basically argued that supporting development of various new technologies would stimulate the economy and create a lot of new jobs. Their primary obstacle in political circles, which are primarily made up of a lot of “old fogies,” was simply trying to explain a lot of the various new technologies, in terms of why they were important, to try to get support from fellow politicians for these things.
Gore was also largely responsible for the “Information Superhighway” term becoming popular in the 1990s. The first time he used the term publicly was way back in 1978 at a meeting of computer industry workers. Originally, this term didn’t mean the World Wide Web. Rather, it meant a system like the Internet. However, with the popularity of the World Wide Web, the three terms became synonymous with one another. In that speech, Gore used the term “Information Superhighway” to be analogous with Interstate Highways, referencing how they stimulated the economy after the passing of the National Interstate and Defense Highways Act of 1956. That bill was introduced by Al Gore’s father. It created a boom in the housing market; an increase in how mobile citizens were; and a subsequent boom in new businesses and the like along the highways. Gore felt that an “information superhighway” would have a similar positive economic effect.
Taking a page from the 2006 self-help book The Secret, the United States Air Force believes saying good things about the F-35 Joint Strike Fighter will make them come true. In an eight-page For Official Use Only (FOUO) memo to its public affairs offices, the Air Force gives detailed instructions on how to say only nice things about the troubled weapons system.
The estimated price tag of the 14-year-old Joint Strike Fighter program now tops $1.5 trillion. The Air Force, a service that has trouble keeping track of the cost of its new weapons systems, is pushing the fighter as a weapon designed for the “entire battle space.” The problems with the fighter are mounting, well beyond the battle space.
A recent RAND corporation study found the fundamentals of the F-35 design to be “double inferior to Chinese and Russian designs.” Other comments from the RAND study include: “Inferior acceleration, inferior climb, inferior sustained turn capability. Also has lower top speed.” Earlier in 2015, the F-35 lost a dogfight to the F-16, a jet from the 1970s. If that wasn’t enough, the Air Force and Lockheed only just recently figured out what kept causing their engines to ignite on takeoff. Finally, the Air Force is taking a lot of flak (see what I did there?) from Congress and a community of military members who support the A-10 Thunderbolt II (aka the Warthog). In an effort to put billions toward the F-35, the Air Force is trying to forcefully retire the A-10’s close air support mission in favor of the new stealth fighter, even though the F-35’s gun won’t fire until 2019.
The Air Force Public Affairs Agency’s communications theme is “Lethal, Survivable, and Adaptive.” Lethal is a strange choice for an airframe whose weapons won’t be operational for another four years. Survivable is good to know if you’re piloting a plane whose engine is known to ignite. Adaptive is good for cost sharing with Coalition partners, because all of this stuff is really expensive.
Pictured: a $300 Million Bonfire
It’s so expensive that in July of this year, the USAF released a 20-year strategic forecast titled “America’s Air Force: A Call to the Future,” which calls for an end to big-ticket programs like the F-35. That report says it’s no longer possible to build a strategy advantage with large, expensive programs that take years to complete. Yet Lockheed and the U.S. military hope to produce 2,400 of the F-35s over 20 years.
The public affairs memo coaches public affairs officers how to address other questions, like the fighter’s $400,000 helmet, the advanced technology the U.S. is sharing with 11 countries, or the fact that the F-35 is bad at long range power projection.
After addressing concerns about the F-35, the Air Force believes it will see “U.S. opinion leaders, the American public and international partners are reassured and have confidence in the capability and can articulate why the F-35 is required for national defense.”
The new PWS Diablo AR15 pistols give us the warm ‘n’ fuzzies.
A gear porn bulletin from WATM friends The Mad Duo of BreachBangClear.com.
Remember: At the risk of sounding orgulous, we must remind you – this is just a “be advised”, a public service if you will, letting you know these things exist and might be of interest. It’s no more a review, endorsement, or denunciation than it is an episiotomy.
PWS recently released a limited run of AR15 pistols, and while it’s too late to get one in hand for Christmas, it’s not too late to ask for one. Why? Two reasons:
One, its close kin to the Diablo AR pistol. Diablo, as you already know if you’ve ever watched Talladega Nights, is Spanish for “fightin’ chicken.”
Two, they make snow-dicks at their headquarters during the winter.
True story, and one that might stem from or more of the large number of veterans PWS employs.
There are actually two new pistols, both using the PWS long stroke *snicker* piston system. That system is something of a bastard offspring, merging elements of the Kalashnikov operating system with that of the Stoner. More on that below.
Both pistols use the Maxim Defense CQB Pistol EXC, a so-called “cheek rest” that runs something like $400 by itself. The EXC is a well regarded brace, and its use reduces overall weight.
The pistols are available in .223 Wylde or 300BLK, and with a 7.75 in. or 11.85 in. barrel, but the MK1 MOD1-P (Patrol) version features a forged receiver set with forward assist and uses a KeyMod rail, while the MOD2 uses PicMod, with a proprietary upper receiver with lightening cuts and no forward assist.
Barrels are machined there in-house at the PWS facility in Idaho; they’re rifled with a 1:8 twist.
Now, speaking of bastard offsprings, if you’re not already familiar with the PicMod system from Bootleg, you should check it out. PicMod itself is the love child of Pic rails and KeyMod.
In addition to providing the utilitarianism of having two mounting systems, it will allow you to tuck accessories like a WML in really tight too.
Grunts: utilitarianism. We may not be using that correctly, but you already knew that.
Both weapons ship with the PWS CQB Comp, a muzzle device designed to tame muzzle blast and improve rifle control at short distances.
Here’s a quick look at that long stroke *snicker* piston system:
If you’re looking for more details about the CQB Comp, you can learn more about the various PWS muzzle devices in a blog post from earlier this year on Rogue Dynamics (here). Here’s what they had to say about the CQB:
“At first glance it looks like some gimmicky, wannabe-sound suppressor, but just a few rounds later and it’s clear that this is something else. The CQB was specifically designed for SBRs that would be running in close quarters, with rounds going off inches from friendly forces.”
The final day of work comes upon everyone. Some people take a long lunch with coworkers to hand out gifts and going away mementos. Others choose to quietly go out as they either prepare for retirement or moving on to their next job.
US military pilots take to the skies and soar one last time alongside wingmen from their unit.
Their emotional last day at a unit isn’t just celebrated like a last day at an office. Pilots stick to a tradition that’s as old as the Air Force itself: the final flight, known widely amongst aircrew members as the ‘fini flight.’
The tradition was initially celebrated to accompany milestones in the career of Airmen of all ranks and positions. To find the first documented fini flight, one would have to reach back in history as far as Vietnam, when an aircrew commemorated the completion of 100 missions.
Since then, the way final flights have been celebrated has changed, but the sentiments have remained.
“Traditions such as this are great examples of esprit de corps throughout the Air Force community,” said Steven Frank, 27th Special Operations Wing historian. “It can also help create strong bonds of camaraderie and teamwork among past, current, and future generations of Airmen.”
Today, these final flights are celebrated not for one Airman’s accomplishments but an entire crew’s across the Air Force. They’re used for all ranks and positions to honor their contributions to the unit.
Once the plane lands, it is acknowledged with a formal water salute, where two firetrucks shoot water over the plane creating an arch with plumes of water collapsing down on the plane as it taxis in.
Upon halting the plane, the pilot exits to an immediate barrage of water as their family, friends, and coworkers douse them with fire hoses. Celebratory champagne follows soon after (or whenever their peers decide they had enough water) and thus gives them time to reflect with friends and loved ones on the time they’ve had together at that unit.
Frank says it’s one of the many examples of military cultural institutions that Airmen are proud to participate in.
“Fini flights are just one example of over a hundred years of Air Force traditions and heritage that honors the sacrifices and victories previous generations of Airmen have made to secure our freedoms,” Frank said. “Every Air Force organization continues to make contributions to the Air Force story and the exploration and awareness of each unit’s past can help encourage a sense of increased pride and respect for every Airman’s career field and organization.”
Whether they’re pilots who’ve tallied thousands of hours in a particular aircraft or crew who man weapons that deliver air power, fini flights are a longstanding tradition that remain one of the most exhilarating ways to recognize the very best amongst the Air Force’s ranks.
After testing revealed problems with how standard-issued magazines load certain ammunition into Marine rifles, the Corps has ordered Leathernecks to use the wildly popular polymer-made Magpul PMAG.
“The Magpul GenM3 PMag was the only magazine to perform to acceptable levels across all combinations of Marine Corps 5.56mm rifles and ammunition during testing,” the Marine Corps’ top gear buying office told WATM.
In a Corpswide message released in mid December, Marine Corps Systems Command issued guidance ordering Marines to use the Magpul Industries-made PMAG Gen. M3 with M-16, M-4 and M-27 rifles, as well as the M-249 machine gun.
Industry sources say the issue stems from how the Army’s new M855A1 Enhanced Performance Round feeds from government issued magazines, causing damage to the internal components of the Marine Corps’ M27 — a version of the Heckler Koch 416 rifle.
“It was damaging the feed ramps and the chamber face of the 416,” an industry source told WATM. “It was presenting the M855A1 round at a lower angle and damaging the upper barrel extension.”
In fact, the Army was having its own problems with the standard magazine and the M855A1 round, so it developed a new magazine, dubbed the “Enhanced Performance Magazine” to deal with the issue.
But that one didn’t work for the Corps either.
“The legacy metal 30-round magazines are no longer manufactured and their replacement, the Enhanced Performance Magazine (EPM), does not perform to acceptable levels with all combinations of the Marine Corps’ 5.56mm rifle platforms and ammunition,” the Corps told WATM.
The Corps — along with the Army — had reportedly banned use of after-market magazines, including the PMAG, in 2012 after troops were having problems with poorly-made knockoffs.
Magpul was one of the first companies to introduce polymer-built magazines for M-16s, and M-4s and the PMAG became increasingly popular among soldiers and Marines fighting in Iraq and Afghanistan.
The new PMAG GenM3 takes advantage of 10 years of experience building magazines for a variety of rifles and calibers, incorporating enhanced geometry, better followers and an optimized round-count window, Magpul officials said.
“We haven’t had a single stoppage in any testing of the PMAG GenM3,” a Magpul official told WATM. “We’re happy to help the Marine Corps in a way that enhances the warfighter.”
The Corps is not buying PMAGs to replace all its current magazines, but is instead giving units the option to buy their own.
“There are currently no procurements for any of the 5.56 rifle platforms and as we normally only issue magazines with a new weapon fielding, there are no plans to issue Magpul magazines at the service-level,” the Corps said. “Unit procurement through Defense Logistics Agency is expected to be comparable to current commercial cost on the open market.”
In this day and age, the F-111 Aardvark and its larger variant, the FB-111 Switchblade, are often forgotten. That shouldn’t be the case. Here are four reasons that these planes could still kick a lot of ass.
The F-111 was fast – with a top speed of Mach 2.5, according to GlobalSecurity.org. The FB-111 was also capable of going fast, according to aviation historian Joe Baugher. Not just at high altitudes, but also on the deck. In fact, these planes were designed to deliver a knockout punch at treetop level.
The B-2, B-1B, and B-52 get a lot of press for their huge payloads — anywhere from 51 to 84 Mk 82 500-pound bombs. But the F-111 and FB-111 could each carry 36 Mk 82s. That is nothing to sneeze at. During the Vietnam War, Baugher noted that four F-111s were delivering as many bombs as 20 F-4s.
Baugher notes that the FB-111 could fly over 2,500 miles with four AGM-69 Short-Range Attack Missiles and internal fuel. That is a long reach – without tying up tankers like the KC-135, KC-46, or KC-10. While the AGM-69 is no longer in service, imagine what sort of distant targets could be hit by a squadron of FB-111s carrying AGM-158 JASSMs based at Aviano Air Base in Italy.
The F-111F demonstrated this range in an operational context during Operation El Dorado Canyon, when 18 planes from the 48th Tactical Fighter Wing flew from bases in England around Spain to hit targets around Tripoli. Aviation historian Joe Baugher noted that the mission was about 6,400 miles — the longest fighter mission in history.
The F-111 was very capable with laser-guided bombs, but the planes could also deliver unguided bombs accurately. During Desert Storm, that the F-111Es from the 20th Fighter Wing carried out attacks with conventional “dumb” bombs — and suffered no combat losses doing so.
In short, the Aardvark and the Switchblade had a lot of life left when they were sent to the boneyard in the 1990s. One could imagine that with upgrades to carry JDAMs, AGM-154 JSOWs, and even the AGM-84H/K SLAM-ER systems, that these planes would certainly be a huge assets in today’s global hotspots.
The stark vision of the Four Chaplains with linked arms praying while their ship sank 78 years ago lives on. Today, we honor their courage, devotion and ultimate sacrifice.
It was two years after the United States entered into World War II. The Four Chaplains – who would leave an extraordinary legacy – boarded the SS Dorchester, all coming from completely different backgrounds but completely united in a commitment to bring spiritual comfort to their men.
Chaplain George Fox was a veteran of World War I, having served as a medic. He was highly decorated, having received the Silver Star and Purple Heart for his service. Fox had lied about his age and was just 17 years old when he left for war. When he returned, he finished high school and went to college. He was eventually ordained a Methodist minister in 1934. When war came calling, he volunteered to become an Army Chaplain. On the day he commissioned, his son enlisted in the Marine Corps.
Chaplain and Rabbi Alexander Goode earned his PhD from Johns Hopkins University in 1940, while finishing his studies to become a Rabbi – like his father before him. After the attack on Pearl Harbor, he applied to the Army to become a Chaplain. In 1942, he was selected for Chaplains School at Harvard.
Chaplain Clark Poling was the son of a minister and was ordained as one for the Reformed Church in the late 1930s. After war broke out, he was called to serve. His own father had served as a Chaplain during World War I. He headed to Army Chaplains School at Harvard.
Chaplain John Washington was ordained as a Catholic Priest in 1935, having served the church all his life in some form or another. When the war began, he received his appointment as an Army Chaplain.
All four men from different corners of the country and varied faiths, met at Harvard in 1942 and became friends. A year later they’d be on a ship together, all ready to serve.
On February 3, 1943, the civilian liner SS Dorchester, which had been converted for military service, was en route to Greenland with 902 military members, merchant marines and civilian workers. It was being escorted by Coast Guard Cutters Tampa, Escanaba and Comanche. It was a chilly morning as the new day began and the water temperature was hovering around 34 degrees with an air temperature of 36 degrees.
The Coast Guard alerted the captain of the Dorchester that U-Boats had been sighted and he ordered the crew to sleep in their clothes and life jackets. Most of them ignored it though, because it was either so hot down below or they couldn’t sleep well with the life jackets on.
At 12:55am, a German torpedo struck their ship.
A large number of men were killed instantly from the blast and many more critically injured. It knocked their power and communications out, leaving them unable to radio the other ships for support. By some miracle, the CGC Comanche saw the flash of light from the explosion and headed their way to help. They had radioed the Escanaba for added support, while the Tampa continued its escort of the fleet.
According to records, panic and chaos had quickly set in. Men began throwing rafts over and overcrowding soon set in, causing capsizing into the frigid waters. But four Chaplains became a light in the dark for the terrified men. They spread out throughout the ship comforting the soldiers and civilians, bringing order to the frenzy. As the life jackets were being passed out, they ran out.
The Four Chaplains took theirs off, giving them to the men.
Engineer Grady Clark witnessed the whole thing. Each Chaplain was of a different faith, but worked in unison to serve and save the men.
Despite their orderly work, the ship continued to sink. They helped as many men as they could. When it was obvious the ship was going down, the Chaplains linked arms and began praying together. It was said that the crew in the waters below could hear hymns being sung. Survivors would later report hearing a mix of Hebrew and Latin prayers, melding together in a beautiful harmony as they went under, giving their lives to save the rest.
Of the 902 men, only 230 survived.
Before boarding the ship and leaving to serve, Chaplain Poling asked his father to pray for him. The words were poignant and a deep insight to the character of the man he was and those he died alongside. He asked his father to pray “Not for my safe return, that wouldn’t be fair. Just pray that I shall do my duty…never be a coward…and have the strength, courage and understanding of men. Just pray that I shall be adequate.”
Although many fought for these brave men to receive the Medal of Honor for their bravery and heroism, the stringent requirements prevented it from happening. They all received the Purple Heart and Distinguished Service Cross. In 1961, Congress created the Special Medal for Heroism, The Four Chaplains Medal. It was given to them and them only, never to be awarded again.
If not for a high draft number, Joe Mantegna might have chosen a career in the military instead of a forty-year career in entertainment. On Criminal Minds, Mantegna portrays David Rossi, an ex-FBI agent who was also once a Marine veteran of the Vietnam War. This aspect of his character is especially important to Mantegna, who comes from a military family and is very passionate about military and veterans’ issues.
In the video above, Mantegna talks about his experiences with the military and why veterans mean so much to him. He and freelance writer Danny Ramm also talk about how and why they decided to highlight the plight of homeless veterans in multiple episodes of one of the biggest shows on television.
The CBS procedural is the second highest rated drama on the network. In its tenth season, its ratings are actually rising. The Hollywood Reporter says it is “aging most gracefully” as one of the top ten shows of the Fall of 2014. Mantegna and Ramm decided to use Rossi’s background as a Vietnam veteran to highlight the struggles of homeless veterans.
The Department of Veteran’s Affairs estimates there more than 8,000 homeless veterans living on the streets of Los Angeles. This is the largest population in the United States. They struggle with substance abuse problems, post-traumatic stress, and many chronic health issues.
Two past episodes of Criminal Minds feature subplots about the man who was Rossi and Mantegna’s commanding officer in Vietnam, Harrison Scott, played by the late Meshach Taylor. On the show, Scott is a homeless veteran who transitions with help from the New Directions shelter in Los Angeles. Through Rossi, we get to know Scott, his issues, and the every day problems he and those like him face, living on the streets. Mantegna and Ramm also wanted to bring attention to the New Directions shelter.
New Directions was founded in 1992 to provide services to help these homeless veterans. These services include substance abuse treatment, counseling, education, job training and placement, and parenting classes. Veterans leave New Directions with a savings account, housing, a job, and most importantly, a sense of confidence in the future and a support system to see them through.
A third episode of Criminal Minds will air Wednesday, January 21st with another story about Harrison Scott. In this episode, Rossi discovers his friend has died. He flies to Los Angeles to make funeral arrangements and lay his friend to rest with the honor he deserves. It is also a tribute to actor Meshach Taylor, who died of cancer last year. The episode also feature two real-life three-star generals as well as real veterans instead of extras, with an emphasis on Vietnam-era vets.
Mantegna is also the national spokesman for the campaign to build the National Museum of the United States Army (museums for the Air Force, Marines, and Navy already exist).
Criminal Minds airs Wednesdays at 9/8c on CBS and can be watched at CBS.com.
Staging aircraft carriers offshore or using drones from far away can be great assets in modern warfare. However, sometimes it’s necessary to go back to the basics when responding to a global crisis.
Exercise Swift Response 16, a month-long operation led by US forces, was conducted to keep up with traditional and newer methods of combat. Over 5,000 troops from nations such as France, Germany, Great Britain, and Italy took part in this massive airborne exercise to conduct a rapid-response, joint forcible-entry scenario. While working with their European allies, US forces also participated in notable scenarios, such as staging a base within 18 hours of notification.
Here are several pictures of the multinational airborne exercise:
US Army and Italian paratroopers board a US Air Force C-130J Hercules during exercise Swift Response 16, at Ramstein Air Base, Germany.
A C-130J Super Hercules aircraft from Dyess Air Force Base, Texas, takes off for Germany within several hours’ worth of notice.
British paratroopers conduct a static-line jump.
Dutch Army paratroopers jump into Bunker Drop Zone at Grafenwoehr, Germany.
A US paratrooper with the 82nd Airborne Division lands with his parachute.
A French soldier watches soldiers descend from a Lockheed C-130 Hercules.
US soldiers locate a target on a map.
Multinational soldiers move toward their target.
Multinational soldiers cut through the foliage.
Soldiers weren’t the only ones dropped from the sky. Here, a US soldier prepares to untie a vehicle that had landed in the drop zone.
A US paratrooper radios higher command while conducting defensive operations.
A Polish soldier provides security while conducting defensive planning operations.
Airplanes weren’t the only machines dominating the skies. Here, a United Kingdom Aerospatiale SA 330 Puma conducts an aerial-reconnaissance training mission.
A British Parachute Regiment soldier prepares to load a helicopter while conducting a simulated medical evacuation.
In any real-life war scenario, bridges will be critical to both defensive and offensive forces. Here, military tactical vehicles prepare to engage their targets.
A Polish soldier reloads his weapon while securing a bridge.
Bridges will be fought for, from above and below.
A British soldier provides security while conducting medical-evacuation simulations.
The US wasn’t the only country that brought out their toys. Here, German Bundeswehr soldiers provide security while conducting a mounted patrol.
A French paratrooper aims his antitank weapon at an enemy tank.
A US soldier from the legendary 82nd Airborne Division readies a 60 mm mortar system for a simulated-fire mission.
US soldiers of Chaos Company, 504th Parachute Infantry Regiment, 82nd Airborne Division prepare to move out with their Light Tactical All Terrain Vehicles.
Tomahawks are flying, tensions are rising, and we’re just over here collecting memes and giggling. Here are 13 of our favorite funny military memes from this week, starting with a little shout out to the ships that conducted the strikes:
America has, by far, the largest, most powerful, well-equipped, and best trained military force to ever exist on Earth. This is probably why Americans can’t have any discussion about military spending without talking about which countries in the world can field an Army which even come close to the United States’.
On the list of the top military spenders in the world, it’s a fairly well-known fact the U.S. spends as much on its military as the next five countries on said list, combined. Which is fine by the military, because golf courses, and flat screen TVs (and if you’re in the Marines, a barracks next to a river of sh-t) don’t come cheap.
What’s more valuable than talking about the best armies in the world is talking about the worst armies in the world. What good is all the training, equipment, and resources if a country still fields an army who can’t win? These ten armies make the Salvation Army look like a credible fighting force.
10. Costa Rica
The Costa Ricans have to be at the bottom of the list, as they have no armed forces to speak of. What they do have is an Army of wealthy Westerners who come to teach Yoga to other Westerners visiting Costa Rica. But no one will ever want to invade Costa Rica because these people will have to come with it. Other countries without a military force include Iceland, Mauritius, Monaco, Panama, and Vanuatu, all without the significant number of would-be yogis. Can you imagine a world without military service?
What may have been the 4th largest army in the world under Saddam Hussein is now a shadow of its former self. Despite years of training from U.S. and British forces, as well as $26 billion in investments and military aid, the Iraqi Army has only 26 units considered “loyal.” On top of that, Iraqi lawmakers discovered 50,000 “ghost soldiers” in its ranks — troops who received a paycheck, but never showed up for work. In 2014, ISIS was able to overrun much of Western Iraq as Iraqi troops fled before the Islamist onslaught.
8. North Korea
On the outside, the North Korean Army looks like it’s the priority for the Kim regime. In many ways, it is. The border towns of Panmunjom and Kaesong, as well as Nampo (where a series of critical infrastructure dams make a concerted military effort necessary) and DPRK newsreel footage boast tall, strong-looking North Korean troops with new equipment, weapons, jeeps, and full meals. Deeper inside the Hermit Kingdom, however, the Army starts to look a bit thin. Literally. On a 2012 trip to North Korea, the author found most Korean People’s Army (KPA) troops to be weak and used mainly for conscripted labor. It would have been a real surprise if they all had shoes or could walk in a real formation. Most units appeared lightly armed, if armed at all.
A country is obviously great when it’s known as “Africa’s North Korea” in international relations circles. Eritrea’s armed forces has one of the highest concentrations of conscripted men of any army in the world, which it uses more for forced labor than to secure its borders or fight al-Shabab terrorists. This is the country so great that 2,000 people a month seek asylum in Sudan. Sudan is supposed to be an improvement. SUDAN.
Nigeria is struggling with an ISIS-affiliated insurgency from Boko Haram (of “Bring Back Our Girls” fame). Despite Nigeria’s oil wealth (the Nigerian oil industry is the largest on the continent), its military is ill-equipped to combat this Islamist uprising. One soldier described it to BBC as:
“Imagine me and you are fighting, we both have guns but while you are wearing a bullet proof vest, I’m carrying an umbrella.”
Soldiers in the country’s Northeastern Borno State are so underequipped, their armored vehicles don’t actually move. Some soldiers are known to flee with civilians as they tear off their uniforms.
5. The Philippines
The President of the Philippines vowed to upgrade the country’s aging Navy and Air Force to the tune of $1.7 billion, the Philippine Congress passed a bill appropriating $2 billion for the effort and … that’s it. Despite the Chinese military buildup in the region, with aggressive moves by the Chinese to claim areas and build islands close to the Philippines, the Philippines’ Naval and Air Forces are still nearly 60 years old and its ships are old U.S. Coast Guard cutters.
The Tajik Army is a mess. Unlike other Soviet states after the fall of the Soviet Union, Tajikistan had no native units to absorb into its new independent government. The Tajik military was not built around old Soviet units. The Tajiks were left defenseless with only a Russian peacekeeping force. In 1994, they formed their own Army, which immediately resulted in a Civil War. Just what one might expect from a country whose capital is named “Monday.” Tajiks prefer the Russian Army because the pay is better. Those who are drafted are often kidnapped and then sometimes hazed to death.
Oh how the mighty have fallen. As a landlocked country, the Mongols have no Navy or need of one. Unfortunately they’re also locked between Russia and China and could not possibly defend themselves from either. In fact, if a Russian-Chinese war ever broke out, part of it would likely be fought in Mongolia. The Mongols have sent forces to assist the U.S. in Iraq and Afghanistan, but their expertise is in teaching U.S. troops how to recognize and use (if necessary) old Soviet-built arms and equipment.
2. Saudi Arabia
The Saudis are currently engaged in a coalition military operation in Yemen with the United Arab Emirates (UAE) in an effort to expel Houthi tribesmen from Sana’a and re-establish the Sunni rulers. And they can’t. The Saudis and Emiratis have naval and air superiority, superior training, material, and numbers on the ground, and the backing of U.S. intelligence assets. They’ve been there since March 2015 and the Houthis are still in the capital.
Afghanistan makes the list despite the decade-plus of training from ISAF advisors. The sad truth is that all that nifty training doesn’t make up for the fact that the ANA will likely collapse like a card table when the U.S. leaves Afghanistan — if the U.S. ever leaves Afghanistan. Not that they can’t fight, but they can’t do much else. One advisor told al-Jazeera:
“In fact, talk to any coalition troops on the ground and they will tell you the Afghans can fight, but only after they have been fed, clothed, armed and delivered to the battlefield by NATO.”