Delta Force goes by many official and unofficial names. It is most commonly referred to as “The Unit,” but those in the inside call it CAG (Combat Applications Group). Whatever you call it, no one ever speaks of Delta Force officially and such, no one really knows exactly what instructors are looking for in future operators.
“It’s not always the best guy that makes it,” said former Delta Force operator Pat Savidge in this Military Channel video. “It’s the right guy.”
Delta Force operators are the toughest of the tough. The group is made up of elite soldiers and special forces troops from all branches of service, including the National Guard and Coast Guard.
This video shows what it takes to try out for Delta Force:
The technology behind these rifles takes a shooter’s experience, skill, and environment factors out of the equation. Simply tag your target and squeeze the trigger. It’s that simple. The same tracking and fire-control capabilities found in advanced fighter jets are incorporated into these rifles, according to TrackingPoint.
“Being proficient at Call of Duty or Battlefield takes more practice and skill than firing a weapon in the real world does now,” reported Timothy for Engadget. “This is the future we live in.”
The rifle also has a password-protected firing mechanism, which doesn’t fire until you’ve aligned the rifle with your target. It also features the ability to video stream, which allows you to share the view from the scope to any device connected to the Internet.
This three-minute video demonstrates how the rifle works:
We’ve all seen the military homecoming videos, with a service member returning from overseas to surprise their loved ones.
But what happens when a soldier comes home and surprises a total stranger? Well, not to worry, because the satirical website ClickHole has you covered.
“I think he’s going to be very surprised, because he has no idea that I’m finally back from Afghanistan,” says “Sgt. Luke Brundage,” in the video produced by the one-year-old offshoot of The Onion.
With the look and feel of many familiar homecoming videos, the video hilariously illustrates a very awkward meeting, if something like this ever did occur. Interestingly enough, the actor who portrays Brundage is a Marine veteran, according to The Marine Times.
And while it does have some technical errors (using “soldier” instead of Marine, for instance), it’s still funny as hell. And the actor, Jonah Saesan, had little to do with pointing those out.
“A few people want to focus on the detail,” Saesan told The Times. “I don’t think they understand how little I had to do with the creative process.”
“Confusion Through Sand” tells the story of a young infantryman confronted by overwhelming conflict when he’s sent to a small, sandy village. Scared and alone, he has to fight his way out of an ambush.
The nine-minute short reveals the confusion of war from the warfighter’s perspective. It explores the spectrum of haze experienced by today’s soldiers in the desert, interpreting what happens when training encounters circumstances beyond the realm of human control.
The story is on the ground and under the helmet of a 19-year-old infantryman, according to the video’s Kickstarter campaign.
However, patients enrolled in VA care will get priority. About half of all 18 million living U.S. veterans are enrolled in VA care, according to the U.S. Census Bureau.
“This new law expands options for where veterans and their families can receive the COVID-19 vaccine, ensuring that every veteran, spouse, and caregiver will have access to the protection they need from VA,” Sen. Jon Tester, D-Mont., the chairman of the Senate Veterans Affairs Committee said in a statement. “This bipartisan bill follows through on our shared goal of getting more shots into the arms of as many veterans as possible.”Advertisement
As of Wednesday, the VA has fully vaccinated more than 1.5 million people, including veterans and employees. Previously, only veterans enrolled in VA could get vaccinated.
The bill’s signing comes during a massive concerted effort from the Biden administration to give vaccine access to as many Americans as possible, with the goal of the country starting to return to relative normalcy by Independence Day.
“COVID-19 has wreaked havoc on all American including veterans and their families,” Veterans of Foreign Wars National Legislative Director Pat Murray said in a statement. “The end may be near, but we will not come out of this until everybody possible has vaccinations.”
He joined the military to escape a bad situation, and the rest is like something out of a Hollywood script. Benavidez walked into certain death when he volunteered to assist with the emergency extraction of a 12-man special forces team caught under extreme fire behind enemy lines.
Benavidez would serve 13 years before receiving the Medal Of Honor. When asked if he’d do it again, he said, “There would never be enough paper to print the money nor enough gold in Fort Knox for me to have, to keep me from doing what I did.”
How does a runner on second know when he should steal third? Does a batter automatically know when to bunt? When does a quarterback call an audible – and how can he communicate that play without the other team knowing just what he saw in their defense? Hand signals and codes are simple ciphers designed to communicate a simple message. It’s no different from what intelligence agents have been doing since days of Julius Caesar.
Sports teams have been using encrypted signals since before World War I. Most famously, the 1951 Giants put a man with a telescope in center field to read the opposing teams calls and signals. The Giants overcame an almost 14-game deficit that year to force a playoff with the Brooklyn Dodgers. From the Giants’ center field manager’s office, coach Herman Franks relayed the opposite teams’ signs to the bullpen using an electric buzzer system. The catcher’s call would then be relayed to the batter.
The scheme was simple intelligence tradecraft.
“These are simple messages being sent,” says Dr. Vince Houghton, the curator and historian of the International Spy Museum in Washington, D.C. “They take a basic step of encryption, the way an army encrypts tactical plans to attack or defend. You can let the enemy know what you’re going to do next, so you can’t send these messages in the clear.”
The reason the ’51 Giants encrypted their signals was the same reason they climbed back into the playoffs: unencrypted messages were easy to intercept, which made it so their hitters knew what the pitcher would do, giving them a huge advantage.
The relationship between sports cryptography and the military can go the other way, too. In Vietnam, Lt. Col. Iceal Hambleton was shot down in an EB-66 near the North-South Vietnam Demilitarized Zone. This was literally the worst situation for military intelligence. Hambleton not only had the intelligence vital to the Vietnam War, but the U.S. military’s entire Cold War-World War III contingency plans. If he was captured by the North Vietnamese, they would be able to give the Soviets the entire Strategic Air Command war plans.
Hambleton survived and the NVA knew exactly how valuable he was. While looking for extraction, he had to evade the NVA patrols looking for him while making his way to the rescue area. The problem was he had to be told how to get there over the radio – and an unencrypted radio was all he had.
Knowing Hambleton was crazy about golf – perhaps the best in the U.S. Air Force – the military fed him the info he needed to move using a simple substitution cypher. It took Hambleton a half-hour to figure out what they were doing.
“Instead of telling him to move south 100 meters, they would tell him to walk the first hole on Pebble Beach,” says Dr. Houghton. “He was tracked by using descriptions of golf course holes he knew well.”
Other codes included playing 18 holes, starting on No. 1 at Tucson National.
“They were giving me distance and direction,” Hambleton later explained. “No. 1 at Tucson National is 408 yards running southeast. They wanted me to move southeast 400 yards. The ‘course’ would lead me to water.”
Unlike using a radio, sports code has to be done in plain sight — that’s where the hand signals come in to play.
For tickets to visit the exhibits and see the largest collection of espionage-related artifacts ever placed on public display, visit https://www.spymuseum.org/tickets/. Also, there’s a $6.00 military discount!
Stanley Kubrick’s “Full Metal Jacket” is arguably one of the most influential military movies of all time. It’s the movie would-be troops romanticize about before enlisting in the military and it’s certainly the movie they watch to mentally prepare themselves before shipping off to boot camp to face their drill instructors.
However, as iconic as this 1987 film has become, it almost didn’t turn out that way. This 30-minute video shows how Full Metal Jacket was made and what the cast and crew did to “get it right.” There are plenty of interesting tidbits, like how relatively unknown actor Vincent D’Onofrio initially didn’t even want to do the film, and why a horrific scene between “Animal Mother” and the sniper was cut out.
Cyberattacks are the best way for America’s enemies to mess around with the United States without triggering a full-scale war. Let’s be real, if China and Russia saw real-world retaliation for every time they messed with U.S. computer systems, we’d be in the middle of World War III right now.
But aside from stealing military technology, hacking the names and bank accounts of every federal employee, and mucking about in some utility companies, their cyber intrusions have been little more than a nuisance up to this point. That’s not how American cyberwarriors operate.
When the United States and Israel conduct a cyber attack, there’s a good reason for it and the target is clear. Stuxnet, a malicious virus designed to destroy Iran’s uranium enrichment program, was the sniper rifle of the U.S. cyber weapons arsenal.
First uncovered in 2010, the Stuxnet worm was introduced onto the computer systems of the Iranian uranium enrichment facility at Natanz. The program was specifically engineered to be on that particular server, one that had to be running Supervisory Control and Data Acquisition software, that had to be using Siemens technology (specifically, Siemens 7), and had control over a programmable logic controller (PLC), controlling an electric motor. If all of these conditions didn’t exist, the program would eventually delete itself.
PLCs are a critical component of almost all major manufacturing facilities and automated machines, managing everything from traffic lights to pipe valves. There was only one place in the world where those conditions existed: the Natanz nuclear facility in Iran. Those motors were controlling the centrifuges that were enriching uranium for Iran’s nuclear program.
What this means is that whoever created the Stuxnet worm had an insider in the Natanz nuclear facility, one who knew the exact conditions malicious code would have to attack, as well as how best to permanently damage the facility’s operations, or at least set it back a little bit.
Moreover, since the computer systems at Natanz weren’t connected to the internet, the inside man would also have to be able to introduce the worm to the Natanz controlling systems. According to the Times of Israel, this was done by the CIA and Mossad, who set up a fake front company with the sole purpose of getting Dutch intelligence agents posing as technicians into the facility.
Once introduced, the worm lay dormant. Once awakened, it looks for the conditions that would begin its destructive sequence. At Natanz, it found those conditions and began to force the centrifuges to spin too fast for too long, damaging the mechanical equipment. Meanwhile data collection and reporting software tells monitoring engineers that all systems are operating normally.
At Natanz, Stuxnet damaged 1,000 of the estimated 5,000 gas centrifuges before Iran realized something was amiss. They would reportedly execute a number of personnel at the facility, although it’s not known if intelligence assets were killed in the fallout. The day the Iranian government revealed what happened there, two Iranian nuclear scientists were killed by car bombs, further complicating the program’s restart.
No intelligence agency has ever taken credit for the Natanz Stuxnet attacks, but evidence is clear that it was a highly-engineered bug, designed for a limited mission with a small target. But like most clandestine operations, there was unexpected blowback.
The Stuxnet virus escaped from the computers at Natanz and has since spread to other systems across the world, including European manufacturers and a Russian nuclear power plant – and possibly more. Stuxnet is difficult to find and is self-replicating, so computer systems infected by the worm may not realize it until it’s too late.
The Confederate flag’s dark and nuanced history has long made the rebel banner an uncomfortable topic of conversation. In the minds of many Americans, it is a symbol of slavery and institutionalized racism – an emblem on par with the Nazi swastika. For others, it’s simply an expression of regional pride.
However, after the racially-motivated church slayings in South Carolina last week – committed by a man who was a proud flyer of the stars and bars – state governments have begun to remove the Confederate flag from their federal buildings. The United States military, on the other hand, has yet to address the issue officially.
South Carolina’s Army Guard still flies 16 streamers that were created under the Confederacy, and servicemen and women are allowed to sport the Confederate flag on clothing and tattoos — something the Defense Department does not consider offensive material. Still, some military officials have decided to retire the flag after the shootings, including The Citadel, South Carolina’s famous military academy, which removed the Confederate Naval Jack from its chapel.
Gen. Daniel Allyn, vice chief of the U.S. Army, spoke to the The Military Times about the rebel flag’s importance within the American military:
“I think that, when you are a student of military history, let’s face it: One of our greatest military generals in the history of our nation was Robert E. Lee,” Allyn said, referring to the legendary Confederate commander.
At Army posts throughout the country, there are “thousands of battle pictorials of Grant and Lee going up against each other with their requisite flags,” he added, noting Lee’s Union counterpart, Gen. Ulysses Grant, who later became America’s 18th president. “So yes, you will find those resident. And if those are offensive to people, I’m sure that our commanders will deal with that.”
“We swear our allegiance to the flag of the United States of America,” Allyn said, “… and we will protect and defend that flag.”
The Air Force took steps to relax the military’s current stance on transgender men and women serving in uniform earlier this month, by requiring a higher authority to authorize discharges for enlisted transgender airmen and airmen who have been diagnosed with gender dysphoria, according to a news release.
Openly transgender Senior Airman Logan Ireland hopes that this decision will eventually allow transgender servicemen and women to serve openly without the risk of involuntary separation, despite the fact that the Air Force policy itself has not changed .
Ireland joined the Air Force as a woman in 2010, and was featured in “Transgender, at War and in Love,” a documentary short exploring his relationship with fiancee and transgender soldier Laila Villanueva.
“Day in and day out, you’re constantly worried about a discharge…so every day when I put on my boots and strap on my gun and duty belt, I’m at risk for a discharge — and that’s the least of my worries in my personal job. No one should have to worry about that day in and day out. “