“Star Wars” movies are going on hiatus after this year’s Star Wars: The Rise of Skywalker, but fans can still expect plenty of content to come.
Disney’s upcoming streaming service, Disney Plus, will not only include the entire collection of “Star Wars” movies, but new original titles. The first live-action “Star Wars” TV show, The Mandalorian, will be available at launch on November 12, and more original series will follow.
Disney Plus will have to satisfy fans for the time being, as new “Star Wars” movies won’t make it to theaters for some time. After Solo: A Star Wars Story disappointed at the box office, failing to crack even $400 million worldwide, Disney CEO Bob Iger said to expect a “slowdown.”
Lucasfilm president Kathleen Kennedy reiterated Iger’s point during “Star Wars” Celebration over the weekend. Kennedy told Entertainment Weekly that the “Star Wars” movies are “going to take a hiatus for a couple of years.”
“We’re not just looking at what the next three movies might be, or talking about this in terms of a trilogy,” Kennedy said. “We’re looking at: What is the next decade of storytelling?”
But Kennedy did confirm that Star Wars: The Last Jedi director Rian Johnson and Game of Thrones showrunners David Benioff and D.B. Weiss are still working on their own sets of films, and even coordinating with each other. We don’t know whether these movies will be released in theaters or head straight to Disney Plus, though.
“As they finish Game of Thrones, they’re going to segue into Star Wars,” Kennedy said of Benioff and Weiss. “They’re working very closely with Rian.”
Below are more details on all the Star Wars projects in the works for after December’s The Rise of Skywalker:
The Mandalorian will be the first live-action “Star Wars” TV series ever, and it will be available to stream on day one when Disney Plus launches November 12.
It stars “Narcos” actor Pedro Pascal as the title character, a lone warrior traveling the galaxy after the fall of the Empire, but before the rise of the First Order. It also stars Carl Weathers and Werner Herzog.
The series is written and produced by Iron Man and The Lion King director Jon Favreau, and directed by Jurassic World actress Bryce Dallas Howard, Thor: Ragnarok director Taika Waititi, and more.
Cassian Andor Live-Action Series Announced! | The Star Wars Show
Lucasfilm announced in November 2017 that Star Wars: The Last Jedi director Rian Johnson would write and direct a new trilogy of movies separate from the Skywalker saga, which is set to end with the ninth installment, “The Rise of Skywalker,” in December.
After rumors swirled that Johnson was no longer developing the trilogy, he confirmed on Twitter in February that he actually is. Lucasfilm president Kennedy reiterated over the weekend that Johnson is still working on the movies, and collaborating with Game of Thrones showrunners David Benioff and D.B. Weiss on their own series of films.
New Star Wars Films Announced! | The Star Wars Show
Lucasfilm announced in February 2018 that Benioff and Weiss, the showrunners of “Game of Thrones,” would write and produce a new series of films that would be separate from Rian Johnson’s planned trilogy and the Skywalker saga.
The number of films and story details are under wraps, but Lucasfilm president Kathleen Kennedy recently said that they are “working very closely” with Johnson.
“As they finish Game of Thrones, they’re going to segue into Star Wars,” Kennedy said.
A Russian-born American has been captured in Syria by the Kurdish-led Syrian Democratic Forces. These anti-ISIS fighters have captured thousands of defeated Islamic State militants in the country since the fall of its de facto capital of Raqqa in 2017. To them, this is just one more ISIS prisoner.
They have returned the captured American to U.S. troops in the country and now he will stand trial in the United States.
This is not the first instance of Americans who left to join the terrorist state being captured and repatriated to the United States. Two American women and four children have also been captured and returned to the U.S. since the American intervention in the fight against the Islamic State began.
Thousands of ISIS-affiliated persons have been captured in the former “caliphate.”
The SDF in Syria is a force of American-trained and supported fighters, primarily of Kurdish origin. They have captured thousands of ISIS fighters since the fall of the Islamic State’s “caliphate” and returned many to their countries of origin to face punishment. Most of those returnees come from Europe, who struggles with repatriating the fighters and even with prosecuting them. While the United States stands ready to prosecute the fighter, European countries differ on how to handle returnees.
When the U.S. first started planning for the return of captured fighters, the Trump Administration originally planned to incarcerate them at the U.S. military prison in Guantanamo Bay, Cuba. Instead, Trump is sending returning ISIS-affiliated repatriates to the civilian court system. In June 2019, American-born wives and children of ISIS fighters were captured by the SDF and returned to the U.S.
The status of ISIS-born children is an emerging controversy.
Those affiliated with the Islamic State but aren’t accepted by their former country of citizenship are more likely to be held in vastly overcrowded prison camps in Syria or held in government jails. European countries are refusing the fighters because their justice systems would require gathering sufficient evidence of wartime crimes (being a member of ISIS isn’t enough to secure a conviction), and if tried, there’s a chance the ISIS fighters could walk free. The United States isn’t facing a huge influx of returning fighters but has a different standard of proof.
In the meantime, much effort is expended by all armed forces in the region in returning families of Islamic State fighters to their countries of origin, many coming from nearby Iraq or far-flung places as far as China and Uzbekistan. As the SDF finishes eliminating pockets of ISIS resistance, they are sure to find more and more survivors to send home, wherever home once was.
Operation Safety Net, the US Marshals Service-led child trafficking task force in Ohio, has located 25 missing children as of Saturday, according to a US Marshals press release. In addition, Operation Moving Target, led by the Ohio Internet Crimes Against Children (ICAC) task force, concluded on Thursday with 27 online predators arrested for cybercrimes and attempted sexual conduct with children.
“Sometimes the situations they — they go to, believe it or not, may be better than the situations they left from,” US Marshal Pete Elliott told WOIO-TV. “We’re trying to do our part. A number of these children have gone to the hospital after we’ve recovered them to get checked out, so again this is something we take very seriously.”
Operation Safety Net focuses on Cleveland, Cuyahoga County, and the surrounding area to locate missing and endangered children. The operation’s reach has extended into the northern portion of the state with help from the Northern Ohio Violent Fugitive Task Force. According to the US Marshals press release, “Children have been recovered in Cleveland, East Cleveland, Akron, Mansfield, Euclid, Willoughby and as far away as Miami.” Even though the operation started in Ohio, leads developed in the state have led to locating missing children outside of Ohio.
U.S. Marshals launch initiative aimed at finding endangered, missing children
The US Marshals have been working with Cleveland, East Cleveland, and Newburgh Heights police departments for the past 20 days to locate missing children, ages ranging from 13 to 18 years old. One in every four cases resolved by the task force are related to human trafficking or prostitution.
While Operation Safety Net is still underway, Operation Moving Target was started by the Ohio ICAC on Aug. 24 and concluded on Aug. 27. The Ohio ICAC is a federal anticrime task force funded by the US Department of Justice’s Office of Juvenile Justice and Delinquency Prevention. The operation was short in duration but concluded with the arrest of 27 suspects.
For Operation Moving Target, undercover law enforcement officers posed as children online to lure sexual predators. During conversations via various social media platforms, the suspects requested meeting times and locations for sexual activity, and some even sent photos of their genitalia to the purported children. Many of the suspects had firearms, condoms, personal lubricant, sex toys, and drugs in their possession at the time of arrest.
Georgia’s Operation Not Forgotten, in action above, is comparable to Ohio’s Operation Safety Net. Photo courtesy of Shane T. McCoy/US Marshals Service.
When the suspects arrived at the meeting place, law enforcement arrested them for crimes including attempted unlawful sexual conduct with a minor, disseminating matter harmful to juveniles, importuning, and possessing criminal tools. The suspects were transported to Cuyahoga County Jail, and each case will be viewed by a Cuyahoga County grand jury.
“As we have seen the number of Cybertips dramatically increase this year, it is clear that online predators remain a serious threat to our children,” said prosecutor Michael C. O’Malley in a Cuyahoga County Office of the Prosecutor press release. “Hopefully the success of yet another operation serves as a stern warning to offenders that you will be found, you will be arrested, and you will be prosecuted.”
Federal, state, and local law enforcement have been pursuing missing children and their predators for years. The US Marshals partnered with the National Center for Missing and Endangered Children in 2005. Since this partnership began, the US Marshals Service has assisted in recovering more than 1,800 missing children, according to a US Marshals press release. In 2015, the Justice for Victims of Trafficking Act was approved, granting the US Marshals enhanced authority.
This legislation enabled the creation of the US Marshals Service Missing Child Unit, which has been setting up joint task forces to carry out operations across the country, including Ohio’s Operation Safety Net and Georgia’s Operation Not Forgotten, which located 39 missing children in a matter of weeks.
The flawless Gal Gadot, a military veteran herself, returns as Diana of Themyscira, a warrior empowered by love. Wonder Woman 1984, directed by Patty Jenkins (the woman who helmed the highly successful 2017 film), also brings back Chris Pine’s Steve Trevor (who has been presumed dead since 1918).
This trailer also introduces Kristen Wiig and Pedro Pascal as classic DC villains Cheetah and Maxwell Lord respectively.
Set to a remix of New Order’s Blue Monday, the trailer gives us mystery, 80s glam, and plenty of badass Diana.
“Nothing good is born from lies and greatness is not what you think,” declares Diana, probably to Lord, a power-hungry businessman known for tampering with questionable technologies and powers.
He should probably listen to her because that lasso doesn’t just force people to tell the truth — it can literally Spider-Man her across lightning.
Looks like she’s also upgraded her armor. I can already see the cosplayers gathering up their gold…
The long-awaited trailer premiered at Brazil’s Comic Con Experience and the film will hit theaters June 5, 2020.
Its vulnerability reminded me of a conversation I had two years ago, at the Web Summit conference in Lisbon with cybersecurity investor Sergey Gribov of Flint Capital. He was talking up one of his investments, an industrial cybersecurity firm based in Israel called CyberX. Half-bored, I girded myself for his pitch. They usually go like this: “The internet is full of hackers! They want to steal your data and your money! If only companies used my company’s awesome product, we would all be safe!”
I have heard hundreds of pitches like this.
But my conversation with Gribov was different. It was … extreme. The criminals who break into the web sites of banks or chainstores and steal personal data or money are not the scariest people out there, he told me. The hackers we really ought to be worrying about are the ones trying to take entire countries offline. People who are trying to take down the internet, switch the lights off, cut the water supply, disable railways, or blow up factories.
The West’s weakness is in the older electronics and sensors that control processes in infrastructure and industry. Often these electronics were installed decades ago. The security systems controlling them are ancient or non-existent. If a hacker can gain control of a temperature sensor in a factory, he — they’re usually men — can blow the place up, or set it on fire. “The problem people don’t realise is it becomes a weapon of mass destruction. You can take down a whole country. It can be done,” he said.
And then, how do you respond? Does the country that was attacked — the one struggling to get its power grid back online — launch nukes? Probably not, he said, because “you have no idea who did it.”
“You can have a team of five people sitting in a basement and be just as devastating as WMDs,” he said. “It’s really scary. In some sense it’s a matter of time because it’s really easy.”
At the time, I discounted my conversation with Gribov. His VC fund was invested in CyberX, so he had an obvious interest in propagating the idea that the world is full of bad guys.
But in the years since we talked, two unnerving things happened.
In December 2017, three men pleaded guilty to causing the largest internet outage in history – a distributed “denial of service” attack that blacked out the web across most of the US and large chunks of Northern Europe for about 12 hours. They had disabled Dyn, a company that provides Domain Name System (DNS) services — the web’s directory of addresses, basically — to much of the internet.
“Someone is learning how to take down the Internet,” Bruce Schneier, the CTO of IBM Resilient believes
Both attacks were conducted by relatively unsophisticated actors. The Dyn attack was done by three young men who had created some software that they merely hoped would disable a competitor’s company, until it got out of control. The Mauritania attack was probably done by the government of neighbouring Sierra Leone, which was trying to manipulate local election results by crippling the media.
Three major power suppliers simultaneously taken over by hackers
Next, I talked to Nir Giller, cofounder and CTO of CyberX. He pointed me to the December 2015 blackout in Ukraine, in which three major power suppliers were simultaneously taken over by hackers. The hackers gained remote control of the stations’ dashboards, and manually switched off about 60 substations, leaving 230,000 Ukrainians in the cold and dark for six straight hours.
“It’s a new weapon,” Giller says. “It wasn’t an accident. It was a sophisticated, well-coordinated attack.”
The fact that the hackers targeted a power station was telling. The biggest vulnerabilities in Western infrastructure are older facilities, Giller believes. Factories, energy plants, and water companies all operate using machinery that is often very old. New devices and software are installed alongside the older machinery, often to control or monitor it. This is what the industrial “internet of things” looks like. Hackers don’t need to control an entire plant, the way they did in Ukraine. They only need to control an individual sensor on a single machine. “In the best-case scenario you have to get rid of a batch” of product, Giller says. “In the worst case, it’s medicine that is not supervised or produced correctly.”
CyberX has done work for the Carlsbad Desalination Plant in California. It claims to be the largest seawater desalination plant in the US. And it serves an area prone to annual droughts. Giller declined to say exactly how CyberX protects the plant but the implication of the company’s work is clear — before CyberX showed up, it was pretty easy to shut down the water supply to about 400,000 people in San Diego.
2010 was the year that cybersecurity experts really woke up to the idea that you could take down infrastructure, not just individual companies or web sites. That was the year the Stuxnet virus was deployed to take down the Iranian nuclear program.
“Stuxnet in 2010 was groundbreaking”
The principle behind Stuxnet was simple: Like all software viruses, it copied and sent itself to as many computers running Microsoft Windows as it possibly could, invisibly infecting hundreds of thousands of operating systems worldwide. Once installed, Stuxnet looked for Siemens Step7 industrial software. If it found some, Stuxnet then asked itself a question: “Is this software operating a centrifuge that spins at the exact frequency of an Iranian nuclear power plant that is enriching uranium to create nuclear weapons?” If the answer was “yes,” Stuxnet changed the data coming from the centrifuges, giving their operators false information. The centrifuges stopped working properly. And one-fifth of the Iranian nuclear program’s enrichment facilities were ruined.
“Stuxnet in 2010 was groundbreaking,” Giller says.
Groundbreaking, but extremely sophisticated. Some experts believe that the designers of Stuxnet would need access to Microsoft’s original source code — something that only a government like the US or Israel could command.
Russia is another state actor that is growing its anti-infrastructure resources. In April 2017 the US FBI and the British security services warned that Russia had seeded UK wifi routers — the little boxes that serve wireless internet in your living room — with a hack that can read all the internet traffic going through them. It’s not that Vladimir Putin wants to see what you’re looking at on Pornhub. Rather, “What they’re doing there is building capability,” says Andrew Tsonchev, the director of technology at Darktrace Industrial, a London-based cybersecurity firm that specialises in artificially intelligent, proactive security. “They’re building that and investing in that so they can launch attacks from it across the world if and when they need to.”
A simple extortion device disabled Britain’s largest employer in an afternoon
Then, in 2017, the Wannacry virus attack happened. Like Stuxnet, Wannacry also spread itself through the Microsoft Windows ecosystem. Once activated, it locked up a user’s computer and demanded a ransom in bitcoin if the user wanted their data back. It was intended as a way to extort money from people at scale. The Wannacry malware was too successful, however. It affected so many computers at once that it drew attention to itself, and was quickly disabled by a security researcher (who ironically was later accused of being the creator of yet another type of malware).
During its brief life, Wannacry became most infamous for disabling hundreds of computers used by Britain’s National Health Service, and was at one point a serious threat to the UK’s ability to deliver healthcare in some hospitals.
The fact that a simple extortion device could disable Britain’s largest employer in an afternoon did not go unnoticed. Previously, something like Stuxnet needed the sophistication of a nation-state. But Wannacry looked like something you could create in your bedroom.
A screenshot shows a WannaCry ransomware demand.
Tsonchev told Business Insider that Wannacry changed the culture among serious black-hat hackers.
“It managed to swoop across, and burn down huge sectors in different countries for a bit,” he says. “In the course of that, the shipping industry got hit. We had people like Maersk, and other shipping terminals and operators, they went down for a day or two. What happened is the ransomware managed to get into these port terminals and the harbours that control shipping … that intrigued attackers to realise that was something they could deliberately try and do that wasn’t really in their playbook at that point.”
“Oh look, we can actually start to do things like take down manufacturing plants and affect the global shipping industry”
“So this year, we see follow-on attacks specifically targeting shipping terminals and ports. They hit the Port of Barcelona and the Port of San Diego and others. That seemed to follow the methodology of the lessons learned the previous year. ‘Oh look, we can actually start to do things like take down manufacturing plants and affect the global shipping industry.’ A couple years ago they were just thinking about stealing credit card data.”
But it may have taught North Korea something more useful: You don’t need bombs to bring a nation to its knees.
Oddly, you have a role to play in making sure this doesn’t happen. The reason Russia and North Korea and Israel and the US all got such devastating results in their attacks on foreign infrastructure is because ordinary people are bad at updating the security software on their personal computers. People let their security software get old and vulnerable, and then weeks later they’re hosting Stuxnet or Wannacry or Russia’s wifi listening posts.
National security is, somehow, about “the absurdity of the mundane,” says Tsonchev. “These little annoying popups [on your computer] are actually holding the key to national security and people are just ignoring them. Individuals have a small part to play in keeping the whole country safe.”
So if you’re casting about for a New Year’s resolution right now, consider this one: Resolve to keep your phone and laptop up to date with system security software. Your country needs you.
China’s navy needs Maverick and Goose — and many, many more fighter jocks for its growing carrier force.
The Chinese People’s Liberation Army Navy is desperately searching for pilots to fill its carrier air wings as the country pushes to build a formidable carrier fleet.
The PLAN launched its 2019 pilot recruitment program Sept.15, 2018, with “the highlight of this year’s recruitment [being] the selection of future carrier-borne aircraft pilot cadets,” according to the Chinese military, which noted that as China’s armed forces shift from “shore-based” to “carrier-based” abilities, the PLAN intends to develop a pilot recruitment system “with Chinese naval characteristics that can adapt to carrier-borne requirements.”
The language appears to indicate a strategic shift from home defense to power projection on the high seas, thinking consistent with Chinese efforts to build an advanced blue water navy.
The lack of pilots trained for carrier-borne operations and combat has been a problem for China in recent years. “They don’t have a whole lot of pilots. Not a lot of capacity in that area,” Matthew Funaiole, a fellow with the China Power Project at the Center for Strategic and International Studies, explained to Business Insider in August 2018.
By the end of 2016, there were only 25 pilots qualified to fly China’s carrier-based fighters, the Hong Kong-based South China Morning Post reported Sept. 18, 2018.
A J-15 fighter jet sits on the flight deck of the aircraft carrier Liaoning.
(Photo by Zhang Lei)
Recruiters will travel across the country to 23 provinces, municipalities, and autonomous regions to find suitable navy aviators. “Some of the pilot cadets recruited in 2018 will receive the top and most systematic training as carrier-borne aircraft pilots,” a PLAN Pilot Recruitment Office official revealed.
Pilots selected and trained to fly carrier-based aircraft will fly the fourth-generation Shenyang J-15 Flying Shark, the heaviest carrier-based fighter jet in operation today and the type of fighter that composes the carrier air wing for China’s only operational aircraft carrier, the Liaoning.
The ongoing recruitment program, according to SCMP, marks the first time the Chinese navy has directly recruited pilots for the J-15, a problematic derivative of a Soviet prototype which has been blamed for several fatal training accidents. In the past, aviators from the navy and air force who were trained to fly other types of aircraft were pulled to fly the J-15.
A J-15 ship-borne helicopter prepares to land on the flight deck of the aircraft carrier Liaoning.
(Photo by Zhang Lei)
“Becoming a naval pilot is the best choice for those who want to become heroes of the sky and the sea,” the Chinese military stressed on Sept. 18, 2018, emphasizing the Chinese military’s interest in developing advanced power projection capabilities.
China is rapidly building an aircraft carrier fleet with one carrier already in service, another undergoing sea trials, and a third in development, but China is still very new to complex carrier operations. Chinese Navy pilots successfully completed their first nighttime takeoffs and landings in May 2018.
“An elite team among the pilots also has carried out night landings, widely considered the riskiest carrier-based action, and have become capable of performing round-the-clock, all-weather operations,” the China Daily reported Sept. 19, 2018.
In addition to a pilot shortage, China still struggles with power and propulsion, aircraft numbers and reliability, carrier launch systems, and a limited experience with carrier operations.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
Anything close to the maximum structural speed for a jet is usually just for the glossy brochure—99.9% of the time we don’t come close to reaching it. There was one time, though, that I pushed the F-16 as fast as it could go.
I was stationed in Korea and there was a jet coming out of maintenance; the engine had been swapped out and they needed a pilot to make sure it was airworthy. It was a clean jet—none of the typical missiles, bombs, targeting pod, external fuel tanks were loaded. It was a stripped down hot-rod capable of it’s theoretical maximum speed.
When we fly, we usually go out as a formation to work on tactics; every drop of fuel is used to get ready for combat. This mission, however, called for me to launch as a single-ship and test the engine at multiple altitudes and power settings. The final check called for a max speed run.
Justin “Hasard” Lee in the cockpit of an F-16 (Sandboxx)
I took off, entered the airspace, and quickly started the profile. Topped off, I could only carry 7,000 pounds of internal fuel; never enough with the monster engine behind me burning up to 50,000 pounds of fuel per hour. I knocked out the various tasks in about 15 minutes and then was ready for the max speed run.
I was at 25,000 feet when I pushed the throttle forward, rotated it past the detent and engaged full afterburner—I would have 5 minutes of useable fuel at this setting. I could feel each of the 5-stages lighting off, pushing me forward. I accelerated to Mach 1—the speed of sound that Chuck Yeager famously broke in his Bell X-1—and started a climb. A few seconds later 35,000 feet went by as I maintained my speed. Soon I was at 45,000 feet and started to shallow my climb to arrive at the 50,000 foot service ceiling. This was as high as I could go, not because the jet couldn’t go higher, but because if the cockpit depressurized, I would black out within seconds.
(U.S. Air Force photo by MSgt. Don Taggart)
Looking out at 50,000 feet, the sky was now a few shades darker. I could start to see the curvature of the earth. To my right was the entire Korean peninsula—green with a thin layer of haze over it. To my left, a few clouds over the Yellow Sea separating me from mainland China.
As I maintained my altitude, the jet started to accelerate. At 1.4 Mach, with only about 2 minutes of fuel left, I bunted over and started a dive to help with the acceleration. In my heads-up-display 1.5 Mach ticked by, backed up by an old mach indicator slowly spinning in my instrument console.
Justin “Hasard” Lee (Sandboxx)
At 1.6 Mach, the jet started to shake. I was expecting it—the F-16 has a flight region around that airspeed that causes the wings to flutter. Still, this jet had a lot of hours on the airframe, and if anything were to fail, the breakup would be catastrophic. Similarly, ejecting at that speed would be well outside the design envelop—the air resistance at Mach 1.6 is about 300 times what a car experiences at highway speeds. A few pilots have tried, only to break nearly every bone in their body.
So now, the option was slow down until the vibration stopped, or push though until it smoothed out on the other side. I was running low on fuel, so I elected to increase my dive so I could accelerate faster. Slowly 1.7 Mach ticked by, next 1.8, and then at 1.9, everything smoothed out. I was now traveling 1,500 mph over the Yellow Sea. The cockpit started feeling warm so I took my hand off the throttle and put it about a foot away from the canopy and could feel the heat radiating through my glove, similar to sticking your hand in an oven.
At this point I was entering the thicker air at 35,000 feet which was preventing the Mach from going any higher. I was also nearly out of fuel, so I pulled the throttle out of afterburner and into military-power—the highest non-afterburner power setting. Despite a significant amount of thrust still coming from the engine, the drag at 1.9 Mach caused the jet to rapidly decelerate, pushing me forward until my shoulder-harness straps locked. It took over 50 miles for the jet to slow down below the mach.
Justin “Hasard” Lee (Sandboxx)
Taking a jet to 1.9 mach isn’t any sort of record; in fact, some aircraft have gone twice as fast. It is an interesting feeling, though, to be at the limit of what an iconic aircraft like the F-16 can give you. Thousands of incredible engineers, who I never had the chance to meet, designed the plane and you are now realizing the potential of what they built. The heat and vibration, coupled with being outside the ejection envelope, let you know the margin of safety is less than it normally is.
I’ve since moved on to the F-35 which correctly prioritizes stealth, sensor fusion, and networking over top speed, so that’s likely as fast as I’ll ever go. It was a visceral experience that was a throwback to the 50’s and 60’s—where the primary metrics a plane was judged by how high and fast it could go.
The Carolina Panthers are fighting for their lives. With their divisional rival, the New Orleans Saints, clinching the NFC South and a playoff spot in the Thanksgiving Day win over the Atlanta Falcons, the Panthers are still in the hunt – but barely. Their Dec. 8th game against the Falcons could mean the difference between a playoff berth of their own or waiting until next season. Even with so much riding on their next few games, Panthers running back Christian McCaffrey has something else on his mind: America’s wounded warriors.
And he’s all set to raise money and support for the Wounded Warrior Project through the NFL’s My Cause, My Cleats campaign.
Even though the NFL’s Salute to Service month has passed, the spirit of honoring veterans of the U.S. military never stops. For the fourth year in a row, the NFL and its Salute to Service partner, USAA, are teaming up to support veterans through the annual philanthropic events. In Week 14, NFL players from around the league choose a cause to celebrate and support. Coaches and players have commissioned special cleats to be worn in support of these causes that will be worn during the game and then auctioned off for their charities. Panthers RB Christian McCaffrey’s cleats will support the Wounded Warrior Project.
The cleats were custom-made by Miami, Florida-based Marcus Rivero of Soles by Sir, who has custom made cleats in previous years for players like the Arizona Cardinals’ Larry Fitzgerald, who honored deceased NFL player and Army ranger Pat Tillman with his 2018 My Cause My Cleats campaign.
McCaffrey greets military members before each home game.
“It really hit me when they told me that watching football was their getaway…. you wanna put on a show for them. It makes football more than just a game.” McCaffrey told USAA. “It’ll definitely be a constant reminder for me of why I play and who I play for.”
But McCaffrey’s support doesn’t stop at the cleats. The running back and the Carolina Panthers hosted a few wounded warriors at their offices and at the stadium earlier in 2019. He took the veterans through a typical day as a Panthers football player, from the morning meeting at 8:00 a.m. and through a visit to the team locker room. They then went out to the playing field and threw a football around to talk shop.
“That’s the reason why we’re out there, fighting the fight,” one veteran said, admiring the Panthers playing field. “So stateside can be like this.”
“Our missions are different,” said another vet of McCaffrey. “But at the end of the day, he respects what we do and we’re fans of what he does. Picking the Wounded Warrior Project shows you the kind of character that he has.”
The cleats McCaffrey will wear on Week 14 will honor all five military branches. On one shoe, five members of the Army, Air Force, Navy, Marine Corps, and Coast Guard are featured, saluting in uniform. On the other shoe, the featured prominently is the distinctive black-and-white logo of the Wounded Warrior Project one half and an NFL game field on the other, with the stars and stripes centered in midfield and a large THANK YOU in the watching crowd.
If you like McCaffrey’s cleats, anyone is able to bid on the shoes when auctioned off. One hundred percent of the money raised goes toward the cause designed on the cleats.
Encephalitis lethargica is a disease that seems to belong in a horror movie, complete with brain damage that causes victims to sleep for years or to hack away at their own bodies — and it all started in Europe during World War I.
It was first described by World War I pilot and noble, Constantin von Economo, who switched to a career in medicine at the request of his parents after family members died in the war. As a physician, he served both civilians and the Central Powers, and his historical significance comes from being the first to describe a neurological disorder that popped up during the war.
His first patients reported constant exhaustion despite constantly sleeping, leading some people to call it the “sleeping disease” or “sleepy sickness.” This wasn’t exactly correct, though, as many patients never truly slept. They remained aware of their surroundings even when seemingly in deep sleep. As the disease progressed, patients also began exhibiting symptoms like abnormal eye movement, delirium, headache, or paralysis.
The paralysis and other symptoms were sometimes limited to one side of the body, giving off the surreal result that one side of the face and body became sluggish and tired while the other side remained relatively alert and functional.
From here, patients’ symptoms would progress in a couple directions. 5 million people were afflicted with the disease from 1917 to 1928. Approximately a third died, a third survived, and the final third were trapped in endless sleep. But the scary part for survivors was that symptoms could return years later — or they could suffer from Parkinson’s brought on by the disease.
Dr. Oliver Sacks, a physician famous for his work with encephalitis lethargica patients who slept for decades before awaking for a short period.
(Luigi Novi, CC BY 3.0)
And that endless sleep thing wasn’t a euphemism or anything. Some patients went to sleep for decades, only coming out of their near-endless rest when given an anti-Parkinson’s medication in 1969 through an effort led by Dr. Oliver Sacks. Unfortunately, Sack’s treatment with L-DOPA only provided a temporary relief of their symptoms. All patients eventually regressed back to permanent sleep or a catatonic state.
Oddly enough, those afflicted with long-term catatonia did get one benefit: They aged much more slowly than people awake.
People attacked members of their own family, authority figures, or random passersby, often with little visible emotion afterwards.
Encepheilitis lethargica could strike people of any age, and it often caused long-term Parkinson’s in the months or years after a patient had seemingly recovered from the condition.
(British Medical Journal 1925, Gullan)
Obviously, for troops in the war and returning veterans, the idea that exhaustion could be a sign of their imminent demise was terrifying, and the fact that their families could be afflicted by this mysterious disease was terrifying, but another outbreak pushed the sleepy sickness to the back of most people’s minds.
The Spanish flu pandemic broke out in 1918 and eventually killed between 20 and 50 million victims of the roughly 500 million people affected.
Today, we still don’t know the cause of encephelitis lethargica, but new cases fortunately fell off a cliff in 1926 and continued to dwindle in the 1930s. Now, new cases are extremely rare, but the exact symptoms of encephelitis lethargica were so varied that it’s hard to even be sure that new cases are from the same cause.
The title page of Constantin von Economo’s 1931 description of encephalitis lethargica.
(Wellcome Images, CC BY 4.0)
There does appear to be an auto-immune element to the disease with nearly all sufferers showing damage to the brain stem consistent with it coming under attack from the body’s immune system. This, combined with the disease’s first appearance around the same time as the flu pandemic, has led to speculation that it comes from the body’s overreaction to a virus. But that’s still not certain.
Analysis of other influenza and viral outbreaks, both before World War I and after, show some connection between viral outbreaks and the onset of encephelitis lethargica.
It’s still possible that the world could see a sudden resurgence of encephelitis lethargica, especially if there’s a new influenza outbreak, but our luck has held for over 70 years — fingers crossed.
The team behind the upcoming 007 film, dubbed Bond 25, released an unconventional first look in the form of behind-the-scenes footage and peeks from the movie. Set to take place all over the world, per usual, star Daniel Craig’s Bond-swan-song definitely looks to be a colorful flick.
The reveal includes Fukunaga in action, Craig looking cool-as-always, Westworld’s Jeffrey Wright as “Felix Leiter” (“a brother from Langley”), and Captain Marvel’s Lashana Lynch as “Nomi” on location in the Caribbean.
One of the most interesting and exciting additions to the project is writer Phoebe Waller-Bridge, creator of Killing Eve and Fleabag — projects praised for their levity, humor, and surprising character moments.
Waller-Bridge will join Neal Purvis, Robert Wade, and Scott Z. Burns.
The official James Bond Twitter account is killing it when it comes to sharing Bond history, stories, and progress, including behind-the-scenes looks like this:
Daniel Craig and the @astonmartin V8 on location for #Bond25pic.twitter.com/cPgfMSlUYm
There has been a lot of talk at WATM about JDAMs, cluster bombs, Paragon, Scalpel, and other cool new weapon systems emerging for the United States and close allies. But what about some of the stuff already in service, like the Paveway II laser-guided bombs? Have they been forgotten?
The good news is that they haven’t. Believe it or not, the old, reliable, laser-guided bomb that has been around for decades is getting upgrades. This shouldn’t be a surprise; many weapon systems get upgrades over their careers. Just compare the M1 Abrams that entered service in 1980 to the M1 of today. Two completely different tanks on the inside.
A GBU-10 Paveway II laser-guided bomb.
According to material acquired from Lockheed during the 2018 SeaAirSpace expo at National Harbor, Maryland, the Paveway II is getting an upgrade to the Paveway II Plus standard. This is part of the laser-guided bomb family that includes the Scalpel and the Paragon. The Paveway II Plus looks like the Paveway II on the outside. What is different here is the Paveway II Plus has a new… “brain.”
Designation-Systems.net notes that the basic Paveway II used the MAU-169 computer control group, or CCG, from Raytheon. In the 2000s, Lockheed developed the MAU-209, a more advanced system. The bombs were still called Paveway II, though. But the latest iteration of the MAU-209, known as the MAU-209C/B, is a whole new CCG.
A F-35B drops a GBU-12 during a test flight. The Paveway II Plus kit can be used on the GBU-12.
(U.S. Navy photo courtesy of Lockheed Martin by Layne Laughter)
The MAU-209C makes the Paveway II more accurate and reliable though a new guidance package that can be re-programmed in the field. The better accuracy means that fewer sorties will have to be flown. But the field re-programming is also a big deal, since it means that new capabilities can be added without having to ship the bombs to rear areas.
The Paveway II Plus can be used on any U.S. Navy or U.S. Air Force aircraft, whether manned or unmanned. In short, this old bomb has been taught a few new tricks.
In addition to physical exercise, proper nutrition plays a major role in overall health, fitness, and training for the Army Combat Fitness Test, says Maj. Brenda Bustillos, the U.S. Army Training and Doctrine Command dietitian.
“It’s important for soldiers to recognize the impact proper nutrition has on them,” said Maj. Bustillos. “From how they get up and feel in the morning, how they recover from an exercise, how they utilize energy, and whether or not they have energy at the end of the day — proper nutrition is powerful, and stretches far beyond what we were taught as kids.”
Dietary decisions affect every soldier’s individual physical performance differently, too, she said, and has the power to impact careers “whether that be good or bad.”
Bustillos, a clinician who’s seen patients for the last 15 years of her career, believes the ground rules for healthy eating are only that — ground rules. “Every patient I’ve met with is different, and their needs are all different, too.”
Soldiers weave through an obstacle course.
(U.S. Army photo by Sgt. Travis Zielinski)
“Nutrition and dietary patterns are not one size fits all,” she said. “A registered dietitian understands this, and understands the biomechanics of each individual, along with the unique metabolic concerns they may have.”
She added, “How someone eats can be what makes or breaks them during big events, such as the ACFT. That’s why it’s important for soldiers to take advantage of resources available to them, and meet with a dietitian about what works for them while training for the test.”
Army combat fitness test
The ACFT is a six-event, age- and gender-neutral, fitness assessment set to replace the Army’s current physical fitness test by October 2020. It’s the largest physical training overhaul in nearly four decades, and is currently in its second phase of implementation, with every soldier slated to take the test as a diagnostic at least once this year.
The test is designed to link soldiers’ physical fitness with their combat readiness. Each event is taken immediately following the next, and aims to be an endurance-based, cardio-intensive assessment of overall physical fitness.
“The ACFT will require soldiers to properly fuel their bodies to be fully ready to perform,” she said. “The six events require many different muscle movements, with both aerobic and anaerobic capacities, making the fueling piece of fitness incredibly important — as important as physically training.”
Nutrition has often been attributed as “fuel for the body,” she said. For example, proteins repair you, and give the body the building blocks it needs for everyday activities, carbohydrates give the body energy, vitamins strengthens the bones, minerals help regulate the body’s processes, and water is essential for being alive.
But, nutrition also plays a role “in terms of preparation and recovery,” she said. It doesn’t matter if someone is training for a marathon or the ACFT, how they eat, or what they drink makes a world of difference.
U.S. Army soldiers participate in a 2.35-mile run.
(U.S. Army photo by Senior Airman Rylan Albright)
For example, if a soldier wakes up early on an empty stomach when scheduled to take the ACFT, that soldier will lack the glucose needed for a good performance. This can make the short-term decisions as critical as the lifestyle choices made in the months prior to testing, she said.
“Consider an individual like an automobile,” Bustillos said. “If an automobile starts running out of gas, it will begin running on fumes, and then be completely empty. That’s how an individual [regardless of training leading up to the test] will perform, especially if they don’t properly fuel their body before an ACFT.”
Bustillos urges soldiers to always “train to fight,” meaning all their nutritional decisions, at all times, should holistically enhance their physical fitness, mental alertness, and overall health.
“If a soldier only eats right the night before, or morning of an ACFT — but not during the months of training leading up to it, they won’t do as well on the fitness test [regardless of physical activity],” she said.
The best course of action, according to Bustillos, is eating right “day in and day out” while training. “Muscles are hungry, and they need fuel, so if you implement a healthy dietary lifestyle while training, then your body performs much better while performing.”
Soldiers should consume a variety of healthy nutrients in their diet, she said. For example, carbohydrates, fats, dietary fiber, minerals, proteins, vitamins, and water should be taken in.
(U.S. Army photo by Jorge Gomez)
When a soldier doesn’t eat properly in both short- and long-term capacities, muscles will break down because the body is continually searching for the fuel it needs to perform, she said.
“The night before an ACFT, a soldier should take in some proteins and carbohydrates,” she said, adding that carbohydrates are the No. 1 source of fuel for the brain and body.
Examples include moderately-sized, protein and carbohydrate-rich meals, such as a grilled chicken breast and brown rice, followed by a light breakfast the next morning, ideally two hours prior to taking the ACFT, she said. However, the possibilities for what foods to eat are seemingly endless, as long as they fall in the food healthy groups.
“I understand not everyone wants to wake up two hours before a performance test just to eat,” she said. “So, a light snack in the morning is also good. It can be a performance bar, a whole-grain English muffin, a banana, or just half of a muffin with smear of peanut butter — something to not disrupt the stomach while providing a fuel source for the body.”
With the ACFT around the corner, or if you have questions on how nutrition can enhance your lifestyle based on body type, Bustillos recommends you seek answers from a registered dietitian nearby.
“It’s important to remember there’s no such thing as bad foods, just bad dietary patterns,” she said. “As long as we’re eating well, taking good care of our bodies, and putting good things in it — it’s okay to have the scoop of ice cream, or sharing a tub of buttered popcorn with friends at the movies, those are certainly things that make life more enjoyable.”
These NASA Hubble Space Telescope images compare two diverse views of the roiling heart of a vast stellar nursery, known as the Lagoon Nebula. The images, one taken in visible and the other in infrared light, celebrate Hubble’s 28th anniversary in space.
The colorful visible-light image at left reveals a fantasy landscape of ridges, cavities, and mountains of gas and dust. This dust-and-gas landscape is being sculpted by powerful ultraviolet radiation and hurricane-like stellar winds unleashed by a monster young star. Located at the center of the photo, the star, known as Herschel 36, is about 200,000 times brighter than our Sun. This hefty star is 32 times more massive than our Sun and 40,000 degrees Kelvin. Herschel 36 is still very active because it is young by a star’s standards, only 1 million years old.
The blistering radiation and powerful stellar winds (streams of subatomic particles) are pushing dust away in curtain-like sheets. As the monster star throws off its natal cocoon of material, it is suppressing star formation around it.
However, at the dark edges of this dynamic bubble-shaped ecosystem, stars are forming within dense clouds of gas and dust. Dark, elephant-like “trunks” of material represent dense pieces of the cocoon that are resistant to erosion by the searing ultraviolet light and serve as incubators for fledgling stars.
The star-filled image at right, taken by Hubble in near-infrared light, reveals a very different view of the Lagoon Nebula compared to its visible-light portrait. Making infrared observations of the cosmos allows astronomers to penetrate vast clouds of gas and dust to uncover hidden gems. Hubble’s view offers a sneak peek at the dramatic vistas NASA’s James Webb Space Telescope will provide.