On May 15, 2018, under a sunny sky, Russian President Vladimir Putin drove a bright-orange truck in a convoy of construction vehicles for the opening of the Kerch Strait Bridge from Russia to Crimea. At 11 miles long, it is now the longest bridge in Europe or Russia.
As Putin drove across the bridge, something weird happened. The satellite navigation systems in the control rooms of more than 24 ships anchored nearby suddenly started displaying false information about their location. Their GPS systems told their captains they were anchored more than 65 kilometers away — on land, at the Anapa Airport.
This was not a random glitch, according to the Center for Advanced Defense Studies, a security think tank known as C4ADS. It was a deliberate plan to make it difficult for anyone nearby to track or navigate around the presence of Putin, it said.
‘All critical national infrastructures rely on GNSS to some extent’ — and the Russians have started hacking it
Putin driving two construction workers across the Kerch Strait Bridge.
GNSS comprises the constellation of international satellites that orbit Earth. The US’s Global Positioning System, China’s BeiDou, Russia’s Glonass, and Europe’s Galileo program are all part of GNSS.
Your phone, law enforcement, shipping, airlines, and power stations — anything dependent on GPS time and location synchronization — are all vulnerable to GNSS hacking. A 2017 report commissioned by the UK Space Agency said that “all critical national infrastructures rely on GNSS to some extent, with Communications, Emergency Services, Finance, and Transport identified as particularly intensive users.” An attack that disabled GNSS in Britain would cost about £1 billion every day the system was down, the report said.
The jamming, blocking, or spoofing of GNSS signals by the Russian government is “more indiscriminate and persistent, larger in scope, and more geographically diverse than previous public reporting suggested,” said a recent Weekly Intelligence Summary from Digital Shadows, a cybersecurity-monitoring service.
This diagram shows GPS signals for a ship jumping between the accurate location at sea and a false location at a nearby airport.
Nearly 10,000 incidents of ships being sent bad location data
The C4ADS study found that:
1,311 civilian ships have been affected.
9,883 incidents were reported or detected.
Until the past couple of years, C4ADS thought the Russians used GNSS jamming or spoofing mostly to disguise Putin’s whereabouts.
For instance, a large area over Cape Idokopas, near Gelendzhik on the Black Sea coast of Russia, appears to be within a permanent GNSS-spoofing zone. The cape, believed to be Putin’s summer home, or dacha, contains a vast and lavish private residence — “a large Italianate palace, several helicopter pads, an amphitheatre, and a small port,” C4ADS said. It is the only private home in Russia that enjoys the same level of airspace protection and GNSS interference as the Kremlin.
C4ADS thinks Putin’s summer home is protected by a permanent GNSS-spoofing zone.
‘Russian forces had developed mobile GNSS jamming units to provide protection for the Russian president’
“The geographical placement of the spoofing incidents closely aligns with places where Vladimir Putin was making overseas and domestic visits, suggesting that Russian forces had developed mobile GNSS jamming units to provide protection for the Russian president,” Digital Shadows said. “The incidents also align with the locations of Russian military and government resources. Although in some areas the motive was likely to restrict access to or obstruct foreign military.”
Ships sailing near Gelendzhik have reported receiving bogus navigation data on their satellite systems.
“In June 2017, the captain of the merchant vessel Atria provided direct evidence of GNSS spoofing activities off the coast of Gelendzhik, Russia, when the vessel’s on-board navigation systems indicated it was located in the middle of the Gelendzhik Airport, about 20km away. More than two dozen other vessels reported similar disruptions in the region on that day,” C4ADS said.
An million superyacht was sent off course by a device the size of a briefcase
Most of the incidents were recorded in Crimea, the Black Sea, Syria, and Russia.
Perhaps more disturbingly, GNSS-spoofing equipment is available to almost anyone for just a few hundred dollars.
“In the summer of 2013, a research team from The University of Texas at Austin successfully hijacked the GPS navigation systems onboard an million superyacht using a ,000 device the size of a small briefcase,” C4ADS said. “The experimental attack forced the ship’s navigation systems to relay false positioning information to the vessel’s captain, who subsequently made slight course corrections to keep the ship seemingly on track.”
Since then, the cost of a GNSS-spoofing device has fallen to about 0, C4ADS said, and some people have used them to cheat at “Pokémon Go.”
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
The Army is engineering high-tech autonomy kits designed to give “robot” tanks and other armored combat vehicles an ability to operate with little or no human intervention, bringing new tactical and operational dimensions to the future of ground combat.
Unmanned systems, utilized in a fast-evolving, high-threat ground combat operation, could enable robot vehicles to carry supplies, test enemy defenses and even fire weapons — all while manned vehicles operate at a safer distance.
“A kit of hardware and software can be installed into different ground platforms to increase the level of autonomy,” Osie David, Chief Engineer for Mission Command, Communications-Electronics Research, Development and Engineering Center, told Warrior Maven in an interview.
The technology kits, which can integrate on a small unmanned ground vehicle or a wide range of larger combat vehicles, use emerging computer algorithms, on-board processing and artificial intelligence to gather and organize sensor information.
“Ground combat autonomy is the hardest level of autonomy possible. You are talking about shifting terrain and changing enemy movements,” Maj. Gen. John Ferrari, Director, Program Analysis and Evaluation, Office of the Deputy Chief of Staff, G-8, told Warrior Maven in an interview.
Robot vehicles, often referred to by Army weapons developers in the context of “manned-unmanned” teaming, are a fast-growing element of the developmental calculus when it comes to future combat platforms.
Having unmanned assets operating in tandem with manned assets in combat introduces a range of new tactics available to commanders. If robot “scout” vehicles could operate in a forward position to identify enemy threats or test defenses, manned tanks might be able to operate at lighter weights, making them faster and more maneuverable in combat.
In fact, senior Army weapons developers have told Warrior Maven that virtually all future combat vehicles now in development will likely be engineered with various new levels of autonomy.
Using things like embedded infrared optical payloads, unmanned vehicles can use machine-learning technology to process key combat details, independently organize them and then send information to a human in the role of command and control, David explained.
AI enables computers to instantly draw upon vast data-bases with millions of pieces of information to perform real-time data analytics before sending useful information to combat commanders.
The advantage is that combatant commanders can quickly receive integrated intelligence or sensor information from a range of sources, analyzed and condensed to enable faster decision-making.
“Instead of sending bits of information back up to a command post, the autonomy kits can enable sensors to perform detection and object identification in real time…and then push that information up to a human,” David said.
Also, advanced integrated sensors, fortified by AI and greater levels of autonomy, can connect aerial and ground assets to one another — to ID and hand off-targets, send real-time video of nearby enemy activity or pass other intelligence data to vehicle crews.
(U.S. Navy photo by Mass Communication Specialist 2nd Class Melissa K. Russell)
It is certainly within the realm of the technically feasible for a future tank to simultaneously control a small fleet of unmanned robotic “wing man” vehicles designed to penetrate enemy lines while minimizing risk to soldiers, transport ammunition or perform long-range reconnaissance and scout missions.
In fact, Army modernization strategy documents specifically cite autonomy enabled platforms, speed and maneuverability as fundamental to future armored warfare.
“As the armored BCT fields new systems, it will replace main battle tanks, howitzers, and mortar indirect fire platforms. Far-term initiatives aim to solve the absence of the armored BCT’s ability to deploy rapidly. The Army assesses the feasibility and application of autonomous or semi-autonomous sub-systems, manned and unmanned teaming, and autonomy enabled combat platforms,” the Army documents read.
CERDEC and other Army entities are working on these projects with the Army’s Tank Automotive Research, Development and Engineering Center to prototype, test and advance these technologies. The current effort is an extension, or next-generation iteration, of a previous TARDEC effort described as “leader-follower” algorithms. This technology, evolved and successfully tested in recent years, enables an unmanned tactical truck or vehicle to precisely follow a manned vehicle in front of it.
(DoD photo by Cherie Cullen)
The concept with “leader-follower” algorithms is to free up vehicle crew members such that they can focus on other pressing, threat-conscious tasks without needing to expend all their energy navigating the vehicle. These newer kits, however, bring the concept of autonomy to an entirely new level, enabling unmanned systems to maneuver quickly in response to fast-changing ground combat circumstances — without needing human intervention.
The current “autonomy kits” effort is a new Army program, slated to gain traction and begin testing this year, Army developers said.
“TARDEC will decide which platforms are used. Some sort of tank is being evaluated, as well as smaller platforms,” David explained.
David explained that the autonomy kits are now being worked on for the Army’s Next-Generation Combat Vehicle program — a future combat vehicle effort planning to engineer new platforms for the 2030s and beyond.
“We are closely tied with them (NGCV program) and we are looking to see how we can insert this kit onto these future platforms,” he explained.
The kits are also being engineered to help ensure that combat vehicles can continue to function in the event that GPS communications are jammed or destroyed by enemy forces. Gyroscopes and accelerometers, for instance, can help ground forces navigate in the absence of GPS, David explained.
“These technologies are focused on how you actually navigate and detect your position in a GPS denied environment where there is challenging terrain or an enemy is jamming you,” he said.
This article originally appeared on Warrior Maven. Follow @warriormaven1 on Twitter.
North Korea’s inter-continental ballistic missiles still have a lot of work to do in order to be ready for prime time, the Defense Intelligence Agency claims. North Korea in the past has had problems getting its missiles up – but that technological hitch may not last long.
According to a report by Bloomberg News, North Korea still faces a number of “important shortfalls” in its longer-range missiles like the Taepo-dong 2 and the KN-08 inter-continental ballistic missiles. Last month, North Korea saw a failure when it attempted to launch a missile during a test.
That said, senior American intelligence officials note with concern that North Korea is not letting the failures prevent a push toward developing a reliable ICBM inventory.
“North Korea has also expanded the size and sophistication of its ballistic missile forces—from close-range ballistic missiles (CRBMs) to ICBMs—and continues to conduct test launches. In 2016, North Korea conducted an unprecedented number of ballistic missile tests. Pyongyang is committed to developing a long-range, nuclear-armed missile that is capable of posing a direct threat to the United States; it has publicly displayed its road-mobile ICBMs on multiple occasions. We assess that North Korea has taken steps toward fielding an ICBM but has not flight-tested it,” Director of National Intelligence Dan Coats said in a written statement to the Senate Intelligence Committee prior to a May 11, 2017 hearing.
“North Korea is poised to conduct its first ICBM flight test in 2017 based on public comments that preparations to do so are almost complete and would serve as a milestone toward a more reliable threat to the US mainland,” Coats added later in the statement.
The United States has currently deployed a Terminal High-Altitude Area Defense missile battery to South Korea, and also operates MIM-104 Patriot missile batteries – systems also owned by South Korea and Japan. All three countries also have Aegis warships, capable of launching SIM-66 Standard SM-2 and RIM-161 Standard SM-3 missiles.
The United States has deployed a carrier strike group to the area around North Korea as tensions have increased.
Moldova has expressed concern over what it says were unauthorized movements by Russian military forces in the breakaway Transdniester region.
The Reintegration Policy Bureau, a government department that handles the Transdniester issue and is led by one of Moldova’s two deputy prime ministers, said on June 15, 2018, that the Moldovan government had notified the Organization for Security and Cooperation in Europe (OSCE) about what it called the unauthorized deployment of military trucks and equipment in the region controlled by separatists.
A day earlier, Moldovan authorities filmed some 40 trucks and other military vehicles with Russian symbols and license plates moving along a main road linking the northern and southern parts of Transdniester, a sliver of land along the Ukrainian border in eastern Moldova, the statement said.
Phishing, when successful, tricks the user into unwittingly handing over their passwords to the scammer, often through professional-looking emails purporting to be from trustworthy businesses. The endgame is generally acquisition of personal information, like credit card and social security numbers.
Recently, phishing has been weaponized to varying degrees of sophistication with a key technique: impersonation.
The trick was enough to convince one employee at Gimlet Media, which runs the everything-internet podcast “Reply All,” to open an email from his “coworker.” Except the sender was not his coworker, but a hacker attempting a work-sanctioned phishing test on the company’s employees.
Familiarity fraud is an online tactic people have to be especially wary of on social media, where friends’ pictures and handles are rife for imitation. Duplicate accounts fish for personal information under the guise of intimacy.
2. The Nigerian prince scam is one of the oldest on the internet.
The Nigerian prince scam is one of the oldest scams on the internet.
The scam rose to prominence in the 1990s, and is referred to by the FBI as “Nigerian Letter” or “419” fraud.
The premise is simple: You get an email, and within the message, a Nigerian prince (or investor, or government official) offers you an opportunity for lucrative financial gain.
The catch? Pay a small portion of the amount up front, or hand over bank account information and other identifying information so that the transfer can be made. Of course, you lose that “seed money,” never receiving a dime in return.
“It’s malware and phishing combined with clever social engineering and account takeovers,” James Bettke, a counter threat unit researcher at the security firm Secureworks, told Wired reporter Lily Hay Newman in 2018.
“They’re not very technically sophisticated, they can’t code, they don’t do a lot of automation,” he added. “But their strengths are social engineering and creating agile scams. They spend months sifting through inboxes. They’re quiet and methodical.”
3. Ticket fraud leads to consumers buying fake sports and music tickets.
Another popular online scam is ticket fraud, in which consumers are tricked into buying fake tickets for sporting events, concerts, and other events.
Scammers usually target high-profile events that are likely to sell out so they can take advantage of increased demand. Often, the tickets they send customers have forged bar codes or are duplicate copies of legitimate tickets. Other times, consumers won’t receive any ticket at all after they pay up.
“If you have gotten a message from me or any other creator on YouTube that looks something like this, that is very likely someone trying to scam you,” DeFranco said in a video posted to his channel.
The faux DeFranco slid into targets’ Youtube messages, promising “gifts” via the click of a hyperlink. The scammer’s real endgame: identity theft for financial gain through a classic online phishing scheme.
“We’re aware and in the process of implementing additional measures to fight impersonation,” a YouTube employee wrote in response to complaints of scam. “In the meantime, we’ve removed accounts identified as spam.”
And angry mobs incensed by the fiasco that was Fyre Festival — an event so botched it warranted not one, but two documentaries — directed much of their ire at the event’s celebrity influencers.
The defrauded cited a lack of transparency as to what the influencers were paid to hawk the festival to their millions of followers online, although not everyone agreed they deserved the blame to begin with.
6. But sometimes the influencers themselves can get scammed.
One variety of online grift victimizes the influencers themselves with identity-fraud tactics common to phishing.
Earlier this year, a scammer posing as entrepreneur and investor Wendi Murdoch used email handles and other techniques so convincing, social media stars were tricked into buying their own flights to Indonesia and paying for fake photography permits as part of the scam.
The victims, influencers and travel photographers among them, got bilked out of thousands of dollars in the process.
The FBI and New York Police Department opened investigations into the scam in 2018, according to The Hollywood Reporter. Also assisting is the corporate investigations firm K2 Intelligence, which tracked the scam’s pivot from celebrities to influencers.
“For a long time, they were going after people in Hollywood. [Now, they’re] routinely targeting influencers — Instagram stars, travel photographers, people who do stuff that involves them travelling all over the world,” Nicoletta Kotsianas, a director at K2 Intelligence, told INSIDER in January.
“It’s about convincing some people that there’s someone else, and manipulating them, being into that, and world-building around the whole thing,” she added. “They’re making some money off it, but it’s really about the ride along the way.”
A screenshot shows a WannaCry ransomware demand, provided by cyber security firm Symantec.
7. Ransomware held a whole city hostage in 2018.
Some of the most insidious online scams involve ransomware.
In a ransomware attack, hackers install malware onto a computer or system of computers that restricts a victim’s access to their files. Payment, often in the form of bitcoin, is demanded to undo it.
The hackers behind the scheme “deliberately engaged in an extreme form of 21st-century digital blackmail, attacking and extorting vulnerable victims like hospitals and schools, victims they knew would be willing and able to pay,” Brian Benczkowski, the head of the criminal division of the Justice Department, said in November.
The cam-hacking claim, which is bolstered by parroting the user’s password in the email, is means for blackmail: Send us bitcoin, or we send all your contacts the footage.
The reality? Pure manipulation. The scammers don’t have dossiers of footage. They never even hacked you. How? Because the password they flaunted wasn’t hacked, but harvested, gleaned from publicly available databases of leaked passwords and emails.
So there’s no need to cover your laptop’s camera. For now.
9. GoFundMe fake-outs take advantage of people’s generosity.
Another thriving online grift is the GoFundMe sob story fake-out.
One notable example came in a feel-good story from 2017 about a couple raising 0,000 for a homeless veteran who had lent them his last . As prosecutors discovered, the trio had concocted the entire story, and not only do they face a mix of federal and state charges, but GoFundMe refunded the donations of all 14,000 contributors.
Another example of strategic storytelling in the art of crowdsourced scamming: A black college student who raised money from Republicans on GoFundMe after claiming her parents disowned her for supporting Trump.
The narrative was suspiciously convenient — because it was a hoax. Although she quickly returned the money she raised, she also exposed how easily you can take advantage of people’s generosity.
10. Pump-and-dump schemes can artificially inflate the value of a currency.
Cryptocurrency is often the form of payment in online scams, but in one scheme, the crypto itself is the fraud.
Investment schemes were always destined to flourish online. By using the web to mass target would-be investors, a schemer can commit the Securities and Exchange Commission no-no of artificially “pumping” up the value of stock to the masses in order to then “dump” the stock on a falsely inflated return.
“[The] ethos is simple: Buy low, sell high. The implication is that investors outside the pump group will see the rapidly rising price and rush to buy in, anxious not to miss the next Bitcoin-style gold rush,” Paris Martineau of The Outline wrote.
“There are frankly a lot of groups that have now centered around misinformation,” Laz Alberto, a cryptocurrency investor and editor of the newsletter Blockchain Report, told BuzzFeed reporters Ryan Mac and Jane Lytvynenko in 2018. “It’s obviously illegal, but there’s no regulation and they’ve gotten away with it.”
A cryptocurrency founder was even himself the target of a fake news hoax in 2017, when news spread that Vitalik Buterin, cofounder of the cryptocurrency Ethereum, had died in a car crash.
The fake reports of Buterin’s death caused Ethereum’s valuation to plummet in the market — and later rebound — when the very-much-alive Buterin debunked the rumor himself.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
US senators have been advised not to use videoconferencing platform Zoom over security concerns, the Financial Times reports.
According to three people briefed on the matter, the Senate sergeant-at-arms — whose job it is to run law enforcement and security on the Capitol — told senators to find alternative methods for remote working, although he did not implement an outright ban.
With the coronavirus outbreak forcing millions to work from home, Zoom has seen a 1,900% increase in use between December and March to 200 million daily users. This has been accompanied by a string of bad press about its security and privacy practices, to the point where CEO Eric Yuan was forced to publicly apologize last week.
This week the company admitted to “mistakenly” routing data through China in a bid to secure more server space to deal with skyrocketing demand. “We failed to fully implement our usual geo-fencing best practices. As a result, it is possible certain meetings were allowed to connect to systems in China, where they should not have been able to connect,” Yuan said.
The news sparked outrage among some senators, and Senate Democrat Richard Blumenthal called for the FTC to launch an investigation into the company.
“As Zoom becomes embedded in Americans’ daily lives, we urgently need a full transparent investigation of its privacy and security,” the senator tweeted.
While the Senate has told its members to stay away from Zoom, the Pentagon told the FT that it would continue to allow its staff to use the platform. A memo sent to top cybersecurity officials from the Department of Homeland Security said that the company was being responsive when questioned about concerns over the security of its software, Reuters reported.
The days following the attacks of Sept. 11, 2001 were a strange time for Americans. For the first time in most people’s lives, political divisions disappeared. Daily life became anything but routine, even if you lived far from Ground Zero. Even American pop culture was deeply affected by the events, unsure of when it would be acceptable to laugh again.
Leave it to America’s foremost experts in drama and onscreen conflict to show everyone it was okay to gather once more.
On Sept. 13, just two days after the attacks that shook the world, it was the WWE who gathered people together in (where else but) Texas. Houston, to be exact. Emotions were still riding high, not only among the people who create the WWE’s show twice a week, but the nation as a whole. Just like the rest of America, Vince McMahon and his staff had watched helplessly as planes flew into the Twin Towers, not once but twice.
But the WWE – its producers as well as its staff and the “Superstar” wrestlers who make the show happen – considered themselves lucky, lucky to be with the people with whom they spent a majority of their time anyway. They were with the people who were as close to family as they could get in those stressful hours.
The show that night, just two days after the attacks, was supposed to be a Smackdown! taping in America’s third largest city. The WWE initially felt the taping should be postponed, that America had other things to worry about. They weren’t alone. Many shows, especially live-taped shows, were airing reruns instead of new episodes. No one knew exactly what to say.
New York City Mayor Rudy Giuliani appeared with the cast of Saturday Night Live and told America is was okay to laugh again. Jon Stewart used his time on The Daily Show with Jon Stewart to remind Americans that life had to go on, and that it was okay. But people and entertainers were still wary of getting together in large crowds.
Not the WWE.
After Vince McMahon was assured by government officials that regular WWE programming would actually be more helpful in getting people’s minds off the tragedy, they went ahead with the show. WWE Superstars crowded the ringside as their boss, the wrestling mogul, entered the ring to an enthusiastic crowd, chanting “U-S-A! U-S-A!”It was McMahon giving a speech just like the ones a WWE Superstar would give as part of the plot of any given Raw or Smackdown! episode, challenging a rival to a grudge match.
“The spirit of America lives here in Houston, Texas,” McMahon said, as he began a speech that sent condolences to the victims and families of 9/11 and condemned the terrorists. “Our nation’s leaders have encouraged us to return to living our lives the way we normally do… the American way… Make no mistake about the message this public assembly is sending to terrorism tonight. That message is simply we will not live our lives in fear.”
“America’s heart has been wounded but her spirit shines as a beacon of freedom,” he said, “that will never be extinguished.”
Some senior citizens retire to Florida. Marine Lt. Col. Art Nalls retired to the cockpit of his privately-owned AV-8B Harrier “jump jet.”
Once a naval aviator and test pilot experienced in roughly 65 different types of aircraft, Nalls made a fortune in the real estate development business after he left the service. But he never forgot his love of flying or the first aircraft he flew in the Marine Corps — the Harrier.
After attending an air show and rediscovering his passion for flight, Art purchased a Russian Yak 3 (Yakovlev Yak-3), only to soon realize that the enormous Soviet Star on the plane wasn’t exactly attracting the eyeballs at airshows. What the people wanted to see were our nation’s greatest planes. He noticed that the biggest star at any airshow was the Harrier Jump Jet, so beginning in 2010 Art Nalls began his quest to own one himself. Everything finally came together after discussing the possibility of owning one with the FAA (and receiving approval), and then finding a British Harrier Jump Jet for sale after Great Britain took them out of commission.
Although the video doesn’t mention the price he paid, the going rate for a Harrier is around $1.5 million. Then of course there’s the insane price of gas, which Nalls makes up by performing at air shows.
Denmark and its autonomous Arctic island of Greenland have signed an agreement to clean up U.S. military installations that were left to rust in the pristine landscape after the Cold War.
The deal earmarks 180 million kroner ($29 million) over six years for the cleanup. Greenland Premier Kim Kielsen and Danish Environment Minister Esben Lunde Larsen finalized it in Copenhagen on Jan. 11.
Lunde Larsen said a Denmark-Greenland steering group will decide when and where to start the cleanup.
A 1951 deal between Copenhagen and Washington allowed the U.S. to build 33 bases and radar stations in Greenland. The agreement didn’t specify who would be responsible for cleanup.
Lunde Larsen and Kielsen singled out areas south of Nuuk, the Greenland capital on the west coast, and Tasiilaq on the east coast, where there are defunct buildings, abandoned vehicles, and empty fuel barrels littered along runways used by Americans for the North Atlantic air ferry route during World War II. U.S. planes touched down in Greenland on their way to war in Europe and North Africa.
The deal between Denmark and Greenland doesn’t cover a U.S. facility that is still in use or, for instance, Camp Century, an under-ice missile project abandoned in 1966 because the cap began to crush the camp. A separate deal from February 2017 between Denmark and Greenland is monitoring and gauging the never-completed launch site for nuclear missiles under the surface of the massive ice cap.
“I am pleased that we can work together to do the cleaning,” Kielsen said, adding Greenland for long had wished to remove junk from American activities.
Troops everywhere know PT belts are the height of military fashion. At one point, they were second only to the BCG. But then the military did away with those and knocked everyone’s favorite reflective plastic belt to the top of the list of uniform items that are both beautiful and utilitarian.
It’s hard to be this cool both inside and outside a gym, but somehow military members worldwide do it every day.
Which is why troops and their supporters appreciate the important fashion industry nod given recently by Urban Outfitters. Now, you don’t need access to the exchange’s Clothing and Sales shop or the PX to participate in this important military fashion movement.
Instead, you can just hit up their site and shell out plus shipping.
Forget defending freedom. America should be thanking the troops for THIS.
“Reflective training belt from Rothco perfect for night-time visibility,” the site says of the accessory. “Complete with slide adjustment buckle + side release buckle closure.”
Honestly, though, Urban Outfitters isn’t doing this item the justice it deserves. They only show it being used as a belt for pants. But what of its place on a ruck?
U.S. Soldiers adjust a rucksack during the Third Annual Chief Master Sgt. of the Air Force Paul Airey Memorial Ruck/March/Run, on Ramstein Air Base, Germany, June 1, 2018.
( (U.S. Air Force photo by Elizabeth Baker)
What of its use as a cross-body reflective sash?
Sgt. Jason Guge of Billings, Mont., a Black Hawk helicopter mechanic, wears several physical training belts in a hanger at Contingency Operating Base Adder, Iraq in 2009.
(U.S. Army photo)
Or for your dog? Or for your kid?
You’re welcome, America.
This article originally appeared on Military.com. Follow @militarydotcom on Twitter.
Video of a remarkable aerobatic display by Lockheed Chief Pilot Wayne Roberts in a new LM-100J Super Hercules variant is lighting up the internet in the last couple of days. Roberts flew an incredible demonstration routine at the Farnborough Air Show in the new civilian variant of the legacy C-130 Hercules. It is almost certainly the most remarkable demonstration flying ever in a C-130 variant. At one point during the display the LM-100J was completely inverted.
We’ve seen smaller tactical transports demonstrate some impressive aerobatics, including the Italian Air Force C-27J display at the 2017 Royal International Air Tattoo (RIAT). But we’ve never seen video of a C-130 variant flying a routine that is this dynamic, including the momentarily completely inverted portion of the display.
The LM-100J is a new version of the highly successful Lockheed C-130 intended for the civilian cargo lift, firefighting and utility market. The original C-130 first flew a remarkable 64 years ago. It is also the longest continuously produced military aircraft in history. C-130 variants are used as gunships, bombers, tactical transports, weather reconnaissance, electronic warfare, search and rescue and other special missions with militaries around the world.
The new LM-100J Super Hercules uses the new, more powerful Rolls Royce AE 2100D3 engines. It first flew with these engines on May 25, 2018. The LM-100J Super Hercules is a replacement for the older L-100 version of the Hercules built from 1964 until 1992. There were 115 of the original L-100s built.
According to Lockheed, the flight test program for the LM-100J should be “done by year end” and the aircraft could receive FAA certification in 2019.
Lockheed pilot Wayne Roberts told the website C-130MRO.com that [the new LM-100J], “It flies as wonderfully as it always has. For 60 years, [the C-130] has operated into some of the shortest runways in the world. It still does that extremely well, but it now has new avionics and engines too.” The writers at C-130MRO.com went on to say that the LM-100J is, “Essentially a tweaked version of the C-130J tactical transport, the civil freighter benefits from the over 20 years and 1.5 million flight hours of the military model.”
Some fascinating features on the new LM-100J not normally seen on civilian oriented transports will eventually include night-vision-goggle and air-drop capability, although these will not be certificated initially. This raises the possibility of the aircraft being used by government contractors and intelligence agencies. The C-130J is offered in both long- and short-fuselage variants, the freighter will only be sold in its longer, 34.37m (112ft 9in) version. In addition to being a cargo transport, Lockheed sees potential for the LM-100J to perform missions including aerial firefighting, search and rescue, and even VIP transport.
Transport aircraft often take a back seat to high performance jets and aerobatic teams at airshow demos. But there is no doubt that with the sensation across the internet over the remarkable flying of pilot Chief Pilot Wayne Roberts in the LM-100J that harkens back to pilots like Bob Hoover in the Rockwell Aero Commander, this last demonstration series by Roberts will be remembered for a long, long time.
This article originally appeared on The Aviationist. Follow @theaviationist on Twitter.
Guam’s first line of defense from an incoming North Korean ballistic missile could very well be MQ-9 Reaper drones. This sounds very counter-intuitive, since ballistic missiles go very fast, and the normal cruising speed of the MQ-9 Reaper is 230 miles per hour.
But according to a report from DefenseOne.com, the secret was not in what the drones could shoot or drop, but instead in what the drones could see. In a June 2016 multi-lateral exercise involving Japan, the United States, and South Korea, two MQ-9 Reapers equipped with Raytheon Multi-Spectral Targeting System C were able to give Aegis ships armed with SM-3s more precise targeting data on the ballistic missile.
The Missile Defense Agency is hoping to reduce the number of drones needed by adding a targeting laser to the Reaper.
According to the Raytheon web site, the Multi-Spectral Targeting System, or MTS, is a combined electro-optical/infra-red system that also adds a laser designator. Various versions of the MTS have been used on platforms ranging from the C-130 Hercules cargo plane to the MQ-9 Reaper. The United States military has two general versions, the AN/AAS-52, or the MTS-A, and the AN/DAS-1, the MTS-B. The Air Force is also buying another Raytheon MTS system, designating it the AN/DAS-4.
One possibility to improve these airborne eyes could center around a jet-powered version of the Reaper called the Avenger. According to the General Atomics web site, the Avengr has a top speed of 400 nautical miles per hour, and can stay airborne for as many as 20 hours, depending on the version.
The Avenger could have the option of not just watching a launch, but maybe even hitting an enemy missile. According to a 2015 report from BreakingDefense.com, the Avenger could also carry the HELLADS, a high-energy laser system. Earlier this year, the Army tested a high-energy laser on the AH-64 Apache, combined with Raytheon’s MTS.
From vigorous barking to dashing through water-based obstacles, military working dogs and handlers with the 6th Security Forces Squadron participated in water aggression training to maintain full spectrum readiness at Adventure Island amusement park in Tampa, Florida, Oct. 29, 2018.
“We have 7.2 miles of coastline around MacDill and we always have to be ready to patrol it,” said Tech. Sgt. Matthew McElyea, a military dog trainer assigned to the 6th SFS. “We never stop training and it’s our job to keep our dogs engaged and excited about the job we accomplish together.”
Additionally, eight Tampa law enforcement agencies unleashed their own K9s during the joint training exercise.
“We do this training annually,” said Eddie Durkin, Tampa Police Department public information officer. “Some dogs don’t get enough exposure to water-based scenarios and this type of training gets them more confident and comfortable in the water.”
U.S. Air Force Senior Airman Damion Morris, a military dog handler assigned to the 6th Security Forces Squadron, tests the water with his military working dog, Lleonard, at Adventure Island, Tampa, Fla. Oct. 29, 2018.
(U.S. Air Force photo by Airman 1st Class Scott Warner)
MacDill’s military working dogs, Lord, Zeno, and Lleonard, participated in a wave of training scenarios involving suspect apprehension and deterrence in an unfamiliar environment.
“We are always looking for new ways to evolve our training and be ready for any contingency situation,” McElyea said.
The event simulated three water-based scenarios, from an obstacle course to waves and large depths of water. The training fully encompassed what a military working dog might experience in the field.
U.S. Air Force Staff Sgt. Jeffrey Greene, a military dog trainer assigned to the 6th Security Forces Squadron, practices water aggression training with 6th SFS military working dog, Lleonard, at Adventure Island, Tampa, Fla. Oct. 29, 2018.
(U.S. Air Force photo by Airman 1st Class Scott Warner)
“Lord was outstanding in every water-based evaluation, and Zeno and Lleonard made significant progress throughout the day,” McElyea said. “This situational training is invaluable when our dogs need to be ready to respond to anything.”
Whether it’s inside of the base or at a point of entry, MacDill’s working dog handlers and their partners continuously practice detection, bite drills, obeying commands and apprehending suspects.
“We are the best at narcotic and bomb detection and deterrence,” McElyea said. “But our local law enforcement agencies are experts in patrol, so collectively these joint training exercises are mutually beneficial since we can learn so much from one another.”