Rear Adm. Brian Fort, commander, Naval Surface Group Middle Pacific, announced that U.S. Navy ships and submarines based in Hawaii not currently undergoing maintenance availabilities have begun to sortie as Hurricane Lane travels toward the Hawaiian Islands.
Ships that sortie will be positioned to help respond after the storm, if needed.
“Based on the current track of the storm, we made the decision to begin to sortie the Pearl Harbor-based ships,” Fort said. “This allows the ships enough time to transit safely out of the path of the storm.”
Units will remain at sea until the threat from the storm subsides and Hawaii-based Navy aircraft will be secured in hangars or flown to other airfields to avoid the effects of the hurricane.
A satellite image of Hurricane Lane at 10:45 p.m. Hawaii Standard Time. At 11 p.m. Hawaii Standard Time, the category 4 hurricane, which was located about 350 miles south of Honolulu, Hawaii, was moving northwest at 7 mph with maximum sustained winds of 145 mph.
(US Navy photo)
The Navy orders a sortie during potentially extreme weather conditions to reduce the risk of significant damage to ships and piers during high winds and seas. Some ships will not get underway, due to various maintenance availabilities, and are taking extra precautions to avoid potential damage. Commanding officers have a number of options when staying in port, depending on the severity of the weather. Some of these options include adding additional mooring and storm lines, dropping the anchor, and disconnecting shore power cables.
Personnel in Navy Region Hawaii, including on Oahu and Kauai, should follow hurricane awareness and preparedness guidelines established by city/county and state government. Navy Region Hawaii and its installations provide updated information on Facebook sites:
At the beginning of hurricane season in early June 2018, Navy Region Hawaii provided detailed information in the region/base newspaper Ho’okele for service members, civilian workforce and families. Information included preparing a disaster supply kit, creating a family emergency communication plan and knowing where to go if ordered to evacuate:
At the end of World War II, Germany was divided in half, leaving West and East Germany. The West was controlled by NATO and the Warsaw Pact nations controlled the East. The former capital of Berlin was torn in two, split between communists and capitalists.
As you might expect, life under a communist regime is hell and people were looking for a way out. After the Berlin Wall and Inner German border (IGB) were created and heavily guarded, only an estimated 5,000 escapees managed to sneak out and into the freedoms of Western civilization throughout the 28 years of the Wall’s existence.
In the early days of the Cold War, defecting wasn’t that difficult. It was estimated that, before the Berlin Wall and the IGB were erected, nearly 3.5 million East Germans defected to West Germany. Legal loopholes, a lack of physical borders, and little effort to keep East Germans meant that all it took to get away was to hop a train.
All of this changed on August 13th, 1961, when the Berlin Wall went up. By August 24th, the order was given to kill anyone attempting to leave East Germany.
2. Wearing uniforms
One of the most iconic images of the Cold War was captured when an East German Soldier, Conrad Schumann, leaped over concertina wire on August 15th, 1961 as the Wall was being created.
Speaking of black markets, special passports that allowed access past guards were also forged. There were certain citizens that were authorized to cross the border, legally, for various reasons. While actual passport holders were required to come back by nightfall, escapees with a fake passport and little interest in returning to a Soviet sh*thole said, “scheiß drauf” and never returned.
Many options for avoiding the Berlin Wall, such as passage through the Spree or Havel Rivers, were downright dangerous. While the guards would detain or shoot as you tried to sneak across the Wall, you ran the risk of drowning if you opted for a river crossing. In fact, many people drowned in escape attempts, but that wasn’t as dangerous as this option.
There were many tall buildings located near the Wall. Escapees would climb up to the highest floor needed and, boldly, jump. Many survived, some were wounded, but others weren’t as lucky.
As the years went on, the Wall grew, making this passage impossible.
The largest mass escape from East Berlin was when 57 people made their way through a tunnel, aptly named afterwords, “Tunnel 57.”
The tunnel systems were elaborate and ran deeply underground to prevent detection.
6. Hiding in trunks
The final illegal journey from East Germany to the West was done by an American man who smuggled a father and his little girl in his vehicle just days before the Wall fell. Their story was shared with National Geographic in the video below.
F-22 Raptor fighter jets from Tyndall Air Force Base, Florida, have joined combat air forces from across the nation for the joint, full-spectrum readiness exercise Red Flag 17-3.
Ten F-22s from the 95th Fighter Squadron are joining the exercise alongside Marine Corps F-35B and Air Force F-35A Lightning II joint strike fighters.
This is a first in Red Flag history that both variants of F-35 will take part in the exercise, officials said. The F-35B is the short-takeoff and vertical-landing version of the jet, and the F-35A has conventional takeoff and landing capabilities.
Other aircraft such as B-1 Lancer and B-2 Spirit bombers, E-3 Sentry airborne warning and control aircraft, F-16 Fighting Falcon fighters, and more will also be featured and will each play an important role in the exercise theater, officials said.
The F-22 is designed to project air dominance rapidly and at great distances.
“We’re primarily an escort role,” said Air Force Capt. Brady Amack, 95th Fighter Squadron pilot. “We integrate with other aircraft, whether they’re fourth or fifth generation, and ensure they’re able to execute their mission. The amount of experience we get is huge. There is no other area, really, where we can train with so many different types of aircraft in such a large area.”
Higher Level of Training
By gathering these diverse units together, the exercise facilitates readiness training on a higher level, as each unit rings specific expertise and talents to the table, officials said. Red Flag teaches them to work together as they would in the field, possibly for the first time, before facing an actual threat, they added.
Red Flag 17-3 is exclusively reserved for U.S. military forces, which allows for specific training when coordinating fifth-generation assets, exercise officials noted, adding that Tyndall’s Raptors will be able to learn from working with both F-35 units taking part.
Both aircrafts’ stealth capabilities, advanced avionics, communication and sensory capabilities help augment the capabilities of the other aircraft, Amack said.
“Working with the F-35s brings a different skill set to the fifth-generation world,” he added. “Having a more diverse group of low-observable assets has allowed us to do great things.”
The mission of the Red Flag exercise overall is to maximize the combat readiness and survivability of participants by providing a realistic training environment and a preflight and post-flight training forum that encourages a free exchange of ideas.
The 95th Fighter Squadron benefits by learning how to completely integrate into multi-aircraft units and gaining experience from intense sorties, officials said.
“Since Red Flag 17-3, in particular, is U.S. only, we get to take the opportunity to take things to the next level,” said Air Force Lt. Col. Mark Sadler, 414th Combat Training Squadron commander.
“This Red Flag alone gives us our singular largest fifth-generation footprint, which allows us to learn as we continue to build new ideas. As we look to be innovative and solve problems, we’ll only increase our readiness by getting smarter as a force and as joint warfighters.”
The European Union and China are teaming up to rewrite global trade rules, their latest move as part of the trade conflict President Donald Trump has launched as part of his “America First” agenda.
The two powers usually find themselves on opposite sides in economic disputes. The EU has long blamed China for flooding its markets with cheap steel and has imposed its own steep tariffs on Beijing.
But on this issue the two have been driven together by Trump’s increasingly aggressive push to levy tariffs both on rival powers — like China — and also on longtime allies like the EU.
The pushback took the form of Brussels and Beijing agreeing to form a group inside the World Trade Organization dedicated to rewriting the global rules on subsidies and tech policy in the light of Trump’s actions.
The two also agreed to uphold the global trading system under the WTO, which Trump has described as “unfair” and bad for the US.
Trump on June 26, 2018, threatened to escalate things further. “They must play fair or they will pay tariffs!” he tweeted.
Speaking in Beijing ahead of an annual EU-China summit, representatives warned against countries’ unilaterally taking dramatic action on trade policy, a barely disguised attack on Trump’s approach.
“Both sides agree to firmly oppose unilateralism and protectionism and prevent such practices from impacting the world economy or even dragging the world economy into recession,” Liu He, the vice premier of China’s State Council, said in a speech quoted by Japan’s Kyodo news agency.
Jyrki Katainen, the EU’s vice president on jobs and economic growth, added that actions like Trump’s unilateral tariff hikes against China showed that WTO rules on global trade had to change, the Associated Press reported.
“We have to reform WTO in order to make multilateralism better functioning in the future. This unites the EU and China and the moment,” he told CNBC.
“I’m not naive. I don’t expect fast delivery on all fronts, but first you have to decide whether you are in favor of unilateralism or multilateralism. If you are in favor of multilateralism, then you have to engage seriously, for instance in reforming the WTO.”
Scott Kennedy, a China economy expert at the Center for Strategic and International Studies in Washington, DC, said the new EU-China partnership was “a big deal” and risked leaving the US isolated.
“It is not in the interests of the United States to just be playing defense and creating a fortress America while the EU, China, and others play offense and attempt to set the rules of the game for the next century,” he told the AP.
The EU wants other governments to join the group, the AP reported Katainen as saying.
The EU has long blamed China for the global overcapacity of steel, and it has imposed steep tariffs on Chinese steel to protect Europe’s domestic metals industry. Katainen urged China to tackle overcapacity in its steel, aluminum, and other sectors including technology, the EU said in a statement.
Separately, France and China also upgraded their bilateral trade relations this week, with Beijing promising to buy more French farm produce and continue talks over the purchase of billions of dollars’ worth of Airbus jets, according to Reuters. President Emmanuel Macron declared China’s interest in buying $18 billion worth of Airbus A320 narrow-body jets but failed to clinch a deal during a state visit in January 2018.
France also expressed support for China’s Belt and Road Initiative, a massive Chinese project to link some 70 countries across Asia, Africa, Europe, and Oceania through land and maritime trade.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
An infantryman works and trains hard to one day deploy their weapon system and score an accurate kill shot. For machine-gunners, scoring a precise kill from a distance is highly unlikely.
This isn’t because the shooter is incapable; that weapon system wasn’t designed to nail an enemy combatant square between the eyes but, rather, to take their head clean off.
However, some gunners still strive to make that perfect shot with their heavy-ass weapon.
2. The “Napoleon”
This one refers to the French military leader, Napoleon Bonaparte, because of his height. This gunner gets looked at differently because of the contrast between their smaller body and the massive size of the M240 they’re holding.
However, they always manage to carry it and fire the weapon like a seasoned pro.
3. The “Screamer”
Machine-gunners are trained to whisper the words “die motherf*cker, die” while firing their weapon. In the time it takes to finish saying the words to themselves, they’ve shot roughly between four to six rounds. The “screamer” chooses to shout that sh*t out loud.
This repeated mantra is designed to prevent the gunner from overheating their barrel and causes them regularly adjust their fire for more accuracy.
4. The “Barrel-burner”
As previously stated, machine-gunners are trained to only discharge four to six rounds at a time to avoid overheating their barrels. The “barrel-burner” tends to forget the shooting cycle and fires more than intended — which can cause the barrel to warp.
5. The “Freeloader”
This gunner tends to ask other members of his squad to carry his extra ammo so that they can haul more Rip-Its. What’s hilarious about this type of gunner is the nice way they go about asking you.
It makes you feel good about yourself for helping out a brother.
If you’ve ever served in the infantry, you probably had one or two “Animal Mothers” in your company. Just like in the movie, Full Metal Jacket, he’s the trigger-happy badass who is more than thrilled to shoot into an enemy compound and then ask questions later.
Its vulnerability reminded me of a conversation I had two years ago, at the Web Summit conference in Lisbon with cybersecurity investor Sergey Gribov of Flint Capital. He was talking up one of his investments, an industrial cybersecurity firm based in Israel called CyberX. Half-bored, I girded myself for his pitch. They usually go like this: “The internet is full of hackers! They want to steal your data and your money! If only companies used my company’s awesome product, we would all be safe!”
I have heard hundreds of pitches like this.
But my conversation with Gribov was different. It was … extreme. The criminals who break into the web sites of banks or chainstores and steal personal data or money are not the scariest people out there, he told me. The hackers we really ought to be worrying about are the ones trying to take entire countries offline. People who are trying to take down the internet, switch the lights off, cut the water supply, disable railways, or blow up factories.
The West’s weakness is in the older electronics and sensors that control processes in infrastructure and industry. Often these electronics were installed decades ago. The security systems controlling them are ancient or non-existent. If a hacker can gain control of a temperature sensor in a factory, he — they’re usually men — can blow the place up, or set it on fire. “The problem people don’t realise is it becomes a weapon of mass destruction. You can take down a whole country. It can be done,” he said.
And then, how do you respond? Does the country that was attacked — the one struggling to get its power grid back online — launch nukes? Probably not, he said, because “you have no idea who did it.”
“You can have a team of five people sitting in a basement and be just as devastating as WMDs,” he said. “It’s really scary. In some sense it’s a matter of time because it’s really easy.”
At the time, I discounted my conversation with Gribov. His VC fund was invested in CyberX, so he had an obvious interest in propagating the idea that the world is full of bad guys.
But in the years since we talked, two unnerving things happened.
In December 2017, three men pleaded guilty to causing the largest internet outage in history – a distributed “denial of service” attack that blacked out the web across most of the US and large chunks of Northern Europe for about 12 hours. They had disabled Dyn, a company that provides Domain Name System (DNS) services — the web’s directory of addresses, basically — to much of the internet.
“Someone is learning how to take down the Internet,” Bruce Schneier, the CTO of IBM Resilient believes
Both attacks were conducted by relatively unsophisticated actors. The Dyn attack was done by three young men who had created some software that they merely hoped would disable a competitor’s company, until it got out of control. The Mauritania attack was probably done by the government of neighbouring Sierra Leone, which was trying to manipulate local election results by crippling the media.
Three major power suppliers simultaneously taken over by hackers
Next, I talked to Nir Giller, cofounder and CTO of CyberX. He pointed me to the December 2015 blackout in Ukraine, in which three major power suppliers were simultaneously taken over by hackers. The hackers gained remote control of the stations’ dashboards, and manually switched off about 60 substations, leaving 230,000 Ukrainians in the cold and dark for six straight hours.
“It’s a new weapon,” Giller says. “It wasn’t an accident. It was a sophisticated, well-coordinated attack.”
The fact that the hackers targeted a power station was telling. The biggest vulnerabilities in Western infrastructure are older facilities, Giller believes. Factories, energy plants, and water companies all operate using machinery that is often very old. New devices and software are installed alongside the older machinery, often to control or monitor it. This is what the industrial “internet of things” looks like. Hackers don’t need to control an entire plant, the way they did in Ukraine. They only need to control an individual sensor on a single machine. “In the best-case scenario you have to get rid of a batch” of product, Giller says. “In the worst case, it’s medicine that is not supervised or produced correctly.”
CyberX has done work for the Carlsbad Desalination Plant in California. It claims to be the largest seawater desalination plant in the US. And it serves an area prone to annual droughts. Giller declined to say exactly how CyberX protects the plant but the implication of the company’s work is clear — before CyberX showed up, it was pretty easy to shut down the water supply to about 400,000 people in San Diego.
2010 was the year that cybersecurity experts really woke up to the idea that you could take down infrastructure, not just individual companies or web sites. That was the year the Stuxnet virus was deployed to take down the Iranian nuclear program.
“Stuxnet in 2010 was groundbreaking”
The principle behind Stuxnet was simple: Like all software viruses, it copied and sent itself to as many computers running Microsoft Windows as it possibly could, invisibly infecting hundreds of thousands of operating systems worldwide. Once installed, Stuxnet looked for Siemens Step7 industrial software. If it found some, Stuxnet then asked itself a question: “Is this software operating a centrifuge that spins at the exact frequency of an Iranian nuclear power plant that is enriching uranium to create nuclear weapons?” If the answer was “yes,” Stuxnet changed the data coming from the centrifuges, giving their operators false information. The centrifuges stopped working properly. And one-fifth of the Iranian nuclear program’s enrichment facilities were ruined.
“Stuxnet in 2010 was groundbreaking,” Giller says.
Groundbreaking, but extremely sophisticated. Some experts believe that the designers of Stuxnet would need access to Microsoft’s original source code — something that only a government like the US or Israel could command.
Russia is another state actor that is growing its anti-infrastructure resources. In April 2017 the US FBI and the British security services warned that Russia had seeded UK wifi routers — the little boxes that serve wireless internet in your living room — with a hack that can read all the internet traffic going through them. It’s not that Vladimir Putin wants to see what you’re looking at on Pornhub. Rather, “What they’re doing there is building capability,” says Andrew Tsonchev, the director of technology at Darktrace Industrial, a London-based cybersecurity firm that specialises in artificially intelligent, proactive security. “They’re building that and investing in that so they can launch attacks from it across the world if and when they need to.”
A simple extortion device disabled Britain’s largest employer in an afternoon
Then, in 2017, the Wannacry virus attack happened. Like Stuxnet, Wannacry also spread itself through the Microsoft Windows ecosystem. Once activated, it locked up a user’s computer and demanded a ransom in bitcoin if the user wanted their data back. It was intended as a way to extort money from people at scale. The Wannacry malware was too successful, however. It affected so many computers at once that it drew attention to itself, and was quickly disabled by a security researcher (who ironically was later accused of being the creator of yet another type of malware).
During its brief life, Wannacry became most infamous for disabling hundreds of computers used by Britain’s National Health Service, and was at one point a serious threat to the UK’s ability to deliver healthcare in some hospitals.
The fact that a simple extortion device could disable Britain’s largest employer in an afternoon did not go unnoticed. Previously, something like Stuxnet needed the sophistication of a nation-state. But Wannacry looked like something you could create in your bedroom.
A screenshot shows a WannaCry ransomware demand.
Tsonchev told Business Insider that Wannacry changed the culture among serious black-hat hackers.
“It managed to swoop across, and burn down huge sectors in different countries for a bit,” he says. “In the course of that, the shipping industry got hit. We had people like Maersk, and other shipping terminals and operators, they went down for a day or two. What happened is the ransomware managed to get into these port terminals and the harbours that control shipping … that intrigued attackers to realise that was something they could deliberately try and do that wasn’t really in their playbook at that point.”
“Oh look, we can actually start to do things like take down manufacturing plants and affect the global shipping industry”
“So this year, we see follow-on attacks specifically targeting shipping terminals and ports. They hit the Port of Barcelona and the Port of San Diego and others. That seemed to follow the methodology of the lessons learned the previous year. ‘Oh look, we can actually start to do things like take down manufacturing plants and affect the global shipping industry.’ A couple years ago they were just thinking about stealing credit card data.”
But it may have taught North Korea something more useful: You don’t need bombs to bring a nation to its knees.
Oddly, you have a role to play in making sure this doesn’t happen. The reason Russia and North Korea and Israel and the US all got such devastating results in their attacks on foreign infrastructure is because ordinary people are bad at updating the security software on their personal computers. People let their security software get old and vulnerable, and then weeks later they’re hosting Stuxnet or Wannacry or Russia’s wifi listening posts.
National security is, somehow, about “the absurdity of the mundane,” says Tsonchev. “These little annoying popups [on your computer] are actually holding the key to national security and people are just ignoring them. Individuals have a small part to play in keeping the whole country safe.”
So if you’re casting about for a New Year’s resolution right now, consider this one: Resolve to keep your phone and laptop up to date with system security software. Your country needs you.
Just before the end of January 2018, Russia announced that its Pantsir-S1 mobile surface-to-air missile and anti-aircraft artillery weapons system would be equipped with a new type of missile to help it defend against smaller, low-flying targets.
Called the “gvozd” (the Russian word for “nail”), the missile is a small armament designed to take out small targets like drones. The Pantsir will reportedly be able to carry 4 gvozds in one canister, which means a fully armed system can have up to 48 missiles.
The issue of how to combat small and cheap drones that can carry small payloads or carry out kamikaze-style attacks continues to vex global militaries. The terrorist group ISIS has found them to be particularly useful, and in January 2017 saw a swarm of drones attack a Russian air base in Syria, reportedly damaging seven jets.
The Pantsir, known to NATO as the SA-22 Greyhound, entered service in the Russian Military in 2012. Its primary role is that of point-defense, meaning it can defend from low-flying aerial targets within a certain area.
It is armed with two 2A38M 30 mm autocannons that have a maximum fire rate of 5,000 rounds per minute, and twelve AA missiles in twelve launch canisters. The system’s weapons have an effective range of 10 to 20 kilometers.
Conversely, Russia’s S-400 missile system is intended to deal with long-range targets. The system can be armed with four different missiles, the longest of which has a claimed range of 400 kilometers, while the most common missile has a range of 250 kilometers.
The two systems working in tandem provide a “layered defense,” with the S-400 providing long-ranged protection against bombers, fighter jets, and ballistic missiles, and the Pantsir providing medium-ranged protection against cruise missiles, low-flying strike aircraft, and drones.
This explains why the systems have been deployed together in Syria, which Russian President Vladimir Putin has said “guaranteed the superiority of our Aerospace Forces in Syrian air space.”
The Pantsir has also reportedly been seen in Ukraine’s Donbas region, no doubt helping separatists defend against attacks from the Ukrainian Air Force.
Russian air defense strategy
“It certainly makes the system more robust,” Jeffrey Edmonds, a research scientist and expert on the Russian military and foreign policy at the Center for Naval Analyses told Business Insider. “A layered defense is always better than a single defense layer.”
Compared to Russia, the US does not have a point-defense system. Its air defense strategy relies primarily on the Patriot Missile System, the Avenger Air Defense System, and shoulder launched FIM-92 Stingers.
Edmonds says that the reason the Russians have been able to achieve these gains in aerial defense over the West is because the US has not had to face an adversary with advanced air capabilities, and because Russia’s air defense strategy is made specifically to counter America’s aerial superiority.
“For the Russians, in any conflict with the United States, the primary concern is going to be a massive aerospace attack,” Edmonds said.
Operations in Afghanistan, Iraq, Libya, Yugoslavia, and elsewhere have shown that the Americans prefer to use what the Russians refer to as non-contact or new-model warfare — the use of effective airpower to destroy a large amount of targets and winning wars without invading a country.
“Their layered defenses are designed around that threat,” Edmonds said.
Edmonds pointed out that aircraft take a more active and aggressive role in American and NATO strategy than Russian strategy.
“The way we fight, our aircraft are out front. They prep the battlespace for follow-on units,” he said. “It’s almost the opposite for the Russians. Fighter aircraft will be fighting kind of behind the line, not venturing far out front.”
Edmonds also noted that defense against an aerospace happens “across domains.”
“That’s counter-space, that’s GPS jamming, that’s missiles, dispersion, camouflage — there’s a whole host of things that they practice, and capabilities they developed to counter a massive aerospace attack,” Edmonds said.
The hullabaloo surrounding the future of the US Air Force’s A-10 Thunderbolt II has been endless.
Its effectiveness on the battlefield has been proven with servicemembers on the ground going as far as calling it their “guardian angel” in the heat of battle. Equipped with an arsenal of weapons, including its notorious 30mm Gatling gun, it’s not hard to see why the A-10 commands such respect.
However, even with its impressive resume, the Air Force continues to float plans to replace the A-10 after 40 years of service.
Even so, a Defense News interview with a US Air Force official indicated that a compromise may be on the negotiating table.
Lt. Gen. James M. Holmes, the US Air Force Deputy Chief of Staff for Strategic Plans and Requirements, explained that a new light attack aircraft could be introduced that would not outright replace the fleet of nearly 300 A-10s, but instead, supplement them starting as early as 2017.
In doing so, Defense News reports that this new light aircraft, called Observation, Attack, Experimental (OA-X), would give commanders a cheap alternative to fight insurgents, compared to the costs of operating the A-10 and other fighter aircraft.
“Do you believe that this war that we’re fighting to counter violent extremists is going to last another 15 years?” Holmes asked in the Defense News interview. “If you believe it does, and our chief believes it will, then you have to think about keeping a capability that’s affordable to operate against those threats so that you’re not paying high costs per flying hour to operate F-35s and F-22s to chase around guys in pickup trucks.”
However, that doesn’t necessarily preclude the A-10 being outright replaced. Defense Newsreported that the Air Force began floating an A-10 replacement possibility in July. Under the proposal, the Air Force would conduct close air support (CAS) missions with the A-10 with a supporting cheap OA-X in low-threat environments.
Under the proposal, the Air Force would at a later date also acquire a fleet of future A-X aircraft that would perform in medium-threat environments and eventually replace the A-10.
Also on the table was the possibility of pushing back the projected retirement date of the A-10 from 2022 due to the high operational costs of the Air Force’s latest fifth-generation fighters.
It should be noted, however, that the annual cost of the A-10 program costs less than 2% of the Air Force’s budget. In 2014, it was also reported that the A-10 costed about $11,500 per hour to operate — about a third of the hourly cost of the military’s latest F-35 Lightning II.
Many siblings serve together in the military, but not many are able to leverage their family ties to give back and further their units. For the Vetere brothers, they are leveraging each other’s experience in their different units to initiate and implement additive manufacturing, commonly known as 3D printing, to their respective units.
Twin brothers, U.S. Navy Lt. Adam Vetere and U.S. Marine Corps 1st Lt. Mark Vetere, are natives of Andover, Massachusetts. Adam, currently serving as a Civil Engineer Corps officer assigned to Naval Mobile Construction Battalion (NMCB) 1, is working with Chief Utilitiesman Justin Walker and Electronics Technician 1st Class James Merryman to implement additive manufacturing into daily battalion operations.
Mark, currently assigned to Marine Aviation Logistics Squadron 31, has been implementing additive manufacturing to his unit for nearly two years. Now Adam is planning to implement the technology into NMCB-1 operations.
“At first I volunteered for the position because of my personal interest in learning about 3D printing; I think it has great potential in the Naval Construction Force,” said Adam. “Knowing my brother was the 3D printing representative for his command made it easier to get involved because I knew from the start I could learn a lot from him.”
With Mark and his team’s experience, the opportunity presented itself for NMCB-1 to send their additive manufacturing team to Marine Corps Air Station Beaufort, South Carolina, to discuss best practices, learn about printing capabilities, training programs and new policy being implemented into the different services.
“We were able to leverage our close relationship as twins to be able to skip passed a lot of the formalities and get straight to business,” said Adam. “It was easy to have full and open conversations about program strengths, weaknesses, policy shortfalls, lessons learned and areas of improvement. It was extremely beneficial.”
“It was eye-opening,” said Walker. “It gave us ideas on how we can implement this technology into our processes by seeing how they are currently operating. This opens up great potential for future interoperability.”
For the twin brothers, the military first drew their attention back in high school.
“I wanted to join the military, and our parents wanted us to go to college,” said Adam. “I feel like we made a good compromise and decided to apply for one of the service academies.”
Both brothers graduated from the U.S. Naval Academy (USNA) in Annapolis, Maryland, in 2015, though Adam was initially denied when he first applied.
U.S. Naval Academy.
“I just knew it was somewhere I wanted to go,” said Adam. “Knowing my brother would be there with me was the great part of it.”
Adam describes serving in the military as a lifestyle he and his brother enjoy sharing.
“We both love serving and love the lifestyle that is the military so we hope to continue it,” said Adam. “It’s nice to be able to have such a close relationship with someone that knows all the acronyms, jargon, processes and challenges that go into the military lifestyle. That certainly has made things easier.”
When asked about his parents and their thoughts on both him and his brother serving together, Adam chuckles with his response.
“I think they are proud of us, or at least I hope,” said Adam.
The twin brother’s decision to join the military came about in part because of a visit their parents took them on to New York City in 2001.
“Our parents took us to Ground Zero in 2001 around Thanksgiving time,” said Adam. “I was only nine at the time but I still have an image burned into my head of the rubble I saw from the end of the street that day. At the time I imagine I had little idea of what I was looking at, but as I got older growing up in a post 9/11 United States certainly played a role in being drawn to the military.”
Both brothers look forward to their future assignments in their respective branches. Mark was selected to attend Naval Postgraduate School in Monterey, California, and Adam recently accepted orders to Naval Special Warfare Group 1 Logistics Support Unit 1 in Coronado, California.
VA and the Department of Defense (DoD) have taken action to minimize the number of non-essential required visits to identification (ID) card offices during the coronavirus public health emergency. If you have a VA or DoD ID card that has expired or is getting ready to expire, here are your options.
VA-issued Veteran Health Identification Cards (VHIC):
During the COVID-19 pandemic, Veterans enrolled in VA health care who are seeking a brand new VHIC (initial) should contact their local VA medical facility for guidance on going to facility to request a card. Once issued, cards are valid for 10 years.
Most Veterans will be able obtain a replacement VHIC (not initial VHIC) by contacting their local VA medical facility and making their request by phone, or they can call 877-222-8387, Monday through Friday, 8:00 a.m. to 8:00 p.m. ET. Once their identity has been verified, a replacement card will be mailed to them.
DoD-issued ID Cards:
Detailed information concerning DoD ID Card operations during the coronavirus pandemic can be found at the DoD Response to COVID-19 – DoD ID Cards and Benefits webpage (https://www.CAC.mil/coronavirus).
For all information regarding DoD-issued ID cards, please contact the Defense Manpower Data Center Identity and ID Card Policy Team at firstname.lastname@example.org. Limited information follows:
Common Access Cards (CAC) (including military and civilian personnel):
DoD civilian cardholders who are transferring jobs within DoD are authorized to retain their active CAC.
Cardholders whose DoD-issued CAC is within 30 days of expiration may update their certificates online to extend the life of the CAC through Sept. 30, 2020, without having to visit a DoD ID card office in person for reissue. Directions for this procedure may be found at https://www.CAC.mil/coronavirus under News and Updates / User Guide – Updating CAC/VoLAC Certificates.
DoD-issued Uniformed Services ID Cards (USID) (including Reservist, military retiree, 100% disabled Veteran, and authorized dependent ID cards):
Expiration dates on USID cards will be automatically extended to Sept. 30, 2020, within DEERS for cardholders whose affiliation with DoD has not changed but whose USID card has expired after Jan. 1, 2020.
Sponsors of USID card holders may make family member enrollment and eligibility updates remotely.
Initial issuance for first-time USID card-eligible individuals may be done remotely with an expiration date of one year from date of issue. The minimum age for first-time issuance for eligible family members has been temporarily increased from 10 to 14 years of age.
“When our freedom was under attack one battle would turn the tide.”
The first official trailer for ‘Midway’ has been released, depicting the World War II fight in the Pacific from Pearl Harbor to Midway. Starring Luke Evans (Dracula, Fast & Furious 6), Patrick Wilson (Aquaman, Watchmen), Woody Harrelson (True Detective, everything else you’ve ever seen), and Mandy Moore (she’s missing you like candy), the film is advertised as “The story of the Battle of Midway, told by the leaders and the sailors who fought it.”
The trailer opens with the attack at Pearl Harbor, showing the devastation up close. “Pearl Harbor is the greatest intelligence failure in American history,” a voice insists. Hindsight proves how true this statement was. In fact, an American admiral planned the attack on Pearl Harbor in 1932, nine years before the Japanese carried it out, but the military failed to heed the admiral’s cautions, and the men and women there that day paid the price.
The trailer follows the war in the Pacific to Midway, a battle that would change the conflict.
Six months after the Dec. 7, 1941 attacks, the Japanese fleet commander, Admiral Yamamoto Isoroku, devised a strategy to destroy the American aircraft carriers that had escaped Pearl Harbor. Instead, United States code-breakers allowed Pacific Fleet commander Admiral Chester W. Nimitz to launch a counterattack, ambushing the Japanese fleet at Midway.
Midway dealt a decisive blow to the Japanese and allowed American forces to deploy throughout the Pacific, edging close and closer to Japan. World War II battles really depict the raw, close-range danger that service members were in. Pilots were dog-fighting in vulnerable aircraft and facing off against the heavy firepower of naval ships, who, meanwhile, were turning cannons on each other that threatened to pull sailors with them to a watery grave.
It’s almost incomprehensible now, but films like Midway won’t let us forget:
“You’re gonna remember this moment for the rest of your life.”
Nothing says Thanksgiving like football in the backyard, family gathered around the table, and, of course, a nice hunk of meat. For many of us, this means turkey or chicken, but if you’re seeking a good, old-fashioned red meat this holiday season (or just looking to change things up), consider a cold-brew marinated steak.
This meal may seem jarring if you think coffee is only for drinking. But for those of us who have experimented with coffee rubs during grilling season, we know it can infuse a rich nutty flavor and make the meat super tender. This is due to the coffee’s high acidity levels, which help break down tough proteins in the meat. Allowing meat to marinate in a coffee brine for a few hours further assists the softening process, leaving the meat tender and with a smoky flavor.
This cold-brew marinated ribeye is a great way to shake things up for Thanksgiving dinner.
(Photo by Lacey Whitehouse/Coffee or Die)
We’ll be using cold-brew coffee as the base for our marinade. This is a great opportunity to finish up the last batch of concentrate you brewed — or make some fresh to use in other seasonal beverages during the holidays.
It’s important to note that cold brew is not simply iced coffee — it’s a completely different process. While iced coffee is brewed hot and brought to room temperature before being served over ice, cold brew utilizes room temperature water and coffee grounds to create a concentrate. Typically, the coffee is ground coarsely and left to brew in temperate water for six to 12 hours. The result is a smooth concentrate that is three times stronger than traditionally brewed coffee and can be stored in the refrigerator for up to two weeks.
(Photo by Lacey Whitehouse/Coffee or Die)
To mitigate the risk of the meat hardening, we’ll be combining the cold brew with other acid-rich ingredients to make the juiciest possible steak. For our marinade, we’ll be using cold brew, apple cider vinegar, olive oil, garlic cloves, onion powder, parsley, dried oregano, salt, and molasses. The apple cider vinegar cuts the fats and natural sweetness of the steak to help round out its overall flavor. Combined with molasses, we’ll achieve a wonderfully delicate balance between the savoriness of the meat and the tang of the marinade.
The holiday season is a time to show your love, and there’s no better way to do that than with a good cut of meat. Enjoy your steak with fries or your favorite holiday sides.
Recipe by Brittany Ramjattan/Coffee or Die.
(Photo by Lacey Whitehouse/Coffee or Die. Graphic by Erik Campbell/Coffee or Die.)
The Nigerian Air Force carried out an air strike on Friday that bagged some of the top leaders of Boko Haram. The Nigerian military announced the deaths late Monday on their Twitter feed.
The Nigerian military announced the deaths late Monday on their Twitter feed. The military statement confirmed that Abubakar Mubi, Malam Nuhu and Malam Hamman were among the dead in the “most unprecedented and spectacular air raid” on the village of Taye in the Sambisa forest. The military’s statement also claimed that Abubakar Shekau, the leader of the Nigerian terrorist group responsible for an attack that resulted in the kidnapping of over 300 schoolgirls from Chibok and for selling them into slavery, was fatally wounded. Shekau’s death has been reported before, only to be disproven by video appearances.
The military’s statement also claimed that Abubakar Shekau, the leader of the Nigerian terrorist group responsible for an attack that resulted in the kidnapping of over 300 schoolgirls from Chibok and for selling them into slavery, was fatally wounded. Shekau’s death has been reported before, only to be disproven by video appearances.
A photo released by the Nigerian military with their statement on the air strike showed pilots in a briefing in front of a Dassault/Dornier Alpha Jet of the 75th Strike Group. This multi-role aircraft serves in both the light attack and training roles, and can carry up to 5,500 pounds of bombs and missiles, including the BL755 cluster bomb and the AGM-65 Maverick. It has a top speed of 540 knots, and a range of roughly 380 miles. The plane also serves in the air forces of France, Thailand, Belgium, Cameroon, Togo, Qatar, Portugal, and Morocco. The plane has been retired by Germany and the Ivory Coast.
Nigerian Alpha Jets have been the primary strike weapon against Boko Haram, whose name means “Western education is forbidden.” Nigeria also has Chengdu J-7 Fishbed interceptors and Areo L-39 Albatross trainers in service, but the former are primarily used for air defense (replacing Russian-build MiG-21 Fishbeds in 2009) and the latter planes have a very limited bomb load (roughly 600 pounds).