The Armata is billed as Russia’s deadliest battle tank and is based on a universal combat platform that serves as the chassis for other military vehicles.
The first configuration, the T-14, has a heavily armored hull and a 125-mm cannon.
T-14 Armata, Wikimedia
The second configuration is an infantry fighting vehicle with a smaller, 30-mm cannon and is called the BMP Armata, or T-15.
The third configuration has a crane instead of a cannon and is the Armored Repair-Evacuation Vehicle, or T-16. It is used to recover damaged armored vehicles and tanks.
The Armata platform has been under development since 2009 and began trials in Feb. 2015. Large deliveries of the tank will start in 2017 or 2018, according to Interfax. Here is the latest video showing the capabilities of the tank, including shots of its interior.
Both Manson and Billy Corgan come from military backgrounds: “We can speak to the personal effect that yes, we can be artists and yes, we can play these roles in public, but at the end of the day, if we don’t serve all our communities – [and] veterans are an integral part of our communities – we’re not really doing service as artists or as people,” Corgan told Rolling Stone.
The tour begins in Concord, California on July 7th.
Sometimes a military jet providing the overhead “sound of freedom” brings with it a very strong gust of wind.
A video posted to YouTube recently shows the Navy Blue Angels practicing near a Pensacola, Florida beach, with Angel no. 5 getting so close to the shore that tents, toys, and umbrellas go flying in the air with it. No one was hurt at the time, which was on July 11, according to Fox News.
Most of the beachgoers laugh and cheer after the stunt.
Set to the tune of war drums in the dense Philippine jungle, this Special Forces video is incredibly motivating.
You’ve seen the typical military recruitment and promotional videos. They’re usually slogan rich and filled with special effects. This video takes a different direction, a more straightforward route, thanks to GoPro mounted cameras and more affordable filming techniques.
The cinematic footage and narration is motivating and impressive – exactly what the Filipino military needs to attract young recruits to fight against their enemies. Due to the region’s heightened tensions with Islamic extremism, disputes in the South China Sea, and other local terror groups, the demand for unconventional warfare and troops willing to carry out these missions have never been higher.
During the Vietnam War, American commandos developed an insertion and extraction method for operations in the jungle that is still used by today’s special operators.
The Special Patrol Insertion/Extraction (SPIE) system is designed for small special-operations teams that operate in areas where an enemy presence or the terrain prevents helicopters from landing.
The SPIE technique hasn’t been used operationally for decades, in part because US air superiority and lackluster enemy anti-aircraft capabilities have meant it wasn’t needed.
But as the US military gears up for great-power competition against near-peer adversaries, like China and Russia, the SPIE technique is relevant again, especially in a potential conflict in the Pacific.
Warriors of the jungle
The SPIE system can be traced to the rope insertion and extraction techniques of the Vietnam War. It was the innocuous sounding Military Assistance Command Vietnam-Studies and Observations Group (MACV-SOG) that invented and used the method.
A highly classified unit, SOG took the fight to the North Vietnamese Army and Vietcong, conducting cross-border operations into Laos, Cambodia, and North Vietnam—where US troops officially shouldn’t have been.
Composed of Green Berets, Navy SEALs, Recon Marines, Air Commandos, and indigenous forces, SOG tried to stop the onslaught from the North and give South Vietnam some breathing space.
SOG’s classified operations mainly took place in rough and inaccessible jungle, where the NVA had built the infamous Ho Chi Minh trail complex, over which flowed supplies to their forces in South Vietnam. The terrain restricted operations and often forced SOG teams to create their own landing zones by either detonating explosives or by requesting B-52 bombing runs to create craters where helicopters could land.
But landing wasn’t always an option. Secrecy was paramount for mission success. SOG patrols of six to 14 men didn’t have a chance of survival against hundreds or thousands of NVA in an open battle.
With so few landing zones available in the jungle, and with the NVA always trying to monitor them, SOG operators came up with different techniques that didn’t require landing.
At the time, the SPIE terminology didn’t exist, and operators simply used the term “ropes” to refer to methods such as the STABO Extraction Harness, McGuire Rig, and “Swiss Seat.”
The STABO Extraction Harness, or STABO rig, was one of the most used. Designed for quick infiltration into and exfiltration from the jungle, the STABO rig was a mandatory piece of equipment for every recon member. It was worn throughout the mission since recon team members didn’t know if or when they would be compromised, which would often mean a frantic race to escape from superior forces.
During an extraction by ropes, the helicopter crew chief would throw ropes with a sandbag tied to one end down from a hovering helicopter. SOG commandos would hook the ropes to links on their uniforms. The helicopter would then rise straight up to clear the jungle before flying away.
Throughout the Vietnam War, ropes methods saved several lives, and their use sometimes seemed straight out of a movie.
In June 1967, a reinforced SOG company composed of Green Berets and local troops entered Laos to conduct battle-damage assessment after an airstrike on a North Vietnamese headquarters hub along the Ho Chi Minh trail complex.
The roughly 100-man “Hatchet Force” came upon a strong NVA force, and a fierce battle ensued. The American commandos and their local allies were surrounded and pinned down, but their firepower saved them from being overrun.
The NVA shot down several fixed-wing and rotary-wing aircraft that tried to exfiltrate or support the battered SOG company. Eventually, some choppers were able to come in and exfiltrate members of the force.
During one of those trips, a Marine Corps CH-46 Sea Stallion was shot down close to the Hatchet Force’s perimeter. Somehow, Sgt. First Class Charles Wilklow survived the crash, though he was badly wounded.
The NVA captured him but, seeing his wounds, thought he only had a few hours to live. They tied him down and used him as bait for a rescue operation. Considering the certain failure of a rescue mission, SOG headquarters didn’t take the bait.
After four days, Wilklow was still alive, despite his grievous wounds. Yet the NVA didn’t guard him, believing he wouldn’t survive. Wilklow managed to free himself and crawl into the jungle at night.
The next day, a SOG forward air controller spotted an almost-dead Wilklow. He was soon extracted by ropes — despite his ordeal, he was still wearing his STABO rig.
As tensions rise with China, and with conflict in Southeast or East Asia a growing prospect, the SPIE method is increasingly relevant, but it remains risky and inconvenient.
“[SPIE] operations are pretty dangerous, with lots of moving parts that can potentially go wrong,” a Marine Raider told Insider. “You have to watch as you exit the aircraft mid-air, and more so if you’re the first man out because you’ve got five, six, sometimes seven guys right behind you while the pilots are trying to hold position midair. You also have to account for the rotor wash in water and desert ops. You can’t see much while landing because of the sea spray or dust in the air.”
Since the SPIE technique can be used for both land and water operations, it provides special-operations units with more choices when planning operations in the Pacific theater.
For example, the SPIE technique can be used to extract Navy SEALs conducting special reconnaissance along the Chinese coast or a Special Forces detachment doing unconventional warfare in support of local forces on China’s borders.
Haka, (Maori: “dance”) Maori posture dance that involves the entire body in vigorous rhythmic movements, which may include swaying, slapping of the chest and thighs, stamping, and gestures of stylized violence. It is accompanied by a chant and, in some cases, by fierce facial expressions meant to intimidate, such as bulging eyes and the sticking out of the tongue. Though often associated with the traditional battle preparations of male warriors, haka may be performed by both men and women, and several varieties of the dance fulfill social functions within Maori culture.
This video shows the soldiers of 2/1 RNZIR Battalion performing their unit haka as a final farewell to their fallen comrades:
The military often concocts some amazingly innovative technologies for use on the battlefield, but that’s not always the case.
As a video from This is Genius shows about weapons developed during World War II, there were plenty of projects that were much more bizarre than they were innovative.
There were the short-range rockets developed by the U.K. that were supposed to snag on enemy planes with cables and the Soviet bomb dogs that were trained to attack German tanks. They didn’t always work out as planned.
The Danish film ‘A War’ is about an officer who had to make a hard decision under fire and the legal charges he faced when he returned home. It’s an unflinching look at military families, the strains of separation during deployment, and the unforgiving nature of commanding troops under fire while wrestling with restrictive rules of engagement.
The film has been nominated for an Academy Award for Best Foreign Language Film and will be released in limited theaters starting February 12.
China is at it again, starting off the first 100 days of the Biden Presidency with a number of cyberattacks aimed at shaking American businesses, local governments and even those agencies with their own interests in what happens inside the Chinese government.
The latest round of Chinese attacks on American data services was one of the most advanced hacks yet, especially in terms of the measures taken to evade detection. This time, the hackers weren’t necessarily targeting the Department of Defense or critical infrastructure, they were targeting individuals with information China would consider valuable.
A hacking group called Advanced Persistent Threat 5 (or APT5) is the culprit in the latest round of attacks according to Charles Carmakal, chief technology officer of Mandiant, a division of FireEye. FireEye has routinely aided the U.S. government in its cybersecurity efforts and has detected or thwarted a number of high-profile attacks in the past decade.
“This looks like classic China-based espionage,” Carmakal told the Washington Post. “There was theft of intellectual property, project data. We suspect there was data theft that occurred that we won’t ever know about.”
Though the defense department was a target of this round of hacking, a number of other U.S. government agencies were, along with some critical defense contractors. The attacks began in June of 2020 and may even be ongoing. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), acknowledged as much in an April 2021 alert.
This time, the flaws exploited by Chinese hackers were inside of Pulse Secure virtual private network servers (VPN) that allow remote working employees to access company servers while offsite.
Hackers also got into hardware devices near the victims’ locations, and renamed their servers to mimic those of current employees. Hiding in plain sight with a common name and the accounts of persons they just hacked is what made the intrusion so difficult to detect.
FireEye has a long history of exposing high-profile hacks from state actors. In 2015, the company discovered Chinese hackers exploiting vulnerabilities in Microsoft Word and Office applications as well as Adobe Flash Player. In 2016, it discovered a vulnerability in the Android mobile operating system that allowed hackers to access text messages and phone directories.
The cybersecurity firm was also a target of hackers itself in 2020, when state-funded hackers stole the FireEye toolkit. FireEye had to then begin to fight its own software, releasting tools to make the use of its toolkit more difficult in cyberattacks.
Most importantly, FireEye detected the 2020 SolarWinds attack and reported it to the National Security Agency (NSA). The SolarWinds attack allowed hackers to breach multiple government agencies, grant themselves privileged access to their networks. This attack was allegedly conducted by hackers working for the Russian Foreign Intelligence Service, or SVR.
In response, President Biden implemented seeping sanctions on the Russian economy upon taking office. There is no word yet on retaliation against China from the Biden Administration, the White House has only commented that it was aware of the situation and was monitoring it closely.
The most recent cybersecurity breach by APT5 is the third detected attack in 2021, all suspected to have links to China’s Communist Party. One of the previous two attacks hit 30,000 Americans in small business and local government, the other targeted tech giant Microsoft.