The first female recruits at Recruit Training Command were issued their new enlisted white hats, or Dixie cups, as part of the Navy’s efforts for uniformity in service members’ uniform, April 4.
While the rest of the enlisted female E1-E6 Sailors have until Oct. 31 to begin wearing their Dixie cups, the recruits at the Navy’s only boot camp have already begun to do so as per NAVADMIN 236/15.
The Navy redesigned several uniform elements for Sailors that improve uniformity across the force as well as improve the function and fit of their uniforms. The changes will eventually make uniforms and covers more gender neutral.
“This feels incredible as we are making a part of history,” said Seaman Recruit Madeleine Bohnert, of St. Louis, Missouri, as she tried on her cover. “It’s really awesome how something as simple as our cover is so symbolic in regards to equality and the uniformity in the military. It’s a sense of pride knowing that we are a part of getting the first Dixie cups.”
During uniform issue, the female recruits lined up wearing their new covers as their Recruit Division Commanders ensured they were being properly worn.
As Engineman 2nd Class Shanice Floyd, RDC, helped adjust her recruits’ covers for proper fitting, she instructed those with longer hair in braids or buns how to make correct adjustments to accommodate the Dixie cup.
“We’re already part of a team and this just promotes it in a better way,” said Floyd. “Junior enlisted males and females already wear the same dress white uniform so this way when we get into the same dress blues uniform we’ll look more as a unit.”
The Alternative Combination Cover (ACC) and current male combination cover for officers and chief petty officers can now be worn by both men and women in service dress uniforms. All officers and chiefs will be required to wear the ACC Oct. 31.
“I am very excited to be one of the first females to be given the opportunity to wear the Dixie cup, and I believe we’ve come really far as a country and as a service,” said Seaman Recruit Maria Frazier, of Springfield, Ohio. “I think it’s really beneficial because as we work side by side, we have to work as a team. For me, it’s important that as we’re working together, we look uniform so we can work in uniform.”
The Dixie cup will match the recently redesigned Service Dress Blue uniforms in jumper style for both men and women, beginning Oct. 1.
The jumper will incorporate a side zipper and the slacks will have a front zipper to help with changing in and out of uniform. This will be the eventual end of the female version of the “crackerjack” uniform with a jacket and tie for female petty officers and junior Sailors.
“I feel that females have been performing to the standard equal to their male counterparts, and right now, with these new covers, we look more as a team,” said Floyd.
The Pentagon’s science and technology research arm is launching a vigorous push into a new level of advanced artificial intelligence, intended to integrate advanced levels of “machine learning,” introduce more “adaptive reasoning” and even help computers determine more subjective phenomena.
It is called the “AI-Next” effort, a Defense Advanced Research Projects Agency program to leverage rapid advances in AI to help train data to make computer analysis more reliable for human operators, agency Director Steven Walker recently told a small group of reporters.
DARPA scientists explain the fast-evolving AI-Next effort as improving the ability of AI-oriented technology to provide much more sophisticated “contextual explanatory models.”
While humans will still be needed in many instances, the 3rd Wave can be described as introducing a new ability to not only provide answers and interpretations, but also use “machine learning to reason in context and explain results,” DARPA Deputy Director Peter Highnam said.
In short, the AI-Next initiative, intended to evolve into a 3rd Wave, can explain the reason “why” it reached the conclusion it reached, something which offers a breakthrough level of computer-human interface, he added.
“When we talk about the 3rd wave, we are focused on contextual reasoning and adaptation. It requires less data training,” Highnam said.
This not only makes determinations more reliable but massively increases an ability to make more subjective interpretations by understanding how different words or data sets relate to one another.
A computer can only draw from information it has been fed or given, by and large. While it can add seemingly limitless amounts of data almost instantaneously, AI-driven analysis can face challenges if elements of the underlying stored data change for some reason. It is precisely this predicament which the 3rd Wave is intended to address.
“If the underlying data changes then your system was not trained against that,” Highnam explained.
For instance, 3rd wave adaptive reasoning will enable computer algorithms to discern the difference between the use of “principal” and “principle” based on an ability to analyze surrounding words and determine context.
This level of analysis naturally creates much higher levels of reliability and nuance as it can empower humans with a much deeper grasp of the detailed information they might seek.
“That is the future — building enough AI into the machines that they can actually communicate, share data and network at machine speed in real time,” Walker said.
Yet another example of emerging advanced levels of AI would be an ability to organize hours of drone collected video very quickly – and determine moments of relevance for human decision makers. This exponentially increases the speed of human decision making, a factor which could easily determine life or death in combat.
“In a warfighting scenario, humans have to trust it when the computer gives them an answer…through contextual reasoning,” Highnam said.
Given these emerging 3rd Wave advances, making more subjective decisions will increasingly be a realistic element of AI’s functional purview. For this reason and others, DARPA is working closely with the private sector to fortify collaboration with silicon valley and defense industry partners as a way to identify and apply the latest innovations.
DARPA’s 1st, 2nd & 3rd wave of AI
The third wave, described in DARPA materials as bringing “contextual explanatory models” and a much higher level of machine learning, is intended to build upon the 1st and 2nd Waves of DARPA’s previous AI progress.
The 1st Wave, according to available DARPA information, “enables reasoning over narrowly defined problems.” While it does bring certain elements of learning capability, it is described as having a “poor level of certainty.”
This points to the principle challenge of AI, namely fostering an ability to generate “trust” or reliability that the process through which it discovers new patterns, finds answers, and compares new data against volumes of historical data is accurate. Given this challenge, certain existing models of AI integration might have trouble adjusting to changing data or determining sufficient context.
The 2nd Wave enables “creating statistical models and training them on big data,” but has minimal reasoning, DARPA materials explain. This means algorithms are able to recognize new information and often place it in a broader context in relation to an existing database.
The 2nd Wave, therefore, can often determine meaning of previously unrecognized words and information by examining context and performing certain levels of interpretation. AI-enabled computer algorithms, during this phase, are able to accurately analyze words and information by placing them in context with surrounding data and concepts.
With this 2nd wave, however, DARPA scientist explain that there can be limitations regarding the reliability of interpretation and an ability to respond to new information in some instances; this can make its determinations less reliable. Highnam explained this as having less of an ability to train existing data when or if new information changes it. Therefore, this Wave is described by DARPA information as having “minimal reasoning.”
Can AI make subjective determinations?
Raytheon, for example, is currently exploring a collaborative research deal with the Navy to explore prognostics, conditioned-based maintenance and training algorithms to perform real-time analytics on otherwise complex problems. It is a 6-month Cooperative Research and Development Agreement (CRADA) to explore extensive new AI applications, company developers said.
Raytheon developers were naturally hesitant to specify any particular problems or platforms they are working on with the Navy, but did say they were looking at improved AI to further enable large warfigthing systems, weapons, and networks.
Todd Probert, Raytheon’s Vice President of Mission Support and Modernization, told Warrior Maven in an interview what their effort is working on initiatives which compliment DoD’s current AI push.
“Part of deploying AI is about gaining the confidence to trust the AI if operations change and then break it down even further,” Probert said. “We are training algorithms to do the work of humans.”
Interestingly, the kinds of advances enabled by a 3rd Wave bring the prospect of engineering AI-driven algorithms to interpret subjective nuances. For instance, things like certain philosophical concepts, emotions and psychological nuances influenced by past experience might seem to be the kind of thing computers would not be able to interpret.
While this is of course still true in many ways, as even the most advanced algorithms do not yet parallel human cognition, or emotion, in some respects, AI is increasingly able to make more subjective determinations, Probert said.
Probert explained that advanced AI is able to process certain kinds of intent, emotions, and biases through an ability to gather and organize information related to word selection, voice recognition, patterns of expression, and intonations as a way to discern more subjective phenomena.
Also, if a system has a large enough database, perhaps including prior expressions, writing or information related to new information — it can place new words, expressions and incoming data within a broader, more subjective context, Probert explained.
AI & counterterrorism – Torres AES
Other industry partners are using new levels of AI to fortify counterterrorism investigations and cyber forensics. For example, a US-based global security firm supporting DoD, the US State Dept. and friendly foreign governments, Torres Advanced Enterprise Solutions, employs advanced levels of AI to uncover otherwise obscured or hidden communications among terrorist groups, transnational criminals or other US adversaries.
While much of the details of this kind of AI application, company developers say, are naturally not available for security reasons, Torres cyber forensics experts did say advanced algorithms can find associations and “digital footprints” associated with bad actors or enemy activity using newer methods of AI.
As part of its cyber forensics training of US and US-allied counterterrorism forces, Torres prepares cyber warriors and investigators to leverage AI. Torres conducts cyber forensics training of US-allied Argentinian and Paraguayan counterrorism officials who, for instance, often look to crack down on terrorist financial activity in the more loosely-governed “tri-border” area connecting Paraguay, Argentina, and Brazil.
“The system that we train builds in AI, yet does not eliminate the human being. AI-enabled algorithms can identify direct and indirect digital relationships among bad actors,” said Jerry Torres, Torres AES CEO.
For instance, AI can use adaptive reasoning to discern relationships between locations, names, email addresses, or bank accounts used by bad actors.
To illustrate some of the effective uses of AI for these kinds of efforts, Torres pointed to a proprietary software called Maltego — used for open-source intelligence analysis and forensics.
“AI can be a great asset in which our defensive cyber systems learn about the attackers by increasing the knowledge base from each attack, and launching intelligent counter attacks to neutralize the attackers, or feign a counter attack to get the attacker to expose itself. AI is critical to countering attackers,” Torres added.
The software uses AI to find relationships across a variety of online entities to include social media, domains, groups, networks, and other areas of investigative relevance.
The growing impact of AI
AI has advanced quickly to unprecedented levels of autonomy and machine learning wherein algorithms are instantly able to assimilate and analyze new patterns and information, provide context, and compare it against vast volumes of data. Many now follow the seemingly countless applications of this throughout military networks, data systems, weapons, and large platforms.
Computer autonomy currently performs procedural functions, organizes information, and brings incredible processing speed designed to enable much faster decision-making and problems solving by humans performing command and control. While AI can proving seemingly infinite amounts of great relevance in short order — or almost instantaneously — human cognition is still required in many instances to integrate less “tangible” variables, solve dynamic problems or make more subjective determinations.
When it comes to current and emerging platforms, there is already much progress in the area of AI; the F-35s “sensor fusion” relies upon early iterations of AI, Navy Ford-Class carriers use greater levels of automation to perform on-board functions and Virginia-Class Block III attack submarines draw upon touch screen fly-by-wire technology to bring more autonomy to undersea navigation.
Other instances include the Army’s current experimentation with IBM’s AI-enabled Watson computer which, among other things, can be used to wirelessly perform real-time analytics on combat relevant maintenance details on Stryker vehicles. In a manner somewhat analogous to this, a firm called C3IOT uses AI-empowered real-time analytics to perform conditioned-based maintenance on Air Force F-16s.
“Despite higher levels of autonomy, in the end a human will make the decision, using computers as partners. We see the future as much less having machines do everything but rather humans and machines working together to fight the next battle,” Highnam explained.
This article originally appeared on Warrior Maven. Follow @warriormaven1 on Twitter.
On Sept. 3, two Soldiers were working as volunteers and representatives for the “No DUI Program” coordinated by Better Opportunities for Single Soldiers (BOSS) and received a call asking for a ride home.
Spc. Basar Bozdogan, an automated logistical specialist, and Pfc. Jacob Kranjnik, an infantryman, both assigned to the 3rd Armored Brigade Combat Team, 4th Infantry Division, immediately jumped into action and drove their government vehicle to pick up a Soldier to ensure he made it home safely.
“After approximately 15 minutes into the drive, we called the Soldier saying that we were close by,” said Kranjnik. “He told us he found another ride.”
A little disappointed, they turned around and headed home. As they were driving southbound on Highway 24 on Fountain Boulevard, they saw a wreck.
“We noticed a three-vehicle collision,” said Kranjnik. “There was no one else around or on the road. I believed that the wreck happened maybe 30 seconds before we got there.”
Bozdogan and Kranjnik quickly pulled over to see what had happened.
“We noticed one person who was helping people get out of their vehicle,” said Kranjnik. “We assisted as well. Once everyone was out of their vehicles, I looked back and noticed someone was still stuck inside. At first, I didn’t want to move him because he looked like he was injured pretty badly. Then, I noticed there were flames under the vehicle. It started to get bigger really fast. I screamed to Bozdogan and yelled that the vehicle is catching on fire.”
Bozdogan immediately recognized that there was a person in the vehicle as well.
“We didn’t want to pull the guy out of the vehicle unless we had to,” said Bozdogan.
Bozdogan and Kranjnik jumped into action, flung open the door, took the injured man’s seatbelt off, and carried him to safety.
“As we were carrying him away, the whole car caught on fire,” said Kranjnik. “If we would’ve waited longer, it would’ve been a devastating situation. He could’ve also suffered burn injuries, or even died.”
Bozdogan said everything happened for a reason.
“That man would not have had a chance if it weren’t for us. In my heart, I knew right away that I was not going to watch him burn alive. We were meant to be on that road. We were trying to prevent an accident with a Soldier and ended up saving someone else’s life that night. What are the odds?”
Bozdogan and Kranjnik did not feel like heroes. They felt like they did the humane thing to help people who were in need.
“I joined the Army to save lives here and abroad,” said Bozdogan. “It doesn’t matter where I’m at, I just have that instinct to react when I see someone who needs help. It’s not all about being a hero, it’s about making a split second decision at the right moment to ensure the safety of others.”
Bozdogan and Kranjnik, two Iron Soldiers, have been nominated for the Soldier’s Medal.
The Soldier’s Medal is the Army’s highest peacetime award for valor. According to Army Regulation 600-8-22, the directive that outlines military awards and decorations, the performance must have involved personal hazard or danger and the voluntary risk of life under conditions not involving conflict with an armed enemy.
Nowadays, you have to be cautious of everything you do online. Scammers are always trying to get money, goods or services out of unsuspecting people — and military members are often targets.
Here are some scams that have recently been affecting service members, Defense Department employees and their families.
Even the most innocuous data posted to a social media feed can be married up with other publicly available information to provide online criminals the tools they need to exploit members of the military or general public, an Army special agent said.
(Photo by Mark Herlihy)
1. Romance scams
In April 2019, Army Criminal Investigation Command put out a warning about romance scams in which online predators go on dating sites claiming to be deployed active-duty soldiers. It’s a problem that’s affecting all branches of service — not just the Army.
CID said there have been hundreds of claims each month from people who said they’ve been scammed on legitimate dating apps and social media sites. According to the alleged victims, the scammers have asked for money for fake service-related needs such as transportation, communications fees, processing and medical fees — even marriage. CID said many of the victims have lost tens of thousands of dollars and likely won’t get that money back.
Remember: Service members and government employees DO NOT PAY to go on leave, have their personal effects sent home or fly back to the US from an overseas assignment. Scammers will sometimes provide false paperwork to make their case, but real service members make their own requests for time off. Also, any official military or government emails will end in .mil or .gov — not .com — so be suspicious if you get a message claiming to be from the military or government that doesn’t have one of those addresses.
If you’re worried about being scammed, know what red flags to look for. If you think you’ve been a victim, contact the FBI Internet Crime Complaint Center and the Federal Trade Commission.
DOD officials said task forces are working to deal with the growing problem, but the scammers are often from African nations and are using cyber cafes with untraceable email addresses, then routing their accounts across the world to make them incredibly difficult to trace. So be vigilant!
A US cavalry soldiers keeps watch in a rural area near Nangarhar, Afghanistan Jan. 6, 2015.
(US Army photo)
Sexual extortion — known as “sextortion” — is when a service member is seduced into sexual activities online that are unknowingly recorded and used against them for money or goods. Often, if a victim caves on a demand, the scammer will just likely demand more.
Service members are attractive targets for these scammers for a few reasons:
• They’re often young men who are away from home and have an online presence.
• They have a steady income and are often more financially stable than civilians.
• Because of their careers, they’re held to a higher standard of conduct.
• Military members have security clearances and know things that might be of interest to adversaries.
To avoid falling victim to sextortion, don’t post or exchange compromising photos or videos with ANYONE online, and make sure your social media privacy settings limit the information outsiders can see — this includes advertising your affiliation with the military or government. Be careful when you’re communicating with anyone you don’t personally know online, and trust your instincts. If people seem suspicious, stop communicating with them.
DOD officials said sextortion often goes unreported because many victims are embarrassed they fell for it. But it happens worldwide and across all ranks and services. Here’s what you should do about it if it happens to you:
• Stop communicating with the scammer.
• Contact your command and your local CID office.
• Do NOT pay the perpetrator.
• Save all communications you had with that person.
US soldiers dislodge their M-777 155 mm howitzer from the 3-foot hole it dug itself into after firing several rocket-assisted projectiles.
(US Army photo by Spc. Ken Scar)
3. Service member impersonation scams
Scammers love to impersonate people of authority, and that includes service members.
These people often steal the identity or profile images of a service member and use them to ask for money or make claims that involve the sale of vehicles, house rentals or other big-ticket items. These scammers often send the victim bogus information about the advertised product and ask for a wire transfer through a third party to finish the purchase, but there’s no product at the end of the transaction.
Lately, fake profiles of high-ranking American military officials have been popping up on social media websites using photos and biographical information obtained from the internet. Scammers often replicate recent social media posts from official DOD accounts and interact with official accounts to increase the appearance of legitimacy. As an example, there are impersonator accounts on Facebook, Instagram and Twitter for Marine Corps Gen. Joe Dunford, the chairman of the Joint Chiefs of Staff.
These accounts are also interacting with Joint Staff account followers in an effort to gain trust and elicit information. The only Joint Staff leader with an official social media presence is Senior Enlisted Advisor to the Chairman Army Command Sgt. Maj. John Wayne Troxell, who is listed as @SEAC.JCS on Facebook and @SEAC_Troxell on Twitter.
Scammers are making these profiles to defraud potential victims. They claim to be high-ranking or well-placed government/military officials or the surviving spouse of former government leaders, then they promise big profits in exchange for help in moving large sums of money, oil or some other commodity. They offer to transfer significant amounts of money into the victim’s bank account in exchange for a small fee. Scammers that receive payment are never heard from again.
A US soldier and a US Army interpreter look over a map with an Iraqi soldier before starting a cordon and search of the Ninewa Forest in Mosul, Iraq, June 8, 2008.
(US Army photo by Pfc. Sarah De Boise)
Here are some ways to lower the chances of you being impersonated or duped by a scammer:
• To avoid having your personal data and photos stolen from your social media pages, limit the details you provide on them and don’t post photos that include your name tag, unit patch and rank.
• If an alleged official messages you with a request or demand, look closely at their social media page. Often, official accounts will be verified, meaning they have a blue circle with a checkmark right beside their Twitter, Facebook or Instagram name. General and flag officers will not message anyone directly requesting to connect or asking for money.
• Search for yourself online — both your name and images you’ve posted — to see if someone else is trying to use your identity. If you do find a false profile, contact that social media platform and report it.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
On June 10, 1940, Italian Fascist dictator Benito Mussolini brought Italy into World War II aligning with Adolf Hitler’s Nazi Germany.
Benito Amilcare Andrea Mussolini founded and led the National Fascist Party, a one-party dictatorship that ruled his totalitarian state with secret police and foreign conquests.
Hitler wanted Mussolini to mobilize as early as 1939 but Italy wasn’t entirely ready for a full-on European war – they didn’t have the materials and the Allies were considering conceding recent Italian conquests in Africa in exchange for Italy’s neutrality.
But by 1940, hopes for Italy’s neutrality were shattered. Il Duce decided to carve up Europe with Hitler. Mussolini held off a declaration of war for as long as possible, but after the German’s Wehrmacht’s swift advance into France, Italy had to commit or quit.
Four days later, Nazi stormtroopers marched through Paris. And after a total of six weeks of fighting, all of the Netherlands, Belgium, and France fell to the German war machine.
Italy’s campaign was cut short after defeats in East and North Africa, and Mussolini was ousted and arrested in 1943 after an Allied invasion of Sicily began in July of that year. The Allied success led to the collapse of the Fascist regime. On Sept. 8, 1943, Italy signed the Armistice of Cassibile, ending its war with the Allies, though the country would remain a battlefield for the rest of the war.
On Sept. 12, 1943, German paratroopers and Waffen-SS commandos rescued Mussolini from captivity during the Gran Sasso raid. Hitler placed the former dictator in charge of a puppet regime in northern Italy, causing a civil war. In April 1945, as the Axis Powers faced defeat, Mussolini attempted to flee to Switzerland but was captured by Italian communist partisans and executed by firing squad on April 28, 1945.
His body was hung upside down in the town of Milan.
Featured Image: Italian battleships in the Mediterranean Sea during World War II.
The largest infantry regiment in the British army, The Rifles are made up largely of straight infantrymen and are organized into five active-duty battalions and two reserve ones. It was established in 2007 under a larger reorganization of the British army and has deployed multiple times to Iraq and Afghanistan.
Not only are The Rifles Britain’s primary ground troops, the unit also plays an important role in ceremonial marches and events. And as the recruiting video below shows, the unit gets to do a lot of overseas training with plenty of bang bang mixed in. Mortar support, sniper ops and full-on trench warfare make up just a fraction of what The Rifles get into — not to mention rugby tournaments in the U.S. and climbing expeditions to the Alps.
“It’s hard graft, but it’s worth it,” one Rifle officer says in the video. “We work hard, and we get to play hard as well.”
The Rifles deployed for training operations in Helmand Province, Afghanistan, counterinsurgency in Basra, Iraq, and were involved in the tough fight in Sangin, Afghanistan, alongside U.S. Marines.
During a live fire training exercise in Kenya, the Brits were storming trenches, advancing on objectives and sniping targets — all with mortars flying over their heads.
“The life is definitely full-on and full of action,” another Rifleman says.
According to legend, Colorado’s Cheyenne Mountain is a sleeping dragon that many years ago saved the Ute Mountain Ute Tribe. In the Native American story, the Great Spirit punished the people by sending a massive flood, but after they repented, it sent a dragon to drink the water away. The dragon, engorged by the massive amount of water, fell asleep, was petrified and then became the mountain.
Unlike the dragon of legend, the Cheyenne Mountain Complex has never slept during 50 years of operations. Since being declared fully operational in April 1966, the installation has played a vital role in the Department of Defense during both peacetime and wartime.
Though the complex may have changed names during the past five decades, its mission has never strayed from defending the U.S. and its allies. Today, it is known as Cheyenne Mountain Air Force Station, with a primary role of collecting information from satellites and ground-based sensors throughout the world and disseminating the data to North American Aerospace Defense Command, U.S. Northern Command and U.S. Strategic Command — a process Steven Rose, Cheyenne Mountain AFS deputy director, compares to the work done by the stem of the human brain.
“Those sensors are your nerves out there sensing that information,” Rose said, “but the nerves all come back to one spot in the human body, together in the brain stem, entangled in a coherent piece. We are the brain stem that’s pulling it all together, correlating it, making sense of it, and passing it up to the brain — whether it’s the commander at NORAD, NORTHCOM or STRATCOM — for someone to make a decision on what that means. That is the most critical part of the nervous system and the most vulnerable. Cheyenne Mountain provides that shield around that single place where all of that correlation and data comes into.”
In the 1950s, the DOD decided to build the installation as a command and control center defense against long-range Soviet bombers. As the “brain stem,” it would be one of the first installations on the enemy’s target list, so it was built to withstand a direct nuclear attack.
Cheyenne Mountain’s 15 buildings rest on more than 1,300 springs, 18 inches from the mountain’s rock walls, so they could move independently in the event of a nuclear blast and the inherent seismic event. In addition, an EMP, being a natural component of a nuclear blast, was already considered in Cheyenne Mountain’s original design and construction features, Rose said.
“Back then, it was just part of the effect of a nuclear blast that we were designed for at Cheyenne Mountain,” he added. “If you fast forward 50 years from our construction, the EMP threat has become more important to today’s society because of the investment that has been made into electronics. Just by sheer coincidence, since we were designed in the 50s and 60s for a nuclear blast and its EMP component, we are sitting here today as the number one rated EMP protected facility. The uniqueness of the mountain is that the entire installation is surrounded by granite, which is a natural EMP shield.”
The station, built 7,000 feet above sea level, opened as the NORAD Combat Operations Center. When NORAD and the newly stood up NORTHCOM moved their main command center to Peterson Air Force Base in 2008, many believed Cheyenne Mountain had closed. Today, Cheyenne Mountain hosts an alternate command center for NORAD and is landlord to more than a dozen DOD agencies, such as the Defense Intelligence Agency.
“When I bring official visitors up here, not only are they surprised that we’re still open,” said Colonel Gary Cornn, Cheyenne Mountain AFS Installation Commander. “Many are impressed by the original construction, the blasting of the tunnels, how the buildings are constructed inside, and some of the things we show them, such as the survivability and capability we have in the blast valves, the springs, the way we do our air in the Nuclear, Biological and Chemical (NBC) filtering and the huge blast doors. It’s funny to see senior officers and civilians become sort of amazed like little kids again.”
The threats and sources have drastically changed from when the station opened at the height of the Cold War, but the station’s iconic 25-ton steel doors remain the same, ready to seal the mountain in 40 seconds to protect it from any threat. The underground city beneath 2,000 feet of granite still provides the protection to keep the station relevant as it begins its next half-century as “America’s Fortress.”
Longtime Cheyenne Mountain employees like Rose and Russell Mullins, the 721st Communications Squadron deputy director, call themselves “mountain men.” Mullins’ time in the mountain goes back to the Cold War era, about halfway through its history to 1984.
Although the Soviet Union’s nuclear arsenal was the main focus, today’s Airmen conduct essentially the same mission: detect and track incoming threats to the United States; however, the points of origin for those threats have multiplied and are not as clearly defined.
“The tension in here wasn’t high from what might happen,” Mullins said. “The tension was high to be sure you could always detect (a missile launch). We didn’t dwell on the fact that the Soviet Union was the big enemy. We dwelled on the fact that we could detect anything they could throw at us.
“There was a little bit of stress back then, but that hasn’t changed. I would say the stress now is just as great as during the Cold War, but the stress today is the great unknown.”
The 9/11 attacks added another mission to NORAD and the Cheyenne Mountain Directorate – the monitoring of the U.S. and Canadian interior air space. They stand ready to assist the Federal Aviation Administration and Navigation Canada to respond to threats from the air within the continental U.S. and Canada.
Airplane icons blot out most of the national map on the NORAD/NORTHCOM Battle Cab Traffic Situation Display in the alternate command center. To the right another screen shows the Washington, D.C., area, called the Special Flight Restrictions Area, which was also added after 9/11.
Whenever a crisis would affect NORAD’s vulnerability or ability to operate, the commander would move his command center and advisors to the Battle Cab, said Lt. Col. Tim Schwamb, the Cheyenne Mountain AFS branch chief for NORAD/NORTHCOM.
“I would say that on any given day, the operations center would be a center of controlled chaos; where many different things may be happening at once,” Schwamb said. “We’re all trying to ensure that we’re taking care of whatever threat may be presenting itself in as short an amount of time as possible.
“I would describe it as the nerve center of our homeland defense operations. This is where the best minds in NORAD and U.S. Northern Command are, so that we can see, predict, and counter any threats that would happen to the homeland and North American region. It’s really a room full of systems that we monitor throughout the day, 24-hours a day, seven-days a week, that give us the information to help us accomplish the mission.”
Protecting America’s Fortress is a responsibility that falls to a group of firefighters and security forces members, but fighting fires and guarding such a valuable asset in a mountain presents challenges quite different from any other Air Force base, said Matthew Backeberg, a 721st Civil Engineer Squadron supervisor firefighter. Firefighters train on high-angle rescues because of the mountain’s unique environment, but even the most common fire can be especially challenging.
“Cheyenne Mountain is unique in that we have super challenges as far as ventilation, smoke and occupancy,” Backeberg said. “In a normal building, you pull the fire alarm, and the people are able to leave. Inside the mountain, if you pull the fire alarm, the people are depending on me to tell them a safer route to get out.
“If a fire happens inside (the mountain), we pretty much have to take care of it,” Backeberg added. “We’re dependent on our counterparts in the CE world to help us ventilate the facility, keep the fire going in the direction we want it to go, and allow the occupants of the building to get to a safe location – outside the half mile long tunnel.”
Although Cheyenne Mountain, the site of movies and television series such as “WarGames,” “Interstellar,” “Stargate SG-1” and “Terminator,” attracts occasional trespassers and protesters, security forces members more often chase away photographers, said Senior Airman Ricardo Pierre Collie, a 721st Security Forces Squadron member.
“The biggest part of security forces’ day is spent responding to alarms and getting accustomed to not seeing the sun on a 12-hour shift when working inside the mountain,” Collie said.
Security forces must also be ready to respond at a moment’s notice because, when charged with protecting an installation like Cheyenne Mountain AFS, the reaction time is even more crucial. Airmen like Collie feel their responsibly to protect America’s Fortress remains as vital today as it was during the Cold War.
“The important day at Cheyenne Mountain wasn’t the day we opened in 1966,” Rose said. “The next important date isn’t in April 2016 (the installation’s 50-year anniversary), it’s about all those days in between. The Airmen who come here to Cheyenne Mountain every day will be watching your skies and shores in (the nation’s) defense.”
As Cheyenne Mountain AFS enters its next 50 years, the dragon remains awake and alert to all threats against the U.S.
The U.S. military has intercepted a pair of Russian bombers flying off the coast of Alaska, a Pentagon official says amid escalating tension between Moscow and Washington over a recent U.S. strike on Syria.
Pentagon spokesman Commander Gary Ross made the announcement on April 18, saying that two US Air Force F-22 Raptor aircraft had intercepted the Russian TU-95 Bear bombers within 160 kilometers of Alaska’s Kodiak Island a day earlier.
The American stealth fighters escorted the Russian long-range bombers for 12 minutes before they reversed course and headed back to their base in eastern Russia, according to the official.
Ross said the intercept was “safe and professional,” and there was no violation of U.S. airspace and any international norms.
The Pentagon spokesman noted that Russia’s TU-95s are capable of carrying nuclear weapons, but there was no indication that the planes were armed.
Damascus and Moscow argue that the incident was a result of an air strike hitting a chemical depot belonging to militants fighting the Syrian government. At least 87 people were killed in the town on that day.
This is while the Syrian government turned over its entire chemical stockpile under a deal negotiated by Russia and the U.S. back in 2013.
Marine Corps veteran Imran Yousuf was working as a bouncer at Pulse nightclub in Orlando when he heard a rapid-fire series of gunshots crack across the venue.
“You could just tell it was a high caliber,” Yousuf told CBS. He saw the patrons were frozen in fear and that no one was moving to open a nearby door.
“There was only one choice — either we all stay there and we all die, or I could take the chance,” Yousuf said, “and I jumped over to open that latch and we got everyone that we can out of there.”
Orlando law enforcement officials credit Yousuf with saving about 70 lives with his unflinching action. “I wish I could’ve saved more,” he told CBS. “There’s a lot of people that are dead.”
Yousuf’s six-year stint as an electrical systems tech included a combat tour to Afghanistan in 2011 according to records. His last command was the 3rd Marine Logistics Group in Okinawa, Japan. He left active duty at the rank of sergeant.
Yousuf posted the following message on his Facebook page:
There are a lot of people naming me a hero and as a former Marine and Afghan veteran. I honestly believe I reacted by instinct. I have lost a few of my friends that night which I am just finding out about right now and while it might seem that my actions are heroic I decided that the others around me needed to be saved as well and so I just reacted.
We need to show our love and profound efforts to the families and friends who have lost someone and help them cope with what happened and turn our efforts to those who truly need it. Once again I sincerely thank everyone and bless all those who are recovering and trying to make sense of it all.
For almost two decades, drone strikes have been the hassle-free, war crime tolerant way to sever the heads of any kind of terror cells operating against the United States in the war on terror. There’s just one big problem with that: Hellfire missiles make a big boom, and when that boom is misplaced, a lot of people die – innocent people. And that just creates more terrorists. Lockheed-Martin has finally created a weapon designed to minimize civilian casualties while taking out the bad guys with pinpoint accuracy.
Actually, knife-point accuracy.
Imagine this hellfire missile, but instead of explosives, it’s filled with pop-out blades.
The Hellfire missile is a staple of drones, helicopters, and fixed-wing aircraft throughout the U.S. military arsenal. The laser-guided, tank-busting workhorse is great for use on a conventional battlefield but not so great when used for surgical strikes.
The term “surgical strike” gets a whole new meaning with the Hellfire R9X projectile, which, according to the Wall Street Journal, has no explosives, but rather it drops 100 pounds of metal blades into a target, which includes long blades that deploy from the missile’s body right before impact. The shards hit with such force that they cut through concrete and sheet metal.
A U.S. airstrike using a Hellfire RX9 to kill al-Qaeda deputy leader Abu Khayr al-Masri in Syria in 2017. Above is the result of the surgical strike.
(New Jersey Office of Homeland Security and Preparedness)
Also called “The Flying Ginsu” by the people who developed the missile, they say it’s the equivalent of dropping an anvil on a terrorist’s head, minimizing the damage to people and property in the vicinity of the weapon’s detonation. Since the weapon has no explosive effect, it is also sometimes referred to as “the ninja bomb.”
So far, the weapon has only been deployed around a half-dozen times, in Libya, Syria, Iraq, Yemen, and Somalia. It was the weapon of choice to kill a number of al-Qaeda operatives, including Jamal al-Badawi, the bomber behind the USS Cole attack in 2000 and it was the back-up plan to kill Osama bin Laden in his Pakistan compound.
Former slave and Civil War veteran Reddy Gray died on Sep. 4, 1922, when he was 79 years old. He was buried in Baltimore’s Loudon Park National Cemetery — the first VA burial site included in the National Underground Railroad Network to Freedom.
Gray’s experience is representative of African Americans who risked travel through the Underground Railroad to find freedom, but his story is significant for the wealth of information gleaned from public records. His life is a reminder of the fight for civil rights that began in the 1860s to continues today.
Deed of Manumission and Release of Service,” 1865.
Gray went by Reddy, short for Redmond, Redman or Reverdy. Born at Loch Raven, Maryland, to John and Lydia Talbott Gray, he was enslaved by the Thomas Cradock Risteau family in Baltimore County from birth to until the middle of the Civil War. Likely a field worker or carriage driver, he resisted servitude by escaping in March 1863. It is not clear what happened, but Gray’s “Deed of Manumission and Release of Service” retroactively corresponds with his enlistment. President Abraham Lincoln had already issued the Emancipation Proclamation, and the U.S. Army was recruiting black soldiers.
U.S. Army, Gray Muster-Out record, 1865.
Gray enlisted in the U.S. Colored Troops at Baltimore City on March 23, 1864. His Company B, 39th U.S. Colored Infantry, fought in Virginia at the Sieges of Petersburg and Richmond, and in the expeditions and capture of Fort Fisher and Wilmington in North Carolina. Reddy mustered out in Wilmington on Dec. 4, 1865, and that record remarks, “slave when enlisted.”
His life after the Civil War shows personal accomplishment and community involvement. He learned to read and write. He returned to Baltimore and had four children, including son Redmond, with second wife Susan Gray, who worked as a laundress. In the army he suffered from rheumatism, for which he received a disability pension in 1890; however, he worked as a manual laborer doing light work like trimming lawns or gathering rags and as a carriage driver.
Reddy Gray Burial Site Certificate of Acceptance, NPS 2018.
As “Redmond” Gray, he appears in the Baltimore Sun, Sep. 15, 1894, as judge for a running race at the “Colored People’s Fair” in Timonium, Maryland; and a few years later as a member of the Colored-Odd Fellows. Reddy (also Reverdy) Gray is honored with his name on the African American Civil War Memorial in Washington, D.C. Other black soldiers who found their freedom through the Underground Railroad are buried at Loudon Park National Cemetery along with Gray, but their stories are not so easily documented.
The Network to Freedom program is managed by the National Park Service, per the National Underground Railroad Network to Freedom Act of 1998. Loudon Park National Cemetery was one of the 14 original national cemeteries established under the National Cemetery Act of July 17, 1862; it was listed on the National Register of Historic Places in 1996.
This article originally appeared on VAntage Point. Follow @DeptVetAffairs on Twitter.
Yes, #notallPOGs and all that. But seriously Persons Other than Grunts, the range rules aren’t that crazy. First, learn to safely handle your weapon. Second, learn to fire your weapon. And third, get off the range without embarrassing yourself.
Unfortunately, these 6 things manage to pop up every time POGs go to the range en masse:
1. Targets that look like they were hit with birdshot
“Are you changing your sight picture?”
“Shut up. Yes, you are.”
2. Truly baffling weapons malfunctions
The Army’s acronym for fixing weapon problems, O-SPORTS, is only effective against actual weapons malfunctions. It does little for operators who load their magazines upside down or don’t realize they can run out of ammunition.
3. So. many. safety. violations.
See how this guy lowers his weapon when some schoolchildren move in front of him? And he doesn’t have to be told to not point his weapon at something he doesn’t want to shoot? Yeah, it’s not very complicated, POGs. All weapons should be pointed up and downrange when they’re not being aimed at targets. Stop flagging each other on the range.
4. MRE Alternatives
When infantry goes to the field, they bring MREs and possibly even sleeping systems and tents to stay out there for a few days. Some POGs will at least bring MREs while others … others make arrangements with a gut truck or ice cream van.
5. “Easter basket” helmets and other uniform violations
Helmet chin straps dangling like the soldier is in a John Wayne movie, troops carrying helmets by the chin strap like it’s an Easter Basket, mirrored sunglasses, armor lacking rank insignia or name tapes, the potentially catastrophic uniform violations are everywhere. It’s all a sergeant major’s nightmare.
6. “Clean” weapons that will never be accepted by an armorer
POGs will always declare their weapon clean after 30 minutes and then be surprised when the armorer turns them away to re-clean before they can turn in. Have you cleaned the star chamber with pipe cleaners and cotton swabs until you went mildly crazy? Then it’s not clean yet.
The Thai boys saved from a flooded cave endured dives in zero visibility lasting up to half an hour. In places, they were put into harnesses and high-lined across rocky caverns, said a leader of the U.S. contingent involved in the operation, calling it a “once in a lifetime rescue.”
Derek Anderson, a 32-year-old rescue specialist with the U.S. Air Force based in Okinawa, Japan, said the dozen boys, ranging in age from 11 to 16, and their coach, who were trapped for more than two weeks before being rescued, were “incredibly resilient.”
“What was really important was the coach and the boys all came together and discussed staying strong, having the will to live, having the will to survive,” Anderson told The Associated Press in an interview on July 11, 2018.
The scale of the challenge confronting rescuers from Thailand, Britain, Australia and other countries only truly dawned on the U.S. team after it arrived at the cave in the early hours of June 28, 2018, as rain poured down on the region in northern Thailand. The Thai government had requested U.S. assistance.
“The cave was dry when we arrived, and within an hour and half it had already filled up by 2 to 3 feet and we were being pushed out,” said Anderson, the son of missionaries, who was born in Syracuse, New York, and grew up in Ecuador.
“That was just in the very beginning of the cave and at that point we realized this problem is going to be much more complex than we thought,” he said.
Thailand’s decision to dive the boys out despite their weak condition and lack of diving experience was made when a window of opportunity was provided by relatively mild weather. A massive operation to pump water out also meant air pockets were created at crucial points of the cave, making a rescue possible.
Falling oxygen levels, risk of sickness and the imminent prospect of more rain flooding the cave complex for months meant “the long-term survivability of the boys in the cave was becoming a less and less feasible option,” Anderson said.
Divers practiced their rescue techniques in a swimming pool with local children about the same height and weight as the members of the Wild Boars soccer team trapped in the cave.
The aim, Anderson said, was to make each of the boys “tightly packaged” so divers could keep control of them and adjust their air supply as needed. The process lasted hours for each boy, and involved them getting through long passageways barely bigger than an adult body.
Buoyancy compensators that establish neutral buoyancy underwater, hooded wetsuits, bungee cords and special face masks were carried by divers to the cramped patch of dry elevated ground where the boys were huddled.
The positive pressure masks were “really crucial,” Anderson said. Their use meant that even if a boy panicked — perhaps because of getting snagged in a narrow passage — and got water inside his mask, the pressure would expel it.
The complicated operation to bring the boys out of the cave began on July 8, 2018, when four were extracted. Four more were brought out on July 9, 2018, and the operation ended July 10, 2018, with the rescue of the last four boys and their 25-year-old coach.
The 18-day ordeal riveted much of the world — from the awful news that the 13 were missing, to the first flickering video of the huddle of anxious yet smiling boys when they were found by a pair of British divers nearly 10 days later.
The group had entered the sprawling Tham Luang cave to go exploring after soccer practice on June 23, 2018, but monsoon rains filled the tight passageways, blocking their escape, and pushing them deeper inside in search of a refuge.
Initial attempts to locate the boys were twice unsuccessful because the force of cold hypothermia-inducing floodwaters rushing into narrow passages made them unpassable. Even as conditions improved, and divers began laying life-saving rope guidelines through the cave, it was perilous.
“In this type of cave diving, you have to lay line, rope, that’s your lifeline. You have to ensure when you go in you have a way out,” Anderson said. “They were making progress, but it was very little progress and they were exhausting themselves spending maybe five or six hours and covering 40 or 50 meters (yards).”
There were about a hundred people inside the cave for each rescue operation, Anderson said, and each boy was handled by dozens of people as their perilous movement through a total of nine chambers unfolded.
In some phases they were guided by two divers. In some narrow passages they were connected to only one diver. In caverns with air pockets they were “floated” through with the support of four rescuers. Some sections were completely dry but treacherously rocky or deep.
“We had to set up rope systems and high-lines to be able to safely put them in a harness and bring them across large open areas so they wouldn’t have to go all the way down,” Anderson said.
Cylinders placed at locations throughout the cave for replenishing the boys’ air supply were “jammed” with 80 percent oxygen instead of regular air because “that would plus up their oxygen saturation levels and that would be really good for them, their mental state,” he said.
“The world just needs to know that what was accomplished was a once in a lifetime rescue that I think has never been done before,” Anderson said. “We were extremely fortunate that the outcome was the way it was. It’s important to realize how complex and how many pieces of this puzzle had to come together.”
“If you lose your cool in an environment like that, there is a lot of bad repercussions,” he said.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.