The CIA’s new chief of operations for Iran is the man who ran the CIA’s drone attack program in Pakistan, took out a high-ranking member of the Iranian-sponsored Hezbollah terrorist group, and was involved in the CIA’s interrogation program.
Michael D’Andrea has been widely credited with hampering al Qaeda since the attacks on the World Trade Center and the Pentagon on Sept. 11, 2001.
There also appear to be other appointments, including the selection of a new counter-terrorism chief, who reportedly wants more authority to carry out strikes.
The Trump Administration has named a number of people whose views on Iran have been described as “hawkish,” among them Lieutenant Gen. H.R. McMaster, the national security advisor. McMaster had commanded the 3rd Armored Cavalry Regiment in Tal Afar, and the New York Times notes that McMaster believes Iranian agents aiding Iraqi insurgents were responsible for the deaths of some of his men.
Trump’s CIA director, former Congressman Mike Pompeo, has also been an Iran hawk, vowing during his confirmation hearings to be very aggressive in ensuring Iran abides by the 2015 nuclear deal that was widely criticized by Trump during the 2016 campaign.
Iran has also been responsible for a number of incidents in the Persian Gulf, often harassing U.S. Navy ships and aircraft.
In the late 1980s, American and Iranian forces had several clashes, including one incident when Nightstalkers damaged an Iranian ship laying mines in the Persian Gulf, and a full-scale conflict known as Operation Praying Mantis.
Iran’s Islamic Revolutionary Guard Corps (IRGC) said on April 22 that it launched a military satellite into orbit, after months of failed attempts.
State television and the Tasnim news agency, which is affiliated with the IRGC, reported the launch on April 22, calling it “successful.”
The United States, Israel, and other countries did not immediately confirm the satellite reached orbit, but their criticism suggested they believed the launch happened.
Analysts said it raised concerns about whether the technology used could help Iran develop intercontinental ballistic missiles.
“Iran’s first military satellite, Noor (light), was launched this morning from central Iran in two stages. The launch was successful and the satellite reached orbit,” state TV said.
The IRGC on its official website said the satellite reached an orbit of 425 kilometers above the Earth’s surface.
The multistage satellite launch used a Ghased, or “messenger,” satellite carrier to put the device into space — a previously unheard-of system, according to the paramilitary group.
Tasnim added that the operation was carried from a launchpad in Dasht-e Kavir, a large desert in central Iran.
Iran has suffered several failed satellite launches in recent months. The United States and Israel have said that such launches advance Iran’s ballistic missile program.
Following Iran’s latest launch, U.S. Secretary of State Mike Pompeo said that “Iran needs to be held accountable for what they’ve done.”
“We view this as further evidence of Iran’s behavior that is threatening in the region,” Deputy Secretary of Defense David Norquist told a Pentagon briefing.
General John Hyten, vice chairman of the Joint Chiefs of Staff, said the launched vehicle “went a very long way” but that it was too early to say whether it successfully placed a satellite in orbit.
Israel’s Foreign Ministry described the launch as a “facade for Iran’s continuous development of advanced missile technology,” while German Foreign Ministry spokesman Christofer Burger warned that “the Iranian rocket program has a destabilizing effect on the region.”
The launch comes amid increased tensions between Iran and the United States over the latter’s withdrawal from a landmark nuclear deal and after a U.S. drone strike killed top IRGC commander Qasem Soleimani in January.
It also may signal that Iran is more willing to take chances during the current global coronavirus crisis, which has slashed oil prices to historic lows and forced many countries into an economic recession.
“This is big,” said Fabian Hinz, a researcher at the James Martin Center for Nonproliferation Studies at the Middlebury Institute of International Studies in Monterey, California.
“Big question now is what tech the first stage used. Solid propellant? Liquid using old Shahab 3 tech? Liquid using more sophisticated motors/fuels? This is key to establishing how worrisome the launch is from a security perspective,” he added.
The Naval Surface Warfare Center, Dahlgren, has been exploring the use of forward-firing rockets, missiles, fixed guns, a chin-mounted gun, and also looked at the use of a 30MM gun along with gravity drop rockets and guided bombs deployed from the back of the V-22.
In recent years, the Corps has been working on a study to help define the requirements and ultimately inform a Marine Corps decision with regards to armament of the MV-22B Osprey.
Adding weapons to the Opsrey would naturally allow the aircraft to better defend itself should it come under attack from small arms fire, missiles, or surface rockets while conducting transport missions; in addition, precision fire will enable the Osprey to support amphibious operations with suppressive or offensive fire as Marines approach enemy territory.
Furthermore, weapons will better facilitate an Osprey-centric tactic known as “Mounted Vertical Maneuver” wherein the tiltrotor uses its airplane speeds and helicopter hover and maneuver technology to transport weapons, such as mobile mortars and light vehicles, supplies, and Marines behind enemy lines for a range of combat missions, including surprise attacks.
The initial steps in the process of arming the V-22 includes selecting a Targeting-FLIR, improving digital interoperability, and designating Integrated Aircraft Survivability Equipment solutions. Integration of new weapons could begin as early as 2019 if the initiatives stay on track and are funded, Corps officials said.
Developers added that “assault support” will remain as the primary mission of the MV-22 Osprey, regardless of the weapons solution selected.
So far, Osprey maker Bell-Boeing has delivered at least 290 MV-22s out of a planned 360 program of record.
Laser-guided Hydra 2.75-inch folding fin rockets, such as those currently being fired from Apache attack helicopters, could give the Osprey greater precision-attack capabilities. One such program firing 2.75in rockets with laser guidance is called Advanced Precision Kill Weapons System.
Bell-Boeing designed a special pylon on the side of the aircraft to ensure common weapons carriage. The Corps has been analyzing potential requirements for weapons on the Osprey, considering questions such as the needed stand-off distance and level of lethality.
New Osprey Variant in 2030
The Marine Corps is in the early stages of planning to build a new, high-tech MV-22C variant Osprey tiltrotor aircraft to enter service by the mid-2030s, service officials said.
While many of the details of the new aircraft are not yet available, Corps officials told Scout Warrior that the MV-22C will take advantage of emerging and next-generation aviation technologies.
The Marine Corps now operates more than 250 MV-22 Ospreys around the globe and the tiltrotor aircraft are increasingly in demand, Corps officials said.
The Osprey is, among other things, known for its ability to reach speeds of 280 knots and achieve a much greater combat radius than conventional rotorcraft.
Due to its tiltrotor configuration, the Osprey can hover in helicopter mode for close-in surveillance and vertical landings for things like delivering forces, equipment, and supplies – all while being able to transition into airplane mode and hit fixed-wing aircraft speeds. This gives the aircraft an ability to travel up 450 nautical miles to and from a location on a single tank of fuel, Corps officials said.
A Corps spokesman told Scout Warrior that, since 2007, the MV-22 has continuously deployed in a wide range of extreme conditions, from the deserts of Iraq and Libya to the mountains of Afghanistan and Nepal, as well as aboard amphibious ships.
Between January 2007 and August 2015, Marine Corps MV-22s flew more than 178,000 flight hours in support of combat operations, Corps officials said.
Corps officials said the idea with the new Osprey variant is to build upon the lift, speed, and versatility of the aircraft’s tiltrotor technology and give the platform more performance characteristics in the future. While few specifics were yet available, this will likely include improved sensors, mapping, and digital connectivity, even greater speed and hover ability, better cargo and payload capacity, next-generation avionics, and new survivability systems, such as defenses against incoming missiles and small-arms fire.
Greenberg also added that the MV-22C variant aircraft will draw from technologies now being developed for the Army-led Future Vertical Lift program involved in engineering a new fleet of more capable, high-tech aircraft for the mid-2030s
The US Army is currently immersed in testing with two industry teams contracted to develop and build a fuel-efficient, high-speed, high-tech, next-generation, medium-lift helicopter to enter service by 2030.
The effort is aimed at leveraging the best in helicopter and aircraft technology in order to engineer a platform that can both reach the high-speeds of an airplane while retaining an ability to hover like a traditional helicopter, developers have said.
The initiative is looking at developing a wide range of technologies, including lighter-weight airframes to reduce drag, different configurations and propulsion mechanisms, more fuel-efficient engines, the potential use of composite materials, and a whole range of new sensor technologies to improve navigation, targeting, and digital displays for pilots.
Requirements include an ability to operate in what is called “high-hot” conditions, meaning 95-degrees Fahrenheit and altitudes of 6,000 feet where helicopters typically have difficulty operating. In high-hot conditions, thinner air and lower air-pressure make helicopter maneuverability and operations more challenging.
The Army’s Joint Multi-Role Technology Demonstrator program has awarded development deals to Bell Helicopter-Textron and Sikorsky-Boeing teams to build “demonstrator” aircraft by 2017 to help inform the development of a new medium-class helicopter.
The Textron-Bell Helicopter team is building a tilt-rotor aircraft called the Bell V-280 Valor and the Sikorsky-Boeing team is working on early testing of its SB-1 Defiant coaxial rotor-blade design. A coaxial rotor-blade configuration uses counter-rotating blades with a thrusting technology at the back of the aircraft to both remain steady and maximize speed, hover capacity, and maneuverability.
Planned missions for the new Future Vertical Lift aircraft include cargo, utility, armed scout, attack, humanitarian assistance, MEDEVAC, anti-submarine warfare, anti-surface warfare, land/sea search and rescue, special warfare support, and airborne mine countermeasures, Army officials have said.
Other emerging technology areas being explored for this effort include next-generation sensors and navigation technologies, autonomous flight, and efforts to see through clouds, dust, and debris described as being able to fly in a “degraded visual environment.”
While Corps officials say they plan to embrace technologies from this Army-led program for the new Osprey variant, they also emphasize that the Corps is continuing to make progress with technological improvements to the MV-22.
These include a technology called V-22 Aerial Refueling System, or VARS, to be ready by 2018, Corps developers explained.
The Marine Corps Osprey with VARS will be able to refuel the F-35B Lightning II with about 4,000 pounds of fuel at VARS’ initial operating capability and the MV-22B VARS capacity will increase to 10,000 pounds of fuel by 2019, Corps officials told Scout Warrior last year.
The development is designed to enhance the F-35B’s range, as well as the aircraft’s ability to remain on target for a longer period.
The aerial refueling technology on the Osprey will refuel helicopters at 110 knots and fixed-wing aircraft at 220 knots, Corps developers explained.
The VARS technology will also be able to refuel other aircraft such as the CH-53E/K, F-18, AV-8B Harrier jet, and other V-22s.
The Corps has also been developing technology to better network Osprey aircraft through an effort called “Digital Interoperability.” This networks Osprey crews so that Marines riding in the back can have access to relevant tactical and strategic information while in route to a destination.
A tank unit deployed to the National Training Center at Fort Irwin, California, for a training exercise had a big surprise when they were ordered to carry out an assault. Their movement was halted not by artillery and missiles, but by ones and zeros. They had been hacked.
According to a report by DefenseSystems.com, the assault was thwarted by cyber weapons. While the exact nature of the hacking wasn’t disclosed, the report did state that it targeted the radios and wireless communication systems on the tanks.
“These tanks had to stop, dismount, get out of their protection, reduce their mobility,” Capt. George Puryear told DefenseSystems.com. The need to do so resulted in their “defeat” in the training exercise.
Other electronic warfare and cyber warfare capabilities were also tested at Fort Irwin. In one of the tests, hackers were able to infiltrate into a network and provide false data to the commanders. The potential mischief that can be wreaked with that capability is endless – to include “tricking” a force into friendly-fire incidents.
The implications of these exercises have not been ignored. The Army’s Rapid Capabilities Office and United States Cyber Command have been working on technology to protect American battlefield networks from hackers. One of the systems being applied is a kit that can either be carried by troops or mounted on armored vehicles.
The kits, said to be more capable than the jammers used by aircraft to combat enemy air defenses, have the ability to recognize and analyze electronic signals. During combat operations in Iraq and Afghanistan, electronic warfare planes like the EA-6B Prowler and EA-18 Growler were used to scramble enemy communications, but in combat against a country like Iran or North Korea, not to mention Russia, those planes may be needed for other mission.
The kits are slated to be tested during a NATO exercise known as Saber Guardian that will take place in Bulgaria, Hungary, and Romania. The Army is also looking at alternatives to the Global Positioning System, including the Adaptive Navigation System, which uses software algorithms to measure not only a cloud of atoms in the system, but also to analyze radio, TV, and even lightning strikes to generate accurate positions. The Army is also developing the Spatial, Temporal and Orientation Information in Contested Environments program, using long-range signals, data sharing, and self-sufficient tactical clocks to overcome jamming.
Those two systems and as many as five others could begin testing in 2018, according to Maj. Gen. Wilson A. Shoffner, the Rapid Capability Office’s director of operation, in hopes of preventing future hacking incidents.
In the mid-1930s, baseball players Babe Ruth, Lou Gehrig, and Moe Berg (with a few others) formed an all-star group of baseball players who went on a goodwill tour of Japan to play some exhibition games. Ruth and Gehrig were already legends. Berg was a scholar with a degree from Princeton and a law degree from Columbia. He also spoke seven languages. But he wasn’t a baseball legend. He was a third-string catcher when he departed for Japan, and that visit might have changed the world forever.
World travel was in Berg’s blood. After his first season with the team that would become the Brooklyn Dodgers, he spent time in Paris, studying at the Sorbonne. He toured Italy and Switzerland during the next year’s offseason, instead of working on his game. He was transferred to the Midwest. He improved slightly and moved up to the White Sox, where he moved from shortstop to catcher. It was as a catcher that he traveled to Japan to teach seminars on baseball.
Ruth and Gehrig came with Berg on his second trip to Japan. He spoke Japanese and addressed the Japanese legislature with a welcome speech. While the all-stars were playing an exhibition in Omiya, Japan, Berg went to Saint Luke’s Hospital in Tsukiji, to visit the daughter of American ambassador Joseph Grew. Except he never saw Grew’s daughter. Berg’s language ability allowed him to talk his way onto the roof of the hospital. Once there, he used the 16mm film camera given to him by MovietoneNews to record his trip, to instead record the city and its harbor.
Berg’s footage was used by American intelligence agents to plan bombing runs over Tokyo during the coming Second World War, including the Doolittle Raid. Berg started the war monitoring the health and fitness of U.S. troops stationed in the Caribbean and South America for the Office of the Coordinator of Inter-American Affairs. In 1943, he was recruited by “Wild” Bill Donovan into the Office of Strategic Services, the forerunner of the American CIA.
Berg was dropped into Yugoslavia to assess the strength of Chetniks loyal to King Peter and the Communist partisans led by Josip Broz Tito. His assessment of Tito’s superiority led to the U.S. support for Tito. Berg also was assigned to assassinate German nuclear scientist Werner Heisenberg if the Germans were working on the atomic bomb. Berg determined the Germans would not be able to develop the bomb before war’s end and let Heisenberg live.
Moe Berg was awarded the Medal of Freedom in 1945 but turned it down. His war service changed Berg forever. Often described as “strange,” he appeared to his friends to be more comfortable alone with books than around people. Moe Berg never told anyone what he did as a spy. When asked, he would just put his finger to his lips, as if that part of his life were a secret. He tried spying on the burgeoning Russian nuclear program for the CIA but returned little information and his contract was not renewed. He lived with relatives for the rest of his quiet life. After his death in 1972, his sister accepted the Medal of Freedom on his behalf.
From homemade tanks to nuclear land mines kept warm by chickens, war brings out the engineers in people. When a weapons system works, it’s made by the thousands, and sometimes used for decades. But when it doesn’t, it’s quickly added to the dustbin of bad ideas. Many of these ridiculous, odd, and exceptionally weird weapons were developed by militaries all over the world, but either proved impractical, or never even got past the prototype stage.
These spectacularly ridiculous weapons systems, vehicles, and concepts all made it at least to prototype, though whether they proved to be effective is up for debate. Most of these strange weapons are from World War II, when desperate countries threw together whatever they had to rally their people. The United States, Japan, Germany, and the Soviet Union all had their fair share of oddball ideas they each thought could help win the war. In all historical fairness, there were also no shortage of stupid weapon ideas during The Civil War. A few items on this list are modern weapons that are actually in use today.
What are the weirdest military weapons ever built? From weaponized animals to square bullets, engineers and weapons designers have come up with some crazy stuff over the years. Some of these weapons are so absurd, it’s funny to think that anyone ever thought they could work. Other weapons, while impractical, were inventive and innovative attempts to give soldiers a unique advantage. Either way, these weapons are strange. But what were the strangest weapons made? Read on to find out!
The U.S. Army has re-embraced sleeve rolling to the rejoicing of soldiers around the world.
But many soldiers have never rolled their uniform sleeves, and none have done it in the past few years. Plus, the current uniforms have pockets and pen holders that make it difficult to roll the sleeve in a neat manner.
Luckily, the Army spotted the problem and released a video through the Defense Media Activity that shows exactly how modern troops should roll camo-out sleeves.
Military investigators are trying to piece together the cause of a crash that killed 15 Marines and a sailor in Mississippi in July, but it could be a year or more until any information becomes public.
In the meantime, the Marine Corps’ fleet of KC130T transport planes remains grounded. That plane is similar to the one that crashed near Itta Bena on July 10.
April Phillips, a spokeswoman for the Naval Safety Center, said August 21 that final reports often don’t become public for 12 to 18 months following a crash. Even then, much of the information in the reports is often withheld from public view.
“Ours are done solely to ensure what happened doesn’t happen again,” Phillips said, saying that various military commanders must endorse the report before it’s finished.
Marines and other investigators finished collecting debris August 3, recovering all of the plane’s major components, said Marine Forces Reserve spokeswoman Lt. Stephanie L. Leguizamon. She said last week that there’s still work going on to clean up the crash area.
Naval Safety Center investigators are both reconstructing the wreckage and interviewing witnesses. Their report will ultimately include recommendations to enhance safety.
Victims included nine Marines based at Stewart Air National Guard base in Newburgh, New York, who flew and crewed the plane, plus six Marines and a Navy Corpsman from an elite Marine Raider battalion at Camp Lejeune, North Carolina. The passengers were headed for pre-deployment training in Yuma, Arizona. Cargo included at least some ammunition.
Brig. Gen. Bradley S. James has told reporters that whatever went wrong began when the plane was at cruising altitude. Most of the plane pancaked upside down into a field, but part of it, including the cockpit, broke off and landed far from the fuselage and wings. Debris was scattered for miles over fields, woods, and ponds.
Witnesses said they saw the plane descend from high altitude with an engine smoking, with some describing what pilots call a “flat spin,” where a plane twirls around like a boomerang.
Phillips said the plane didn’t have an in-flight data recorder. That, plus the lack of survivors, could make the debris crucial to determining what happened.
“A lot it, in this case, is likely to come from forensic evidence,” she said.
Phillips said the C-130 and its variants have historically been one of the safest planes operated by the Marine Corps. The Navy classifies its most serious incidents as Class A mishaps, involving death, permanent disability, or more than $2 million in damage. Only two in-flight Class A mishaps were recorded before the Mississippi crash, both in 2002. A KC-130R experienced a flash fire and crashed into a mountain in Pakistan while nearing an airfield, killing seven people. A KC130F crash landed shortly after taking off inCalifornia, causing injuries but no deaths.
The New York squadron is the last Marine unit flying the KC-130T version and is scheduled to upgrade to a newer version in 2019. Only the remaining 12 KC-130Ts are affected by the grounding.
Meltdown and Spectre, which take advantage of the same basic security vulnerability in those chips, could hypothetically be used by malicious actors to “read sensitive information in the system’s memory such as passwords, encryption keys, or sensitive information open in applications,” as Google puts it in a blog post.
The first thing you need to know: Pretty much every PC, laptop, tablet, and smartphone is affected by the security flaw, regardless of which company made the device or which operating system it runs. The vulnerability isn’t easy to exploit — it requires a specific set of circumstances, including having malware already running on the device — but it’s not just theoretical.
And the problem could affect much more than just personal devices. The flaw could be exploited on servers and in data centers and massive cloud-computing platforms such as Amazon Web Services, Microsoft Azure, or Google Cloud. In fact, given the right conditions, Meltdown or Spectre could be used by customers of those cloud services to actually steal data from one another.
Though fixes are already being rolled out for the vulnerability, they often will come with a price. Some devices, especially older PCs, could be slowed markedly by them.
Here’s what Meltdown and Spectre are. And, just as important, here’s what they’re not.
Am I in immediate danger from this?
There’s some good news: Intel and Google say they’ve never seen any attacks like Meltdown or Spectre actually being used in the wild. And companies including Intel, Amazon, Google, Apple, and Microsoft are rushing to issue fixes, with the first wave already out.
The most immediate consequence of all of this will come from those fixes. Some devices will see a performance dip of as much as 30% after the fixes are installed, according to some reports. Intel, however, disputed that figure, saying the amount by which computers will be slowed will depend on how they’re being used.
The Meltdown attack primarily affects Intel processors, though ARM has said that its chips are vulnerable as well. You can guard against it with software updates, according to Google. Those are already starting to become available for Linux and Windows 10.
Spectre, by contrast, appears to be much more dangerous. Google says it has been able to successfully execute Spectre attacks on processors from Intel, ARM, and AMD. And, according to the search giant, there’s no single, simple fix.
It’s harder to pull off a Spectre-based attack, which is why nobody is completely panicking. But the attack takes advantages of an integral part of how processors work, meaning it will take a new generation of hardware to stamp it out for good.
Despite how they’ve been discussed so far in the press, Meltdown and Spectre aren’t really “bugs.” Instead, they represent methods discovered by Google’s Project Zero cybersecurity lab to take advantage of the normal ways that Intel, ARM, and AMD processors work.
To use a Star Wars analogy, Google inspected the Death Star plans and found an exploitable weakness in a small thermal exhaust port. In the same way two precisely placed proton torpedoes could blow up the Death Star, so, too, can Meltdown and Spectre take advantage of a very specific design quirk and get around (or “melt down,” hence the name) processors’ normal security precautions.
In this case, the design feature in question is something called speculative execution, a processing technique that most Intel chips have used since 1995 and that is also common in ARM and AMD processors. With speculative execution, processors essentially guess what you’re going to do next. If they guess right, then they’re already ahead of the curve, and you have a snappier computing experience. If they guess wrong, they dump the data and start over.
What Project Zero found were two key ways to trick even secure, well-designed apps into leaking data from those returned processes. The exploits take advantage of a flaw in how the data is dumped that could allow them — with the right malware installed — to read data that should be secret.
This vulnerability is potentially particularly dangerous in cloud-computing systems, where users essentially rent time from massive supercomputing clusters. The servers in those clusters may be shared among multiple users, meaning customers running unpatched and unprepared systems could fall prey to data thieves sharing their processors.
What can I do about it?
To guard against the security flaw and the exploits, the first and best thing you can do is make sure you’re up-to-date with your security patches. The major operating systems have already started issuing patches that will guard against the Meltdown and Spectre attacks. In fact, fixes have already begun to hit Linux, Android, Apple’s MacOS, and Microsoft’s Windows 10. So whether you have an Android phone or you’re a developer using Linux in the cloud, it’s time to update your operating system.
Microsoft told Business Insider it’s working on rolling out mitigations for its Azure cloud platform. Google Cloud is urging customers to update their operating systems, too.
It’s a good idea to stay current with your Windows updates. (Screenshot from Matt Weinberger)
It’s just as important to make sure you stay up to date. While Spectre may not have an easy fix, Google says there are ways to guard against related exploits. Expect Microsoft, Apple, and Google to issue a series of updates to their operating systems as new Spectre-related attacks are discovered.
Additionally, because Meltdown and Spectre require malicious code to already be running on your system, let this be a reminder to practice good online safety behaviors. Don’t download any software from a source you don’t trust. And don’t click on any links or files claiming you won $10 million in a contest you never entered.
Why could the fixes also slow down my device?
The Meltdown and Spectre attacks take advantage of how the “kernels,” or cores, of operating systems interact with processors. Theoretically, the two are supposed to be separated to some degree to prevent exactly this kind of attack. Google’s report, however, proves the existing precautions aren’t enough.
Operating system developers are said to be adopting a new level of virtual isolation, basically making requests between the processor and the kernel take the long way around.
The problem is that enforcing this kind of separation requires at least a little extra processing power, which would no longer be available to the rest of the system.
Intel disputes that the performance hits will be as dramatic as The Times suggests.
Some of the slowdowns, should they come to pass, could be mitigated by future software updates. Because the vulnerability was just made public, it’s possible that workarounds and new techniques for circumventing the performance hit will come to light as more developers work on solving the problem.
What happens next?
Publicly, Intel is confident the Meltdown and Spectre bugs won’t have a material impact on its stock price or market share, given that they’re relatively hard to execute and have never been used (that we know of). AMD shares are soaring on word that the easier-to-pull-off Meltdown attack isn’t known to work on its processors.
But as Google is so eager to remind us, Spectre looms large. Speculative execution has been a cornerstone of processor design for more than two decades. It will require a huge rethinking from the processor industry to guard against this kind of attack in the future. The threat of Spectre means the next generation of processors — from all the major chip designers — will be a lot different than they are today.
Google is urging customers of its Google Cloud supercomputing service, hosted from data centers like this, to update their operating systems. (Image via Google)
Even so, the threat of Spectre is likely to linger far into the future. Consumers are replacing their PCs less frequently, which means older PCs that are at risk of the Spectre attack could be used for years to come.
As for mobile, there has been a persistent problem with updating Android devices to the latest version of the operating system, so there are likely to be lots of unpatched smartphones and tablets in use for as far as the eye can see. Would-be Spectre attackers are therefore likely to have their choice of targets.
It’s not the end of the world. But it just may be the end of an era for Intel, AMD, ARM, and the way processors are built.
In a measure to keep troops from potentially contracting the COVID-19 virus, a joint American and European exercise has been canceled when authorities determined that it was necessary to stop the exercise to mitigate the spread of the novel coronavirus that is spreading through the European Continent right now.
Cold Response 20 was two days into operations when the Norwegians decided to cancel the remainder of the exercise. Authorities from Norway made the determination after several troops were put into quarantine over fears they might have been exposed to the coronavirus. The United States had 1,500 troops in Norway with the total Allied manpower for the exercise being at 15,000.
What is Cold Response 20?
Cold Response 20’s aim is to enhance high-intensity fighting skills while collaborating with other countries’ forces under severe cold climate conditions while conducting exercises that include maritime, land and air events. The exercise’s aim is to maintain and build upon capabilities and cohesiveness in high-intensity warfighting in an arctic environment.
The exercise was supposed to be held during the month of March, with the 15,000 service members coming from over 10 countries. The nations that were part of the canceled exercise were Belgium, Norway, Denmark, Finland, France, Germany, the Netherlands, Sweden, the United Kingdom and the United States.
In a statement, EUCOM said, “The decision is a precautionary measure in response to the ongoing outbreak of COVID-19 and to protect the health and safety of all participants and local population. The health of our force continues to be a top priority and we are committed to maintaining mission readiness”.
After a Norwegian soldier tested positive for the coronavirus, it was determined he was in contact with over two dozen United States Marines. The Marines were put under quarantine, but the risk was too much for authorities to chance.
According to the most recent data, Norway currently has 277 cases of the coronavirus but have not had any deaths reported so far. However, the number of cases has almost doubled in recent days prompting the concern from officials of a massive spread of the disease.
The European countries with the most U.S. troops stationed there are Germany and Italy. Italy has shut down most of their country as they have had the third-worst national outbreak after China and Iran. South Korea and Japan have the most U.S. troops in Asia. South Korea’s rate of infections seems to have leveled off after getting up to over 7,000 as quarantine procedures have been implemented. Japan has had less than 600 cases as of yet.
The move is the latest in a series of steps the United States military has implemented to prevent service members and their families from being exposed to the virus. There is also talk that the military will put a 60-day pause on troop and family relocations. While no word yet has come, it seems this will most likely affect troops with PCS orders, primarily in South Korea and Italy.
A training exercise in Africa has also been scaled down in breadth, and the Pentagon is considering scaling down or canceling additional exercises. Called African Lion, the exercise would pair Americans with troops from Morocco, Senegal and Tunisia.
President Donald Trump appears to have confirmed ending a CIA program to arm and train rebels battling the government of President Bashar al-Assad.
In a post on Twitter criticizing a Washington Post report, the president said late July 14, ” The Amazon Washington Post fabricated the facts on my ending massive, dangerous, and wasteful payments to Syrian rebels fighting Assad.”
Trump didn’t specify what was wrong with report by the newspaper, which is owned by Amazon founder Jeffrey P. Bezos.
The Washington Post had reported Trump decided to end the aid almost a month ago after meeting with CIA Director Mike Pompeo and National Security Adviser H.R. McMaster in the Oval Office. It was before the G20 Summit in Germany when met on July 7 with Russian President Vladimir Putin.
The Russian government, which backs the Assad regime, has opposed the program, which was begun by President Barack Obama in 2013.
Officials said the CIA program will likely be phased out “over a period of months.” US ally Jordan, which has hosted training sites for the Syrian rebels, backs the move, according to the newspaper report.
The White House did not dispute the story last week.
A spokesman for the CIA declined to comment on Trump’s tweet.
On July 21, the leader of US special forces appeared to confirm the end of the program.
“At least from what I know about that program and the decision to end it, absolutely not a sop to the Russians,” Army Gen. Raymond Thomas said at a national security forum in Colorado. “It was, I think, based on an assessment of the nature of the program, what we’re trying to accomplish, the viability going forward.”
He said it was a “tough, tough decision.”
“It is so much more complex than even I can describe, that’s not necessarily an organization that I’ve been affiliated with but a sister, parallel activity that had a tough, and some would argue, impossible mission based on the approach we took.”
After his speech, he told reporters he hadn’t confirmed anything and was referring only to “public reporting.”
Large parts of western Uzbekistan and northern Turkmenistan are recovering from a severe salt storm that has damaged agriculture and livestock herds.
The three-day storm hit Uzbekistan’s Karakalpakstan and Khorezm regions, as well as Turkmenistan’s Dashoguz Province, beginning on May 26, 2018.
The salt — lifted from dried-out former parts of the Aral Sea — left a white dust on farmers’ fields and fruit trees that is expected to ruin many crops.
The storm also caused flights at the Urgench airport to be canceled, made driving hazardous, and caused breathing difficulties for many people.
Particularly hard hit by the storm, which reached speeds of more than 20 meters per second, were the Uzbek regions of Khorezm, Navoi, and Bukhara.
Remnants of the storm were also reported as far south as Ashgabat, the capital of Turkmenistan.
There were no immediate reports of injuries.
Temirbek Bobo, 80, told RFE/RL’s Uzbek Service that it was the first time he had seen such a harsh storm.
“I’ve seen the wind bring sand before, but this was the first time I saw salt. This event can be called a catastrophe,” said Bobo, who lives in the Takhiatash district of Karakalpakstan. “The whole day there was nothing but salt rain [coming down]. The sun was not visible.”
He added: “Nature began to take revenge on us for [what we have done] to the Aral Sea.”
A representative of the Karakalpakstan’s Council of Ministers, who spoke on condition of anonymity, said the council had not received any instructions regarding the situation, but suggested that the region’s Agricultural Ministry may have.
RFE/RL’s Uzbek Service was unable to reach Karakalpakstan’s Agricultural Ministry for comment.
Salt storms are common in areas near the Aral Sea, but this one carried salt over a much wider area.
Once one of the four largest seas on Earth, intensive irrigation projects set up by the Soviets in the 1960s led to its desiccation.
The runoff from nearby agricultural fields has polluted the remaining parts of the Aral Sea with pesticides and fertilizers, which have crystallized with the salt.
Inhalation of the salt can cause severe throat and lung problems. The salt also can poison farmers’ produce and cause chemical damage to buildings.
Napoleon Bonaparte was well-known as one of the foremost military minds of his age, but there was one group he couldn’t outsmart: rabbits! One epic conflict pitted the emperor against the lusty lagomorphs, and to the Corsican-born ruler’s great surprise, the bunnies came out on top.
During his down time, Napoleon, like many wealthy men of the time, enjoyed hunting; in particular, he liked tracking down rabbits. The animals being hunted weren’t as fond of the humans’ pastime, however. According to the memoirs of a Napoleonic general, Paul Thiébault, a courtier named Alexandre Berthier devised such an amusement for his master in July 1807. “He had the idea of giving the Emperor some rabbit-shooting in a park which he possessed just outside of Paris, and had the joy of having his offer accepted,” Thiébault wrote.
But the not-so-bright Berthier had one problem: his property had no rabbits on it! So Berthier ordered one thousand rabbits “to be turned down in the park on the morning of the day” of the hunt. On the very day, Napoleon arrived to a lovely picnic and everything was going smoothly, but the bunnies had another idea. Instead of scattering across the park and making themselves targets for eager shooters, the rabbits “suddenly collected first in knots, then a body.” Then the buns “all faced about, and in an instant the whole phalanx flung itself upon Napoleon.”
Berthier was humiliated and furious, so he turned his coachmen on the rabbit army. But although their whips initially dissuaded the hippity-hoppers, the critters soon wheeled about as a group and “turned the Emperor’s flank” and “attacked him frantically in the rear, refused to quit their hold, piled themselves up between his legs till they made him stagger, and forced the conqueror of conquerors, fairly exhausted, to retreat and leave them in possession of the field…” It was lucky for Napoleon,Thiébault quipped, that the bunnies left Napoleon intact and didn’t themselves proceed in triumph to Paris!
How did one thousand rabbits wind up defeating Napoleon? According to Thiébault, Brethier, ignorant of the differences between domestic and wild rabbits, bought the wrong kind of bunny: he purchased one thousand hutch-raised hoppers, rather than the wild buns that were afraid of humans. As a result, the rabbits “had taken the sportsmen, including the Emperor, as purveyors of their daily cabbage,” and since the bunnies hadn’t yet been fed, eagerly sprang on the humans in the hopes of food.
As funny as this incident was, Napoleon was not amused. Apparently, the upstart emperor didn’t have the greatest sense of humor. But everyone else had a pretty good laugh at his expense.