The chief of Iran’s powerful Revolutionary Guard said Oct. 8 the US should move its military bases farther from Iran’s borders if it imposes new sanctions against Tehran, the official IRNA news reported.
The Oct. 8 report quotes Gen. Mohammad Ali Jafari as saying, “If new sanctions go into effect, the country should move its regional bases to a 2,000-kilometer (1,240-mile) radius” out of the range of Iranian missiles.
Currently, US military bases are located in countries neighboring Iran, including Bahrain, Iraq, Oman, and Afghanistan, less than 500 kilometers (310 miles) from Iran’s borders.
Jafari rejected the idea of negotiating with the US over regional issues and said if the United States designates the Revolutionary Guard a terrorist group, the Guard — which has suffered significant casualties fighting the Islamic State group in Syria and Iraq — will also consider the US army a terrorist group.
He said such moves by the US will eliminate “any chance for engagement forever.”
President Donald Trump appears to be stepping back from his campaign pledge to tear up the 2015 nuclear deal between Iran and world powers, instead aiming to take other measures against Iran and its affiliates.
New actions expected to be announced by the White House in the coming days will focus on the Revolutionary Guard and Hezbollah, the Shiite militant group blamed for sowing discord in the Middle East and seeking Israel’s demise. They include financial sanctions on anyone who does business with the Revolutionary Guard, as well as millions of dollars in rewards for information leading to the arrest of two operatives of Iran-backed Hezbollah.
On Saturday, Iran’s president defended the nuclear deal and said not even 10 Donald Trumps can roll back its benefits to Iran.
Celebrate the 240th birthday of the United States Navy by taking a look at 28 photos (and a couple of paintings) that capture the spirit of the sea service past and present:
Cmdr. Christian Sewell launches from the flight deck of the aircraft carrier USS Nimitz (CVN 68) in an F-35C Lightning II carrier variant joint strike fighter Nov. 4, 2014. The F-35 Lightning II Pax River Integrated Test Force from Air Test and Evaluation Squadron (VX) 23 is conducting initial at-sea trials aboard Nimitz.
A port security boat assigned to Maritime Expeditionary Squadron 1 (MESRON 1) patrols the waters near Kuwait Naval Base Feb. 10, 2009.
A Mark 7 16-inch/50 caliber gun is fired aboard the battleship USS Missouri (BB-63) as night shelling of Iraqi targets takes place along the northern Kuwaiti coast during Operation Desert Storm.
U.S. Navy SEALs patrol the Mekong Delta, Vietnam in 1967.
An F-4B drops bombs on Vietnam.
Walt Disney and Dick Van Dyke visiting the USS Kitty Hawk (CVA-63) with Captain Martin D. Carmody on July 6, 1965
The USS Missouri fires 16-inch salvo at Chong Jin, Korea in an effort to cut Northern Korean communications. Chong Jin is only 39 miles from the border of China. October 21, 1950.
The U.S. Navy tests nuclear bombs at Bikini Atoll Jul. 25, 1946.
An unidentified man engages a penguin during a U.S. Navy expedition to Antarctica.
View from a Navy ship navigating waters around Antarctica.
Surrender of Japan, 2 September 1945 ; Navy carrier planes fly in formation over the U.S. and British fleets in Tokyo Bay during surrender ceremonies. USS Missouri (BB-63) , where the ceremonies took place, is at left. USS Detroit (CL-8) is in the right distance. Aircraft include TBM, F6F, SB2C and F4U types.
USS Idaho (BB-42), a New Mexico-class battleship shells Okinawa on 1 April 1945, easily distinguished by her tower foremast and 5″-38 Mk 30 single turrets (visible between the barrels of the forward main turrets). Idaho was the only battleship with this configuration.
Sailor and colleague stitching thatch in the South Pacific during WWII.
Seabees with the 111th Naval Construction Battalion landing at Omaha Beach before the Mulberry bridge was installed, Jun. 6 1944.
USS Darke (APA-159)’s, LCVP 18, possibly with Army troops as reinforcements at Okinawa, sometime between Apr. 9-14 1945.
The U.S. Navy aircraft carrier USS Hornet launches a B-25 during the Doolittle Raid.
USS Arizona (BB-39) sunk and burning furiously, Dec. 7, 1941. Her forward magazines had exploded when she was hit by a Japanese bomb. At left, men on the stern of USS Tennessee (BB-43) are playing fire hoses on the water to force burning oil away from their ship.
A sailor poses on the USS Bear during an expedition to Greenland in 1941.
Sailors pose in a train at Cardiff, Wales in 1918.
The USS Leviathan heads to France to pick up U.S. troops in this stereo photo from 1918.
The USS Colorado transits the Panama Canal.
The “Great White Fleet” steams the Atlantic Ocean as part of the U.S. Navy mission to prove that it’s a blue water fleet in 1908.
A dog contemplates jumping from the deck of a ship while sailing with the “Great White Fleet.” According to a note with the photo in the Navy historical archive, the dog did later jump.
Divers search the wreck of the USS Maine in Havana Harbor, Cuba. The sinking of the USS Maine was one of the events that triggered the Spanish-American War.
The USS Monitor and CSS Merrimac face off in 1862 near Norfolk, Virginia. This was the first time ironclad ships faced each other in combat.
During the Mexican-American War, the U.S. Navy attack the city of San Juan de Ullca in March 1847.
During the War of 1812, the Navy played a large role by limiting the actions of the British fleet.
A Revolutionary War painting depicting the Continental Navy frigate Confederacy is displayed at the Navy Art Gallery at the Washington Navy Yard.
Col. Walker “Bud” Mahurin was an American combat fighter pilot. Flying P-47s with the 56th FG in WWII, he became an ace three times over in the skies over France and Germany. He was shot down once but returned with the help of the French underground.
After the war Mahurin remained in the newly independent U.S. Air Force. The outbreak of the Korean War in 1950 found him in the Pentagon, working on new fighter aircraft procurement. The skills he exhibited in WWII would once again be tested, this time in a new arena of air warfare…the jet age dogfight. In this episode, Mahurin tells his dramatic story of returning to combat in Korea.
The inclination to misrepresent China’s worldwide impact is, to some degree, a reflection of how difficult it is to divorce their tech advancements from the context of their political objectives. Meanwhile, China’s global conduct is frequently compared to and contrasted with that of the United States.
In short, making a complete picture of the burgeoning superpower’s role on the global tech stage is complicated, to say the least. Here’s what you must consider:
Tech sector growth
Existing records of China’s tech sector all together propose three different methodologies dependent on their needed advantage, outcome, and goals. The crafty methodology is halfway determined upon the material prevalence needed to create hardware devices, rising nationalist patriotism, and a hardline stance that looks to solidify China’s legitimate status as a tech superpower.
Indecision sometimes can most acutely communicate China’s tech methodology and global initiatives as well as a characteristic feeling of authentic privilege that China uses to place their country as the leader in conveying global technology, trade, merchandise.
This uncertainty additionally provides another level of uneasiness with China’s focus on improving worldwide leadership all while keeping their strategies aligned with their own national interests.
Defenders of the dominance approach shown by Chinese tech companies often look for social esteem by continuously expanding their worldwide duties; assuming more responsibility for an extensive range of tech sectors; and upgrading China’s commitments to universal harmony, security and advancement as per its government positioning in the worldwide tech sector.
Every one of the three methodologies are unmistakable practically speaking, making it hard to observe a reasonable position with respect to the Chinese tech initiatives. Under Xi Jinping’s leadership, it is conceivable to recognize another strategy that is bringing together China’s job market more in line with the worldwide tech industry.
This includes setting China at the focal point of new and existing tech operations and hardware manufacturing, advancing Chinese ideals and goals, whole pushing global relations in the tech industry, though, with expressly Chinese qualities such as government oversight.
Three patterns in the contemporary Chinese tech industry outside conventional strategy bolster this new approaching but relies on a few key decisions on their part.
The first is China’s key economic reorientation. China’s biggest concern lies with the post-WWII US-drove partnership framework, which is principally observed as a deterrent against the progression of Chinese tech sector interests.
China’s vital stance is currently outlined based on geopolitical objectives that plan to put China at the focal point of an East-West pivot in both tech and hardware. China’s pledge to the protection of its outskirts is underscored by the One Belt, One Road, and its endeavors to merge vital locations in the South China Sea.
The second pattern is China’s initiative in worldwide tech aligned with their national priorities. At the onset Chinese approach to outside talks in the tech sector is loaded with references to the significance of a Chinese role in worldwide tech operations. China’s portrayal as a leader in the universal tech sector is spreading progressively over the financial, security, and legal domains as well as global policymaking.
China’s responsibilities for peacekeeping and improvement have additionally expanded exponentially as of late, furthering their tech dominance. The United Nations remain a partner of China’s institutions, providing them with access to the European market. In any case, progressively Chinese tech arrangements and partnerships are all the more increased with territorial expansion and international manufacturing, for example, the G20.
The third pattern is China’s accentuation on social recovery as an offset to ideological differences and clashes. Chinese strategy and tech elites advocate the possibility of a tranquil partnership between countries dependent on their tech, all while spreading their political culture worldwide.
Another legislative issue that is expected to provide various methods for beating out the other tech giants is the close alignment of governmental issues through the development of worldwide tech dominance.
What are the suggestions for China to gain a worldwide tech advantage? China looks to assume a pivotal role in the creation of a more comprehensive and fair worldwide tech industry that at the same time is lined up with its very own national advantages and goals.
In any case, its new strategy makes an authenticity issue: China’s capability to add to the change of the global tech sector and the production of universal devices and standards requires social buy-in. This must be completely acknowledged whether its play for power status in the tech world, and is viewed as a real issue according to different countries.
The Achilles foot rear area of Chinese outside arrangement is political authenticity. Right now, both interior and outside observers see issues with China’s authenticity especially with the Chinese Communist Party giving preferential treatment to patriotism and monetary value.
Other issues with outer authenticity are most apparent on the issue of China’s interesting position in the South China Sea, which is said to compromises the region and puts pressure on smaller countries when working with a global tech superpower like China.
With regards to current basic power moves inside the tech sector, China’s dynamic commitment to the worldwide stage is a positive indication of their potential to lead the global tech industry and its improvement.
Past the subject of national revival, if China is to assume a leadership role in the tech sector, as well as setting up universal guidelines as they pertain to tech, it should connect with the goals of different countries, companies, and people groups.
Messing around with your fellow Joes is always good fun. It’s a lighthearted way of letting them know that they’re “one of the guys.” After all, if you didn’t care about someone, you wouldn’t mess with them — right?
Every unit has a communications (commo/comms) person. Oftentimes, the guy spending his time in the commo shop (S-6) gets a little lonely, toiling away at fixing the internet or the Commander’s computer. What better way is there to let them know that they’re a part of the team than by messing with them from time to time?
Doing any of the things on this list should come from a place of mutual friendship. Don’t do anything that would get you UCMJed, impede the mission, or cost you your military bearing. Basically, don’t be a dick about it.
Enlisting in the Army as a computer guy is one of the least ‘grunt’ things you can do. Chances are, they’re well aware of how ‘POG-y’ they really are and will brush it off.
If you really want to push their buttons, just slyly refer to them as ‘nerds’ in conversation. They’ll try to deny it, but we know. We all know.
6. Say, “but I tried turning it off and back on again!”
A good computer guy will know the ins and outs of how to fix the problem. But as everyone in the military knows, being in a position doesn’t always mean they’re qualified for the task.
An easy solution that many of the younger, more inexperienced computer guys will default to is called a “power cycle,” which is literally just turning it off and back on again.
5. Give them a dumb but effective password
Say something like, “one two, three fours, five sixes, and seven.” When typed out, it should look something like, ‘244466666seVEN!’
Technically, it meets all DoD guidelines — with the added benefit of the commo guy looking at you funny.
4. Ask if that red cable you snipped was important
The red cable is “SIPR Net,” or “Secret Internet Protocol Router Network.” It’s used for much of the highly-classified communication that needs to remain secure and separate from everything else you’d normally do on the internet.
The commo shop is supposed to be the custodian of the secret internet. Sometimes, they need a little reminder that its security is important.
3. Tell them to fix their loose cables
Ever see someone spend way too long to get whatever they’re setting up juuuuust right? That’s how the S-6 is when it comes to arranging the internet stacks.
After they spend hours working on making it beautiful, tell them it’s slightly off. If their cables actually look jacked up, tell them they fail as a commo guy.
2. Ask if they can get it done faster
It may not seem like it, but there’s a method to the madness. If the problem can be solved at the lowest level, they’ll do it. If the problem is too big to handle, they’ll try anyway.
But a third of the time, the issue is locked behind higher level administrator rights than their shop can access. Now, everyone is working on the civilian contractor’s time. When the commo shop can’t do anything about it, make sure to remind them to go faster.
The work order is put in — no need to remind us every few months about getting it back… (Image by Headquarters, 4th Infantry Division Public Affairs)
1. Fake-spoil some nerdy TV show or movie
Remember a few points ago when I said they hate being called nerds? Drive that knife in deeper by fake-ruining something they like.
Don’t be that asshole who actually ruins the movie (or do. I don’t care and you’re an adult), but if the film just came out and you know they haven’t seen it yet, make up some random crap just to mess with them. If they’ve already seen it, they’ll get that you’re messing with them, but if they haven’t, it’ll throw off their entire day until they realize you’re full of sh*t.
While there has been a pause in tensions with North Korea — to the point where the dictatorship, led by Kim Jong Un, is taking part in next month’s Winter Olympics — that regime has always been tricky. Remember, we’re talking about a rogue nation that sank the South Korean corvette Cheonan with a minisub out of nowhere on March 26, 2010, killing 46 of her crew.
Now, you might think that an American carrier isn’t at the same risk as a South Korean corvette. After all, a North Korean minisub can’t carry that many torpedoes. A Yono-class minisub, the type suspected of sinking the Cheonan, packs two 21-inch torpedoes. The larger Sang-o-class sub carries four.
Could the United States Navy lose an aircraft carrier if attacked by one of these minisubs? It seems far-fetched at first. The United States Navy has lost only one fleet carrier, USS Wasp, to a submarine-only attack. Two escort carriers, USS Block Island and USS Liscome Bay were also sunk in submarine attacks, and USS Yorktown was finished off by a Japanese submarine after being rendered dead in the water by aircraft.
Wasp weighed in at 14,900 tons, according to MilitaryFactory.com. By comparison, today’s Nimitz-class nuclear-powered aircraft carriers have a much larger displacement of over 90,000 tons. When the Soviet Union was considering how to kill a Nimitz, they designed the Oscar-class submarine for the job. That was a huge vessel, carrying 24 SS-N-19 anti-ship missiles as well as eight torpedo tubes for disabling and destroying the carrier.
Fortune plays a big role in war, however. For example, The Japanese carrier HIJMS Taiho was sunk by a single torpedo in 1944. Additionally, since the end of the Cold War, American expertise in anti-submarine warfare has declined. In 2006, a Chinese submarine surfaced near and surprised the aircraft carrier, USS Kitty Hawk.
While two-to-four torpedos typically wouldn’t do the job against a U.S. carrier, North Korea could get lucky and sink one, but that luck would quickly turn into bad news for Kim Jong Un.
Learn more about North Korean submarine capabilities in the video below.
“A Joint Coalition Special Operations Unit, including 40 SAS soldiers, have reportedly been flown in to Syria on a covert mission to find Hamza and his gang,” The Mirrror reported.
“He is now considered in the top 10 ‘high-value’ targets being hunted by Coalition forces deployed on Operation Shader.”
The United States added Hamza bin Laden to its terrorist blacklist in January.
The US Treasury estimates that he was born in 1989 in the Saudi city of Jeddah. His mother was Khairiah Sabar, one of the Al-Qaeda founder’s three wives.
Last year, the fifth anniversary of the death of the man who ordered the 9/11 attacks on the United States, experts began to note his son’s increasing prominence in the movement. The State Department has designated him a “Specially Designated Global Terrorist,” freezing any assets he holds in areas under US jurisdiction.
Experts believe Hamza is preparing to take over the leadership of al-Qaeda and exploit ISIS defeats in Syria and Iraq to unify the global militant movement under the banner of al-Qaeda.
The U.S. Marine Corps has the unique mission of securing embassies worldwide. Marines are stationed in embassies as security, they’re sent as reinforcements for diplomatic missions that find themselves in trouble, and they get the first call if an embassy gets evacuation orders. They even have a Special Purpose Marine Air-Ground Task Force based in Spain that specializes in embassy evacuations and other missions in Africa.
Here’s what the Marines do when an American ambassador decides it’s not safe to stay in an embassy.
1. Marines are generally alerted a few days ahead that an embassy evacuation is likely and stage in forward bases. Once the call comes in, they’re able to quickly move into transports.
2. Which base is used depends on diplomatic clearances, available equipment, and local security situations. The Marines will typically stage in the most secure place that will allow them to move to the embassy as quickly as possible.
3. Once they arrive at the embassy, the Marines establish communications with their headquarters and begin securing the area.
4. The Marines establish a defensive perimeter for the embassy personnel to move within.
5. Besides the Marines on the ground, air and naval assets may be used to ensure the security of the evacuation.
5. Marines can track the civilians they are evacuating in a few ways. When available, barcodes can allow the Marines to quickly track confirmed passengers, rather than checking the I.D. cards and passports at each stage.
6. Once Marines have confirmed the personnel they will be evacuating, they can begin moving those people to the transports.
7. A Marine will track the passengers entering the transport against a manifest to ensure that no personnel are left behind.
8. The task force will remain on the ground as the transports depart, keeping the area secure until all are ferried out.
9. Once the civilians have been removed from the embassy, the Marines will follow them out.
10. The transports will bring everyone to a secure area where the Marines will get final accountability of both the civilians and their own forces.
Charles L. Phillips was a 26-year-old Captain in the U.S. Army Air Corps, piloting B-29 bombers in the Pacific theater during the final years of WWII. He was awarded the Distinguished Flying Cross for his heroics during the strategic bombing campaign over Japan. One of Phillip’s last missions was on August 6, 1945, the same day the atomic bomb was dropped on Hiroshima. During the air battle he was forced to ditch his B-29 into the sea. We interviewed Charles Phillips in 1991 and he told us remarkable stories, from his early training in Texas to the firebombing of Tokyo.