Coast Guard rescue swimmers are rarely the subjects of much media attention, that 2006 Kutcher-Costner film notwithstanding. But this tiny cadre of athletes, typically numbering between 300 and 400, conduct some of the highest risk, highest-stakes rescues around the world.
Remember when the Deepwater Horizon oil rig exploded in the Gulf of Mexico? One part of that crisis response was the rescue swimmers who helped airlift out survivors and establish triage to save all the lives they could. Over 100 people jumped from Deepwater Horizon or were blown off the rig into the water. Tragically, 11 died, but over 100 survived.
They jump into the water from helicopters or planes and then swim into burning ships or complicated, underwater cave systems. They can save ship crews in hurricanes and downed aviators in combat if they get the call. And they can even fight any of their rescuees underwater for control if a panicking survivor tries to resist.
The video embedded above shows a group of these swimmers going through the grueling Coast Guard school to earn their place in the lifesaving profession.
But while the video and most descriptions of their duties focus on the extreme physical requirements for these Coast Guardsmen, equally important is their ability to maintain and troubleshoot their own gear and the gear on their aircraft. This can include everything from parachutes to oxygen systems, pumps to protective clothing, and cargo to flotation equipment.
And they are expected to attain and maintain medical qualifications, because they could be the only emergency technician available for crucial minutes or hours. This requires an EMT qualification at a minimum.
And, finally, they have to be comfortable working on a variety of aircraft. Their most iconic ride is the Sikorsky MH-60 Jayhawk, that distinctive orange and white beauty based on the Navy’s SH-60 Seahawk and the Army’s UH-60 Black Hawk.
But they can also be assigned to the HH-65C Dolphin or, more rarely, fixed-wing aircraft.
The US Air Force’s newest air refueling aircraft, the KC-46A Pegasus, is undergoing a variety of tests out of Edwards Air Force Base, California.
Starting on April 29, 2019, the KC-46 conducted the first refueling test with a Travis AFB C-5M Super Galaxy. The testing is a part of a larger test program to certify aerial refueling operations between the KC-46 and 22 different receiver aircraft.
Maj. Drew Bateman, 22nd Airlift Squadron chief of standardization and evaluation and a C-5M pilot, flew the Air Force’s largest aircraft for testing on April 29, 2019. He flew it again May 15, 2019.
“The April 29 sortie was the first where the KC-46 and the C-5M made contact,” Bateman said. “That was awesome to be a part of. You have a few pinch me moments in life and this was one of them for me. Not everyone gets to be a part of something like this. We were able to get two aircraft together for the first time.”
“Every test flight begins with a continuity check so the KC-46 crew ensures they can connect and disconnect safely with our aircraft,” Bateman added. “From there, we continue testing a variety of items at multiple speeds and altitudes throughout the sortie.”
A Boeing KC-46A.
One capability Bateman and his C-5M crew mates tested with the KC-46 was the ability to connect with both aircraft near max gross weight.
“For these tests, we were required to be over 800,000 pounds with cargo and fuel,” Bateman said. “Our 60th Aerial Port Squadron Airmen developed a load plan. The expediters loaded the cargo onto the airplane, and our maintainers ensured the C-5M was flyable. It’s a huge team effort to ensure we are mission ready. I feel like I have the smallest part of it. I just fly the airplane.”
A KC-46A Pegasus during testing with a C-5M Super Galaxy for the first time on April 29, 2019.
(U.S. Air Force photo by Christian Turner)
On April 29, 2019, Master Sgt. Willie Morton, 418th Flight Test Squadron flight test boom operator, oversaw operations in the back of the KC-46 during the testing process.
“This was a once-in-a-lifetime opportunity,” Morton said. “I was a KC-10 Extender boom operator at Travis for about 13 years so going to the KC-46 and being a part of the next step in aerial refueling is pretty awesome. I have the chance to provide input on an aircraft that will be flying missions for many years.”
A United States Air Force KC-10 Extender.
(U.S. Air Force photo by Master Sgt. Mark C. Olsen)
To complete refueling with the KC-46, boom operators must use a series of cameras that project a 3D image on a screen. These refueling experts then use that image to carefully guide aircraft into position, Morton said.
“We are testing capabilities at low altitudes, high speeds, high altitudes and high speeds, as well as heavy and light gross weights so we know how the aircraft will respond,” he said. “We have to find the optimal speed the C-5M can fly at to support refueling. We are also doing our best to ensure the mechanical compatibility of the KC-46 and C-5M.”
According to Lt. Col. Zack Schaffer, 418th FLTS KC-46 Integrated Test Force director, the testing is a joint effort between the USAF and Boeing.
“The KC-46s being used for this test effort are owned by Boeing and operated by a combined Air Force and contractor crew,” Schaffer said. “All the test planning and execution is being led by the 418th FLTS, part of the 412th Test Wing at Edwards. The flight test program evaluates the mechanical compatibility of the two aircraft at all corners of the boom flight envelope, as well as handling qualities of both the tanker, boom and receiver throughout the required airspeed and altitude envelope at different gross weights and center of gravity combinations.”
The 418th FLTS is also responsible for developmental testing of the C-5M, and is providing a test pilot to support the C-5M side of the certification testing, Schaffer added. The C-5M was crewed primarily by the 22nd AS with augmentation from the 418th.
A United States Air Force C-5 Galaxy in flight.
(U.S. Air Force photo by Brett Snow)
“Additionally, the military utility, lighting compatibility and fuel transfer functionality is also being evaluated,” Schaffer said. “The testing is expected to take approximately 12 sorties to complete.”
Once the testing is complete, the results will be used to develop the operational clearance necessary to allow KC-46s to refuel the C-5M for missions.
“The C-5M is also one of the receivers required to complete the KC-46 Initial Operational Test and Evaluation program, which is a prerequisite to the KC-46 being declared operationally capable,” Schaffer said. “Completing the testing necessary to expand the operational capabilities of the KC-46 is a critical step in modernizing the Air Force’s aging tanker fleet. The 60th Air Mobility Wing at Travis has provided outstanding support to ensure this testing can get the warfighter expanded capabilities as soon as possible.”
Identifying potential problems is also a focus of the testing, Moore added.
“It’s important, if any issues are identified during the testing, to ensure counter measures are created to overcome those issues,” Moore said. “We want to get the best product to the warfighter to extend global reach and mobility.”
Travis is scheduled to receive its first KC-46 in 2023.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
It’s probably common knowledge that when Old Glory is flying at half-staff (or half-mast), it indicates a period of mourning, but unless it’s Memorial Day or a president has just died, people might not know why the flag is at half-staff. Who gets to declare a period of mourning? How long does the period last?
Fear not, dear patriot. I will answer all these questions and more.
On March 1, 1954, President Dwight D. Eisenhower ordered a presidential proclamation codifying the display of the flag of the United States at half-staff. Here are the basics you need to know:
The American flag is flown at half-staff above the White House Sunday, Dec. 1, 2018, in memory of 41st President George H. W. Bush.
(Official White House Photo by Keegan Barber)
Death of the President: 30 Days
The flag of the United States shall be flown at half-staff on all buildings, grounds, and naval vessels of the Federal Government in the District of Columbia and throughout the United States and its Territories and possessions for the period indicated upon the death of the President or a former President for thirty days from the day of death.
The flag shall also be flown at half-staff for such period at all United States embassies, legations, and other facilities abroad, including all military facilities and naval vessels and stations.
Death of the VP, Chief Justice, retired Chief Justice, or Speaker of the House: 10 days
But for an Associate Justice of the Supreme Court, a member of the Cabinet, a former Vice President, the President pro tempore of the Senate, the Majority Leader of the Senate, the Minority Leader of the Senate, the Majority Leader of the House of Representatives, or the Minority Leader of the House of Representatives, the flag will fly at half-staff from the day of death until interment.
Honoring the seven astronauts who lost their lives aboard the Space Shuttle Columbia on Saturday, Feb. 1, 2003, the American flag was flown at half-staff over the White House Monday, Feb. 3. President George W. Bush has directed the government to fly the flag at half-staff through Wednesday, Feb. 5.
(White House photo by Paul Morse)
Other deaths “as appropriate”
For example, the flag of the United States shall be flown at half-staff on all buildings, grounds, and naval vessels of the Federal Government in the metropolitan area of the District of Columbia on the day of death and on the following day upon the death of a United States Senator, Representative, Territorial Delegate, or the Resident Commissioner from the Commonwealth of Puerto Rico, and it shall also be flown at half-staff on all buildings, grounds, and naval vessels of the Federal Government in the State, Congressional District, Territory, or Commonwealth of such Senator, Representative, Delegate, or Commissioner, respectively, from the day of death until interment.
In the event of the death of other officials, former officials, or foreign dignitaries, the flag of the United States shall be displayed at half-staff in accordance with such orders or instructions as may be issued by or at the direction of the President, or in accordance with recognized customs or practices not inconsistent with law.
Visitors on the USS Arizona Memorial as the flag flies at half-staff.
On Memorial Day and other notable dates
According to the VA, on Memorial Day the flag should be flown at half-staff from sunrise until noon only, then raised briskly to the top of the staff until sunset, in honor of our nation’s fallen heroes.
There are other notable dates throughout the year that are honored with the half-staff display, such as September 11th (Patriot Day), December 7th in honor of the attacks at Pearl Harbor, or October 7th in honor of fallen firefighters.
The president is also authorized to order the flag to half-staff in response to tragedies, such as mass shootings or the Challenger tragedy.
Anyone who wishes to can receive notifications for when to fly their flag at half-staff, including nation-wide or state-wide alerts.
There have been times when officials have been confused about their authority with regards to “ordering” the American flag to half-staff. The National Flag Foundation gives the example of the late Attorney General Janet Reno ordering the flag to half-staff on all U.S. Department of Justice buildings after the deaths of several DEA agents. Though it was a well-intentioned gesture, legally Attorney General Reno did not have the authority to give such an order.
“NFF points out these ‘good-faith misunderstandings’ not to criticize or embarrass anyone, but rather to head off a growing trivialization of this memorial salute, and to preserve the dignity and significance of flying the U.S. flag at half-staff. To any readers who may think that NFF is insensitive for raising these breaches of etiquette, please be assured that our motives are pure. We grieve these human loses deeply; however, we believe proper respect for our flag must be maintained – no matter the circumstances. We owe that respect to our living, our dead, and our flag.”
“When Salvador Dalí died, it took months to get all the flagpoles sufficiently melted.”
(Image by xkcd)
One final note: proper etiquette dictates that the flag must not just be raised to half-staff. “The flag should be briskly run up to the top of the staff before being lowered slowly to the half-staff position.”
The US Marine Corps for the first time is eyeing a plan to let women attend what has been male-only combat training in Southern California, as officials work to quash recurring problems with sexism and other bad behavior among Marines, according to Marine Corps officials.
If approved by senior Marine leaders, the change could happen as soon as next spring. And it could be the first step in a broader campaign to give male Marines who do their initial training on the West Coast the opportunity to work with female colleagues early in their career.
Marine leaders are also considering allowing women to attend boot camp in San Diego, the officials said. Currently all women recruits go through boot camp at Parris Island, S.C., while male recruits go either there or to San Diego. The combat training comes after troops have finished boot camp, and is done both in South Carolina and at Camp Pendleton in Southern California, but women attend the course only on the East Coast.
The officials were not authorized to publicly discuss the matter because final decisions have not been made, so they spoke on condition of anonymity. The boot camp decision is still under discussion.
Marine leaders have come under persistent criticism from members of Congress because the Corps is the only military service to separate men and women for portions of their boot camp. And only the Marine Corps allows a full half of its recruits to go through initial training without any female colleagues.
Because there are only a small number of female Marines, they all go through boot camp at Parris Island, where they are separated from the men for portions of the training. Congress members have been highly critical of that policy and demanded changes, and the Corps has been reviewing the issue.
Marines have argued that the separation from the men is needed so the women can become more physically competitive before joining their male counterparts. They also have argued that it gives the female Marines the support they need during their early weeks of boot camp. Women make up 8.4 percent of the Marine Corps, and that is the smallest percentage of all the armed services.
But Marine Corps officials are now suggesting that training half of their recruits on the West Coast with no females in their units could be contributing to some of the disciplinary problems they’ve had. Giving the male Marines greater exposure to females during training could foster better relations and greater respect over time, some have suggested.
Over the last several years, Marine leaders have battled persistent accusations that the Corps is hostile to women. The Marines were the only service to formally request an exception when the Pentagon moved to allow women to serve in all combat jobs. That request was denied in late 2015 by then-Defense Secretary Ash Carter.
More recently, the service was rocked by a nude-photo sharing scandal in which Marines shared sexually explicit photos on various social media and other websites and included crude, derogatory, and even violent comments about the women. The Naval Criminal Investigative Service is looking into the matter and several Marines have been disciplined.
A Marine task force has been reviewing a range of options and changes for several months to try and reduce the problems.
Months ago, Gen. Robert Neller, the Marine Corps commandant, told Congress that the service has been looking at the recruit training issue. But to date, no major changes have been made.
The nude-photo sharing investigation represents a broader military problem. In a report issued earlier this year, the Pentagon said that nearly 6,200 military members said that sexually explicit photos of them were taken or shared against their will by someone from work, and it made them “uncomfortable, angry or upset.” But, across the services, female Marines made up the largest percentage of women who complained.
More than 22,000 service members said they were upset or angry when someone at work showed or sent them pornography. And, again, female Marines represented the highest percentage of complaints from women.
While the United States was celebrating its 100th birthday on July 4, 1976, four Israeli C-130 cargo planes landed at Entebbe Airport in Uganda, cargo bay doors already open. A black Mercedes and a parade of Land Rovers screamed out of two of the planes, headed for the old passenger terminal. Armored personnel carriers exited the other three.
There were 106 mostly Israeli hostages being held by pro-Palestinian hijackers and supported by the Ugandan army under dictator Idi Amin being held here. The hostages were coming home.
If anyone’s coming to rescue you, you want it to be the IDF.
The raid on Entebbe airport was one of the most daring hostage rescues of all time. The Israelis flew in some seven planes under the radars of many hostile countries, landing at an enemy airport, pretending to be the caravan of a brutal dictator, and risking an all-out war to save Israeli citizens, losing only three and only one of the Israel Defence Forces commandos. The Israelis even destroyed 11 Ugandan fighter aircraft on the ground in retaliation. In three years, Amin would be deposed.
Airplane hijackings dropped dramatically after this incident and a number of Western countries vowed never to negotiate with terrorists, especially the United States. The U.S. does not negotiate with terrorists as a matter of policy.
This resulted in a number of American hostages dying at the hands of ISIS.
In the years following the terrorist attacks of Sept. 11, 2001, more than 1,200 Westerners from some 32 or more countries have been captured by terrorists and held hostage by militant groups and pirates, demanding ransom or some other concession. Americans made up 20 percent of those hostages taken since 2001 and half of those were killed by their captors. The reason for this is the policy of not giving concessions to terrorists or anyone else who might take citizens hostage.
The United States believes giving in to terrorist or other militants’ demands for ransom or some other concession would just make Americans a more tempting target for those who would take hostages, allowing terrorists to perpetually self-finance through hostage-taking. As it is, Americans are twice as likely to die in captivity by their captors while countries who pay ransoms – Germany, Spain, France, Austria, and Switzerland – are more likely to have hostages released.
But citizens of those countries are not taken hostage in disproportionate numbers because taking hostages is risky and not as profitable as other ventures for terrorist groups, such a narcotics, black market oil and arms sales, and human trafficking. Civilians more likely to be kidnapped are those who are already in unstable areas. Three-quarters of Westerners taken by al-Qaeda and ISIS were freed. Only two of those were Americans.
Since a new hostage policy was announced in 2015, where the U.S. coordinates agencies to secure the release of hostages, six have been released, and none died in captivity. The only hitch is that none were held by foreign jihadist groups.
It should be noted that the Carter Administration held negotiations with Iran for the hostages taken at the U.S. Embassy in Tehran during the 1979 Islamic Revolution. Not one of the hostages were killed, and they were released on the last day of the Carter Presidency – all without firing a shot.
BM3 Taylor Schulte poses with the Kimball’s unicorn swim floatie, which will be displayed at the U.S. Coast Guard Museum in New London, Connecticut. (Courtesy of the U.S. Coast Guard Museum)
In the video, it can be seen drifting at sea, a rainbow-bright mythological Equus cast aside as swimmers from the Coast Guard cutter Kimball clambered out of the water and away from an uninvited shark.
Despite calls for the swim watch to “sink the unicorn,” the giant inflatable darling of the Kimball’s now-infamous Aug. 26 swim call was retrieved from the Pacific Ocean and will have a new home at the U.S. Coast Guard Museum in New London, Connecticut.
Museum staff posted a photo Thursday of their latest acquisition, which will join the museum’s collection of mascots. The Kimball’s unicorn swim floatie will be displayed alongside such objects as a lighthouse keeper’s Salty Rabbit and Capt. Cluck, the mascot of the service’s aviation forces.
Unicorn Made Famous by Shark Incident Floats into History at Coast Guard Museum
According to Museum Curator Jennifer Gaudio, the collection helps document Coasties’ off-duty time, and the inflatable unicorn, which has been signed by the Kimball crew, is the rare artifact clearly associated with recreation time — a swim call interrupted by a shark in Oceania this year.
“We like to find objects that represent an event but it’s often difficult to find one that is so recognizable,” Gaudio said. “When I saw the video, I reached out to the other curator and the chief historian to see if it was something we wanted.”
The Kimball crew was taking an afternoon swim break Aug. 26 during Pacific operations when an 8-foot visitor — either a longfin mako or pelagic thresher — showed up to join the fun.
Not knowing the shark’s intentions as it swam toward crew members, the designated shark watch, Maritime Enforcement Specialist 1st Class Samuel Cintron, opened fire between the fish and the Coasties to deter the creature from getting closer.
Cintron fired bursts into the water at least three times, giving the swimmers time to reach the ship or the ship’s small boat.
The only injury to a crew member was a scrape to a knee, obtained as the Coastie climbed to safety.
But if the inanimate unicorn had feelings, it would have been devastated by the treatment it received that day. After landing a safe spot on the ship’s response boat, the floatie was tossed overboard to make room for the humans and subjected to the dual indignities of being discarded and hearing crew members tell Cintron to shoot it.
What a relief it must have been when it was lifted out of the water for return to the ship. And now, to live in a museum.
“I wasn’t sure we had room. We are still in a 4,000-square-foot space. And it’s big. Much bigger than I expected,” Gaudio said.
The U.S. Coast Guard Museum is housed in a portion of the library at the U.S. Coast Guard Academy. Construction of a National Coast Guard Museum was slated to begin this year in downtown New London, but the project has been delayed by other initiatives in the area, according to National Coast Guard Museum Association officials.
The museum is expected to house much of the collection from the current Coast Guard Museum, and the unicorn is likely to make the move when the new facility is built, Gaudio said.
In November 2018, I completed a grueling three-day training for journalists and aid workers heading into countries with tenuous security situations and war zones.
I learned a ton during the training — what worst-case scenarios look like, how to avoid them, and, perhaps most important, how I might act when it hits the fan. But the most important thing I picked up was an easy-to-learn tactic anyone could use.
Held at a nondescript warehouse in suburban Maryland, the training was led by Global Journalist Security, an organization founded in 2011 to help people going to dangerous places acquire what it calls the “physical, digital, and emotional aspects of self-protection.”
I had some vague idea of what I was getting myself into. I’m traveling to Egypt, Nigeria, and Ethiopia over the next couple of months, and fellow journalists had recommended the course as preparation for the worst-case scenarios: kidnappings, terrorist attacks, active-shooter situations, and war zones. How a three-day course in suburban Maryland could credibly do that was anybody’s guess.
Training prepares people not to freeze or panic in worst-case scenarios
The chief trainers Paul Burton and Shane Bell, a former British Army sergeant and a former Australian Armed Forces elite commando respectively, are experts at putting people in distressed mindsets. The two have accompanied journalists and aid workers in the world’s most dangerous places, been kidnapped, and negotiated kidnapping releases. They know what they’re talking about.
Female war correspondents during World War II.
Over the course of the training, Bell, Burton, and the rest of the GJS team thrust attendees — yours truly, included — into simulations designed to trigger your adrenaline.
“You want to give people skills to stay in the moment and not freeze or go into panic mode,” Smyth told Columbia Journalism Review in 2013. “Some people will forget to yell, ‘Hey, she’s being dragged away — we have to help her!’ [The training] plants seeds, things to remember.”
I had to save a fellow aid worker from an “arterial puncture wound” that was squirting a fountain of (very real-looking) “blood” from a gaping “flesh wound.” Hooded actors interrupted PowerPoint presentations firing blanks into the class as we scrambled to find cover and escape. There was a kidnapping during which I was told to “slither like the American snake that I am.” And finally we were put through a final course across fields and hiking trails designed to mimic a war zone with grenades thrown, artillery shelling, landmines, and snipers.
My 13-year-old self thought it was pretty wicked. My 28-year-old self was shook. By the end, I was praying I would never have to use any of it, particularly after I “died” in the first active-shooter scenario.
But that scenario came before I learned the most valuable skill Burton, Bell, and company imparted upon us: tactical breathing.
U.S. Army Spc. Chad Moore, a combat medic assigned to 82nd Airborne Division, Fort Bragg.
(U.S. Army photo by Sgt. Dustin Biven)
Combat troops, police officers, and first responders are trained in tactical breathing
The idea behind it is simple: When you enter high-stress situations, your sympathetic nervous system throws your body into overdrive. Adrenaline kicks in, your body starts to shake, and your mind races to solve the problem.
It doesn’t just happen in war zones. If you hate public speaking, it’s likely to happen before you get onstage. If you’re nervous about an important exam, it may kick in as the timer starts.
What Burton and Bell hammered home is that you can’t prevent this response. It’s instinctual. Your brain’s three options are fight, flight, or freeze. And while you may know enough about yourself to know how you’ll react when you have to make the big speech, you probably have no idea what your reaction will be during an active-shooter situation or in a war zone.
Usually, in that state, you aren’t thinking logically, if you are thinking at all. Flubbing the speech may not be a big deal, but if you enter that state in a war zone, it could get you killed.
Tactical breathing overrides that stress response by activating the parasympathetic nervous system, slowing down your heart rate and calming you down so you can make a rational decision.
It works like this: Breathe in for four seconds, hold your breath for four seconds, and exhale for four seconds. Repeat as necessary until your heart rate slows and your mind calms. Yes, it is very similar to yogic meditation breathing.
Once your mind calms, you can make a rational decision about whether it is best to keep hiding or whether you need to run, rather than flailing in panic.
There is a rad group of military spouses trekking through your neck of the woods worldwide ready to take you from quarantine strolls to hilltop plateaus. Military Wild is blazing trails in the outdoor space connecting all skill levels to the profound beauty waiting close to each duty station.
Hannah Wolt, President of Military Wild, founded the organization after realizing her tribe was out there but hiking alone without connection. “The first group formed in Guam, where my husband was stationed. We had a blast, and when members came closer to a PCS date, the idea of planting groups wherever we went took flight,” Wolt said, who, after vacationing in New Zealand, knew she needed to get back to the outdoors regularly.
She explained, “It takes time to find what you’re looking for at a duty station, the same goes for hikes and trails, just generally knowing the area takes a while. With Military Wild, the goal is to establish that knowledge base and give our community members instant access, they’ll arrive ready to go with the research.”
Each local chapter is organized simply, an Ambassador serves as the area organizer who has working knowledge to assist all participant levels and establishes their perks program offering discounts for members in the area. “We have a highly active community online (Facebook and on their website) where things are organized. You’ll know exactly what to expect before you step out, from gear to difficulty to whether kids are recommended or not,” she said.
A large portion of hikes organized across all chapters are free, eliminating any financial barriers and opening more opportunities for all. “If a trek does have a cost, that’s outlined in the details. Our Ambassadors have been awesome to facilitate things at a discounted rate for the group if and when cost is a factor,” she said.
All too often, groups can be polarized by whether they are open to families or geared toward those without. That is simply not the case, and Wolt wants everyone to know that kids do not equal an automatic limitation outdoors. “I see moms with kids in the hiking backpack having a much easier time than I am on trails. It’s amazing what they can do, and only they know where their limits are.”
Wolt emphasized that Military Wild is a place for everyone, every level. “We once had a spouse who started terrified of water and by the end of her time was wading through waist-deep water up to a waterfall.”
Finding a niche over and over can be a daunting task for any spouse. Forging a connection to nature, working on goals and milestones which can be achieved anywhere in the world is a relationship no PCS can cut off. What starts with a simple willingness to walk can turn into a lifelong pursuit of adventure and self-discovery.
“This year we are building even more community. We are adding groups, outlining great trips nationwide, gaining even more discounts at local businesses, holding contests for kids, and creating unique patches for members,” Wolt said, who has used the international pause to really expand their mission.
“We’re a young organization but we’re growing. If there is not a group in your area, you can apply to start one on our website. We work to mentor our Ambassadors to cultivate their chapters and gain outdoor skills along the way. You don’t have to be a professional to lead,” Wolt said.
The organization is open to veterans, military service members, and spouses and are quickly popping up and mapping out the best recreation spots surrounding installations near you.
Warriors guard their hearts underneath a stoic resolve because showing emotion is often misunderstood as a weakness. Leaders often weigh the needs of the many against the needs of the few to build a brighter future for their people to live and prosper. Love is an unstoppable force that can influence the influencer or conquer the conqueror. What can those in command do when love is true but the world is wrong?
They change it.
Seven Wonders Of The Ancient World-GARDENS OF BABYLON PART 1
The Hanging Gardens of Babylon were built by Babylonian King Nebuchadnezzar II for his wife Queen Amytis. He knew his queen’s happiness stayed in the green mountain valleys of her childhood home in Media. In order to make his wife happy, he built one of the seven wonders of the ancient world between 605 and 562 BC in what is now known as modern day Iraq.
The word ‘hanging’ that gave the wonder its name sake comes from trees planted on elevated balconies. The wonder used raised platforms, aqueducts, and a system of irrigation centuries before their time to water the vast collection of plants and trees.
He literally built his wife a mountain.
Archaeologists debate whether the wonder was built in Nineveh (back then called New Babylon) instead of Babylon itself. The ruins shared the same fate as Cleopatra’s Tomb of being lost in the sands of time.
Emperor Hongzhi seen here not cheating on his wife with 10,000 options.
They refused concubines and consorts — Emperor Hongzhi of China
High status men in late imperial China over the age of forty were encouraged to take on a second wife or a mistress. It was also common that your mistress would try to kill your first wife and all your children. In the case of Emperor Hongzhi, he had his mother killed by one of his father’s mistresses.
The death of his murdered mother by a mistress was enough to highlight the advantages of monogamy. He had no children outside of his one marriage to his empress and had no extramarital affairs.
He loved his wife and five children so much that he did not want to risk their safety over loose women and swore them off completely. The importance he placed on monogamy was seen as out of place since most emperors during those times had a man-cave harem with 10,000 available women, empire wide, determined to show you the privileges of being a ruler.
Dr. Kenneth Swope, of the University of Southern Mississippi describes Hongzhi as the “most uninteresting and colorless of all the Ming emperors.”
He chose to have his life be seen as a model of morality and his morals as the center piece for his anti-corruption campaign. He used his love for his one and only wife to shape his empire in peace.
“That was still an expensive divorce, Henry.”
They changed religions — King Henry VIII of England
Marriage and religion are touchy subjects, especially when conversions are involved. Henry VIII had fallen in love with with a young woman named Anne Boleyn, but there was a problem: he was already married. He became convinced his marriage to Catherine of Aragon was cursed because she was his brother’s widow. The king commanded asked the pope to annul his marriage.
However, Catherine’s nephew was the Holy Roman Emperor Charles V and he commanded urged Pope Clement VII to not annul the marriage.
The king then decided that he didn’t need the pope’s permission to do anything so he declared himself Supreme Head of the Church of England, changed England’s religion, decreed his daughter Mary illegitimate, and got a divorce. In 1533 Henry and Anne Boleyn were married.
She then bore him a daughter so he had her beheaded.
The Navy’s Littoral Combat Ship may soon be armed with an artificial intelligence-enabled maritime warfare network able to seamlessly connect ships, submarines, shore locations, and other tactical nodes.
The Navy is taking technical steps to expand and cyber-harden its growing ship-based ocean combat network, called Consolidated Afloat Networks and Enterprise Services (CANES).
CANES is being installed on carriers, amphibious assault ships, destroyers, and submarines, and the service has completed at least 50 CANES systems and has more in production, Navy developers said.
Upgraded CANES, which relies upon hardened cyber and IT connectivity along with radio and other communications technologies, is being specifically configured to increase automation – and perform more and more analytical functions without needing human intervention. It is one of many emerging technologies now being heavily fortified by new algorithms enabling artificial intelligence, senior Navy leaders explain.
“Using AI with CANES is part of a series of normal upgrades we could leverage. Anytime we have an upgrade on a ship, we need the latest and greatest. Navy developers (Space and Naval Warfare Systems Command) have a keen eye of what we can build in — not just technology sprinkled on later but what we can build right into automation on a platform. This is why we use open standards that are compliant and upgradeable,” Rear Adm. Danelle Barrett, Navy Cybersecurity Director, told Warrior in an interview. “It can seem like a disconnected environment when we are afloat.”
Among many other things, fast-evolving AI technology relies upon new methods of collecting, organizing, and analyzing vast amounts of combat-relevant data.
“We consider the whole network, just like any system on an aircraft, ship, or submarine. These things allow the Navy to protect a platform, ID anomalous behavior and then restore. We have to be able to fight through the hurt,” Barrett said.
Surface ships such as the Littoral Combat Ship, rely upon a host of interwoven technologies intended to share key data in real time – such as threat and targeting information, radar signal processing, and fire control systems. CANES connectivity, and AI-informed analysis, can be fundamental to the operation of these systems, which often rely upon fast interpretation of sensor, targeting or ISR data to inform potentially lethal decisions.
The LCS, in particular, draws upon interconnected surface and anti-submarine “mission packages” engineered to use a host of ship systems in coordination with one another. These include ship-mounted guns and missiles along with helicopters, drones such as the Fire Scout and various sonar systems – the kinds of things potentially enhanced by AI analysis.
Navy developers say increasing cybersecurity, mission scope and overall resiliency on the CANES networks depends on using a common engineering approach with routers, satcom networks, servers and computing functions.
“We are very interested in artificial intelligence being able to help us better than it is today. Industry is using it well and we want to leverage those same capabilities. We want to use it not only for defensive sensing of our networks but also for suggesting countermeasures. We want to trust a machine and also look at AI in terms of how we use it against adversaries,” Barrett said.
Nodes on CANES communicate use an automated digital networking system, or ADNS, which allows the system to flex, prioritize traffic and connect with satcom assets using multiband terminals.
CANES is able to gather and securely transmit data from various domains and enclaves, including secret and unclassified networks.
Carriers equipped with increased computer automation are now able to reduce crew sizes by virtue of the ability for computers to independently perform a wide range of functions. The Navy’s new Ford Class carriers, for instance, drop carrier crew size by nearly 1,000 sailors as part of an effort to increase onboard automation and save billions over the service life of a ship.
Along these lines, Navy engineers recently completed technical upgrades on board the Nimitz-class USS Truman carrier by integrating CANES, officials with Navy SPAWAR said in a statement.
“The Truman received a full upgrade of the Consolidated Afloat Network Enterprise Services network to include more than 3,400 local area network (LAN) drops, impacting more than 2,700 ship spaces,” a SPAWAR article said.
The current thinking, pertinent to LCS and other surface vessels, is to allow ship networks to optimize functions in a high-risk or contested combat scenario by configuring them to quickly integrate new patches and changes necessary to quickly defend on-board networks. Computer automation, fortified by AI-oriented algorithms able to autonomously find, track and — in some cases — destroy cyber-attacks or malicious intrusions without needing extensive and time-consuming human interpretation.
“We see that the more we can automate our networks, the more we can use machines to do the heavy lifting. Our brains do not have the capacity from a time or intellectual capacity to process all of that information. It is imperative to how we will be able to maneuver and defend networks in the future. We can have more automated defenses so that, when things happen, responses can be machine-driven. It won’t necessarily require a human,” Barrett said.
But seriously, when did the 3 worse jobs (newspaper reporter, broadcaster, and logger) ever have to stir their buddies’ MRE dumps into a diesel mixture and then mix it while it burns?
Here are 7 things CareerCast failed to mention about why being an enlisted service member is actually the worst:
1. The aforementioned MRE dumps
Look, CareerCast looked at a lot of factors, but they don’t once mention diet and food choices in their methodology. Pretty sure newspaper reporters and broadcasters aren’t stuck eating 5-yr-old brisket and then trying to crap it out after it turns into a brick in their intestines.
2. Multi-year contracts guaranteed by prison time
They did look at “degree of confinement” as one of the “physical factors” of their measurements, but not as an emotional factor. Remember the last time a logger got tired of their job, walked off, and spent the next few years in prison?
No, you don’t. Because the only way that happens is if they set some machinery on fire or crap into someone else’s boots on their way out. But troops can’t quit, and there ain’t no discharge on the ground.
3. Long ruck marches, range days, and multi-day field operations
The list’s method discounts physical factors compared to emotional factors (“stamina” and “necessary energy” both top out at 5 points while facing strong competition for job placement and promotion is worth 15 points on its own).
Ummmm, anyone actually think waiting an extra year or two for promotion is harder than brigade runs every payday, 12.4-mile ruck marches every few months, and having to unload and re-load connexes whenever a lieutenant loses their radio? All so you can go face a nine-man board when you want to get promoted?
4. The barracks
Drunken parties spill into the hallways just an hour before sergeant major drags everyone out to pick up cigarette butts whether they smoke or not. Idiots knock on your door because they don’t know where their buddy lives, which sucks for you since you have duty in the morning.
But hey, at least your boss’s boss’s boss is going to walk through the building this Friday and critique every detail of how you live. That sounds like something that happens to reporters. Sure.
Look, loggers are famous for their beards. And most people in the news and broadcast businesses can grow beards as long as they aren’t on camera.
Enlisted folks, meanwhile, have their faces checked for stubble at 6:30 most mornings.
6. PT Formation
Speaking of which, that 6:30 formation where they’ll get destroyed for having a beard is the physical training formation, the one where they have to spread out and do a lot of pushups and situps in the cold and dark while wearing t-shirts and shorts because first sergeants have some perverse hatred of winter PTs.
All of that without a beard. It’s tragic.
7. All those extra laws
The Uniform Code of Military Justice is a major part of maintaining unit discipline, but man is it annoying to have your own set of laws on top of everyone else’s. And, some of those UCMJ articles basically just say that you have to follow all rules and regulations, which are a couple hundred extra ways to do something illegal.
A sailor who smokes or eats while walking is in violation of NAVPERS 15665I, which is backed up by articles of the UCMJ and federal law Title, U.S. Code 10. Think chowing down on a donut while walking into the office is illegal for loggers, broadcasters, or reporters?
These are unprecedented times. Two weeks ago, COVID-19 felt very far away. Monday, we all woke up to a new reality. Schools and businesses: closed. Social gatherings: canceled. Ever-increasing travel restrictions. And the term “social distancing” is already feeling like the phrase of 2020.
This is uncharted territory for all of us and we have to be willing to lend each other a hand, albeit from at least six feet away.
I am honored to lead the Military Family Advisory Network (MFAN), a national nonprofit that serves military families and advises on military family issues. Partly out of utility, MFAN is a 100% remote organization. All of our team members are military-connected, and that means we move around a lot. As a military spouse myself, it was important to me that we build an organization that could thrive regardless of where the military sent my family and other team members’ families. As a result, we have learned that an organization can be highly effective without brick and mortar, but many of those lessons were learned through trial and error. In the spirit of helping others, here’s what works for us:
MFAN has been able to achieve a feeling of closeness even though we work across multiple time zones, sometimes even from other continents. When new team members join our organization, they are often reluctant to pick up the phone to call someone and ask a question. Interpersonal relationships and team cohesion are essential, especially when we were dealing with a high-pressure situation. We have to be able to lean on each other without hesitation. A few strategies have helped us overcome reservations.
Schedule video conference calls.
Seeing each other can make a big difference. Set an expectation about attire for these. For MFAN, when it is an internal conversation, we are casual. When we are meeting with partners via video, we do business casual. Setting these clear expectations can help you avoid cringe-worthy moments later on.
Create a virtual water cooler.
Schedule video calls when you aren’t talking about a work agenda. MFAN has been known to host team happy hours at the end of a busy time. This allows us to connect on a personal level. During these happy hours, we talk about life, family, weekend plans, wherever the conversation brings us.
Many of our team members have children and are juggling demands outside of work. It has always been important to us that we acknowledge and accommodate that. Before the schools were closed, the 20 minutes twice per day when I was doing drop off and pick up at my daughter’s school were on the work calendar I shared with our team. When you are working in an office and you aren’t at your desk, your team members can see you. But when you’re working remotely, no one has any idea if you’re at your desk or not, so it’s important to be transparent and let others know your schedule.
Whether you realize it or not, when you’re working in an office, you take intermittent mental breaks. Maybe you stop by a colleague’s desk, refill your coffee mug, grab water, or even just walk from your desk to a conference room. You need those mental breaks when you’re working from home, too. Without them, it’s easy to become burnt out and mentally exhausted. To be honest, this is something I constantly struggle with. I regularly have days when I realize at 2 p.m. that I haven’t eaten. Don’t do what I do! Take breaks, practice self-care. Eat lunch!
Dedicate a space.
This one is especially challenging with schools and childcare facilities closed. Whenever possible, create a space in your home where you will work, and try to keep it consistent. This will allow you to set expectations for yourself and others around you that when you are in that location, you are working. Also, try to practice ergonomics.
Don’t neglect hygiene.
Yes, a perk of working from home is that you don’t necessarily have to get dressed up like you would if you were leaving the house. Having said that, practicing simple hygiene (as if you were leaving the house) can get you in the mindset for work. Shower, change your clothes, brush your teeth. This sounds ridiculous, but those of us who have been on maternity/paternity leave at some point know these habits can be the first to go. Get yourself into as much of a routine as possible — this will help you get closer to achieving normalcy in a completely abnormal time.
This is new for everyone. Be patient with yourself and others. Try to take a step back and look at the big picture. This isn’t permanent; we will come out of this. And, I am confident we will do so having learned quite a bit about ourselves, our colleagues and how we work along the way.
China’s insatiable hunger to become the apex superpower of the world, and the manner in which they do it is a threat to our way of life. For decades corporations have intentionally failed to raise the alarm to our government about the theft of intellectual property fearing an immediate cease of business with the Chinese. Corporations have silenced themselves against communist China fearing retribution and sold out the American people in the process.
Emboldened by appeasement, the regime now deliberately targets our national security apparatus to destroy us using our own technology.
Trade, our mutually beneficial common ground that our two ideologies stood on, has become the very source of tension between us. This is nothing new, China has always been an enemy of the west, quietly stealing our national treasures and sabotaging our infrastructure. There is no underhanded tactic that the People’s Republic of China won’t lower themselves to as long as it means victory for the dishonorable state. These are the 3 times China has hacked the U.S.
“For too long, the Chinese government has blatantly sought to use cyber espionage to obtain economic advantage for its state-owned industries,” said former FBI Director James B. Comey.
First time criminal charges are filed against known state actors for hacking
On May 19, 2014, The Western District of Pennsylvania (WDPA) indicted five Chinese state-sponsored hackers for targeting six American entities in the U.S. nuclear power, metals, and solar products industries. The attacks were a coordinated assault to steal state secrets that would directly benefit State-Owned Enterprises in China. The stolen data would reveal our strategies and vulnerabilities to the enemy.
The victims of these attacks on our soil were: Westinghouse Electric Co., U.S. subsidiaries of SolarWorld AG, United States Steel Corp., Allegheny Technologies Inc., the United Steel, Paper and Forestry, Rubber, Manufacturing, Energy, Allied Industrial and Service Workers International Union (USW) and Alcoa Inc.
The hackers performed a wide variety of criminal acts that include:
1 count of Conspiring to commit computer fraud and abuse.
9 counts of Accessing (or attempting to access) a protected computer without authorization to obtain information for the purpose of commercial advantage and private financial gain.
23 counts of Transmitting a program, information, code, or command with the intent to cause damage to protected computers.
29 counts of Aggravated identity theft.
30 counts of Economic espionage.
31 counts of Trade secret theft.
Another hacker related to this case wanted by the FBI
Chinese military hacked into the computer networks of major U.S. defense contractors
On July 13,2016, Su Bin, a citizen of the People’s Republic of China that was sentenced to 4 years with a ,000 fine by United States District Judge Christina A. Snyder.
Su was communicating with the Chinese military and informing them of targets and their vulnerabilities, which files to steal and how it would benefit their government. Su stole military and export-controlled data and sent the stolen data to China.
He targeted the aviation and aerospace fields in order to steal military technical data. This is particularly problematic for our armed forces because he stole data relating to the C-17 transport aircraft and fighter jets produced for the U.S. military. Su was arrested in Canada in July 2014 and extradited to the United States in February 2016.
He admitted that as part of the conspiracy, he sent e-mails to his co-conspirators with guidance regarding what persons, companies, and technologies to target during their computer intrusions. One of Su’s co-conspirators gained access to information located on computers of U.S. companies, and he emailed Su directory file listings and folders showing the data that the co-conspirator had been able to access. Su then directed his co-conspirator as to which files and folders his co-conspirator should steal.
After that, Su would contact the Second Department, General Staff Headquarters, Chinese People’s Liberation Army with translated documents and communicated their value. At this point, his intent was to sell the information for financial gain.
These are the faces of those who prey on the innocent
Department of Justice
Government backed Chinese hackers steal the identities of 78 million Americans
On May 9, 2019, an indictment was issued for several Chinese nationals who engaged in an extremely sophisticated hacking group operating from China. The illicit band of thieves targeted businesses in the United States, including a computer intrusion and data breach of Anthem Inc., a health insurance provider.
This is the most recent attack by the Chinese government against the United States. The Chinese are relentless in their disregard for the law and have shown no indication of slowing down.
“The allegations in the indictment unsealed today outline the activities of a brazen China-based computer hacking group that committed one of the worst data breaches in history.These defendants allegedly attacked U.S. businesses operating in four distinct industry sectors, and violated the privacy of over 78 million people by stealing their PII (Personal Identifiable Information).” – Assistant Attorney General Benczkowski.
The hackers used a technique called “spearfishing” where they attached links to e-mails sent to potential victims. When the links are clicked they download a type of file known as a backdoor which they can use to infiltrate the computer. Once they successfully tapped into vulnerable computers they watched the network identifying potential targets. They waited for months before striking.
…they collected the relevant files and other information from the compromised computers using software tools. The defendants then allegedly stole the data of interest by placing it into encrypted archive files and then sending it through multiple computers to destinations in China. The indictment alleges that on multiple occasions in January 2015, the defendants accessed the computer network of Anthem, accessed Anthem’s enterprise data warehouse, and transferred encrypted archive files containing PII from Anthem’s enterprise data warehouse from the United States to China. – Department of Justice
That same PII can be used to take out credit cards or loans in the name of the victims. This kind of identity theft is the most destructive, malicious, and the hardest to recover from. Attacks on innocent civilians such as this proves that the People’s Republic of China has nothing but contempt for Americans. If the Chinese continue to show apathetic targeting of our civilians during peacetime, what are they capable of doing to civilians in wartime?