U.S. Army modernization officials defended the rapid prototyping strategy for the service’s Mobile Protected Firepower (MPF) system, even though infantry units won’t receive the new light tank until 2025.
The two companies will each build 12 prototypes so the Army can begin testing them in early 2020. The goal is to down-select to a winner by fiscal 2022.
“We are excited about this opportunity,” Maj. Gen. Brian Cummings, head of Program Executive Office Ground Combat Systems, told reporters at the Pentagon. “We have an aggressive schedule to take a look at these two companies as they build the prototypes.”
BAE Systems displays an early prototype of its Mobile Protected Firepower at AUSA’s meeting and exposition in Washington. Events such as this provide industry with opportunities to showcase technologies and discuss requirements for new capabilities.
(BAE Systems photo)
GDLS and BAE beat out SAIC and its partner, ST Engineering Land Systems Ltd., but Army officials would not comment on the reason the winners were chosen.
Service officials lauded the contract awards as a major step forward in streamlining Army acquisition and said they plan to use the rapid prototyping approach as a model for future programs.
But even if the Army in 2022 selects one of the companies to build production MPF systems, it likely will take another three years before the service will field the first of 504 of these lightweight tanks to infantry brigade combat teams.
Army officials said it would take longer to field the MPF if they hadn’t used what’s known as “Middle Tier Acquisition Rapid Prototyping (Section 804)” contracts, an acquisition tool designed to streamline testing and development of prototypes.
The process is quicker than other acquisition procedures in that the MPF program will not use time-consuming preliminary and critical design reviews to ensure that platforms meet requirements, Army officials explained.
“For a new system, [going through that process] could add as much as a year-and-a-half to two years onto the whole cycle,” said David Dopp, Mobile Protected Firepower program manager, adding that the Army is pleased it will take just 14 months for GDLS and BAE to produce the 12 prototypes each.
“Fourteen months is very challenging. I don’t think you can find another program that ever got prototypes in 14 months,” he said. “When you build these vehicles and you put them together, [sometimes] they don’t work, or if they do work, we take them out and test them, and there are things that happen, and we need that time to prove it out.”
A General Dynamics Land Systems Griffin II prototype vehicle. GD was selected to produce similar, medium-weight, large-caliber prototype vehicles for the U.S. Army’s Mobile Protected Firepower program.
(General Dynamics photo)
Brig. Gen. Ross Coffman, director of the Next Generation Combat Vehicle Cross Functional Team, said the Army will use the 14 months to get a headstart on figuring out how infantry units will utilize the MPF to destroy enemy bunkers and other hardened battlefield positions.
“Right now, we are doing experiments and tactical training at Fort Bragg, North Carolina, with vehicles that have a similar profile of the Mobile Protective Firepower to develop tactics, techniques and procedures for the light forces to work with mechanized vehicles in the close fight,” he said.
The MPF concept emerged several years ago when maneuver leaders started calling for a lightweight, armored platform for light infantry forces equipped with a cannon powerful enough to destroy hardened targets.
When a newlywed troop moves off base and bids a bittersweet farewell to the debauchery of barracks life, there are changes to the day-to-day routine. While one must still fulfill the responsibilities of their rank, there are other challenges a married troop will have to tackle.
The more obvious ones are waking up earlier to fight traffic, no more access to a meal card, and administrating bills that didn’t exist before. To make your transition to a quasi-civilian life easier, there are a few essential items to have in your home that will help you focus more on mission accomplishment, enjoy quality time with your sweetheart, and maintain peace of mind while in the field or deployed.
A pull-up bar and dumbbells
There are plenty of pull-up bars on base and you’ll more than likely have an opportunity to hit the gym because you’re two hours early to formation to avoid a UA or AWOL charge because of bad traffic. However, you may not have the opportunity to work out in the mornings because of a hot-ticket task that requires the use of your otherwise-scheduled workout time. It’ll devolve into a vicious cycle, resulting in no PT and the consequences that come with it.
You’ll most likely be cut from work when rush hour hits and you’ll have to make a decision: work out or work on your marriage. Luckily, if you have a pull-up bar at home, you can PT when you get there and do both. Dumbbells are another staple to have at home for a complete workout.
Although the majority of troops have a properly calibrated moral compass, it doesn’t mean your civilian neighbors share your altruistic ideals. Security cameras are a good investment because you can check on your home from your mobile device at work or, if you have internet access, in the field. Peace of mind is expensive, but your odds of bringing a thief to justice increase exponentially with video footage.
Imagine you’re sitting there on your pack waiting for the trucks to pick you up on base when you suddenly have a realization: I left the lights on. If you have smart lightbulbs installed, you can turn them off using your phone remotely. I highly advise doing your brand research before you buy these bulbs because not all brands are safe to connect to your network at home. To put it simply, some companies do not want to invest in cybersecurity software for their products, and this can leave your network vulnerable to attack.
Robot vacuum cleaners
Replacing good, old-fashioned cleaning with technology is not immediately viable, but it’s getting closer by the day. A robot vacuum cleaner can be set on a schedule to sweep up dust and light debris and will buy you some more precious time to prioritize on another task. You’ll be able to give your home a thorough cleaning when you deem necessary. They work best on floors without carpet, but they can also operate well on short-length, fiber carpets.
Jody doesn’t have sh*t on this.
A formal civilian wardrobe
We warriors love our comfortable clothing when we don’t have to wear the uniform of the day. Your favorite shirt and jeans may cut it for most occasions because who cares what other people think? You’re paying for the price of freedom and, dammit, you want to enjoy some of it from time to time.
While this line of thinking is admirable in most circles, there is a time and a place for everything. You don’t necessarily have to have a closet full of suits, but a few slacks, button-up shirts, a sports coat, and a pair of dress shoes will go a long way for when you have to be somewhere important. Your wife will appreciate you taking the time to look nice when you have to be at an event that’s important to her. Think about it, at your formal events, she always does her best to look her best — return the sentiment.
The people have spoken
Honorable mention: Stockpiled alcohol
The last time I made an article like this, I received some constructive criticism. I am a man who believes in giving the people what they want. So, here ya go.
IT jobs are some of the fastest growing, most secure jobs around today. Although they require a lot of education and experience, military veterans who held similar roles in the military tend to transfer extremely well. We did some research on the IT jobs the Bureau of Labor Statistics say are growing the fastest, and these are the most in demand, and will be in the future.
1. Software Developer
What software developers do
Software developers are the technical and creative minds who design and develop software for computer programs and applications.
Duties of software developers:
Analyze users’ needs and then design, test, and develop software to meet those needs
Recommend software upgrades for customers’ existing programs and systems
Design each piece of an application or system and plan how the pieces will work together
Create a variety of models and diagrams (such as flowcharts) that show programmers the software code needed for an application
Document every aspect of an application or system as a reference for future maintenance and upgrades
Collaborate with other computer specialists to create optimum software
Software developers are responsible for overseeing the entire development process for computer systems and applications. One of their main responsibilities is to identify how the users of the software will interact with it. Software developers must also keep in mind the type of security that their software will need in order to protect users.
Developers design and write the instructions for a program, and then give the instructions to the programmers to actually write the code. Some developers, however, might even write the code for the software.
(Photo by Farzad Nazifi)
Work environment of software developer jobs
Software developers typically work in teams that also consist of programmers. They must be able to work together and exchange ideas freely in order for the product to work. Typically, software developers work in an office and work 40 or more hours per week.
How to become a software developer
Software developers usually have a bachelors degree in computer science, software engineering or a related field. If you are going to school for software development you can expect to take courses that focus more on building the software. Many students gain experience by completing an internship with a software company while they are in college.
Even though writing code is typically not the responsibility of the developer, they still must have a strong background in computer programming. Through the course of their career developers will need to stay familiar with the newest computer tools and languages.
Software developers must also have knowledge of the industry they work in. For example, a developer working on digital recruitment software should probably have some knowledge about how the recruiting industry works.
Looking closer, the employment of applications developers is expected to grow by 31%, while system developers is expected to grow by 11%. The need for new applications on smart phones and tablets contributes to the high demand for applications developers.
The insurance industry is expected to need new software to help their policy holders enroll. As the number of people who use this software grows over time, so will the demand for developers.
Growing concerns with cybersecurity will contribute to the demand for software developers to design security systems and programs.
Job applicants who are proficient in multiple computer programs and languages will have the best opportunity to secure employment.
2. Information Security Analyst
What information security analysts do
Information security analysts are responsible for creating and overseeing security measures to protect an organization’s computer systems and digital assets from cyberattacks.
Duties of information security analysts:
Monitor their organization’s networks for security breaches and investigate a violation when one occurs
Install and use software, such as firewalls and data encryption programs, to protect sensitive information
Prepare reports that document security breaches and the extent of the damage caused by the breaches
Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
Research the latest information technology (IT) security trends
Develop security standards and best practices for their organization
Recommend security enhancements to management or senior IT staff
Help computer users when they need to install or learn about new security products and procedures
Information security analysts are heavily leaned upon to create their organization’s disaster recovery procedures, which allow an IT department to continue operating in the face of an emergency. Because cyberattacks are so common and dangerous now, these measures are extremely important to the stability of an organization.
Analysts must be familiar with how cyber attackers are operating, and be prepared for new ways they may infiltrate a computer system.
(Photo by Markus Spiske)
Work environment of information security analysts
The work environment of IT security analysts is typically set in the headquarters of a company so that they can monitor the computer systems, unless the company has a separate office strictly for their computer networks. As you can imagine, the majority of their work involves being on computers and monitoring for unusual activity.
Most IT security analysts work at least 40 hours per week, and some work more than that. They often work in teams and may even have specific people assigned to monitoring different aspects of a network.
How to become an information security analyst
To become an IT security analyst you will need at least a bachelor’s degree in a computer-focused field, and many employers prefer a masters degree and some work related experience. A Master of Business Administration in information systems is the preferred degree for upper level positions. This is where military experience comes into play. If you had experience in this field in the military, you will have a great edge over your competition.
Information security analysts are very well paid and will enjoy great job security and profession growth in the coming years. According to the Bureau of Labor Statistics, the average annual salary of information security analysts was ,510 as of May 2017. Employment of information security analysts is expected to increase 28% by 2026, which is considerable faster than the average occupation is expected to grow over that same time period.
Because cyberattacks are so common now, information security analysts will see a high demand for their job in the future. They will be expected to come up with innovative solutions to combat cyberattacks. As banks and other financial institutions continue to increase their online presence, they will need to ensure the safety of their own data and that of their users. This is true for many organizations, which makes information security analysts valuable.
Prospects who have prior experience, such as military veterans, are expected to have the best chance at gaining employment. Additionally, having special certifications and advanced degrees will be preferred moving forward.
Companies hiring for information security jobs
AECOM: AECOM is built to deliver a better world. We design, build, finance and operate infrastructure assets for governments, businesses and organizations in more than 150 countries.
ORACLE: At Oracle, our vision is to foster an inclusive environment that leverages the diverse backgrounds and perspectives of all of our employees, suppliers, customers and partners to drive a sustainable global competitive advantage.
Oracle: At Oracle, our vision is to foster an inclusive environment that leverages the diverse backgrounds and perspectives of all of our employees, suppliers, customers and partners to drive a sustainable global competitive advantage.
Soldiers are about to get their hands on the Army’s new Joint Light Tactical Vehicles (JLTVs), and the first unit will start receiving the trucks as 2019 begins.
These deliveries keep the program right on schedule, following an Army Systems Acquisition Review Council decision in December 2018 to move forward with fielding JLTVs to the 1st Armored Brigade Combat Team, 3rd Infantry Division. The unit, located at Fort Stewart, Ga., will start receiving its own JLTVs in January 2019, and should be fully equipped with about 500 new JLTVs by the end of March 2019.
“The JLTV program exemplifies the benefit of strong ties between the warfighter and acquisition communities,” said Dr. Bruce Jette, the assistant secretary of the Army for Acquisition, Logistics, and Technology. “With continuous feedback from the user, our program office is able to reach the right balance of technological advancements that will provide vastly improved capability, survivability, networking power, and maneuverability.”
The new trucks represent a significant modernization success for the Army and Marine Corps, with the program on track to replace many venerable High Mobility Multipurpose Wheeled Vehicles (HMMWV).
“I simply could not be prouder of the team that is bringing JLTV to reality,” Jette continued. “Our single focus is giving soldiers better capabilities, and our team of soldiers, Marines, and civilians worked tirelessly to deliver an affordable, generational leap ahead in light tactical vehicles.”
Joint Light Tactical Vehicles demonstrate their extreme off-road capability at the U.S. Marine Corps Transportation Demonstration Support Area at Marine Corps Base Quantico, Va.
(U.S. Army photo by Mr. David Vergun)
The JLTV family of vehicles is designed to restore payload and performance that were traded from light tactical vehicles to add protection in recent conflict. JLTVs will give soldiers, Marines, and their commanders more options in a protected mobility solution that is also the first vehicle purpose-built for modern battlefield networks.
“We are very excited to get these trucks into the hands of our soldiers,” said Col. Mike Adams, 1st Armored Brigade Combat Team commander. “It’s an honor to be chosen as the first unit to receive such an improved capability, and I look forward to getting it into our formations.”
The JLTV program remains on schedule and on budget as it wraps up its low rate initial production phase, yet the program office’s work is far from over. As warfighter needs change, the team will continue to explore ways to refine the design and the capability it offers.
More deliveries are slated across each service in 2019. Ultimately, the Army anticipates purchasing 49,099 vehicles across its Active, Reserve, and National Guard components, and the Marine Corps more than 9,000.
The JLTV will be fielded in two variants and four mission package configurations: General Purpose, Close Combat Weapons Carrier, Heavy Guns Carrier, and a Utility vehicle.
Ibrahim al-Asiri, an Al Qaeda bomb-maker believed to have masterminded a plot to down a commercial airliner over Detroit on Christmas Day 2009, was killed in a US drone strike in Yemen in 2017, US officials confirmed to Fox News and CBS News on Aug. 20, 2018.
Al-Asiri is said to have made the underwear bomb that a Nigerian man named Umar Farouk Abdulmutallab attempted to detonate on a Northwest Airlines flight to Detroit in December 2009. Al-Asiri was also involved in a plot to hide explosives in printer cartridges being shipped to the US. The first attack was unsuccessful because the attacker failed to detonate the device, and the other bombs were discovered after a tip.
Before his death, al-Asiri was believed to have been working on bombs that could be hidden inside laptops, CBS News reported.
Michael Morell, a former CIA deputy director, told CBS News that al-Asiri was a big reason for increased security at airports. “A good chunk of what you have to take out of your bag and what has to be screened is because of Asiri and his capabilities of putting explosives in very difficult to find places,” he said.
Morell described al-Asiri as “probably the most sophisticated terrorist bomb-maker on the planet.” He said in a tweet on Aug. 20, 2018, that it was “the most significant removal of a terrorist from the battlefield since the killing of [Osama] bin Laden.”
Fox News reported that in 2009, al-Asiri hid explosives in his brother’s clothes in an attempt to assassinate Saudi Arabia’s interior minister; the brother was killed in the attack.
A report from the United Nations and statements from a Yemeni security official and a tribal leader had previously indicated that al-Asiri, a Saudi national and one of America’s most wanted terrorists, was killed in a drone strike in the eastern Yemeni governorate of Marib, The Associated Press reported.
Al Qaeda’s Yemeni affiliate has long been regarded as one of the most dangerous outfits, primarily because of al-Asiri’s bomb-making abilities.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
Extremist organizations like the Islamic State and al-Qaida could use the coronavirus outbreak as a chance to ramp up attacks across the globe, the Associated Press reported.
While the group previously advised its fighters not to travel and carry out attacks in areas afflicted by the coronavirus outbreak, it appears the group and those like it are using the opportunity to plan and launch merciless attacks.
According to the International Crisis Group, ISIS has acknowledged security forces that normally work against the group will be overloaded dealing with COVID-19, and fighters should take “maximum advantage” of that distraction.
The International Crisis Group has previously warned that such attacks could take place in light of the pandemic, especially in countries that are terribly afflicted by the outbreak or already dealing with insurgencies.
The AP reported that while analysts say it’s too early to tell which attacks are the result of fighters taking advantage of the outbreak, some examples of deadly attacks have already taken place.
“Never in our history have we lost so many men at one time,” Chad’s President Idriss Deby said, according to the AP.
The group killed 50 Nigerian soldiers in another attack the next day.
The main concern, however, is that military forces from the United States and the United Kingdom will withdraw or be significantly cut in places like Iraq, Syria, and parts of Africa, leaving room for extremist groups to expand and carry out attacks.
Politico reported that the US military is worried that ISIS could expand in northeast Syria. The worry is that if the conditions get worse due to a coronavirus outbreak, the region does not have the necessary supplies to help those who fall sick. ISIS could use that as a rallying cry for riots and recruiting others.
The international coalition to defeat the militant group started sending the Syrian Democratic Forces, which guard thousands of extremist prisoners, basic medical equipment, and other supplies to limit the group from resurging, according to Politico.
According to the AP, while the UK is sending its soldiers who were stationed on a mission in Kenya to give counter-terrorism training back home to the UK, France will keep its troops in West Africa’s Sahel region. Four French soldiers have already tested positive for COVID-19.
While the French troops will continue their work, other African units that are “already stretched thin and under attack” may take additional measures to protect their troops, the AP reported. For example, the Nigerian military is looking to stop most of its activities, especially large gatherings, and training to limit the spread of the virus.
According to the AP, a leaked memo showed that some military vehicles might instead be used to transfer coronavirus patients to hospitals or for mass burials. But the Nigerian military has already been struggling to contain Boko Haram.
Clionadh Raleigh, executive director of the Armed Conflict Location Event Data Project, which tracks extremists’ activities worldwide, told the AP: “Any state that was interested in pulling back in Africa will take the opportunity to do so. That will be unbelievably bad.”
A $110 million Nigerien air base constructed by the US will finally begin counterterrorism operations using intelligence, surveillance, and reconnaissance (ISR) drones after delays due to inclement weather conditions, the military announced on Nov. 1, 2019.
“We are working with our African and international partners to counter security threats in West Africa,” US Africa Command (AFRICOM), the combatant command overseeing US operations in the continent, said in a statement. “The construction of this base demonstrates our investment in our African partners and mutual security interests in the region.”
The base is called Nigerien Air Base 201, and is located in the desert region of Agadez, a strategic transit area for migrants. Both US and Nigerien aircraft will use the runways to launch armed and unarmed air assets against extremists operating in West and North Africa, the military said.
While the US-constructed base will be under Nigerien control, American forces will have exclusive use of around 20% of the roughly 9-mile base, military officials previously said to Stars and Stripes.
The base was expected to be operational in 2018, but the rainy season and other “environmental complexities” caused a delay, a US official said to The Air Force Times.
Here’s are some key details about Nigerien Air Base 201:
An Airman from the 724th Expeditionary Air Base Squadron marshals a C-130J Super Hercules at Nigerien Air Base 201, Agadez, Niger, August 3, 2019. This was the first C-130 to take-off at Air Base 201, marking the beginning of limited Visual Flight Rules operations at the base.
(U.S. Air Force photo by Staff Sgt. Devin Boyer)
Around 600 US Air Force Airmen are estimated to deploy for six-month tours.
The construction process of the base proved to be a challenge for around 350 service members involved in the project. Dry conditions caused concrete to dry and crack freshly-poured concrete.
“We’re building a base from nothing, from scratch,” US Air Force Lt. Col. Brad Harbaugh said in 2018. “This was all historically nomadic land.”
A US Air Force air advisor gives instructions to a Niger Armed Forces member while an interpreter translates the instructions during a training exercise at Nigerien Air Base 201 in Agadez, Niger, July 10, 2019.
(U.S. Air Force photo by Staff Sgt. Devin Boyer)
Numerous terrorist group operate within the region.
In a new report released by the State Department on Friday, US officials say terrorist groups like Boko Haram and ISIS continue to operate in the region. US analysts say that terrorist elements have proliferated due to Niger’s limited military and budget.
Niger Armed Forces members clear a corridor during a training exercise with the US military at the Nigerien Air Base 201 in Agadez, Niger, July 10, 2019.
(U.S. Air Force photo by Staff Sgt. Devin Boyer)
Four US troops and four Nigerien soldiers were killed in a 2017 terrorist ambush.
On October 4, 2017, 11 US troops and 30 Nigerien forces were ambushed by ISIS-related militants near the Niger-Mali border.
Four US troops were killed, in addition to four Nigerien partner forces, in a battle against overwhelming terrorist forces. The US military awarded six medals to the Nigerien soldiers who fought in the battle, including two Bronze Stars.
A US-led investigation found that US’s ISR assets did not have enough fuel to provide cover for American forces, in addition to inadequate rest for the troops. Roughly an hour and a half after the battle began, two French fighter jets responded by driving the enemy forces away.
US Airmen load a C-130J Super Hercules at Nigerien Air Base 201, Agadez, Niger, Aug. 3, 2019.
(U.S. Air Force photo by Staff Sgt. Lexie West)
Since 2013, the number of US troops in Niger has risen.
In 2013, President Barack Obama announced that 100 US service members would deploy to Niger for “intelligence collection.”
Roughly 800 US troops were operating in Niger by 2018. The terrain and its borders with Chad and Mali make the country an optimal transit route for terrorist militants seeking to travel to Europe, according to the State Department.
In 2018, AFRICOM publicly announced it had started deploying armed drones in a separate Nigerien base, dubbed Air Base 101, near the capital of Niamey.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
Like any other profession, espionage is going to have its legends and its cautionary tales. Some spies are better than others. If you’re truly a great spy, then chances are good no one will ever know what you did or why. This list isn’t about effectiveness, this list is about methodology.
The six spies on this list experienced varying degrees of success or failure, depending on which side of the border the reader is seeing. How they went about their work is what’s most suspect. There’s a reason spy agencies check their employees’ bank accounts, psychological profiles, and alcohol use. Then there’s some spies who just can’t wait to get spying, and they have to flag down the car of the local foreign intelligence agency chief.
1. Adolf Tolkachev
Tolkachev was a great American asset for ten years of the Cold War, after he made contact with the CIA, that is. He managed to do this by leaving hand-written notes on cars with diplomatic license plates that happened to be parked near the American Embassy in Moscow. He even banged on the car of the CIA’s Moscow Station Chief.
It’s truly amazing that it took the KGB so long to catch Tolkachev in the act. In one day he was tried, convicted, and executed. In the end, it wasn’t his open hatred of the Soviet government or the notes he left on cars a decade before, it was CIA agents (either Edward Howard or Aldrich Ames) who outed him to the KGB. Speaking of which…
2. Aldrich Ames
This guy is probably the reason federal investigators look for certain trouble warnings in their investigations for security clearances. Ames was more of a “bumbling boob” than a master spy. He kept being promoted despite a series of drunken incidents, poor performance reviews, and insubordination. Unsure of how the CIA could allow this to happen? Think about your own job. Is everyone there 100 percent effective? Right.
In his nine years as a mole, Ames was able to ID at least twenty CIA operatives in the Soviet Union to the KGB. Many of those agents were executed as Ames lived a plush life on Soviet money, to the tune of some $4.6 million. This is why the Agency watches bank accounts, as Ames expenditures exceeded his monthly salary, he paid for a home and a Jaguar in cash, and started wearing very fine tailored suits. He is serving a life sentence with no parole.
3. Michael Bettaney
Bettaney was a British MI5 agent whose work was so awful and methods so crass, he was actually given up to the UK government by the Russians because they thought he was meant to be a crude sort of double agent.
An alcoholic who would regularly try to avoid the drunk tank by telling everyone he was a spy, Bettaney photographed MI5 documents and stored those photos in his home. He was scheduled to leave for Austria to sell the stuff when the Russians betrayed him.
Basically, this guy was the English version of Archer if Archer never succeeded in a mission.
That’s not the worst of it. Chapman and the 11 others in the spy ring failed in a lot of espionage basics. They conducted monetary and other transactions in broad daylight, kept their communications guidebook instead of memorizing it and burning it, and met directly with sources instead of using an intermediary.
5. Unnamed CIA Lady
This is the person who is responsible for spreading the idea that “enhanced interrogation techniques” (aka torture) are an effective method for getting information from suspects with links to terror cells. Still at the CIA, her name remains a mystery to most, but an NBC investigator found documented evidence this woman not only defended the practice, but enjoyed taking part in its implementation, even on innocent people.
She inaccurately reflected intelligence to CIA leadership who continued a program she knew to be ineffective. Does this not sound so bad? This woman’s name was also included in the 9/11 Commission’s report for not sharing testimony about two of the hijackers with the FBI — which the reports say was one of the critical failures of pre-9/11 intelligence.
6. Stewart David Nozette
Nozette was a space scientist with a very high security clearance. He was arrested in 2009 for being an agent of Israel, spying on the U.S. for Mossad, the Israeli intelligence service. Unfortunately, the Israelis never talked to Nozette. He was actually talking to the FBI the whole time. And they got it on tape.
Nozette worked for a number of aerospace companies in Israel which shared defense contracts with the U.S. He practically announced his intention to become a spy and attempted espionage for $11,000 (a paltry sum, considering what other spies, like Jonathan Pollard, received for their services).
Enemy combatants lurking in tunnels have attacked US troops throughout history, including during both world wars, Vietnam, and more recently in Iraq and Afghanistan.
Detecting these secretive tunnels has been a challenge that has been answered by the US Army Engineer Research and Development Center’s engineers at the Geotechnical and Structural Laboratory in Vicksburg, Mississippi.
The lab developed the Rapid Reaction Tunnel Detection system, or R2TD, several years ago, according to Lee Perren, a research geophysicist at ERDC who spoke at the Pentagon’s lab day in May.
R2TD detects the underground void created by tunnels as well as the sounds of people or objects like electrical or communications cabling inside such tunnels, he said. The system is equipped with ground penetrating radar using an electromagnetic induction system.
Additionally, a variety of sensors detect acoustic and seismic energy, he added.
The detection equipment data can then be transmitted remotely to analysts who view the data in graphical form on computer monitors.
The system can be carried by a soldier or used inside a vehicle to scan suspected tunnel areas, he said.
R2TD has been deployed overseas since 2014, he said. Feedback from combat engineers who used the system indicated they like the ease of use and data displays. It takes just a day to train an operator, Perren said.
Jen Picucci, a research mathematician at ERDC’s Structural Engineering Branch, said that technology for detecting tunnels has been available for at least a few decades.
However, the enemy has managed to continually adapt, building tunnels at greater depths and with more sophistication, she said.
In response, ERDC has been trying to stay at least a step ahead of them, continually refining the software algorithms used to reject false positives and false negatives, she said. Also, the system upgraded to a higher power cable-loop transmitter to send signals deeper into the ground.
The improvements have resulted in the ability to detect deeper tunnels as well as underground heat and infrastructure signatures, which can discriminate from the normal underground environment, she said.
Picucci said ERDC has shared its R2TD with the Department of Homeland Security as well as with the other military services and allies. For security reasons, she declined to say in which areas R2TD is being actively used.
Besides the active tunneling detection system, a passive sensing system employs a linear array of sensors just below the surface of the ground to monitor and process acoustic and seismic energy. These can monitored remotely, according to an ERDC brochure.
While current operations remain classified, ERDC field engineers have in the past traveled in to Afghanistan according to members of the team.
In 2011, for example, ERDC personnel set up tunnel detection equipment to search the underground perimeter of Camp Nathan Smith, Afghanistan, said Owen Metheny, a field engineer at ERDC who participated in the trip.
His colleague, Steven Sloan, a research geophysicist at ERDC in Afghanistan at the time, said the goal was to ensure safety at the camp.
“We make sure nobody is coming into the camp using underground avenues that normally wouldn’t be seen and wouldn’t be monitored,” Sloan said. “We check smaller isolated areas — usually areas of interests and perimeters.”
The researchers did a lot of traveling around Afghanistan.
“We travel to different regional commands and help out in the battle spaces of different military branches,” Sloan said. “We use geophysical techniques to look for anomalies underground. We look for things that stick out as abnormal that might indicate that there is a void or something else of interest. As we work our way through an area we look for how things change from spot to spot.”
“I really enjoy my job,” Metheny said. “I’m doing something for my country and helping keep people safe. Plus, where else could a bunch of civilians get to come to Afghanistan and look for tunnels?”
Two US Navy warships sailed through the Taiwan Strait on Feb. 25, 2019, sending a message to Beijing, which has warned the US to “tread lightly” in the closely watched waterway.
The Arleigh Burke-class guided-missile destroyer USS Stethem and the supply ship USNS Cesar Chavez navigated a “routine” Taiwan Strait transit Feb. 25, 2019, the US Pacific Fleet told Business Insider in an emailed statement.
“The ships’ transit through the Taiwan Strait demonstrates the US commitment to a free and open Indo-Pacific. The US Navy will continue to fly, sail and operate anywhere international law allows,” the Pacific Fleet said.
The two US Navy vessels that passed through the Taiwan Strait were apparently shadowed by People’s Liberation Army Navy (PLAN) warships.
The passage is the fourth since October 2018 and the fifth since the US Navy restarted the practice of sending surface combatants through the strait July 2018.
The Arleigh Burke-class guided-missile destroyer USS Stethem.
(U.S. Navy photo by Mass Communication Specialist 3rd Class Marcus D. Mince)
The Taiwan Strait is a roughly 80-mile international waterway that separates the democratic island from the communist mainland, and China regularly bristles when US Navy vessels sail through. When a US destroyer and a fleet oiler transited the strait in January 2019, the Chinese Ministry of Foreign Affairs called the passage “provocative behavior,” accusing the US of “threatening the safety” of those nearby.
Beijing considers Taiwan, a self-ruled territory, to be a renegade province, and it firmly opposes US military support for the island, be that arms sales, protection assurances, or even just the US military operating in the area. China fears that US actions will embolden pro-independence forces in Taiwan that want to declare it a sovereign state separate from China.
China has repeatedly urged the US to keep its distance from Taiwan, but the US Navy has continued its “routine” trips through the strait. “We see the Taiwan Strait as another (stretch of) international waters, so that’s why we do the transits,” Chief of Naval Operations Adm. John Richardson said in January 2019.
The rhetoric used by the Navy to characterize the Taiwan Strait transits is almost identical to that used to describe US freedom-of-navigation operations (FONOPs) in the South China Sea.
The Navy has already conducted two FONOPs this year, angering Beijing both times.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
Rod Lurie on set with lead actor Caleb Landry Jones filming The Outpost on location in Bulgaria.
Rod Lurie is a West Point graduate and former Air Defense Artillery officer in the US Army. After his time in service he worked as an entertainment reporter and film critic. He then transitioned into film making by writing and directing his first feature film Deterrence, which is a political thriller. Rod also directed The Contender, The Last Castle, Nothing but the Truth, and Straw Dogs. Most recently, he directed The Outpost, the story of the 53 U.S. soldiers who battled a force of roughly 400 enemy insurgents in north-eastern Afghanistan during Operation Enduring Freedom.
James Mardsen, Hunter Lurie, Kate Bosworth, Rod, and Paige Lurie during the filming of Straw Dogs (2011)
Tell me about your family and your life growing up?
Currently I live in Studio City with my wife Kyra who is a New York Times bestselling novelist. I have one stepson Isaac and a daughter named Paige where we have a family dog named POTUS. My son Hunter passed away two years ago today. The Outpost is dedicated to him where since he died so young his passing to me relates to the young soldiers who died at the Battle of Kamdesh.
My family growing up consisted of my father, mother and three brothers. At age five, my family moved from Israel to Connecticut and then to Hawaii. My father is a military veteran of Israel and he worked as a political cartoonist, which includes illustrations for LIFE magazine where he is “the most widely syndicated political cartoonist in the world”, according to the Guinness Book of World Records. My mother Tamar is still the most successful real estate agent in Greenwich, Connecticut.
Rod at West Point during his plebe (first) year.
What is the most distinct memory of your mother and your father?
My father focused on two things for me: creativity and sticking up for myself and our Jewish heritage. He is a wildly creative person and he told us to never stop creating where he reminded us about how God had created in the Bible. My mother was a voracious athlete where she encouraged me and my sibling to really push ourselves athletically. She is truly kind, and she raised us with empathy as well.
A picture of Caleb Landry Jones as Medal of Honor recipient Specialist Ty Carter in The Outpost.
What challenges did you face at school and in the community?
The challenge for any Jewish person in that era and in that part of the world was anti-Semitism. We had immigrated from Israel where, of course, we never faced that within our own communities.
Rod Lurie interviewing acting and film legend Paul Newman.
What values were stressed at home?
Creativity, Righteousness and Athleticism. We had a strong sense of morality in our home where ethics are what society expects and morals are what we expect of ourselves.
Rod at his West Point Graduation in 1984.
What drew you to film and media while growing up?
Growing up I saw a movie on a little TV named Ben-Hur. I couldn’t believe my eyes because I did not even know movies were made where my understanding was that they were just kind of there. I was so thrilled with film I decided my goal was to be somehow involved. Because of my lack of knowledge of the film making process I was most impressed with film critics. Roger Ebert and Pauline Kael were my idols where I wrote to them and they wrote me back. In the end, no motivation was greater than for me than to be a filmmaker. One of my beliefs is that you shouldn’t go to film school where you should go to study what you want to make movies about. The USMA is a place of leadership, which is what I want to make films on. My dream one day is to make a movie about West Point where I made a deal with Universal to make such a movie on the academy titled Heart of a Soldier with Paul Walker and Jessica Alba. Unfortunately, the film fell apart once the Iraq War broke out.
Scott Eastwood as Medal of Honor recipient SSGT Clint Romesha in The Outpost
What made you want to attend West Point and is the best lesson you learned while there at the academy?
My political awareness from an early age because of my father’s political cartoonist work influenced me to go to West Point where it seemed like a natural fit for me. The best thing I learned from West Point; when you think you have exhausted everything you have you really have only used 10% of your capabilities. This was said to me before I went in to SERE (Survival, Evasion, Resistance, Escape) school.
Orlando Bloom, Cory Hardrict, Jacob Scipio, Bobby Lockwood, Alexander Arnold, Scott Eastwood, Caleb Landry Jones, James Jagger, Celina Sinden, Jack Kesy, Taylor John Smith, and Milo Gibson in The Outpost.
What did you enjoy most about your service as an Army officer?
What I enjoyed most about my time in service were the friendships and comradery of the people I served with. The best friendships I have had in my life were from West Point and from the service where nothing will ever top that. Another enjoyable part about my time in the Army came from the confidence generated in the team-based atmosphere. Many people think the most stressful time of a cadet is when you are going through Beast Barracks when in reality the toughest time is when you are taking your exams. I am on my own when taking those tests. When going through things with your fellow troops you are going through it together. There is something about the concept of if we all work together, then we can succeed. It creates a quiet calmness.
Rod as a cadet at West Point.
What leadership lessons in life and from the service that have helped you the most in your career in Hollywood?
Problem solving and Teamwork. The film was an exceedingly difficult movie to put together because of budget and time constraints. On The Outpost, as the boss and being a military veteran we had some actors that were veterans where I insisted on having them for a couple of reasons. One is that for all of us who have worn the uniform we can always say I have been in a tougher scrape than this. No matter what we come across we know we can solve this problem. Another part of having veterans as part of the production was realism where I had several vets that were also Technical Advisors. Because of the calm problem-solving skills and real-life team-based experiences, we functioned as military veterans; smoothly and without panic. We stayed grounded and focused unlike how it may have been on other sets where anxiety and fear set in due to such tight restrictions.
Taylor John Smith as Distinguished Service Cross recipient First Lieutenant Andrew Bunderman and Orlando Bloom as Bronze Star recipient First Lieutenant Benjamin D. Keating in The Outpost.
What did you enjoy most about filming The Outpost?
There is a great satisfaction in knowing that we are doing good on this film. There are many families that lost their loved ones in the Battle of Kamdesh which were sons, brothers, and fathers. The fact that we can give to these people and families, not just closure, but a promise that their loved ones will have their names repeated and spoken forevermore is very satisfying. When my son died, I realized the obligation we had to these families. The friendships and comradery on set were amazing because of this shared mission. The crew all got so close on the film because of its importance, especially since it was something we were going through together in a tough situation.
Scott Eastwood as SSGT Clint Romesha in The Outpost.
What is the main message you want people to remember about The Outpost?
My goal is to get people to daily remember the military currently serving abroad. The service members need to be remembered where I believe that people just don’t think ever about the soldiers that are serving overseas right now. In previous wars like WWII, Korea, and Vietnam they were on our minds and now we don’t give it a second thought. In WWII, every soldier also had the same mission; we are going to stop Hitler. Today the answer is most likely mixed with why we are there in the Middle East, which makes their service even tougher. It is just not cool that soldiers currently in the fight today are forgotten. People must understand what these soldiers went through and that their sacrifices matter.
In World War II, airborne units were really in their infancy. The Germans pioneered their use in combat, and the United States built perhaps the largest airborne force in the world, with five airborne divisions.
But these divisions had a problem. There weren’t many planes to transport them for large-scale airborne ops. Today, most transports used in airborne operations have rear ramps for loading cargo (like, jeeps and artillery). Back then, they didn’t.
The C-47 Skytrain was based on the DC-3 airliner. The C-46 Commado was also based on an airliner.
Yeah, paratroops could be dropped, but they could be scattered (thus creating the rule of the LGOPs). How would they drop the heavier equipment, and keep the crews together? The answer came with the development of gliders. Nazi Germany and the Soviet Union pioneered the use of them, but the U.S. and Great Britain built lots of them.
According to the National World War II Glider Pilots Association’s web site, the United States built over 13,000 CG-4A Waco gliders. Each of these gliders could carry 15 troops, or a Jeep and four paratroopers, a trailer, up to 5,000 pounds of supplies, an anti-tank gun plus operators, or a 75mm artillery piece and its crew.
About 6,500 glider pilots were trained during World War II, taking part in eight missions from Sicily to Luzon. In the 1950s, advancements in transport aircraft, both fixed-wing and rotary-wing, led to the glider units being deactivated in 1952. But the gliders helped deliver firepower, troops, and supplies during World War II – when that ability was needed.
The video below shows how gliders were used during the Normandy invasion.
The new Infantry Squad Vehicle (Photo by GM Defense)
On June 29, 2020, the U.S. Army selected GM’s submission for the new Infantry Squad Vehicle. Beating out submissions from a joint Oshkosh Defense-Flyer Defense team and an SAIC-Polaris partnership, GM has been awarded a $214M contract to build 649 of the new ISVs over the next five years. Additionally, the Army has already been approved to acquire 2,065 of the new trucks over the next decade.
In 2003, GM sold its defense division to General Dynamics for $1.1B. In 2017, GM saw renewed opportunity in adapting its civilian vehicles for the defense market and created the subsidiary GM Defense. In 2019, GM Defense became a finalist in the Army’s Infantry Squad Vehicle procurement competition along with the two aforementioned teams. The three teams were given $1M to build two prototypes of their proposed vehicle which were tested and evaluated at Aberdeen Test Center, Maryland and Fort Bragg, North Carolina.
(Left to right) SAIC-Polaris DAGOR, Oshkosh-Flyer Defense GMV, and GM Defense ISV concepts (Photo from NationalDefenseMagazine.org)
Contract specifications called for the ISV to weigh no more than 5,000, carry nine soldiers and their gear at highway speeds in extreme conditions both on and off-road, capable of being slung under a UH-60 Blackhawk, and fit inside of a CH-47 Chinook. To meet these requirements, GM Defense based its design on the popular Chevrolet Colorado and its ZR2 and ZR2 Bison variants.
Chevy’s popular midsize truck, the Colorado ZR2 (Photo by Chevrolet)
The ISV is powered by a 2.8L 4-cylinder Duramax diesel engine that produces “significantly more power than the Colorado ZR2 known for delivering 186 horsepower and 369 lb-ft of torque,” mated to a 6-speed automatic transmission according to the GM Defense ISV product sheet.
Overall, the ISV retains much of the DNA of the Colorado variants it is based on, featuring 70% off-the-shelf components. “The chassis — which is the frame, the suspension, driveline, engine, transmission, transfer case, axles, brakes — all of that hardware comes from the Colorado ZR2,” said GM Defense Chief Engineer Mark Dickens. “Somebody could walk into a Chevy dealership and purchase those parts.”
Per the Army’s specifications, the ISV seats nine soldiers: two in the front, three in the second row, two rear-facing seats in a third row, and two outward-facing seats in a fourth row. Gear is stowed between the third and fourth rows, strapped to webbing that acts as the roof over the roll cage cabin, or slung from the roll cage itself.
The ISV on display at the 2019 SEMA Show (Photo from GMAuthority.com)
In addition to the Army contract, GM Defense President David Albritton told Detroit Free Press that, “[The ISV] platform can be used for international sales to other militaries, other government agencies like Border Patrol, the Marine Corps, Air Force and Special Forces,” since future variants, “would be a totally different design.”
The ISV follows a trend that the military is setting of purchasing readily-available commercial technology for tactical use. On June 5, 2020, Polaris was awarded a 9M contract to supply USSOCOM with its MRZR Alpha Light Tactical All Terrain Vehicle. The LT-ATV is a redesigned Polaris RZR that has been in use with the Army’s light infantry units like the 82nd Airborne Division and 10th Mountain Division.
10th Mountain LT-ATVs (left) alongside a Humvee and an LMTV flanked by 2 M-ATVs