July 22, 1979, was the day Iraq became a dictatorship headed by Saddam Hussein. In a terrifying purge of the Ba’ath party, Saddam rid himself of all opposition and secured his rule.
Just six days after seizing power by forcing out his cousin Ahmed Hassan al-Bakr, Saddam summoned all of the Ba’ath party leaders to an auditorium near the presidential palace and had the secret police lock the doors behind them.
At the head of the podium stood Muhyi Abdel-Hussein, who had been the general secretary of the Revolutionary Command Council, the executive committee that ran Iraq. He accused himself of being involved in a Syrian plot against the regime along with other co-conspirators in that very room. One by one, as each name was read out loud, party members were plucked from the audience. Meanwhile, Saddam sat off to the side sitting nonchalant smoking a cigar like Al Pacino in Scarface.
In all, 68 of them were removed for alleged treason. 22 of them were subsequently sentenced to death by firing squad and the rest locked away. Here’s the actual footage from Saddam’s public purge.
If Godzilla actually existed and was bent on raising havoc, the Air Force’s 18th Wing out of Kadena Air Base thinks it’ll beat the 350-foot-tall monster.
But how do you defeat a monster that has withstood depth bombs, 50-caliber machine guns, 300,000 volts of electricity, Howitzer cannons, and an aerial bombardment in the 1954 Japanese film classic? How do you defend against atomic breath and super strength?
Senior Airman Mark Hermann and Master Sergeant Jason Edwards believe they have the answer.
The CBU-105 cluster bomb is a devasting tank-killer. One bomb can carpet an area of 1,500 by 500 feet, roughly 15-acres.
But unlike traditional cluster bombs, the CBU-105 is considered a “smart bomb.” The weapon can destroy multiple moving or stationary threats with minimal collateral damage while leaving no hazardous unexploded ordnance on the battlefield.
Its BLU-108 submunition cylinders use infrared and laser sensors to seek and destroy targets by pattern-matching. If it fails to find a target, the skeet warhead within the bomb self-destructs. And if the self-destruct system fails, a backup timer disables the skeet. The disabled skeets that make it to the ground also have an inert feature, which make it resistant to exploding via tampering, according to Textron.
The lessons in Sun Tzu’s book “The Art of War” still ring true, despite it being written in 513 B.C. Case in point comes from the tactics used during the Vietnam War. As the following video points out, you have American Gen. William Westmoreland, who sees the battlefield like a chessboard. Then you have Gen. Võ Nguyên Giáp — who sees it like Sun Tzu would — as a go board. In go, you acquire territory with the fewest resources instead of eliminating the enemy troops like in Chess.
“It’s a classic case of a general fighting the last war,” says Richard A. Gabriel, a professor at the Department of War Studies at the Royal Military College of Canada, in the video. “The lessons he learned there [Gen. Westmoreland during World War II] only apply partially to Vietnam. There were no fixed objectives to be taken, there were no fixed units to be destroyed.”
This video shows how Sun Tzu’s lessons were applied during the Vietnam War:
The maximum punishment for desertion during a time of war is death. But it’s highly unlikely Sgt. Bowe Bergdahl, who allegedly left his Afghanistan post in 2009, or any troop today would receive that sentence. The last service member executed for desertion was Pvt. Eddie Slovik in 1945 (by a twelve-man firing squad).
There were over 20,000 American military deserters between 2006 and 2015. Of those, about 2,000 have been prosecuted.
This short TestTube News video explains the severity of desertion and its place in military history.
Jordanian F-16s launched 20 airstrikes on Islamic State targets in 2015 following King Abdullah II’s declaration to wage a “harsh” war against militants from the group, also known as the Islamic State of Iraq and the Levant (ISIL) or ISIS, after the brutal execution of captured Jordanian pilot Moaz al-Kasasbe.
Abdullah participating in a military special operations training exercises as Jump-Master.
NATO wanted a replacement for its 9x19mm Parabellum firearms; what it got is the ultimate special ops weapon.
The FN Herstal P90 is a compact but powerful sub-machine gun. It was designed for vehicle crews, support personnel, special forces and counter-terrorist groups.
It’s an ugly futuristic-looking weapon. The bullpup design with ambidextrous controls and top-mounted magazine make it unconventional. But make no mistake, this is an incredibly useful weapon. It’s so effective that it’s currently in service with military and police forces in over 20 nations throughout the world, according to this video.
The MTV Music Video Awards was filled with stars that support the military. Our hosts, Marine Corps veteran Weston Scott and Air Force veteran Skye P. Marshall ran into Tito Ortiz, Kool Mo Dee, Jasmine Villegas and more.
We asked our celebrity supporters to snap to attention and give us their best salute, here’s how they fared:
The forthcoming movie “Star Wars: The Force Awakens” has already inspired parodies, including the latest Navy spirit video ahead of the Army-Navy football game on Saturday, December 12.
In classic rivalry fashion, the Midshipmen predict their 14th straight win against the Black Nights. (Navy has enjoyed a winning streak since 2002.)
The video description follows episode IV’s plot of the rescue of princess Leia. (Just replace Star Wars terms with Navy ones.)
Luke and his band of fellow Mids set out on a journey to rescue Midshipman Leia from Army West Point on the eve of Navy football’s 14th victory. Losing streaks are a path to the dark side. May the 14 be with them.
And the jabs don’t stop there. The video cleverly pokes fun at West Point’s pillow fight incident earlier this year in which 30 first-year students were injured.
When Darth Vader asks what the current state of the academy is, a West Point cadet answers:
My general, everything is normal. It is cold, morale is low and the football team is … like I said, everything is normal.
The elaborate production includes 27 midshipmen, the varsity offshore sailing team, the Commandant of Midshipmen, the Superintendent of the Naval Academy, and even the Chief of Naval Operations.
With the recent hack of the U.S. Office of Personnel Management affecting approximately 22 million people, there’s plenty of reason to worry about cybersecurity.
Adversaries are engaging the U.S. in cyber-war on hidden battlefields where they target military, government, banks and private businesses. The greatest threats come from China, Russia, Iran and North Korea, according to The New York Times.
Sometimes hackers are backed by nation states. Sometimes hackers are individual actors — lone wolves who get their jollies from creating digital mayhem. This video picked out five hackers as “the most dangerous of all time.”
Back in 2013, NSA whistleblower Edward Snowden revealed that the federal government was collecting our personal data. Ever since, Virtual Private Networks, or VPNs, are used to encrypt a person’s activity on the internet. The sophistication of these companies has improved and usage of the software is as easy as turning on a light switch. Everyone has that one friend that spews out conspiracy theories that are just flat out wrong. Keep in mind, even a broken clock is right twice a day, this time the government is watching you.
Most VPN services log your activities
VPN logs are the data that providers keep regarding usage of their service. When it comes to what they could store, you have to remember that your provider has access to all of your internet activity. So everything your ISP would normally see is technically now accessible by your VPN provider. Of course, if providers actually logged and stored all of that data, they wouldn’t be offering a very attractive service, and would no doubt lose a lot of customers. Instead, the lack of logs is one of the main selling features broadcast by many providers in a bid to win over consumers.
AIMEE O’DRISCOLL VPN AND CYBERSECURITY EXPERT
Having a VPN that keeps logs of your activity defeats the purpose of a VPN in the first place. All U.S. based VPN providers have to hand over logs to the federal government when ordered to do so. In fact, they’re strictly prohibited on directly telling you if they have been subpoenaed by the feds. A Warrant Canary is one workaround. It is a webpage that they update once a month stating that no secret government subpoenas have been issued. If you use a US based VPN with a Warrant Canary and an outdated page, the canary is dead. So is your privacy.
Foreign based VPNS also cooperate with federal agencies
You may not have heard of 5 Eyes and 14 Eyes countries and that is by design. The 5 Eyes alliance (FVEY) is an agreement between the United States, the United Kingdom, Canada, Australia and New Zealand. They collect telephone calls, texts, emails, signals to weapon systems or radars and share that information. The FVEY is also a convenient workaround to spying on US citizens by having an ally do the dirty work and handing the information over.
The alliance expanded to Denmark, France, the Netherlands, and Norway and became the 9 Eyes alliance. We now have the 14 Eyes alliance with Belgium, Germany, Italy, Spain and Sweden. The FBI and other agencies can see you if your VPN service is headquartered in any of these countries.
The intention of this alliance is to form a united front against state sponsored intelligence attacks by China, Russia, Iran, and other enemies of the west. What does that have to do with you? Your activity does not have anything to do with national security so it does not apply, right? Wrong. On, March 11, 2020 the House of Representatives passed H.R. 6172, here is the executive summary provided by senate.gov.
The USA FREEDOM Reauthorization Act of 2020 prohibits the government from using FISA authority to collect call details records on an ongoing basis and prohibits the use of tangible business records to obtain cell site location and global positioning system location, with exception. This act extends the authorization for the reformed expiring FISA authorities, along with the “roving wiretap” authorities and “lone wolf” provision to December 1, 2023. It also requires the attorney general to approve a FISA application to surveil any elected federal officials and candidates for federal office and increases the penalty for making false statements to the Foreign Intelligence Surveillance Court from five to eight years imprisonment. Provisions in the legislation also require extensive reporting on FISA applications, FISC and Foreign Intelligence Surveillance Court of Review decisions, and investigative techniques used by the federal government.
All an agency has to do is slap a national security label on the subpoena and slap a lone wolf label on you. You do not have to fix in the box, they build it to order around you.
I understand the need to protect our national security and the FBI’s defense against foreign intelligence attacks. I applaud their fervor and dedication to capturing child predators as well. What I do not agree with is the violation of our rights as citizens of the United States. If the federal government wants to hunt down the scum of the earth, by all means do it. They should do it without jeopardizing the confidence of The People.
You can never fully hide on the internet
One of my favorite quotes from The Social Network is by Erica Albright denying Facebook’s founders apology for writing nasty blogs after they broke up. ‘It didn’t stop you from writing it. As if every thought that tumbles through your head was so clever it would be a crime for it not to be shared. The Internet’s not written in pencil, Mark, it’s written in ink.’
So, why does it matter if the government has your information or not? Using a VPN to protect your passwords, banking information, transfer of sensitive documents, etcetera, is a good reason to protect yourself on the internet. Using encryption technology to protect yourself from identity theft is what it is there for. Government websites and commercial websites, like Google, can and will be hacked by foreign adversaries. No one is invulnerable on the internet, not even Uncle Sam. Doxing is when an individual obtains information available on the internet about you and makes it public with malicious intent. If an incel on the internet can find information about you, then a highly trained federal agent can too.
Due to a design oversight, the internal weapon’s bay of the F-35B is too small to carry the required load of the new Small Diameter Bomb II (SDB II), Inside Defense reports, citing the Pentagon’s F-35 Joint Program Office. The SDB II is a next-generation precision-strike bomb that was meant to dovetail with the F-35 program.
The F-35B was designed to carry eight SDB IIs inside the internal weapons bay. These bombs would allow the F-35 pilot to target eight points from 40 miles away and with complete precision. The SDB IIs can also change course in-flight to follow moving targets through laser or infrared guidance systems, according to Foxtrot Alpha.
However, the F-35B can only fit four of the required bombs in its weapons bay. The F-35B variant has a significantly smaller internal bay than the F-35A and F-35C due to the aircraft’s design as a short-takeoff-vertical-landing aircraft.
Inside Defense reports that the “Navy initially wanted to field the SDB II first on the F-35B/C but is instead bringing forward integration with the F/A-18 Super Hornet. The SDB II is an F-35 Block 4 software capability and the release of that software load has been pushed back to FY-22.”
In other words, because the SDB II is included with the weapon Block 4 upgrade for the F-35, the aircraft is now likely to not field the new munitions until 2022.
F-35 spokesman Joe DellaVedova confirmed to Inside Defense that the SDB II problem has been known since 2007 and the more difficult changes to the aircraft have already been made in order to allow it to field the munitions.
“We’ve been working with the SDB II program office and their contractors since 2007,” DellaVedova said. “The fit issues have been known and documented and there were larger and more substantial modifications needed to support SDB II that have already been incorporated into production F-35 aircraft.”
The F-35B variant is the Marine Corps model of the plane and 34 aircraft have already been delivered to the branch. The delay in implementing the SDB II will not affect the aircraft’s ability to fly but will limit the operations that the F-35B will be able to effectively carry out.
As mankind turns their eyes back to space and technology edges us ever closer to a life outside of the atmosphere, there must also be contingency plans established in case the worst happens to astronauts. To date, there is no defined protocol for returning remains back to Earth. This will need to change as more and more astronauts take to the skies.
There have been eighteen deaths during spaceflight. The three deaths to occur in space (above 100 km elevation) were also the only remains properly recovered. The crew of the Soyuz 11 perished on June 29th, 1971 while they were preparing for re-entry. Their names are Georgy Dobrovolsky, Vladislav Volkov, and Viktor Patsayev. Their remains were recovered at the intended landing site — an autopsy ruled the cause of death a capsule-decompression failure — and the astronauts were properly laid to rest. They may be the first and only astronauts to be given this respect.
If an astronaut were to die on a spacewalk and his or her body went unrecovered, they would float lifelessly until caught in the atmosphere, at which point they’d burn in the reentry process. Until then, no bacteria could survive to decompose the body, so it would remain frozen as the days passed.
However, due to the UN’s strict “no littering” policy in space, the family and nation of the astronaut would be required to recover the remains and lay them rest with dignity. A space free-float wouldn’t happen.
This also rules out all possible funerals, like the one given to Spock. (Paramount Pictures’ Star Trek II: The Wrath of Khan)
According to Col. Chris Hadfield in his book, An Astronaut’s Guide to Earth, today’s astronauts conduct simulations for onboard deaths, but taking care of the body is tricky and very unpleasant. The remains are placed inside of a GoreTex bodybag. Then, it is isolated immediately in the airlock to avoid contamination to the air supply.
The funeral rites are then given to the deceased. This would include speeches by world leaders, the deceased’s family, and the crew. The body is then exposed to space to freeze. A robotic arm then takes the corpse and vibrates it outside of the spacecraft until the body breaks down into a powder, which is then released into space. As morbid as it is, it saves valuable room in the spacecraft and keeps the other astronauts safe. In a way, the astronaut becomes a part of space.
The powder that remains in the bag is then given to the family on the next return voyage, allowing them to pay the proper respects.