US military strategists at the Pentagon have a military solution in place to address the growing threat emanating from North Korea, but they are holding their fire in favor of ongoing diplomatic efforts by Washington and its allies, Defense Secretary James Mattis said August 10.
The Pentagon chief remained largely mum on the details of that military solution, which theoretically would curb Pyongyang’s efforts to develop a nuclear-capable, ballistic missile arsenal, except to say any military option would be a multilateral one involving a number of regional powers in the Pacific.
“Do I have military options? Of course, I do. That’s my responsibility, to have those. And we work very closely with allies to ensure that this is not unilateral either … and of course there’s a military solution,” Mr. Mattis told reporters en route to meet with senior leaders in the technology sector in Seattle and California.
The former four-star general declined to provide any additional insight to a statement released August 9, warning that the North’s continued provocations — including alleged plans for an attack against US forces in Guam by Pyongyang — “would lead to the end of its regime and the destruction of its people.”
Instead, Mr. Mattis reiterated that the administration’s diplomatic efforts to quell tensions on the peninsula remained the top priority for the White House.
“We want to use diplomacy. That’s where we’ve been, that’s where we are right now. and that’s where we hope to remain. But at the same time, our defenses are robust” and ready to take on any threat posed by the North Korean regime, Mr. Mattis said.
US defense and national security officials have repeatedly touted the capabilities of the US missile defense shield over the last several weeks, in the wake of a pair of successful test launches by North Korea of its latest intercontinental ballistic missile in July. President Trump has made revamping US missile defense systems a top objective for the Pentagon since taking office.
That impetus has only grown among administration officials amid reports this week that Pyongyang had built a nuclear warhead small enough to fit atop one of the country’s long-range missiles.
On August 9, Mr. Trump threatened to rain down “fire and fury like the world has never seen” if North Korea did not curb its nuclear programs. In response, North Korea announced it was developing plans for a missile strike against Guam.
On August 10, Mr. Mattis declined to comment whether he was taken aback by Mr. Trump’s harsh rhetoric.
“I was not elected, the American people elected the president,” he said. “I think what he’s pointing out is simply these provocations … [and] his diplomatic effort to try and stop it,” Mr. Mattis said.
As North Korean leader Kim Jong Un has sought to raise his international standing, a figure seen by his side almost constantly during his meetings with world leaders is none other than his younger sister Kim Yo Jong.
Kim Yo Jong appeared destined for a powerful career from a young age. Kim Jong Il once bragged to foreign interlocutors in 2002 that his youngest daughter was interested in politics and eager to work in North Korea’s government.
It’s completely unclear where she was or what she was up to between 2000 and 2007.
In the following years, she conducted a lot of behind-the-scenes work for her father, Kim Jong Il, and brother Kim Jong Un. She played a particularly significant role in helping Kim Jong Un take over instead of his older brothers.
Her first public appearance was in 2011 at Kim Jong Il’s funeral.
Kim Yo Jong’s first recorded public appearance: The North Korean princess appeared among the mourners at her father’s funeral at the end of 2011.pic.twitter.com/GWPw4dgbZU
Kim Yo Jong made headlines in 2017 after she was promoted to a top position in her brother’s government: the head of the propaganda department of the Workers’ Party of Korea.
That’s not just a fancy title — Kim Yo Jong plays a crucial role in controlling her brother’s public image.
Kim Yo Jong’s role in the North Korean regime is not just ceremonial. She’s actually working, protecting the image of her brother Kim Jong Un and making sure that everything runs smoothly.pic.twitter.com/hWsQnPIZzr
In public, Kim Yo Jong appears to have greater freedom than other top government officials in North Korea, occasionally appearing in photographs unaccompanied, rather than constantly being in the presence of Kim Jong Un.
Some have speculated that she was promoted partly in an effort to continue Kim Jong Un’s dynasty. While she’s out of the line of succession, some believe she could take over the country’s leadership if something happens to Kim Jong Un before his kids are old enough to rule.
It wouldn’t be an unprecedented role for her, either. Kim Yo Jong once briefly took control of the country’s affairs while her brother was ill in 2014, according to a South Korean think tank run by North Korean defectors.
She stepped onto the world stage in February 2018. In a rare show of diplomacy between the two Koreas, Kim Yo Jong traveled to South Korea for the Winter Olympics in Pyeongchang.
Everyone’s eyes were on Kim Yo Jong at the start of the games. She shared a historic handshake with South Korean President Moon Jae In, and both broke out in smiles.
During the opening ceremony, she sat right behind US Vice President Mike Pence, second lady Karen Pence, and Japanese Prime Minister Shinzo Abe.
Kim Yo Jong and Pence did not speak with each other.
Her interaction with South Korean leaders was a rare show of diplomacy and warmth. Given her experience in propaganda, she likely knew exactly what she was doing to try and curry favorable attention.
In April 2018, she played a crucial role in the peace talks between the two Koreas. Leaders from the two nations met at the Demilitarized Zone, and Kim Yo Jong was notably the only woman at the table.
Though she stayed well away from the spotlight, leaving that to her brother, it was clear Kim Yo Jong played a significant role in orchestrating the talks and ensuring the day ran smoothly.
She was her brother’s right-hand woman when he and Trump signed the agreement acknowledging North Korea’s intentions to denuclearize.
Kim Yo Jong sparked curiosity at one point, when she switched out the pen that was provided for the summit with her own ballpoint pen. It’s unclear why she swapped the pens, but some have speculated that it was for security reasons.
Anyone else spot this? There were two “Donald Trump” signing pens, NK official came in and shined up the one for Kim, then at the last minute Kim Yo Jong pulled out her own per to use instead of the one provided. Kim used that and back it went in her blazer. (Pool video)pic.twitter.com/dZWEK22IdF
It has become increasingly clear over the past several years that Kim Yo Jong was one of her brother’s most trusted officials, and her power in the regime was only growing.
But in the Hermit Kingdom, no one’s position is ever truly secure under the mercurial leadership of Kim Jong Un. He’s known for turning on family members quickly when they fall out of favor — and it remains to be seen whether Kim Yo Jong is an exception.
Kim Yo Jong was not listed as an alternate member of North Korea’s ruling Workers’ Party of Korea politburo — the party’s top decision-making body — and did not appear at any high-profile events during an important party gathering in April 2019.
She also missed a meeting between Kim and Russian President Vladimir Putin later that month, fueling speculation that she had been demoted.
One theory is that Kim Jong Un ordered her to lie low after his failed summit with Trump in February 2019.
But in early June 2019, Kim Yo Jong was spotted for the first time in 52 days, suggesting she was back in her brother’s good graces.
In October 2019, North Korean media released strange photos of Kim Jong Un riding a white horse atop a mountain with historic and symbolic significance.
Experts told Business Insider that the photos are packed with political meaning — and could foreshadow a frightening military advancement.
Since then, her profile has only grown. In March 2020, Kim Yo Jong made her first-ever public statement, insulting South Korea as a “frightened dog barking” after the country condemned one of North Korea’s live-fire military drills.
“Such incoherent assertion and actions… only magnify our distrust, hatred and scorn for the South side as a whole,” Kim Yo Jong said in the statement.
The following month, Kim Yo Jong was reinstated as an alternate member of the Workers’ Party of Korea politburo, suggesting that all has been forgiven since the collapse of last year’s summit.
Given these recent developments, it’s clear that Kim Yo Jong’s power has grown tremendously in recent years, fueling speculation that no other family members besides her could take over.
In an interview with We Are The Mighty, the man behind the camouflage pattern, Guy Cramer of HyperStealth Biotechnologies, says there were very specific reasons why the Afghan army chose the uniforms it did, and that it wasn’t a decision imposed by the Pentagon.
1. The camouflage is actually perfect for the environment
Pentagon watchdogs argue the Afghan army uniform is built in a pattern that won’t help conceal soldiers in about 98 percent of Afghanistan’s environment. The country is mostly desert, rock or arid (think the New Mexico or Arizona mountains) and the green-heavy pattern the Afghan army adopted isn’t suited to most of the battlefields soldiers would fight in.
Cramer told us, however, that at the time the army adopted its pattern, most of the fighting was going on in the agricultural areas of Afghanistan’s south, among ribbons of lush growth flanking irrigation canals and croplands.
The pattern adopted by the Afghan army is similar to one that was developed for a competition in the U.S. Army to find an alternative to the gray-green Universal Camouflage Pattern the service began fielding in 2003. Cramer engineered so-called the US4CES family of patterns that in some tests performed far better than the MultiCam pattern the Army eventually settled on.
One of the things Cramer builds into his patterns is technology to help conceal soldiers at night, not just in daylight. Pentagon watchdogs claim there were several U.S. patterns available for the Afghans to choose from, including the UCP one and the old-style “Battle Dress Uniform” analog pattern.
But Cramer says the UCP and others “glows” at night when seen through night vision — a technology that’s becoming increasingly available to insurgents and terrorists.
The Afghan pattern is designed to help conceal soldiers during night operations, which are increasingly part of the Afghan army’s tactics.
3. It sets the army apart
Sure, Pentagon watchdogs point fingers — and possibly rightly so — at then Afghan defense minister Abdul Rahim Wardak for his focus on fashion instead of utility in picking the AFPAT over other patterns like BDUs and desert digital. But Cramer says one of the things Wardak was looking to do was to set his forces apart from the rest of the hodgepodge of Afghanistan’s security forces.
“He wanted it to be distinct,” Cramer said. “The ANA is highly respected in Afghanistan and he wanted his troops to look different.”
Sounds kinda like the Marine Corps, doesn’t it?
Also, and potentially more importantly, Cramer argues that making a distinct, licensed pattern for the ANA is safer for the troops because it’s harder for insurgents to disguise themselves as friendlies and infiltrate bases.
“Anyone can get their hands on BDUs,” he added.
In fact, there have been several incidents in Afghanistan where insurgents have slipped inside friendly lines wearing Army UCP-pattern uniforms, and the Afghan army wanted to avoid that at all costs, Cramer said.
The fur is flying over the alleged “waste” of $28 million in an Afghan uniform that’s suitable for just 2 percent of Afghanistan’s terrain (if you just include “forest” as your measure), and there’s certainly a lot of waste, fraud and abuse to go around when it comes to bankrolling America’s Afghan allies.
But as with any Washington kerfuffle over Pentagon spending, there’s at least a little more to it than meets the eye.
On July 25, 1953, seven Czechoslovakians rolled across one of the most heavily guarded borders in the world to freedom in the West. They rolled over three rows of barbed wire, land mines, and guard towers on their way into West Germany. The Czech border guards didn’t even try to stop them. No one fired a shot. They all just watched in stunned disbelief as the Nazi armored personnel vehicle just tore its way across the Iron Curtain.
The story of Vaclav Uhlik is a success story for American soft power, specifically the Cold War-era broadcasts of Radio Free Europe. Uhlik was an engineer in the new, Soviet-dominated Czechoslovakia following the end of World War II. He was a concentration camp survivor, a fighter for the Czech Underground, and mechanic who hid a big secret from the new Communist authorities in his country: there was an armored vehicle in his backyard – and he was rebuilding it.
For three years, he listened to the broadcasts of Radio Free Europe as he gathered parts and materials needed to get the APC operational again. The broadcasts gave him hope. His progress gave him patience. He was assisted by former Czech soldiers Walter Hora and Vaclav Krejciri in his efforts, and they were rewarded by riding in the vehicle the night it was to drive to the West.
The Czech-West German Border in 1980.
(Photo by Alan Denney)
Starting nearly from scratch, the men slowly reconstructed a battered Nazi Saurer RR-7 Artillery Tractor. Vaclav Uhlik, the engineer, rebuilt the vehicle as an armored personnel carrier. He made it large enough to carry himself, his wife and two children, the two veterans, Josef Pisarik, and Libuse Hrdonkova, a Czech woman who married an American after the war. Since he could only stay with her for three months, she decided to come to him in Iowa.
After years of tinkering and preparation, the modified RR-7, covered in the brush and foliage that hid it from Czechoslovakian authorities for so long, rumbled its way to the West German border. They drove through the Bavarian forest to the Wald-München (near Nuremberg) border crossing. And he did cross the border, except he didn’t go through the gates, instead opting to go right through the rows of barbed wire between guard towers and minefields.
The border guards just watched in awe, as they thought the APC was a friendly army vehicle. The Czechs inside had only what they wore with them, but they were on the right side of the Iron Curtain.
The seven Czechs drove the APC for several miles into West Germany and away from the border until they were stopped by West German police, taken to an American installation to be interviewed by intelligence officers, and then welcomed to their new home in the West. They would eventually be resettled in Springfield, Mass. – all except Hrdonkova. She would move to Sioux City, Iowa, to be with her long-separated husband.
The newest Freedom-class littoral combat ship, LCS 19, the future USS St. Louis, was christened and launched in Marinette, Wisconsin, on Dec. 15, 2018, when the 3,900-ton warship tumbled into the icy water of the Menominee River on its side.
Freedom-class littoral combat ships are among the few ships in the world that are launched sideways.
That method was used “because the size of the ship and the capabilities of the shipyard allow for a side launch,” Joe DePietro, Lockheed’s vice president vice president of small combatants and ship systems, said in a statement.
“The ship has a shallow draft (it requires less than 14 feet of water to operate in) and is a small combatant (about 381 feet long), and can therefore be side launched, where many other ships cannot.”
“Our partner Fincantieri Marinette Marine has delivered more than 1,300 vessels and has used the side launch method across multiple Navy and Coast Guard platforms,” DePietro added. “The size and capacity of the vessels under construction enable use of the side-launch method.”
Lockheed Martin got the contract to build the ship in December 2010, and the name St. Louis was selected in April 2015. It will be the seventh Navy ship to bear that name — the first since the amphibious cargo ship St. Louis left service in 1991.
LCS 19’s keel was laid in May 2017, when the ship’s sponsor Barbara Taylor — wife of the CEO of the St. Louis-based company Enterprise rental car — welded her initials into a steel plate that was included in the ship’s hull.
On Dec. 15, 2018, Taylor christened the ship by smashing a bottle of champagne on its bow and then watched the warship tip over into the water.
The Navy’s LCS 19 tipping back toward shore after being launched, December 15, 2018.
“LCS 19 is the second ship we’ve christened and launched this year,” DePietro said in a release, adding that the defense firm’s shipbuilding team had “truly hit its stride.”
“We completed trials on three ships and delivered two more,” DePietro added. “Once delivered to the Navy, LCS 19 will be on its way to independently completing targeted missions around the world.”
Lockheed has delivered seven littoral combat ships to the Navy and seven more are in various stages of production and testing at Fincantieri Marinette Marine, where LCS 19 was launched on Dec. 15, 2018.
While LCS 19 has been christened and launched, it won’t become part of the Navy until it’s commissioned. At that point, the name St. Louis will become official.
The Remote Minehunting System and an AN/AQS-20 mine-hunting sonar are brought aboard the littoral combat ship USS Independence during developmental testing of the mine-warfare mission module package, January 7, 2012.
(US Navy photo by Ron Newsome)
The Navy’s littoral-combat-ship program is divided into two classes. Freedom-class ships are steel monohull vessels that are slightly smaller than their Independence-class counterparts, which are aluminum trimarans by General Dynamics that have a revolutionary design.
The LCS is meant to be a relatively cheap surface warship — about one-third the cost of a new Arleigh Burke-class destroyer, according to Lockheed — with a modular design that allows it to be quickly outfitted with a variety of different equipment suited for different types of missions.
While both classes are open-ocean capable, they are designed for operations close to shore, with modular packages for their primary missions of antisubmarine warfare, mine countermeasures, and surface warfare against smaller boats. (Issues with the LCS program may lead to its mine-countermeasure assets being deployed on other ships.)
Crew members of the littoral combat ship USS Little Rock man the rails during the ship’s commissioning ceremony, in Buffalo, New York, Dec. 16, 2017.
(US Navy/Lockheed Martin)
The LCS is also meant to carry out intelligence-gathering, maritime-security, and homeland-security missions and support for Marine or special-operations forces regardless of its installed mission package.
The program has also faced more conventional hurdles. The USS Little Rock, the fifth Freedom-class LCS, was stuck in Montreal for three months at the beginning of 2018, hemmed in by winter weather and sea ice.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
The Belgian company FN Herstal is a heavyweight manufacturer in the firearms industry. They’ve made machine guns like the FN Minimi and MAG, better known as the M249 SAW and M240 machine guns respectively. They’ve also manufactured the standard-issue M4 Carbine and the Special Operations Forces Carbine Assault Rifle, better known as the SCAR. On May 6, 2021, FN held a press conference they called “A New Chapter Begins.”
At the pre-recorded online press conference, FN unveiled the brand new FN EVOLYS Ultralight Machine Gun. The standard machine gun features are present: gas operated, open bolt, short stroke piston design. What makes the EVOLYS unique is its extreme light weight. FN claims that it fires like a machine gun, but handles like an assault rifle thanks to its light weight and ergonomics. It was even shown with a carbon fiber bipod.
FN highlighted the use of Polymers and Additive Manufacturing, better known as 3D printing, as a major contributor to the light weight of the EVOLYS. One interview shown during the press conference was conducted in front of a 3D printing machine.
Another notable feature is the inclusion of a semi-auto on the fire selector, similar to the SIG Sauer LMG-6.8. “The ambidextrous fire selector has a semi-auto position to engage point targets as with a rifle while the full auto position allows suppressive fire as with a machine gun,” FN said. Also similar to the SIG, the FN’s fire selector is very similar to the ultra-familiar AR/M4/M16 selector switch.
FN claims that all actions can be completed with just one hand, including engaging the belt. This action can also be done with either the left or right hand. Additionally, cartridges are automatically repositioned if the belt is not placed correctly on the feed tray when the feed tray cover is closed, preventing first round failure to feed. When the last round in the belt is fired, the last link is ejected, making clearing faster for the next reload.
Those familiar with FN products will also recognize the stock on the EVOLYS. Known in gun circles as the “Tactical UGG Boot” for obvious reasons, the stock appears to be taken directly off of the FN SCAR. The stock folds to the right side of the gun, extends and retracts, and features an adjustable cheek riser. “Whatever his size, or the equipment he is wearing, the user can always find a comfortable shooting position,” FN said.
The press conference showed plenty of firing demonstrations too. Despite the weapon’s light weight, recoil appeared to be very mild. This is due in large part to the EVOLYS’ hydraulic buffer. Demonstrations included shooting the EVOLYS standing, kneeling, prone, and on the move. The gun’s light weight will be a welcome feature to any machine gunner who has to carry it on patrol and make bounding movements with it.
The EVOLYS appears to do a good job of directing its gasses away from the shooter. This prevents noxious fumes and toxins from affecting the shooter. The EVOLYS is also designed to work suppressed.
FN is marketing the EVOLYS in both 5.56x45mm NATO and 7.62x51mm NATO. The former weighs in at 5.5 kilograms unloaded while the former weighs just .5 kilograms more. For comparison, the M249 SAW weighs 7.5 kilograms unloaded.
Although the U.S. Army is moving to the 6.8mm caliber with the Next Generation Squad Weapon system, FN has plenty of potential NATO customers who look to be keeping 5.56x45mm NATO and 7.62x51mm NATO weapons in their armories for the foreseeable future.
On Nov. 16, 2018, the Air Force announced the first two bases that will host its new, highly advanced bomber for testing and maintenance.
The service said in a release that Tinker Air Force Base in Oklahoma would coordinate maintenance and sustainment for the B-21 Raider and that Edwards Air Force Base in California had been picked to lead testing and evaluation of the next generation long-range strike bomber.
Robins Air Force Base in Georgia and Hill Air Force Base in Utah will support Tinker with maintaining and, when necessary, overhauling and upgrading the new bomber, the Air Force said.
Personnel at those bases will be equipped to rebuild the aircraft’s parts, assemblies, or subassemblies as well as to test and reclaim equipment as necessary for depot activations.
The first B-21 is expected to be delivered in the mid-2020s.
A B-2A stealth bomber at Tinker Air Force Base in Oklahoma during a visit on April 11, 2017.
(US Air Force photo by Greg L. Davis)
The release noted the “deep and accomplished history” of the Air Logistics Complex of the Air Force Sustainment Center at Tinker and said officials believe the base has the knowledge and expertise to support the new bomber.
“With a talented workforce and decades of experience in aircraft maintenance, Tinker AFB is the right place for this critical mission,” Air Force Secretary Heather A. Wilson said.
Edwards Air Force Base is also home to the Air Force Test Center, which leads the service’s testing and evaluation efforts.
“From flight testing the X-15 to the F-117, Edwards AFB in the Mohave Desert [sic] has been at the forefront of keeping our Air Force on the cutting edge,” Air Force Chief of Staff Gen. David L. Goldfein said. “Now testing the B-21 Raider will begin another historic chapter in the base’s history.”
Air Force Brig. Gen. Carl Schaefer, head of the 412th Test Wing at Edwards, said in 2018 that the B-21 would be tested at the base. Few details about the B-21’s development have been released, and previous reports suggested it could be tested at the Air Force’s secretive Area 51 facility.
A B-1B Lancer bomber awaits maintenance at Tinker Air Force Base in Oklahoma, Jan. 27, 2017
(US Air Force photo by Greg L. Davis)
The B-21 acquisition cycle is currently in the engineering and manufacturing-development phase, the Air Force said. The Raider’s design and development headquarters is at Northrop Grumman’s facility in Melbourne, Florida.
The Air Force expects to buy about 100 of the new bomber, with each cost over 0 million, according to Air Force Times.
The Air Force said in May 2018 that once the new bombers begin arriving they will head to three bases in the US — Dyess Air Force Base in Texas, Ellsworth Air Force Base in South Dakota, and Whiteman Air Force Base in Missouri.
The service said those bases were “reasonable alternatives” for the new bomber, although it will likely not make a final basing decision until 2019.
The B-21 is to replace the B-1 Lancer and B-2 Spirit bombers at those bases, but the Air Force doesn’t plan to retire the existing bombers until there are enough B-21s to replace them.
Using existing bomber bases would reduce operational impact, lower overhead, and minimize costs, the Air Force said in May. “Our current bomber bases are best suited for the B-21,” Wilson said at the time.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
It looks like the list for the Army’s senior enlisted promotions got pushed out — which is fantastic news for everyone who got picked up. Congratulations! You worked hard and it’s paying off.
To the rest of you, my condolences. But let me be clear here: I’m not pitying the NCOs — oh no, they’ll get their time to shine (or get RCPed for staying in at the same rank, whichever comes first). My heart aches for the soldiers beneath the NCOs that didn’t make the list. Get ready for a world of hurt because your platoon sergeant is about to take their frustrations out on you.
When investigating new ways of transmitting and communicating information, sometimes it helps to see the light.
This is the idea behind a new technology being investigated by the Research, Development and Engineering Command Soldier Center’s Expeditionary Maneuver Support Directorate, along with its industry partner, VLNComm of Charlottesville, Va.
“It’s a wireless system but instead of using radio frequencies it uses infrared light,” said Frank Murphy, an engineer on EMSD’s System Development and Engineering Team. “It is called LiFi, or light fidelity. It has many advantages.”
Murphy has been investigating ways to utilize the emerging commercially available technology in a tactical environment as the physical characteristics appear to solve many issues facing wired and wireless field command post network systems.
The technology will be used in expeditionary mission commands. EMSD has come up with a concept for using LiFi within any enclosed mission command platform. LiFi eliminates the problems associated with the time-consuming task of running data lines in tactical operation centers and command posts. Moreover, since the technology does not use radio waves, it cannot be detected outside the confines of the mission command platform.
“The technology uses light waves to transmit and receive data between the servers and the user’s computer,” said Melvin Jee, the leader of EMSD’s Command Post Platforms Branch. “As light cannot pass through walls, the enemy cannot detect the signal.”
The transceiver (pictured here) is simply put into a USB port and will then detect the signal and users will be hooked up to the IT network of their command post. Then a Soldier just needs a light shined overhead to have network access.
(Photo is courtesy of the RDECOM Soldier Center Expeditionary Maneuver Support Directorate)
Murphy’s investigation into the technology was inspired in part by Douglas Tamilio, the director of RDECOM Soldier Center, sharing an article about LiFi with RDECOM Soldier Center leadership. Murphy’s investigation was also inspired by the vision of Claudia Quigley, the director of EMSD, and the RDECOM Soldier Center’s ongoing partnership with the 82nd Airborne. The RDECOM Soldier Center and the 82nd Airborne have worked together extensively to find out ways to best meet the needs of warfighters.
Murphy explained that Quigley and other members of the directorate were working with the 82nd Airborne during a field exercise. During the exercise, Murphy noticed that the setup of IT cabling was proving to be a time-consuming and difficult task.
“They had a hard time setting up their IT network, which isn’t usually an NSRDEC area, but we felt that we could address the need,” said Murphy. “Tactical speed is absolutely essential for command post setup. LiFi is potentially faster, easier to install and doesn’t have the security and exposure issues of other technologies. LiFi is un-hackable and untraceable when used within the command post shelter.”
“It’s virtually impossible to find the wavelength the data is being transmitted on, so if LiFi is detected, it’s hard to intercept the data stream,” said Jee.
EMSD is working with industry partners. Murphy explained that the commercially available technology was modified to fit a tactical environment. The technology will affect how soldiers communicate and, thus, carry out a mission.
“A command post of any size is an information processing center,” said Murphy, “They take information from the field whether it comes in from a drone, soldier/squad reports, other personnel in the area, satellite information, information from wheeled vehicles, or from behind the front lines — all this information gets fed to the command post staff. They make a decision and then the information goes right back out. Lives depend on this communication.”
“LiFi is part of NSRDEC’s plan to provide a fully integrated platform with all of the necessary infrastructure in order for the warfighter to set up his command post,” said Jee. “Just as a house is fully integrated with power, lights, and network cabling — allowing the homeowners to just concentrate on the furnishings — NSRDEC plans to provide a fully functional house, allowing the warfighter and program managers to provide the “furniture.'”
“In a command post, everyone has a job to do and they have their information chain,” said Murphy.
“All these soldiers need network access. With this, you simply shine the light over their head. After you hook the transceiver into the USB port, the transceiver will detect the signal and you will be hooked up to the IT network of your command post. It’s as simple as that. We also hope to have it integrated into the wiring harness for the lighting so we can just roll up the tent and pack it away during a move.”
Murphy emphasized that the NSRDEC project is really a team effort and that several entities at the Natick Soldier Systems Center were important to the development of the technology. He also received “great guidance” from his branch chief, Melvin Jee, and from his team leader, Connie Miles-Patrick, System Development and Engineering Team, as well as the DREN team and people in the Natick Contracting Division.
He also credited the use of the Base Camp Integration Lab, or BCIL, which was created by and is expertly run by, Product Manager Force Sustainment Systems. A first-generation Li-Fi system prototype was recently set up at the BCIL and successfully demonstrated the capability to send and receive data using the BCIL’s IT network.
“The people at the BCIL were incredible,” said Murphy. “They gave us the perfect platform to showcase the tactical capabilities of this device. This project really showcases what Natick is all about. The Natick team dove in with both feet. Great things happen when people believe in each other and in an idea. We all want to help the soldier.”
Murphy believes that LiFi is truly the wave of the future.
“The demand for data inside the command post is only going to continue to increase,” said Murphy, “So data quantity and quality need to improve to meet this demand. This technology can be hooked up permanently in rigid wall mission command platforms, but it can be used anywhere. We will be bringing world-class communications, security, speed, and capability to the frontline soldier. Information in the field is a weapon. This technology will help the warfighter make better decisions and be more effective and lethal in the field. This changes everything in the IT network system. It’s a game changer.”
South Korean lawmaker Lee Cheol-hee said that North Korean hackers have stolen classified military documents, including the US and South Korea’s most current war plans and plans to kill Kim Jong Un, the Financial Times reports.
Lee said that defense officials revealed to him that 235 gigabytes of data had been stolen, 80% of which has yet to be identified.
But Lee said the theft included Operational Plan 5015, the US and South Korea’s current plan for war with North Korea.
The news follows a May announcement from South Korea’s defense ministry saying its military network had been breached.
“This is a total failure of management and monitoring [of classified information],” Shin Jong-woo, a researcher at the Korea Defense and Security Forum told the Financial Times of the hacks.
The Pentagon’s science and technology research arm is launching a vigorous push into a new level of advanced artificial intelligence, intended to integrate advanced levels of “machine learning,” introduce more “adaptive reasoning” and even help computers determine more subjective phenomena.
It is called the “AI-Next” effort, a Defense Advanced Research Projects Agency program to leverage rapid advances in AI to help train data to make computer analysis more reliable for human operators, agency Director Steven Walker recently told a small group of reporters.
DARPA scientists explain the fast-evolving AI-Next effort as improving the ability of AI-oriented technology to provide much more sophisticated “contextual explanatory models.”
While humans will still be needed in many instances, the 3rd Wave can be described as introducing a new ability to not only provide answers and interpretations, but also use “machine learning to reason in context and explain results,” DARPA Deputy Director Peter Highnam said.
In short, the AI-Next initiative, intended to evolve into a 3rd Wave, can explain the reason “why” it reached the conclusion it reached, something which offers a breakthrough level of computer-human interface, he added.
“When we talk about the 3rd wave, we are focused on contextual reasoning and adaptation. It requires less data training,” Highnam said.
This not only makes determinations more reliable but massively increases an ability to make more subjective interpretations by understanding how different words or data sets relate to one another.
A computer can only draw from information it has been fed or given, by and large. While it can add seemingly limitless amounts of data almost instantaneously, AI-driven analysis can face challenges if elements of the underlying stored data change for some reason. It is precisely this predicament which the 3rd Wave is intended to address.
“If the underlying data changes then your system was not trained against that,” Highnam explained.
For instance, 3rd wave adaptive reasoning will enable computer algorithms to discern the difference between the use of “principal” and “principle” based on an ability to analyze surrounding words and determine context.
This level of analysis naturally creates much higher levels of reliability and nuance as it can empower humans with a much deeper grasp of the detailed information they might seek.
“That is the future — building enough AI into the machines that they can actually communicate, share data and network at machine speed in real time,” Walker said.
Yet another example of emerging advanced levels of AI would be an ability to organize hours of drone collected video very quickly – and determine moments of relevance for human decision makers. This exponentially increases the speed of human decision making, a factor which could easily determine life or death in combat.
“In a warfighting scenario, humans have to trust it when the computer gives them an answer…through contextual reasoning,” Highnam said.
Given these emerging 3rd Wave advances, making more subjective decisions will increasingly be a realistic element of AI’s functional purview. For this reason and others, DARPA is working closely with the private sector to fortify collaboration with silicon valley and defense industry partners as a way to identify and apply the latest innovations.
DARPA’s 1st, 2nd & 3rd wave of AI
The third wave, described in DARPA materials as bringing “contextual explanatory models” and a much higher level of machine learning, is intended to build upon the 1st and 2nd Waves of DARPA’s previous AI progress.
The 1st Wave, according to available DARPA information, “enables reasoning over narrowly defined problems.” While it does bring certain elements of learning capability, it is described as having a “poor level of certainty.”
This points to the principle challenge of AI, namely fostering an ability to generate “trust” or reliability that the process through which it discovers new patterns, finds answers, and compares new data against volumes of historical data is accurate. Given this challenge, certain existing models of AI integration might have trouble adjusting to changing data or determining sufficient context.
The 2nd Wave enables “creating statistical models and training them on big data,” but has minimal reasoning, DARPA materials explain. This means algorithms are able to recognize new information and often place it in a broader context in relation to an existing database.
The 2nd Wave, therefore, can often determine meaning of previously unrecognized words and information by examining context and performing certain levels of interpretation. AI-enabled computer algorithms, during this phase, are able to accurately analyze words and information by placing them in context with surrounding data and concepts.
With this 2nd wave, however, DARPA scientist explain that there can be limitations regarding the reliability of interpretation and an ability to respond to new information in some instances; this can make its determinations less reliable. Highnam explained this as having less of an ability to train existing data when or if new information changes it. Therefore, this Wave is described by DARPA information as having “minimal reasoning.”
Can AI make subjective determinations?
Raytheon, for example, is currently exploring a collaborative research deal with the Navy to explore prognostics, conditioned-based maintenance and training algorithms to perform real-time analytics on otherwise complex problems. It is a 6-month Cooperative Research and Development Agreement (CRADA) to explore extensive new AI applications, company developers said.
Raytheon developers were naturally hesitant to specify any particular problems or platforms they are working on with the Navy, but did say they were looking at improved AI to further enable large warfigthing systems, weapons, and networks.
Todd Probert, Raytheon’s Vice President of Mission Support and Modernization, told Warrior Maven in an interview what their effort is working on initiatives which compliment DoD’s current AI push.
“Part of deploying AI is about gaining the confidence to trust the AI if operations change and then break it down even further,” Probert said. “We are training algorithms to do the work of humans.”
Interestingly, the kinds of advances enabled by a 3rd Wave bring the prospect of engineering AI-driven algorithms to interpret subjective nuances. For instance, things like certain philosophical concepts, emotions and psychological nuances influenced by past experience might seem to be the kind of thing computers would not be able to interpret.
While this is of course still true in many ways, as even the most advanced algorithms do not yet parallel human cognition, or emotion, in some respects, AI is increasingly able to make more subjective determinations, Probert said.
Probert explained that advanced AI is able to process certain kinds of intent, emotions, and biases through an ability to gather and organize information related to word selection, voice recognition, patterns of expression, and intonations as a way to discern more subjective phenomena.
Also, if a system has a large enough database, perhaps including prior expressions, writing or information related to new information — it can place new words, expressions and incoming data within a broader, more subjective context, Probert explained.
AI & counterterrorism – Torres AES
Other industry partners are using new levels of AI to fortify counterterrorism investigations and cyber forensics. For example, a US-based global security firm supporting DoD, the US State Dept. and friendly foreign governments, Torres Advanced Enterprise Solutions, employs advanced levels of AI to uncover otherwise obscured or hidden communications among terrorist groups, transnational criminals or other US adversaries.
While much of the details of this kind of AI application, company developers say, are naturally not available for security reasons, Torres cyber forensics experts did say advanced algorithms can find associations and “digital footprints” associated with bad actors or enemy activity using newer methods of AI.
As part of its cyber forensics training of US and US-allied counterterrorism forces, Torres prepares cyber warriors and investigators to leverage AI. Torres conducts cyber forensics training of US-allied Argentinian and Paraguayan counterrorism officials who, for instance, often look to crack down on terrorist financial activity in the more loosely-governed “tri-border” area connecting Paraguay, Argentina, and Brazil.
“The system that we train builds in AI, yet does not eliminate the human being. AI-enabled algorithms can identify direct and indirect digital relationships among bad actors,” said Jerry Torres, Torres AES CEO.
For instance, AI can use adaptive reasoning to discern relationships between locations, names, email addresses, or bank accounts used by bad actors.
To illustrate some of the effective uses of AI for these kinds of efforts, Torres pointed to a proprietary software called Maltego — used for open-source intelligence analysis and forensics.
“AI can be a great asset in which our defensive cyber systems learn about the attackers by increasing the knowledge base from each attack, and launching intelligent counter attacks to neutralize the attackers, or feign a counter attack to get the attacker to expose itself. AI is critical to countering attackers,” Torres added.
The software uses AI to find relationships across a variety of online entities to include social media, domains, groups, networks, and other areas of investigative relevance.
The growing impact of AI
AI has advanced quickly to unprecedented levels of autonomy and machine learning wherein algorithms are instantly able to assimilate and analyze new patterns and information, provide context, and compare it against vast volumes of data. Many now follow the seemingly countless applications of this throughout military networks, data systems, weapons, and large platforms.
Computer autonomy currently performs procedural functions, organizes information, and brings incredible processing speed designed to enable much faster decision-making and problems solving by humans performing command and control. While AI can proving seemingly infinite amounts of great relevance in short order — or almost instantaneously — human cognition is still required in many instances to integrate less “tangible” variables, solve dynamic problems or make more subjective determinations.
When it comes to current and emerging platforms, there is already much progress in the area of AI; the F-35s “sensor fusion” relies upon early iterations of AI, Navy Ford-Class carriers use greater levels of automation to perform on-board functions and Virginia-Class Block III attack submarines draw upon touch screen fly-by-wire technology to bring more autonomy to undersea navigation.
Other instances include the Army’s current experimentation with IBM’s AI-enabled Watson computer which, among other things, can be used to wirelessly perform real-time analytics on combat relevant maintenance details on Stryker vehicles. In a manner somewhat analogous to this, a firm called C3IOT uses AI-empowered real-time analytics to perform conditioned-based maintenance on Air Force F-16s.
“Despite higher levels of autonomy, in the end a human will make the decision, using computers as partners. We see the future as much less having machines do everything but rather humans and machines working together to fight the next battle,” Highnam explained.
This article originally appeared on Warrior Maven. Follow @warriormaven1 on Twitter.
President Donald Trump’s proposed budget guidance is asking for $1.3 billion in funding cuts to the U.S. Coast Guard at a time when the service is doing more than ever, and is already severely under-resourced.
Trump’s budget would cancel a $500 million ship that is already in production, and would likely hit other areas of the Guard, which specializes in interdicting drugs, human trafficking, and keeping a close eye on what Russia is doing in the Arctic.
“Last year, we removed more cocaine than any other year in history — well over 200 metric tons — and by all accounts, it looks like this year we are on target to at least reach, if not exceed, last year’s total,” Adm. Paul Zukunft, the commandant of the Coast Guard, told Business Insider in a phone interview, adding that even with its success and consistent operational tempo, the service is strained.
“With all the success we had last year, there were over 500 events that we had great information on, but we just did not have enough planes, enough ships, to target all 500-plus events,” Zukunft said. “We are really besieged down there,” he added, referencing Coast Guard operations off the coast of Colombia.
In addition to its operations targeting drug smugglers and human traffickers, the Coast Guard has been in and out of the Arctic region with its ice-breaking ships, especially as Russia attempts to claim parts of the region, and its rich resources, for itself.
The Arctic, which has roughly 13% of the world’s oil and about one-third of its natural gas, could potentially turn into a South China Sea-like situation. That’s because, like China has done with its creation of artificial islands in that region to gain control of shipping lanes, Russia and its fleet of 40 icebreakers has exerted itself in the Arctic to become the dominant player.
The Polar Start icebreak. (U.S. Coast Guard photo)
“We’re starting to see militarization of some of their outposts,” Zukunft said.
The Coast Guard has only two icebreakers, one medium and one heavy — the latter being nearly 40 years-old.
“We’re challenged in our ability to exert leadership when, you’re the world’s most prosperous nation, yet we can only seem to afford two icebreakers,” Zukunft said. He said that ideally, the service would need a fleet of 3 heavy and 3 medium icebreakers to remain competitive.
Cuts to the budget are likely to strain other parts of the Guard, such as its coastal maritime security teams, which help to the protect the president when he’s near the shore in Mar-a-Lago, and the service’s inland fleet that maintains navigational aides and markers on waterways and in ports.
“That’s been neglected probably for a half-century,” he said of infrastructure which sees roughly $4.5 trillion in commerce pass through.
Guard Petty Officer 3rd Class Cory Langston fights the boat fire from the Coast Guard 29-foot response boat in Hopkins Point Marina in Jonesport, Maine on Thursday, Sept. 8, 2016. The was no one aboard at the time of the fire. (Photo by U.S. Coast Guard/Petty Officer 3rd Class Stephanie Horvat)
Rep. Duncan Hunter (R-Calif.) said in a letter to President Trump that such cuts “egregiously” conflict with his stated goals to strengthen national security.
“These proposed cuts … will guarantee negative consequences,” Hunter wrote, adding that it would “create exposures that will most certainly be exploited by transnational criminal networks and other dangerous actors.”
The Coast Guard occupies a unique role as a military branch within the Department of Homeland Security. President Trump is seeking to up the Pentagon’s budget by $54 billion by taking money from non-defense areas, such as the State Department.
Since the budget has not been finalized, a spokesman for the Coast Guard declined to comment on the matter.