A member of the “shark watch” on a Coast Guard cutter had to open fire on a shark this week to dissuade it from continuing to approach his crew mates.
When you’re out on the open ocean, even recreational activities require proper planning and safety precautions, as the crew of the Coast Guard Cutter Kimball demonstrated in dramatic photos released earlier this week.
A carefully planned swim call, or a period of recreational swimming organized by the ship’s crew, started like any other — with rescue swimmers standing by and an armed “shark watch” standing guard from an elevated position, keeping his eyes trained on the surface of the water for any signs of danger.
Crew members of the Coast Guard Cutter Kimball during a swim call (Coast Guard photo)
The Coast Guard maintains a “shark watch” or a “polar bear watch” any time crew members are in the water and there’s potential for danger posed by indigenous wildlife. This time, it was Maritime Enforcement Specialist 1st Class Samuel Cintron who was tasked with keeping a lookout for any aspiring “Jaws” star as other members of the crew got a chance to kick back and enjoy the warm Pacific water.
Maritime Enforcement Specialist 1st Class Samuel Cintron on Shark Watch (Coast Guard)
It wasn’t long before Cintron and others spotted the grey silhouette of what appeared to be a longfin mako or pelagic thresher shark approaching the swimming crew. Cintron stood ready, and as the shark closed to within 30 feet or so of the swimmers, Cintron was ordered by his chief to open fire. The gunfire likely came as a real shock to the swimmers; many of whom were not aware of the approaching shark until the shots rang out.
Cintron fired a “well-aimed burst right at/on top of the shark to protect shipmates just feet away,” according to a post on the Coast Guard’s Facebook page. It seemed to do the trick at first, only to have the shark once again turn and close with the swimming crew, who were now working to evacuate the water in a calm and organized manner. As the shark once again closed to within 30 or so feet, Cintron fired another burst.
Cintron firing on the approaching shark. (Coast Guard photo)
“ME1 fired bursts as needed to keep the shark from his shipmates with amazing accuracy. The shark would wave off with each burst but kept coming back toward our shipmates,” according to the post.
It’s important to note that bullets lose a significant amount of energy the minute they impact water. In fact, it’s common for bullets to come apart and tumble harmlessly in just a few inches of water. There was no blood in the water near the shark, and according to Coast Guard public affairs, there were no indications that the predator was injured in the altercation.
The close encounter with a shark ultimately proved harmless, with the entire crew back on board and only one reported injury (a scrape, ironically enough, right in the middle of a tattoo of shark jaws on one crew member’s leg). Still, this unusual engagement is incredibly rare. According to Military.com’s Patricia Kime, the last reported shark sighting during a Coast Guard or Navy swim call was in 2009, and no shots were fired.
“We have hundreds of years at sea between all of us and no one has seen or heard of a shark actually showing up during a swim call. This goes to show why we prepare for any and everything,” ship officials wrote.
The US Army will soon receive its first prototypes of a newly-engineered up-gunned Stryker infantry vehicle armed with a more lethal, longer-range 30mm cannon as compared with the currently installed .50-cal machine guns.
Called the Stryker Enhanced Lethality Program, the effort was implemented as a rapid-development acquisition program to better equip 9-man infantry units with combat arms to support their missions, maneuvers and ground-attacks.
“It is really about mobile protected fire power for the Infantry Brigade Combat Team. In the Combat Vehicle Modernization Plan it talks about every vehicle having an organic blend of those capabilities… mobility, protection and firepower,” Maj. Gen. David Bassett, Program Executive Officer, Ground Combat Systems, told Scout Warrior in an interview.
General Dynamics Land Systems (GDLS), which builds and engineers the new enhanced lethality Stryker vehicles, will deliver the first eight prototype vehicle in December of this year, Wendy Staiger, Stryker Program Director, GDLS, told Scout Warrior in an interview.
Compared to an existing M2 .50-cal machine gun mounted from Strykers, the new 30mm weapon is designed to improve both range and lethality for the vehicle. The new gun can fire at least twice as far as a .50-Cal, Tim Reese, Director of Strategic Planning, General Dynamics Land Systems, told Scout Warrior in an interview.
“It shoots at a rapid rate of one, three or five-round bursts when you pull the trigger,” Resse explained.
The 30mm cannon can use a proximity fuse and fire high-explosive rounds, armor piercing rounds and air burst rounds, Reese added. During live-fire testing at Fort Benning, Ga., the 30mm cannon was able to demonstrate firing ability out to ranges of 3,000 meters; this is about twice the range of existing .50-cal guns. Also, while the .50-Cal is often used as a suppressive fire “area” weapon designed to restrict enemy freedom of movement and allow troops to maneuver, the 30mm gun brings a level of precision fire to the Stryker Infantry Carrier that does not currently exist.
Dismounted infantry units are often among the first-entering “tip-of-the-spear” combat forces which at times travel to areas less-reachable by heavy armored platforms such as an Abrams tank or Bradley Fighting Vehicle. Certain terrain, bridges or enemy force postures can also make it difficult for heavier armored vehicles to maneuver on attack.
As a result, having an up-gunned, highly-mobile wheeled Stryker vehicle can massively supplement Infantry Brigade Combat Teams (IBCTs) on the move in hostile warfare circumstances, Basset explained. Also, a gun with greater range and fire-power could better allow forward-positioned infantry units to attack enemies and conduct operations with massively enhanced fire support.
“IBCTs are great in terms of getting Soldiers to the fight but they do not have that staying power unless there are combat platforms that will let them do that. They can hit targets that otherwise they would be engaging with Javelins,” Bassett said.
The new gun, to be fully operational by 2018, incorporates a number of additional innovations for Stryker Infantry Carrier Vehicles and Reconnaissance Vehicles.
“The medium cannon has a feed system with links pulling into the breach. This is a link-less feed system. The ammo is in canisters attached to the breach of the gun and rounds are pulled into the breach one at a time. It is much less prone to jamming,” Reese said. “It Uses the same firing control handle as the current machine gun and same physical display channels.
The new, more-powerful Orbital ATK XM 81330mm 30mm cannon, which can be fired from within the Stryker vehicle using a Remote Weapons Station, will first deploy with the European-based 2nd Cavalry Unit.
While US Army leaders did not, quite naturally, specify that the weapon is intended to counter Russian forces on the European continent, they do often speak candidly about Russian aggression in Ukraine and other areas. In fact, a RAND study months ago determined that the Russian military could invade and overrun the Baltic states in merely 60-hours given the small amount of NATO forces in the area. It is not surprising, given this scenario, that the Pentagon and NATO are amidst various efforts to strengthen their force posture in Europe.
It appears to be no accident that this initiative to better arm Stryker infantry carriers comes at a time when the US Army and US European Command are deliberately revving up arms, multi-national training exercises with NATO allies and armored mobility for its forces in Europe – as a direct counterbalance or deterrent to Russia’s aggressive posture in the region.
For instance, last year’s US European Command’s Dragoon Ride convoy across Europe was, among other things, designed to demonstrate the mobility, deployability and responsiveness of NATO armored forces across the European continent. There have been several additional exercises, involving US Army collaboration with Eastern European NATO allies since this convoy and many more on the immediate future.
The martial tradition, training, and dominating warrior spirit of Gurkhas means they will do things in a fight that wouldn’t occur to even the most seasoned combat veterans. Gurkhas will fight outnumbered; they will fight outgunned. They hold their positions against impossible odds and often come out on top.
One of these stories of Gurkha heroism comes from Lachhiman Gurung in Burma after he was taken by surprise when Japanese troops opened up on him and his men and lobbed some grenades into their trench. Gurung picked up two of the grenades and threw them back to the 200 Japanese soldiers waiting in the darkness.
The third grenade blew up in Gurung’s hand.
He lost a few fingers, most of his right arm, and took shrapnel in his face and leg. Partially blind, bleeding profusely, and struggling to move, Gurung did something only a Gurkha would do: he pulled his Kukri knife with his good hand, stabbed the ground, and told the Japanese in a booming voice that none of them would make it past that knife.
He then picked up his rifle — a bolt-action Lee-Enfield Mk. III — chambered a round, and invited the enemy to “come fight a Gurkha.”
With his friends dead or dying, Gurung fought for hours, firing his bolt-action Lee-Enfield with one hand and killing anyone who entered his trench. He would lie down until the Japanese were on top of his position, kill the closest one at point-blank range, chamber a new round with his left hand, and then kill the enemy’s battle buddy.
Gurung killed 31 Japanese soldiers this way, fighting until morning the next day.
At the end of the battle, he was shouting “Come and fight. Come and fight. I will kill you!”
Gurung was hospitalized through the end of the war, losing partial vision in his right eye and the use of his right arm. He was awarded the Victoria Cross, Great Britain’s highest military honor, and was the only recipient still alive when his command presented medals for the battle.
He eventually moved to the U.K. to live out his life in peace. But he reemerged in 2008 when a controversial policy revoked the rights of some Gurkha veterans who retired before 1997 to live in the country. The government said the Gurkhas failed to “demonstrate strong ties to the U.K.”
Lachhiman Gurung put on his medals rack, went over to Britain’s High Court, and made another “last stand” — this time for his fellow WWII-era Gurkhas, and he pleaded to the Court and to the Queen to be allowed to stay.
When the United States military switched from the legendary M1911 to the M9 Beretta, a lot of hell was raised, to put it mildly. The M1911 had served with American troops for nearly three-quarters of a century and it fired a .45 ACP round that had a reputation for stopping enemy troops. The 9x19mm NATO round the M9 fired was… well, not quite so potent, at least in the minds of many.
The thing is, the 9x19mm NATO is not a bad round. It fires a 124-grain full metal jacket bullet at 1,150 feet per second, producing 364 foot-pounds of energy. By comparison, the .45 ACP round sends a 230-grain full metal jacket bullet at 835 feet per second, generating 356 foot-pounds of energy.
In short, you don’t want to be hit by either round — but the 9x19mm NATO is more lethal than many would have you believe.
Metrics aside, how have these rounds actually performed? Well, that’s the real issue. Being good against ballistic gelatin or a paper target is one thing, but being effective against against the living is something else.
During fighting with the Nazis, an American officer holds the tried-and-true M1911 while fighting alongside a French partisan.
To put this matter to bed, a retired homicide detective from the Detroit area, Evan Marshall, gathered his own data on the effectiveness of different types of ammo. He computed how often a given round was able to achieve a “one-shot stop” when hitting an enemy’s torso. In his 2001 book, Stopping Power: A Practical Analysis of the Latest Handgun Ammunition, Marshall and Edwin Sanow defined a “stop” as when an aggressor collapsed before being able to carry out another aggressive act.
The M9 has served for over 30 years, but was derided by those who liked the .45 ACP punch of the M1911
(USMC photo by Lance Cpl. Todd Michalek)
His work allows us to compare the .45 ACP of the much-beloved M1911 with 9mm rounds, like the ones fired by the less-popular M9.
The legendary .45 ACP achieved a one-shot stop 62 percent of the time. That’s not bad — almost five-eighths of the time. Marshall did not have data for the 124-grain NATO round, but he did have data for a very similar 115-grain full metal jacket round in 9mm. This round achieved one-shot stops 70 percent of the time — even better.
The choice of 9mm rounds for the M17 wasn’t controversial — largely because the M9 proved very capable over three decades of service.
In short, the 9mm seems to hold its own when compared to the .45 ACP. Additionally, given that the M9 (which had a 15-round magazine) and the M17 (which has a 17-round magazine) both hold far more rounds than the M1911 (seven rounds in the magazine), it arguably gives a grunt greater firepower and a better chance of stopping the bad guy.
Aston Martin and Airbus have teamed up to create a specially designed ACH130 helicopter.
The new ACH130 represents the first helicopter Aston Martin has ever created, according to the automaker.
“[The ACH130 marries] ACH’s key values of excellence, quality and service with Aston Martin’s commitment to beauty, handcrafting and automotive art to bring a new level of aesthetics and rigorous attention to detail to the helicopter market,” Airbus wrote in a statement.
“This first application of our design practices to a helicopter posed a number of interesting challenges but we have enjoyed working through them,” Aston Martin’s VP and CCO Marek Reichman said in a statement.
Keep scrolling to see the automaker’s first helicopter:
Gen. Herbert “Hawk” Carlisle of the US Air Force recently declared a squadron of 15 unmanned F-16s operationally capable, IHS Jane’s reports.
These drone versions of the F-16, called QF-16s, will provide targets for the Air Force as it tests out new weapons capabilities of the F-35 Joint Strike Fighter.
“The QF-16 Full Scale Aerial Target will provide the next generation of combat training and testing for US warfighters,” a Boeing statement on the drones said.
While the old F-16s may seem like costly targets, the Air Force is touting them as a more realistic opponent than what was previously available, and they are economical to some extent because they’re made from older, retired F-16 airframes.
“The QF-16 will replace the existing QF-4 fleet and provide a higher-capability, fourth-generation aerial target that is more representative of today’s targets and threats,” the Boeing statement continued.
“This leap forward in airframe capabilities, combined with advanced electronic pods, will allow us to properly test and evaluate our 5th generation aircraft and weapons,” Lt. Col. Matthew Garrison, the commander of the 82nd Aerial Target Squadron at Tyndall Air Force Base in Florida, told C4ISRNET in an email.
The Afghan Army prioritized transporting captured ISIS fighters to Kabul over re-supplying one of its bases in the northern Faryab province that the Taliban had been besieging for weeks, according to a New York Times report.
The Taliban overran the base on Aug. 13, 2018.
Despite peace talks planned for September 2018 with the US State Department, the Taliban has racked up a string of victories in August 2018 against ISIS and the Afghan military.
But there was no help for the approximately 100 Afghan soldiers and border officers at a remote base in the northern Faryab province called Chinese Camp, which about 1,000 Taliban fighters had been attacking for three weeks before mounting heavier attacks in concert with the other assaults it launched across the country, the Times previously reported.
“Since 20 days we are asking for help and no one is listening,” one Afghan officer at Chinese Camp, Capt. Sayid Azam, told the Times over the phone. “Every night fighting, every night the enemy are attacking us from three sides with rockets. We don’t know what to do.”
Azam was killed on Aug. 12, 2018, the Times reported.
Before his death, Azam was apparently irate over the Afghan Army’s decision to use three helicopters to transport the ISIS captives from Jawzjan province to Kabul instead of re-supplying his base, the Times reported.
Azam said that one Army helicopter brought Chinese Camp “three sacks of rice” on Aug. 3, 2018, one day after the ISIS captives were taken to Kabul.
“Can you imagine? For 100 men?” he added.
Afghan politicians had also been taking military helicopters for their own use instead of re-supplying Chinese Camp, which angered Azam as well, the Times reported.
The Times reported that it was difficult to glean if the ISIS captives were being treated as “Prisoners or Honored Guests of the Afghan Government.”
“We lost everything to Daesh, and now the government sends helicopters for them from Kabul and brings them here and gives them rice and meat and mineral water, and provides them with security, and we are not even able to find food,” a resident of Jawzjan province, Abdul Hamid, told the Times in early August 2018.
Chinese Camp finally folded to the Taliban on Aug. 13, 2018, after dozens of Afghan soldiers and border officers were killed and several more surrendered to the Taliban.
The Afghan Defense Ministry, Resolute Support and Pentagon didn’t immediately respond to Business Insider’s request for comment.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
The M16A4 was the standard service rifle for the Marine Corps until October, 2015, when it was decided that the M4 Carbine would replace them in infantry battalions. For whatever reason, civilians tend to think the M16A4 is awesome when, in reality, it’s actually despised by a lot of Marines.
Now, the M16A4 is, by far, not the worst weapon, but it didn’t exactly live up to the expectations laid out for it. They’re accurate and the recoil is as soft as being hit in the shoulder with a peanut, so it certainly has its place. But when Marines spend a considerable amount of time in rainy or dusty environments, they’ll find it’s not the most reliable rifle.
Here are some of the major complaints Marines have about the weapon:
Hopefully it isn’t this bad.
They get rusty very easily
For a weapon that’s supposed to be used in “every clime and place,” these rifles seem to get rust like boots get married – way too quickly. This just means that you should carry some CLP and scrub it off regularly — another task to add to the pile.
Find time to clean it when you can.
(U.S. Marine Corps photo by Cpl. Richard Currier)
Cleaning is a headache
Outside of problems with rust, the chamber gets caked with carbon after firing a single magazine. This is yet another thing you’ll have to spend time cleaning. And when you break the rifle down, you’re going to find carbon has found its way into every possible small space.
Again, just keep that chamber as clean as possible.
(U.S. Army photo by Sgt. Ken Scar)
Jams are too common
If there’s a bit of dirt in the chamber, prepare for some double feeds or stove-pipe jams. This might just be the fact that many of these rifles have been worn down from participating in two separate combat theaters, but the fact remains: your gun will jam.
Have fun clearing buildings with these.
(U.S. Marine Corps photo by Sgt. Melanie Wolf)
They’re too long
An M16A4 is nearly 40″ long. For close quarters, these really aren’t the best weapons. You’ll have to find ways to adapt the rifle to the environment but, at the end of the day, it’s a pain in the ass to try and jump through a window with it.
Just take the covers off and put a grip on.
(U.S. Marine Corps photo by Sgt. Dana Beesley)
Rail covers make the hand guards slippery
You could just refrain from using covers, but without them, you run the risk of degrading your rails. With them, you won’t be able to get as steady of a group, which means your per-shot accuracy will go down slightly.
The Blackburn Buccaneer was a fast-attack jet of the Royal Navy designed to kill Russian cruisers from just above the waves with conventional and nuclear weapons in engagements lasting only a minute or so. Now, a retired oil company CEO has bought a retired Buccaneer and flies it around South Africa.
The plane was sent to the fleet in 1962 and served for over 30 years. The need for the jet came in 1952 when Russia introduced the Sverdlov-class cruisers. These were a class of cruisers valuable for defending the Russian coasts and attacking British and other carriers at night when the British would be unable to launch planes.
Britain could either build a new fleet of its own to counter Russia’s new fleets and the Sverdlov cruisers or, it could find a way to negate the new Russian assets. The British decided to build a new plane that could launch day or night, and that could quickly attack enemy ships and get away before the ship could retaliate.
This was a tall order against the Sverdlov which had cutting-edge radar and anti-aircraft weapons. British designers got around this by making the Buccaneer capable of flying just over the waves, below the radar of the enemy ships. And when they reached the target, the Buccaneers would launch their weapons in less than a minute and make their escape.
A Blackburn Buccaneer with its wings folded.
(Paul Lucas, CC BY 2.0)
The Buccaneer was supposed to eventually receive a custom-made nuclear air-to-surface missile, but actually spent most of its career carrying conventional air-to-air and air-to-surface missiles. Despite the failure to create the nuclear air-to-surface missile, the Buccaneer was equipped with nuclear free-fall bombs.
The aircraft performed plenty of training in the Cold War and were used for a number of missions, including extensive duties in Iraq during the Gulf War, but was retired in 1994 after the dissolution of the Soviet Union.
And that was where Ian Pringle came in. A successful oil businessman, Pringle had the money to scoop up a Buccaneer when it went up for sale. He had the plane transported to Thunder City, South Africa, where civilians are allowed to fly nuclear-capable aircraft.
Once there, he took lessons in how to fly the aircraft, a dangerous process. His plane was an operational one, and so it only has controls in the front seat, so his trainer had to sit in the back seat and coach him from there. If Pringle had panicked in flight, there was no way for the instructor to take over.
But Pringle figured it out, and now he races the plane low over the grass of South Africa when he can. The plane was made to allow pilots to fly just above the water, and so he can take it pretty low to the grass.
He’s one of only two civilians ever to fly the plane, though he obviously can’t fly it with missiles or bombs on board.
The Army has chosen a new semi-automatic sniper rifle, replacing the M110 which entered service in 2008.
According to reports by the Army Times, the winning rifle was the Heckler Koch G28. According to the the company’s website, the G28 is a version of the HK 417 battle rifle — itself a variation of the AR-10 rifle.
This came after a 2014 request for proposals for a more compact version of the M110. The M110 is being replaced despite the fact that it was named one of the Army’s “Best 10 Inventions” in 2007, according to M110 manufacturer Knight’s Armament website.
So, what is behind the replacement of a rifle that was widely loved by soldiers after it replaced the M24 bolt-action system? According to Military.com, it was to get something less conspicuous as a sniper rifle. The M110 is 13 inches longer than a typical M4 carbine, something an enemy sniper would be able to notice.
Being conspicuous is a good way to attract enemy fire.
The new M110A1 does provide some relief in that department, being about 2.5 inches shorter than the M110. More importantly for the grunt carrying it, it is about three pounds lighter than the M110.
Both the M110 and the M110A1 fire the NATO standard 7.62x51mm cartridge, and both feature 20-shot magazines. The Army plans to spend just under $45 million to get 3,643 M110A1s. That comes out to $12,000 a rifle, plus all the logistical and support needs for the Army, including the provision of spare parts.
The Army has long made use of semi-automatic sniper rifles. During the Vietnam War, a modified version of the M14 known as the M21 was used by the service’s snipers. One of those snipers, Adelbert Waldron, was America’s top sniper in that conflict, scoring 109 confirmed kills.
The arrest of a woman who hoodwinked her way into President Donald Trump’s Florida resort, Mar-a-Lago, with a thumb drive containing “malicious malware” has exposed flaws in the club’s security system, as the FBI reportedly launches an investigation into whether she is a Chinese spy.
Upon passing Secret Service checks, Zhang went through separate checks with Mar-a-Lago staff. They initially failed to verify that Zhang was on the guest list, but eventually let her in, thinking she was the daughter of a member also named Zhang, Ivanovich said. Zhang is a common Chinese surname.
According to Ivanovich, Zhang changed her story upon entering the property, saying she was there for an event organized by the United Nations Chinese American Association — which didn’t exist.
Upon being alerted, Secret Service agents found that Zhang had no swimsuit, and was instead carrying four cellphones, a laptop computer, a hard drive, and a thumb drive containing “malicious malware,” Ivanovich said.
Federal prosecutors in Florida have since charged her with making false statements and entering a restricted area. She is due to appear in court next week.
The FBI’s Counterintelligence Division in South Florida is now trying to figure out who Zhang is and whether she is linked to Chinese intelligence services, the Miami Herald reported. Zhang had not been known to US intelligence before March 30, 2019, the Herald said.
A spokeswoman for Yang told the Herald on April 3, 2019, that Yang “stated that she does not know the woman who was arrested at Mar-a-Lago this weekend.”
The FBI is looking into whether Yujing Zhang, the woman who bluffed her way into Mar-a-Lago, is connected to Li “Cindy” Yang, the Florida massage parlor founder accused of selling Chinese businessmen access to Trump.
Mar-a-Lago could jeopardize US national security, senators warn
March 30, 2019’s episode has exposed glaring flaws in Mar-a-Lago’s security system.
It showed that although Secret Service agents carried out physical checks on Mar-a-Lago visitors, whether or not someone gains entry to the club is down to the resort’s own security system.
In a rare statement on April 2, 2019, the Secret Service said: “The Secret Service does not determine who is invited or welcome at Mar-a-Lago; this is the responsibility of the host entity. The Mar-a-Lago club management determines which members and guests are granted access to the property.”
Security measures within the club’s grounds have appeared lax in the past. In 2017, paying member Richard DeAgazio was able to freely snap photos of the moment Trump briefed Japanese Prime Minister Shinzo Abe about a North Korean missile test over dinner.
The now-deleted Facebook post of Trump and Japanese Prime Minister Shinzo Abe at Mar-a-Lago in February 2017.
Photos of the dinner — which DeAgazio posted on Facebook before subsequently deleting them — showed the meeting being conducted in the open, in front of club members, with cellphone lights pointing toward sensitive documents.
In an April 3, 2019 letter to FBI Director Christopher Wray, Democratic Senators Chuck Schumer, Dianne Feinstein, and Mark Warner said: “The apparent ease with which Ms. Zhang gained access to the facility during the President’s weekend visit raises concerns about the system for screening visitors, including the reliance on determinations made by Mar-a- Lago employees.”
“As the White House Communications Agency and Secret Service coordinate to establish several secure areas at Mar-a-Lago for handling classified information when the President travels there, these potential vulnerabilities have serious national security implications,” they added.
Rep. Elijah Cummings, the Democratic chairman of the US House Oversight Committee, told Reuters: “I am not going to allow the president to be in jeopardy or his family,” adding that the Secret Service will brief him and his Republican co-chair Jim Jordan on the incident.
As Zhang wrestled her way into Mar-a-Lago on March 30, 2019, Trump had been golfing at a nearby resort. First Lady Melania Trump and other members of the Trump family were at the property at the time, but there is no indication that they crossed paths with Zhang.
Trump dismissed the incident as a “fluke” and said he was “not concerned at all,” according to Reuters.
“We will see what happened, where she is from, who she is, but the end result is they were able to get her,” he told senior military leaders, Reuters reported.
John Cohen, a former acting undersecretary at the Department of Homeland Security, told The New York Times that Trump’s frequent visits to the club are a “nightmare for the Secret Service.”
“A privately owned ranch where the president and his people use the location is much easier than protecting the president when he chooses to go to a private club that’s open to members that provides services to those people in exchange for a fee,” he said.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
The military has very talented photographers in the ranks, and they’re always capturing what life as a service member is like during training and at war. Here are the best military photos of the week:
A U.S. Air Force F-15E Strike Eagle fires flares during a flight in support of Operation Inherent Resolve June 21, 2017. The F-15, a component of U.S. Air Forces Central Command, supports U.S. and coalition forces working to liberate territory and people under the control of ISIS.
U.S. Air Force Col. Peter Fesler, 1st Fighter Wing commander, looks back to his wingman during his final F-22 Raptor flight over Charlottesville, Va., June 21, 2017. The Raptor is a 5th-generation fighter jet that combines stealth, supercruise, maneuverability and integrated avionics.
Soldiers of the 100th Battalion donned Ghillie suits, June 18, 2017, in preparation for their mock ambush on opposing forces during their annual training at Kahuku Training Area.
An M1A1 Abrams from Task Force Dagger plays the role of Opposing Forces at Fort Hood, Texas, to provide the 278th Armored Brigade Combat Team with a near-peer opponent during the unit’s eXportable Combat Training Capability rotation May 30 – June 21. Task Force Dagger consisted of the 116th Brigade Engineer Battalion’s forces and was supplemented by units from five other states during the exercise.
The Henry J. Kaiser-class fleet replenishment oiler USNS Yukon (T-AO 202) is underway alongside the Arleigh Burke-class guided-missile destroyer USS Kidd (DDG 100) during a replenishment-at-sea. Kidd is underway with the Nimitz Carrier Strike Group on a scheduled deployment to the western Pacific and Indian Oceans.
Sailors aboard the amphibious assault ship USS Bataan (LHD 5) prepare to participate in an M9 pistol shoot on the ship’s port aircraft elevator. The ship and its ready group are deployed in the U.S. 5th Fleet area of operations in support of maritime security operations designed to reassure allies and partners, and preserve the freedom of navigation and the free flow of commerce in the region.
Marine Special Operations School Individual Training Course students fire an M249 squad automatic weapon during night-fire training April 13, 2017, at Camp Lejeune. For the first time, U.S. Air Force Special Tactics Airmen spent three months in Marine Special Operations Command’s initial Marine Raider training pipeline, representing efforts to build joint mindsets across special operations forces.
U.S. Marines of Golf Company, 2nd Battalion, 25th Marines, 4th Marine Division, Marine Forces Reserve, exit a CH-53E from Heavy Marine Helicopter Squadron 772, 4th Marine Air Wing, MARFORRES, to perform a rehearsal for the Air Assault Course as a part of the battalion final exercise for Integrated Training Exercise 4-17 at Camp Wilson, Marine Air Ground Combat Center, Twentynine Palms, June 21, 2017. ITX is a Marine Air Ground Task Force integration training exercise featuring combined arms training events that incorporate live fire and maneuver.
A 25-foot Response Boat-Small boatcrew from Coast Guard Maritime Safety and Security Team Honolulu (91107) conducts a coastal safety and security patrol while escorting Hōkūleʻa, a Polynesian double-hulled voyaging canoe, back to Magic Island, Oahu, June 17, 2017. The Hōkūleʻa returned home after being gone for 36 months, sailing approximately 40,000 nautical miles around the world.
A member of the U.S Coast Guard Ceremonial Honor Guard’s silent drill team waits prior to performing at a sunset salute program, Tuesday, June 20, 2017, at Charlestown Navy Yard in Boston. The team performed in front of the Coast Guard Cutter Eagle as part of the festivities surrounding Sail Boston.
Its vulnerability reminded me of a conversation I had two years ago, at the Web Summit conference in Lisbon with cybersecurity investor Sergey Gribov of Flint Capital. He was talking up one of his investments, an industrial cybersecurity firm based in Israel called CyberX. Half-bored, I girded myself for his pitch. They usually go like this: “The internet is full of hackers! They want to steal your data and your money! If only companies used my company’s awesome product, we would all be safe!”
I have heard hundreds of pitches like this.
But my conversation with Gribov was different. It was … extreme. The criminals who break into the web sites of banks or chainstores and steal personal data or money are not the scariest people out there, he told me. The hackers we really ought to be worrying about are the ones trying to take entire countries offline. People who are trying to take down the internet, switch the lights off, cut the water supply, disable railways, or blow up factories.
The West’s weakness is in the older electronics and sensors that control processes in infrastructure and industry. Often these electronics were installed decades ago. The security systems controlling them are ancient or non-existent. If a hacker can gain control of a temperature sensor in a factory, he — they’re usually men — can blow the place up, or set it on fire. “The problem people don’t realise is it becomes a weapon of mass destruction. You can take down a whole country. It can be done,” he said.
And then, how do you respond? Does the country that was attacked — the one struggling to get its power grid back online — launch nukes? Probably not, he said, because “you have no idea who did it.”
“You can have a team of five people sitting in a basement and be just as devastating as WMDs,” he said. “It’s really scary. In some sense it’s a matter of time because it’s really easy.”
At the time, I discounted my conversation with Gribov. His VC fund was invested in CyberX, so he had an obvious interest in propagating the idea that the world is full of bad guys.
But in the years since we talked, two unnerving things happened.
In December 2017, three men pleaded guilty to causing the largest internet outage in history – a distributed “denial of service” attack that blacked out the web across most of the US and large chunks of Northern Europe for about 12 hours. They had disabled Dyn, a company that provides Domain Name System (DNS) services — the web’s directory of addresses, basically — to much of the internet.
“Someone is learning how to take down the Internet,” Bruce Schneier, the CTO of IBM Resilient believes
Both attacks were conducted by relatively unsophisticated actors. The Dyn attack was done by three young men who had created some software that they merely hoped would disable a competitor’s company, until it got out of control. The Mauritania attack was probably done by the government of neighbouring Sierra Leone, which was trying to manipulate local election results by crippling the media.
Three major power suppliers simultaneously taken over by hackers
Next, I talked to Nir Giller, cofounder and CTO of CyberX. He pointed me to the December 2015 blackout in Ukraine, in which three major power suppliers were simultaneously taken over by hackers. The hackers gained remote control of the stations’ dashboards, and manually switched off about 60 substations, leaving 230,000 Ukrainians in the cold and dark for six straight hours.
“It’s a new weapon,” Giller says. “It wasn’t an accident. It was a sophisticated, well-coordinated attack.”
The fact that the hackers targeted a power station was telling. The biggest vulnerabilities in Western infrastructure are older facilities, Giller believes. Factories, energy plants, and water companies all operate using machinery that is often very old. New devices and software are installed alongside the older machinery, often to control or monitor it. This is what the industrial “internet of things” looks like. Hackers don’t need to control an entire plant, the way they did in Ukraine. They only need to control an individual sensor on a single machine. “In the best-case scenario you have to get rid of a batch” of product, Giller says. “In the worst case, it’s medicine that is not supervised or produced correctly.”
CyberX has done work for the Carlsbad Desalination Plant in California. It claims to be the largest seawater desalination plant in the US. And it serves an area prone to annual droughts. Giller declined to say exactly how CyberX protects the plant but the implication of the company’s work is clear — before CyberX showed up, it was pretty easy to shut down the water supply to about 400,000 people in San Diego.
2010 was the year that cybersecurity experts really woke up to the idea that you could take down infrastructure, not just individual companies or web sites. That was the year the Stuxnet virus was deployed to take down the Iranian nuclear program.
“Stuxnet in 2010 was groundbreaking”
The principle behind Stuxnet was simple: Like all software viruses, it copied and sent itself to as many computers running Microsoft Windows as it possibly could, invisibly infecting hundreds of thousands of operating systems worldwide. Once installed, Stuxnet looked for Siemens Step7 industrial software. If it found some, Stuxnet then asked itself a question: “Is this software operating a centrifuge that spins at the exact frequency of an Iranian nuclear power plant that is enriching uranium to create nuclear weapons?” If the answer was “yes,” Stuxnet changed the data coming from the centrifuges, giving their operators false information. The centrifuges stopped working properly. And one-fifth of the Iranian nuclear program’s enrichment facilities were ruined.
“Stuxnet in 2010 was groundbreaking,” Giller says.
Groundbreaking, but extremely sophisticated. Some experts believe that the designers of Stuxnet would need access to Microsoft’s original source code — something that only a government like the US or Israel could command.
Russia is another state actor that is growing its anti-infrastructure resources. In April 2017 the US FBI and the British security services warned that Russia had seeded UK wifi routers — the little boxes that serve wireless internet in your living room — with a hack that can read all the internet traffic going through them. It’s not that Vladimir Putin wants to see what you’re looking at on Pornhub. Rather, “What they’re doing there is building capability,” says Andrew Tsonchev, the director of technology at Darktrace Industrial, a London-based cybersecurity firm that specialises in artificially intelligent, proactive security. “They’re building that and investing in that so they can launch attacks from it across the world if and when they need to.”
A simple extortion device disabled Britain’s largest employer in an afternoon
Then, in 2017, the Wannacry virus attack happened. Like Stuxnet, Wannacry also spread itself through the Microsoft Windows ecosystem. Once activated, it locked up a user’s computer and demanded a ransom in bitcoin if the user wanted their data back. It was intended as a way to extort money from people at scale. The Wannacry malware was too successful, however. It affected so many computers at once that it drew attention to itself, and was quickly disabled by a security researcher (who ironically was later accused of being the creator of yet another type of malware).
During its brief life, Wannacry became most infamous for disabling hundreds of computers used by Britain’s National Health Service, and was at one point a serious threat to the UK’s ability to deliver healthcare in some hospitals.
The fact that a simple extortion device could disable Britain’s largest employer in an afternoon did not go unnoticed. Previously, something like Stuxnet needed the sophistication of a nation-state. But Wannacry looked like something you could create in your bedroom.
A screenshot shows a WannaCry ransomware demand.
Tsonchev told Business Insider that Wannacry changed the culture among serious black-hat hackers.
“It managed to swoop across, and burn down huge sectors in different countries for a bit,” he says. “In the course of that, the shipping industry got hit. We had people like Maersk, and other shipping terminals and operators, they went down for a day or two. What happened is the ransomware managed to get into these port terminals and the harbours that control shipping … that intrigued attackers to realise that was something they could deliberately try and do that wasn’t really in their playbook at that point.”
“Oh look, we can actually start to do things like take down manufacturing plants and affect the global shipping industry”
“So this year, we see follow-on attacks specifically targeting shipping terminals and ports. They hit the Port of Barcelona and the Port of San Diego and others. That seemed to follow the methodology of the lessons learned the previous year. ‘Oh look, we can actually start to do things like take down manufacturing plants and affect the global shipping industry.’ A couple years ago they were just thinking about stealing credit card data.”
But it may have taught North Korea something more useful: You don’t need bombs to bring a nation to its knees.
Oddly, you have a role to play in making sure this doesn’t happen. The reason Russia and North Korea and Israel and the US all got such devastating results in their attacks on foreign infrastructure is because ordinary people are bad at updating the security software on their personal computers. People let their security software get old and vulnerable, and then weeks later they’re hosting Stuxnet or Wannacry or Russia’s wifi listening posts.
National security is, somehow, about “the absurdity of the mundane,” says Tsonchev. “These little annoying popups [on your computer] are actually holding the key to national security and people are just ignoring them. Individuals have a small part to play in keeping the whole country safe.”
So if you’re casting about for a New Year’s resolution right now, consider this one: Resolve to keep your phone and laptop up to date with system security software. Your country needs you.