US Air Force F-22s and F-35s will soon launch and control recoverable attack drones from the cockpit of the plane to expand air-combat operations, test enemy air defenses, conduct long-range ISR, and even deliver weapons.
This fast-approaching technology, which calls upon advanced levels of autonomous navigation, is closer to reality due of DARPA’s Gremlins program which plans to break new ground by launching — and recovering — four drones from an in-flight C-130 in 2019.
Air recoverable drones, slated to become operational over just the next few years, will bring a new phase of mission options enabling longer ranges, improved sensor payloads, advanced weapons, and active command and control from the air.
“The team looked at how fifth generation aircraft systems like the F-35 and F-22 respond to threats, and how they could incorporate Gremlins in higher risk areas,” a DARPA statement said.
For years, it has been possible to launch expendable drones from the air, without needing a ground control station, provided they do not return to an aircraft. Gremlins, by contrast, is a technical effort to engineer specially configured aerial drones able to both launch and return to a host aircraft.
The program is now moving into a phase three, according to DARPA statements, which cite a new demonstration and development deal with Dynetics to execute the upcoming launch and recovery C-130 flight.
A C-130E Hercules from the 43rd Airlift Wing, Pope Air Force Base, N.C., flies over the Atlantic Ocean.
(U.S. Air Force photo by Tech. Sgt. Howard Blair)
“DARPA is progressing toward its plan to demonstrate airborne launch and recovery of multiple unmanned aerial systems, targeted for late 2019. Now in its third and final phase, the goal for the Gremlins program is to develop a full-scale technology demonstration featuring the air recovery of multiple low-cost, reusable UASs, or “Gremlins,” a DARPA announcement said in early 2018
This technology, which hinges upon higher levels of autonomous navigation, brings a wide swath of improved mission possibilities. These include much longer attack and mission reach, because drones can begin missions while in the air much closer to an objective, without having to travel longer distances from a ground location or forward operating base. Furthermore, perhaps of even greater significance, air-launched returnable drones can be equipped with more advanced sensor payloads able to conduct ISR or even attack missions.
A flight test at Yuma Proving Ground in early 2018 provided an opportunity to conduct safe separation and captive flight tests of the hard dock and recovery system.
“Early flight tests have given us confidence we can meet our objective to recover four gremlins in 30 minutes,” Scott Wierzbanowski, program manager in DARPA’s Tactical Technology Office, said in a written statement in early 2018.
Gremlins also can incorporate several types of sensors up to 150 pounds, DARPA statements said.
Maturing a full-scale operational capability for this technology has force engineers to confront a range of technical challenges, Dynetics engineers told Warrior Maven. Safely docking a returning drone aboard a moving C-130 requires an as-of-yet unprecedented level of technical sophistication.
“The key technological advance is achieving increased safety through software redundancies to be able to operate a vehicle of this size in close proximity to a C-130 and tether it to stabilize the vehicle,” Tim Keeter, Deputy Program Manager and Chief Engineer, Gremlins, Dynetics, told Warrior Maven in a 2018 interview.
Once stabilized, the drone can then be stowed safety in the cargo bay of the C-130, Keeter added.
“This certainly involves precision navigation and we need the structure of the airframe to bear the burden,” he said.
In preparation for the upcoming drone air-recovery demonstration, Dynetics conducted a safe separation flight test from a mock air vehicle.
“We are ready to fabricate,” Keeter said.
This article originally appeared on Warrior Maven. Follow @warriormaven1 on Twitter.
For three weeks in May 2020, the world speculated about the fate of Kim Jong-Un, North Korea’s Supreme Leader. Many believed he was dead, some say of either complications during surgery or of a heart attack.
None of the rumors were true, however, and why Kim left the public eye is still up for popular debate among North Korea watchers. What everyone in the know can agree on, is, that North Korea without a Kim at the helm would certainly stumble and fall. Here’s why:
They’ve been selling the Kim family for too long
According to North Korea’s propaganda machine, Kim Il-Sung (Kim Jong-Un’s grandfather and founder of North Korea), pretty much single-handedly fought the Japanese and repelled them from the Korean Peninsula during World War II. Then he rebuilt North Korea after the disastrous Korean War, which North Korea definitely did not start. North Koreans see Kim Il-Sung as so divine, they can’t believe he poops. Even with his embalmed body lying in state eternally in Pyongyang, they angled it so no one can see the massive goiter on his neck.
That hardly compares to Kim Jong-Il, whose birth on holy Mount Paektu was heralded with a double rainbow and a new star appearing in the sky.
After spending their whole lives believing the demi-god Kims come down from an Asgard-like place and protect North Korea from evil America, would anyone believe that just any ol’ bureaucrat like Choe Ryong-hae can do that? Do you even know who Choe Ryong-hae is?
It’s basically a monarchy
Kings get their power from God, who gives them a divine right to lead the country. Kims also get their power from gods, which also happen to be them. The Soviet Union, who considered its brand of communism the original communism, from which all communism should be replicated. Kim Il-Sung didn’t care for all that and decided to hand-pick his successor; his son Kim Jong-Il, creating the first communist regime that also has a ruling family.
The Kims have ruled the country for three generations, which makes their rule a dynasty. Unlike Stalin in the USSR, Kim Il-Sung extended his personality cult to his family, clearing the path for this brand of communism that seems antithetical to the idea of communism.
Let’s see Choe Ryong-hae do that.
Even when things are bad, Kim makes everything better
When Kim Jong-Il came to power in 1994 after the death of his father, Kim Il-Sung, the elder Kim had been in power since 1948. Things had been pretty good for the DPRK while Kim Il-Sung was in power. Any shortcomings in the North Korean economy were filled in by subsidies from the Soviet Union. For a time, North Korea was the superior Korea.
When the USSR fell, all that fell apart with it. With Soviet aid gone, the country experienced a wide range of supply shortages, including food. A massive famine broke out and much of the population died. Still, support for the Kims never wavered. Under Kim Jong-Il, never as beloved as his father, the country secured nuclear weapons and guaranteed independence from the Yankee scum and their southern Korean puppets. To this day Kim Jong-Il is depicted in front of waves crashing on shore in North Korean art, a symbol of steadfastness in uncertain times. Choe Ryong-hae would have been useless in such a situation.
Everything the world does only backs up their claims
Imagine being told the world was full of American bad guys who want to pound North Korea again like they did in the 1950s. You remember your grandfather’s stories of the fighting. It sounds horrible. Then perhaps one summer your family gets to go visit Kaesong, near the demilitarized zone and actually tour the DMZ. You see first hand the giant American and South Korean soldiers just staring across the border, waiting for their moment.
If ever you doubt the Kims are truly divine or are the great leaders they claim to be, you simply have to go visit the International Friendship Museum to see all of the gifts the world has brought them for their patronage. There, you can also see all the historic world leaders that came to pay homage to the Kims, including other communist leaders and even American presidents!
There are always more Kims
The dynasty doesn’t stop at Kim Jong-Un. Kim Jong-Il has another son ready for the throne. Kim Jong-Un has a living brother, who has children of his own. Even one of Kim Il-Sung’s brothers is still alive, though he will soon turn 100 years old.
But no one is more visible right now than Kim Yo-Jong, the regime’s spokesperson, who both visited the South in 2018 and has met President Donald Trump. Her voice will be the loudest for the foreseeable future.
That is, unless she gets out of line. Two Kims have already met their fate for that.
Before an aircraft is approved for mass production, it needs to pass inspection. The aircraft must get off the ground successfully, endure changing conditions while in flight, and remain workable until returning to the ground. Marine Corps test pilot Major Drury Wood Jr., considered these factors when he flew experimental and modified aircraft.
Captivated by flight after a ride in a Ford Tri-Motor, Wood enlisted in the Navy Flight Program on Dec. 8, 1942. In February 1943, he attended training in Georgia. In Flight School, he learned to fly fighter planes in preparation for aerial combat against Japan.
After graduating in April 1944, Wood was sent to California where he flew Vought Corsair planes. He soon became a replacement pilot on the USS Bennington, for which he flew bombing missions in Okinawa and the Ryukyu Islands in Japan. Wood was also among the first pilots to bomb Tokyo in the aftermath of the 1942 Doolittle Raid. For his service during the war, Wood received the Distinguished Flying Cross.
When the war ended, Wood transferred to Marine Fighter Squadron 225 in North Carolina, where he was part of a demonstration team. He also worked as a Forward Air Controller before being sent to Memphis, Tenn., to the Aviation Electronics Officers School.
After leaving the service, Wood worked as an operations officer at Camp Pendleton, Calif. He was soon called back up to active duty, and deployed to Korea in September 1950. There, he fought in the Battle of Incheon, and his squadron supported the Marine infantry divisions into battle against the Chinese in North Korea at the Battle of Chosin Reservoir in November.
In 1952, Wood attended the U.S. Navy Test Pilot School in Maryland. Upon graduating, he served there as a flight instructor and operations officer. Wood also worked with future astronaut Alan Shepard and taught John Glenn, who later became the first American to orbit the Earth.
In 1955, Wood accepted an offer from the Douglas Aircraft Company to work as a test pilot. He transferred to reserve status and then went to Edwards Air Force Base in Southern California. Wood worked with noted fighter pilots Chuck Yeager and Bud Anderson while at Edwards and tested multiple new planes.
Wood left the Douglas Aircraft Company when they began to focus more on missile testing than planes. He worked for the Northrop Grumman Corporation and the Army Test and Evaluation Center for two years before receiving an offer to fly as a test pilot for the Dornier Aircraft company in Munich, Germany, in 1964.
Wood was the only pilot to test or fly the DO 31, a military vertical and short take-off and landing transport with ten engines. He also maintains five still-standing world records in flight. He later received the German Distinguished Service Cross for his work with Dornier. Wood estimated that he flew over 150 different kinds of planes by the end of his military and test pilot career.
After returning from Germany, Wood attended Sonoma State University in California and earned a bachelor’s degree in environmental science and urban planning. He later became president of the Society of Experimental Test Pilots, which hosted the Mercury astronauts when they were awarded the Kincheloe Award for professional accomplishment in the field of test piloting. Wood also worked in an antique store, where a conversation with an Army colonel convinced him to finish his military career, so he joined the California National Guard.
When he retired from active service, Wood became active in Veterans’ organizations such as The Chosin Few and attended reunions with members of his Korean fighter squadron. He was also a member of the Royal Aeronautical Society and the Pioneers of Naval Aviation Association.
Wood was inducted into the Oregon Aviation Hall of Honor at the Evergreen Aviation Museum in 2015 and honored on the Wall of Honor at the Smithsonian Air and Space Museum in Washington, D.C. He died on Sept. 9, 2019. He was 95.
Air Force Global Strike Command has acquired its first ever aircraft, the MH-139A Grey Wolf, the command’s first major acquisition in its 10-year history. The Grey Wolf will replace the UH-1N Huey, which entered the operational Air Force during the Vietnam War in 1970. The purchase is also unique as it’s an “off the shelf” purchase of an existing airframe modified to meet military requirements.
The acquisition was contracted through Boeing during a full and open competition at a cost of .38 billion — id=”listicle-2645128599″.7 billion under budget.
Gen. Timothy Ray, AFGSC commander, named the helicopter “Grey Wolf” during a naming and unveiling ceremony at Duke Field, Florida, Dec. 19, 2019, comparing the helicopter to the wild animal that bears the same name.
The name Grey Wolf is derived from the wild species that roams the northern tier of North America, which also encompasses the intercontinental ballistic missile bases in AFGSC.
“It strikes fear in the hearts of many,” Ray said. “Its range is absolutely inherent to the ICBM fields we have.”
“As they hunt as a pack, they attack as one, they bring the force of many,” he continued. “That’s exactly how you need to approach the nuclear security mission.”
The helicopters will provide security and support for the nation’s ICBM fields which span Wyoming, Montana, North Dakota, Colorado and Nebraska in support of U.S. Strategic Command’s nuclear deterrence operations aligned with the National Defense Strategy.
Members of the 54th Helicopter Squadron fly near a missile alert facility near Minot Air Force Base, North Dakota, July 26, 2018. The 54th HS members provide swift transportation for 91st Security Forces Group defenders whenever the time arrives.
The new helicopter closes the capability gaps of the UH-1N Huey in the areas of speed, range, endurance, payload and survivability in support of the command’s ICBM missions. Other mission capabilities include civil search and rescue, airlift support, National Capital Region missions, as well as survival school and test support.
The Air Force will procure up to 84 MH-139A Grey Wolf helicopters, training devices and associated support equipment from Boeing.
According to Boeing, Grey Wolf is 50% faster than the Huey helicopters currently serving Air Force security forces. It can also fly 50% farther and carry 5,000 more pounds of cargo. Boeing says that Grey Wolf will save up to id=”listicle-2645128599″ billion in life cycle costs.
“When I think about the issue in front of us, about moving forward in nuclear deterrence, when I stare down a wave of acquisition for essentially everything we do, I hope this particular program is a harbinger of very successful stories to follow not just for our command but for the good of the nation and for the good of our allies and partners,” Ray said.
Two UH-1N Twin Hueys from the 1st Helicopter Squadron fly by the Washington Memorial, Washington D.C., Aug. 28, 2015. The helicopters flew for the Vietnam Helicopter Crew Members Association Memorial Service Flyover.
The MH-139A Grey Wolf will provide vertical airlift and support the requirements of five Air Force major commands and operating agencies: AFGSC, Air Force District of Washington, Air Education and Training Command, Air Force Materiel Command and Pacific Air Forces. AFGSC is the lead command and operational capability requirements sponsor.
AFGSC stood up Detachment 7 at Duke Field, to support testing and evaluation of the MH-139A.
Maj. Zach Roycroft, of the 413th Flight Test Squadron, climbs into the cockpit of a UH-1N helicopter in preparation for a test flight at Duke Field near Eglin Air Force Base, Fla., Sep. 16, 2019. The squadron received its first MH-139 helicopters, which will replace the UH-1N, for flight test in Dec. 2019.
Lt. Col. Mary Clark assumed command of the detachment with Brig. Gen. Andrew Gebara, AFGSC A5/8 director, presiding over the ceremony.
“I’m here to tell you, this is a big deal,” Gebara said during the ceremony. “It is hard to overstate just how much blood sweat and tears have gone into getting this helicopter into our United States Air Force (and) standing up this detachment. We are very excited in Air Force Global Strike Command. We cannot wait to get this out to the missile fields and the National Capital Region where it needs to be.”
The MH-139A Grey Wolf lands at Duke Field, Fla., Dec. 19, 2019, before its unveiling and naming ceremony. The aircraft is set to replace the Air Force’s fleet of UH-1N Huey aircraft and has capability improvements related to speed, range, endurance and payload.
The detachment received the first MH-139A helicopter during a naming and unveiling ceremony.
The detachment will work in conjunction with the 96th Test Wing’s 413th Flight Test Squadron, the Air Force’s only dedicated rotary test unit. Detachment 7 brings vital aircrew manning to the test effort and is comprised of pilots and special mission aviators.
From right, test pilots Maj. Zach Roycroft and Tony Arrington, of the 413th Flight Test Squadron, and their flight crew pose in front of a UH-1N helicopter on the Duke Field flightline near Eglin Air Force Base, Fla., after a test flight, Sep. 16, 2019. The squadron received its first MH-139 helicopters, which will replace the UH-1N, for flight test in Dec. 2019.
Currently, the unit resides in temporary administrative and hangar facilities on Duke Field. The detachment will eventually move to Malmstrom Air Force Base, Montana, to perform additional testing and evaluation of the aircraft.
“I want you all to know you are special,” Clark said, speaking to those Airmen under her charge during the ceremony. “You were selected to fly, test and field this aircraft, literally writing the book on this helicopter for aviators that will follow us for 50 years or more.”
Detachment 7 will manage four helicopters. The second aircraft is due to arrive mid-January 2020, while the third and fourth aircraft are scheduled to arrive in February.
“We’re going to put this helicopter through its paces,” Gebara said.
The UH-1Ns will continue to support five commands and numerous missions, including operational support airlift, test support and intercontinental ballistic missile security support, until the replacements are ready.
Google has long been on the forefront of new advancements in technology and products. Now, they are using their massive platform to support veterans in need.
With America quickly approaching 20 years at war, the needs of her veterans continue to rise. With the added stress of the pandemic, things are at a critical point. Post-traumatic stress diagnosis’ are rising and veteran suicides continue to dominate headlines. Google wanted to do something to combat those numbers and give back to those who served. The company began working with veteran employees as well as outside stakeholders and nonprofits to create a site dedicated to veteran resources.
“Men and women who served should be able to find help when they need it. We hope this website will provide helpful, authoritative information on mental health for veterans and their families,” Jose Castaneda, Google Spokesperson, said. It is with this in mind that the “Serving Veterans” initiative was created.
The site itself will be specifically geared toward veterans and their families. With minimal clicks, the search engine will bring them to the resources that they so desperately need. Google also formatted the site to include personal stories and videos from a broad and diverse group of veterans, which include well-known military leaders. The aim is to demonstrate that seeking help shouldn’t cause hesitation and that recovery through support can happen.
Code of Support Foundation CEO Kristina Kaufmann was thrilled with the program Google created. “The Code of Support Foundation is thrilled to see a global leader in technology like Google prioritize the needs of our nation’s veterans, their caregivers and their families with the launch of the Google for Veterans program,” she said.
The Wounded Warrior Project recently released a survey reporting that COVID-19 has significantly impacted veterans specifically, causing 52 percent to report that their mental health is even worse with the pandemic. The military itself has also stated that suicides have risen by 20 percent in 2020, which can most likely be attributed to the pandemic. All of this was fuel for Google to quickly assemble support for America’s veterans.
Recently, The Bob Woodruff Foundation shared that, “The COVID-19 pandemic creates at least three conditions: emergent trauma, loneliness due to social isolation and unplanned job or wage loss that could culminate in a “perfect storm,” threatening the mental health of many veterans.”
“We are proud partners in this effect to reach and serve more of those who served our country. This launch represents a shared commitment by Google and Code of Support to ensure veterans and their families can easily find and connect with local community-based resources for mental health, addiction, and suicide prevention at a time when these numbers are rising tragically,” Kaufmann said.
Google has put much of their focus in recent years in serving the military community with tools for transitioning and employment. This appears to be one more way for them to continue its commitment to give back to the 1 percent of America’s population that swears to defend and protect us all. By creating an easily accessible site to help veterans and their families find the support they continue to honor that commitment. One veteran at a time.
Military Saves Week kicked off at U.S. military installations worldwide on Monday.
Every year, America Saves, a non-profit foundation designed to help Americans make smarter financial choices, hosts Military Saves Week, a military oriented campaign observed aboard military installations and sponsored by various financial institutions and other organizations.
Military Saves Week focuses on helping to educate military service members and their families on healthy saving and spending habits as well as assessing their own savings status, reducing their debt, and increasing their wealth.
Military Saves Week offers events and classes across all branches of service at over 100 installations worldwide during the week. Some of the events include luncheons, workshops, youth focused savings discussions, and prizes.
SCHOFIELD BARRACKS — Military Saves Week runs from Feb. 27 to March 3. The Financial Readiness Program is offering financial counseling, classes, and other events to help service members and their families manage their money. (U.S. Army photo by Kristen Wong)
Most of the events will focus on benefits and how best to use them, with nearly every installation hosting at least one event focused on the new Blended Retirement System.
Military Saves Week works alongside the Department of Defense’s Financial Readiness Campaign.
General Dunford wrote in a memo for the chiefs of the military services on Oct. 7, 2015, in preparation for last year’s Military Saves Week:
“Military Saves Week is an opportunity for our military community to come together with federal, state, and local resources, to focus on the financial readiness of military members and their families and help them reduce debt and save their hard-earned money.”
Dunford went on to write, “We are asking our military members to commit to feasible financial goals.”
Participants in Military Saves Week are asked to sign a pledge that reads “I will help myself by saving money, reducing debt, and building wealth over time. I will help my family and my country by encouraging other Americans to Build Wealth, Not Debt.” The pledge goes on to help the participant set goals for savings, with the option to receive text message updates for savings tips and financial advice.
The Battle of Heartbreak Ridge in 1951 was supposed to be a quick win by U.S. and U.N. forces in Korea. They had just pushed the North Koreans and Chinese off of the nearby “Bloody Ridge,” and they believed the communist forces could be pushed off the ridge quickly as they’d had a limited time to dig in, but it turned into a month-long slugfest that would leave almost 30,000 dead.
Here are six heroes who ensured most of those deaths came from North Korea and China:
Pfc. Herbert K. Pililaau
(Military Sealift Command)
Pfc. Herbert K. Pililaau
Infantryman Pfc. Herbert K. Pililaau’s company was holding a key position at Pia-ri on the ridge when, after repeated attacks, the platoon was nearly out of ammo. They needed to withdraw temporarily, but the near-continuous attacks made that challenging. Pililaau volunteered to stay in position as the men near him withdrew.
Communist forces charged the lines as the rest of the company withdrew, and Pililaau fired through his automatic weapon ammo, threw hand grenades until he ran out, and then fought hand-to-hand with his fists and trench knife until he was overwhelmed. He is thought to have killed more than 40 before dying and later received a posthumous Medal of Honor.
Sgt. 1st Class Tony K. Burris was part of the 2nd Infantry Division in Korea.
(Pfc. James Cox, U.S. Army)
Sgt. 1st Class Tony K. Burris
Sgt. 1st Class Tony K. Burris was part of a series of attacks near Mundung-Ri from October 8-9, 1951. They hit an entrenched force and the attack stalled, except for Burris. Burris charged forward and hurled grenade after grenade, killing 15 and creating an opening. The next day, he spearheaded an assault on the next position.
He was hit by machine gun fire, but pressed the attack anyway. He took a second hit, but remained forward, directing a 57mm recoilless rifle team to come up. He drew fire from the enemy machine gun, allowing the team to take it out. Then, he refused medical evacuation and attacked again, taking out more machine gun emplacements before taking a mortal wound. He received a posthumous Medal of Honor.
Corpsmen assist wounded from the 7th Division at the Battle of Triangle Hill in 1952. May was from the 7th Division.
Sgt. Homer I. May
On September 1, 1951, Sgt. Homer May helped lead an assault squad against enemy positions, but the attackers encountered withering machine gun fire. The sergeant sent his men into cover and maneuvered against the guns himself and got eyes on three bunkers, and took one out with grenades.
He doubled back for more grenades and made his way back forward, taking out the other bunkers. The attack was successful, and May received the Distinguished Service Cross for his efforts. He tragically died the next day while helping fend off an enemy counterattack against the hill.
U.S. infantrymen from the 27th Infantry Regiment defend a position near Heartbreak Ridge in August, 1952.
(National Archives Records Administration)
Cpl. James E. Smith
Army Cpl. James E. Smith was manning a defensive position on September 17 as waves of enemy forces attacked. His company was able to repulse attack after attack, but ammunition dwindled and the attacking waves got closer and closer to the American lines. As it became clear that the unit would need to pull back, Smith stayed in position to cover the withdrawal.
He fired through all of his ammunition and then fought with bayonet and his bare fists until he was killed. He is thought to have downed 35 of the enemy before succumbing, earning him a posthumous Distinguished Service Cross.
French Sgt. Louis Misseri
French Army Sgt. Louis Misseri was part of an assault on September 29 against a hill that was part of Heartbreak Ridge. The French Battalion came under artillery and mortar attack but kept pressing forward. Misseri split his squad into two sections and led one of them against enemy bunkers on the hill, taking them out.
When the communist forces launched a counterattack, Misseri led the defense and, despite suffering a serious wound, hit 15 enemy soldiers with his rifle fire. He was able to reach the top of Heartbreak Ridge and remained in position until the rest of his force had withdrawn. He would later receive a Distinguished Service Cross from the U.S.
Infantrymen move to the firing line in July 1950 during fighting in Korea.
(U.S. Army Signal Corps)
Sgt. George R. Deemer
On October 10, Company F of the 2nd Battalion, 38th Infantry Regiment, was attacking Hill 800 as mortar and artillery fire rained down. Sgt. George R. Deemer went into the battle carrying a 57mm recoilless rifle. A companion helped him load and he advanced with the skirmish line, knocking out one enemy emplacement after another.
When the company took the Hill, he used the weapon to aid in the defense until he ammunition ran out. Then, he organized two machine gun teams and made three trips under fire to keep them supplied with ammunition. During the third trip, he was mortally wounded by mortar fire. He received a posthumous Distinguished Service Cross.
For the ten days immediately after you graduate Marine Corps boot camp, you’ll feel like the world’s biggest badass. That brief high comes to a crashing halt when you report to the School of Infantry. If you’re a poor crayon-eater who signed an infantry contract, you go to the Infantry Training Battalion. You’ll arrive thinking that becoming a Marine means you’ve been given superhuman abilities only to very quickly find your all-too-human limits.
There, you’ll be deprived of sleep (yet again) and you won’t be fed on a regular schedule. It’s not a fun experience, but you’ll come out the other side a better warrior, a lethal Marine. Still, that doesn’t mean we should ignore all the following reasons why the Infantry Training Battalion is terrible.
In retrospect, boot camp isn’t so bad…
(U.S. Marine Corps)
You thought boot camp was as bad as it gets…
…and you were wrong. So, so wrong. Your Drill Instructors built you up to think that earning the title of Marine was the toughest task on Earth. You used that promise to reason with yourself — nothing else will ever be this bad, right? Then you get to the School of Infantry and realize that boot camp was only the worst time of your life up until that point.
Spoiler alert: You’re not as tough as you think you are.
(U.S. Marine Corps)
You’ll show up cocky
There’s a level of pride that comes with becoming a Marine. Fresh out of boot camp, many of us take that pride a step too far and become just plain cocky. When you get to SOI, you learn the hard way the pride comes before the fall. You’re quickly put in place and realize you’re just a small detail in a much bigger picture. You are far from the toughest guy around.
You actually get some time off
West Coasters know what we’re talking about — you get your weekends, if you’re lucky enough to be spared the wrath of your Combat Instructors, that is. This sounds like a good thing, but it makes Sunday mornings unbearable. Dread sets in as you anticipate the return of the week… and your Combat Instructors.
You’re sleep deprived the entire time
In boot camp, Drill Instructors are required to allow you eight hours of sleep per night — with the exception of the Crucible. Maybe that’s a rule for Combat Instructors, too, but, if you’re a grunt, it sure as hell doesn’t seem like it is. You’ll find yourself standing in front of your wall locker at 2 a.m. wondering what the f*** you’re doing.
Combat instructors are just… scary.
(U.S. Marine Corps)
The Combat Instructors are scarier
Drill Instructors are scary at first, but you get used to them. Your Combat Instructors are plain terrifying and they never stop being that way, not even after you graduate.
You get used to them after a while.
(U.S. Marine Corps)
You eat MREs all day
Nobody likes MREs — nobody. This sucks, but it’s best to consider it training in its own right because, as a grunt, you’re going to eat a lot of them.
Still, that doesn’t make them taste any less like cardboard dog sh*t.
The options, really, are as limitless as what regular planes can carry. Here are some cool things that could be dropped from a UAV.
1. Mk 54 MAKO Lightweight Hybrid Torpedoes
The United States has deployed an anti-submarine warfare UCAV before. The QH-50 Drone Anti-Submarine Helicopter was deployed for a few years off smaller vessels before being retired. They were carrying weapons long before the CIA put Hellfires on Predators.
So, which UAVs would be using the Mk 54? The Navy’s MQ-8 Fire Scouts come to mind, but the MQ-9 Reaper and MQ-4C Triton also could do it. Seeing as both Iran and North Korea have lots of mini-subs, UAVs, with their long endurance and advanced sensor suites, could be very helpful.
2. Cluster bombs
Many of the weapons UAVs carry are precision-guided systems that are intended to reduce collateral damage as much as possible. But there are some things JDAMs and Hellfires can’t do that a cluster bomb can. Since the MQ-9 Reaper already can carry 500-pound bombs, it would seem pretty easy to add something like the CBU-100 Rockeye to its arsenal.
3. Iron Bombs
Along a similar vein, the Mk 82 iron bomb, which is the basis for the GBU-12 Paveway II laser-guided bomb and GBU-38 Joint Direct Attack Munition, would make sense for the MQ-9.
4. Advanced Precision Kill Weapon System
This is a laser-guided 70mm Hydra rocket. When it comes to reducing collateral damage, this is probably the best system one could add to the MQ-9. Furthermore, they come in pods of seven or 19. This allows the Reaper to kill a lot more targets.
5. GBU-39 Small Diameter Bomb
Sometimes, a target can be pretty far off. In this case, the Small Diameter Bomb could not only allow a MQ-9 to hit more targets, but to do so from outside the range of many air defense systems. That helps the UAV survive a fight – which will make the accountants happy.
The Marines of Hotel Company, 2nd Battalion 5th Marines had a pretty rough Vietnam deployment as they patrolled through the violent streets of Hue City. They managed to kill several enemy combatants all while sharing a few laughs — and a Da Nang lady of the night.
But did you ever think about where they all might be today?
After being the first kid on his block to get a confirmed kill, Pvt. Joker eventually finished out his tour of duty and moved to Southern California. He began dating a single mother who sold and smuggled marijuana into the country for a living.
Unfortunately, their love didn’t last more than a year or so. Joker then decided he needed another career change and became a scientist. Although his brilliance dominated the secret laboratory where he worked, one of his creations ended up escaping, prompting a massive manhunt.
This Marine machine gunner made an interesting career change after the Vietnam war ended. Apparently, the Marine Corps didn’t need his explosive trigger finger during peacetime, so Animal Mother moved onto the 1st CivDiv. After a few months of not getting into any fights, the commander of Area 51 got ahold of him and offered him an officer commission in the Air Force. He took it.
Luckily for him, aliens attacked earth, and he got to get back into the sh*t — where he belongs.
Take that you damn soda can. (Source: Screenshot from “ID4” Fox)
After helping to defeat earth’s unwanted guests, he went where the action is and joined the Navy. Eventually, he became the XO of a naval destroyer as a pandemic killed off most of the world’s population.
You probably thought Pvt. Pyle blew his brains out while sitting on a toilet after shooting his drill instructor, but you’re wrong. In fact, the bullet he shot himself with missed the brain’s vital structures, and he just suffered a skull fracture, along with a concussion.
After several hours of surgery, the doctors managed to save Pyle’s life, but he’d never be the same again. He got even crazier if you can believe that. Years later, a hot FBI agent pursued him after a string of kidnappings.
She busted him, entered his mind and found out about all the twisted sh*t he’s been thinking.
After the hot FBI agent busted him, Pyle faked his death and escaped to an island where genetically engineered dinosaurs now roam. But he got greedy and ended up getting eaten by a velociraptor.
Nobody liked him anyway.
After putting countless recruits through intense training and amusing hazing, Gunny was indeed murdered by Pvt. Pyle. But since the Marine Corps never dies, Gunny found a way to f*ck with people from beyond the grave.
Yup, you guessed it. He became a freaking ghost.
What cast of characters would you like us to track down next? Comment below.
A legendary airman and World War II veteran who upheld his oath by fighting enemies both foreign and domestic recently passed away after weeks in hospice care.
Dabney Montgomery was one of the original Tuskegee Airmen and later a bodyguard for civil rights leader Martin Luther King, Jr. He was with Dr. King from his hometown of Selma, Alabama on the famous March to Montgomery.
He was born in Selma in 1923 and was drafted into the U.S. Army Air Forces in 1943. He served as an aircraft mechanic in Southern Italy during the war.
The Tuskegee Airmen was a group of African-American servicemen in the WWII-era Army Air Corps, officially known as the 332d Fighter Group and the 477th Bombardment Group. While the nickname commonly refers to the pilots, everyone in the units are considered original Tuskegee Airmen – including cooks, mechanics, instructors, nurses, and other support personnel.
During WWII, the U.S. military was still racially segregated and remained so until 1948. The Tuskegee Airmen faced discrimination both in the Army and as civilians afterwards. All black military pilots who trained in the United States trained at Moton Field, the Tuskegee Army Airfield, and were educated at Tuskegee University.
“When I saw guys who looked like me flying airplanes, I was filled with hope that segregation would soon end,” he told the Wall Street Journalin 2015.
After the war, Montgomery tried to live the south but found the racial discrimination to be too much. He moved to New York for a time until he found he was needed elsewhere. He joined the Civil Rights Movement after seeing marchers gassed and beaten on the Pettus Bridge in Selma. He joined the protests in his hometown and protected Dr. King during the march.
The heels of Montgomery’s shoes and the tie he wore on the famous Selma to Montgomery March will be in the permanent collection at the new National Museum of African American History and Culture in Washington, D.C. when it opens on September 24.
President George W. Bush all of the Tuskegee Airmen with the Congressional Gold Medal in 2007.
Five months before the 9/11 attacks, US Secretary of Defense Donald Rumsfeld sent a memo to one of his advisers with an ominous message.
“Cyberwar,” read the subject line.
“Please take a look at this article,” Rumsfeld wrote, “and tell me what you think I ought to do about it. Thanks.”
Attached was a 38-page paper, published seven months prior, analyzing the consequences of society’s increasing dependence on the internet.
It was April 30, 2001. Optimistic investors and frenzied tech entrepreneurs were still on a high from the dot-com boom. The World Wide Web was spreading fast.
Once America’s enemies got around to fully embracing the internet, the report predicted, it would be weaponized and turned against the homeland.
The internet would be to modern warfare what the airplane was to strategic bombers during World War I.
The paper’s three authors — two PhD graduates and the founder of a cyber defense research center — imagined the damage a hostile foreign power could inflict on the US. They warned of enemies infecting computers with malicious code, and launching mass denial of service attacks that could bring down networks critical to the functioning of the American economy.
“[We] are concerned that US leadership, and other decision-makers about Internet use, do not fully appreciate the potential consequences of the current situation,” the report said. “We have built a network which has no concept whatsoever of national boundaries; in a war, every Internet site is directly on the front line. If we do not change course soon, we will pay a very high price for our lack of foresight.”
The US government had a problem on its hands and it seemed a long ways from figuring out how to handle it.
More than 17 years later, that problem seems to have only gotten worse.
Follow the money
Willie Sutton, the notorious Brooklynite who spent his life in and out of prison, once told a reporter he robbed banks because that’s where the money is. Computer hackers aren’t so different.
In 2016, hackers attacked companies in the financial services sector more than companies in any other industry, according to IBM. Over 200 million financial records were breached that year, a 937% increase from 2015. And that’s not including the incidents that were never made public.
As hackers become more sophisticated and cyber attacks more routine, New York is on notice. Home to the most valuable stock exchange on Earth, New York City is the financial capital of the world. When the market moves here, it moves everywhere.
So it was no surprise when in September 2016, Gov. Andrew Cuomo announced that the New York State Department of Financial Services (NYDFS) was gearing up to implement sweeping, first-of-their-kind cybersecurity regulations to protect the state’s financial services industry — an unprecedented move no other state or federal agency had taken anywhere in the US.
Cybersecurity in New York’s financial industry was previously governed by voluntary frameworks and suggested best practices. But the NYDFS introduced, for the first time, regulations that would be mandatory, including charging firms fines if they didn’t comply.
Maria Vullo, the state’s top financial regulator, told Business Insider that her No. 1 job is to protect New Yorkers.
“They’re buying insurance. They’re banking. They’re engaging in financial transactions. And in each of those activities, they’re providing their social security information, banking information, etc.,” she said. “The companies that are obtaining that personal information from New Yorkers must protect it as much as possible because a breach of that information is of great consequence to the average New Yorker.”
On March 1, the regulations turn a year old, although some of the rules are not yet in effect and will phase in over time.
The NYDFS oversees close to 10,000 state-chartered banks, credit unions, insurance companies, mortgage loan servicers, and other financial institutions, in addition to 300,000 insurance licensees.
The combined assets of those organizations exceed $6 trillion, according to the NYDFS — and they’re all in constant danger of being hacked.
Banks are vulnerable
In the summer of 2014, an American, two Israelis, and two co-conspirators breached a network server of JPMorgan Chase, the largest US bank.
They got hold of roughly 83 million customers’ personal information, including names, addresses, phone numbers, and email addresses.
The hackers didn’t steal any money from personal bank accounts, but that wasn’t the point.
They wanted access to a massive trove of emails that they could use for a larger, separate money scam. In just three years, that operation netted the hackers more than $100 million.
The JPMorgan hack wasn’t the end game. It was a piece of the puzzle.
The attack began with the simple theft of a JPMorgan employee’s login credentials, which were located on a server that required just one password.
Most servers with sensitive information like a person’s banking data require what’s called multi-factor, or two-factor authentication.
But JPMorgan’s security team had lapsed and failed to upgrade the server to include the dual password scheme, The New York Times reported at the time.
The attack, the breach, and the reputational damage that followed could have been avoided with tighter security. Instead, the hack went down as one of the largest thefts of customer data in US history.
“Banks are especially vulnerable,” Matthew Waxman, a professor and the co-chair at Columbia University’s Cybersecurity Center, told Business Insider. “Disruption to the information systems on which banks rely could have shockwaves throughout the financial system, undermining public confidence in banking or knocking off line the ability to engage in commercial transactions.”
That’s the kind of catastrophic damage that worried the authors cited in Defense Secretary Rumsfeld’s 2001 memo.
They weren’t only concerned about stolen email addresses and social security numbers. They were worried about the fallout from such activity.
Banking works because consumers trust the system. But what if people lose trust?
Waiting until a catastrophe
News of impending cybersecurity regulations in New York in the fall of 2016 was both welcomed and shunned.
Some companies saw it as a chance to improve their own security standards while others complained of government overreach. Some were relieved to find they wouldn’t have to make any adjustments to the way they operated. Others were overwhelmed by the heavy lifting they would have to do to comply.
How a company views the regulations depends in large part on its size. Bigger institutions with more cybersecurity professionals and more resources at their disposal tend to already have in place much of what the regulations require. Many smaller companies, which tend to be under-staffed and under-resourced, have a lot more work to do to catch up.
The only additional thing Berkshire Bank has to do is sign off on its annual compliance form, which it sends to NYDFS to prove that it’s doing everything it’s supposed to be doing.
“We actually have to do nothing [new] from a compliance standpoint,” the company’s chief risk officer Gregory Lindenmuth told Business Insider.
While several cybersecurity consultants told Business Insider they acknowledge the NYDFS rules as a positive step in the right direction, they also point to a new law in Europe as a leading example of the role government has to play in protecting individuals’ privacy rights and ensuring that companies secure consumers’ personal information.
In 2016, the European Parliament passed a law called the General Data Protection Regulation (GDPR) — landmark legislation that imposes millions of euros in fines on companies that do not adequately protect their customers’ data.
Whereas the NYDFS regulations cover just one industry in one US state, the GDPR affects companies in all industries across all 28 member states of the European Union. Companies that do not report a data breach or fail to comply with the law more generally could be fined up to €20 million or 4% of its global revenue.
Matthew Waxman, the Columbia professor, says it’s not surprising that the implementation of such a law remains far-fetched in the US.
“It’s sometimes very difficult to get the government to take action against certain threats until a catastrophe takes place,” Waxman said. “But that could change very suddenly if the banking system were knocked offline or another very major disruption to everyday life affected the lives and security of citizens on a massive scale.”
But are the deterrents strong enough?
Data protection advocates calling for stricter cybersecurity regulations in the US are generally happy about the NYDFS rules.
For the first time, a state government is taking seriously the protection of consumer data, they say. It’s giving companies in the financial sector an ultimatum: protect New Yorkers or face punishment.
But the nature of that punishment is not entirely clear.
“My big criticism of the regulations is there’s no clear consequence for non-compliance,” Tom Boyden, a cybersecurity expert who helps companies defend against cyber attacks, told Business Insider. “If companies don’t feel like there’s going to be any consequence for any action on their part, companies aren’t going to take [the regulations] seriously.”
In fact, for many companies, Boyden thinks “that’s the default position.”
Vullo, the head of the NYDFS, said she has the ability to fine companies that are not complying and is willing to exercise that authority, although how much that cost may be would depend case-by-case.
“I don’t want this to be a punitive atmosphere, but obviously if institutions are not taking this seriously, then there will be consequences,” she said. “But it’s not the objective.”
If anything, the objective is to make it clear that cyber threats are real and that New Yorkers and the companies that maintain their personal information are facing higher risks of attack.
Cybersecurity affects everyone, and Vullo said she hopes the regulations will help companies prioritize it.
“Everyone is part of our cybersecurity team,” Theresa Pratt, the chief information security officer at a private trust company in New York, told Business Insider. “It doesn’t matter what myself or my colleagues do from a technical perspective. If I have one user who clicks a bad link or answers a phisher’s question over the phone, it’s all for naught.”
New York leading the way
The new rules have far-reaching implications beyond New York. A business in the state that has a parent company based in Germany, for example, still has to comply with the regulations.
This leaves some organizations in the precarious position of having to either restructure company-wide cybersecurity practices or build an entirely new and unique security apparatus that is specific to its New York offices.
“I do think that because of the scope of some of these regulations, they’re kind of blurring the lines between countries and continents. I think we’re going to see more and more of this,” GreyCastle Security CEO Reg Harnish told Business Insider. The New York-based consulting firm is helping companies comply with the new regulations.
In the absence of leadership from the federal government on certain issues related to cybersecurity and data protection, states like New York are beginning to fill the void. Several cybersecurity experts told Business Insider that the NYDFS regulations could become a model for other industries or even policies at the national level.
In 2017, at least 42 states introduced more than 240 bills or resolutions related to various cybersecurity issues, according to the National Conference of State Legislatures. And since the NYDFS rules took effect, financial regulators in Colorado and Vermont have followed New York’s lead with cybersecurity regulations of their own.
Indeed, cyber experts have come a long way in better understanding the threats we face since Rumsfeld’s dire cyberwar memo in 2001. But 17 years on, the former secretary of defense’s concerns still seem as relevant as ever.
Perhaps the memo was a prescient warning — a warning that fell on deaf ears, but is not too late to address.
The People’s Liberation Army Air Force of China and its sister branch, the PLA Naval Air Force, operate a huge fleet of around 1,700 combat aircraft — defined here as fighters, bombers, and attack planes. This force is exceeded only by the 3,400 active combat aircraft of the U.S. military. Moreover, China operates a lot of different aircraft types that are not well known in the West.
However, most Chinese military aircraft are inspired by or copied from Russian or American designs, so it’s not too hard to grasp their capabilities if you know their origins.
The Soviet-Era Clones
The Soviet Union and Communist China were best buddies during the 1950s, so Moscow transferred plenty of technology, including tanks and jet fighters. One of the early Chinese-manufactured types was the J-6, a clone of the supersonic MiG-19, which has a jet intake in the nose. Though China built thousands of J-6s, all but a few have been retired. However, about 150 of a pointy-nosed ground-attack version, the Nanchang Q-5, remain in service, upgraded to employ precision-guided munitions.
Sino-Soviet friendship ended in an ugly breakup around 1960. But in 1962, the Soviets offered China a dozen hot, new MiG-21 fighters as part of a peace overture. Beijing rejected the overture, but kept the fighters, which were reverse-engineered into the sturdier (but heavier) Chengdu J-7. Production began slowly due to the chaos of the Cultural Revolution, but between 1978 and 2013 Chinese factories turned out thousands of the pencil-fuselage jet fighters in dozens of variants. Nearly four hundred still serve in the PLAAF and PLANAF.
The J-7 is a 1950s-era hot rod in terms of maneuverability and speed — it can keep up with an F-16 at Mach 2 — but it cannot carry much fuel or armament, and it has a weak radar in its tiny nose cone. Still, China has worked to keep the J-7 relevant. The J-7G, introduced in 2004, includes an Israeli doppler radar (detection range: thirty-seven miles) and improved missiles for beyond-visual range capabilities, as well as a digital “glass cockpit.”
These aircraft would struggle against modern, fourth-generation fighters that can detect and engage adversaries at much greater ranges, though hypothetically mass formations could attempt to overwhelm defenders with swarm attacks. Still, the J-7s allow China to maintain a larger force of trained pilots and support personnel until new designs come into service.
Another Soviet-era clone is the Xi’an H-6, a twin-engine strategic bomber based on the early-1950s era Tu-16 Badger. Though less capable than the U.S. B-52 or Russian Tu-95 Bear bombers, the air-refuelable H-6K remains relevant because it could lug heavy long-range cruise-missiles and hit naval or ground targets as far as four thousand miles from China without entering the range of air defenses. The H-6 was originally tasked with dropping nuclear weapons, but the PLAAF no longer seems interested in this role. Xi’an is reportedly developing a new H-20 strategic bomber, though there’s little information available so far.
In the mid-1960s, China began working on genuinely home-designed combat jets, leading to the Shenyang J-8 debuting in 1979. A large twin-turbojet supersonic interceptor that could attain Mach 2.2 and resembled a cross between the MiG-21 and the larger Su-15 , the J-8 lacked modern avionics and maneuverability. However, the succeeding J-8II variant (about 150 currently serving) improved on the former with an Israeli radar in a new pointy-nose cone, making it a fast but heavy weapons platform a bit like the F-4 Phantom. Around 150 are still operational.
The two-hundred-plus Xi’an JH-7 Flying Leopards, which entered service in 1992, are beefy two-seat naval-attack fighter-bombers that can lug up to twenty thousand pounds of missiles and have a top speed of Mach 1.75. Though they wouldn’t want to get in a dogfight with opposing contemporary fighters, they may not have to if they can capitalize on long-range anti-ship missiles.
The Chengdu J-10 Vigorous Dragon, by contrast, is basically China’s F-16 Fighting Falcon, a highly maneuverable, lightweight multi-role fighter leaning on fly-by-wire avionics to compensate for its aerodynamically unstable airframe. Currently dependent on Russian AL-31F turbofans, and coming several decades after the F-16 debuted, the J-10 may not seem earthshaking, but the J-10B model comes out of the box with twenty-first-century avionics such as advanced infrared search-and-track systems and a cutting-edge Active Electronically Scanned Array (AESA) radar, which cannot be said for all F-16 types. However, the fleet of 250 J-10s has suffered several deadly accidents possibly related to difficulties in the fly-by-wire system.
The Flanker Comes to China—And Stays There
After the dissolution of the Soviet Union, a Russia starved for cash and no longer concerned about ideological disputes was happy to oblige when Beijing came knocking at the door asking to buy then state-of-the-art Sukhoi Su-27 fighters, a highly maneuverable twin-engine jet comparable to the F-15 Eagle with excellent range and payload. This proved a fateful decision: today a sprawling family of aircraft derived from the Su-27 form the core of China’s modern fighter force.
After importing the initial batch of Su-27s, Beijing purchased a license to domestically build their own copy, the Shenyang J-11 — but to Russia’s dismay, began independently building more advanced models, the J-11B and D.
Moscow felt burned, but still sold seventy-six modernized ground- and naval-attack variants of the Flanker, the Su-30MKK and Su-30MK2 respectively, which parallel the F-15E Strike Eagle. Chinese designers also churned out their own derivative of the Su-30: the Shenyang J-16 Red Eagle, boasting an AESA radar, and the Shenyang J-15 Flying Shark, a carrier-based fighter based on a Russian Su-33 acquired from Ukraine. Around twenty now serve on China’s Type 001 aircraft carrier Liaoning. There’s even the J-16D, a jamming pod-equipped electronic-warfare fighter styled after the U.S. Navy’s EA-18 Growler.
The Chinese Sukhoi derivatives are theoretically on par with the fourth-generation fighters like the F-15 and F-16. However, they are saddled with domestic WS-10 turbofan engines, which have had terrible maintenance problems and difficulty producing enough thrust. Jet-engine tech remains the chief limitation of Chinese combat aircraft today. Indeed, in 2016 China purchased twenty-four Su-35s, the most sophisticated and maneuverable variant of the Flanker so far — likely to obtain their AL-41F turbofans engines.
The Stealth Fighters
In a remarkably short timeframe, China developed two distinct stealth fighter designs. Twenty Chengdu J-20s entered PLAAF service in 2017. Unlike the F-22 Raptor, designed to be the ultimate air superiority fighter, or the single-engine multirole F-35 Lightning, the J-20 is a huge twin-engine beast optimized for speed, range, and heavy weapons loads at the expense of maneuverability.
The J-20 might be suitable for surprise raids on land or sea targets — though its larger rear-aspect radar cross section could be problematic — or to sneak past enemy fighters to take out vulnerable support tankers or AWACs radar planes. Special-mission stealth fighters make sense for a country that is only just getting into the business of operating such technically demanding aircraft.
Meanwhile, the smaller, privately developed Shenyang J-31 Gyrfalcon (or FC-31) is basically a twin-engine remodeling of the F-35 Lightning — quite possibly using schematics hacked off Lockheed computers. Chinese designers may have developed an aerodynamically superior airframe by ditching elements supporting vertical-takeoff-or-landing engines. However, the J-31 probably won’t boast the fancy sensors and data fusion capabilities of the Lightning.
Currently, the J-31 appears intended for service on upcoming Type 002 aircraft carriers, and for export as a cut-price F-35 alternative. However, while there are flying Gyrfalcon prototypes with Russian engines, the type may only begin production when sufficiently reliable Chinese WS-13 turbofans are perfected.
Towards the Future
Roughly 33 percent of the PLAAF and PLANAF’s combat aircraft are old second-generation fighters of limited combat value against peer opponents, save perhaps in swarming attacks. Another 28 percent include strategic bombers and more capable but dated third-generation designs. Finally, 38 percent are fourth-generation fighters that can theoretically hold their own against peers like the F-15 and F-16. Stealth fighters account for 1 percent.
However, the technical capabilities of aircraft are just half the story; at least as important are training, organizational doctrine, and supporting assets, ranging from satellite recon to air-refueling tankers, ground-based radars, and airborne command posts.
For example, China has the intel resources, aircraft, and missiles to hunt aircraft carriers. However, the doctrine and experience to link these elements together to form a kill chain is no simple matter. A 2016 Rand report alleges Chinese aviation units are scrambling to reverse a lack of training under realistic conditions and develop experience in joint operations with ground and naval forces.
At any rate, Beijing seems in no rush to replace all its older jets with new ones. Major new acquisitions may wait until the Chinese aviation industry has smoothed out the kinks in its fourth-generation and stealth aircraft.