They brought the herd of camels into unfamiliar territory as part of an experiment, but when things went wrong, they accidentally let them loose to terrorize the countryside. No, that’s not the plot of a campy, direct-to-DVD horror film, that’s a true piece of US Army history.
Following a siege at Camp Verde, Texas, just before the onset of the American Civil War, nearly forty camels escaped US Army custody. These camels turned feral, reproduced, and roamed the southwest for years, damaging farms, eating crops, and generally wreaking havoc wherever they went. A few of them even ended up as the basis for a handful of ghost stories.
The sad and bizarre history of the U.S. Army Camel Corps
I mean, if it worked for the Ottomans, it’ll work for us… right?
(Imperial War Museum)
The experiment technically started back in 1836 when U.S. Army Lt. George H. Crosman came up with a brilliant solution to traversing the stark deserts of the American Southwest before the completion of the Transcontinental Railroad. Horses could only take them so far through the sands and would eventually refuse to work in extreme heats. His solution? The Arabian camel.
In 1855, his plan began to take shape. In theory, the imported camels were to replace horses in the region. They were far more accustomed to heat, they could go great distances with little water, and they preferred to eat the shrubbery that other livestock and horses wouldn’t.
Unfortunately, they were still camels. Giant, goofy, smelly camels. As it turned out, they weren’t any faster or able to carry any more weight than a horse or mule — and they had a tendency to scare smaller livestock nearby. But they were able to go more than a few hours without water, so the plan was labelled technically a success.
The Army gave it the stamp of approval and the Camel Corps was unofficially green-lit.
Even today, troops aren’t the biggest fans of camels.
(U.S. Marine Corps photo by Cpl. James Clark)
The camels were housed in Camp Verde, Texas, which is roughly half way between San Antonio and El Paso. Since camels were very expensive to buy and maintain and had niche applications, the Camel Corps never really went anywhere.
Instead of being useful assets in the desert, the camels were more something that soldiers stationed at Camp Verde just had to deal with. Their smell wasn’t pleasant, to say the least, and were generally apathetic towards doing anything useful. When camels get agitated, which would obviously occur when their handlers mistreated them, they tend to spit, kick, and will outright refuse to do anything. The camels were basically just contained within either Camp Verde or at Fort Tejon, wherever the guy advocating their use was stationed.
Imagine you were a 19th century pioneers would have absolutely no knowledge of what the a camel was and you see one out of your ranch… You’ve got yourself a recipe for many horror stories.
(Photo by Pelican)
Then, just months before the Civil War broke out, Confederate troops overthrew Camp Verde on February 28th, 1861. In the chaos of the battle, the camels were set free to cause a distraction. They did exactly that and the camels scattered. Of the over one hundred original camels stationed there, the Confederate troops were only able to capture 80 of them — meaning plenty were scattered to the wind.
The camels were said to be spotted all across the west. Sightings were reported from Iowa to California to even British Columbia. In the following decades, the camels would periodically destroy and the locals would look on, many of whom had no idea what a camel even was. To them, these were odd, giant, humped beasts that occasionally spat at them.
These camel sightings continued until 1941. For the most part, their sightings were often met with confusion or wonder as they would happen upon a random farm here and there. Weird, but they are gentle giants, after all.
Just because there’s a logical explanation for it doesn’t mean it’s not creepy.
As the story goes, two ranchers went out for the morning and left their wives back home with the kids. The dogs started barking at something and one of the wives went to go check on it. There, she saw a terrifying, reddish monster (one of the Camel Corps’ camels) stampeding through the farm. It is said that the woman’s dead body was found trampled on with hoofprints left behind were larger than those of nearby horses.
A few nights later, a group of nearby prospectors were awoken to thunderous stomping and a terrifying scream (if you haven’t heard a camel make noise, I guess it’d sound creepy on a moonlit night.) They saw the beast and corroborated the ranchers’ tale. Of course, as with all tall tales, there was a good deal of exaggeration involved — one miner said they saw the “Red Ghost” kill a grizzly bear. Camels are tough, but they’re not that tough.
The story continued to evolve until, eventually, storytellers spoke of a ghostly figure riding atop the red beast — but this part might have been true. The “Red Ghost” was eventually tracked down and killed by a hunter nine years later. Oddly enough, the hunter found the beast with a saddle attached. Attached to those straps was a long-deceased corpse.
Who that person was or how long the camel was carrying them is still shrouded in mystery.
Writer’s Note: Some of the information about camels in the original version of this article were a bit incendiary towards the lovable goofy beasts. As a few people who’ve worked with camels have informed me, they’re rarely aggressive unless seriously agitated.
What may have also been a contributing factor to their aggression past that was left out of the original version was their extremely poor handling and maltreatment by the troops at Camp Verde. If you treat them well, they really are gentle giants. If you beat the camels, as was done by their “handlers” in those times, it will definitely win that fight.
The Russian Navy is apparently developing a new long-range cruise missile, Russia’s state-run Tass News Agency reported Jan. 8, 2019, citing a source in the military-industrial complex.
The weapon in the works is reportedly the new Kalibr-M cruise missile, a ship-launched weapon able to deliver a precision strike with a conventional or nuclear warhead as far as 2,800 miles away. That’s roughly three times the range of the US’s Block III TLAM-C Tomahawk cruise missiles.
The new missile will be carried by large surface ships and nuclear submarines once it is delivered to the fleet, which is expected to occur before the conclusion of the state armament program in 2027.
The Kalibr-M, with a warhead weighing one metric ton, is said to be larger than the Kalibr missiles currently in service, which are suspected to have a range of roughly 2,000 km (roughly 1,200 miles).
US Block III Tomahawk cruise missile.
(US Navy photo)
Although state media, citing its unnamed source, reported that the Russian defense ministry is financing the weapon’s development, Russia has not officially confirmed that the navy is working on the new Kalibr-M cruise missile.
Senior US defense officials have previously expressed concern over the existing Kalibr missiles, noting, in particular, the weapon’s range.
“You know, Russia is not 10 feet tall, but they do have capabilities that keep me vigilant, concerned,” Adm. James Foggo III, commander of US Naval Forces Europe, told reporters at the Pentagon in October 2018.
“They’re firing the Kalibr missile, very capable missile,” he explained. “It has a range which, if launched from any of the seas around Europe, … could range any one of the capitals of Europe. That is a concern to me, and it’s a concern to my NATO partners and friends.”
The Kalibr missile, around since the 1990s, made its combat debut in attacks on Syria in 2015.
Russia is, according to a recent report from the Washington Free Beacon, planning to deploy these long-range precision-strike cruise missiles on warships and submarines for Atlantic Ocean patrols.
For much of the Second World War, German engineers and scientists were at the top of their game in developing nuclear fission. As early as 1939, the best minds in Germany were put to work on splitting the atom. They were attempting to use heavy water to control the fission process. Their main source of heavy water production was in occupied Norway, which was a devastating mistake.
They would never get the chance to develop an atomic bomb because Norwegian resistance fighters would blow up the heavy water facilities rather than help the Nazis win World War II.
Their objective, the Vemork Heavy Water facility in Norway.
British commandos tried to destroy the Vemork heavy water facilities in 1942 but were unsuccessful. Operation Grouse planned for Norwegian scouts to recon the area and provide intelligence for British commandos, who would land in gliders and assault the facility under Operation Freshman. But the gliders carrying the Freshman commandos crashed in the local area. One hit a mountain, killing everyone aboard. The other crashed, and some of the commandos survived, but were summarily executed by the Gestapo.
But the Grouse Norwegians were still operating in the area, living off the land, waiting for further instructions.
These are Norsemen we’re talking about, after all.
With the Norwegians still in position, the plan was given a second go-ahead. The Grouse scouts were now called Operation Swallow and the second raid on Vemork was dubbed Operation Gunnerside. The Gunnerside assault team would be an all-Norwegian squad, parachuting in to rendezvous with the Swallow team. Gunnerside launched on Feb. 16, 1943 – and immediately, things went wrong.
Though not as catastrophic as the first raid on Vemork, these problems caused major delays. The infiltrating Norwegians were dropped into Norway under the cover of snowfall, but they were accidentally dropped miles away from their target. It took the team five days to get to Vemork. They made it, though, and were able to connect with the Swallow group.
Heavy Water production facilities like those targeted by Gunnerside.
Unfortunately for the new raiders, the failure of the previous raid on Vemork prompted the Nazis to improve the facilities defenses. All the direct routes into the facility were now heavily guarded or mined. The raiders were forced to climb down into a gorge, cross a frozen river, and then climb a 500-foot cliff wall to access the building. There was a piece of luck for the Norwegians, however. A railroad line in the gorge led to the facility and was relatively unguarded.
After cutting into the facility’s fence, the group split into two teams: a four-man explosives unit and a five-man cover unit. The explosives team was accidentally split up after two men entered the facility through an access tunnel. The two others, presumably lost, broke in through a window. Each team set their explosives independently, cut their timing cord from two minutes to thirty seconds, and bolted.
The railway back to Rjukan.
The successful saboteurs fled on skis toward the town of Rjukan, where they split up. The four men in the explosive unit skied in full British uniforms the entire 200 miles to the border with Sweden. The cover team spread out to draw the Germans away. The Nazis launched a full search for their infiltrators, but none were captured or killed in their pursuit.
The commanding officer of all German forces stationed in Norway called the damage caused by Operation Gunnerside as “the most splendid coup.” The facility was up and running again soon after, but an American bombing raid would force the Germans to move their heavy water production to Germany. All the heavy water from the plant was moved to a ferry for safekeeping in Germany.
That ferry was sunk by Norwegian saboteurs on its way back to the Reich.
A Taliban sniper team thought it would be a good idea to snipe some American soldiers, little did they know what they’d be facing in retaliation. America’s military doesn’t respond with just a little firepower, it responds with jets and bombs.
In this Hornet’s Nest clip on the American Heroes Channel, a father-son journalism team embedded with the 101st Airborne captured footage of the unit pinned down by Taliban snipers. The snipers come dangerously close to killing some of the soldiers. At first, the soldiers respond with machine gun fire, which managed to injure one of the insurgents but nothing too serious. “They’re reporting that everything is okay,” said the translator listening to the enemy radio chatter. “Good, it’s not going to be okay,” said Lt. Col. Joel Vowell in the video below.
The soldiers were using the shots to lock in the enemy’s position. Air support is called in and BOOM! Game over terrorists.
The military’s embedded program give journalists and filmmakers access to wars like never before, so it’s no surprise that the latest conflicts in Iraq and Afghanistan have been some of the best documented in history. Here’s the footage:
PandaGuy5 asks: Were people ever really tortured in Iron Maidens?
The people of the Middle Ages have a reputation for wanton brutality and, as supposed evidence of this, countless instruments of torture sit in museums around the world, arguably the most famous of which being the Iron Maiden. This hellish contraption supposedly caused unthinkable pain and anguish for those unlucky enough to be sentenced to suffer its merciless sting, condemning them to a slow and agonizing death. Or, at least, that’s what the stories say, because as far as anyone can tell, the Iron Maiden didn’t exist as a real world object until the 19th century- and for reference here the so-called “Medieval Times” are generally considered to have ended around the end of the 15th century.
So who invented the Iron Maiden and why, how did it become the face of Medieval torture, and has anyone actually ever been killed in one?
As for historical examples, there are a couple references to similar devices in history, with the oldest being a device known today as the “Iron Apega”, supposedly made about 2,200 years ago. Described by Greek historian Polybius, the device was an automaton replica of the wife of 2nd and 3rd century BC Spartan leader Nabis, with the woman in question named- you guessed it- Apega.
Various neo-medieval torture instruments. An iron maiden stands at the right.
The automaton was apparently lavishly dressed up in one of Apega’s outfits, with Polybius then stating of those who were made to meet the wife replica,
When the man offered her his hand, he made the woman rise from her chair and taking her in his arms drew her gradually to his bosom. Both her arms and hands as well as her breasts were covered with iron nails … so that when Nabis rested his hands on her back and then by means of certain springs drew his victim towards her … he made the man thus embraced say anything and everything. Indeed by this means he killed a considerable number of those who denied him money.
So in a nutshell of the whole story, anyone who refused to pay their taxes would be made to give this mechanical version of his wife a hug, with at any point them being able to make the hug of death stop if they agreed to pay. If they did not, the hug continued until they died. Whether this device actually existed or not, or was just an allusion to Apega’s supposedly ruthless nature to match the reported cruelty of her husband, isn’t know.
Moving on from there, we have an account from one of the earliest Christian authors and the so-called “Father of Latin Christianity”, Tertullian, who lived in the second and third century AD. In his work “To the Martyrs”, he states of the death of Roman General and consul Marcus Atilius Regulus,
It would take me too long to enumerate one by one the men who at their own self-impulse have put an end to themselves…. Regulus, a Roman general, who had been taken prisoner by the Carthaginians, declined to be exchanged for a large number of Carthaginian captives, choosing rather to be given back to the enemy. He was crammed into a sort of chest; and, everywhere pierced by nails driven from the outside, he endured so many crucifixions.
A follow up account by Augustine of Hippo in his 5th century “City of God” elaborates on the tale of Regulus’ death,
Marcus Attilius Regulus, a Roman general, was a prisoner in the hands of the Carthaginians. But they, being more anxious to exchange their prisoners with the Romans than to keep them, sent Regulus as a special envoy with their own ambassadors to negotiate this exchange, but bound him first with an oath, that if he failed to accomplish their wish, he would return to Carthage. He went and persuaded the senate to the opposite course, because he believed it was not for the advantage of the Roman republic to make an exchange of prisoners. After he had thus exerted his influence, the Romans did not compel him to return to the enemy; but what he had sworn he voluntarily performed. But the Carthaginians put him to death with refined, elaborate, and horrible tortures. They shut him up in a narrow box, in which he was compelled to stand, and in which finely sharpened nails were fixed all round about him, so that he could not lean upon any part of it without intense pain; and so they killed him by depriving him of sleep…
That said, whether any of that actually happened or not is up for debate as 1st century BC Greek historian Diodorus claims Regulus died of natural causes, with no mention of such a torture device involved.
Regulus returning to Carthage (1791) by Andries Cornelis Lens.
Moving on from there are old European fairy tales of unknown dating and origin, in which certain individuals were killed by being placed inside casks that had nails driven in. The cask would then apparently be rolled down a steep hill, sometimes into water… which if we’re being honest almost sounds worse than the actual Iron Maiden. Sort of the spiked version of death by a thousand papercuts and then as a reward at the end, terrifying slow drowning as you writhe in agony from all the little holes in your body; no doubt also trying to reflexively break the cask to get out once it starts to fill with water, creating some more holes in the process. We suppose at least this one’s a bit quicker, if a lot more dramatic.
Other than that, there are no references to such an Iron Maiden-like device until just before the 19th century. This first reference comes from German philosopher, linguist, archeologist, and professor at the University of Altdorf, Johann Philipp Siebenkees in 1793.
According to Siebenkees, on August 14, 1515 a coin forger was sentenced to die in a casket that had metal spikes driven into various parts lined up with particularly sensitive bits of the forger’s anatomy. Writes Siebenkees,:
the very sharp points penetrated his arms, and his legs in several places, and his belly and chest, and his bladder and the root of his member (penis), and his eyes, and his shoulders, and his buttocks, but not enough to kill him; and so he remained making great cry and lament for two days, after which he died.
Of course, if this was a real method of execution used, each such cask would have had to have been custom spiked for each new victim in order to line everything up perfectly, given people come in all shapes and sizes. This creates something of a logistical problem that many other means of torturing and killing someone wouldn’t have. Nevertheless, Siebenkees claimed it happened at least this once. So did it?
Well, given the complete lack of evidence or even reference to any other such Iron Maiden-like device used elsewhere in this era, nor who this forger was or any such pertinent details other than the oddly specific date, most historians think he made it up, or that this was an exaggerated tale of the use of a device that we do know existed in Europe.
So what was this real instrument of torture? Sometimes called the Schandmantel (“coat of shame”), the “Drunkard’s Cloak”, or the “Spanish Mantle”, this was essentially a wooden cask someone who was being punished for some crime would be made to wear about town- sort of a mobile version of stocks with similar purpose- mocking someone publicly and having people throw random things at them, in this case as they trudged along.
Consider this account from Ralph Gardiner’s 17th century England’s Grievance Discovered,
men drove up and down the streets, with a great tub, or barrel, opened in the sides, with a hole in one end, to put through their heads, and to cover their shoulders and bodies, down to the small of their legs, and then close the same, called the new fashioned cloak, and so make them march to the view of all beholders; and this is their punishment for drunkards, or the like.
Jumping across the pond to the land of the free, at least some soldiers were not always so free, as noted in an article titled “A Look at the Federal Army,” published in 1862 where the author states,
I was extremely amused to see a ‘rare’ specimen of Yankee invention, in the shape of an original method of punishment drill. One wretched delinquent was gratuitously framed in oak, his head being thrust through a hole cut in one end of a barrel, the other end of which had been removed; and the poor fellow ‘loafed’ about in the most disconsolate manner, looking for all the world like a half-hatched chicken…
In another account by one John Howard in 1784 in his “The State of Prisons in England and Wales”, he writes,
Denmark- Some of the lower sort, as watchmen,coachmen, etc., are punished by being led through the city in what is called ‘The Spanish Mantle.’ This is a kind of heavy vest, something like a tub, with an aperture for the head, and irons to enclose the neck. I measured one at Berlin, 1ft 8 in. in diameter at the top, 2 ft. 11 in at the bottom, and 2 ft. 11 in high… This mode of punishment is particularly dreaded, and is one cause that night robberies are never heard of in Copenhagen.
Of course, much like the Iron Maiden, as you’ll note from the dates mentioned here, most detailed contemporary accounts of these devices of humiliation and sometimes torture seem to indicate they weren’t really a Medieval thing, despite sometimes claimed to go back to the 13th century in Germany.
In any event, whether Siebenkees’s much more elaborate cask with spikes put in was really just a tale he picked up that was exaggerating these “coats of shame”, he made it up completely, or whether some inventive executioner thought to add the addition of spikes to such a cask and a forger really was executed in this way in the 16th century isn’t known, with most leaning towards Siebenkees making it up. Even if it did really happen, however, this still is post Medieval times by most people’s reckoning.
Whatever the case, a handful of years after Siebenkees’ account, the first known actual Iron Maiden appeared in a Nuermburg museum in 1802 not far away from Siebenkees’ home in Altdorf. This device was supposedly “discovered” in a German castle in the late 18th century. Not just a cask, this killing machine was roughly human shaped, made of iron, and even had a face, supposedly based on the face of the Virgin Mary, hence the torture instrument’s name- the Iron Maiden.
This probably first real Iron Maiden was sadly destroyed during WW2 by Allied bombers, but a copy created “as decoration for the ‘Gothic Hall’ of a patrician palace in Milan” in 1828 survived and currently resides in the Rothenburg, das Kriminalmuseum (Museum of Crime). From this copy, we can see that the device was certainly designed to cause unimaginable agony in its victims. Along with having strategically placed spikes designed to pierce approximately where a person’s vital organs and sensitive nether-region dangly bits are, the face of the Maiden did indeed have spikes designed to pierce a victim’s eyes upon closing, assuming the person wasn’t vertically challenged.
This copy did a lot to help popularize the idea of the Iron Maiden as a real thing thanks to its prominent display at the World’s Columbian Exposition in 1893 in Chicago, and subsequent tour across the United States to much fanfare.
Incidentally, this was the same World’s Fair that gave us the name “Ferris Wheel” for a device previously called a “pleasure wheel,” with George Washington Gale Ferris Jr.’ iconic version being rather massive compared to anything that had come before, holding an astounding 2,160 people at a time. This was also the same fair that saw famed serial killer H.H. Holmes taking advantage of the extra people in town looking for a place to stay, keeping business booming at his so-called “House of Horrors Hotel”.
Going back to the Iron Maiden, beyond the tour of one of the originals and extra exposure at the World’s Fair, another man largely credited with popularising the idea of the Iron Maiden was 19th century art collector Matthew Peacock. Among other things, he managed to collect a wide variety of historic torture devices to, as he put it: “Show the dark spirit of the Middle Ages in contrast to the progress of humanity.”
Naturally, unable to find the Real McCoy, Peacock cobbled together an Iron Maiden apparently partially from real artifacts of other means of torture, and then donated it to a museum to be displayed as a symbolic representation of the former era’s cruelty.
The public ate all of this up and the idea of the Iron Maiden slowly permeated throughout society to the point that most today assume it was a real thing used to kill people in a slow and very painful way during Medieval Times.
An open iron maiden.
This all brings us the question of whether anyone has ever actually been tortured or killed in one? The answer, surprisingly, is possibly, but not in Medieval Times, nor even apparently in historic ones, unless you consider a couple decades ago historic.
Enter Uday Hussein. The eldest son of Saddam started his murderous rampage apparently by bludgeoning to death one Kamel Gegeo, who was at the time Saddam’s bodyguard, valet and food taster. This murder was done in front of a host of party guests in 1988. The party in question was in Egypt, in honor of Egyptian President Hosni Mubarak’s wife, Suzanne. As to what Gegeo did to incite Uday’s rage, he apparently hooked Saddam up with a woman, Samira Shahbandar. Samira was married when Saddam met her, but that was quickly taken care of, freeing him up to take her as one of his mistresses and, later, as his second wife.
While still in the mistress stage, Uday decided to kill Gegeo for the facilitation of Saddam’s illicit relationship, which Uday seems to have felt was an affront to his own mother.
Saddam did sentence his son to death for this murder, but a few months later switched to exiling him to Switzerland, with the Swiss government allowing the well-known recent murderer to enter the country for some bizarre reason. However, after frequent run-ins with the law there, the Swiss finally gave him the boot and he returned to Iraq without apparent consequence. If all that wasn’t enough of a testament of what a swell fella’ Uday was, beyond some confirmed assassination attempts and other murders by the lovable rapscallion, rumors of frequent rape of random women swirled around Uday…
This all brings us back to the Iron Maiden and Uday’s eventual appointment as the chairman of the Iraqi Olympic Committee and the Iraq Football Association. In those positions, accusations were rampant that Uday occasionally had various athletes tortured when they were thought to have either under performed or otherwise screwed up in some way in competition. These included doing things like ripping their toenails off, scalding their feet, subjecting them to extreme sleep deprivation, having them kick cement balls, and dragged across gravel roads followed by being dipped into sewage… Allegedly after a 4-1 loss to Japan in the Asian Cup in 2000, he also had three of the players deemed responsible for the defeat beaten repeatedly for a few days.
As for the Iron Maiden, after Uday’s death and the fall of Saddam’s regime in 2003, a mere twenty or so meters away from the Iraqi Football Association headquarters an Iron Maiden was found on the ground. Time Magazine’s Bobby Ghosh states of this find,
The one found in Baghdad was clearly worn from use, its nails having lost some of their sharpness. It lay on its side within view of Uday’s first-floor offices in the soccer association. Ironically, the torture device was brought to TIME’s attention by a group of looters who had been stripping the compound of anything of value. They had left behind the iron maiden, believing it to be worthless.
That said, despite this report, there is no actual hard evidence the Iron Maiden was used, nor blood found on the device or the like. But given all the rumors of Uday’s penchant for torturing people, and some of the confirmed things he did do, as well as the device’s location, at the least he is presumed to have used it as a method of terrorizing people, as was more the norm even in Medieval Times with actual real world torture devices, rather than frequently using them.
All that said, given his proclivities for murdering people who upset him, it is further speculated by many that he might have actually followed through and killed someone with it at some point. But, again, despite reports, so far there has never been any concrete evidence of this, so it’s still not wholly clear if anyone was ever actually killed by an Iron Maiden or not.
This article originally appeared on Today I Found Out. Follow @TodayIFoundOut on Twitter.
Commander, U.S. 2nd Fleet (C2F) revealed a new crest and motto, designed to represent the fleet’s new mission, Aug. 22, 2018, prior to the establishment ceremony on Aug. 24, 2018, in Norfolk, Virginia.
The symbolism is rich and reflective of the purpose of C2F. The logo’s centerpiece is a shield divided into two points. The top of the shield, the chief, is blue and signifies vigilance, perseverance and justice, while the bottom of the shield, the base, is divided into red and white pales. The red signifies military strength and courage, while white signifies integrity and peace.
The field is charged with the number “2,” indicating the numbered fleet, as well as unification in achieving the Navy’s mission in addressing changes in the security environment. Atop the shield is perched a bald eagle, the ultimate symbol of freedom, with its fierce, dominant talons representing the lethal maritime capabilities of the command. The shield is supported by a trident, an ancient symbol of the sea representing power and control over the ocean.
Furthermore, the crest is emblazoned in full color on a geographical map centered on the North Atlantic Ocean, adjoining land masses signifying our enduring relationships with partners and allies. The three stars signify the rank of a vice admiral, who will command C2F.
The official crest for the re-establishment of Commander, U.S. 2nd Fleet, which will report to Commander, U.S. Fleet Forces Command.
The motto, “Ready to Fight,” personifies the spirit and dedication of the command, which maintains and equips maritime assets enhancing interoperability and lethality against foreign and domestic enemies who threaten regional or national security.
“Our new crest signifies our dedication and renewed focus on naval operations on the East Coast and North Atlantic,” said Vice Adm. Andrew “Woody” Lewis, commander, U.S. 2nd Fleet. “Building from our rich legacy, we wanted to pay homage to the old 2nd Fleet by including some aspects of the original crest – the eagle, the trident, the shield, and the map in the background – but the new crest signifies our mission going forward, which addresses a new security environment and the modern warfighter.”
U.S. 2nd Fleet, to be headquartered in Norfolk, Virginia, will exercise operational and administrative authorities over assigned ships, aircraft and landing forces on the East Coast and the North Atlantic Ocean. Additionally, it will plan and conduct maritime, joint and combined operations and will train and recommend certification of combat-ready naval forces for maritime employment and operations around the globe. C2F will report to USFF.
An expert sniper can sneak up on an enemy naked as the day he was born. It’s not particularly advised, but one top sharpshooter did exactly that just to prove a point, Marine snipers told Insider.
“Ghillie suits make people feel like they are invisible,” a Marine Corps scout sniper instructor at Marine Corps Base Quantico in Virginia explained of the full-body uniforms that snipers are trained to adorn with grass and other materials to blend into their environment.
“The vegetation and the camouflage, that’s only one part of it,” the instructor added. “It’s more route selection and movement. It’s about what you are putting between you and the target.”
One top sniper proved that to be true by completing stalking training — an exercise where snipers are asked to sneak into position and fire on a target without getting caught by observers using high-powered optics — in nothing but his boots, two Marines told Insider.
A Marine undergoing the 2nd Marine Division Combat Skills Center’s Pre-Scout Sniper Course prepares to move during a stalking exercise at Camp Lejeune, North Carolina.
(U.S. Marine Corps photo by Cpl. Paul S. Martinez)
“He was one of our instructors, and he wanted to show up his fellow HOGs on the glass,” a schoolhouse instructor said, referring to the observers (nicknamed “Hunters of Gunmen” or HOGs) searching for the PIGs (Professionally Instructed Gunmen) in the field with monocular or binocular devices.
“I’m going to do this naked, and you’re not going to catch me,” the legendary sniper supposedly said. “I’m going to go out there and burn you guys down naked except for boots on.”
And, he did, Insider learned from the Marines.
No clothes. No ghillie suit. No vegetation. The sniper went into the field with nothing but a painted face and a pair of boots. Insider recently observed a stalking exercise at Quantico, where snipers in training worked their way down a lane filled with snakes, various bugs, and quite a few thorns. It was not an environment for someone to crawl around in nude. It’s unclear what type of stalking lane the naked Marine was on.
The sniper is said to have used screens, natural features on the stalking lane that shield the sniper from view, to avoid the watchful eyes of his training enemy.
He was also very careful and deliberate with his movements.
A Marine scout sniper candidate with Scout Sniper Platoon, Weapons Company, 2nd Battalion, 2nd Marine Regiment looks through the scope of his rifle during a stalking exercise.
(U.S. Marine Corps photo by Sgt. Austin Long)
“That’s the art of invisibility,” an instructor told Insider. “It’s all about movement. Some animals are phenomenal at it.” Lions, for example, will crawl low and burn through the grass until they get in range of their target.
That’s a hard skill to learn though. “When you are crawling on the ground, it’s hard to understand where you are at. It’s like being an ant,” a second instructor explained. “It’s the weirdest thing in the world when you get that low to the earth and you start crawling. It makes people uncomfortable.”
When Insider visited the base last month, we watched a group of trainees go through stalking training for the first time. Several of them were spotted in the lane because they raised their heads to see their target more clearly.
“They love to raise up. They love to look up,” an instructor explained. “It’s such a natural human instinct, to think that to see something you need 180 degrees.”
“Human beings are so uncomfortable when they can’t see what is going on around them,” another instructor told Insider. “You have to fight that uncomfortable feeling. You have to force yourself to act unnaturally to be an effective stalker.”
The naked Marine, whose fully clothed picture hangs in the scout sniper schoolhouse at Quantico, seems to have a great grasp of that concept.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
A firewall used by the CIA to communicate with its spies in China compromised their identities and contributed to their executions by the Chinese government, several current and former intelligence officials told Foreign Policy magazine in a report published Aug. 15, 2018.
In a two-year period starting in 2010, Chinese officials began accurately identifying spies working for the US.
Chinese authorities rounded up the suspects and executed or imprisoned them before their handlers were able to determine what was going on.
“You could tell the Chinese weren’t guessing,” one of the US officials said in the report. “The Ministry of State Security were always pulling in the right people.”
“When things started going bad, they went bad fast.”
US intelligence officials cited in the report are now placing the lion’s share of the blame on what one official called a “f—– up” communications system used between spies and their handlers.
This internet-based system, brought over from operations in the Middle East, was taken to China under the assumption that it could not be breached and made the CIA “invincible,” Foreign Policy reported.
Police officer, Beijing, China.
(Photo by Shawn Clover)
“It migrated to countries with sophisticated counterintelligence operations, like China,” an official said.
“The attitude was that we’ve got this, we’re untouchable.”
Intelligence officers and their sources were able to communicate with each other using ordinary laptops or desktop computers connected to the internet, marking a stark departure from some of the more traditional methods of covert communication.
This “throwaway” encrypted program, which was assumed to be untraceable and separate from the CIA’s main communication line, was reportedly used for new spies as a safety measure in case they double-crossed the agency.
Unbeknownst to the CIA, however, this system could be used to connect with mainstream CIA communications, used by fully vetted CIA sources.
According to the report, the vulnerability would have even allowed Chinese intelligence agencies to deduce it was being used by the US government.
The Chinese set up a task force to break in to the throwaway system, Foreign Policy said, but it was unclear how they ultimately identified people.
The consequences for this breach were grim.
About 30 spies were reportedly executed, though some intelligence officials told Foreign Policy that 30 was a low estimate.
The US officials were reportedly “shell-shocked” by the speed and accuracy of Chinese counterintelligence, and rescue operations were organized to evacuate their sources.
The last CIA case officer to meet with sources in China reportedly handed over large amounts of cash in hopes that it would help them escape, Foreign Policy said.
The CIA has since been rebuilding its network in China, but the process has been an expensive and long endeavor, according to The New York Times, which in 2017 first reported on the suspected vulnerability and sources’ deaths.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
Even though the F-35 program is making strides, each of the Joint Strike Fighter variants is still coming up short on combat readiness goals, according to the Pentagon’s top weapons tester.
Based on collected data for fiscal 2019, the Air Force, Marine Corps and Navy variants all remain “below service expectations” for aircraft availability, Robert Behler, director of the Pentagon’s Operational Test and Evaluation Office, said Nov. 13, 2019.
“Operational suitability of the F-35 fleet remains below service expectations,” he said before the House Subcommittee on Readiness and Tactical Air and Land Forces. “In particular, no F-35 variant meets the specified reliability or maintainability metrics.”
One reason for falling short of the 65% availability rate goal is that “the aircraft are breaking more often and taking longer to fix,” Behler added.
Lawmakers requested that Behler; Ellen Lord, Under Secretary of Defense for Acquisition and Sustainment; Lt. Gen. Eric Fick, Program Executive Officer for the F-35 Joint Program Office; and Diana Maurer, director of Defense Capabilities and Management for the Government Accountability Office testify on sustainment, supply and production challenges affecting the program.
Crew chiefs with the 421st Aircraft Maintenance Unit work on an F-35A Lightning II at Hill Air Force Base in Utah, July 31, 2019.
(US Air Force photo by R. Nial Bradshaw)
Results improved marginally from 2018 to 2019 but were still below the benchmark, and well below the 80% mission-capable rate goal set by Defense Secretary Jim Mattis in 2018.
Mattis ordered the services to raise mission-capable rates for four key tactical aircraft: the F-16 Fighting Falcon, the Navy’s F/A-18 Hornet, the F-22 Raptor and the F-35. The objective was to achieve an 80% or higher mission-capable rate for each fleet by the end of fiscal 2019.
Units that deployed for overseas missions had better luck, Behler said.
“Individual units were able to achieve the 80% target for short periods during deployed operations,” he said in his prepared testimony.
Fick backed up that claim. For example, he said, the 388th Fighter Wing from Hill Air Force Base, Utah, deployed to the Middle East as part of the F-35A’s first rotation to the region. As a unit, the mission-capable rate for the jet fighters increased from 72% in April to 92% by the time they returned last month, he said.
Later in the hearing, Fick mentioned that a substantial contributor to the degraded mission capability rate — the ability to perform a core mission function — is a deteriorated stealth coating on F-35 canopies.
In July 2019, Defense Secretary Mark Esper told lawmakers the F-35 would fall short of the 80% mission-capable rate target over parts supply shortages to fix the crumbling coating that allows the plane to evade radar.
“[Canopy] supply shortages continue to be the main obstacle to achieving this,” Esper said in written responses to the Senate Armed Services Committee prior to his confirmation. “We are seeking additional sources to fix unserviceable canopies.”
33rd Fighter Wing F-35As taxi down the flight line at Volk Field during Northern Lightning Aug. 22, 2016.
(US Air Force photo by Senior Airman Stormy Archer)
Nov. 13, 2019’s hearing comes on the heels of a new Government Accountability Office report that once again urges the Defense Department to outline new policies to deal with the F-35’s challenges.
“DoD’s costs to purchase the F-35 are expected to exceed 6 billion, and the department expects to spend more than id=”listicle-2641354570″ trillion to sustain its F-35 fleet,” the Nov. 13, 2019 report states. “Thus, DoD must continue to grapple with affordability as it takes actions to increase the readiness of the F-35 fleet and improve its sustainment efforts to deliver an aircraft that the military services and partner nations can successfully operate and maintain over the long term within their budgetary realities.”
The 22-page report largely reiterated what the GAO found in April 2019: that a lapse in supply chain management is one reason the F-35 stealth jet fleet, operated across three services, is falling short of its performance and operational requirements.
It’s something the Pentagon and manufacturer Lockheed Martin need to work through as they gear up for another large endeavor. The DoD last month finalized a billion agreement with the company for the next three batches of Joint Strike Fighters, firming up its largest stealth fighter jet deal to date.
The agreement includes 291 fifth-generation fighters for the US, 127 for international partners in the program, and 60 for foreign military sale customers.
This article originally appeared on Military.com. Follow @militarydotcom on Twitter.
Its vulnerability reminded me of a conversation I had two years ago, at the Web Summit conference in Lisbon with cybersecurity investor Sergey Gribov of Flint Capital. He was talking up one of his investments, an industrial cybersecurity firm based in Israel called CyberX. Half-bored, I girded myself for his pitch. They usually go like this: “The internet is full of hackers! They want to steal your data and your money! If only companies used my company’s awesome product, we would all be safe!”
I have heard hundreds of pitches like this.
But my conversation with Gribov was different. It was … extreme. The criminals who break into the web sites of banks or chainstores and steal personal data or money are not the scariest people out there, he told me. The hackers we really ought to be worrying about are the ones trying to take entire countries offline. People who are trying to take down the internet, switch the lights off, cut the water supply, disable railways, or blow up factories.
The West’s weakness is in the older electronics and sensors that control processes in infrastructure and industry. Often these electronics were installed decades ago. The security systems controlling them are ancient or non-existent. If a hacker can gain control of a temperature sensor in a factory, he — they’re usually men — can blow the place up, or set it on fire. “The problem people don’t realise is it becomes a weapon of mass destruction. You can take down a whole country. It can be done,” he said.
And then, how do you respond? Does the country that was attacked — the one struggling to get its power grid back online — launch nukes? Probably not, he said, because “you have no idea who did it.”
“You can have a team of five people sitting in a basement and be just as devastating as WMDs,” he said. “It’s really scary. In some sense it’s a matter of time because it’s really easy.”
At the time, I discounted my conversation with Gribov. His VC fund was invested in CyberX, so he had an obvious interest in propagating the idea that the world is full of bad guys.
But in the years since we talked, two unnerving things happened.
In December 2017, three men pleaded guilty to causing the largest internet outage in history – a distributed “denial of service” attack that blacked out the web across most of the US and large chunks of Northern Europe for about 12 hours. They had disabled Dyn, a company that provides Domain Name System (DNS) services — the web’s directory of addresses, basically — to much of the internet.
“Someone is learning how to take down the Internet,” Bruce Schneier, the CTO of IBM Resilient believes
Both attacks were conducted by relatively unsophisticated actors. The Dyn attack was done by three young men who had created some software that they merely hoped would disable a competitor’s company, until it got out of control. The Mauritania attack was probably done by the government of neighbouring Sierra Leone, which was trying to manipulate local election results by crippling the media.
Three major power suppliers simultaneously taken over by hackers
Next, I talked to Nir Giller, cofounder and CTO of CyberX. He pointed me to the December 2015 blackout in Ukraine, in which three major power suppliers were simultaneously taken over by hackers. The hackers gained remote control of the stations’ dashboards, and manually switched off about 60 substations, leaving 230,000 Ukrainians in the cold and dark for six straight hours.
“It’s a new weapon,” Giller says. “It wasn’t an accident. It was a sophisticated, well-coordinated attack.”
The fact that the hackers targeted a power station was telling. The biggest vulnerabilities in Western infrastructure are older facilities, Giller believes. Factories, energy plants, and water companies all operate using machinery that is often very old. New devices and software are installed alongside the older machinery, often to control or monitor it. This is what the industrial “internet of things” looks like. Hackers don’t need to control an entire plant, the way they did in Ukraine. They only need to control an individual sensor on a single machine. “In the best-case scenario you have to get rid of a batch” of product, Giller says. “In the worst case, it’s medicine that is not supervised or produced correctly.”
CyberX has done work for the Carlsbad Desalination Plant in California. It claims to be the largest seawater desalination plant in the US. And it serves an area prone to annual droughts. Giller declined to say exactly how CyberX protects the plant but the implication of the company’s work is clear — before CyberX showed up, it was pretty easy to shut down the water supply to about 400,000 people in San Diego.
2010 was the year that cybersecurity experts really woke up to the idea that you could take down infrastructure, not just individual companies or web sites. That was the year the Stuxnet virus was deployed to take down the Iranian nuclear program.
“Stuxnet in 2010 was groundbreaking”
The principle behind Stuxnet was simple: Like all software viruses, it copied and sent itself to as many computers running Microsoft Windows as it possibly could, invisibly infecting hundreds of thousands of operating systems worldwide. Once installed, Stuxnet looked for Siemens Step7 industrial software. If it found some, Stuxnet then asked itself a question: “Is this software operating a centrifuge that spins at the exact frequency of an Iranian nuclear power plant that is enriching uranium to create nuclear weapons?” If the answer was “yes,” Stuxnet changed the data coming from the centrifuges, giving their operators false information. The centrifuges stopped working properly. And one-fifth of the Iranian nuclear program’s enrichment facilities were ruined.
“Stuxnet in 2010 was groundbreaking,” Giller says.
Groundbreaking, but extremely sophisticated. Some experts believe that the designers of Stuxnet would need access to Microsoft’s original source code — something that only a government like the US or Israel could command.
Russia is another state actor that is growing its anti-infrastructure resources. In April 2017 the US FBI and the British security services warned that Russia had seeded UK wifi routers — the little boxes that serve wireless internet in your living room — with a hack that can read all the internet traffic going through them. It’s not that Vladimir Putin wants to see what you’re looking at on Pornhub. Rather, “What they’re doing there is building capability,” says Andrew Tsonchev, the director of technology at Darktrace Industrial, a London-based cybersecurity firm that specialises in artificially intelligent, proactive security. “They’re building that and investing in that so they can launch attacks from it across the world if and when they need to.”
A simple extortion device disabled Britain’s largest employer in an afternoon
Then, in 2017, the Wannacry virus attack happened. Like Stuxnet, Wannacry also spread itself through the Microsoft Windows ecosystem. Once activated, it locked up a user’s computer and demanded a ransom in bitcoin if the user wanted their data back. It was intended as a way to extort money from people at scale. The Wannacry malware was too successful, however. It affected so many computers at once that it drew attention to itself, and was quickly disabled by a security researcher (who ironically was later accused of being the creator of yet another type of malware).
During its brief life, Wannacry became most infamous for disabling hundreds of computers used by Britain’s National Health Service, and was at one point a serious threat to the UK’s ability to deliver healthcare in some hospitals.
The fact that a simple extortion device could disable Britain’s largest employer in an afternoon did not go unnoticed. Previously, something like Stuxnet needed the sophistication of a nation-state. But Wannacry looked like something you could create in your bedroom.
A screenshot shows a WannaCry ransomware demand.
Tsonchev told Business Insider that Wannacry changed the culture among serious black-hat hackers.
“It managed to swoop across, and burn down huge sectors in different countries for a bit,” he says. “In the course of that, the shipping industry got hit. We had people like Maersk, and other shipping terminals and operators, they went down for a day or two. What happened is the ransomware managed to get into these port terminals and the harbours that control shipping … that intrigued attackers to realise that was something they could deliberately try and do that wasn’t really in their playbook at that point.”
“Oh look, we can actually start to do things like take down manufacturing plants and affect the global shipping industry”
“So this year, we see follow-on attacks specifically targeting shipping terminals and ports. They hit the Port of Barcelona and the Port of San Diego and others. That seemed to follow the methodology of the lessons learned the previous year. ‘Oh look, we can actually start to do things like take down manufacturing plants and affect the global shipping industry.’ A couple years ago they were just thinking about stealing credit card data.”
But it may have taught North Korea something more useful: You don’t need bombs to bring a nation to its knees.
Oddly, you have a role to play in making sure this doesn’t happen. The reason Russia and North Korea and Israel and the US all got such devastating results in their attacks on foreign infrastructure is because ordinary people are bad at updating the security software on their personal computers. People let their security software get old and vulnerable, and then weeks later they’re hosting Stuxnet or Wannacry or Russia’s wifi listening posts.
National security is, somehow, about “the absurdity of the mundane,” says Tsonchev. “These little annoying popups [on your computer] are actually holding the key to national security and people are just ignoring them. Individuals have a small part to play in keeping the whole country safe.”
So if you’re casting about for a New Year’s resolution right now, consider this one: Resolve to keep your phone and laptop up to date with system security software. Your country needs you.
Just a few years ago, I was a diplomat working on the Turkish-Syrian border. My job was managing the U.S. government team responsible for delivering aid to Syrian towns and cities loyal to the Syrian opposition.
These were towns that had turned against President Bashar al-Assad when the Arab Spring swept across the Middle East and Assad ordered his army to shoot peaceful civilians protesting against him.
Now I’m retired from the Foreign Service and teaching international relations at the University of Washington in Seattle, where my students struggle to understand why the U.S. never seems to learn from past mistakes in the conduct of our foreign affairs.
With much of the civil service gone, local services like water and electricity fell apart and essential public employees fled. That left a perfect vacuum for extremist groups like IS to exploit by taking control of essentially ungoverned territory. The U.S. continues to pay the price for this avoidable decision today.
If the U.S. cuts off support for communities inside Syria that oppose Bashar al-Assad and fly the Syrian Opposition flag, and withdraws American troops from the fight against IS – as President Trump has announced – we will be making the same mistake again. We’ll be creating a vacuum our enemies can exploit.
Syrian refugees will never go back home if their towns can’t offer the basic services they enjoyed before the war.
Our simple strategy was that when peace returns to Syria, key local officials would still be on the job, ready to reconnect their communities to the national systems that provided services before the war.
Thus would begin the long, difficult process of reuniting Syria.
The money and supplies my team and I delivered helped keep important local officials on the job so they wouldn’t give up and flee their country to seek refuge in Turkey, Lebanon or Jordan, like millions of others before them. These were experienced civilians who could keep the water and power on, manage the sewers and clean the streets.
We helped them with small stipends – a portion of their former salary – because the Syrian government had stopped paying them. And we provided equipment they needed to do their jobs: garbage trucks, generators, water tanks and fire trucks. We helped teachers, doctors and local police with small stipends, supplies and equipment, too.
Nothing was more satisfying for me than seeing videos of a new garbage truck that we sent from Turkey removing piles of garbage from the streets of Saraqib or one of the new ambulances we provided tending to innocent civilians injured in the latest barrel bombing in Aleppo.
International aid paid for the rehabilitation of an unreliable electricity grid in a town near Aleppo, Syria in 2015.
It’s in everyone’s interest to keep civil service workers on the job, paid something and equipped. That will help put Syria back together again someday and deny ungoverned space for IS and other extremist groups. The last thing the U.S. and countries in the region need is for Syria to disintegrate into warring regions, like Iraq and Libya today.
Other countries joined the effort to rebuild Syria, notably the U.K., the Netherlands and Denmark. Still more countries are contributing to an international fund based in Jordan that helps the same communities; my team cooperated closely with this effort.
Stopping this funding means jeopardizing Syria’s future at the worst possible time, just as the conflict appears to be coming to an end. I believe that reuniting the country should be the priority now.
Of course, the Syrian government and its supporters, Russia and Iran, opposed our aid. The assistance we gave sustained communities that the government and its allies continue to bomb into submission and surrender, particularly in Idlib province.
Similarly, withdrawing U.S. troops sent to Syria to eliminate IS – when our own count suggests at least 1,000 IS fighters remain there – may serve short term political ends, but will likely come back to haunt the U.S. and Syria’s neighbors.
President Trump may worry about the price tag for rebuilding Syria, once the war ends. He is right to be concerned. The cost will be enormous and arguably the U.S. should not spend a dime.
The old adage – you broke it, you fix it – applies to the Syria conflict. I believe we should let Syria, Russia and Iran pay the billions it will take to fix what they broke – the infrastructure of bombed-out cities and towns.
The modest U.S. investment in local communities that the White House cut off – 0 million, not billions – could have helped prevent the collapse of communities in the future.
So, what do I tell my students in Seattle?
I remind them that they are our future leaders. I tell them that if we are not to repeat the mistakes of my generation, they should study and learn from history, and avoid short-term fixes to disentangle the U.S. from future foreign interventions.
“Silver bullets” don’t work – and usually force us to return later, at a greater cost.
The Army has a new non-lethal weapon to help soldiers in Afghanistan “irritate and deter” potential adversaries with pepper-filled balls, Army Times reports.
The non-lethal launcher, known as the Variable Kinetic System (VKS), is made by PepperBall Technologies. It fires projectiles much like paintballs containing a hot pepper solution.
“We are truly honored the US Army has selected PepperBall’s VKS to use as its non-lethal protection in its mission to defending the United States,” Ron Johnson, CEO of United Tactical Systems, which owns PepperBall, said in a statement.
“Our VKS platform was the only non-lethal source that was capable of complying to the US Army’s standards,” Johnson added.
The projectiles have a range of around 50 yards and leave a “debilitating cloud,” impacting the eyes, nose and respiratory system. The irritant, which is 5% pelargonic acid vanillylamide (PAVA) and a synthetic version of pepper spray, is released when the projectile makes contact.
The weapon is built like a paintball gun and can carry up to 180 rounds when it’s in “hopper mode” and 10 or 15 rounds when it’s in “magazine mode.”
The Army awarded a $650,000 contract for the weapons, which reportedly have the same controls and ergonomics of the M4/M16 weapons system, which many soldiers already carry. In other words, it will not be tough for most soldiers to transition into using these non-lethal launchers.
In total, the Army reportedly purchased 267 of the weapons, which are currently being used in training.
Weapons like this can help soldiers in high-intensity, urban settings and especially during crowd control situations.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
As Hurricane Florence, now weakened to a tropical depression, continues to wreak havoc along the East Coast, where it has claimed at least two dozen lives, more than 10,000 US service members are providing emergency assistance to those in need.
The Department of Defense, as of Sept. 15, 2018, had deployed a total of 13,470 personnel, 5,400 active-duty service members and 7,857 National Guard to support hurricane relief efforts. Additionally, 1,286 military assets, such as rotary and fixed-wing aircraft, high-water vehicles, and swift boats have been dispatched to assist with ongoing response operations.
“The collaboration between the Department of Defense, FEMA, and state and local partners is absolutely critical to our National Response Framework,” Gen. Terrence J. O’Shaughnessy, Commander USNORTHCOM said in a statement, adding, “We remain well informed of the emergency response requirements and are ready to respond when military assistance is requested.”
The following photos show the US military in action, lending a much needed hand to rescue people and even animals affected by the storm.
U.S. Marines assigned to Combat Logistics Group 8 (CLB-8) drive through the rain to a local fire station in order to aid in evacuating victims of Hurricane Florence to shelter in Jacksonville, N.C., Sept. 15, 2018.