The Afghan Defense Ministry says 43 soldiers have been killed and nine wounded in a Taliban attack on an army camp in the southern province of Kandahar.
Ministry spokesman Dawlat Wazeri told RFE/RL that six soldiers were unaccounted for after the attack on the Afghan National Army base in the Maiwand district early on October 19.
Only two of the soldiers stationed at the base escaped the attack unhurt.
Waxeri said 10 militants were killed.
The Taliban claimed responsibility for the assault, the third major attack on Afghan security forces this week.
The Western-backed government in Kabul is struggling to beat back insurgents in the wake of the exit of most NATO forces in 2014.
A local security official told RFE/RL that a suicide bomber detonated a car filled with explosives near the base, before a number of gunmen launched an assault against the facility.
The official, who was speaking on condition of anonymity, said the militants failed to overrun the base as reinforcement arrived at the scene.
Some reports said there were two suicide bombings.
Elsewhere in Afghanistan, six police officers were killed in an ambush in the northern Balkh Province late on October 18, according to Shir Jan Durani, a spokesman for the provincial police chief.
In the western province of Farah, the authorities said that militants attacked a government compound in the Shibkho district, killing at least three police officers.
The Taliban also claimed responsibility for the two attacks, which came after the extremist group launched two separate suicide and gun assaults on government forces on October 17 that left at least 80 people dead and about 300 others wounded, including soldiers, police officers, and civilians.
The attacks targeted a police compound in the southeastern city of Gardez, capital of Paktia Province bordering Pakistan, and a security compound in the neighboring province of Ghazni.
U.S. President Donald Trump recently unveiled a strategy to try to defeat the militants, and officials said more than 3,000 additional U.S. troops were being sent to Afghanistan to reinforce the 11,000 already stationed there.
Six of the leading veterans organizations are joining forces, forming a coalition to combat COVID-19. Team Rubicon is at the helm.
The Veterans Coalition for Vaccination (VCV) includes Team Rubicon, Iraq and Afghanistan Veterans of America, Student Veterans of America, Team Red, White & Blue, The Mission Continues and Wounded Warrior Project. All are united in the commitment to aid local and state officials in distributing the COVID-19 vaccine to American citizens across the country.
Navy veteran and Team Rubicon President and Chief Operating Officer Art delaCruz is deeply familiar with tackling disasters and challenges, something many veterans have experience in. It’s for this reason that delaCruz believes veterans are uniquely positioned to make a tangible difference in fighting the invisible enemy that is COVID-19, and winning.
Team Rubicon has been in the fight against Coronavirus since March 2020 and the VCV is what delaCruz feels is the next vital mission. “In 2019 we ran 119 operations and we ran close to 380 last year,” delaCruz shared. In 2020 TR was on the ground distributing personal protective equipment, administering COVID-19 tests, handing hurricane disaster relief and supporting neighbors in need. “Even with 140,000 volunteers we began to stretch our capacity,” he said.
“We were staring at this national problem where we knew that 350 million or so citizens needed to be vaccinated. We knew that the people who were really on the front-line, the true warriors, these nurses and doctors had been at it for 10 months and we thought ‘how can we help?’” delaCruz explained.
In November 2020, hope was on the horizon. Vaccines were receiving their emergency approvals after successful trials, and, “This,” delaCruz said, “was the answer.” One of the Special Forces doctors in a TR strategy meeting said, “Vaccines don’t save lives, vaccinations save lives,” delaCruz shared. It was this striking realization that led TR to forming the VCV.
With over 18 million veterans throughout the country, TR knew they needed support to activate them all. So, they brought the big guns. “We made a decision to see if we could collect everyone together and get them aligned around this mission. Come late December we started this scaffolding and framework. We had our first meeting on December 17… and we launched,” delaCruz said.
On December 15, TR was in the Navajo Nation giving their first vaccination. “They were the most devastated community in the country. Their hospitals only staffed at 5% of normal,” delaCruz shared. Soon, they received a call from Chicago’s Emergency Management team, requesting their help. “By December 28, our volunteers were training with the city personnel and they are now at seven distribution points of Chicago… and that’s just the start.”
By providing resources of a million-strong veteran coalition, the VCV will assist in ensuring access to vaccinations. When President Biden announced his COVID-19 national strategy for response, five of his pillars were identical to what VCV had identified for their mission. Addressing trust, opportunity and equity were among the most important, according to delaCruz.
“A man or woman who’s been off to combat or served, they have legitimacy and a voice. Now we are using that voice to build trust. Military veterans also come from every culture and community across the country so it’s probably the most diverse organization in the US, so who better to bring the message that vaccination is something the nation should do to move forward,” delaCruz said.
It is the hope of TR and the VCV that the country will come together to unite in this fight. DelaCruz explained that it’s not unlike the victory gardens or rationing for the needs of the military during World War II. This is a new, pivotal moment where that same urgency and sacrifice is needed.
The VCV is not only battling the virus, they are attacking false and misleading information. “It’s combat against misinformation … It’s about demonstrating leadership upfront that we believe in science and vaccinations, which are important to get the nation back on its feet ,” delaCruz stated.
To help with tackling misinformation, VCV is being supported by the global advertising technology company Amobee and AdTechCares, which has over 50 partners. These organizations are committed to developing ongoing Public Service Announcement campaigns to ensure credible information is distributed about vaccine efficacy.
“Vaccinations may be an individual act but that individual act has tremendous, tremendous societal value. Just like the collective self-sacrifice in World War II, this act of vaccinations or supporting vaccinations in any way possible, it touches everyone,” delaCruz said. “Americans have traditionally risen to the occasion during the hardest of times … we have an opportunity here to make it happen again.”
Team Rubicon and the VCV is imploring veterans to put on a new uniform and continue to serve this new and vital mission. It may be one of the most important fights to date.
An overall goal of scientific research on groups such as veterans is generalizability — the measure of how well the research findings and conclusions from a sample population can be extended to the larger population.
It is always dependent on studying an ideal number of participants and the “correct” number of individuals representing relevant groups from the larger population such as race, gender or age.
In setting the eligibility criteria for the Airborne Hazards and Open Burn Pit Registry, VA researchers used generalizability as an important consideration.
Simply put, they want as many veterans and active-duty service members who had deployed to specific locations to join the registry. Participants could have been exposed to burn pits or not. They could be experiencing symptoms or not. Or, they could receive care from VA or not.
Helping to improve the care of your fellow veterans
For researchers, everyone eligible to join the registry has a unique experience critical in establishing empirical evidence. By signing up and answering brief questions about their health, veterans and active-duty service members are helping researchersunderstand the potential effects of exposure to burn pits and ultimately helping improve the care of their fellow veterans.
It is estimated that 3 million veterans and active-duty service members are eligible to join the registry. However, just over 173,000 have joined as of April 1, 2019, and 10 out of 100 have had the free, medical evaluation, which is important to confirm the self-reported data in the registry.
See what questions are asked
In hopes of encouraging more participation in the registry, VA is sharing a partial list of registry data collected from June 2014 through December 2018. This snapshot will give you a sense of the type of questions on the questionnaire as well as how the data is reported when shared with researchers and VA staff.
As a reminder, the registry is open to active-duty service members and most Veterans who deployed after 1990 to Southwest Asia, Iraq, Afghanistan, Djibouti and Africa, among other places.
Five months before the 9/11 attacks, US Secretary of Defense Donald Rumsfeld sent a memo to one of his advisers with an ominous message.
“Cyberwar,” read the subject line.
“Please take a look at this article,” Rumsfeld wrote, “and tell me what you think I ought to do about it. Thanks.”
Attached was a 38-page paper, published seven months prior, analyzing the consequences of society’s increasing dependence on the internet.
It was April 30, 2001. Optimistic investors and frenzied tech entrepreneurs were still on a high from the dot-com boom. The World Wide Web was spreading fast.
Once America’s enemies got around to fully embracing the internet, the report predicted, it would be weaponized and turned against the homeland.
The internet would be to modern warfare what the airplane was to strategic bombers during World War I.
The paper’s three authors — two PhD graduates and the founder of a cyber defense research center — imagined the damage a hostile foreign power could inflict on the US. They warned of enemies infecting computers with malicious code, and launching mass denial of service attacks that could bring down networks critical to the functioning of the American economy.
“[We] are concerned that US leadership, and other decision-makers about Internet use, do not fully appreciate the potential consequences of the current situation,” the report said. “We have built a network which has no concept whatsoever of national boundaries; in a war, every Internet site is directly on the front line. If we do not change course soon, we will pay a very high price for our lack of foresight.”
The US government had a problem on its hands and it seemed a long ways from figuring out how to handle it.
More than 17 years later, that problem seems to have only gotten worse.
Follow the money
Willie Sutton, the notorious Brooklynite who spent his life in and out of prison, once told a reporter he robbed banks because that’s where the money is. Computer hackers aren’t so different.
In 2016, hackers attacked companies in the financial services sector more than companies in any other industry, according to IBM. Over 200 million financial records were breached that year, a 937% increase from 2015. And that’s not including the incidents that were never made public.
As hackers become more sophisticated and cyber attacks more routine, New York is on notice. Home to the most valuable stock exchange on Earth, New York City is the financial capital of the world. When the market moves here, it moves everywhere.
So it was no surprise when in September 2016, Gov. Andrew Cuomo announced that the New York State Department of Financial Services (NYDFS) was gearing up to implement sweeping, first-of-their-kind cybersecurity regulations to protect the state’s financial services industry — an unprecedented move no other state or federal agency had taken anywhere in the US.
Cybersecurity in New York’s financial industry was previously governed by voluntary frameworks and suggested best practices. But the NYDFS introduced, for the first time, regulations that would be mandatory, including charging firms fines if they didn’t comply.
Maria Vullo, the state’s top financial regulator, told Business Insider that her No. 1 job is to protect New Yorkers.
“They’re buying insurance. They’re banking. They’re engaging in financial transactions. And in each of those activities, they’re providing their social security information, banking information, etc.,” she said. “The companies that are obtaining that personal information from New Yorkers must protect it as much as possible because a breach of that information is of great consequence to the average New Yorker.”
On March 1, the regulations turn a year old, although some of the rules are not yet in effect and will phase in over time.
The NYDFS oversees close to 10,000 state-chartered banks, credit unions, insurance companies, mortgage loan servicers, and other financial institutions, in addition to 300,000 insurance licensees.
The combined assets of those organizations exceed $6 trillion, according to the NYDFS — and they’re all in constant danger of being hacked.
Banks are vulnerable
In the summer of 2014, an American, two Israelis, and two co-conspirators breached a network server of JPMorgan Chase, the largest US bank.
They got hold of roughly 83 million customers’ personal information, including names, addresses, phone numbers, and email addresses.
The hackers didn’t steal any money from personal bank accounts, but that wasn’t the point.
They wanted access to a massive trove of emails that they could use for a larger, separate money scam. In just three years, that operation netted the hackers more than $100 million.
The JPMorgan hack wasn’t the end game. It was a piece of the puzzle.
The attack began with the simple theft of a JPMorgan employee’s login credentials, which were located on a server that required just one password.
Most servers with sensitive information like a person’s banking data require what’s called multi-factor, or two-factor authentication.
But JPMorgan’s security team had lapsed and failed to upgrade the server to include the dual password scheme, The New York Times reported at the time.
The attack, the breach, and the reputational damage that followed could have been avoided with tighter security. Instead, the hack went down as one of the largest thefts of customer data in US history.
“Banks are especially vulnerable,” Matthew Waxman, a professor and the co-chair at Columbia University’s Cybersecurity Center, told Business Insider. “Disruption to the information systems on which banks rely could have shockwaves throughout the financial system, undermining public confidence in banking or knocking off line the ability to engage in commercial transactions.”
That’s the kind of catastrophic damage that worried the authors cited in Defense Secretary Rumsfeld’s 2001 memo.
They weren’t only concerned about stolen email addresses and social security numbers. They were worried about the fallout from such activity.
Banking works because consumers trust the system. But what if people lose trust?
Waiting until a catastrophe
News of impending cybersecurity regulations in New York in the fall of 2016 was both welcomed and shunned.
Some companies saw it as a chance to improve their own security standards while others complained of government overreach. Some were relieved to find they wouldn’t have to make any adjustments to the way they operated. Others were overwhelmed by the heavy lifting they would have to do to comply.
How a company views the regulations depends in large part on its size. Bigger institutions with more cybersecurity professionals and more resources at their disposal tend to already have in place much of what the regulations require. Many smaller companies, which tend to be under-staffed and under-resourced, have a lot more work to do to catch up.
The only additional thing Berkshire Bank has to do is sign off on its annual compliance form, which it sends to NYDFS to prove that it’s doing everything it’s supposed to be doing.
“We actually have to do nothing [new] from a compliance standpoint,” the company’s chief risk officer Gregory Lindenmuth told Business Insider.
While several cybersecurity consultants told Business Insider they acknowledge the NYDFS rules as a positive step in the right direction, they also point to a new law in Europe as a leading example of the role government has to play in protecting individuals’ privacy rights and ensuring that companies secure consumers’ personal information.
In 2016, the European Parliament passed a law called the General Data Protection Regulation (GDPR) — landmark legislation that imposes millions of euros in fines on companies that do not adequately protect their customers’ data.
Whereas the NYDFS regulations cover just one industry in one US state, the GDPR affects companies in all industries across all 28 member states of the European Union. Companies that do not report a data breach or fail to comply with the law more generally could be fined up to €20 million or 4% of its global revenue.
Matthew Waxman, the Columbia professor, says it’s not surprising that the implementation of such a law remains far-fetched in the US.
“It’s sometimes very difficult to get the government to take action against certain threats until a catastrophe takes place,” Waxman said. “But that could change very suddenly if the banking system were knocked offline or another very major disruption to everyday life affected the lives and security of citizens on a massive scale.”
But are the deterrents strong enough?
Data protection advocates calling for stricter cybersecurity regulations in the US are generally happy about the NYDFS rules.
For the first time, a state government is taking seriously the protection of consumer data, they say. It’s giving companies in the financial sector an ultimatum: protect New Yorkers or face punishment.
But the nature of that punishment is not entirely clear.
“My big criticism of the regulations is there’s no clear consequence for non-compliance,” Tom Boyden, a cybersecurity expert who helps companies defend against cyber attacks, told Business Insider. “If companies don’t feel like there’s going to be any consequence for any action on their part, companies aren’t going to take [the regulations] seriously.”
In fact, for many companies, Boyden thinks “that’s the default position.”
Vullo, the head of the NYDFS, said she has the ability to fine companies that are not complying and is willing to exercise that authority, although how much that cost may be would depend case-by-case.
“I don’t want this to be a punitive atmosphere, but obviously if institutions are not taking this seriously, then there will be consequences,” she said. “But it’s not the objective.”
If anything, the objective is to make it clear that cyber threats are real and that New Yorkers and the companies that maintain their personal information are facing higher risks of attack.
Cybersecurity affects everyone, and Vullo said she hopes the regulations will help companies prioritize it.
“Everyone is part of our cybersecurity team,” Theresa Pratt, the chief information security officer at a private trust company in New York, told Business Insider. “It doesn’t matter what myself or my colleagues do from a technical perspective. If I have one user who clicks a bad link or answers a phisher’s question over the phone, it’s all for naught.”
New York leading the way
The new rules have far-reaching implications beyond New York. A business in the state that has a parent company based in Germany, for example, still has to comply with the regulations.
This leaves some organizations in the precarious position of having to either restructure company-wide cybersecurity practices or build an entirely new and unique security apparatus that is specific to its New York offices.
“I do think that because of the scope of some of these regulations, they’re kind of blurring the lines between countries and continents. I think we’re going to see more and more of this,” GreyCastle Security CEO Reg Harnish told Business Insider. The New York-based consulting firm is helping companies comply with the new regulations.
In the absence of leadership from the federal government on certain issues related to cybersecurity and data protection, states like New York are beginning to fill the void. Several cybersecurity experts told Business Insider that the NYDFS regulations could become a model for other industries or even policies at the national level.
In 2017, at least 42 states introduced more than 240 bills or resolutions related to various cybersecurity issues, according to the National Conference of State Legislatures. And since the NYDFS rules took effect, financial regulators in Colorado and Vermont have followed New York’s lead with cybersecurity regulations of their own.
Indeed, cyber experts have come a long way in better understanding the threats we face since Rumsfeld’s dire cyberwar memo in 2001. But 17 years on, the former secretary of defense’s concerns still seem as relevant as ever.
Perhaps the memo was a prescient warning — a warning that fell on deaf ears, but is not too late to address.
The US in 2012 became aware of “the full gravity” of Russia’s ability to breach certain types of secure communications and track devices used by FBI surveillance teams, the report said. In addition to fearing that the Russians may have gained access to US intelligence channels, officials also believed that Russian spies could locate undercover FBI surveillance teams and the substance of FBI communications.
That would have not only enabled the Russians to evade surveillance and communicate with human sources, but given them the opportunity to collect information about their pursuers, Yahoo News reported. It also prompted concerns among officials that there was a Russian asset lurking within the US intelligence community.
The Russians first breached the FBI’s communication systems in 2010, after the arrest and exposure of a group of Russian spies in the US, Yahoo News said. That year, the FBI began investigating Russia’s efforts to recruit US assets; one of the foremost targets was Carter Page, who later served as a foreign-policy aide on President Donald Trump’s campaign.
The FBI informed Page in 2013 that the Russians were trying to cultivate him, but Page ignored their warnings and even publicly boasted about his connections to high-ranking Russian government officials.
The Russians are also said to have breached the backup communication channels the FBI used, something one former senior counterintelligence official told Yahoo News the US “took extremely seriously.”
The investigation found that Russia’s hack of the FBI’s communication systems was a key reason the Obama administration kicked out 35 Russian diplomats and closed two Russian diplomatic facilities in December 2016.
President Barack Obama said the measures were in retaliation for Russia’s interference in the 2016 election, but Yahoo News reported that the US also wanted to close those two compounds because they were critical to Russia’s efforts to intercept FBI communications.
Russia and the US have ramped up their counterintelligence and cybersecurity operations against each other in recent years as tensions between them mount.
In particular, the US has recently targeted Russia’s electrical grid and placed “potentially crippling malware” within the Russian system, The New York Times reported in June 2019. Power grids have long been the focus of cyberattacks, but the US’s operation is the most aggressive yet and meant to serve as a warning to Russia, as well as position the US to carry out additional cyberattacks in the event of a conflict with Moscow, the report said.
The Times described two administration officials as saying there was “broad hesitation” to brief Trump in much detail about the operation, in part because of concerns about how Trump would react, or that he would shut down the operation or discuss it with foreign officials.
Trump’s disclosure of classified information to two Russian officials in an Oval Office meeting in 2017 contributed to the US’s decision to extract a top CIA asset in Russia shortly after, CNN reported last week.
Other US media outlets subsequently published key identifying details about the asset, and Russian state-sponsored media later said it had the intelligence operative’s name. Shortly after that, the Russian government filed a request with Interpol for more information about the spy.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
Russia has recently been in the news for its aggressive bomber patrols. Well, the United States has apparently flipped the script with the Russians and done a little bomber patrolling of its own.
According to a report by Reuters, at least one Sukhoi Su-27 Flanker was scrambled to intercept a Air Force B-52H Stratofortress that was flying in international airspace over the Baltic Sea along Russia’s border.
Russia Today reported that the B-52 intercept was followed by Moscow scrambling a MiG-31 Foxhound to intercept a Norwegian P-3 Orion maritime patrol aircraft. The Norwegian plane was operating in international airspace over the Barents Sea, a location where Russia deploys its force of nuclear-powered ballistic missile submarines. The Russian media outlet also noted that NATO is conducting exercises in Romania.
Russia has carried out a number of similar operations against the United States, Japan, and Europe, prompting their own fighter alerts and intercepts. Russia has usually used the Tu-95 “Bear” bomber capable of firing cruise missiles, like the AS-15, in these missions.
The B-52H has been part of America’s arsenal since 1961. According to an Air Force fact sheet, 58 B-52s are in the active inventory, with another 18 in reserve. The B-52 has a top speed of 650 miles per hour, an unrefueled range of 8,800 miles, and can carry up to 70,000 pounds of nuclear or conventional ordnance, including long-range cruise missiles like the AGM-86. It is expected to remain in service until 2040.
Trident Juncture, taking place between Oct. 25 and Nov. 7, 2018, in and around Norway, is just one of NATO’s military exercises in 2018.
But officials have said the 50,000 troops, tens of thousands of vehicles, and dozens of planes and ships on hand make it the biggest NATO exercise since the Cold War.
NATO leaders have stressed it’s strictly a defensive exercise, but it comes amid heightened tensions between NATO and Russia, and Moscow has made its displeasure well known.
What’s also clear is that as the US and NATO refocus on operations in Europe, they’re preparing to deal with a foe that predates the alliance and the rival it was set up to counter.
German infantrymen board a MV-22B Osprey during Trident Juncture 18 at Vaernes Air Base, Norway, Nov. 1, 2018.
(US Marine Corps/Lance Cpl. Cody J. Ohira)
“So when I was back in the States a couple weeks ago doing a press conference on Trident Juncture, people asked me the question, ‘Why in the world would you do this in October and November in Norway? It’s cold,'” Adm. James Foggo, who heads the Navy’s 6th Fleet and is overseeing Trident Juncture, said in an Oct. 27, 2018 interview.
“That’s exactly why,” he added. “Because we’re toughening everyone up.”
The US military maintained a massive presence in Europe during the Cold War. The bulk of it was in Germany, though US forces, like the Marine Corps hardware in secret caves in Norway, were stationed around the continent.
In the years after the Cold War, however, the emphasis on major operations in Europe — and the logistical and tactical preparations they entail — waned, as operations in the desert environments of the Middle East expanded.
In recent years, the US and NATO have taken a number of steps to reverse that shift, and with that has come renewed attention to the challenges of cold-weather operations.
Belgian and German soldiers from the Very High Readiness Joint Task Force train for weapons proficiency in Norway during Exercise Trident Juncture, Oct. 30, 2018.
(PAO 1 German/Netherlands Corps)
“The change is all of us are having to recapture the readiness mindset and ability to fight full-spectrum in all conditions across the theater,” said Ben Hodges, who commanded the US Army in Europe before retiring as a lieutenant general at the end of 2017.
“The Marines used to always be in Norway. They had equipment stored in caves,” Hodges said.
“I cannot imagine Hohenfels or Grafenwoehr without freezing” weather, he added, referring to major Army training areas in Germany. “It’s either freezing there or completely muddy.”
“We used to always do that” kind of training, Hodges said, but, “frankly, because of the perception and hope that Russia was going to be a friend and a partner, we stopped working on those things, at least the US did, to the same level.”
In mid-October 2018, US Marines rehearsed an amphibious assault in Iceland to simulate retaking territory that would be strategically valuable in the North Atlantic. That assault was practice for another landing to take place during Trident Juncture, where challenging terrain and weather were again meant to test Marine capabilities.
US Marines during Trident Juncture 18 near Hjerkinn, Norway, Nov. 2, 2018.
(US Marine Corps photo by Cpl. Kevin Payne)
“Cold-weather training, we’ve had training before … we got underway. Just being here is a little different,” said Chief Petty Officer David Babil, a senior ramp marshal overseeing the Corps’ amphibious-landing exercise in Alvund, Norway. “You’ve just got to stay warm. The biggest difference is definitely the weather, but other than that we train how we fight, so we’re ready 24/7.”
Chances for unique training conditions are also found ashore.
“The first consideration is the opportunity to employ the tanks in a cold-weather environment,” said 1st Lt. Luis Penichet, a Marine Corps tank platoon commander, ahead of an exercise that included a road march near Storas in central Norway.
“So once the conditions start to ice over and or fill with snow, one thing we are unable to train in Lejeune is to cleat the tanks and drive them in those type of conditions,” Penichet added. “So we have the possibility to replace [tank tread] track pads with metal cleats to allow us to continue maneuvering. So that is one benefit of operating in the environment like this.”
US Marines in a Landing Craft Air Cushion vehicle from the USS New York perform an amphibious landing at Alvund, Norway, during Trident Juncture 18, Oct. 30, 2018.
(U.S. Marine Corps photo by Lance Cpl. Tanner Seims)
“Everything is more difficult in the cold, whether it’s waking up in the morning or even something as simple as going from your tent to the shower,” said Marine Corps 1st Lt. Kyle Davis, the camp commandant at Orland Airfield at Brekstad, on the central Norwegian coast.
The US Defense Department recently extended the Marine Corps deployment in Norway, where Commandant Gen. Robert Neller has emphasized that the Corps is trying to prepare for a potential “big-ass fight” in harsh conditions.
But US personnel aren’t the only ones who see the benefits of training at the northern edge of Europe.
“To my surprise, it wasn’t actually much of a change in our equipment,” said 1st Lt. Kristaps Kruze, commander of the Latvian contingent at the exercise, when asked about how the weather affected his gear.
(US Marine Corps photo)
“That just proves that our equipment is not only capable of withstanding temperature in Latvia, but also capable of withstanding harsh winters also in Norwegian territory,” Kruze said in an interview in Rena, near Norway’s border with Sweden, as Trident Juncture got underway.
“During Trident Juncture, since we are in Norway, we have to deal with the cold weather,” Sgt. Cedric, a French sniper, said in Rena, as French, Danish, British, and German troops conducted long-range sniper training.
“For a sniper, cold weather requires to be more careful when shooting. It can affect the shooting a lot,” Cedric said. “Also, when we are infiltrating, we need to make sure we conserve energy and stay warm once we are in position.”
Integrating with NATO forces in the harsh conditions was particularly important for troops from Montenegro, which is NATO’s newest member.
Italian army soldiers face off against members of the Canadian army in a simulated attack during Trident Juncture in Alvdal, Norway, Nov. 3, 2018.
(Photo by MCpl Pat Blanchard)
“As you can see there is much snow and its temperature [is in] the very low degrees,” Lt. Nikola Popovic, an infantry platoon commander from Montenegro, said in Folldal, in the mountains of central Norway.
“Because we are a new NATO member, a new ally, we are here to prepare ourselves for winter conditions, because this is an exercise in extreme winter conditions,” Popovic said.
The temperature was the biggest surprise, he added, “but we are working on it.”
NATO countries in the northern latitudes, like Norway, as well as Sweden and Finland, which are not members but partner closely with the alliance and are at Trident Juncture, have no shortage of cold-weather experience.
“They live there so they do it all the time,” Hodges said.
A Canadian army BvS 10 Viking nicknamed “Thor” on a mountainside near Alvdal, Norway, during Exercise Trident Juncture 18, Nov. 4, 2018.
(NATO photo by Rob Kunzing)
“This is about the US having to relearn” how to operate in those kind of conditions, Hodges added.
Fighting in that kind of environment requires military leaders to consider the affects on matters both big and small, whether that’s distributing lubricant for individual machine guns or the movement of thousands of troops and their heavy gear across snow-covered fields and on narrow mountain roads.
“It affects vehicle maintenance, for example. It affects air operations. It’s not just about individual soldiers being cold,” Hodges added. “It’s all of your systems have to be able to operate, so you have to practice it and take those factors into consideration.”
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
Israeli Air Force commander Maj. Gen. Amikam Norkin announced that its F-35 aircraft, known as Adir, “are already operational and flying in operational missions.”
“We are the first in the world to use the F-35 in operational activity,” Norkin said via the official Israel Defense Forces’ Twitter account on May 22, 2018.
In an interview with the Haaretz newspaper, Norkin said F-35s had been used in two recent strikes, but it was unclear if the aircraft supported the missions by providing intelligence, surveillance and reconnaissance or conducted the strikes.
Early May 2018, Iranian forces “fired 32 rockets, we intercepted 4 of them & the rest fell outside Israeli territory,” Norkin tweeted, referring to a counterattack in the Golan Heights.
Israel responded by attacking multiple Iranian weapons and logistics sites in Syria. “In our response attack, more than 100 ground-to-air missiles were fired at our planes,” he said.
Israel declared initial operating capability of its Lockheed Martin-made F-35I in December 2017. Middle Eastern outlets have said the fifth-generation stealth aircraft has likely made flights before for reconnaissance missions over or near Syrian territory, but those reports are unconfirmed.
Critics at the time wondered why the F-35 wasn’t used, since the aircraft would have been better able to evade enemy radar. But pilots and former members of the Israeli Air Force said use of the F-35 would have been risky so early in its operational lifespan.
“If they thought that the targets were so strategically important, I’m sure they’d consider using them. But they weren’t. So why risk use of the F-35s at such an early point in their operational maturity?” retired Israeli Air Force Brig. Gen. Abraham Assael told Defense News at the time.
Israel in August 2017, signed a new contract with Lockheed for its next batch of 17 aircraft, following two previous contracts for 33 aircraft.
IAF officials have expressed interest in buying up to 30 additional aircraft.
The United States Postal Service said it would suspend mail delivery in some states on Jan. 30, 2019, because of extreme cold from a polar vortex in much of the country this week that has sent temperatures plunging well into negative degrees.
“Weather forecasters are warning of dangerously cold conditions in parts of the nation,” the agency said in a press release on Jan. 29, 2019. “Some places could see wind chill readings as low as 60 below zero.”
It added that “due to this arctic outbreak and concerns for the safety of USPS employees, the Postal Service is suspending delivery” on Jan. 30, 2019, in several three-digit ZIP code locations:
More than 220 million Americans will be forced to contend with below-freezing temperatures. The temperature in Chicago on Jan. 30, 2019, was about 20 degrees below zero, according to the National Weather Service, with the windchill extending even more into the negatives.
“You’re talking about frostbite and hypothermia issues very quickly, like in a matter of minutes, maybe seconds,” Brian Hurley, a meteorologist with the Weather Prediction Center, told The Associated Press.
It was around lunchtime when the shots rang out across Camp Maiwand in eastern Afghanistan.
Two gunmen — one armed with an AK-47 assault rifle and the other operating a mounted PKM machine gun in the rear of a pickup truck — had just opened fire on a group of soldiers from the 1st Security Force Assistance Brigade visiting the Afghan base.
“The plan was the fully automatic machine gun was going to open up on us, and the AK was going to pick us off one by one,” said Staff Sgt. Steven McQueen, assigned to the brigade’s Charlie Company, 1st Battalion, 28th Infantry Regiment.
Staff Sgt. Steven McQueen accepts his damaged Enhanced Combat Helmet from Program Executive Office Soldier officials during a personal protective equipment return ceremony on Fort Belvoir, Va., March 3, 2019.
(Photo by Devon L. Suits)
“It just so happened that the terrain we were operating in, there was a choke point that we were walking through — it was a perfect opportunity to attack us,” he added.
During the insider attack, McQueen was struck in the back of the helmet with a 7.62x54mm Russian round at a distance of about 20 feet, knocking him off his feet, he said. Understanding the gravity of the situation, McQueen quickly recovered and started checking on his soldiers as they worked to secure their position.
“It’s nothing that I’ve experienced in my life that I can relate it to,” McQueen said. “If I had to guess, [it would feel like] you stood there and let a horse kick you in the back of the head.
Program Executive Office Soldier officials presented Staff Sgt. Steven McQueen with his damaged Enhanced Combat Helmet during a ceremony on Fort Belvoir, Va., March 3, 2019.
(Photo by Devon L. Suits)
“I was surprised that I was able to react as quickly as I did because I knew what had happened … I knew I was shot,” he added.
The attack lasted about 10 minutes before Afghan National Army forces moved in to apprehend the rogue policemen, McQueen said.
Command Sgt. Maj. Timothy Bolyard was fatally shot in the attack and was laid to rest at the West Virginia National Cemetery later that month. McQueen was sent to Germany and treated for a traumatic brain injury.
Program Executive Office Soldier officials presented Staff Sgt. Steven McQueen with his damaged Enhanced Combat Helmet during a personal protective equipment return ceremony on Fort Belvoir, Va., March 3, 2019.
(Photo by Devon L. Suits)
“I had no surgeries. Basically, the eight days that it took me to get [from Germany] to Fort Benning [in Georgia], the brain bleed was healed,” he said. “Other than some physical therapy to correct some balance issues, that’s the only treatment I’ve had.”
On March 4, 2019, leaders at Program Executive Office Soldier presented McQueen with his damaged Enhanced Combat Helmet during a personal protective equipment return ceremony.
Brig. Gen. Anthony Potts, Program Executive Office Soldier officer in charge, presents Staff Sgt. Steven McQueen with his damaged Enhanced Combat Helmet during a personal protective equipment return ceremony on Fort Belvoir, Va., March 3, 2019.
(Photo by Devon L. Suits)
“My dad used to have this saying. He would say, ‘Son, Superman is not brave,” Brig. Gen. Anthony Potts, head of PEO Soldier, said at the ceremony. “My dad was telling me [that] Superman was invincible. He couldn’t be hurt. The reality is our servicemen and women can be hurt.”
Affixed to a plaque, the section of McQueen’s damaged headgear shows clear signs of distress with a portion ripped open to expose layers of shredded padding underneath.
“I want our equipment to make our soldiers invincible,” Potts added. “We’re going to do our best to provide you the equipment that you need to go out there and fight and return.”
Soldier protection system
After the presentation, PEO Soldier officials met with the media to discuss the new Soldier Protection System, or SPS. The new system provides soldiers with a modular, scalable integrated system that can be tailored to meet their mission requirements.
The fact that McQueen is still alive today is “a testament to what we do as acquisition professionals, in terms of providing capabilities that will bring our soldiers home safely,” said Col. Stephen Thomas, soldier protection and individual equipment project manager.
The Enhanced Combat Helmet, he noted, resulted from collaboration between the services after it was procured by the Marine Corps.
“This allowed us to provide the highest level of capability to our warfighters going into harm’s way,” Thomas added.
The new Integrated Head Protection System, or IHPS, is displayed at Fort Belvoir, Va., March 4, 2019.
(Photo by Devon L. Suits)
The new SPS features an Integrated Head Protection System, or IHPS, a modular scalable vest, a ballistic combat shirt, and the ballistic combat belt. Overall the new system is said to weigh less while maintaining the same level of ballistic protection and mobility than current systems, officials said.
The IHPS, for example, has shown a 100 percent improvement against a blunt force impact, when compared to the ECH, said Lt. Col. Ginger Whitehead, soldier protective equipment product manager.
In simple terms, blunt force protection refers to the way the energy is dissipated after a round strikes the helmet, Whitehead added.
Additionally, the IHPS will feature a boltless retention system, making it easier for soldiers to mount accessories to their helmet, or have the ability to integrate a visor or mandible protection device. When compared to current head protection technology, the boltless retention system eliminates the need for pre-drilled holes, which has the potential to weaken the ballistic material, she said.
Program Executive Office Soldier displays the new Soldier Protection System, or SPS, at Fort Belvoir, Va, March 4, 2019.
(Photo by Devon L. Suits)
Security force assistance brigades are currently using a version of the SPS, Thomas added. The 3rd Brigade Combat Team, 82nd Airborne Division, at Fort Bragg, North Carolina, will be the first conventional force to receive the upgraded personal protective equipment.
Even if it is the new SPS or the current equipment, McQueen has a newfound appreciation for his military-issued gear.
“Before this incident, I thought the helmet was cumbersome, and it was overkill,” said McQueen, joking that he once preferred to wear a ball cap and a plate carrier. “I was sorely mistaken. This helmet works, and I’m a living testament to it.”
A lot of science and a lot of innovation go into producing the helmet and other protective equipment, he said.
“From now on, all my soldiers will wear [their helmet] — and if they are in a hostile environment, they won’t take it off,” he said.
Having served for seven years, McQueen is determined to meet the goals he set for his Army career. And while he is slightly delayed, he said. The sergeant is still committed to making the selection for Special Forces and completing Ranger training.
Suspected Taliban insurgents attacked a US-operated base in Afghanistan’s eastern province of Khost April 24, officials said, but gave few immediate details of an assault that coincided with a visit to Kabul by US Secretary of Defense James Mattis.
The attackers had detonated a car bomb at an entrance to Camp Chapman, a secretive facility manned by US forces and private military contractors, said Mubarez Mohammad Zadran, a spokesman for the provincial governor.
But he had little immediate information on any damage or casualties.
“I am aware of a car bomb attack at one of the gates in the US base, but we are not allowed there to get more details,” the spokesman said.
A spokesman for the US military in Afghanistan, Capt. William Salvin, confirmed the car bomb attack. He said there appeared to be a number of Afghan casualties but none among US or coalition personnel at the base.
The attack came just three days after more than 140 Afghan soldiers were killed in an attack on their base by Taliban fighters disguised in military uniforms.
Both Manson and Billy Corgan come from military backgrounds: “We can speak to the personal effect that yes, we can be artists and yes, we can play these roles in public, but at the end of the day, if we don’t serve all our communities – [and] veterans are an integral part of our communities – we’re not really doing service as artists or as people,” Corgan told Rolling Stone.
The tour begins in Concord, California on July 7th.