Kim Jong Un warned two months ago that if the US didn’t ease sanctions on North Korea that he would seek a new, potentially military, way to defend his country’s sovereignty.
On Feb 28, 2019, President Donald Trump said he was unable to strike a deal with Kim at their meeting in Vietnam because Kim was only willing to give up some of his nuclear sites in exchange for total sanctions relief, which Trump refused to concede.
In his 2019 New Year’s Day speech, Kim said that his country “may be compelled to find a new way” to defend itself if the US didn’t lift sanctions. Trump confirmed to reporters on Feb. 28, 2019, that all of current US sanctions are still “in place, yes.”
President Donald J. Trump is greeted by Kim Jong Un Feb. 27, 2019, at the Sofitel Legend Metropole hotel in Hanoi, for their second summit meeting.
Sitting on a leather chair with a black suit and grey tie in January 2019, Kim hinted that the lack of sanctions relief — as was seen in Hanoi, Vietnam, on Feb. 28, 2019 — could merit a military response or escalation.
“If the United States does not keep the promise it made in the eyes of the world, and out of miscalculation of our people’s patience, it attempts to unilaterally enforce something upon us and persists in imposing sanctions and pressure against our Republic,” he said, according to a translation by the state-run Rodong Sinmun, “we may be compelled to find a new way for defending the sovereignty of the country and the supreme interests of the state and for achieving peace and stability of the Korean peninsula.”
Prior to the summit US intelligence and North Korea experts repeatedly warned that Pyongyang is unlikely to give up its nuclear arms. An intelligence report published January 2019 reiterated the idea that the country’s leaders view nuclear arms as “critical to regime survival.”
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
China’s most advanced stealth fighter is ready for aerial refueling operations, giving it the ability to pursue targets at greater distances, according to Chinese state media.
The “fifth-generation” Chengdu J-20 stealth fighter entered military service in 2017 and was incorporated into Chinese combat units in February 2018. This aircraft, the pride of the Chinese People’s Liberation Army Air Force, put on quite a show at Airshow China 2018 in Zhuhai, where it showed off its payload of missiles for the first time publicly while rocking a new paint job.
China Central Television (CCTV), a state-run broadcaster, revealed recently that the aircraft has been equipped with a retractable refueling probe, which is embedded on the right side of the cockpit. The refueling probe was embedded to help the fighter maintain stealth, something with which the J-20 has struggled. A consistently-exposed probe extending from the fuselage would make the J-20 much more visible to enemy radar systems.
Four of the six onboard missiles are stored internally in a missile bay, a design feature intended to make the J-20 more stealthy, Chinese military experts told China’s Global Times.
The two Chengdu J-20s making their first public appearance.
Although the exact range of the Chinese stealth fighter, nicknamed the “Powerful Dragon,” is unknown, the aircraft has a suspected combat radius of roughly 1,100 kilometers, making it suitable for long-range strikes and intercepts. With aerial refueling capabilities, the J-20 can extend its reach, giving China the ability to better patrol the disputed waterways where it desires to exercise authority.
The J-20 could be refueled by a Chinese HU-6 aerial tanker.
The J-20’s chief designer says the world has yet to see the best that the aircraft has to offer, stressing that certain capabilities were unable to be presented at the recent airshow.
Chinese experts argue that the J-20 as a combat platform superior to the American F-22 Raptor and the F-35 Lightning II Joint Strike Fighter, two elite fighters which have both been tested in combat. The J-20 has only taken part in combat training exercises. Furthermore, while the J-20 was expected to receive a new engine, the technology remains unreliable, the South China Morning Post recently reported.
The J-20 continues to rely on either Russian imports or inferior Chinese engines, which have, according to some observers, prevented China from achieving the kind of all-aspect stealth of which a true fifth-generation fighter should be capable. The J-20 has decent front-end stealth, but it is noticeably less stealthy at different angles.
The J-20 was rushed into production, but as China works some of the kinks out, it could potentially lead to the development of a much more lethal and effective aircraft.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
We’ve all seen them before. The cans, small shots, and uniquely packaged energy drinks that promise to give you an energy boost during the most important parts of your day. At first glance, it seems like a great idea: chug it down and get reinvigorated for the day. But, if you go beyond wanting to simply stay alert and begin to overindulge, you could wind up doing some serious harm to your body.
Energy drinks became the beverage of choice for many service members during the wars in Afghanistan and Iraq. The Walter Reed Army Institute of Research analyzed data collected during Operation Enduring Freedom in 2010 and found nearly 45 percent of deployed service members consumed at least one energy drink daily. Nearly 14 percent reported drinking three or more per day.
Many of the most popular energy drinks are heavily marketed to young people, including military members. The marketing is sexy, the packaging is slick, the flavors are sweet like fruit drinks children crave, and the beverages are readily available on military bases and down range.
But, there are real reasons to avoid overusing energy drinks.
Energy drinks can cause drastic side effects
Energy drinks are loaded with caffeine, and too much of it isn’t good for you. Dr. Patricia Deuster, professor and director of the Consortium for Health and Military Performance at the Uniformed Services University of the Health Sciences, warns service members to avoid consuming more than 200 mg of caffeine every four hours. That means service members should add up the caffeine in their energy drinks, plus any other caffeinated beverages they may drink, like coffee and soft drinks.
“If it’s got more than 200 mg of caffeine, don’t use it,” cautions Deuster.
Deuster also warns female service members to be cautious about using energy drinks, noting the amount of caffeine you ingest relative to body weight is an issue for women. “Women get a higher concentration [of caffeine] since they tend to be smaller,” she said.
“Doctors don’t know what the effects of [energy drink] ingredients are in larger doses,” Deuster noted. “I don’t think anybody has an answer to the long term effects question.”
High amounts of caffeine can lead to increased blood pressure, panic attacks, heart palpitations, anxiety, dehydration, insomnia, and even bowel irritability when energy drinks are mixed with alcohol.
What is clear is consumers need to be more aware about what they’re putting in their bodies when it comes to energy drinks.
Energy drinks can activate your sweet tooth
Energy drinks are loaded with sugar. Some cans pack a punch of 27 grams of sugar — two thirds of the recommended daily maximum for men, and 2 grams more than the maximum doctors recommend for women. Some service members can double or even triple that if they drink more than one energy drink per day.
All of that extra sugar can cause your blood sugar to increase. Even the sugar-free versions of energy drinks can lead to weight gain, as research suggests artificial sweeteners may raise blood sugar, too.
Your body can also begin storing fat, especially if you’re unable to increase physical activity.
Energy drinks + alcohol = a dangerous cocktail
Energy drinks have become popular mixers for alcohol, raising concerns for health experts.
“A lot of the young people mix energy drinks with alcoholic beverages, then you’ve got a wide awake drunk,” says Deuster.
The CDC warns that when alcoholic beverages are mixed with energy drinks, the caffeine stimulant can mask the effects of the alcohol, which is a depressant. Often, the person drinking doesn’t even realize that they’re actually drunk. According to the CDC, that means people who mix alcohol with energy drinks are three times more likely to binge drink than those who don’t mix alcohol with energy drinks. Experts warn motor skills can be affected and some people engage in riskier behaviors while under the influence of alcohol and energy drinks. Additionally, both caffeine and alcohol are diuretics, which can cause dehydration if you’re not careful.
Some companies sell pre-mixed alcoholic energy drinks which have the same sweet or tart flavors as standard energy drinks. As the Army notes, the alcohol content in these beverages can be significantly higher than what’s found in beer.
These energy drinks with alcohol may appeal to underage drinkers because they’re cheaper than hard liquor and they’re marketed with a message that the drinker can last all day or all night long. The sugary nature of the beverages also makes drinkers feel they can imbibe longer than if they were having harder alcohol.
Energy drinks can ruin your good night’s sleep
Deuster raises concerns about a problem in the military with energy drinks and sleep. And, the data back up those concerns. While service members may initially use energy drinks to make up for a lack of sleep, overuse can lead to a harmful cycle. Excess consumption of energy drinks can cause sleep problems and hamper performance.
Dr. Nancy J. Wesensten, from the Center for Military Psychiatry and Neurosciences Research, tells Army Medicine that research on caffeine shows that it can be effective if used properly. However, Wesensten notes “because caffeine impairs sleep, individuals should stop all caffeine consumption at least 6 hours prior to scheduled sleep. Otherwise, sleep could be impaired without the person even being aware of it.”
As caffeine is the major ingredient in energy drinks, the CDC reports service members who drink three or more of the drinks per day were significantly more likely to report sleeping fewer than four hours per night. They were also more likely to report disrupted sleep and other illnesses. Lack of sleep can impact memory and a service member’s ability to pay attention when it matters most. Research indicates service members who drank three or more energy drinks each day also had difficulty staying awake during briefings or on guard duty.
The Army’s Performance Triad offer tips on how to get a better night’s sleep, including controlling light and temperature, as well as leaders ensuring service members have time for quality sleep.
You really don’t know what’s in them
These drinks are not regulated as dietary supplements. While the cans have nutrition labels, many do not list supplement information.
One area that’s concerning to Deuster is the ingredient taurine. The chemical compound is an amino acid found in animal tissue. Many manufacturers purport the ingredient will enhance mental and physical performance. Researchers with the Department of Veterans Affairs Medical Center report little is actually is known about taurine’s neuroendocrine effects.
So, what should service members use instead of energy drinks?
Deuster keeps it simple: “Good old water.” Appealing to service members’ frugality, she adds,
Disclaimer: The appearance of hyperlinks does not constitute endorsement by the Department of Defense of this website or the information, products or services contained therein. For other than authorized activities such as military exchanges and Morale, Welfare and Recreation sites, the Department of Defense does not exercise any editorial control over the information you may find at these locations. Such links are provided consistent with the stated purpose of this DOD website.
Below, you can see 25 photos of America’s Air Force in 2017:
Tech. Sgt. Jason Caswell prepares to lift weights at Bagram Airfield, Afghanistan on January 4.
US Air Force photo by Staff Sgt. Katherine Spessa
Senior Airman Austin Boyd, of the 138th Fighter Wing, attaches a hose containing liquid oxygen to an F-16 Fighting Falcon on February 1.
(US Air National Guard photo/Tech. Sgt. Drew A. Egnoske)
Pararescuemen from the 82nd Expeditionary Rescue Squadron prepare for a night jump from a C-130 Hercules over Grand Bara, Djibouti on March 20.
Senior Airman Jacqueline D’urso, a boom operator with the 91st Air Refueling Squadron, prepares to make contact with a C-17 Globemaster III aircraft during a refuel mission over the southeast US on April 4.
(US Air Force photo/Staff Sgt. Ned T. Johnston)
Airmen from the 41st Helicopter Maintenance Unit push an HH-60G Pave Hawk into a C-17 Globemaster III on May 15 at Moody Air Force Base, Georgia.
US Air Force photo/Staff Sgt. Ryan Callaghan
Staff Sgt. Victoria Dames, a 35th Security Forces Squadron military working-dog handler, carries MWD Elvis during the second annual security forces advanced combat skills assessment at Andersen Air Force Base, Guam on June 6.
US Air Force/Airman 1st Class Gerald R. Willis
An F-16 Fighting Falcon from the 16th Weapons Squadron, Nellis Air Force Base, Nevada, takes off over Las Vegas for an Air Force Weapons School training exercise on June 8.
US Air Force/Airman 1st Class Andrew D. Sarver
Instructors assigned to the 1st Special Operations Support Squadron, Operational Support Joint Office, jump from a 15th Special Operations Squadron MC-130H Combat Talon II above northwest Florida on June 28.
(US Air Force photo/Airman 1st Class Joseph Pick)
A 340th Aircraft Maintenance Unit maintainer adjusts the window of a KC-135 Stratotanker boom pod before a flight in support of Operation Inherent Resolve, at Al Udeid Air Base, Qatar on July 3.
US Air Force/Staff Sgt. Michael Battles
Capt. Michael Slotten, a 61st Fighter Squadron F-35 student pilot, climbs into an F-35 Lighting II at Luke Air Force Base, Arizona on July 7.
(US Air Force photo/Staff Sgt. Jensen Stidham)
US personnel from the 75th Expeditionary Airlift Squadron conduct C-130J Super Hercules airlift operations in East Africa on July 19.
U.S. Air Force/Master Sgt. Russ Scalf
Joint terminal attack controllers wave at an A-10 Thunderbolt II attack aircraft during a show of force on the Nevada Test and Training Range on July 19.
US Air Force/Senior Airman Kevin Tanenbaum
Capts. Wes Sloat, left, and Jared Barkemeger, 7th Airlift Squadron pilots, operate a C-17 Globemaster III during takeoff at Fort Bragg, North Carolina on July 27.
US Air Force photo/Staff Sgt. Keith James
Tech. Sgt. Jonathan Carr, a crew chief with the 62nd Aircraft Maintenance Squadron at Joint Base Lewis-McChord in Washington state, checks the engine of a C-17 Globemaster III during Exercise Mobility Guardian at the base on August 6.
US Air Force/Tech. Sgt. Nathan Lipscomb
Combat controllers with the 321st Special Tactics Squadron watch an A-10 Thunderbolt II land on Jägala-Käravete Highway, in Jägala, Estonia on August 10.
(US Air Force photo/Senior Airman Ryan Conroy)
Airman 1st Class Elizabeth Silvers, left, an 816th Expeditionary Airlift Squadron C-17 Globemaster III loadmaster, and Capt. Travis Delzer, an 816th EAS C-17 pilot, prepare for takeoff before a mission in support of Operation Inherent Resolve on August 23, 2017 Al Udeid Air Base, Qatar.
(US Air Force photo/Staff Sgt. Michael Battles)
Airmen from the 41st Helicopter Maintenance Unit perform post-flight maintenance on an HH-60G Pave Hawk helicopter at Moody Air Force Base, Georgia on September 3.
US Air Force/Andrea Jenkins
An air commando from the 7th Special Operations Squadron fires a .50-caliber machine gun aboard a CV-22 Osprey during a flight around southern England on September 11.
(US Air Force photo by Staff Sgt. Philip Steiner)
A crew chief assigned to the 374th Aircraft Maintenance Squadron walks on the flight line near a C-130J Super Hercules during Exercise Beverly Morning 17-06 at Yokota Air Base, Japan on October 26.
US Air Force/Yasuo Osakabe
A 20th Aircraft Maintenance Squadron Airman directs the loading of a bomb onto an F-16 Fighting Falcon at Eglin Air Force Base, Florida on November 2.
US Air Force/Samuel King Jr.
US Air Force weapons load crew airmen from the 94th and 27th Aircraft Maintenance Units compete in the 3rd Quarter Weapons Load Competition at Joint Base Langley-Eustis, Virginia on November 3.
US Air Force/Staff Sgt. Carlin Leslie
A U-2 Dragon Lady lands on the runway at Al Dhafra Air Base, United Arab Emirates on November 16.
U.S. Air National Guard photo by Staff Sgt. Colton Elliott
Airman 1st Class Jacob Cutler, of the 61st Airlift Squadron, conducts a pre-flight inspection on a C-130J Hercules at Pope Army Airfield, North Carolina on November 28.
US Air Force/Marc Barnes
Airman 1st Class Eric Ruiz-Garcia, 63rd Aircraft Maintenance Unit crew chief, performs an inspection on an F-35A Lightning II at Luke Air Force Base, Arizona on December 1.
US Air Force/Airman 1st Class Caleb Worpel
Santa poses with the crew of an HH-60G Pave Hawk from the 41st Rescue Squadron on the flight line at Moody Air Force Base, Georgia on December 9.
If it weren’t for the Japanese, the Marine Corps’ biggest enemy in the Pacific theater of World War II might well have been the U.S. Army. On at least five occasions, Army commanders were relieved of command for what the Corps deemed was a lack of proper aggression. Those commanders were given the benefit of being relieved by their Army commander. When one brigadier was relieved by his Marine commander, it caused a grudge the branches held on to for years.
Gen. Ralph Smith began World War II with a promotion to brigadier general and a command of American soldiers in the Pacific. With Smith came his experience in previous American conflicts. He served under Gen. John J. Pershing in Mexico, during the Punitive Expedition. He also fought on the Western Front of World War I and was among the first American troops to land in France. He earned two Silver Stars in combat during the Meuse-Argonne Offensive of 1918. His bravery and combat credentials were without question.
When he earned his second star, he also took command of the 27th Infantry Division, an Army unit that was soon folded into the 2nd Marine Division. The new mixed unit formed the V Amphibious Corps under Marine Corps Maj. Gen. Holland M. “Howlin’ Mad” Smith and its target was the Gilbert Islands. The Marines would attack and capture Tarawa while the Army did the same on Makin. The Marine Corps’ Smith thought the Army’s 6,400-plus troops should be able to overwhelm the 400 defenders and 400 laborers who held the reinforced island.
But it didn’t happen as quickly as “Howlin’ Mad” Smith though it should. This would build tensions when it came to take Saipan.
As if Saipan wasn’t tense enough.
On Saipan, the Marines and the Army would fight side-by-side on a dream team that would not be matched until the USA Men’s Olympic Basketball Team in 1992. When the U.S. began its assault on Mt. Tapochau in the middle of the island, the Marines found themselves advancing much further, much faster than their Army counterparts. The soldiers at Mt. Tapochau were tasked with taking an area known as “Hell’s Pocket.” The Army was expected to go into a valley surrounded by hills and cliffs under enemy control.
Now, if terrain is given a nickname by the Americans tasked to take it, that’s a pretty good indication of some intense fighting. But Holland Smith didn’t know that because he hadn’t inspected the terrain. The Army commander devised a plan to split his forces, using one battalion to hold the pocket while the other outflanked the Japanese defenders. Unfortunately, he would not be in command to implement it. It turns out “Howlin’ Mad” Smith was about to live up to his nickname.
The U.S. Army’s 27th Infantry Division marches to the front on Saipan.
With what he saw as a lack of aggression on Makin fresh in his mind, the inability of the Army to advance on Saipan made the Marine Corps’ Maj. Gen. Smith furious. He not only relieved the Army’s Maj. Gen. Smith of command of the Army on Saipan, he ordered Ralph C. Smith off the island. It would be the only time an Army commander would be relieved of command by a superior from another branch, and the Army wouldn’t forget it for years. The firing was so public that Smith could no longer command a unit in the Pacific and spent the rest of the war in Arkansas.
After the war, a panel of inquiry was convened. Known as the Buckner Board, it was staffed entirely by Army brass. When it looked into the Saipan incident, it found that Holland Smith had not looked at the terrain facing the Army on the island and was not in possession of all the facts. The plan hatched by the Army’s Maj. Gen. Smith to take Hell’s Pocket worked, and the Army was able to catch up to the Marines.
On the front lines of the unrest in Hong Kong are the Raptors, an elite subdivision of the Hong Kong Police Force. Their official name is the Special Tactical Squad, but that moniker doesn’t really cover everything the Raptors do, from crowd control and riot control to clearing roadblocks and infiltrating disruptive groups. The STS was created in the midst of chaos and will be there whenever Hong Kong descends back into it.
The Special Tactical Squad was formed in 2014 in the middle of the Umbrella Revolution in Hong Kong, a civil unrest that was a response to the Standing Committee of the National People’s Congress’ efforts to undermine the democratic system in Hong Kong. The police response to the 100,000 protestors that flooded the city’s streets was underwhelming. They had no apparatus in place to handle such protests. The Raptors were created to contain the widespread protests and were deployed in 2016 during the “Fishball Revolution” and are again deployed on the streets.
Every time the Chinese government tries to impose its will on the city of Hong Kong, its people crowd the streets in massive protests, and the Raptors are called in. The latest protests see upwards of a million people protesting in the streets in 2019.
Around the Police Tactical Unit, which the Special Tactical Squad is a part of, they’re called the “Removal Team,” as they’re usually tasked with removing debris and clearing roadblocks, as well as removing unruly protesters. For the last, the local media call them “The Professional Removal Team.” When the Hong Kong police are overwhelmed, the Raptors special training and gear are able to work over crowds in sizes that regular police forces just couldn’t manage. Now they’re doing much more than responding to civil unrest – they’re actively preventing it.
People close to the organized protests say Raptors officers went undercover in protest groups to undermine the most radical protesters. On Aug. 12, Raptors arrested 15 organizers in a carefully coordinated decoy operation to remove the most violent of rioters. The Raptors are now being comprised of counterterrorism officers, which probably explains the shift in tactics on the ground. Protestors with a violent past can now be arrested in secret.
The Raptors would usually have just done battle with those protesters. Times sure have changed.
The mortar is an indirect fire weapon that rains freedom down from high angles onto an enemy within a (relatively) short range. But the compact and mobile mortar systems we have today are the result of a long history of indirect fire systems in the American military. Decades of effectively marking, lighting, and destroying targets has earned the mortar many friends — and many more enemies — on the battlefield. In short, a well-trained mortar team often means the difference between victory and defeat for infantry troops in contact.
When nature creates a successful apex predator, she rarely deviates from her original design. Warfare evolves in a similar fashion — the most successful systems are tweaked and perfected to guarantee effectiveness, preserving our way of life.
This is an ode to the mortar, and all of its beautifully complex inner-workings.
Preparation and Firing Stokes Mortars 1 Min 12 Sec
The mortar was born in the fires of conquest at the Siege of Constantinople in 1453. In that engagement, the new weapon proved just how effective firing explosives over short distances across an extremely high arc could be. Since that day, more than 500 years and countless wars ago, the general concept hasn’t changed.
One of the biggest evolutions in the mortar design was put forth by the British in World War I: the Stokes Mortar. It had 3 sections: a 51-inch tube, a base plate, and a bi-pod. This new type of mortar system fired twenty-two 10-pound pieces of ordinance a maximum of 1,000 yards. Mortars today still use the bi-pod and base-plate improvements that were first deployed in the trenches of the Western Front.
COMBAT FOOTAGE Marines in firefight beat Taliban ambush with 60mm Mortar Fire
A mortar crew consists of at least three members: the squad leader, gunner, and the assistant gunner. More members could be attached depending on manpower available.
The mortar system has a large tube closed at the the bottom and attached to a base plate. Within the barrel of the tube is a firing pin used to ignite a mortar shell’s primer. Some models have a moving firing pin that can be fired via a trigger mechanism.
The controlled explosion fills the chamber with gas and propels the shell out of the tube. A set of bi-pods add stability and allow on-the-fly adjustments. It can be fired from defilade (a fighting position that does not expose the crew to direct fire weapons) onto entrenched enemy not protected from overhead fire.
Sometimes referred to as a ‘bomb’, the shell and its components consist of the impact fuse, high explosive filler, a primary charge, fins, and augmenting charges. Illumination and smoke rounds differ depending on the model of the weapon system. Augmentation charges on the outside ‘neck’ near the fin can be added or removed to manipulate firing range as needed.
The gun is aimed, the round is half loaded until the ‘fire’ command is given and freedom rings.
Steel drizzle vs steel rain
The differences between artillery and mortars are night and day. Artillery fires on a horizontal trajectory, at faster speeds, and at longer ranges. The cost of these advantages are sacrificed in mobility.
Mortars, however, are light enough that they can be carried across difficult terrain and quickly assembled to take control of the battle space. Ammunition can be dispersed to individual troops to carry and then dropped off at the gun crew rally point.
Joe Quinn, a West Point graduate and the current Director of Leadership Development for Team Red, White Blue (RWB), has been hand-selected as in the incoming Executive Director for Headstrong, a non-profit organization that provides post-9/11 military veterans with free mental health care. He’ll begin his new role on Jan. 1, 2018.
U.S. Marine Zach Iscol, Chairman and Co-Founder of The Headstrong Project (and a previous veteran-to-watch on WATM’s Mighty 25) personally attested to Quinn’s character in the announcement made to the Headstrong team:
Despite graduating from West Point, Joe has had an exemplary and impressive career. He deployed twice to Iraq, served as an advisor to General Petraeus’ Counterinsurgency Advisory and Assistance team’s in Afghanistan, and earned a master’s degree in public policy from Harvard. As the Director of Leadership Development at Team RWB, a leading Veteran Service Organization, he has managed their growth to a major national organization and personally developed nearly 2,000 community leaders.
No stranger to service-after-service (Team RWB enriches the lives of vets by connecting them to their community through various activities), Quinn’s own letter to the Team RWB family was filled with sentiment, purpose, and praise for his team:
Beginning January 1st, I’ll be the next Executive Director of the Headstrong Project, an organization that heals the hidden wounds of war through stigma-free, bureaucracy-free, cost-free, evidence-based treatments. At Headstrong, we are going to lead a vast movement across the country that heals the hidden wounds of war to help prevent veteran suicide. This is only the beginning, and I couldn’t be more excited about this opportunity.
Quinn is a highly respected member of the veteran community, and one who knows the space and is connected to the vets he serves. He’s someone to watch out for in the coming year and we can’t wait to see what good he’ll do for veterans next!
Retired Marine Gen. and current Secretary of Defense James Mattis was recently asked what kept him up at night and he responded, “Nothing. I keep other people awake at night,” because Mattis is a stone-cold killer. And he’s right.
Here is how four enemies of America try, and fail, to get sleep:
1. Supreme Man-Child Kim Jong-un
Kim Jong-un ends every night surrounded by the young women of his personal harem, but even that isn’t enough to distract him from his one true fear, Jim Mattis. When Mattis ruled only the Marine Corps, the dreams were frightening enough. Marines assaulted North Korea’s miles of exposed coastline while Harriers roared over Pyongyang.
But now, Mattis has a hold of the entire military, and the sick dictator tosses and turns in his bed with the images of stealth-enhanced Blackhawks swooping over his palace and depositing the elite operators of SEAL Team 6. Their attack dogs tear out the throats of his most loyal bodyguards as the SEALs sweep, slightly crouched and sighting down the barrel for new threats, through polished hallways.
In Kim’s mind, the SEALs stealthily stack on his bedroom. He looks across the massive bed at the slight gap beneath the door and searches for any change in the light, any flicker that may indicate that Mattis’s mad dogs are here at last.
Nothing. No shadows, no lights, and no quiet boot falls interrupt the night. But Kim knows he will go without sleep once again.
And Kim isn’t the only enemy of America who is more afraid of the dark than ever before. Here are three others who share in his terror-ridden insomnia:
2. ISIS’s top dude Abu Bakr al-Baghdadi
Abu Bakr al-Baghdadi holds his final meeting each nightfall for as long as possible, offering pine nuts and Chai to his few remaining aides and field commanders until they beg for sleep. He reluctantly agrees, allowing them to file out of his chambers. But the moment the door closes on them, he can feel the dread closing around him.
He forces himself not to look over his shoulder as he has so many times before, but that doesn’t stop the thoughts. The wall suddenly explodes inward as charges create three openings for Delta Force to pour through. Their suppressed weapons chuckle in the dust clouds from the explosions. Amid the cracks of the rifles and guns, another sound is audible. It’s Jim Mattis, and he’s laughing in full kit.
Al-Baghdadi feels the first round pierce his lung as the second rips through his shoulder. He imagines himself slumped over, coughing, as the lights go out. He finally looks over his shoulder and prays the wall, and his crumbling “caliphate,” survives for just one more night.
3. Taliban’s current leader, Hibatullah Akhundzada
A former Taliban judge and professor, Hibatullah Akhundzada is a true believer of his perverse version of Islam. But he also believes in patterns, and his predecessor was killed in a drone strike just like many of his peers. He has to force his anxiety down every time he gets into a car or walks outside for too long. But by nightfall, he doesn’t have the energy to keep the phantoms at bay.
He can hear the soft buzz of the drone’s engines as it circles him in the sky. He knows the thermal sensors can see which room he’s in as even his breath is enough to heat the small room he hides in. He wonders what kind of weapon it will fire when it comes for him.
The Hellfire would approach with a roar as its engine propelled it through the night, but the Paveway would fall with a slight whistle.
He knows it’s wrong, but every time he thinks of the drone that will finally end the nightmare, he imagines it has a full cockpit with Mattis, grinning, at the controls. Mattis flips up his visor, takes a long pull from a beer bottle, and toasts the bomb as it lands.
4. Leader of al-Qaeda, Ayman al-Zawahiri
Ayman al-Zawahiri has watched al-Qaeda go from the most infamous terror organization on Earth to a group of zealots barely visible in the shadow of ISIS. But he knows that some of his enemies will never forget which organization attacked on 9/11. Leaders like Mattis aren’t distracted black flags.
He knows it’s Mattis who will keep the analysts working daily to find him, to track his patterns. Is tonight the night? The night that Mattis passes hand signals down the line as the Osprey approaches the compound and transitions from forward to vertical flight.
The rotor wash beats against al-Zawahiri’s building as Mattis and the Marine Raiders fast rope onto the roof. The al-Qaeda fighters rush to their assigned defense posts, prepared to make the Marines bleed for every room. But Mattis expected this. A young Marine detonates a charge on the roof directly over al-Zawahiri.
When it explodes, the blast wave disorients everyone in the room with al-Zawahiri, and Mattis descends through the hole headfirst with an M27 in his hands. The 5.56mm rounds rip through the bodyguards and then al-Zawahiri himself.
Al-Zawahiri shakes himself and turns on his TV to spend another night watching the videos Osama Bin Laden sent him before his death.
Star Trek would be a lot less interesting if we found out the Enterprise didn’t run on an advanced isolinear computing system but instead ran on something like MS-DOS. We might laugh at how incredulous that work of science fiction would be. But in today’s U.S. Air Force, the F-22 – one of the most advanced fighters ever made – runs on a similar disparity.
But of course, the Air Force will remind you that it isn’t science fiction, it’s what they do every day.
The F-22 program was killed at the height of the wars in Iraq and Afghanistan in an effort to reshape the U.S. military. The F-22 was designed as an air superiority fighter to take on advance fighters from China and Russia in air combat, not support troops on the ground. At the time, American troops were focused on insurgencies and ground combat. Until the terrorists started flying F-14s, there was little perceived need for such a fighter. Now that the U.S. military is refocused on great power wars, the need for such a program is becoming more apparent.
The F-22 is the fastest combat aircraft in the U.S. Air Force, even after the development of the F-35. It can detect and attack enemy aircraft from miles away, even if the enemy isn’t yet able to detect the incoming Raptor. In one instance, a Raptor was able to pop up from underneath two Iranian F-4 Phantoms and tell them to go home, which they promptly did, presumably to change their shorts.
It wasn’t like this, but it could have been.
Just the presence of a Raptor in a battlespace is enough to clear the skies of enemy aircraft. In a great power war with a country like China, the Raptor would be an indispensable part of the Air Force order of battle. Raptors will quickly disperse in order to keep China from targeting them with ballistic missiles. Their stealth and air combat abilities would then be used to escort C-17s and frustrate Chinese fighters, as well as any Chinese efforts to jam their communications. That’s due in large part to the pilots’ advanced training and the advanced stealth technology aboard the airframe. But the reason Chinese hackers couldn’t hack their computers is something different altogether.
The technology is more than 35 years old.
Like this, except on one of the world’s most advanced killing machines.
When the billion fighter was cut from the Pentagon budget, there was a lot of joking surrounding the fighter, that the United States had developed a weapon it would never use in combat – after all, until that point the F-22 hadn’t flown a combat mission over either of the two wars the U.S. was actually fighting. Former Navy Secretary John Lehman, found a silver lining, telling the Wall Street Journal that at the very least, the plane’s computer technology was safe from Chinese hackers.
“No one in China knows how to program the ’83 vintage IBM software that runs them,” he said.
Ten years later, the F-22 has definitely flown combat sorties over Syria and the rise of China and Russia, and their fifth-generation fighters, some of the technology stolen from the United States, might have the Pentagon wishing they had more Raptors.
Rubber, sheep skin, love sock, penis sheath, raincoat, scum bag, prophylactic, the goalie, nodding sock, the Royal wanker, MOPP gear, or, if you’re feeling vanilla, just plain ol’ “condom.”
No matter what you call it, condoms are great for conducting amphibious landings when you don’t want to exchange fluids with the host country. But they’re also good for a host of other things, as numerous enterprising service members have discovered over the years.
Make love, make war, but, for god’s sake, make lots of condoms first. So, just what sorts of things did grandpa use his jimmies for besides the horizontal tango?
There are likely thousands of condoms in this photo even though almost no one in it would get laid for a week or more.
One of the best-known uses of condoms in combat came during D-Day where many infantrymen put them on their weapons’ barrels to keep the bore clear. While water is typically cited as the main intruder that soldiers wanted to deny, War on the Rocks has rightly pointed out that many weapons in World War II could actually fire just fine while wet.
But condoms, in addition to keeping out some of the moisture, also kept out most of the mud or wet sand that could get jammed in the barrel. And while water can cause a round to move to slowly through the barrel, causing the sustained pressure buildup to damage the barrel, wet sand or mud is nearly guaranteed to cause the barrel to burst.
Members of a naval combat demolition unit hit the beach during training.
(U.S. Department of Defense)
The Navy’s underwater demolition teams, meanwhile, reportedly used condoms to protect the fuses of their underwater explosives. Most of the fuses proved to be water resistant instead of waterproof, so they had to be kept dry until just before the big show. The commandos kept the sensitive little bombs in condoms until it was time to slide them into their holes. Then, remove the love glove and initiate the fireworks.
But, the condom’s debut as a tool for the D-Day landings actually came before the real operation. Gunners training for the big day are thought to have filled condoms with helium to make field-expedient targets for firing practice.
But it’s not all history — U.S. grunts and friendly forces have their own modern uses for condoms, too. For instance, a condom makes a great waterproof pouch, though you have to tie and untie it to retrieve items while maintaining a proper seal. Condoms are especially good in this role since they’re so elastic. They can expand to be large enough to cover nearly anything a soldier is carrying, though, again, you still have to be able to tie it for perfect effectiveness.
Stretch your condoms out first, ladies and gentleman. This is not enough water to keep you going.
(ClaudiaM1FLERéunion CC BY-SA 3.0)
In fact, if the condom is properly stretched and then placed into a fabric sleeve, like a sock, it can be used to hold additional water. Non-lubricated condoms are surprisingly strong and elastic, but they need a good fabric layer to protect against pinpricks which would cause them to burst. And, they need to be stretched first. Why? Because there’s no real water pressure in most survival situations, so the condom can only hold as much water as its current shape will allow.
So, yes. Bring condoms, whether you’re there to fight or fornicate. But, if you’re there to fight, opt for the non-lubricated, non-flavored ones.
A hacker who got ahold of sensitive US military documents tried to sell them on a dark-web forum — only to find there were no buyers. The hacker was forced to lower his price to $150.
After a team of undercover analysts from Recorded Future’s Insikt Group embedded themselves with users from the dark-web forum, they came across the hacker who exploited a simple vulnerability on Netgear-brand routers.
Through this exploit, the hacker gained access to documents belonging to a US Air Force service member stationed at the Creech Air Force Base in Nevada, and documents belonging to another service member believed to be in the US Army.
The sensitive files included a maintenance manual for the MQ-9A Reaper drone, a list of airmen assigned to a Reaper drone unit, manuals on how to suppress improvised explosive devices, and an M1 Abrams tank manual.
Although the materials do not appear to be classified, the information was still prohibited from being “released to another nation without specific authority” and was intended for “military purposes only.”
The hacker also tapped into live footage of surveillance cameras at the US-Mexico border and NASA bases, and an MQ-1 Predator flying over the Gulf of Mexico.
The MQ-9A Reaper
(U.S. Air Force photo)
The hacker claimed to have stolen “classified” information from the Pentagon, but Insikt Group’s analysts say their interactions with the hacker painted a less sophisticated picture. After building a rapport with other users on the dark-web forum, analysts chatted with the hacker and discovered he possessed “above amateur” abilities and may have been part of a group within a larger group.
“I wouldn’t say that they possess skills of highly advanced threat-actors,” Andrei Barysevich, a researcher at Recorded Future, told Business Insider. “They have enough knowledge to realize the potential of a very simple vulnerability and use it consistently.”
Analysts say they have a “good level of confidence” of the hacker’s identity, and are coordinating with Homeland Security officials in their investigation. A DHS representative declined to comment on the matter and the affected Air Force drone unit did not respond to requests for comment.
He didn’t fear the Reaper
The hacker may not have been fully aware of the nature of the information he possessed. At one point, he complained that he was unable to find interested buyers for the files — which he believed were highly valuable. He ultimately lowered his price.
“I expect about 0 or 0 for being classified information” he said, according to a transcript.
In an attempt to make a quick sale, he was also “proactive in giving” samples to analysts, which in turn allowed them to determine whom the documents were stolen from.
“[It] clearly shows he had no knowledge of how much this data may cost and where and whom to sell it to,” analyst Barysevich said. “He was attempting to get rid of it as soon as possible.”
After Barysevich’s team alerted US officials, the vulnerable computers were taken offline. That move ultimately cut off the hacker’s access to the files.
The hacker, who is believed to live in a poverty-stricken country in South America, said his internet connection was slow and that, because his bandwidth was limited, he did not download as much information as he had hoped to, prior to finding a willing buyer.
Instead, he relied on screenshots and shared them with the analysts, who say they believe he was still unable to find a buyer.
A password impasse
The Netgear router vulnerability, which dates back to 2016, allowed hackers to access private files remotely if a user’s password is outdated. Despite several firmware updates and countless news articles on the subject, thousands of routers remain vulnerable.
A simple search on Shodan, a search engine for devices connected to the internet, reveals more than 4,000 routers that are susceptible to the attack.
“We’re literally talking about thousands of systems,” Barysevich said. “And many of them appear to be operated by government employees.”
Hackers, like the one Barysevich’s team encountered, would scan large segments of the internet by country, identify which routers would have a standard port used by private servers, and then use the default password to discover private files.
It’s difficult to match the contents of the files with their owners, but that’s not exactly the point. It’s a brute-force method with only one goal in mind: to find valuable data and exploit it.
“Sadly, very few understand the importance of properly securing wireless access points [WAP], and even fewer use strong passwords and understand how to spot phishing emails,” Recorded Future said in a report.
“The fact that a single hacker with moderate technical skills was able to identify several vulnerable military targets and exfiltrate highly sensitive information in a week’s time is a disturbing preview of what a more determined and organized group with superior technical and financial resources could achieve.”
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.