Five months before the 9/11 attacks, US Secretary of Defense Donald Rumsfeld sent a memo to one of his advisers with an ominous message.
“Cyberwar,” read the subject line.
“Please take a look at this article,” Rumsfeld wrote, “and tell me what you think I ought to do about it. Thanks.”
Attached was a 38-page paper, published seven months prior, analyzing the consequences of society’s increasing dependence on the internet.
It was April 30, 2001. Optimistic investors and frenzied tech entrepreneurs were still on a high from the dot-com boom. The World Wide Web was spreading fast.
Once America’s enemies got around to fully embracing the internet, the report predicted, it would be weaponized and turned against the homeland.
The internet would be to modern warfare what the airplane was to strategic bombers during World War I.
The paper’s three authors — two PhD graduates and the founder of a cyber defense research center — imagined the damage a hostile foreign power could inflict on the US. They warned of enemies infecting computers with malicious code, and launching mass denial of service attacks that could bring down networks critical to the functioning of the American economy.
“[We] are concerned that US leadership, and other decision-makers about Internet use, do not fully appreciate the potential consequences of the current situation,” the report said. “We have built a network which has no concept whatsoever of national boundaries; in a war, every Internet site is directly on the front line. If we do not change course soon, we will pay a very high price for our lack of foresight.”
The US government had a problem on its hands and it seemed a long ways from figuring out how to handle it.
More than 17 years later, that problem seems to have only gotten worse.
Follow the money
Willie Sutton, the notorious Brooklynite who spent his life in and out of prison, once told a reporter he robbed banks because that’s where the money is. Computer hackers aren’t so different.
In 2016, hackers attacked companies in the financial services sector more than companies in any other industry, according to IBM. Over 200 million financial records were breached that year, a 937% increase from 2015. And that’s not including the incidents that were never made public.
As hackers become more sophisticated and cyber attacks more routine, New York is on notice. Home to the most valuable stock exchange on Earth, New York City is the financial capital of the world. When the market moves here, it moves everywhere.
So it was no surprise when in September 2016, Gov. Andrew Cuomo announced that the New York State Department of Financial Services (NYDFS) was gearing up to implement sweeping, first-of-their-kind cybersecurity regulations to protect the state’s financial services industry — an unprecedented move no other state or federal agency had taken anywhere in the US.
Cybersecurity in New York’s financial industry was previously governed by voluntary frameworks and suggested best practices. But the NYDFS introduced, for the first time, regulations that would be mandatory, including charging firms fines if they didn’t comply.
Maria Vullo, the state’s top financial regulator, told Business Insider that her No. 1 job is to protect New Yorkers.
“They’re buying insurance. They’re banking. They’re engaging in financial transactions. And in each of those activities, they’re providing their social security information, banking information, etc.,” she said. “The companies that are obtaining that personal information from New Yorkers must protect it as much as possible because a breach of that information is of great consequence to the average New Yorker.”
On March 1, the regulations turn a year old, although some of the rules are not yet in effect and will phase in over time.
The NYDFS oversees close to 10,000 state-chartered banks, credit unions, insurance companies, mortgage loan servicers, and other financial institutions, in addition to 300,000 insurance licensees.
The combined assets of those organizations exceed $6 trillion, according to the NYDFS — and they’re all in constant danger of being hacked.
Banks are vulnerable
In the summer of 2014, an American, two Israelis, and two co-conspirators breached a network server of JPMorgan Chase, the largest US bank.
They got hold of roughly 83 million customers’ personal information, including names, addresses, phone numbers, and email addresses.
The hackers didn’t steal any money from personal bank accounts, but that wasn’t the point.
They wanted access to a massive trove of emails that they could use for a larger, separate money scam. In just three years, that operation netted the hackers more than $100 million.
The JPMorgan hack wasn’t the end game. It was a piece of the puzzle.
The attack began with the simple theft of a JPMorgan employee’s login credentials, which were located on a server that required just one password.
Most servers with sensitive information like a person’s banking data require what’s called multi-factor, or two-factor authentication.
But JPMorgan’s security team had lapsed and failed to upgrade the server to include the dual password scheme, The New York Times reported at the time.
The attack, the breach, and the reputational damage that followed could have been avoided with tighter security. Instead, the hack went down as one of the largest thefts of customer data in US history.
“Banks are especially vulnerable,” Matthew Waxman, a professor and the co-chair at Columbia University’s Cybersecurity Center, told Business Insider. “Disruption to the information systems on which banks rely could have shockwaves throughout the financial system, undermining public confidence in banking or knocking off line the ability to engage in commercial transactions.”
That’s the kind of catastrophic damage that worried the authors cited in Defense Secretary Rumsfeld’s 2001 memo.
They weren’t only concerned about stolen email addresses and social security numbers. They were worried about the fallout from such activity.
Banking works because consumers trust the system. But what if people lose trust?
Waiting until a catastrophe
News of impending cybersecurity regulations in New York in the fall of 2016 was both welcomed and shunned.
Some companies saw it as a chance to improve their own security standards while others complained of government overreach. Some were relieved to find they wouldn’t have to make any adjustments to the way they operated. Others were overwhelmed by the heavy lifting they would have to do to comply.
How a company views the regulations depends in large part on its size. Bigger institutions with more cybersecurity professionals and more resources at their disposal tend to already have in place much of what the regulations require. Many smaller companies, which tend to be under-staffed and under-resourced, have a lot more work to do to catch up.
The only additional thing Berkshire Bank has to do is sign off on its annual compliance form, which it sends to NYDFS to prove that it’s doing everything it’s supposed to be doing.
“We actually have to do nothing [new] from a compliance standpoint,” the company’s chief risk officer Gregory Lindenmuth told Business Insider.
While several cybersecurity consultants told Business Insider they acknowledge the NYDFS rules as a positive step in the right direction, they also point to a new law in Europe as a leading example of the role government has to play in protecting individuals’ privacy rights and ensuring that companies secure consumers’ personal information.
In 2016, the European Parliament passed a law called the General Data Protection Regulation (GDPR) — landmark legislation that imposes millions of euros in fines on companies that do not adequately protect their customers’ data.
Whereas the NYDFS regulations cover just one industry in one US state, the GDPR affects companies in all industries across all 28 member states of the European Union. Companies that do not report a data breach or fail to comply with the law more generally could be fined up to €20 million or 4% of its global revenue.
Matthew Waxman, the Columbia professor, says it’s not surprising that the implementation of such a law remains far-fetched in the US.
“It’s sometimes very difficult to get the government to take action against certain threats until a catastrophe takes place,” Waxman said. “But that could change very suddenly if the banking system were knocked offline or another very major disruption to everyday life affected the lives and security of citizens on a massive scale.”
But are the deterrents strong enough?
Data protection advocates calling for stricter cybersecurity regulations in the US are generally happy about the NYDFS rules.
For the first time, a state government is taking seriously the protection of consumer data, they say. It’s giving companies in the financial sector an ultimatum: protect New Yorkers or face punishment.
But the nature of that punishment is not entirely clear.
“My big criticism of the regulations is there’s no clear consequence for non-compliance,” Tom Boyden, a cybersecurity expert who helps companies defend against cyber attacks, told Business Insider. “If companies don’t feel like there’s going to be any consequence for any action on their part, companies aren’t going to take [the regulations] seriously.”
In fact, for many companies, Boyden thinks “that’s the default position.”
Vullo, the head of the NYDFS, said she has the ability to fine companies that are not complying and is willing to exercise that authority, although how much that cost may be would depend case-by-case.
“I don’t want this to be a punitive atmosphere, but obviously if institutions are not taking this seriously, then there will be consequences,” she said. “But it’s not the objective.”
If anything, the objective is to make it clear that cyber threats are real and that New Yorkers and the companies that maintain their personal information are facing higher risks of attack.
Cybersecurity affects everyone, and Vullo said she hopes the regulations will help companies prioritize it.
“Everyone is part of our cybersecurity team,” Theresa Pratt, the chief information security officer at a private trust company in New York, told Business Insider. “It doesn’t matter what myself or my colleagues do from a technical perspective. If I have one user who clicks a bad link or answers a phisher’s question over the phone, it’s all for naught.”
New York leading the way
The new rules have far-reaching implications beyond New York. A business in the state that has a parent company based in Germany, for example, still has to comply with the regulations.
This leaves some organizations in the precarious position of having to either restructure company-wide cybersecurity practices or build an entirely new and unique security apparatus that is specific to its New York offices.
“I do think that because of the scope of some of these regulations, they’re kind of blurring the lines between countries and continents. I think we’re going to see more and more of this,” GreyCastle Security CEO Reg Harnish told Business Insider. The New York-based consulting firm is helping companies comply with the new regulations.
In the absence of leadership from the federal government on certain issues related to cybersecurity and data protection, states like New York are beginning to fill the void. Several cybersecurity experts told Business Insider that the NYDFS regulations could become a model for other industries or even policies at the national level.
In 2017, at least 42 states introduced more than 240 bills or resolutions related to various cybersecurity issues, according to the National Conference of State Legislatures. And since the NYDFS rules took effect, financial regulators in Colorado and Vermont have followed New York’s lead with cybersecurity regulations of their own.
Indeed, cyber experts have come a long way in better understanding the threats we face since Rumsfeld’s dire cyberwar memo in 2001. But 17 years on, the former secretary of defense’s concerns still seem as relevant as ever.
Perhaps the memo was a prescient warning — a warning that fell on deaf ears, but is not too late to address.
Reservists called up for active duty will soon qualify for increased Post-9/11 GI Bill education benefits if they meet certain requirements.
The Harry W. Colmery Veterans Education Assistance Act, also known as the “Forever GI Bill,” was passed by Congress and signed into law in August 2017. The Forever GI Bill expands education benefits for some members of the Reserve effective Aug. 1, 2018.
VA may now consider more reservist service as qualifying time towards eligibility for the Post-9/11 GI Bill, including:
Major disasters or emergencies, as authorized under section 12304a of title 10, U.S. Code
Pre-planned missions of up to 365 days in support of combatant commands, as authorized under section 12304b of title 10, U.S. Code
The service must occur on or after June 30, 2008. The benefits are payable for a course of education beginning on or after August 1, 2018.
It’s important to note that serving time under title 10, U.S.C. 12304a or 12304b doesn’t automatically qualify for Post-9/11 GI Bill benefits. The Post-9/11 GI Bill has a minimum service requirement of at least 90 days, although periods of service for separate missions can be combined to meet the 90-day threshold.
Here are some examples to help you understand this provision of the Forever GI Bill:
A reservist was called up to active duty and served in Afghanistan for one year in 2002. Then he or she was called up for three months in 2004, two months in 2005, and three months in 2010 under title 10, U.S. Code 12304a.
Forever GI Bill/Colmery Act allows more Reserve service to qualify for education benefits under the Post-9/11 GI Bill.
Prior to Aug. 1, 2018, those three months under 12304a were not creditable active duty service, so the person was eligible for the 60 percent tier with 17 months of creditable service. Now, thanks to this new provision of the Forever GI Bill/Colmery Act, the three months of service under title 10, U.S. Code 12304a can be added. The reservist now has 20 months of qualifying service and would be eligible for the 70 percent tier.
Or, let’s say a reservist had only 90 days of service under title 10, U.S. Code 12304a. He or she wouldn’t have qualified at all. With this law change, the reservist now has qualifying active duty and would be eligible for the 40 percent tier.
If you haven’t explored your options to use your education benefits, you can start by visiting the GI Bill Comparison tool. You can see how to maximize your education value and look up the college, training school, or even apprenticeship program you’re interested in attending. You can also see how much your GI Bill benefits will cover and if you’d have any out of pocket expenses.
If you have any questions, please call 1–888-GI-BILL-1 (1–888–442–4551). If you use the Telecommunications Device for the Deaf (TDD), the Federal number is 711. You can also visit the Forever GI Bill page.
Veterans Benefits Administration’s Education Service delivers GI Bill® education benefits to Veterans, service members, and their families. Since 1944, the GI Bill has helped millions of Veterans pay for college, graduate school, and training programs.
Featured image: Speaker Nancy Pelosi, House Democratic Leaders, and Democratic Members of the House join representatives from Veterans’ Service Organizations at an enrollment ceremony for the Post-9/11 Veterans Educational Assistance Improvements Act.
In August 1990, Saddam Hussein’s Iraqi Army invaded and occupied neighboring Kuwait in a move which brought swift condemnation from much of the rest of the world. In response, U.S. President George H.W. Bush ordered planes, ships, and troops brought in to Saudi Arabia as quickly as possible to help mount a defense against possible Iraqi aggression. As Iraqi troops massed at the Saudi-Kuwaiti border, Operation Desert Shield began in full force, as the Coalition forces grew to 48 nations.
The United States isn’t known for its passivity when it comes to aggression against its interests, however. The U.S. was actively planning a response to the Iraqi invasion and a subsequent liberation of Kuwait, which happened between January and February 1991 in what became known as Operation Desert Storm.
We pretty much sent everyone. (U.S. Army photo by Spc. Daniel Jackson)
During the military build-up, planners wanted to fool Saddam into thinking the Coalition forces would invade Kuwait near the “boot heel” of the country, while planning to really hit the Iraqi occupation forces with a “left hook” strategy. The centerpiece of this deception effort was at Forward Operating Base Weasel, an effort unlike anything since Operation Fortitude during WWII, the misinformation campaign designed to cover the real location for the D-Day invasions.
FOB Weasel was what Rick Atkinson, author of Crusade: The Untold Story of the Persian Gulf War called “a Potemkin base… giving the impression of 130,000 troops across a hundred square kilometers.” Army truck drivers wearing the red berets of paratroopers would shuttle vehicles between FOB Weasel and logistic bases.
The U.S. army’s XVIII Airborne Corps established FOB Weasel near the phony invasion area. They set up a network of small, fake camps with a few dozen soldiers using radios operated by computers to create radio traffic, fake messages between fake headquarters, as well as smoke generators and loudspeakers blasting fake Humvee, tank, and truck noises to simulate movement. Inflatable tanks with PVC turrets and helicopters with fiberglass rotors were lined up on the ground as well. Inflatable fuel bladders, Camo netting, and heat strips to fool infrared cameras completed the illusion. The Americans even taped “Egyptian” radio traffic messages about the supposed American presence to be intercepted by the Iraqis.
As late as February 21st, Iraqi intelligence still thought the Americans were near the Kuwaiti boot heel, well after the Iraqis were expelled from Kuwait.
When author Robert B. Baer asked his boss at the CIA for the definition of assassination his boss replied, “It’s a bullet with a man’s name on it.” Baer wasn’t sure what that meant so he started to research the topic beyond what he already had experienced around it in his role at the CIA. The end of that process became his insightful and provocative new book, The Perfect Kill, in which he outlines 21 laws for assassins. Here are 11 of them:
Law #1: THE BASTARD HAS TO DESERVE IT
“The victim must be a dire threat to your existence, in effect giving you license to murder him. The act can never be about revenge, personal grievance, ownership, or status.”
Law #2: MAKE IT COUNT
“Power is the usurpation of power, and assassination its ultimate usurpation. The act is designed to alter the calculus of power in your favor. If it won’t, don’t do it.”
Law #5: ALWAYS HAVE A BACKUP FOR EVERYTHING
“Count on the most important pieces of a plan failing at exactly the wrong moment. Double up on everything — two set of eyes, two squeezes of the trigger, double-prime charges, two traitors in the enemy’s camp.”
Law # 7: RENT THE GUN, BUY THE BULLET
“Just as there are animals that let other animals do their killing for them — vultures and hyenas — employ a trusted proxy when one’s available.”
Law #8: VET YOUR PROXIES IN BLOOD
“Assassination is the most sophisticated and delicate form of warfare, only to be entrusted to the battle-hardened and those who’ve already made your enemy bleed.”
Law #9: DON’T SHOOT EVERYONE IN THE ROOM
“Exercise violence with vigilant precision and care. Grievances are incarnated in a man rather than in a tribe, nation, or civilization. Blindly and stupidly lashing out is the quickest way to forfeit power.”
Law #15: DON’T MISS
“It’s better not to try rather than to try and miss. A failed attempt gives the victim an aura of invincibility, augmenting his power while diminishing yours. Like any business, reputation is everything.”
Law #16: IF YOU CAN’T CONTROL THE KILL, CONTROL THE AFTERMATH
“A good, thorough cleanup is what really scares the shit out of people.”
Law #17: HE WHO LAUGHS LAST SHOOTS FIRST
“You’re the enemy within, which mean there’s never a moment they’re not trying to hunt you down to exterminate you. Hit before it’s too late.”
Law # 19: ALWAYS HAVE AN ENCORE IN YOUR POCKET
“Power is the ability to hurt something over and over again. One-offs get you nothing or less than nothing.”
Law #21: GET TO IT QUICKLY
“Don’t wait until the enemy is too deeply ensconced in power or too inured to violence before acting. He’ll easily shrug off the act and then come after you with a meat cleaver.”
For the rest of Robert B. Baer’s 21 laws for assassins, buy his amazing book here.
The days following the Sept. 11 attacks on the United States were strange days for many of us. Not only here at home, where the American worldview changed literally overnight, but also in Afghanistan. For obvious reasons.
What might not be so obvious are the many ways which the United States systematically struck back against al-Qaeda and the Taliban who protected its members in Afghanistan. By now, many have heard of the U.S. Army Special Forces who assisted the Northern Alliance on horseback. The new movie 12 Strong depicts their mission.
But three days after the Green Berets and Northern Alliance leader Abdul Rashid Dostum teamed up for the fall of Mazar-e-Sharif, another joint American-Northern Alliance team was fighting to capture – and keep – the Afghan city of Herat.
According to reports from the open-source U.S. Foreign Broadcast Information Service, American air power had been conducting air strikes on the city since October 2001, destroying armored columns, tunnel complexes, and other support facilities. The city was ready by the time the joint assault took place.
American Special Forces, Northern Alliance fighters, and Shia militias moved on the city as the populace took arms against the Taliban with anything they could find. Defeated Taliban fighters fled the city within the same day.
The whole operation was overseen in Tehran by agents of the CIA working with Iranian intelligence officers. Shortly after the city fell, a Northern Alliance spokesperson said it was the first time Khan set foot in the city since it fell to the Taliban in 1995.
In 2005, an Iranian Presidential candidate alluded to the story via an interview with USA Today’s Barbara Slavin, who was able to confirm some parts of the story, while some sources alluded to further collaboration and denied other parts.
Enemy combatants lurking in tunnels have attacked US troops throughout history, including during both world wars, Vietnam, and more recently in Iraq and Afghanistan.
Detecting these secretive tunnels has been a challenge that has been answered by the US Army Engineer Research and Development Center’s engineers at the Geotechnical and Structural Laboratory in Vicksburg, Mississippi.
The lab developed the Rapid Reaction Tunnel Detection system, or R2TD, several years ago, according to Lee Perren, a research geophysicist at ERDC who spoke at the Pentagon’s lab day in May.
R2TD detects the underground void created by tunnels as well as the sounds of people or objects like electrical or communications cabling inside such tunnels, he said. The system is equipped with ground penetrating radar using an electromagnetic induction system.
Additionally, a variety of sensors detect acoustic and seismic energy, he added.
The detection equipment data can then be transmitted remotely to analysts who view the data in graphical form on computer monitors.
The system can be carried by a soldier or used inside a vehicle to scan suspected tunnel areas, he said.
R2TD has been deployed overseas since 2014, he said. Feedback from combat engineers who used the system indicated they like the ease of use and data displays. It takes just a day to train an operator, Perren said.
Jen Picucci, a research mathematician at ERDC’s Structural Engineering Branch, said that technology for detecting tunnels has been available for at least a few decades.
However, the enemy has managed to continually adapt, building tunnels at greater depths and with more sophistication, she said.
In response, ERDC has been trying to stay at least a step ahead of them, continually refining the software algorithms used to reject false positives and false negatives, she said. Also, the system upgraded to a higher power cable-loop transmitter to send signals deeper into the ground.
The improvements have resulted in the ability to detect deeper tunnels as well as underground heat and infrastructure signatures, which can discriminate from the normal underground environment, she said.
Picucci said ERDC has shared its R2TD with the Department of Homeland Security as well as with the other military services and allies. For security reasons, she declined to say in which areas R2TD is being actively used.
Besides the active tunneling detection system, a passive sensing system employs a linear array of sensors just below the surface of the ground to monitor and process acoustic and seismic energy. These can monitored remotely, according to an ERDC brochure.
While current operations remain classified, ERDC field engineers have in the past traveled in to Afghanistan according to members of the team.
In 2011, for example, ERDC personnel set up tunnel detection equipment to search the underground perimeter of Camp Nathan Smith, Afghanistan, said Owen Metheny, a field engineer at ERDC who participated in the trip.
His colleague, Steven Sloan, a research geophysicist at ERDC in Afghanistan at the time, said the goal was to ensure safety at the camp.
“We make sure nobody is coming into the camp using underground avenues that normally wouldn’t be seen and wouldn’t be monitored,” Sloan said. “We check smaller isolated areas — usually areas of interests and perimeters.”
The researchers did a lot of traveling around Afghanistan.
“We travel to different regional commands and help out in the battle spaces of different military branches,” Sloan said. “We use geophysical techniques to look for anomalies underground. We look for things that stick out as abnormal that might indicate that there is a void or something else of interest. As we work our way through an area we look for how things change from spot to spot.”
“I really enjoy my job,” Metheny said. “I’m doing something for my country and helping keep people safe. Plus, where else could a bunch of civilians get to come to Afghanistan and look for tunnels?”
A new study was recently released by the VA that monitored the effects of drinking alcohol heavily on a daily basis. In case you weren’t yet aware, regularly binge drinking is bad for you.
So, instead of joining in with the rest of society and bashing the VA for studying the painfully obvious, I’m actually going to take their side. Tracking. Sure, it’s still a gigantic waste of time and money, but it’s clever as f*ck if you think about it. Imagine being a doctor on that study. You’ve got nothing to do for a few months but drink free booze, you’re still getting paid a doctor’s salary, and the answer is clear as day well before you’re done? F*ck yeah! Sign my ass up!
Shout-out to J.D. Simkins at the Military Times for making an actually funny, sarcastic rebuttal to this gigantic waste of time and money.
The infamous Molotov Cocktail got its start in the Spanish Civil War from 1936 to 1939 when Soviet-backed forces with a large number of tanks were met by forces wielding glass jars with blankets or drapes wrapped around the lid and set on fire.
The rebels took the weapon formerly used in Spain and perfected it. Some earlier versions used fuel that was too thin, causing it to burn out too quickly, so the Finns added thickening agents like tar. And the Finns preferred to use a bottle with some air inside instead of the completely full jars that were common in Spain. The air gap in the bottles made them more likely to break.
The Cocktails are thrown against the tanks. Today, throwers either need to hit the intake or the fuel storage of the tank in order to really threaten it. During World War II, the treads of many tanks were propelled via rubber wheels which could be targeted and the crew was susceptible to cocktails thrown against the air intake for their cabin.
And of course, a tank with the hatches open becomes a rolling oven if someone gets a cocktail inside.
France’s special operators in Iraq are collecting intelligence on their own citizens and then distributing it to Iraqi forces, according to the Wall Street Journal. The intent appears to be ensuring that as few French citizens as possible learn to fight under ISIS tutelage and then conduct attacks at home.
An estimated 1,700 French citizens have joined militant groups in Iraq and Syria, and France has little reason to want any of them back. Gathering intelligence on the most dangerous of them and handing it over to the Iraqis is a convenient way to reduce the threat without violating French laws on extra-judicial killings.
The U.S. has killed Americans in drone strikes and firefights, but only one of them was specifically targeted. Anwar al-Awlaki was a New Mexico-born Muslim cleric who preached a particularly anti-American and violent reading of Islam. He was targeted and killed in a drone strike in 2011.
France appears to be sidestepping the controversy that embroiled the Obama administration after the killing of al-Awlaki by outsourcing the dirty work.
The White House on Nov. 4 hit back after former President George H.W. Bush gave his most candid assessment yet of President Donald Trump.
“I don’t like him,” Bush said. His comments were included in a new book by historian Mark Updegrove, called “The Last Republicans,” which focuses on the lives of George H.W. Bush and his son, former President George W. Bush.
“I don’t know much about him, but I know he’s a blowhard,” the elder Bush continued. “And I’m not too excited about him being a leader.”
George W. Bush threw in his own two cents as well.
“This guy doesn’t know what it means to be president,” he said.
A White House official told CNN, in response to the Bushes’ comments, “If one presidential candidate can disassemble a political party, it speaks volumes about how strong a legacy its past two presidents really had.”
“And that begins with the Iraq war, one of the greatest foreign policy mistakes in American history,” the official said.
Trump repeatedly blasted the second Bush administration’s decision to invade Iraq during the 2016 primaries, as he was running against George W.’s younger brother, and George H.W.’s son, Jeb.
“I was totally against the Iraq war,” Trump said at a national-security forum at the height of the presidential race. “You can look at Esquire magazine from ’04. You can look at before that.”
But in a 2002 interview during which shock-jock Howard Stern asked Trump if he supported the invasion, Trump replied, “Yeah, I guess so.”
The White House official added on Nov. 4 that Trump “remains focused on keeping his promises to the American people by bringing back jobs, promoting an ‘America First’ foreign policy and standing up for the forgotten men and women of our great country.”
The George H.W. confirmed in the new book that he voted for Democrat Hillary Clinton in the 2016 election, while George W. says he left his ballot blank.
Apache helicopters can currently knock out enemy tanks, light bunkers, and personnel from over 7.5 miles away. But the Army is looking at a future world where a new generation of attack and scout helicopters might be engaging Chinese ships and Russian air defenses on islands in the Pacific or mountains across Eurasia. And so they want to increase their range, and a new missile would double it.
Right now, the Apache’s longest-range munition is its Hellfire Anti-Tank Guided Missile. This time-tested bad boy can deliver a shaped-charge warhead against a target 7.5 miles away.
But the Russian S-400 can kill targets about 25 miles away. So imagine that first strike of Desert Storm where Apaches conducted a deep raid against Iraqi air defenses. Now imagine them needing to secretly cross 17 miles of desert under enemy radar coverage before they could launch their missiles.
Every foot you can whittle off that vulnerable distance would save pilots’ lives in combat. And those AFVLCFT fellas might have whittled off 7.5 miles (that’s 39,600 feet, for anyone still whittling away).
The AFLCIO’s choice of the Spike-NLOS provides more than just greater range, though. It has a fiber-optic cable that spools out behind it as it flies, allowing the pilot to give new commands while the missile is in the air. Pilots can even fire the missile into a target area before spotting an enemy. As the missile is flying, the pilot can then designate who it should kill. And it has a tandem warhead allowing it to defeat most reactive armor.
The Spike-NLOS is already in production for Israeli forces, so American forces could see it whenever Congress ponies up the cash. Provided, you know, that the AARDVARK recommends it.
Gender integration is vital for the success of women in the military, the commander of US Southern Command said July 13 at the closing ceremony of the second Women in Military and Security Conference held in Guatemala City, Guatemala.
Navy Adm. Kurt W. Tidd made opening and closing remarks at WIMCON 17, a two-day conference on gender perspectives in force development and military operations co-hosted this year by the Southcom commander and the Guatemalan armed forces.
Photo courtesy of Southcom
In attendance were US Ambassador to Guatemala Todd D. Robinson, Guatemala Chief of Defense Maj. Gen. Juan Perez, and regional leaders.
The first WIMCOM was held last year in Trinidad and Tobago.
Over the past two days, Tidd said, “we’ve shared insights and observations and learned from one another’s experiences. We’ve celebrated our progress and identified the obstacles that still remain in our paths. And we’ve reinforced … a commitment to equality, a commitment to equity, a commitment to opportunity.”
The admiral said the Western Hemisphere offers a potential model for regional cooperation on gender integration and advancing gender perspectives.
“This week we’ve seen how much we have to share with one another, and I know this is only the beginning of setting the standard for the rest of the world,” Tidd added.
Community of Interest
The Southcom commander proposed two ideas for the group going forward, the first being to commit to establishing a formal community of interest to further the topic.
“Southcom will happily take on the task to find the best tool for continuing this vitally important conversation,” he said, “and we will use the contact information you provide today to share this forum once we create it.”
Gender advisors — subject matter experts attending the conference — are ideal members, Tidd added, but other personnel also will add value and over the next year the community can work on issues identified at WIMCOM 2017 as focus areas for improvement.
Second, the admiral said, is a need to collect better data to document progress.
“We have a term in English called baselining — determining a minimum starting point to use for comparisons,” he explained. “There’s clearly a lot more work to be done on [the kinds of] data we need to gather and share, but we’ve all heard this week about the importance of using data to further this message.”
Southcom, he said, offered to serve as a regional observatory to help keep track of integration progress by country, regional advances and obstacles to advancement.
Tidd added, “If you will get us the data and research, we’ll help collate it and make it available for our collective use.”
Other highlights from the meeting included the idea that equality for women in the military requires male acceptance and collaboration; that qualification and advancement for everyone should be based on capability, competency and character; and that fair standards should be set and all should be required to meet them.
The admiral also asked for ideas or recommendations for the focus of WIMCOM 2018.
“I sincerely hope that you’ll seek to replicate the face-to-face, candid conversations we sought to foster in this conference,” the admiral said. “Hopefully this is just the beginning, not the end, of those types of conversations.”