If Kim Jong Un wanted to keep F-35s from being able to roam around his country with absolute freedom, he should have been investing in radar technology or fifth-generation fighters instead of nuclear weapons. Now, his erstwhile enemy to the South is getting some of the latest and greatest tech outside of the Marvel Cinematic Universe.
“We, on our part, have no other choice but to develop and test the special armaments to completely destroy the lethal weapons reinforced in South Korea, ” said KCNA, North Korea’s state media outlet.
KCNA says a lot of things, though. Very enthusiastically.
South Korea received its first two F-35 Joint Strike Fighters in March 2019 and will have another 38 delivered by 2021. North Korea’s air force consists of very old Soviet-built MiGs and is largely unchanged from the air force his grandfather used. It’s so bad even the North Koreans acknowledge their fleet leaves something to be desired. Now, with South Korea’s acquisition of the world’s most advanced fighter, the North may actually have to make some much-needed upgrades.
“There is no room for doubt that the delivery of ‘F-35A’, which is also called an ‘invisible lethal weapon’, is aimed at securing military supremacy over the neighboring countries in the region and especially opening a ‘gate’ to invading the North in time of emergency on the Korean peninsula,” North Korea said in a statement via KCNA.
South Korean President Moon Jae-in shakes hands with North Korean leader Kim Jong Un during their summit at the truce village of Panmunjom.
While Kim and U.S. President Donald Trump are having a very public bromance, South Korea’s President Moon Jae-in is largely left out of the media spotlight. When Trump arrived to meet with Kim at the Korean Demilitarized Zone, Moon was on the sidelines while Trump went for a walk in North Korea.
Rapprochement with the United States doesn’t extend to the South in every instance, however. The delivery of the vaunted F-35 prompted the North to issue these stunning rebukes of South Korean defense policy, calling the South “impudent and pitiful.”
“The South Korean authorities had better come to their senses before it is too late, shattering the preposterous illusions that an opportunity would come for improved inter-Korean relations if they follow in the footsteps of the United States,” said North Korea in an official statement.
Six years ago, Dutch intelligence agents reportedly infiltrated a malicious group of hackers working out an office building not far from the Kremlin. Dutch agents hacked into a security camera that monitored people entering the Moscow building, according to the Dutch newspaper de Volkskrant; they also reportedly monitored in 2016 as the hackers broke into the servers of the U.S. Democratic Party.
The hackers came to be known as APT-29 or The Dukes, or more commonly, Cozy Bear, and have been linked to Russia’s security agencies. According to the report, the Dutch findings were passed onto U.S. officials, and may have been a key piece of evidence that led U.S. authorities to conclude the Kremlin was conducting offensive cyberoperations to hack U.S. political parties during the 2016 presidential campaign.
Fast forward to 2020: the Cozy Bear hackers are back — though for those watching closely, they never really went anywhere.
British, American, and Canadian intelligence agencies on July 16 accused Cozy Bear hackers of using malware and so-called spear-phishing emails to deceive researchers at universities, private companies, and elsewhere.
The goal, the agencies said, was to steal research on the effort to create a vaccine for the disease caused by the new coronavirus, COVID-19.
“APT-29 is likely to continue to target organizations involved in COVID-19 vaccine research and development, as they seek to answer additional intelligence questions relating to the pandemic,” the British National Cyber Security Center said in a statement, released jointly with the Canadian and U.S. agencies.
“It’s totally unacceptable for Russian intelligence services to attack those who are fighting the coronavirus pandemic,” British Foreign Secretary Dominic Raab said.
Kremlin spokesman Dmitry Peskov called the accusations “unacceptable.”
“We can say only one thing: that Russia has nothing to do with these attempts,” he told reporters.
The advisory did not name which companies or organizations had been targeted, nor did it say whether any specific data was actually stolen. The head of the British National Cyber Center said the penetrations were detected in February and that there was no sign any data had actually been stolen.
The advisory did say the hackers exploited a vulnerability within computer servers to gain “initial footholds” and that they had used custom malware not publicly associated with any campaigns previously attributed to the group.
Russia’s main intelligence agencies are believed to all have offensive cybercapabilities of one sort or another.
According to researchers, the group’s origins date back to at least 2008 and it has targeted companies, universities, research institutes, and governments around the world.
The group is known for using sophisticated techniques of penetrating computer networks to gather intelligence to help guide Kremlin policymakers.
It is not, however, known for publicizing or leaking stolen information, something that sets it apart from a rival intelligence agency whose hacking and cyberoperations have been much more publicized in recent years — the military intelligence agency known widely as the GRU.
GRU hackers, known as Fancy Bear, or APT-28, have been accused of not only hacking computer systems, but also stealing and publicizing information, with an eye toward discrediting a target. U.S. intelligence agencies have accused GRU hackers of stealing documents from U.S. Democratic Party officials in 2016, and also of leaking them to the public in the run-up to the November presidential election.
“The GRU had multiple units, including Units 26165 and 74455, engaged in cyber operations that involved the staged releases of documents stolen through computer intrusions,” Special Counsel Robert Mueller wrote in a July 2018 indictment that charged 12 GRU officers. “These units conducted large-scale cyber operations to interfere with the 2016 U.S. presidential election.”
Three months later, U.S. prosecutors in Pittsburg, Pennsylvania, issued a related “Fancy Bear” indictment accusing some of the same officers of conducting a four-year hacking campaign targeting international-sport anti-doping organizations, global soccer’s governing body, the Organization for the Prohibition of Chemical Weapons, and other groups.
A GRU officer named in the Mueller indictment has also been named by German intelligence as being behind the 2015 hack of the Bundestag.
But unlike the GRU and the Fancy Bear hackers, there has never been any public identification of specific Cozy Bear hackers or criminal indictments targeting them.
The U.S.-based cybersecurity company Crowdstrike, which was the first to publicly document the infiltration of the Democratic National Committee, said in its initial report that both the Cozy Bear and the Fancy Bear hackers had penetrated the committee’s network, apparently independently of each other.
It’s not clear exactly what the motivation of the Cozy Bear hackers might be in targeting research organizations, though like many other nations, Russia is racing to develop a vaccine that would stop COVID-19, and stealing scientific data research might help give Russian researchers a leg up in the race.
Russia has reported more than 765,000 confirmed cases. Its official death toll, however, is unusually low, and a growing number of experts inside and outside the country say authorities are undercounting the fatalities.
In the past, Western intelligence and law enforcement have repeatedly warned of the pernicious capabilities of Russian state-sponsored hackers. In the United States, authorities have sought the arrest and extradition of dozens of Russians on various cybercharges around the world.
As in the Mueller indictments, U.S. authorities have used criminal charges to highlight the nexus between Russian government agencies and regular cybercriminals– and also to signal to Russian authorities that U.S. spy agencies are watching.
For example, the Mueller indictment identified specific money transfers that the GRU allegedly made using the cryptocurrency bitcoin to buy server capacity and other tools as part of its hacking campaigns.
As of last year, those efforts had not had much effect in slowing down state-sponsored hacking, not just by Russia, but also by North Korea, Iran, China, and others.
“[I]n spite of some impressive indictments against several named nation-state actors — their activities show no signs of diminishing,” Crowdstrike said in a 2019 threat report.
Gleb Pavlovsky, a Russian political consultant and former top Kremlin adviser, downplayed the Western allegations.
“We are talking about the daily activities of all secret services, especially regarding hot topics like vaccine secrets,” he told Current Time. “Of course, they are all being stolen. Of course, stealing is not good, but secret services exist in order to steal.”
In the U.S. Congress, some lawmakers signaled that the findings would add further momentum to new sanctions targeting Russia.
“It should be clear by now that Russia’s hacking efforts didn’t stop after the 2016 election,” Mark Warner, the top Democrat on the U.S. Senate Intelligence Committee, said in a statement.
Navy SEALs are all over the place. In books, at the movies, and on the news. But when they assault a target, they do so quickly and quietly, trying to get the job done before anyone realizes they’re around. Here’s how they do it.
The SEALs will plan their missions down to the finest detail and, when possible, rehearse it beforehand. They’ll review all intelligence and check all their equipment before heading out. When possible, they prefer to time their missions for early morning or late night when the U.S. military’s optical equipment gives them a major edge over the bad guys.
One of the hallmarks of the SEALs are the many cool ways they can arrive at an objective. Their name is even an acronym for sea, air, and land, the three avenues they’ll attack from. They can ride to the beach on a boat deployed from a ship or helicopter, they can parachute in, or they can even move in using clandestine submarines.
While part of the team moves to the target buildings to force entry, part of the team will split off and establish overwatch positions where they’ll keep an eye out for dangers like enemy reinforcements, people trying to escape the target building, and fighters attempting to maneuver on the other SEALs.
SEALs can’t afford to be stopped by minor things like steel doors or fortifications. They’ll go through windows, force open doors, or even blow out walls to get at their targets.
Assault through the house
Once inside, the elite sailors will go through the building and seek out their objective. SEALs train extensively on close quarters combat and urban operations, so they move quickly. As in the picture above, team members look in different directions to ensure they aren’t ambushed.
After grabbing or killing their target, it’s time to leave, or exfiltrate, the objective area. If the SEALs rode a boat in, they might take that back out to sea to link up with a Navy ship. They can also call in helicopter extractions, move out on foot, or take a swim to a rendezvous.
The government is moving to give Australia’s overseas spies extra powers to protect themselves and their operations by the use of force.
Legislation to be introduced on Nov. 29, 2018, will allow a staff member or agent of the Australian Secret Intelligence Service (ASIS) to be able to use “reasonable force” in the course of their work.
It also will enable the Foreign Minister to specify extra people, such as a hostage, who may be protected by an ASIS staffer or agent.
It is understood the changes have been discussed with the opposition and are likely to receive its support.
Foreign Minister Marise Payne says in a statement that ASIS officers often work in dangerous areas including under warlike conditions. “As the world becomes more complex, the overseas operating environment for ASIS also becomes more complex”, she says.
The provisions covering the use of force by ASIS have not undergone significant change since 2004.
“Currently, ASIS officers are only able to use weapons for self-protection, or the protection of other staff members or agents cooperating with ASIS.
R. G. Casey House houses the headquarters of the Australian Secret Intelligence Service.
(Photo by Adam Carr)
“The changes will mean officers are able to protect a broader range of people and use reasonable force if someone poses a risk to an operation”, Payne says.
“Like the existing ability to use weapons for self-defense, these amendments will be an exception to the standing prohibitions against the use of violence or use of weapons by ASIS.”
There are presently legal grey areas in relation to using force, especially the use of reasonable and limited force to restrain, detain or move a person who might pose a risk to an operation or to an ASIS staff member.
Under the amendment the use of force would only apply where there was a significant risk to the safety of a person, or a threat to security or a risk to the operational security of ASIS. Any use of force would have to be proportionate.
The government instances as an example the keeping safe of an uncooperative person from a source of immediate danger during an ASIS operation, including by removing them from the danger.
A court order just halted the Trump administration’s plans to revert the Department of Defense personnel policy on transgender troops implemented by President Barack Obama. The ruling has the effect of keeping the order in place while the case is argued.
According to a report by the Washington Times, U.S. District Court Judge Colleen Kollar-Kotelly, who was appointed to the United States District Court for the District of Columbia by President Bill Clinton in 1997, wrote a 76-page ruling issuing the injunction. The ruling nullified President Trump’s memo from Aug. 25. The memo followed up on a tweet by the President from July.
“The Court finds that a number of factors—including the sheer breadth of the exclusion ordered by the directives, the unusual circumstances surrounding the President’s announcement of them, the fact that the reasons given for them do not appear to be supported by any facts, and the recent rejection of those reasons by the military itself — strongly suggest that Plaintiffs’ Fifth Amendment claim is meritorious,” Judge Kollar-Kotelly wrote in the opinion striking down the ban on future accessions and retention of transgender troops.
The ruling drew fire from Elaine Donnelly, the president of the Center for Military Readiness. Donnelly said that the judge in the case was acting as “supreme judicial commander of the military.” She argues that the issue of whether transgender individuals can serve in the military was not about civil rights, but was “a national security issue.”
“The United States Supreme Court has on numerous occasions upheld or issued decisions based on deference to the Congress of the United States, which has the power to make policy, and the Executive Branch which implements policy,” she explained.
Being a commo guy doesn’t afford too many opportunities to do fun stuff. Sure, there are the radio operators who are right on the heels of the platoon leader but, nine times out of ten, they’re stuck sitting by the radio in either the vehicle or operations center.
Hours are spent just waiting, listening to a tiny speaker in case anything goes on. You can’t do anything else — you’re just sitting there. If you’re monitoring comms at 0400 and there’s no mission going on, you’re still stuck there. And, of course, the one moment you decide to close your eyes longer than a blink, sh*t gets real.
It’s not all boredom, though. Some of the things you hear over the net make it all worthwhile.
Don’t worry. No one blames you.
(U.S. Army photo by Pfc. Cameron Boyd)
Troops screwing off
When radio operators are certain that no one is listening, they’ll drop all radio etiquette. Suddenly, everyone will just start making jokes to one another. It’s not uncommon to hear a guy in one of the guard towers bluntly ask, “when the f*ck is that chow coming?”
Because, apparently, wars aren’t won by troops with filthy mouths
(U.S. Army photo by Master Sgt. Kap Kim)
Ops Sgt. Major scolding fools
Despite the point above, you’re never completely clear to openly talk like you would on a cell phone. If you try, you’re likely to get a stern reminder from whoever is in the ops center to “please maintain proper radio etiquette.”
If you’re unlucky and the S-3 Sergeant Major is that one that catches you, they’re going to knife-hand you so hard through the hand mic that you’ll start standing at parade rest on-mission. Technically, they break that “oh so precious” radio etiquette when chewing someone out, but no one ever calls them out for it. Probably because it’s damn funny to hear.
“Sir, you want us to what? Are you out of your fu… Roger, out,” said every NCO ever.
(U.S. Army photo by Pfc. Cameron Boyd)
There’s a perpetual pissing contest in the military. Each young-buck officer will get a wild hair up his or her ass and insist that things be done their way — regardless of whether its the best idea. This stubbornness will almost always be met by a non-commissioned officer who has the opposite idea.
It’s like witnessing the meeting between an unstoppable force and an immovable object. Thankfully, the hand mics are push-to-talk or else they’d hear us laughing our asses off.
Totally worth it to blast Toto’s ‘Africa’ over and over again.
(U.S. Marine Corps photo by Sgt. Josh Cox)
There always seems to be one or two commo guys who figure out how to play music over the net. Some will just hold the tunes right up to the mouthpiece while others will figure out how to splice a W-4 with an auxiliary cord. I’m not going to tell you outright how to do it, but open up a manual and learn which prong connects to outgoing voice — there’s your head start.
Regardless, it’s an appreciated morale boost when someone plays some good music and it turns hilarious when they playing from way out of left field.
It’s hard to say “Splash, out” without a big ol’ grin.
(U.S. Marine Corps photo by Lance Cpl. Matt Navarra)
Calls for fire
There are only two words in the military lexicon that can immediately bring excitement to everyone: “Shot, over.”
An inexplicable wave of joy comes over the platoon when a radio guy calls into the mortars, artillery, or air support. Imagine a child on Christmas morning about to open up a present that could obliterate one square kilometer of Earth — oh, boy!
Bullsh*ting is a solid 95 percent of what a lower enlisted does on any given day anyways. Why would that change if you gave them a radio?
(U.S. Army photo by Sgt. 1st Class Thea Roun Sm)
All of the smack talk
There are channels for every unit. One of them is used to talk to command back at base and others are used to communicate with the vehicles. But if you know which channels your boys are on, you can sh*t talk about everyone else not on it.
This includes people in the command, the unit, other troops, local nationals, allied forces — everyone is fair game.
It’s usually a good rule of thumb for your workout of choice to not give you nostalgic vibes. Jazzersize, step aerobics, the Thighmaster — you might remember these fondly, but you shouldn’t try to bring them back. These fitness fads didn’t actually get people fit because they hit the same muscle groups over and over with an intensity that never varied. Here’s an exception to the rule: Calisthenics, those moves you did on your high school PE test, is worth reviving. Calisthenics offer virtually everything your body needs to grow muscle, boost cardio, and improve your flexibility. And you don’t need an instruction manual to do it.
In a nutshell, calisthenics involves rudimentary fitness activities like hopping, lunging, and stretching. These exercises focus on major muscle groups like biceps and quads, but because they are full-body movements, they also engage secondary muscles for stability and balance, giving you a well-rounded workout.
Calisthenics’ major selling point, its simplicity, can also be its biggest drawback: Too much repetition of the same easy move can be boring. That’s why we’ve put together a plan that lets you mix and match moves to create a whole host of different routines.
The build-your-own calisthenics workout
Choose one move from each category, with a goal of pairing together 4 exercises to create one full circuit, which you will perform three times through for a complete workout.
(U.S. Marine Corps photo by Lance Cpl. Angelica I. Annastas)
1. Calisthenic moves for arm strength
Pushups: Drop and give us 30. That’s right, 30.
Pullups: Grabbing the overhead bar with an underhand grip, hoist your body weight skyward until you clear the bar with your head. 10 reps.
Dips: Using a set of parallel bars, place a hand on either bar, palms facing in, and straighten arms until your feet are off the floor and your body is suspended in the air. Bend elbows and lower yourself down toward the floor without touching. Straight arms. Repeat 10 times.
Pulldowns: Lie with your chest directly beneath a bar or table edge. Reach up and grab the bar with an overhand grip, keeping your arms straight and body in a long straight line. Bend elbows and raise your chest toward the bar. Straighten arms back to start. 10 reps.
2. Calisthenics moves for core strength
Situps: Start the stopwatch. Do as many of this classic gut-buster as you can in 60 seconds, aiming for 40.
Plank: From an extended pushups position, drop so that your elbows are resting on the floor beneath your shoulders. Maintaining one long, straight line from your feet to your head, hold this position for 60 seconds.
Hanging knee lifts: Using a set of parallel bars with elbow rests (wrap a towel around the bars if there is no padding), place a forearm on either bar and rest your weight on it. Lift your feet off the ground and bend your knees, raising them as high to your chest as you can before straightening legs. Do not let your feet touch the floor between reps. 10 reps.
L-shape lifts: Start by hanging from the pullup bar with your arms straight. Engage your core muscles as you lift your legs in unison in front of you, keeping them straight, until they are parallel (or as close as you can get them) to the floor. Release. 6-8 reps.
3. Calisthenics moves for leg strength
Squats: Stand with feet shoulder-width apart. Bend elbows and tuck your hands to your chest as you bend your knees and squat down as if you are about to sit in a low chair. Stop when your thighs are parallel to the floor. Straight back up to the start. 12 reps.
Lunges: Stand with feet parallel, arms by your sides. Take a large step forward with your right leg, shifting your weight forward and landing with a bent right knee. Let your back left knee bend until it hovers above the floor. Push through your right foot and return to standing tall. Repeat on left side for one complete rep. 12 reps.
Leg raises: Lie with your back on the floor, legs extended. Place your hands by your sides or under the small of your back for support. Engaging your core, raise legs in unison off the floor and directly above your hips, keeping them straight. Lower back to floor. 8 reps.
Wall sit: Stand with your back to a wall. Pressing your back flat against the wall, bend your knees until your legs form a right angle and your thighs are parallel to the floor. (You will need to walk your feet forward about a foot so that your knees are directly over your toes in this position.) Hold for 90 seconds.
(U.S. Marine Corps photo by Cpl. Corey Dabney)
4. Calisthenics moves for cardio
Jumping jacks: Feet apart and together, arms overhead each time. Aim for 40 in 60 seconds.
Jump rope: Single bounce, no stopping. 60 seconds.
Burpees: Start in an extended pushup position. Push through your toes, bend your knees, and hop your feet forward so they land close to your hands. Immediately spring up vertically off the floor, arms overhead. When you land, drop back down into a crouch with your hands on the floor, and jump your feet back to the starting pushup position. 20 reps.
Long jump/High jump: Stand with feet hip-width apart. Swing your arms behind you, bend your knees, and propel your body forward as far as you can in a two-leg long jump. Immediately, bend knees deeply and jump as high as you can vertically. Repeat long/high jump sequence 10 times.
This article originally appeared on Fatherly. Follow @FatherlyHQ on Twitter.
Volunteering is gratifying for anyone and is especially so for veterans. The sense of teamwork and purpose that volunteering provides is a natural fit for military veterans. To do so alongside the civilian population to which we have returned (and sometimes are challenged to adjust to) is an opportunity to be seen as we are – a neighbor, friend or colleague. Too often, the veteran is “othered” as a population in need of service rather than able to give it.
We are still in what President Donald Trump said began as a war footing against COVID-19, the novel coronavirus that has touched many of our families, communities and economies.
Thousands, maybe hundreds of thousands, of Americans are volunteering sewing masks, filling pantries, doing childcare, errand running for the vulnerable, providing clinical and non-clinical medical support, joining tech SWAT teams, funding emergency resources, making deliveries, donating blood, providing transportation, offering free legal or financial advice, counseling and the list goes on. What can go unnoticed is that veterans are joining, if not leading, the fight against COVID-19, right next you.
According to the Corporation for National Community Service’s 2018 Volunteering in America Report, veterans give 25% more time, are 17% more likely to make a monetary donation and are 30% more likely to participate in local organizations than the civilian population.
For former military, raising our hand to meet these needs is right up our alley. For us, COVID-19 is another mission. You might not recognize us managing and distributing PPE, like National Guard veteran Fred Camacho in Wisconsin, or sewing masks to donate like U.S. Air Force veteran Darin Williams in Colorado, but we are there. Even in small ways, we are finding opportunities to serve others amid this pandemic. As for me, I organized a community service project for my daughters and other members of their YMCA camping program. Along with their friends, they made cards and drew pictures for frontline medical workers and we sent dinner along with well-wishes to local hospitals.
It might seem like a small act, but that’s the point. I am teaching my daughters to help others in whatever ways they can, no matter how small the gesture. A U.S. Navy veteran, I gave for my country, and like so many of my fellow veterans, I continue to give daily. I am #StillServing even in small ways and even when nobody is watching.
Are you a veteran that is #StillServing? Visit vfw.org/StillServing and share how you continue to answer the call to serve in ways big and small, and let’s show the world how vibrant and active America’s veterans are.
The simple yellow flag, a coiled rattlesnake, and those four famous words have been emblazoned on everything from license plates to soccer jerseys, a Metallica song to a U.S. Army Drill Sergeant Badge, waved by classic Libertarians, Tea Party Republicans, and everyone in between.
For many, the Gadsden flag embodies the spirit of America and our willingness to fight for what we believe in.
Now, looking at the flag as a meme requires a strict interpretation of the first definition and a loose one for the second. Merriam-Webster describes it as “an idea, behavior, style, or usage that spreads from person to person within a culture.” Everything about the flag screams Americana. Its rebellious spirit has been carried with it since its inception and has many variations holding onto that spirit.
As for the definition of “an amusing or interesting item (such as a captioned picture or video) or genre of items that is spread widely online especially through social media.” That came after the internet became a thing.
Benjamin Franklin is often cited as starting the joke in the Pennsylvania Gazette in 1751. At the time, the Brits didn’t have Australia as a colony, so they sent their convicts to America. Franklin suggested that Americans repay the UK by sending them rattlesnakes.
He found the snake fitting. Unlike the current idiom of “snakes in the grass,” in pre-revolution America being called that was an honor — a symbol for the underdog. Something that, if stepped on, would strike back hard.
Fun fact: Franklin supported the symbol of the rattlesnake and never mentioned turkeys on the Great Seal until much later.
The rattlesnake stuck with Franklin and the Gazette years later when he created the “Join, or Die.” cartoon. It showed the rattlesnake cut into eight parts for the eight regions of the colonies. Bear in mind, New England is one segment, Delaware is considered part of Pennsylvania, and well, sorry Georgia. Historians think it’s because they were just frontier land and didn’t count back then.
The Boston Gazette printer, Samuel Kneeland, recreated it with the phrase “Unite and Conquer” coming from the snake’s mouth. In 1774, Paul Revere modified it into the masthead of Thomas’ Boston Journal. Already we’re seeing adaptations on what Richard Dawkins describes as memetics, or the cultural evolution that determines cultural relevance and success.
The cartoon would appear all across the colonies. Uniforms, newspapers, and Georgia put the whole “not being mentioned on the most iconic revolutionary era cartoon” aside and put it on their $20 bill.
For the traditional Gadsden flag that we all know of today, an anonymous writer to the Pennsylvania Journal by the name of “An American Guesser” penned the need for the flag.
“I observed on one of the drums belonging to the Marines now raising, there was painted a Rattle-Snake, with this modest motto under it, ‘Don’t tread on me.’ As I know it is the custom to have some device on the arms of every country, I supposed this may have been intended for the arms of America.”
The anonymous writer, who many historians believe was still Franklin, continues, “She never begins an attack, nor, when once engaged, ever surrenders: She is therefore an emblem of magnanimity and true courage. … She never wounds ’till she has generously given notice, even to her enemy, and cautioned him against the danger of treading on her.”
Colonel Christopher Gadsden designed the flag and hoisted it as the personal symbol for his Marines and his flagship. Since then, the flag has been hoisted by Marines, American revolutionaries, and patriots across the nation.
The officer who’s running a massive Marine Corps and Navy war game in April that’ll test around 50 new technologies for storming beaches actually wants things to go wrong.
Navy Capt. Chris Mercer, a top tester for the service’s future concepts and technologies office, went so far as to say during a March 23 meeting with reporters: “If we don’t fail, I haven’t done my job.”
Now, before you start measuring Mercer for a new white coat with a very snug fit, think about this. With the upcoming Ship To Shore Maneuver Exploration and Experimentation Advanced Naval Technology Exercise 2017 in April, the Marines are looking to change how they carry out forced-entry operations. Forget what you saw in “The Pacific” – the renowned HBO series actually presents an outdated view on such operations. It’s not going to be sending hundreds of Higgins boats to storm a beach under heavy fire. Instead, the Marines, rather than storming a surveyed beach, will be looking for what Doug King of the Marine Corps Warfighting Laboratory called a “gap in the mangroves.”
But how will they find that gap? The answer lies in new technology – and this is what ANTX 2017 is intended to evaluate. With over 50 dynamic demonstrations planned for the 11-day exercise and another 50 static displays, ANTX 2017’s purpose is to find out what the state of today’s technology is – and to turn “unknown unknowns” into” known unknowns” or “known knowns” — to borrow from the logic former Secretary of Defense Donald Rumsfeld made popular.
“In these early stages of prototype demonstrations and experimentation, the intent is to push the envelope and take on higher risk technologies,” Mercer told We Are The Mighty. “We expect to find systems that perform well technically, but score low in the operational assessment and vice versa.”
“If everything is performing well and going exactly as planned, then we were probably not aggressive enough in our efforts to advance.”
So, that’s why Mercer is hoping to see failures during ANTX 2017 — if you don’t fail, you don’t learn.
“G.I. Joe: The Rise of Cobra” star Channing Tatum is among over 4,000 people who may have had personal information exposed on an unsecured backup drive owned by an unidentified lieutenant colonel.
According to a report by the International Business Times, the information exposed on the unsecured drive, which was able to be accessed via an internet connection, included passport numbers, social security numbers, phone numbers, security clearance levels, and completed SF86 applications for security clearances.
The drive was secured with a password when the leak was discovered by a researcher.
The information contained is considered the “holy grail” by some experts in the field of national security, the website noted. Former government officials told ZDNet that the information could be used for blackmail purposes.
SF86 forms contain information that is used to determine what sort of classified material an individual can have access to. That information includes convictions, financial information, personal or business relationships with foreign nationals, mental health history and similar information. The data breach puts the individuals at risk for identity theft and financial fraud.
Romanian hacker “Guccifer”, who is known for many cyber intrusions against the United States. (NBC News screenshot.)
The materials on the drive included the spreadsheet that had information on Tatum gathered prior to a six-day tour the actor took in Afghanistan. Other unidentified celebrities also had their contact information compromised.
Information on various probes of American officials was also compromised in the hack. Some of those probes involved allegations of abuse of power. Bank information was also on the compromised disk, as well as years of e-mails.
Both ZDNet and the International Business Times noted that the device was accessible to anyone and searchable, so it may be impossible to determine who has accessed the drive.
Marine Corps Capt. Daniel Kult, Sgt. John Dietrick and Pfc. Alexander Meinhardt, from left to right, of 1st Battalion, 6th Marine Regiment, 2nd Marine Division, II Marine Expeditionary Force, pose at Dallas/Fort Worth International Airport on May 4, 2020.
Three Marines who sprang into action to restrain a hostile and disruptive fellow passenger are now being recognized by their unit commanding officer for their bravery and quick thinking.
The incident happened Monday on a flight from Tokyo to Dallas/Fort Worth International Airport in Texas. The three North Carolina-based Marines, all assigned to 1st Battalion, 6th Marine Regiment, were Capt. Daniel Kult, Sgt. John Dietrick and Pfc. Alexander Meinhardt. They had been traveling back to the U.S. for various reasons, about halfway through a six-month Unit Deployment Program pump in Okinawa.
During the flight, according to a Marine Corps news release, a passenger barricaded himself inside one of the plane’s bathrooms and loudly began to make what officials described as threatening comments.
“While watching a movie during my flight from Japan to Texas, I started to hear screaming coming from the restroom on board,” Dietrick, an infantry assault section leader from Mechanicsville, Virginia, said in a statement. “When I took off my headphones, I heard a man sounding very distraught and screaming from the bathroom.”
The Marines then moved quickly, according to the release. While a flight attendant got the door unlocked, the three men grabbed the passenger and used flex ties to bind him. They took him back to a seat and stayed with him to make sure he remained restrained for the rest of the flight.
“I knew I had to step in when he became a danger to others and himself,” said Meinhardt, a mortarman from Sparta, Wisconsin. “I didn’t think twice about helping restrain him through the rest of the flight.”
Kult, an infantry officer from Coons Rapids, Iowa, credited the Marines’ quick, decisive actions to their training.
“We just assessed the situation and acted,” he said. “Working with the flight crew, we got the door open and from there worked together to subdue him. We didn’t take time to talk it over. We just got ready and did what we needed to help.”
In light of the episode, the plane was rerouted to the Los Angeles International Airport. The problem passenger was disembarked and sent to a mental health facility for evaluation, according to the release. The incident will be investigated by the FBI and the U.S. Attorney’s Office for the Central District of California, officials said.
Of the bravery of the three Marines, their battalion commanding officer simply said he was not surprised.
“I happen to know all three of them, two of them well, and they are all what I would call ‘men of action,'” Lt. Col. Chris Niedziocha, commander of 1/6, said in a statement. “I’m continually amazed by and grateful for the people we have in this battalion.”
It’s not the first time U.S. service members in transit have jumped into action to prevent a disaster. Perhaps most famously, a soldier and an airman traveling on a train in France in 2015 helped to avert a terror attack — and were eventually awarded honorary French citizenship in thanks for their efforts.
The “Night Wolves” have come to Slovakia and the locals are not happy about it. Also known in Eastern Europe as “Putin’s Angels,” the group is a biker gang with ties to the Kremlin. Their arrival in the country is not a welcome sight, as their presence foretells a potentially devastating future.
And seeing as Slovakia is a member of NATO, it could even spark a third world war.
Their favorites include Vladimir Putin, pictured here with “The Surgeon,” and Joseph Stalin, who is still dead.
In 2014, the group helped the Russian military annex Ukraine’s Crimean Peninsula and continue to assist pro-Russian separatists in Ukraine’s bloody, ongoing civil war. The gang’s leader, Aleksandr Zaldostanov (aka “The Surgeon”) offers his gang’s assistance to Russian Special Forces in what Slovak President Andrej Kiska calls violations of international law. The group even operates a training center just a few miles away from the fighting in Ukraine.
“The Surgeon,” named for his history in dentistry, has risen to prominence in Russia during a time when the Soviet Union evokes nostalgia among many. Zaldostanov is Russian nationalism’s brightest rising star. He, like many others, yearns for the days when Russian power meant something and decries the country’s enemies, mainly NATO and the United States.
During the Russian takeover of Ukraine, the Night Wolves operated roadblocks and stormed Ukrainian naval facilities, even going so far as to seize weapons from Ukrainian government facilities. They even received medals for their work in Sevastopol and greater Ukraine before the Russians moved in, and a medal for patriotism in the wake of the Sevastopol bike show, which was attended by Vladimir Putin himself.
In Slovakia, the gang built a compound from which to base their activities, which, in the past, have included anti-NATO rallies and three-day long protests against the Slovakian government. The building is just 60 kilometers from the Slovak capital of Bratislava.
The compound houses old tanks and armored military vehicles for a group that bills itself as a group of “harmless motorcycle lovers.”
The arrival of the Night Wolves was met by calls for the Slovakian government to forcibly remove the gang. This is in stark contrast to other visits but not for the same reasons.
When the biker gang rolled into Bosnia (without bikes – it was too cold for bikes) the locals did little more than giggle. Roughly half of that country is represented by the breakaway region known as Republika Srpska, an area that wants its independence from Bosnia and would look to Russia as a potential patron. Instead of money or arms, Putin sent the Night Wolves.
“They looked pathetic; even I am taller than they are,” ethnic Serb psychologist Srdjan Puhalo told the New York Times. He still posed with the bikers for photos in Banja Luka, the most pro-Russia city in Bosnia. Other countries have not been so receptive to the Night Wolves.
President Kiska is among those in Slovakia who want the Night Wolves’ base removed and the bikers sent packing, but it’s not the President’s call to make. The local authorities in the country insist the gang has done nothing wrong (in Slovakia, at least).