Three years after the first prototype for the Black Hawk aircrew trainer was set up and implemented as a training aid at Fort Bliss, Texas, that technology has been enhanced.
A team from System Simulation, Software and Integration Directorate, U.S. Army Research, Development and Engineering Command Aviation & Missile, also known as AMRDEC, has developed the Collective Aircrew Proficiency Environment. Crew chiefs and gunners can train in a realistic setting where they see and hear the same things simultaneously.
Because there was no funding, Joseph P. Creekmore Jr., S3I aviation trainer branch chief and BAT Project director, said BAT team members used borrowed or discarded materials to work on the CAPE during breaks between scheduled projects.
It paid off.
“Design began over a year ago at a somewhat frustratingly slow pace for the BAT Team but, week by week and part by part, the CAPE device took shape and became the device we have today,” Creekmore said.
Manuel Medina, assimilated integration technician with Systems Simulation and Software Integration Directorate, U.S. Army Research, Development and Engineering Command Aviation Missile, demonstrates the capability Collective Aircrew Proficiency Environment.
(Photo by Evelyn Colster)
The singular focus of the Army’s modernization strategy is making sure the warfighter and their units are ready to fight, win, and come home safely. As the head of the BAT Project, Creekmore said he believes the Army needs the CAPE to contribute to and ensure readiness in aircrews.
“Because we are a nation that has been continuously at war since 9/11, all the BAT Projects’ Army aviators have experienced combat overseas,” Creekmore said. “They all went into combat as part of a trained team.
“They all survived combat because they fought as a team. All the BAT Project’s former and retired Army aviators know to their very core that, to fight and win America’s wars, the Army must train as it fights and that includes training as a full aircrew,” Creekmore explained. “So, from Day 1, the BAT Project dreamed and planned for an opportunity to demonstrate an excellent whole-crew trainer that would contribute to the readiness of all U.S. Army Air Warriors.”
CAPE and BAT are linked using an ethernet connection. Creekmore said the nine locations with fielded BAT devices only need a tethered CAPE to provide Army aviation units with a way to train a complete UH-60 aircrew.
Manuel Medina, S3I assimilated integration technician, said he was blown away when he was first introduced to this technology. “Back when I was in, we didn’t even have anything like this… If we had the flight hours and the maintenance money to train, we would.”
According to Jarrod Wright, S3I lead integrator who built the BAT, many aircraft incidents are a result of some type of aircrew miscommunication.
Manuel Medina, assimilated integration technician with Systems Simulation and Software Integration Directorate, U.S. Army Research, Development and Engineering Command Aviation Missile, demonstrates the capability Collective Aircrew Proficiency Environment that is tethered to the Black Hawk Aircrew Trainer.
(Photo by Evelyn Colster)
“What we’re trying to do here is … teach that crew coordination to allow pilots and crew chiefs to train like they would in combat with two devices tethered to each other,” said Wright, who spent more than eight years as a crew chief.
“In combat, no UH-60 breaks ground without its full complement of two rated aviators, a non-rated crew chief/door gunner and a second door gunner,” Creekmore explained. He said this type of equipment and training is necessary to maintain the high performance level and proficiency that exists in our Warfighters.
“This environment allows you, not only to train, but to evaluate potential crew chiefs and door gunners,” Wright posited. “You’re not throwing someone in there and saying, ‘I hope he gets it’.”
Medina, also a former gunner and crew chief, said this technology can benefit the Army in many ways. Not only can maintenance costs, flight hours, fuel, and training dollars be reduced, but the BAT and CAPE systems focus on considerations like spatial orientation or disorientation, response to changes in gravity, and susceptibility to airsickness. These devices mimic conditions crews see in flight and can identify adverse reactions while minimizing inherent risks.
The BAT Project team has high hopes for the CAPE.
“It is my hope that … the Army invests in further development of the CAPE and then fields it as BAT mission equipment so we can get this critical training capability in the hands of UH-60 aircrews throughout the Army,” Creekmore said.
Wright said the potential exists to use this technology to train complete crews in rescue hoisting and cargo sling load — any scenario they might encounter in any type of combat or rescue situation. He even sees the possibility for the BAT and CAPE to be used as preparation for hurricane relief or similar missions.
The Aviation Missile Center is part of the U.S. Army Research, Development and Engineering Command, which has the mission to provide innovative research, development and engineering to produce capabilities that provide decisive overmatch to the Army against the complexities of the current and future operating environments in support of the joint warfighter and the nation. RDECOM is a major subordinate command of the U.S. Army Materiel Command.
The US Air Force has presented several plans for replacing the beloved A-10 Warthog close air support attack plane over the years, but their latest plan takes the cake as the most absurd.
As it stands, the Air Force wants to purchase or develop not one, but two new airframes to eventually phase out the A-10.
First, they’d pick out a plane, likely an existing one, called the OA-X, (Observation, Attack, Experimental), which would likely be an existing plane with a low operating cost. Propeller-driven planes like the Beechcraft AT-6, already in use as a training plane for the Air Force, or Embraer A-29 Super Tucano, which the US recently gave to Afghanistan for counter-insurgency missions, are possible options.
The OA-X would fly with A-10s in low-threat air spaces to support the tank-buster, however this option appears to make little sense.
A sub-sonic, propeller-driven plane can perform essential close air support duties in much the same way a World War II era platform could, but it’s a sitting duck for the kind of man-portable, shoulder-launched air defense systemsbecoming increasingly prominent in today’s battle spaces.
Next, the Air Force would look to field an A-X2 to finally replace the Warthog. The idea behind this jet would be to preserve the A-10’s CAS capabilities while increasing survivability in medium-threat level environments.
So while an update on the 40-year-old A-10 seems to make sense, the funding for it doesn’t.
The Air Force expects a “bow-wave” of costs in the mid-2020s, when modernization costs are looming and can’t be put off any further. This includes procuring F-35s, developing the B-21, procuring KC-46 tankers, and even possibly embarking on the quest to build a sixth-generation air dominance platform.
Air Force Secretary Deborah Lee James seemed puzzled by the proposed plan to replace the A-10, saying in an interview with Defense News, “everything has a price tag … If something goes in, something else has to fall out.”
Air Combat Command chief Gen. Herbert “Hawk” Carlisle, noted to Defense News his doubts that the proposed replacements would be a good use of limited public funds.
“If you look at the things within the combat Air Force portfolio that I’m responsible for in modernization and taking care of those systems, I don’t know where the money would come from,” Carlisle said. “And if we got extra money, in my opinion, there’s other things that I would do first to increase our combat capability before we go to that platform.”
Also, Carlisle doubted the need for a plane to operate in low-threat or “permissive” airspaces, as they are fast disappearing.
“Given the evolving threat environment, I sometimes wonder what permissive in the future is going to look like and if there’s going to be any such thing, with the proliferation of potential adversaries out there,” he said.
“The idea of a low-end CAS platform, I’m working my way through whether that’s a viable plan or not given what I think the threat is going to continue to evolve to, to include terrorists and their ability to get their hands on, potentially, weapons from a variety of sources.”
Furthermore, the Air Force’s proposal seems to run contrary to other proposals to replace the A-10 in the past. For a while, Air Force officials said that the F-35 would take over for the A-10, and though the F-35 just reached operational capability, it was not mentioned as part of the newest proposal.
Air Force General Mark Welsh told the Senate Armed Services Committee that other legacy fighters, the F-16 and F-15 could fly the A-10’s missions in Iraq and Syria until the F-35 was available, but that idea was also mysteriously absent from the Air Force’s two-new-plane proposal.
Phishing, when successful, tricks the user into unwittingly handing over their passwords to the scammer, often through professional-looking emails purporting to be from trustworthy businesses. The endgame is generally acquisition of personal information, like credit card and social security numbers.
Recently, phishing has been weaponized to varying degrees of sophistication with a key technique: impersonation.
The trick was enough to convince one employee at Gimlet Media, which runs the everything-internet podcast “Reply All,” to open an email from his “coworker.” Except the sender was not his coworker, but a hacker attempting a work-sanctioned phishing test on the company’s employees.
Familiarity fraud is an online tactic people have to be especially wary of on social media, where friends’ pictures and handles are rife for imitation. Duplicate accounts fish for personal information under the guise of intimacy.
2. The Nigerian prince scam is one of the oldest on the internet.
The Nigerian prince scam is one of the oldest scams on the internet.
The scam rose to prominence in the 1990s, and is referred to by the FBI as “Nigerian Letter” or “419” fraud.
The premise is simple: You get an email, and within the message, a Nigerian prince (or investor, or government official) offers you an opportunity for lucrative financial gain.
The catch? Pay a small portion of the amount up front, or hand over bank account information and other identifying information so that the transfer can be made. Of course, you lose that “seed money,” never receiving a dime in return.
“It’s malware and phishing combined with clever social engineering and account takeovers,” James Bettke, a counter threat unit researcher at the security firm Secureworks, told Wired reporter Lily Hay Newman in 2018.
“They’re not very technically sophisticated, they can’t code, they don’t do a lot of automation,” he added. “But their strengths are social engineering and creating agile scams. They spend months sifting through inboxes. They’re quiet and methodical.”
3. Ticket fraud leads to consumers buying fake sports and music tickets.
Another popular online scam is ticket fraud, in which consumers are tricked into buying fake tickets for sporting events, concerts, and other events.
Scammers usually target high-profile events that are likely to sell out so they can take advantage of increased demand. Often, the tickets they send customers have forged bar codes or are duplicate copies of legitimate tickets. Other times, consumers won’t receive any ticket at all after they pay up.
“If you have gotten a message from me or any other creator on YouTube that looks something like this, that is very likely someone trying to scam you,” DeFranco said in a video posted to his channel.
The faux DeFranco slid into targets’ Youtube messages, promising “gifts” via the click of a hyperlink. The scammer’s real endgame: identity theft for financial gain through a classic online phishing scheme.
“We’re aware and in the process of implementing additional measures to fight impersonation,” a YouTube employee wrote in response to complaints of scam. “In the meantime, we’ve removed accounts identified as spam.”
And angry mobs incensed by the fiasco that was Fyre Festival — an event so botched it warranted not one, but two documentaries — directed much of their ire at the event’s celebrity influencers.
The defrauded cited a lack of transparency as to what the influencers were paid to hawk the festival to their millions of followers online, although not everyone agreed they deserved the blame to begin with.
6. But sometimes the influencers themselves can get scammed.
One variety of online grift victimizes the influencers themselves with identity-fraud tactics common to phishing.
Earlier this year, a scammer posing as entrepreneur and investor Wendi Murdoch used email handles and other techniques so convincing, social media stars were tricked into buying their own flights to Indonesia and paying for fake photography permits as part of the scam.
The victims, influencers and travel photographers among them, got bilked out of thousands of dollars in the process.
The FBI and New York Police Department opened investigations into the scam in 2018, according to The Hollywood Reporter. Also assisting is the corporate investigations firm K2 Intelligence, which tracked the scam’s pivot from celebrities to influencers.
“For a long time, they were going after people in Hollywood. [Now, they’re] routinely targeting influencers — Instagram stars, travel photographers, people who do stuff that involves them travelling all over the world,” Nicoletta Kotsianas, a director at K2 Intelligence, told INSIDER in January.
“It’s about convincing some people that there’s someone else, and manipulating them, being into that, and world-building around the whole thing,” she added. “They’re making some money off it, but it’s really about the ride along the way.”
A screenshot shows a WannaCry ransomware demand, provided by cyber security firm Symantec.
7. Ransomware held a whole city hostage in 2018.
Some of the most insidious online scams involve ransomware.
In a ransomware attack, hackers install malware onto a computer or system of computers that restricts a victim’s access to their files. Payment, often in the form of bitcoin, is demanded to undo it.
The hackers behind the scheme “deliberately engaged in an extreme form of 21st-century digital blackmail, attacking and extorting vulnerable victims like hospitals and schools, victims they knew would be willing and able to pay,” Brian Benczkowski, the head of the criminal division of the Justice Department, said in November.
The cam-hacking claim, which is bolstered by parroting the user’s password in the email, is means for blackmail: Send us bitcoin, or we send all your contacts the footage.
The reality? Pure manipulation. The scammers don’t have dossiers of footage. They never even hacked you. How? Because the password they flaunted wasn’t hacked, but harvested, gleaned from publicly available databases of leaked passwords and emails.
So there’s no need to cover your laptop’s camera. For now.
9. GoFundMe fake-outs take advantage of people’s generosity.
Another thriving online grift is the GoFundMe sob story fake-out.
One notable example came in a feel-good story from 2017 about a couple raising 0,000 for a homeless veteran who had lent them his last . As prosecutors discovered, the trio had concocted the entire story, and not only do they face a mix of federal and state charges, but GoFundMe refunded the donations of all 14,000 contributors.
Another example of strategic storytelling in the art of crowdsourced scamming: A black college student who raised money from Republicans on GoFundMe after claiming her parents disowned her for supporting Trump.
The narrative was suspiciously convenient — because it was a hoax. Although she quickly returned the money she raised, she also exposed how easily you can take advantage of people’s generosity.
10. Pump-and-dump schemes can artificially inflate the value of a currency.
Cryptocurrency is often the form of payment in online scams, but in one scheme, the crypto itself is the fraud.
Investment schemes were always destined to flourish online. By using the web to mass target would-be investors, a schemer can commit the Securities and Exchange Commission no-no of artificially “pumping” up the value of stock to the masses in order to then “dump” the stock on a falsely inflated return.
“[The] ethos is simple: Buy low, sell high. The implication is that investors outside the pump group will see the rapidly rising price and rush to buy in, anxious not to miss the next Bitcoin-style gold rush,” Paris Martineau of The Outline wrote.
“There are frankly a lot of groups that have now centered around misinformation,” Laz Alberto, a cryptocurrency investor and editor of the newsletter Blockchain Report, told BuzzFeed reporters Ryan Mac and Jane Lytvynenko in 2018. “It’s obviously illegal, but there’s no regulation and they’ve gotten away with it.”
A cryptocurrency founder was even himself the target of a fake news hoax in 2017, when news spread that Vitalik Buterin, cofounder of the cryptocurrency Ethereum, had died in a car crash.
The fake reports of Buterin’s death caused Ethereum’s valuation to plummet in the market — and later rebound — when the very-much-alive Buterin debunked the rumor himself.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
The video of my Naval Academy classmate, Chris David, beaten by federal police last month in Portland, shook me. Like bad guys from a straight-to-DVD movie, cowardly officers attacked a peaceful American exercising his Constitutionally-guaranteed right to protest. David stood unyielding, bearing the blows, earning the nickname ‘Captain Portland’ for his almost superhuman resistance.
Ironically, as police obscured their identity, David wore his Naval Academy sweatshirt for ease of identification, as a veteran. As if the word ‘Navy,’ written boldly across his chest might act as a shield, like Superman’s ‘S’ or Captain America’s star. As someone who’s gotten out of countless tickets by virtue of the Marine Corps sticker on my car, I’d shared the same illusion: My veteran status somehow made me special.
David and I reported aboard the Naval Academy to become midshipmen in July, 1984. After the shearing, the uniform issue and the tearful goodbyes, we swore an Oath:
‘I do solemnly swear that I will support and defend the Constitution of the United States against all enemies, foreign and domestic…’
By swearing allegiance to the Constitution and not an individual, such as the president, we bound ourselves only to the American people. Despite the nobility (or naivety) of David’s mission — to remind federal officers of their Oath to the Constitution, his presence at the protest came as a surprise for many Americans who’d dismissed protestors as nothing more than ‘lawless hooligans.’
Yet David, and our class, served the American people faithfully as Navy and Marine Corps officers, unhesitatingly laying our collective asses on the line. We’ve got the scars, both physical and mental—and disability ratings as proof. Because yes, we believe in America.
So it shouldn’t come as a surprise that David was at the protest. David, along with brother and sister veterans, were there to support not only one another, but to defend the Constitution, and by extension, the American people. It’s what we swore to do. Current leadership may possess the law, but not the will to resist an old Marine, soldier, sailor, airman or Coast Guardsman who swore that Oath. Because it’s the Oath that makes us special. Just ask ‘Captain Portland.’
Brian O’Hare is a U.S. Naval Academy graduate, former Marine Corps officer and disabled combat veteran. He’s a former Editor-at-Large for ‘MovieMaker’ magazine and an award-winning documentary filmmaker. Brian’s fiction has appeared in ‘War, Literature and the Arts’, ‘Liar’s League, London’, ‘Fresh.ink‘, ‘The Dead Mule School of Southern Literature’ and the ‘Santa Fe Writers Project’. He currently lives in Los Angeles. You can follow him on Instagram/Twitter @bohare13x.
Editor’s note: The opinions, beliefs and viewpoints expressed by the various authors on WATM do not necessarily reflect the opinions, beliefs and viewpoints or official policies of WATM. To submit your own op-ed, please email Managing Editor Tessa Robinson at Tessa.Robinson@wearethemighty.com.
Every single day, service members head down to their personnel office to pick up the most important document they will ever hold, second only to their birth certificate: a DD-214.
But, before they can obtain that beloved document, they must first get signatures on a checkout sheet, officially clearing them of debt of any kind, including owed gear or monetary debt.
Unfortunately, some troops may not have had the most positive experience serving and rush through the checkout process, skipping or side-stepping essential aspects to quickly get out the door.
It happens more often than you’d think.
These service members-turned-veterans end up regretting not taking the time to navigate through the process correctly. Since going back in time is impossible, we’ve created a list of things you should not skip in hopes that the next generation of veterans don’t find themselves in a world of hurt.
Here are the six steps troops shouldn’t skip before getting out of the military.
6. Hitting up dental
Until the day you get out, the military pays for all of your medical expenses. So, don’t skip out on getting all those cavities filled or those teeth properly cleaned before exiting.
That sh*t gets expensive in the real world.
5. Attending TAPS
The term is really ‘TAP,’ but most service members add the ‘S’ on for some reason. Anyways, the term means, “Transition Assistance Program.” This is where service members gather the tools to help with their transition out of the military. Some branches require taking this course, while others just recommend it.
Every service member should take advantage.
4. Openly talking about future plans with others
A lot of exiting troops don’t have a realistic path for their future, they don’t like to talk about it. The problem of not talking to others about your plans is, you never know what opportunities or ideas may arise from a simple conversation.
So, be freakin’ vocal!
3. Updating your medical record
Every medical encounter you’ve been involved in should be documented. From that simplest cold you had three years ago to that fractured bone you sustained while working on the flight deck — it should be in your record.
2. Getting your education squared away
If you plan on going straight to school when you get out, then hopefully you’ve already been accepted. Gather up all your training documents and school papers from your branch’s education archive. You could also save a lot of time by avoiding classes you don’t need if you have that sh*t squared away ahead of time.
Plus, the government is paying you to go to school, but don’t expect that first paycheck to be seamless — prepare for it to be late.
Remember when we talked about getting your medical records up-to-date? You’ll get a sh*tty disability percentage your first time up anyway, but having your medical record looking flawless will help your case in getting that much-earned money — and we like money!
Milesperawesome asks: Could you get in trouble legally if you murdered someone in space? Asking for a friend.
While it might seem like something out of science fiction, given that humans are presently in space and soon enough mass space tourism is going to open up the possibility for many, many more, it’s only a matter of time before someone commits a crime in space, with it being alleged the first already occurred in 2019, which we’ll get to shortly. So what exactly happens if someone does break the law in space? Could you, say, commit murder and get away scot-free?
To begin with, while you might think it can’t actually be possible to commit a crime in space because no country seemingly has jurisdiction there, you’d be wrong. Much like the myth that you can do whatever you want in international waters because no country holds sway, it turns out, among other agreements and rules, International laws are a thing.
On that note, while aboard a given vessel, the ship you’re on officially hails and is registered from some nation or group of nations (like the European Union) and the laws from said entities are binding aboard it in most cases while it’s out at sea. This is outlined in the United Nations Convention for the Law of the Sea, “every State shall effectively exercise its jurisdiction and control in administrative, technical and social matters over ships flying its flag.”
Mare Liberum (1609) by Hugo Grotius is one of the earliest works on law of the sea.
While obviously there isn’t exactly a court case history to back this up, the general consensus is that the same basic idea will hold true for ships in space, and certain agreements to date concerning space ships do seem to bear that out, as well as help give a partial framework for judges to work with.
For example, in the Outer Space Treaty, beyond more or less attempting to ensure space stays free from any claim of national sovereignty, most pertinent to the topic at hand, it notes,
State Party to the Treaty on whose registry an object launched into outerspace is carried shall retain jurisdiction and control over such object, and over any personnel thereof, while in outer space or on a celestial body.
More or less mirroring this idea, on the International Space Station, the partnered nations came up with the Intergovernmental Agreement on Space Station Cooperation, which states, in part, the nations, “may exercise criminal jurisdiction over personnel in or on any flight element who are their respective nationals.”
As Joanne Gabrynowicz, the editor of Journal of Space Law- which is totally a thing by the way- elaborates, “The law of the nation that contributed and registered the module applies to that module… Further, each astronaut is governed by the law of the nation they represent. Therefore, which nation’s criminal jurisdiction will apply depends on which nation’s module the alleged crime was committed and which nation the alleged perpetrator is from.”
It’s also noteworthy that this Space Station Agreement has already anticipated countless other things that may happen in space and how various nations can work together amicably to resolve them, leading many space lawyers- which are also totally a thing- to speculate that elements of this agreement are likely to get adopted into a more general, universal agreement at some point down the line. And in the meantime, judges may well lean on it, among other existing agreements and analogous cases here on Earth, when attempting to decide legal matters as they begin happening outside of the ISS.
Speaking of these analogous cases, much like when a person travels to another nation and then commits a crime, there are plenty of existing agreements and fodder for authorities to draw from when crimes are committed in space. While there certainly will be the occasional dispute, as even happens between nations on Earth over such matters today, there is a pretty good outline already in place as to how it will probably be sorted out.
On top of this, even should you renounce your citizenship and be aboard your own vessel that likewise has no ties to any nation (perhaps even with you declaring said ship a nation of its own), it is likely if you did anything serious, especially against someone who does still have citizenship with some nation, you would still face prosecution for any crimes, perhaps via an International Criminal Court or even a special tribunal. (Although, in this case, we’re hoping such a court will be given the new, much cooler moniker of Galactic Criminal Court at some point.)
As the director of the Space Policy Institute at George Washington University, Henry Hertzfeld, states,
Although there is no sovereignty outside a spacecraft, there are analogies to the law on ships in international waters and also to issues that might occur in Antarctica; both places with no national sovereignty. So, although this is not a settled issue, my reading is that being in space and technically outside of any nation’s sovereignty or jurisdiction is not sufficient to avoid being charged with a crime…
Of course, even then there still is a lot of potential for gray area. For example, one of the world’s leading space lawyers, Joanne Gabrynowicz, outlines one such scenario for people on the International Space Station, which has a pretty well defined set of rules as previously noted,
Each of the modules is registered by a different country, so that means that if you’re in the US laboratory, you’re on a piece of US territory… If you mosey over to the Japanese module, you are now in Japan. So, it’s like an embassy. It’s national territory….What happens if it’s been a long hard day at the American lab, and a European astronaut punches a Canadian in the American module, but then runs over to the Japanese module? Who has jurisdiction over that? …
But, of course, that is just a jurisdictional issue. If a serious enough crime was committed, the person’s going to get prosecuted somewhere. It just might be a bit of a bureaucratic nightmare in some cases to sort out where.
When moving over to scenarios like actual colonization of places like Mars, once a colony is setup, it will no doubt enact its own laws, which those living there will have to agree to, whether explicitly or implicitly, not too dissimilar to moving to a new country on Earth. And likewise it is probable that extradition agreements and the like will be setup little different from agreements between nations on Earth.
Coming back around to the question of if there has ever yet been a crime committed in space, this allegedly occurred during astronaut Anne McClain’s six month stint on the ISS in 2019. During that span, she supposedly accessed her recently ex-wife’s bank account several times, allegedly to double check there was enough money in the accounts to cover bills and to care for the pair’s son. On the other hand, her ex, Summer Worden, took the matter more seriously, viewing it as illegal access to her accounts, thus potentially subjecting McClain to certain identity theft laws.
NASA astronaut Anne McClain.
Because McClain is an American citizen, was aboard the American module of the International Space Station when she allegedly committed the crime, was using one of NASA’s computers at the time, and her supposed victim is likewise American, she was very clearly under the jurisdiction of the United States. However, as far as we can find, nothing ever came of these accusations other than a NASA investigation and a whole lot of news reports. McClain is still an astronaut for NASA and otherwise no further updates on the matter have ever been made public, so presumably either it was decided no crime was actually committed or the former couple settled the matter amicably and the investigation was dropped.
But to sum up, no matter where you are in the universe, you can be fairly sure that judges the world over will be happy to cite similar type scenarios that have happened on Earth and existing agreements in making sure you are prosecuted for crimes, assuming said crimes were serious enough to be worth the effort involved, or someone kicks up enough of a stink about it. And while there still is plenty of gray area, as soon as space tourism becomes a relatively common thing and people start committing crimes in space, it seems likely that the various nations the world over will quickly develop a comprehensive and more definitive set of rules to govern such things when the need arises.
All that said, there are an awful lot of ways a seemingly innocuous sequence of events can lead to someone’s death in space. Accidents happen- a faulty valve isn’t necessarily proof someone murdered someone else, even if they loathed each other. In some such ways someone could die in space, any halfway decent lawyer could instill reasonable doubt in the minds of the jurors, especially if hard evidence couldn’t be attained. After all, the expense of investigating such a crime thoroughly may well be enormous in some cases, thus making it so such a detailed investigation may not be done, or even possible.
So let’s just say in many cases it’s going to be a lot more difficult to tell if there was someone behind such an event, or if it was just an accident… Leading us to perhaps one of the cooler new jobs that are going to be a thing in the coming decades- space detectives.
Ever wonder what the longest prison sentence ever given out is? Well, wonder no more. This was a whopping 141,078 years. It was given in 1989 in Thailand to Chamoy Thipyaso and each of her seven accomplices for defrauding more than 16,000 Chinese investors as a part of a massive Ponzi scheme.
If you’re wondering, in the United States, the longest sentence for some form of corporate fraud was only 845 years. This was handed down in 2000 to Sholam Weiss, for his role in the collapse of National Heritage Life Insurance. By contrast, Bernie Madoff was only given 150 years for his 2009 conviction of defrauding thousands in a multi-billion dollar Ponzi scheme.
The second and third longest prison sentences (for any crime), globally, were given to Jamal Zougam (42,924 years) and Emilio Suárez Trashorras (49,922 years) for their roles in the 2004 train bombings in Madrid.
As for the longest prison term overall in the United States, it was given in 1994 to Charles Schott Robinson who was convicted of six counts of rape garnering him 5,000 years in prison each- a whopping 30,000 year sentence.
Also in Oklahoma, Darron B. Anderson and Allan W. McLaurin each had in the thousands of years ranges of prison time imposed for the kidnapping, robbery and rape of an elderly woman. Anderson was initially only sentenced to 2,200 years, but upon his second trial (he appealed and won a new one), that second jury imposed a sentence of 11,250 years. McLaurin was initially sentenced to 21,250 years, but the appellate court reduced it to a mere 500 years.
The longest prison sentence imposed in Australia was given to Martin Bryant in 1996 for the Port Arthur, Tasmania massacre where he killed 35 and injured 23 others. His sentence included 1,035 years without parole plus 35 life sentences, one for each life he took.
On Dec. 7, 1941, the Empire of Japan launched a brutal attack on Pearl Harbor, killing over 2,300 American military personnel and catapulting the U.S. into World War II. After nearly four years of fierce fighting, Japan agreed to the terms of surrender as laid out in the Potsdam Declaration. On August 14th, 1945, this decision was broadcast across Japan.
A few weeks later, thousands of brave men gathered on the USS Missouri to witness a historic event as Gen. Douglas MacArthur, accompanied by Adms. Chester Nimitz and William Halsey, met with the Japanese delegation. Officials signed the Japanese Instrument of Surrender on September 2, 1945, finally putting a stop to the war and securing victory for the Allies.
Tragically, between the announcement of the surrender and the signing of the document, despite an active ceasefire, one last American life was lost.
During the war, Sgt. Anthony J. Marchione served as an aerial photographer with the 20th Combat Reconnaissance Squadron. On August 18, 1945, Marchione was on a mission to gather evidence that the Japanese were indeed complying with the ceasefire when the B-32 he was aboard took enemy fire.
Japanese machine guns ripped into the side of the B-32’s metal skin, creating a shower of shrapnel inside the cabin. Marchione noticed one of the crew members was gravely wounded and he rushed over. As the brave photographer helped his brother-in-arms, another barrage of enemy gunfire rained down on the American bomber.
The second round of incoming fire struck Marchione. He bled to death aboard his plane in the skies over Tokyo that Saturday afternoon. Sgt. Marchione’s tragic, untimely death has the dubious distinction of being the very last of World War II.
The aerial photographer was about a month away from celebrating his 20th birthday.
Antibiotic resistance is a one of the world’s most pressing public health problems. Scientists working on an Army project have developed a new weapon to combat super-bugs, which could protect soldiers and fight resistance.
Bacteriophage, a virus that infects and replicates within bacteria, kill bacteria through different mechanisms than antibiotics, and they can target specific strains, making them an appealing option for potentially overcoming multidrug resistance. However, quickly finding and optimizing well-defined bacteriophages to use against a bacterial target is challenging.
Researchers at the MIT Institute for Soldier Nanotechnologies, identified a way to do just that. The U.S. Army established the institute in 2002 as an interdisiciplinary research center to dramatically improve protection, survivability and mission capabilities of the soldier and of soldier-supporting platforms and systems.
“This is a crucial development in the battle against these superbugs,” said Dr. James Burgess, program manager, Institute for Soldier Nanotechnologies, Army Research Office, an element of the U.S. Army Combat Capabilities Development Command’s Army Research Laboratory. “Finding a cure for antibiotic-resistant bacteria is particularly important for soldiers who are deployed to parts of the world where they may encounter unknown pathogens or even antibiotic-resistant bacteria. Wounded soldiers are even more susceptible to infections, and they may come home carrying these drug-resistant bugs.”
Green Berets assigned to 3rd Special Forces Group (Airborne) move to load onto a UH-60 Blackhawk helicopter for extraction during a training event.
(U.S. Army photo by Sgt. Steven Lewis)
In this study, published in Cell, MIT biological engineers showed that they could rapidly program bacteriophages to kill different strains of E. coli by making mutations in a viral protein that binds to host cells. The results showed that these engineered bacteriophages are also less likely to provoke resistance in bacteria.
“As we’re seeing in the news more and more now, bacterial resistance is continuing to evolve and is increasingly problematic for public health,” said Timothy Lu, an MIT associate professor of electrical engineering and computer science and of biological engineering and the study’s senior author. “Phages represent a very different way of killing bacteria than antibiotics, which is complementary to antibiotics, rather than trying to replace them.”
The researchers created several engineered phages that could kill E. coli grown in the lab. One of the newly created phages was also able to eliminate two E. coli strains that are resistant to naturally occurring phages from a skin infection in mice.
The Food and Drug Administration has approved a handful of bacteriophages for killing harmful bacteria in food, but they have not been widely used to treat infections because finding naturally occurring phages that target the right kind of bacteria can be a difficult and time-consuming process.
To make such treatments easier to develop, Lu’s lab has been working on engineered viral scaffolds that can be easily repurposed to target different bacterial strains or different resistance mechanisms.
‘Blues Platoon’ conducts ‘Fallen Angel’ training.
(U.S. Army photo)
“We think phages are a good toolkit for killing and knocking down bacteria levels inside a complex ecosystem, but in a targeted way,” Lu said.
The researchers wanted to find a way to speed up the process of tailoring phages to a particular type of bacteria. They came up with a strategy that allows them to rapidly create and test a much greater number of tail fiber variants.
They created phages with about 10 million different tail fibers and tested them against several strains of E. coli that had evolved to be resistant to the non-engineered bacteriophage. One way that E. coli can become resistant to bacteriophages is by mutating LPS receptors so that they are shortened or missing, but the MIT team found that some of their engineered phages could kill even strains of E. coli with mutated or missing LPS receptors.
The researchers plan to apply this approach to target other resistance mechanisms used by E. coli and to develop phages that can kill other types of harmful bacteria.
“Being able to selectively hit those non-beneficial strains could give us a lot of benefits in terms of human clinical outcomes,” Lu said.
The Institute for Soldier Nanotechnologies engages in fundamental, multidisciplinary nanoscience research relevant to the soldier. In collaboration with Army and industrial partners, this focused nanoscience research creates opportunities for new materials, properties and phenomena that will directly advance modernization efforts. As an Army University-Affiliated Research Center, the institute’s contract is administered and overseen for the U.S. Army by the Army Research Office.
A little over a month after the Helge Ingstad sank after colliding with a tanker in a Norwegian fjord, the Norwegian military has released footage from the submerged frigate.
The warship was rammed by a Malta-flagged tanker in the early morning hours of Nov. 8, 2018, in the port of Sture, north of Bergen, which is Norway’s second-largest city.
The frigate displaces 5,290 tons, and the tanker displaces over 62,500 tons when empty. But when the tanker is fully loaded, as it was at the time of the collision, that jumps to about 113,000 tons, more than an aircraft carrier. The collision tore a large hole in the starboard side of the frigate’s hull, which caused other compartments to flood.
Footage released by the Norwegian military, which you can see below, shows the damage sustained by the frigate.
A Norwegian rescue official said at the time of the collision that the frigate was “taking in more water than they can pump out. There is no control over the leak and the stern is heavily in the sea.”
According to a preliminary report released at the end of November 2018, control of the frigate’s rudder and propulsion systems was lost, which caused the ship to drift toward the shore, where it ran aground about 10 minutes after the collision.
Recovery operations for the Helge Ingstad on Nov. 28, 2018.
(Norwegian armed forces photo)
Running aground prevented it from sinking in the fjord, but later, a wire used to stabilize the sunken vessel snapped, allowing it to sink farther. Only the frigate’s top masts remain above the surface.
In December 2018, Norwegian explosive-ordnance-disposal divers returned to the ship to remove the missile launchers from its foredeck.
Below, you can see footage of them detaching the launchers and floating them to the surface.
“All diving assignments we undertake require detailed planning and thorough preparation. We must be able to solve the assignments we are given, while providing as low a risk as possible,” diving unit leader Bengt Berdal said, according to The Maritime Executive.
“Our biggest concern [during this mission] is any increased movement of the vessel.”
With the missiles off the ship, all its weapons have been removed. Recovery crews are preparing to raise the ship, putting chains under the hull to lift it on a semisubmersible barge that will take it to Haakonsvern naval base.
The frigate will not be raised until after Christmas, according to The Maritime Executive.
Chains being readied aboard the heavy-lift vessel Rambiz to lift the sunken Norwegian frigate Helge Ingstad on Dec. 7, 2018.
(Norwegian armed forces photo by Jakob Østheim)
The oil tanker was not seriously damaged in the incident and didn’t leak any of its cargo. Only eight of the 137 crew aboard the Helge Ingstad were injured, but the multimillion-dollar ship was one of Norway’s five capital Nansen-class frigates and was one of Norway’s most advanced warships. (It also leaked diesel and helicopter fuel, but that was contained and recovered.)
The preliminary report found that the warnings to the frigate, which was headed into the port, went unheeded until too late, allowing the outbound tanker to run into it.
According to the report, the frigate’s automatic identification system was turned off, hindering its recognition by other ships in the area, and there was confusion on its bridge because of a change in watch — both of which contributed to the accident.
The preliminary report also raised questions about other ships in the class and the Spanish shipbuilder that constructed it.
The review board “found safety critical issues relating to the vessel’s watertight compartments. This must be assumed to also apply to the other four Nansen-class frigates,” the report said.
“It cannot be excluded that the same applies to vessels of a similar design delivered by Navantia, or that the design concept continues to be used for similar vessel models.”
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
Emerald Fennell, the Oscar-nominated writer/director of Promising Young Woman, has been tapped to write the film adaptation of Zatanna, a magician associated with DC Comics’ Justice League. Sweeping critical acclaim in the current awards season, Promising Young Woman is a dark comedy following a woman avenging the rape of her friend. It is also Fennell’s feature directorial debut, making her achievement that much more notable.
Fennell will join a promising list of filmmakers who were hired for blockbuster films after the success of their indie hits: Colin Trevorrow landed Jurassic World after Safety Not Guaranteed and Christopher Nolan took on The Dark Knight after Memento.
The Russo Brothers got Captain America: The Winter Soldier after You, Me, and Dupree I guess? More likely they got it for Community — but wow, did they prove their mettle with Winter Soldier and Avengers: Endgame.
Now, Fennell will be bringing Zatanna to the big screen through J.J. Abrams’ Bad Robot overall deal with WarnerMedia. This will mark Zatanna’s first appearance in the DC Extended Universe franchise — and DCEU’s second female to helm a superhero film, following Patty Jenkins’ Wonder Woman.
In the comics, Zatanna is the daughter of the magician Giovanni “John” Zatara and Sindella, a member of the Homo magi, a species of magic-using humans who evolved alongside Homo sapiens. She inherited magical abilities from her parents and joined the Justice League of America, controlling the four elements of earth, air, fire, and water. Her other powers include telepathy, teleportation, flight, dimensional travel, distortion of reality, and more. The role of Zatanna has not yet been cast and there are no indications of what the plot may contain, but if there’s one thing Promising Young Woman has shown us, it’s that Fennell isn’t afraid to make bold choices.
At the end of a long day of antiwar protests in Washington on Oct. 21, 1967, beat poet Allen Ginsburg was leading the crowd in a Tibetan chanting in an effort to psychically levitate the Pentagon into space. The protests were in a bizarre new phase, having already turned violent, injuring dozens of protestors as well as the soldiers defending the building.
By the time of this protest, the United States had been increasing its presence and roles in South Vietnam while the draft and the body count was taking its toll on the American psyche. There was no precedent in American history for the level of government defiance and protest that was about to take place. With 500 American troops dying in Vietnam every month and no end to the war in sight, groups all over the country decided to convene on Washington – specifically the Pentagon.
It was organized by many groups – it was almost a “who’s who” of the antiwar movement – but the primary organizer was antiwar activist Jerry Rubin. Rubin believed the Pentagon was now the real seat of power in the United States and wanted to make a showing there, instead of the White House or Capitol Building. Also arriving among the tens of thousands of people there that day were Dr. Benjamin Spock, Norman Mailer, and antiwar activist Abbie Hoffman.
The younger people might remember his likeness from a scene in “Forrest Gump.”
Hoffman was one of the co-founders of the Yippies, or Youth International Movement. The Yippies were an anti-establishment anarchist group whose antics bordered on the theatrical when not outright ridiculous. They became known for displays of symbolic protests and street pranks, and often, some kind of merger of the two. Hoffman was present at the October 1967 Pentagon protests as were many of his fellow future Yippies.
The day began with a series of speeches on the National Mall, one of which saw Dr. Benjamin Spock declare President Lyndon Johnson to be the real enemy of the people. The crowd then marched across the Arlington Bridge to the Pentagon, where they were met by members of the National Guard and the 82nd Airborne who firmly stood their ground on the steps of the building. This is where one hippie, calling himself “Super Joel,” famously put a flower in the barrel of one of their rifles.
Hoffman and the Yippies began to call for the Pentagon to levitate, using psychic energy to lift the building 300 feet into the air and to end the war. They even got a permit for it from the General Services Administration, but the permit only allowed them to levitate the building 10 feet. They wanted to circle the building, arm-in-arm, and perform an exorcism ritual on it, to flush out the demons and end the war. They never made it that far.
When they arrived at the Pentagon, the crowd became unruly in some areas, and a group of 3,000 attempted to break the barricade and enter the building. Some of them were actually successful but were beaten back to their protest or arrested. Hoffman and the Yippies stayed put for the duration of their 48-hour permit. They never did finish the exorcism.
“You can’t get a product. You are not going to get a product for months.” That’s what Brian Edwards, a medical supplier in California, has been telling dozens of people per day when they call searching for critical medical supplies that, before this year, they took for granted would be in stock.
The Chinese government’s mismanagement of the novel coronavirus not only spread the virus worldwide, it shut down many supply chains that the U.S. and other countries had become accustomed to; indeed, that the U.S. deeply relied upon. As we consider how our post-pandemic country will look, we should be careful to avoid a repeat of these mistakes.
U.S. dependence on Chinese manufacturing was no accident. The Chinese government’s “Made in China 2025” strategy to consolidate manufacturing supply chains and impose itself as the world’s preeminent source of high-value manufactured goods has been well-known for years. While we have neglected to safeguard our industrial base, Beijing was aggressively subsidizing its country’s manufacturing plants and creating supply chains that maximized its economic and geopolitical leverage.
Some of my colleagues and I have worked the White House and the Department of Defense in the last two years to restrict purchases of Chinese-manufactured critical materials for use in U.S. military systems, and the Federal Communications Commission and other agencies have taken the first steps to stop Huawei and related entities from dominating next-generation communications hardware. But the COVID-19 crisis demonstrates that a broader approach is needed.
The U.S. government should develop better, near-real-time insight into supply chains. Occasional reviews of individual supply chains create blind spots that major crises will reach unexpectedly. With the tools that are out there, it should be easier than ever for the government and its critical suppliers to share data to provide resiliency and security.
The government also needs to take the lead in maintaining and expanding critical American supply capabilities. It will be crucial to prevent the pennies-on-the-dollar purchase of distressed American assets during or immediately after the pandemic by firms linked to the Chinese government. This includes many major Chinese firms (such as Huawei). The country that knowingly took steps that allowed the disease to spread worldwide should not be allowed to financially benefit from those decisions.
At the same time, the government should ensure that American businesses get the liquidity and capital they need to maintain and expand critical supply chains within the United States. This can be done through direct investment into manufacturing plants, but it could also be done by making purchase agreements and building national stockpiles of needed supplies. The much-discussed Defense Production Act allows the federal government to both expand and ensure manufacturing capabilities, and the id=”listicle-2645908630″ billion that Congress provided to the DPA program in the CARES Act should be promptly supplemented with the direction that the government identify gaps and fragile sectors of supply chains and build capacity to bulwark them against future crises.
Though the current focus is, deservedly, on China, we should not think that there are no other foreign countries that seek to identify, develop, and exploit critical gaps in U.S. supply chains. Russia has always been a leader in the production of critical defense materials and a known bad actor on the global stage. Indian companies are routinely cited by U.S. authorities for dumping materials in critical and noncritical sectors of the economy. As we have seen recently with everything from thermometers to toilet paper, though, the supply chains that we rely on for our normal lives can be stressed in any number of ways.
A strong national approach to securing our manufacturing base is a necessary step for security and prosperity. The federal government is the only entity both large enough and focused enough to lead this effort. Congress should, therefore, act quickly, as soon as the next stimulus bill, to establish a supply chain monitoring and investment framework that will get America back to work and provide for a cohesive and united future.
In the heat of battle, some people freeze up, some charge forward, and some drop awesome lines like they’re trying to win a rap battle.
These quotes are from the third category.
1. “Two kinds of people are staying on this beach! The dead and those who are going to die! Now, let’s get the hell out of here!”
Troops in an LCVP landing craft approach Omaha Beach on D-Day, June 6, 1944. (Photo: public domain)
This was shouted by Army Col. George Taylor as he urged his men forward at Normandy on D-Day. According to survivors, Taylor yelled a few different versions of this quote during the landings at Omaha Beach and all of them had the desired effect, spurring American soldiers forward against the Nazi guns firing on the beach.
2. “All right. They’re on our left, they’re on our right, they’re in front of us, they’re behind us … They can’t get away this time.”
Army Brig. Gen. Anthony McAuliffe led the 101st Airborne Division during the Battle of the Bulge. The Americans were outnumbered, surrounded, and running short on supplies when a German delegation requested their surrender. McAuliffe was awoken with the news and sleepily responded “Nuts!” before heading to meet his staff who had to draft the formal response to the German commander.
The staff decided that the general’s initial response was better than anything they could write. While under siege and near constant attack, the paratroopers typed the following centered on a sheet of paper:
The USS Wahoo was an enormously successful U.S. submarine in World War II that sank five Japanese ships totaling 32,000 tons — including an entire four-ship convoy — during its third cruise. Near the end of the patrol, the Wahoo tried to sink a second convoy but was surprised by a previously unspotted Japanese destroyer outfitted for anti-submarine operations.
Navy legend John Paul Jones helped create the sea service during the American Revolution and, in an epic battle with the HMS Serapis, gave at least a couple of epic quotes including this one when he was asked to surrender.
Stephen E. Ambrose’s famous book “Band of Brothers” attributes a similar quote, “They’ve got us surrounded — the poor bastards,” to an unknown Army medic. As the story goes, the medic was telling an injured corporal why none of the wounded had been evacuated.
9. “Goddamn it, you’ll never get the Purple Heart hiding in a foxhole! Follow me!”
10. “Don’t fire until you see the whites of their eyes!”
Americans most often associate this line with the Battle of Bunker Hill, but there’s evidence it was said by different officers at a few points in history. At Bunker Hill in 1775, the order was given by at least one of the leaders of Patriot forces building new fortifications on Bunker and Breed’s Hills near Cambridge, Massachusetts. The intent was to preserve the limited powder and shot.
The gambit worked, allowing the Patriots to inflict major damage with their initial volleys, but it wasn’t enough for the outnumbered and outgunned Americans to hold the hills.
11. “Come on, you sons of bitches! Do you want to live forever?”
The Marine who recounts hearing “Come on, you sons of bitches! Do you want to live forever?” was in another part of the battlefield, so it’s possible that two Marines yelled similar lines in different parts of Belleau Wood or that someone misremembered a line yelled in one of World War I’s most dramatic battles.