The balloons can float as high as 65,000 feet, and are able to track vehicles day or night, regardless of the weather.
The goal of the balloons, according to the FCC filing, is: “To provide a persistent surveillance system to locate and deter narcotic trafficking and homeland security threats.”
The company named in the filing, Sierra Nevada Corporation, is working on behalf of the United States Department of Defense to test the balloons. The United States Southern Command (Southcom) commissioned the tests; the balloons are scheduled to begin flying in South Dakota and conclude in central Illinois.
An MQ-9 Reaper remotely piloted drone aircraft flies a combat mission.
(Photo by Lt. Col. Leslie Pratt)
Though the technology might sound strange, it’s not the first pairing of balloons with tech hardware to enable surveillance: The Israeli government has repeatedly used surveillance balloons with cameras attached in Israel.
The surveillance balloons in this case, however, are equipped with so-called “synthetic-aperture radar” devices from Artemis Networks — a tech company that makes wireless radar devices. Using an SAR device, users can create high-resolution images using radio pulses, which enables a much higher level of detail in surveillance use.
Neither the Department of Defense nor the Sierra Nevada Corporation responded to requests for comment as of publishing.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
The U.S. Navy Research team published a video on Wednesday showing off the capabilities of its new “Laser Weapon System” or LaWS, and it’s terrifying. It shoots a 30 kilowatt blast within 2 nanometers of its target according to Defense One.
Simply put, it’s an oversized laser pointer on steroids.
The video starts with a time lapse of the weapon aboard a Navy ship while a boat appears over the horizon. It quickly cuts to an operator housed somewhere within the vessel. He’s standing in front of several screens holding what looks like a glorified X-Box controller. A blast is fired but there’s no bang, no smoke, no projectile, and no tracer, all you see is an explosion.
The video switches to a camera aboard the approaching boat for a close-up of the target. It’s a small stack of shells next to a cut-out of a human. The stack is precisely destroyed without damaging the wooden dummy.
Maybe I’ve seen too many comic book movies, but this is like X-Men’s Cyclops with an invisible laser beam.
Defense One reported that this is the Navy’s answer to drone attacks. Drones are becoming cheaper and more accessible, we’ve had them for years, but now American adversaries have begun to roll out their own versions. The LaWS will hopefully help the Navy keep drones at bay.
According to the Office of Naval Research, this isn’t the final version of the weapon. A more powerful 150-kilowatt version is scheduled for testing in 2016.
The Star Wars franchise is all about placing fantastical elements within in a sci-fi setting. In order to truly enjoy the films, you have to suspend your disbelief a little bit — otherwise it’ll look a lot like cosmic samurai fighting a faceless evil empire across a galaxy filled with people who magically speak the same language and function just fine without a space suit wherever they end up.
Putting a bit more thought into it, the Imperial Stormtroopers seem to get the short end of the stick nearly every single time. With the soon-to-be-released Solo: A Star Wars Story on the horizon, it’s fun to remember why they probably wouldn’t make the most intimidating enemy — especially not with highly-overused AT-AT walkers.
(Photo by Tim Moreillon)
To all seven of you out there who haven’t seen Star Wars, the AT-AT is a gigantic, robotic troop transport used by the antagonists that’s sort-of a futuristic callback to Hannibal’s elephants. They’re fairly intimidating in the films until you realize just how dumb of a design they really are.
At least they acknowledged that painting its weak spot bright orange was an objectively bad idea.
Its weaknesses are extremely obvious
The most glaring mistake of the AT-AT is that they’re so easy to destroy. In The Empire Strikes Back, our heroes turn the tide during a battle on the icy planet of Hoth when they decide to trip the lumbering armor. Really? Why did it take some rural moisture farmer to make that mental breakthrough?
Not only that, but Luke Skywalker also destroyed one by throwing a single grenade, which, somehow, blows up the head. They’re even more easily destroyed in Rogue One, when a single rocket to the walker’s “neck” is enough to take it down.
This is about the field of fire of an AT-AT. Avoid this and you’re fine.
Its only weapons are front-facing
If you’re facing the front of an AT-AT, you’re probably screwed. If you’re literally anywhere outside of its 30-degree field of facing, you’re completely safe.
Without any kind of air support, like what happened to them in The Empire Strikes Back, the opportunity to flank them is wide open. If you’re thinking that it could just turn around, that brings us to our next point.
This is it TRYING to turn.
It can barely turn
To be fair, the AT-AT can turn a little bit in Episode V and some of the obscure novels (which are no longer canon) say that they have an additional joint under the plating to help it turn. But, even if we’re generous, they can turn maybe fifteen degrees with each slow, lumbering step.
This is happens in a time when, according to the logic that has been established by the franchise, intergalactic travel and troop transport is done with spaceships. But, instead of carrying troops via something that fly, they chose something that can barely change course.
It can’t really leave this small clearing so, for any reason other than creating drama, this makes no sense.
It wouldn’t be able to maneuver anywhere
Let’s bring things back to the real world for a moment and discuss why tank treads work in almost every environment while horses don’t: Legs get caught in things. They get tangled in snares and sink into sand, snow, and mud. Tank treads, conversely, just roll through it all.
Now magnify that four-legged beast to the size of an AT-AT. All of those same problems still exist, but now you can cross cities and forests off that list, too.
Poor little AT-AT… At least you tried.
It’s a terrible design for a troop transport
Let’s bring it back to the fact that they rely on what are essentially robot camels when they have countless other options at their disposal. A spaceship can warp in and push out every Stormtrooper in a blink of an eye. The AT-AT, on the other hand, needs to bend down, load troops into the vehicle, carry them all somewhere, bend back down, and, finally, unload them.
All of that just to get some troops forward in an easily destructible, undefended deathtrap that can barely get around. Sure, they’re intimidating, but don’t you have Death Stars and Star Destroyers for that?
Entering the military requires an oath to obey the lawful orders of those in the higher chain of command. Commanding officers can order troops into a suicide mission if it serves the greater purpose. When obeying orders, it’s necessary for those troops to believe a commander wouldn’t order them into harm’s way unless it was necessary, that the order serves a greater good, and it’s not an illegal order.
Most of the nine men listed here (in no order) did not disobey orders because they were illegal. They disobeyed them because lives were at stake and felt saving those lives was worth the risk. Others pushed the envelope to keep the enemy on its heels. People make mistakes, even when the stakes are life and death. It can mean the difference in the course of the entire war (as seen with Gen. Sickles) or to a few men who are alive because someone took a chance on them (in the case of Benaya Rein).
1. Dakota Meyer, U.S. Marine Corps, Afghanistan
In 2009, Meyer was at the Battle of Ganjgal, where his commander ordered him to disregard a distress call from ambushed Afghan and American troops, four of them friends, pinned down by possibly hundreds of enemy fighters. He repeatedly asked permission to drive his truck to help relieve his outnumbered and surrounded friends and allies. He and another Marine hopped in a Humvee. Meyer manned the gun while the other drove the vehicle.
They drove right into the firestorm, loading the beleaguered Afghans, mostly wounded, onto their humvee. As weapons jammed, Meyer would grab another, and another. They drove into the melee five times, until they came across Meyer’s friends, now fallen, and pulled them out too. Meyer received the Medal of Honor for his actions.
2. Daniel Hellings, British Army, Afghanistan
Hellings was on a joint patrol in Helmand Province with Afghan allies when his patrol was hit by an explosion. An improvised explosive device (IED) was detonated in an alleyway, injuring two of the patrollers. Then another went off, injuring a third man. Hellings’ commander ordered an immediate withdrawal. Instead, Hellings got down on the ground and started a fingertip search for more bombs — and found four more. He was on the ground, poking around in the dirt until he found all of the IEDs. For his bravery and quick thinking, he was awarded the Queen’s Gallantry Medal.
3. Lt. Col. Stanislav Petrov, Soviet Army, Cold War
Petrov was in command of the Oko Nuclear Early Warning System on the morning of September 26, 1983 when it detected a probable launch of American nuclear missiles. Suspecting it was a false alarm, he disobeyed the standing order of reporting it to his commanding officers, who likely would have “retaliated” with their nuclear arsenal.
In this case, doing nothing was doing something big, as in completely averting World War III, and mutually assured destruction. It also showed a flaw in the USSR’s early warning system and helped to avert further misunderstandings.
4. Benaya Rein, Israel Defence Forces, Second Lebanon War
Several Israeli soldiers, lacking accurate maps, became lost in 2006 while downrange in Southern Lebanon. As they attempted to get their bearings, about 20 men appeared in the distance, and the commander — thinking they were Hezbollah fighters — ordered Benaya Rein to open fire.
Rein wasn’t so sure. Instead, he took a tank out to the location to investigate. When he arrived, he found 20 of his fellow IDF soldiers. “Because he refused to follow his commander’s order, the lives of these soldiers were saved,” his mother told an Israeli paper.
Rein would later be killed after the tank he was commanding was hit by a Hezbollah missile. He was one of the last Israelis killed during the war.
5. Lt. David Teich, U.S. Army, Korean War
Teich was in a tank company near the 38th parallel in 1951 when a radio distress call came in from the Eighth Ranger Company. Wounded, outnumbered, and under heavy fire, the Rangers were near Teich’s tanks, and facing 300,000 Communist troops, moving steadily toward their position. Teich wanted to help, but was ordered to withdraw instead, his captain saying “We’ve got orders to move out. Screw them. Let them fight their own battles.”
Teich went anyway. He led four tanks over to the Rangers’ position and took out so many Rangers on each tank, they covered up the tank’s turrets. He still gets letters from the troops he saved that day, thanking him for disobeying his order to move out.
6. Cpl. Desmond Doss, U.S. Army, World War II
Doss wanted to serve, he just wasn’t willing to kill to do it and refused every order to carry a weapon or fire one. However, Doss would do anything to save his men, repeatedly braving Japanese fire to pull the injured to the rear. As his unit climbed a vertical cliffside at Okinawa, the Japanese opened up with artillery, mortars, and machine guns, turning his unit back and killing or wounding 75 men. Doss retrieved them one by one, loading them onto a litter and down the cliff.
A few days later, in the mouth of a cave, he braved a shower of grenades thrown from eight yards away, dressed wounds, and made four trips to pull his soldiers out. He treated his own wounds and waited five hours for a litter to carry him off. On the way back, the three men carrying him had to take cover from a tank attack. While waiting, Doss crawled off his litter, treated a more injured man, and told the litter bearers to take the other man. While waiting for them to come back, he was hit in the arm by a sniper and crawled 300 yards to an aid station. He was the first conscientious objector to earn the Medal of Honor.
7. Lt. Thomas Currie ‘Diver’ Derrick, Australian Imperial Force, WWII
The Battle of Sattelberg in the Pacific nation of New Guinea was as hard-fought as any in the Pacific Theater. It took the Australians a grudgingly slow eight days to push the Japanese out of the town and they paid dearly for it. On November 24, 1943, Lt. Derrick was ordered to withdraw his platoon because the CO didn’t think he could capture the heights around Sattelberg.
Derrick’s response: “Bugger the CO. Just give me twenty more minutes and we’ll have this place.”
Derrick climbed a vertical cliff by himself, holding on with one hand and throwing grenades with the other, stopping only to fire his rifle. He cleared out 10 machine gun nests that night and forced the Japanese to withdraw. The Aussies captured Sattelberg and Derrick was awarded the Victoria Cross.
8. 1st. Lt. Frank Luke, Jr., U.S. Army Air Corps, WWI
In September 1918, Luke was grounded by his commanding officer and told that if he disobeyed, he would be charged with being AWOL. Luke, an ace with 15 aerial victories, flew anyway, going out to find military reconnaissance balloons. Balloons sound like an easy target, but they were heavily defended by anti-aircraft weapons.
He knocked out three balloons that day before he was forced down by machine gun fire. Once out of his plane (which he landed, he wasn’t shot down) he kept fighting the Germans with his sidearm until a bullet wound killed him. Luke is the first pilot to receive the Medal of Honor.
9. Maj. Gen. Daniel Sickles, Union Army, Civil War
Sickles’ slight disobedience to orders during the Battle of Gettysburg changed the momentum of the war and may have changed the entire history of the United States. In a move historians haven’t stopped talking about for 150 years, Sickles moved his men to Peach Orchard instead of Little Round Top, as Gen. George G. Meade ordered him. This move prompted Confederate Gen. James Longstreet to attack the Union troops in the orchard and the wheat field, nearly destroying the Union forces there. Which, admittedly, sounds terrible.
The Confederate move allowed Union troops to flank them in a counteroffensive and completely rout the Confederate forces, winning Gettysburg for the Union and ending Robert E. Lee’s invasion of the North. Sickles himself lost a leg in the fighting, but received the Medal of Honor and helped preserve Gettysburg as a national historic site after the war.
We use our smartphones for just about everything, from mobile banking to hailing a cab, capturing and sharing photos, ordering food, and staying in touch with friends and family. As such, it’s important to make sure that the information on your phone remains secure and is only accessible to the people and apps you intend to share it with.
As data leaks become all the more common, with social apps like Instagram and Facebook, hotel chains like Marriott Starwood, and credit bureau Equifax all falling victim to breaches in recent years, keeping your web activity safe can be all the more critical.
Here’s a look at a few easy steps you can take to make using your smartphone more secure.
Using secure apps that employ techniques like encryption to protect your data can reduce the chances of intruders snooping on your conversations. Encryption is a process that makes information appear unintelligible when it’s being transferred from the sender to the recipient, increasing the likelihood that only the intended parties can see your text messages or emails.
Both Gmail and Outlook use encryption so long as the recipient is also using an email provider that supports it. Those who are dealing with extra sensitive information could also try Proton Mail, which doesn’t monitor web activity like large firms such as Google and only stores data in countries with strong privacy protections, such as Switzerland.
When it comes to messaging, the best choice for privacy-oriented users is Signal, which is available for iOS and Android and supports end-to-end encryption in addition to other security-centric features, like the ability to set your chat history to disappear. Apple’s iMessage and Facebook’s WhatsApp also support end-to-end encryption by default.
2. Keep your phone’s software up to date.
Keeping your smartphone up to date is important for several reasons.
Not only does it often bring new features to your device, but it ensures that you’re running on the most secure version of Apple’s iOS or Google’s Android operating system. That’s because operating system updates sometimes include fixes for vulnerabilities that can be exploited by malicious actors if left unattended.
To see if your iPhone software is up to date, open the “Settings” menu, tap “General,” and choose “Software Update.” You can also choose to have updates installed automatically by tapping the “Automatic Updates” option in the “Software Update” settings.
On an Android phone, open the “Settings” menu and tap the “System” option to check whether an update is available for your device. Then choose, “Advanced” and select “System update.” If you don’t see the “Advanced” button, press “About phone.” These steps can vary depending on the Android device you’re using.
(Photo by Sara Kurfeß)
3. Limit which apps have access to your device and personal information.
From your location to the contacts in your phone book, apps can gather a broad array of data from your mobile device.
The best and most efficient way to cut down on the number of companies that may have access to your personal information is to delete any apps and their respective accounts you don’t use. Purge your app library and get rid of programs you haven’t opened in a while, especially apps you have may have downloaded for a specific event like a festival or a conference.
You can also manage which apps have access to certain aspects of your phone through the settings menu on iOS and Android.
On your iPhone, you can get started by launching “Settings” and scrolling all the way down to view the apps installed on your phone. Tapping an app will display what types of data and parts of your phone that particular app has permission to use. From there, you’ll be able to enable or revoke access. For example, tapping Google Maps will list the permissions that it requests, such as your location, Bluetooth sharing, microphone, and cellular data among others.
The process is similar for Android devices, although Google presents it differently. Open the “Settings” menu, choose “Apps notifications” and press the “Advanced” option. Then choose “App permissions” to see a list of all the different permissions apps can request access to. This includes data and components such as your contacts, calendar, call logs, and location, among others. Tapping each category will allow you to see which apps have access to that information and revoke access if desired.
(Photo by Markus Spiske)
4. Use a password manager.
Memorizing individual passwords for all of your online accounts can be difficult. And re-using the same password for multiple accounts is never a good idea.
That’s why apps like LastPass,1Password, and Keeper can be very useful. These apps generate complex random passwords and can automatically log you into websites. All you have to do is remember your master password for the service.
And when creating a master password — or any password — remember to create one that’s unique and difficult to guess.
(Photo by Bernard Hermant)
5. Use a virtual private network when connecting to Wi-Fi in public.
We transfer sensitive information over Wi-Fi networks every day, which is why it’s critical to make sure you’re doing so in a secure and private way. Virtual private networks, or VPNs, can help with that.
A VPN establishes a secure Wi-Fi connection that masks your device’s internet protocol address, therefore hiding your phone’s location and identity. That extra layer of security also makes it far less likely that intruders will gain access to sensitive information being shared over Wi-Fi than if you were to use a regular public network. Some popular VPN services include NordVPN, ExpressVPN, and PureVPN.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
“This is actually how we would get SEALs off the ship submerged,” Senior Chief Mark Eichenlaub told Business Insider.
“So you would stick a platoon of SEALs in here, 14 guys … you fill this chamber with water until you match the outer sea pressure. Once the pressure in and outside the ship match, the hatch will lift off open, and they can swim out of a fully filled chamber into open ocean.”
Once the chamber is filled with water, matching the pressure inside and out, “there’s an internal locking mechanism that would open” the top hatch where SEALs swim out, Senior Chief Darryl Wood told Business Insider.
The SEALs can then swim to retrieve what is known as a special-forces operations box, which would be filled with weapons and needed gear, from the tower.
In addition to getting SEALs off the ship, lockout trunks can be used for the entire crew to escape in case the submarine is downed.
This video gives a close-up look at the lockout trunk:
In Chapter 4: Sanctuary (quite superbly directed by Bryce Dallas-Howard), our Mandalorian and his Yoda Baby seek out a nice calm place to hide out for awhile. He settles for the remote planet of Sorgan, which should be quiet and safe, right? Right?
By now, we’re at a place where the writing is at a critical tipping point, and while the series is visually fantastic and filled with fun moments, I do get the sense that the plot is a little bit like its hero: meandering and ignoring important clues.
Let’s dive in. Spoiler warning for season 1 episode 4:
The Mandalorian, DIsney+
In the cold open, a little farming village is attacked by orcs Klatoonian raiders with an unseen but probable Imperial walker. The Klatoonians plunder and kill before withdrawing back into the forest while a mother uses quick thinking to hide herself and her daughter during the attack.
Back in his Razor Crest, our Mandalorian is chatting it up with the Yoda Baby and now I can’t wait to call someone’s baby a little womp rat. CUTE. He lands near a little village and buys the baby some bone broth before encountering Cara Dune, played by Gina Carano.
She’ll cut a b****.
The Mandalorian, Disney+
Mutually suspicious of each other, they start out with a brawl. I had some reactions. Now, Carano is a former mixed martial artist who competed in Muay Thai and MMA from 2006-2009. Not knowing this, I was just glad to see a chick who actually looked like she could take on a dude in a fist-fight (per societal decree, traditional actresses must be dainty and petite whilst men must be engorged at all times — but no more). That being said, though, I don’t know what kind of gauntlets she’s wearing but…who would punch a steel helmet? A beskar steel helmet at that?
Their fight ended in a draw and they quickly bonded over their backstories, I guess. Cara Dune was a rebel soldier who’s just been laying low since the Battle of Endor. She wants to continue to keep a low profile so he’s gotta get off her rock.
Enter the cold-opening farmers, who approach our Mandalorian at his ship and offer him payment in exchange for protection from the raiders. Hearing that they live in the “middle of nowhere” he accepts their credits and recruits Dune to help.
That’s, like, really personal, lady…
Tha Mandalorian, Disney+
After some more helmet talk, we learn that once that helmet comes off (and it will come off — no one is going to hire Pedro Pascal and then keep him hidden for long) it can’t go on again. I predict that he’ll ditch it in a symbolic sacrifice in the season one finale and then we’ll actually get to see Pascal’s face for the rest of the series.
Our Mandalorian and Dune also do some recon and discover an AT-ST walker with the raiders (the episode doesn’t answer the question of where it came from).
So here’s where they come up with their plan. Is it a good plan? I mean, I don’t think so? But it is a plan.
I mean, it *looks* cool but still….
The Mandalorian, Disney+
They decide to train these farmers to fight (with no indication of how long they train…), then cluster the farmers close to each other (a questionable technique when facing an opponent armed with weapons with a large blast radius, you know, like an AT-ST walker), in the dark (even though the only combatant here with an advantage in the dark is the AT-ST walker and its flood light), in their own village (which, by their own accounts, has farming pods that were planted generations ago and are therefore difficult to replicate).
Why didn’t they ambush the raiders in the woods or something? Why didn’t Dune and Mando our Mandalorian just blast the AT-ST in the raider’s village? Why did they let the rest of the Klatoonians retreat — do they think they won’t ever attack again? They live, like, right next door…
“Do that thing where you eat a live frog again, ya little scamp!”
The Mandalorian, Disney+
For some reason, our Mandalorian is now convinced that the Klatoonians won’t attack again and none of the bounty hunters will find the baby all the way out here so the child is totally safe with these farmers who can now stab someone with a stick because of all that training so he’s thinking he’ll just take off if that’s cool.
And then, of course, a bounty hunter attacks. He aims a long-range rifle at the baby and for a second I thought we were gonna get another cool blaster Force-freeze à la Kylo Ren in The Force Awakens, but instead Dune gets the jump on the guy and shoots him in the back.
Our Mandalorian remembers that, oh yeah, all of the bounty hunters have tracking fobs for the baby and he’s still stuck being a single dad.
He and the Yoda Baby take off alone again, but I have a feeling we’ll be seeing marksman Omera and Cara Dune again soon.
Ewoks, some of the most despised inhabitants of the Star Wars universe, are the only ones who use multi-domain operations in any of the movies: indirect fire, offensive obstacles, close air support, ground attack, psyop, and information operations.https://twitter.com/4kshatra/status/1199989704030117888 …
For a long time, the AGM-84/RGM-84 Harpoon missile has been the primary anti-ship weapon of the United States military. Over the years, with improvements, it’s successfully held the line. But, as is perpetually the case, time and technological advances have forced the U.S. Military to look for a missile with even more reach and punch.
Fortunately, the answer is, in some ways, already in service. A version of the AGM-158 Joint Air-to-Surface Standoff Missile (or JASSM) is going to replace the venerable Harpoon as the military’s primary anti-ship weapon. This new iteration is called the Long-Range Anti-Ship Missile (or LRASM).
The AGM-84 Harpoon served well as the main anti-ship missile of the United States Military.
The AGM-158 was primarily designed to hit land targets. The first version, fielded by the Air Force in 2004, had a range of 200 nautical miles and carried a 1,000-pound warhead. The Navy, however, held out and stuck with a Harpoon variant called the AGM-84 Standoff Land-Attack Missile (or SLAM). The latest versions of SLAM have a 150-nautical-mile range and a carry an 800-pound warhead.
The LRASM is based off of the second version the AGM-158, called the JASSM-ER, or Joint Air-to-Surface Standoff Missile – Extended Range. This missile has a 600-mile reach and carries the same 1,000-pound warhead. Just as with previous iterations, however, the JASSM-ER was intended for land targets. So, how did the newest missile, designed for targets at sea, come to be?
There’s just one reason for its development — well, three reasons, technically: the Chinese Navy currently has 3 aircraft carriers in their fleet (with plans to build more). Yes, submarines can do the job against carriers – just ask USS Wasp (CV 7) what a sub can do to a carrier — but more often than not, carriers fight carriers. The Harpoon missile, as good as it is, just doesn’t have the oomph to do in an 85,000-ton carrier.
The good news for the United States is that a F/A-18E/F Super Hornet can haul four LRASMs. A B-1B Lancer can haul up to 24 internally. The F-16 Fighting Falcon and F-15E Strike Eagle can also carry this missile. But, more likely, the LRASM will be launched from surface ships like the Zumwalt-class destroyers.
In other words, this missile could very well be a worthy successor — or partner — to the Harpoon for years to come.
Marines do some pretty spectacular and/or ridiculous things while deployed. Anyone who follows Terminal Lance on Instagram can tell you that much. What Marine Warrant Officer Faustin Wirkus did was pretty spectacular, but really it was just a day in the life of a U.S. Marine. Except this time, the Marine in question ended up being proclaimed king of the island in a voodoo ceremony — and he ended up with a wife, whether he wanted to or not.
At this point, half of everyone is wondering what happened and the other half is wondering if voodoo is why you so rarely see the warrant officers in your unit. Well, It was why then-Sergeant Wirkus had to stop showing up for duty. It wasn’t that Wirkus was opposed to hard work — he was a United States Marine after all, and he grew up breaking coal from slate in the Pennsylvania Coal Country.
But, Wirkus, he had an island to rule.
Best. Additional Duty. Ever.
Wirkus arrived in Haiti in 1915 with his fellow Marines. He spent much of his first year around the capital of Port-Au-Prince. Germany had been intervening in a number of Caribbean insurrections. The Haitians suddenly overthrew the American-backed dictator on the island, and Caco Rebels installed an anti-American president.
The Marines were sent in to occupy and stabilize the island while enforcing the American “Monroe Doctrine” — an intolerance toward European meddling in the Western Hemisphere. They were also protecting U.S. economic interests. Wirkus was one of many Marines sent to Haiti aboard the USS Tennessee. It was aboard that ship he first saw the island of La Gonâve.
He asked a Marine NCO about the island. The reply was cryptic and short.
“If you’re lucky, you’ll never get any closer to that place than you are now. No white man has set foot on it since the days of the buccaneers. There’s a post on it now, but the men stationed there don’t usually come back — and if they do, they’re fit for nothing but the bug house… Place is full of voodoos and God knows what else.”
Luckily, he was kept in the capital during his first deployment in Haiti. He soon fell from a truck and broke his arm. After his recovery in the U.S., he was sent to Cuba, and eventually back to Haiti. It was four years later and the young Marine was now a Sergeant, but was a commissioned officer in the local Garde d’Haiti, keeping the Caco Rebels at bay in the outer edges of the island nation.
U.S. Marines in the occupation of Haiti.
He was good at it, and so, of course, he would eventually be sent to the one place everyone told him he would be lucky to never see. No, it was not Twentynine Palms, it was the mysterious island the NCO warned him about: La Gonâve.
Wirkus was extremely interested in the island. It captivated him but none of the other Marines could tell him anything about the island’s interior; none of them had ever dared to venture inland. His first assignment on the island was to assess prisoners of the Garde who were charged with “offenses against the Republic of Haiti” and “trivial voodoo offenses.”
Among them was a woman named Ti Memenne, who warned the Marine that she would see him again. Still, Wirkus sent her on to Port-Au-Prince with a recommendation for lenient treatment.
Faustin I was reincarnated as Faustin II.
“They made me a sort of king in a ceremony I thought was just a celebration of some kind. I learned later they thought I was the reincarnation of a former king of the island who had taken the name of Faustin I when he came into power. The coincidence was just good luck for me.”
Faustin II’s good luck was good luck for the locals. The 19-year U.S. occupation of Haiti did not go as smoothly or nonviolently for the rest of the country. But that good luck ran afoul of the President of Haiti, who was able to visit the island for the first time in 1928. Incidentally, he was able to visit without being murdered by the island’s inhabitants, thanks to the command decisions of Faustin Wirkus. The President was not thrilled with the King and requested he be transferred to the mainland United States.
Emperor Faustin II. Or Sergeant Fustin Wirkus. Again, depending on your belief in voodoo.
He went willingly in 1929 and left the Corps shortly after. He returned to active duty in the days before World War II and was made a Warrant Officer who served in the Navy’s pre-flight school in North Carolina. He died just months before the end of World War II and was interred in Arlington National Cemetery,
Ask the Federal Communications Commission’s Patrick Webre when he last received a robocall, and he’ll quickly tell you: yesterday. “I don’t think I’ve received any today,” he says, “but it’s a pretty regular occurrence for me.”
This, of course, only illustrates the extent of America’s problem with automated phone calls. If the chief of the FCC’s Consumer and Governmental Affairs Bureau, which oversees rule making efforts regarding issues including robocalls, is himself a repeated victim, are any of us safe from the annoyance?
The stats back it up: In 2017, there were around 30.7 billion robocalls made. The following year? Almost 48 billion. If you were to do the math, the average American would receive a machine-operated call approximately every other day. But some end up receiving way more. One Florida woman received thousands of calls from Wells Fargo bank, with as many as 23 per day. The state you live in can also have an effect. Living in Georgia; Washington, D.C.; or Louisiana? They’re the three states with area codes that receive the greatest number of robocalls per person, with an average of 55 per day, according to a recent report. “We get more robocalls during the day than we do real phone calls,” one resident said. With the number of calls the average American receives coming fast and furious, the machines seem to be winning.
“There’s no silver bullet here,” Webre says, “so we’re taking a multi-pronged approach.”
In the last two years, the FCC has been going hard at these companies, levying over 0 million in fines to businesses found in breach of existing regulations. “It’s not only our top consumer complaint, but it’s also our top consumer protection priority,” Webre adds.
Fatherly spoke Webre on a particularly good day (any day without robocalls is a good day) and he recommended measures everyone can take to reduce the presence of robocalls in their life.
1. Do not pick up
When you receive a call from an unknown number, do not answer it. “Our first guidance is, if you don’t recognize the phone number, you should let it go voicemail,” Webre says. The reason for this is simple: Human interaction can be detected by the computer monitoring on the other line, even if you just hang up after a few seconds. This, however, can start a chain reaction in which your number can be marked for increased calling. By screening for unknown numbers, in the system you’re just another no-response.
2. Check with Your Phone Provider
“Phone companies are providing blocking tools for consumers both on the landline and on the wireless side,” Webre says. Does your provider have these? Best give them a call and ask. In March 2019, Verizon rolled out free services to its wireless customers, simply requiring a signup. ATT and T-Mobile introduced these services two years ago gratis, while Sprint offers a service for an added monthly fee. To activate, you’ll need to contact your carrier to opt in while also having a device that can shoulder the workload. Still, for many, this should be the first line of defense.
Third-party app makers have jumped into the game with both feet, and they’re providing more and more sophisticated tools to prevent unwanted contact. The FCC even has a handy list here. While each of these apps has its own special sauce, generally speaking, each scans a mega-database of all reported robocall numbers. What it does from there varies. One blocks calls en masse. Another allows you to automatically send calls to voicemail so that you may manually report them to the FCC at a later date. One even allows you to record your own pre-recorded gibberish to was these companies’ time in a cathartic action of schadenfreude.
4. Add yourself to the “Do Not Call” list
Of course, the preexisting “Do Not Call” list continues to grow, and legitimate telemarketers are required to check it and abide by your decision or face stiff fines. After navigating its multi-step verification process, your information is recorded, which should cut your number of unwanted calls. Furthermore, you can also report additional harassing numbers. But one word of caution for those to whom it seems like a catchall panacea: “Unfortunately it doesn’t work well when you have a scammer trying to reach consumers,” Webre says. “They’re not going to check the ‘Do Not Call’ list.”
5. Report every ring
Finally, report any number guilty of harassment, unwanted phone calls, or texts directly to the FCC. Webre says it’s Pai’s most important priority right now, and he’s bringing down a multi-stranded hammer, which includes working with carriers to eliminate the scourge of robocalls from the public experience: “If your phone doesn’t ring, you’re not frustrated, you’re not getting an unwanted call, and we’re all better off for that.”
Frustrated current and former US officials warned that President Donald Trump’s personal Apple iPhone is being monitored by Chinese spies, according to a New York Times report published Oct. 24, 2018.
Trump reportedly has two iPhones that were programmed by the National Security Agency for official use, but he keeps a third, personal phone that remains unaltered — much like the normal iPhones on the consumer market, according to the officials.
Unlike the other government-managed phones, Trump uses the unaltered personal iPhone because of its ability to store contacts, The Times reported. One of the two official phones is designated for making calls, the other one is for Twitter.
The information Chinese spies have collected included who Trump regularly speaks to and why, The Times said, and was part of a wider lobbying effort to influence Trump’s friends and business associates. US intelligence agencies discovered the espionage campaign from sources in foreign governments and communications from foreign officials.
(Flickr photo by Japanexperterna.se)
Through its efforts, China reportedly identified Blackstone Group chief executive Stephen Schwarzman, who has ties to Beijing’s Tsinghua University, and former Las Vegas casino mogul Steve Wynn as potential targets in an influence campaign to curb the ongoing trade war with China.
China’s plan included targeting and encouraging Trump’s associates to persuade the president to formally meet with Chinese President Xi Jinping, one official said to The Times.
Despite the security compromise, current and former officials reportedly cited Trump’s unfamiliarity in matters of intelligence and said they believe he was not divulging sensitive information through his personal phone.
The White House’s communication methods have long been scrutinized by people familiar with the situation. Much to the chagrin of the officials, Trump is believed to quietly make calls to current and former aides. Separately, the White House chief of staff John Kelly’s phone was reportedly compromised for months in 2017.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
When we first enter the gym, we’re usually greeted by a vast inventory of supplies and supplements, all up for sale. After all, gyms are businesses, and if they want to keep their doors open, they need to find many sources of revenue.
Sure, every once in a while, you might find yourself in a bind and have to buy a product or two from their shelves, like a pre-game drink or some amino acids, but these products can be fairly expensive and it’s a known fact that enlisted troops don’t make a whole lot of cash. Pinching pennies where you can will improve your financial situation in the long haul.
If you’re looking to save more than just a few pennies, make sure to keep the following list of things in your gym bag so you’re not forced to overpay for them later.
Gyms make some money on your membership, but they also earn cash by selling you pre-made protein drinks. These tasty, high-protein drinks can cost you anywhere between to — which might not seem too costly at the time, but here’s some quick math for you:
You typically enjoy a drink after every workout. If you hit the gym at least four times a week, that tallies around to per month. Now, if you were to buy a 74-serving jug of protein for , that’s only 81 cents per scoop. At one scoop per drink, for the same number of drinks, you’re looking at .96 — just sayin’.
Weight belts support your back, protecting your spine as you lift. It’s a gym-bag essential because once you slip a disc in your vertebrae, the doctor bills will skyrocket as you embark on your road to recovery.
Invest in a weight belt now and save thousands in potential medical expenses later.
Most gyms do their best to keep clean. Unfortunately, despite all the hard work the cleaning staff puts into maintaining a sanitary gym, they rarely clean the fibers of the extension ropes attached to cable machines. This means that by using a cable, you’re coming in contact with nasty bacteria, which could lead to contracting an infection.
To make matters worse, gym-goers often use their hands to wipe the sweat from their faces. If you’ve been touching a germ-infested rope and then smear your hands across your face, you run the risk of catching a bad cold. Buying an extension rope and storing it in your gym bag will help you limit your exposure to germs, keeping you healthier and saving you money on visits to the doctor.
Walk into any gym and you’ll probably find an assortment of energy bars for sale. While the price of the individual bars will vary based on their nutritional values, you’ll always save money if you purchase them in bulk. Buy some at a health food store and pack one in your gym bag. Just as with protein powder, the savings add up over time.
What’s the difference between a weight belt and a dip belt?
That’s simple. A weight belt is used to protect the lower back from an injury while this specialized belt is worn to add weight to your workout at the dip or pull-up station.
Some gyms provide this easy-to-use piece of equipment, but, like anything, the chains and buckles can break over time. If you’re using a gym-owned dip belt and it finally reaches its breaking point, you’ll end up paying the full retail price to replace the item. It’s cheaper if you bring your own.
Like they say, “you break it, you buy it.”
An extra pair of clean gym pants or shorts
You’re probably wondering, “how the hell does bringing an extra pair of pants save me money?” Well, the ugly truth of the matter is that when we lift heavy weights, we put a lot of strain on our lower bowels. In fact, the added pressure is usually more powerful than the strain you put on yourself while using the bathroom.
Experiencing a suddenly bowel movement while lifting happens more often than you’d think. Keeping an extra pair of shorts or pants in your gym bag will save you some money — otherwise, you’ll need to purchase one at the gym at a premium price.
There are moments in history that are nothing short of monumental, but they aren’t broadly celebrated or acknowledged. Juneteenth is one of those days.
You may have heard the word Juneteenth at some point in your life but have no idea what it’s about. It’s a turning point in our country that isn’t emphasized in history books, so it’s easy to skate past the day with little care. But it’s time we give the respect it deserves.
Here’s the story about Juneteenth, and why we all should know it.
Remember learning about when President Lincoln signed the Emancipation Proclamation abolishing slavery during the Civil War? The executive order went into effect on January 1, 1863, but it wasn’t an immediate victory. It would take two and a half more years before the news that slavery had ended would reach remote Texas.
Up to this point, black people (who were captured and brought to America) were viewed and treated as property and animals, not humans with rights. Their purpose was that of free labor for farming, working as servants and basically doing whatever their owners commanded. Many people saw slavery as immoral and wanted to end it. Confederates didn’t agree that the federal government had the right to do so, which was a major factor in them separating from the Union. Subsequently, the Civil War began.
In 1865, the Confederate states were defeated.
Two months after the Civil War ended, General Gordon Granger announced federal order in Galveston, Texas, the last Confederate state holding onto their human property. Granger declared that all previously enslaved people were free, and he was backed by Union troops to enforce the decree.
This climax of freedom took place on June 19, 1865, therefore, Juneteenth. It is the annual celebration of African Americans being released from the last shred of slavery in this country. Some communities hold gatherings, parades and festivals in commemoration.
The happenings of June 19 were major progress, not just for black Americans, but for our nation! It was a beginning step toward equality and to be treated as people and not property.
Our country explodes in celebration recognizing July 4, 1776 (Independence Day). But black people were still enslaved. Juneteenth is the African American day of freedom. To acknowledge it is to say, this happened, and it is a day we honor, value and will make noise about in celebration together.
Changes are happening as Americans of varying nationalities are screaming in the streets that Black Lives Matter and demanding social justice. Recognizing Juneteenth is a part of that package.
Nike, New York Times, Target, Lyft, JCPenney and many other companies are making Juneteenth an annual paid holiday. They encourage employees to use this time to reflect on the many injustices black people have faced in America, and to connect to the community.
While 47 of the states acknowledge Juneteenth in some capacity (North Dakota, South Dakota and Alaska do not), Texas, Virginia, New York and Pennsylvania are the only ones recognizing it as an official paid holiday for state employees.
While Juneteenth is not yet a national holiday, the significance of this time is starting to catch hold. While many white Americans are acknowledging the pattern of struggle that African Americans still face daily, we have long strides to make.
Recognizing the ending of slavery as a nation is a good start! Happy Juneteenth!