The report details a situation in which Russia’s navy, behind only those of the US and China in size, may soon be capable of denying the US Navy access to the Black and Baltic seas.
Russia’s landgrab in Crimea as well as its enclave in Kaliningrad could lock US forces out of the Black or Baltic seas.
US Lt. Gen. Ben Hodges spoke to this in a Pentagon news briefing earlier this month, saying the nearly 25,000 Russian troops illegally stationed in Crimea had “the ability to really disrupt access into the Black Sea.”
Earlier this year, Russia’s defense ministry announced plans to revive and increase the size and scope of the country’s Black Sea submarine fleet.
The new submarines are designed to excel at warfare in shallower water while being arguably the quietest submarines in the world.
“The new submarine and ship classes will incorporate the latest advances in militarily significant areas such as: weapons; sensors; command, control and communication capabilities; signature reduction; electronic countermeasures; and automation and habitability,” the report states.
The report also describes Russia’s Kalibr missiles, which were put on display in October when Russian boats in the Caspian Sea fired missiles at ground targets in Syria.
The report also speculates that Russia’s fifth-generation aircraft, the PAK FA aka T-50, could be ready for deployment as soon as 2016.
The increased stealth capabilities of the plane, as well as its potential role aboard a new Russian aircraft carrier, could spell big problems for the US.
According to the report, Russia is “reorganizing its personnel structure to more accurately reflect the needs of modern warfare” and will do so by attempting to transition to an all-volunteer force.
The report acknowledges that Russia is under heavy financial strain because of sanctions and historically low oil prices, but the country is nonetheless determined to create a modern navy that is capable of undermining the military superiority of the West.
The military has very talented photographers in its ranks, and they constantly attempt to capture what life as a service member is like during training and at war. This is the best of what they shot this week:
President Barack Obama transits aboard Air Force One through the Kentucky Air National Guard Base in Louisville, Ky., April 2, 2015. Obama was in town to discuss job training and economic growth during a visit to Indatus, a Louisville-based technology company that focuses on cloud-based applications.
Crew chiefs prepare a B-1B Lancer on Al Udeid Airbase, Qatar, for combat operations against Islamic State of Iraq and the Levant terrorists, April 8, 2015. Al Udeid is a strategic coalition air base in Qatar that supports over 90 combat and support aircraft and houses more than 5,000 military personnel.
The guided-missile destroyer USS Oscar Austin (DDG 79) moors between two buoys in Port Victoria, Seychelles. Oscar Austin is conducting naval operations in the U.S. 6th Fleet area of responsibility in support of U.S. national security interests in Europe and Africa.
CARIBBEAN SEA (April 15, 2015) An MH-60S Sea Hawk helicopter attached to the Sea Knights of Helicopter Combat Support Squadron (HC) 22 provides search and rescue support during a search and rescue exercise conducted by the Military Sealift Command hospital ship USNS Comfort (T-AH 20) during Continuing Promise 2015.
A Paratrooper from the 1st Battalion, 325th Airborne Infantry Regiment 2nd Brigade Combat Team, 82nd Airborne Division provides security while mounted on a camouflaged Lightweight Tactical All Terrain Vehicle during Combined Joint Operational Access Exercise 15-01 on Fort Bragg, North Carolina, April 14, 2015.
Engineers, from 2nd Cavalry Regiment, conduct a platoon breach at Hohenfels Training Area, Germany, April 13, 2015, as part of Exercise Saber Junction 15. Saber Junction 15 is a multinational training exercise which builds and maintains partnership and interoperability within NATO.
LISBON, Portugal – U.S. Marines with Special-Purpose Marine Air-Ground Task Force Crisis Response-Africa post security during an assault training exercise near Lisbon, Portugal, April 10, 2015. Marines stationed out of Moron Air Base, Spain, traveled to Portugal to utilize a variety of different ranges and training exercises alongside with the Portuguese Marines.
MARINE CORPS AIR STATION CHERRY , N.C. – Naval aviators with Marine Tactical Electronic Warfare Training Squadron 1 shoot flares from an EA-6B Prowler during routine training above Eastern North Carolina, April 14, 2015. VMAQT-1 student pilots and electronics countermeasures officers train to perform dynamic maneuvers while focusing on communication and radar jamming.
A helicopter from U.S. Coast Guard Air Station Borinquen stands at the ready on the flight deck of Coast Guard Cutter Resolute.
The crew of the U.S. Coast Guard Cutter Senecastands watch over Lower Manhattan in New York City with One World Trade Center in the background.
As he slides his hands across the edges of the wings and walks from nose to tail, inspecting all aspects of the jet, a wave of emotion begins to hit Jim Harkins.
His weathered features appear calm and determined, but they hide the tears he is fighting back.
While he walks around the aircraft, he greets each maintainer and says, “Thank you.” Harkins rubs and taps the bulging nose of the QF-4 Phantom II, like an aged cowboy saying hello to a trusty steed, and then climbs into the cockpit.
“One last time,” Harkins says and the canopy closes around him.
For Harkins and the F-4, this is a day of lasts. For Harkins, it’s the last time he will fly for the Air Force and, for the Phantom, the last time it will take to the skies.
It’s their final flight.
“It’s not really sad, because in the military you get used to a lot of lasts, but it’s humbling,” Harkins said.
Harkins isn’t the only one feeling nostalgic and emotional about the aircraft affectionately referred to as “Old Smokey.” Hundreds of “Phantom Phixers,” “Phantom Phliers” and “Phantom Phanatics” gathered on the flightline at Holloman Air Force Base, New Mexico, to watch the final F-4 flight.
Some used to work on the aircraft, some are just fans and others, like retired Col. Chuck DeBellevue, had the privilege of actually flying the fighter.
DeBellevue flew the F-4 in Vietnam, where he had six confirmed kills – two against the Mikoyan-Gurevich MiG-19 and four against the MiG-21, the most of any U.S. aviator during the war.
He’s not just saying farewell to an amazing machine, he’s saying goodbye to an old friend.
“A friend who got me home more times than I care to remember,” DeBellevue said. “Being back on the flightline today brought back a lot of memories, not all are good. I lost a lot of friends, but it was a great airplane. I loved to fly that airplane. It’s very honest and it got me out of a lot of tight spots during the war.”
DeBellevue recalls the Navy originally bought the F-4 to be a fleet interceptor and the Air Force bought it in 1963 to do everything – and it did do everything. It served as the primary air superiority fighter for both the Navy and Air Force, but it also served roles in ground-attack and aerial reconnaissance and, once taken out of active service, was designated the QF-4 where it flew as aerial targets.
The F-4 was a workhorse weapons system for the Air Force through the 1990s and it still hold the distinction of being the first multi-service aircraft. During it’s heyday, the F-4 set 16 speed and altitude records and demonstrated its effectiveness time and again throughout its lengthy career.
The Phantom looked cool doing it, too.
“You didn’t get into the F-4, you put it on, it became you,” DeBellevue said. “It was a manual airplane, not like an F-16 or F-15, they were aerodynamic and designed well. The F-4 was the last plane that looked like it was made to kill somebody. It was a beast. It could go through a flock of birds and kick out barbeque from the back.”
On the flightline at Holloman, the final flight of four F-4s prepare to take off for the last time. The engines rumble and smoke flies.
In his jet, Harkins looks over the crowd, dancing in the cockpit, revving up the on-lookers and saluting those in attendance. Everyone cheers as the final four F-4s begin their last taxi.
Harkins is first to pass the crowd, followed by pilots Eric “Rock” Vold, Jim “Boomer” Schreiner and finally Lt. Col. Ronald “Elvis” King, the last active duty F-4 pilot and commander of Det. 1, 82nd Aerial Target Squadron. Together these men will fly the Phinal Phlight demonstration before King officially retires the QF-4 program during a ceremony following the flight.
“I don’t want to sound cheesy, but every time I get into the F-4 I can’t help but think of all the stories of all the pilots and all the maintainers who made this aircraft great,” King said. “The history and the heritage to me is the biggest satisfaction of flying the airplane.”
King had no concept when he became the squadron commander he would be the last active duty pilot. It didn’t really set in until he and Harkins began taking the F-4 on a farewell tour during to air shows and aviation expos last year. King felt obligated to take the F-4 on the road, to give admirers the chance to see it, touch it and share their stories one last time. It was then he realized this tour piloting the F-4 would be something special.
“It’s going to be sad to shut those engines down for the last time, but she’s served our country well,” King said of the F-4. “It’s exciting too, because our mission is to provide full scale aerial targets and we are going to be able to do that now with an airplane that’s better suited, provides higher performance and is more representative of the threats we face today in the QF-16.”
King said it was getting more and more difficult to keep the F-4’s in the air, and the only reason the QF-4 lasted as long as it did was because of the maintainers of the 82nd ATS.
Unfortunately, he says, there is no longer a need for the F-4. All remaining aircraft will be de-militarized at Holloman and used as ground targets at the White Sands bombing range.
King says most people don’t like to hear the fate of the last F-4s, and he understands, but it’s too costly to maintain as a heritage piece or to preserve them for museums.
“At the end of the day, the Air Force isn’t real sentimental,” King said. “It will have a warrior’s death.”
Engines roar and a flume of dust and smoke signals to the crowd the final four F-4s are off. The first two jets, piloted by King and Schreiner take off in a two-ship formation. Harkins follows in the third position and Vold in fourth. The last two jets perform an unrestricted climb, staying low to the ground in afterburner before pulling into a vertical climb at the end of the runway. The crowd goes crazy.
The sound of the F-4 is distinct. As Harkins passes over the crowd in a low-altitude turn it sounds like the jet is ripping the sky.
Multiple passes are made in four-ship, two-ship and stacked formations over the crowd of hundreds in attendance. Camera shutters clicking at a furious pace can be heard down the tarmac.
Out of nowhere, the sky cracks open and multiple booms shake the ground, buildings and cars, setting off alarms across the base. The concussions signal the F-4s going supersonic high above.
Harkins swoops down out of the sky passing over the crowd multiple times, and makes his final approach. As his wheels touch back to Earth, Harkins enters the history books as the last pilot to fly 1,000 hours in the F-4.
“I can’t imagine a better way to go out than with the F-4, it’s a special moment and a special jet and then … done,” Harkins said. “Although I flew F-16s and I went down to the F-4, but I consider myself going out on top.”
As climbs down from his jet he’s doused with water from his comrades and sprayed with champagne. In the distance, King lands his F-4 and with the front landing gear touching the asphalt, the history books close on the aircraft’s legacy.
But while the Phantom’s time in the sky may be over, the tales of its exploits are far from done. For those who flew the F-4, there is always time to wax poetic about the good ‘ole days, tearing across the wild blue yonder on “Old Smokey.”
Ask any kindergartener what Santa looks like, and they’ll probably tell you he has a red suit, a big, round belly and a long, white beard. The classic Christmas song “Must Be Santa,” written in 1960 by Mitch Miller, describes him in even greater detail, with a cap on his head and a cherry nose. That’s how most of us picture Santa Claus, and it’s no wonder – the American image of Santa has remained virtually unchanged for over 100 years.
Glance back through time, and a different picture of Santa appears.
In the 1800s and the centuries preceding it, Santa looked a lot more like a traditional saint. That is how the tradition of Santa started, after all. As the story goes, a poor man had three daughters. With nothing to offer as a dowry, his daughters had no hope of getting married. A kind bishop named Nicholas took pity on the family, dropping bags of gold down the chimney to provide a dowry for each daughter. For this good deed along with many others, Nicholas was dubbed the saint of children. (He was also the saint of sailors, but that’s another story.)
While I’m quite thankful that I don’t have to rely on an old man to throw gold into my fireplace to secure my future, St. Nicholas was the official inspiration behind modern-day Santa. As the popularity of St. Nicholas waned, his name evolved. First, he became Father Christmas in England, then the Christkind in Austria and Germany, then Kris Kringle. Finally, Dutch settlers invented the name “Sinterklaas,” aka Santa. Despite the new name, however, 1800s Santa maintained his saintly image. So what changed?
Political satire and the Civil War reinvented Santa.
Enter political cartoonist Thomas Nast. Known by many as the father of the American political cartoon, Nast began as a gifted artist from humble beginnings. At the age of 15, he began working as a staff artist for Frank Leslie’s Illustrated News, and a few years later for the New York Illustrated News. Finally, he moved on to create cartoons for Harper’s Weekly. At this point, it was 1862 and the Civil War had begun.
In Nast’s cartoons, he didn’t hesitate to make his political opinions known. He made his Union loyalties quite clear, and on January 3rd, 1863, Santa Claus helped send his message home. In a particularly festive piece of propaganda, Nast depicted Santa Claus decked out in stars and stripes handing out gifts to Union soldiers. If you look closely, you can see Union Santa clutching a puppet resembling the Confederate president, Jefferson Davis, with a rope around its neck. In a Christmas Eve version, Nast drew a jolly Santa Claus climbing down the chimney to deliver presents, while a woman in the next frame prays for her husband’s safe return.
With these two simple illustrations, Nast cemented Santa as a sentimental Union symbol and reinvented St. Nick’s wardrobe in one go. While Nast refrained from making too many additional Santa-themed political statements, his jovial Father Christmas became an annual tradition. Although he skipped 1864, he published a new Santa illustration every holiday season for the rest of his years on staff at Harper’s. From then on, the tall, stately St. Nicholas was replaced with the stout, jolly old elf that we know and love today.
The director of national intelligence, as well as directors from various intelligence agencies, briefed the new Worldwide Threat Assessment to the Senate Intelligence Community Jan. 29, 2019, lining out the top international threats to the US.
Cyber threats from China and Russia and the loss of allies were highlighted as significant threats to the post-World War II world order. The report also directly contradicts White House statements on North Korea’s commitment to denuclearization and the defeat of ISIS.
Cyber threats, espionage, and election interference
“We anticipate that all our adversaries and strategic competitors will increasingly build and integrate cyber espionage, attack, and influence capabilities into their efforts to influence US policies,” the report states.
Russian President Vladimir Putin.
Confirming Russian influence during the 2016 presidential election, Dan Coats, the national intelligence director, also reiterated that foreign groups tried to influence the 2018 US midterm elections — and stressed in his opening remarks to the Senate that the 2020 election remains the community’s top priority.
“We assess that foreign actors will view the 2020 US elections as an opportunity to advance their interests,” Coats said during the hearing. “We expect them to refine their capabilities and add new tactics as they learn from each others’ experiences and efforts in previous elections.”
North Korea is stalling denuclearization — despite Trump’s assurances
The report highlights the stalling denuclearization in North Korea — something the Trump administration has been reluctant to admit as it has sought peace with leader Kim Jong Un.
“The [intelligence community] continues to assess that [North Korea] is unlikely to give up all of its WMD stockpiles, delivery systems, and production capabilities,” the report states.
Although North Korea has not conducted any nuclear tests in over a year, its leaders maintain that the country’s nuclear capabilities are paramount to the survival of the regime, the intelligence assessment said. The White House acknowledged in January 2019 that progress had stalled in Pyongyang.
ISIS has lost nearly all of its territory, but has not been defeated
Although Trump maintained that his administration has dealt the final blow to the ISIS caliphate, his intelligence community still views the terrorist organization as a threat to the US.
United States President Donald Trump.
(Photo by Michael Vadon)
The report highlights the thousands of ISIS fighters that remain in Iraq and Syria, and notes that while territorial expansion is unlikely, the group has developed an international network that spans across the eastern hemisphere. In the long term, ISIS will also use its social networking capabilities to exploit instability and “pursue external attacks” against the US, the report states.
Losing allies in Europe
“Some US allies and partners are seeking greater independence from Washington in response to their perceptions of changing US policies on security and trade and are becoming more open to new bilateral and multilateral partnerships,” the report states.
Though not explicit, the report suggests that the Trump administration’s repeated anti-NATO sentiment may be driving allies away from the US — and warns that Russia and China are eager to embrace the partnerships Trump has been pushing away.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
Unexploded ordnance, often called “UXO,” has long been a problem after wars. In World War II, the Allies dropped almost 1.6 million tons of bombs on Germany – the equivalent of 6.4 million 500-pound bombs. Every major city was hit.
The problem is that not all the bombs exploded — not surprising when so many were dropped. These have been hanging around – and even now, 72 years after V-E Day, some of them still turn up.
And in Hanover, Germany, on May 7, 2017, three of those UXOs were found by construction crews, according to the BBC.
With so many people affected, the city decided to throw a big UXO party. Numerous events were set up, including screenings of films for kids, sporting events, and museum tours. There were also efforts made to provide food and other essential supplies to the evacuees while the Allied bombs were secured.
There’s no doubt about it, UXO can still kill, even after decades under ground. The BBC reported that in 2010, three German EOD techs were killed while trying to defuse a World War II leftover. In 2012, a construction worker was killed when his equipment hit an old bomb. Old World War II ordnance has sometimes been discovered during training exercises, notably in the Baltic Sea.
In the United States, most of the UXO is from the Civil War. In the wake of Hurricane Matthew, a number of cannonball left over from that conflict were unearthed.
In our small town of Pacific Grove, Calif., an email alerted us that our community would be “hosting” 24 Grand Princess cruise passengers who display mild symptoms of COVID-19. The other California “hosts” are military installations, Travis Air Force Base in Fairfield, Calif., and Miramar Naval Air Station in San Diego.
A press release sent out by the governor’s office tells residents, “We have an opportunity to provide an example of a compassionate humanitarian response,” but omits specific measures being taken to quarantine the passengers and protect the community, which is known for having an elderly population. The town jokes that people move here to die or multiply, with many young residents coming for the excellent schools and the elderly for the moderate climate and breathtaking Monterey coastline.
Why then was this elderly community chosen, despite our population’s median age being 49, over 10 years older than the national average? Because the passengers will be quarantined on government-owned land. This is also why military bases are “go-to” locations for other, more serious cases.
The Pacific Grove coastline is just across the street from where the 24 quarantined Grand Princess cruise line passengers are staying. They will be monitored for the next two weeks as part of the state of California’s plan to contain the spread of the Coronavirus.
Why is it that the military community is always the first to be put at risk? As a military spouse and mother of three, I’m not so much scared of the Coronavirus as I am perplexed.
If military communities are already being asked to sacrifice more than most, don’t we at least deserve concrete facts on how we are being protected instead of attempts to pull at heartstrings?
The military housing areas on Travis Air Force Base and Miramar Naval Air Station are less than a mile away from where exposed citizens are being housed. I can’t imagine what these military families are feeling. As some previously in quarantine leave, new patients arrive. I hope that they are looped in, that they feel taken care of and reassured that their lives are just as important as those they are being asked to support.
While some communities may be better at communication than others, the press release likely caused more panic than reassurance. Given the current climate, words sent out through official channels carry weight. So instead of adding to the hysteria, I emailed the local public officials quoted in the article for clarification.
However, within 24 hours, I did get reassurance from every travel-related company I have ever had an online shopping relationship with that they were on top of COVID-19 and take sanitation seriously.
Shortly thereafter, I finally received an update from my daughter’s elementary school, the only reliable source of information. It seems that clarification from public officials was possible. But instead of hearing from the governor’s office again, our small town’s City Manager set the record straight, or as straight as possible given all this confusion.
According to his release, “the state of California made the determination” to temporarily house 24 exposed passengers (less than two miles from my house). Thankfully, it turns out that he did have good news. The 24 have tested negative for the virus and “are not permitted to leave the confines of their hotel rooms.”
Costco runs feel like hoarding, but they are not. However, you might be a hoarder if you are one of the people who purchased all the paper towels, water and toilet paper.
Slightly relieved, I chuckled when I saw that “Outbreak” with Dustin Hoffman was trending on Netflix. Watching it served as a reminder that Americans don’t like rules or borders. We rebelled against the British. We conquered lands that weren’t our own. We believe rules are made to be broken. I hope these 24 are rule followers who regret our forefathers breaking from England and “displacing” Native Americans.
Unsurprisingly Costco was packed, leaving me either highly exposed or highly prepared. In the hidden back corner of the warehouse, a lady was positioned, not with samples, but with a clipboard and bouncer-like confidence, “we are out of water, paper towels and toilet paper.”
Twenty four hours after the first press release, I’m not scared of death or quarantine. We have Cheerios, bread, shelf-stable milk, charcoal and… champagne, because if I have to stay in the house with my three kids and husband for a month without toilet paper, I’m gonna need it.
The Pentagon is accelerating an acquisition plan to migrate its defense networks to the cloud as part of a sweeping effort to modernize and streamline its data systems and better defend against cyberattacks, a DoD announcement said.
The initiative, launched last Fall by Deputy Defense Secretary Patrick Shanahan, is now grounded in a specific, fast-paced acquisition plan to keep pace with fast-moving technological change.
“DoD is using a tailored acquisition process to acquire a modern enterprise cloud services solution that can support Unclassified, Secret, and Top Secret requirements. Known as the Joint Enterprise Defense Infrastructure (JEDI) Cloud, the planned contracting action will be a full and open competition,” a Pentagon statement said.
The Pentagon has released a Request for Information to industry and is planning an industry day March 2018 as a precursor to the planned contract awards.
Led by a recently established Cloud Executive Steering Group, cloud migration program leaders are now in the analysis and fact-finding phase of this process to determine how many contracts will best meet DoD’s needs, officials said.
The acquisition effort is broken up into two distinct phases, according to DoD developers; phase one includes cloud acquisition and phase two “will work with offices throughout the department to build cloud strategies for requirements related to military operations and intelligence support,” a Pentagon statement said.
“Technologies in areas like data infrastructure and management, cybersecurity and machine learning are changing the character of war. Commercial companies are pioneering technologies in these areas and the pace of innovation is extremely rapid,” Shanahan writes in the memo, released last Fall.
Cloud migration has received much attention in recent years, and this new effort strives to accelerate cloud development and add a specific, measurable structure to an otherwise broad-sweeping or more loosely configured effort. For instance, the Pentagon has emphasized a move toward broader use of Windows 10 in a move to quickly embrace more commercial systems and cloud systems.
However, many of the various acquisition efforts have been stovepiped or, by some estimations, in need of greater integration and interoperability. DOD’s ongoing Joint Information Environment (JIE) and Joint Regional Security Stacks (JRSS) efforts are emerging as efforts to address these challenges.
The Pentagon’s Joint Regional Security Stacks will increasingly use cloud technology and move to more off-the-shelf technology, such as Windows 10, according to senior Pentagon IT officials.
JRSS is on track to reduce the physical footprint of servers and — that it will support cloud technology structures.
JRSS is also engineered to increase security and intrusion detection technologies. The security of the network is centralized into regional architectures instead of locally distributed systems at each military base, post, or camp, according to a previous statement from the Defense Information Systems Agency.
“Deploying JRSS enables the department to inspect data, retrieve threat and malware data on the network and troubleshoot, patch, protect and defend the network,” a DISA statement said.
Shanahan’s new program could bring nearer-term achievable metrics to the ongoing JIE initiative. At the same time, there is a chance it could also help accelerate the ongoing movement toward greater domestic and international data consolidation efforts already underway with JRSS.
A key element to cloud migration, considering that it involves movement toward more virtualization and a decreased hardware footprint, is that emerging software upgrades and programs can quite naturally have a faster and more ubiquitous impact across a range of data systems.
When it comes to data security and resilience against intruders and cyberattacks, the cloud could be described as consisting of a two-fold dynamic. In one sense, data consolidation through cloud architecture can potentially increase risk by lowering the number of entry points for intruders – yet it also affords an occasion to identify patterns across a wide swath of interconnected systems.
Furthermore, cloud technologies can facilitate standardized security protocols so that attempted breaches can be more quickly detected. Along similar lines, JIE proponents explain that although greater interoperability could increase vulnerabilities, various networks can be engineered so they can both share data while also leveraging routers, switches and IP protocol specifics to separate and secure networks as well.
An often-discussed phenomenon seems to inform Shanahan’s push for faster cloud migration, namely that multi-year government developmental programs are, in many instances, generating technical systems which are potentially obsolete by the time they are completed. Commercial innovation, therefore, coupled with an open architecture framework, is intended to allow faster, wide-sweeping upgrades more consistent with the most current and impactful innovations.
“I am directing aggressive steps to establish a culture of experimentation, adaptation, and risk-taking,” Shanahan’s memo states.
The integrated DoD effort is closely aligned with various US fast-moving cloud efforts among the US military services.
Army cloud migration
DISA and the Army are working with industry to extend commercial cloud technology to mobile devices as part of a broad effort to both improve access to data and provide security for forces on the move.
Drawing upon hardened commercial cloud networking technology, soldiers, sailors or airmen using smartphones and tablets will have secure access to classified networks. By extension, a commercial cloud can enable secure networking such that smartphone applications themselves can be better protected, DISA leaders have explained.
As part of this broadly-scoped DOD effort, industry giants like Microsoft are working with the services to extend cloud-based security and connectivity to mobile devices.
The Army’s Unified Capabilities (UC) program, for example, is an example of how this strategy can be implemented.
The UC effort is based on an Army-ATT collaborative effort to leverage the commercial cloud to improve networking interoperability using voice, video, screen sharing and chat functions for one million service business leaders on both classified and unclassified networks.
“Unified Capabilities is one of the first commercial cloud-based solutions that will be delivered across the Army Enterprise,” Sergio Alvarez, product lead, Enterprise Content Collaboration and Messaging, told Warrior Maven in an interview last Fall.
By using a commercial cloud, users will be able to draw upon software to access voice services from any Army-approved end user device — desktops, laptops, tablet computers, and smartphones.
Forward-deployed or dismounted soldiers will have an ability to connect and share combat-relevant data from farther distances, potentially beyond an otherwise limited network.
“There are many benefits to COTS — including saving money on initial investment, meeting IT requirements while avoiding costs, lowering maintenance investments and enabling cost-effective new upgrades,” an Army statement said.
The service will also provide video conferences and desktop sharing services, as well as multi-user chat functions.
As is the case with desktop systems, the strategy for this kind of cloud execution is often described in terms of centralized control – decentralized execution.
When it comes to more traditional fixed locations, increased cloud networking and security at a central server location brings the added benefit of helping implementation and security for the ongoing Joint Regional Security Stacks (JRSS) effort.
Navy analytics strategy
Fall 2017, the Navy unveiled a data analytics strategy document designed to accelerate IT modernization, consolidation of information, innovation and efforts to keep pace with commercial technological progress.
The “Navy Strategy for Data and Analytics Optimization,” which incorporates faster network cloud migration, calls for cloud migration and rapid transformation of training, concepts, and policies designed to make data analytics faster and more efficient.
Recognizing that the pace of technological change is often faster within industry and commercial enterprises, the strategy is woven around the premise that new solutions, software updates or improvements in operating systems and data analysis often emerge quickly.
With this in mind, the strategy also heavily emphasizes a growing need to look for open source solutions for expediting IT acquisition.
When embracing commercial innovation might not make sense for a government developmental IT effort, the strategy calls for increased collaboration with academia and industry.
“It is paramount that we become able to adapt faster to data-driven innovations, create new innovations and deploy those innovations,” the strategy states.
The text of the strategy articulates a few goals, such as an ability to “predict and inventory the right data analytics to meet the demands of DON (Department of the Navy) data consumers and decision makers — and — deploy and operate innovative solutions with minimal time to market.”
As a way to accelerate the key aims of the new strategic effort, the Navy’s Chief Information Officer is establishing a new Data and Analytics Consortium to define emerging policies, share lessons learned and help establish best practices.
Coding boot camps are programs that teach programming skills. Typically, these boot camps are short (12 weeks to 7 months), often intense (sometimes requiring 90 hours/week), and usually designed to teach beginners enough so that they can become professional junior software developers.
And, the demand for their graduates is robust and growing. According to Dave Molina, a former U.S. Army captain, and the founder and executive director of Operation Code, a non-profit online, open source coding program for active duty military, veterans, and their families, “There are over 200,000 computing jobs open annually in the U.S., with 30,000 of those jobs filled by computer science graduates; however, that number is expected to rise to 1.2 million by 2020. Meanwhile, we have 250,000 U.S. military personnel that exit the service annually, many of whom possess the discipline and aptitude to fill those jobs, if they had some training in computer coding skills.”
These are generally good paying jobs. Rod Levy, the founder and executive director of Code Platoon, a non-profit coding camp in Chicago for veterans, states that “starting salaries for graduates coming right out of the boot camp are about $65,000, rising to about $100,000 after five years of experience. Placement rates for graduates are high.”
So, why are coding boot camps a good option for veterans?
Levy lists several reasons: “As we know, veterans often struggle ‘translating’ their military experience to a civilian audience. Coding boot camps solve this problem by giving veterans job-ready skills that are well understood in the job marketplace”, he said.
“Even more important”, Levy added, “successful software developers typically need to work well in teams, demonstrate grit and resilience, and have to be able to systematically problem-solve. These characteristics are often found in veterans.”
Molina supports this view. He said, “Military veterans have the right set of skills to become programmers. Technical expertise, emotional resilience, psychological persistence, and teamwork—these are the qualities found in our best and brightest and they are the qualities of the best programmers.”
There are coding boot camps to serve about every veteran’s needs. These various coding boot camps are distinguished by the following characteristics:
Level of intensity. “Immersive” is around 60 – 80 hours a week; “full-time” can be 30 to 70 hours a week; “part-time” is typically 10 to 30 hours week.
In-person or remote. In-person means you spend the majority of the training on-site, with instructors and fellow students on premises. Remote means you do the training on your computer at home regardless of location.
Internships/Job Placement. This one is obvious. Coding boot camps that offer internships and/or have high job placement rates for entry-level software developers should be given serious consideration.
Population focus. A few coding boot camps serve specific populations and look to tailor their programs to those populations, as well as creating a “safe” space where members of those populations may feel more comfortable. There are coding boot camps just for women, minorities and veterans, to name a few. Obviously, veterans should choose a boot camp that caters to their specific needs, when possible, and leverage their New GI Bill wherever possible.
Given all of these various aspects of coding boot camps, what should a veteran look for in choosing a coding boot camp? At a minimum, veterans should consider the following items when selecting a boot camp:
Different boot camps are meant to serve different interests. Remote online boot camps, like Thinkful.com, are much more convenient than in-person boot camps, such as Code Platoon, where you have to move to Chicago for a few months. The trade-off for that convenience is that it may be very hard to stay motivated, understand the material thoroughly and ask your peers and instructors questions. In-person boot camps, on the other hand, offer the immediate feedback and support that can be missing in remote programs, although they may not be located near when the veteran lives or works. Consequently, they may be much more expensive to attend.
If your goal is to learn skills for a new career in programming, look for a program that will put you through at least roughly 1,000 hours of coding/instruction, at an absolute minimum. Whether this is in an immersive 12-week program at 80 hours a week, or a year-long program at 20 hours a week is up to you; but 1,000 hours of focused, directed learning in programming is the bare minimum needed to become a competent programmer.
The choice of technology stack is often a source of much discussion, with trade-offs discussed around the number of jobs versus the learning curve needed for various languages. In the end, there are many jobs in each of the languages/stacks that are being taught. Always look for a coding boot camp where the programming stack is in substantial demand, with many jobs available immediately upon graduation.
Cost is an important consideration that the veteran needs to keep in mind in selecting the right code camp to meet their needs. Most coding schools offer scholarships to veterans to help to defray the costs. At Code Platoon, for instance, the tuition is $13,000 for the full program. However, all veterans accepted into the program receive a scholarship of $10,500, bringing the total cost of the program to the veteran to $2,500. Travel expenses to and from Chicago, and living expenses while attending the program in Chicago, are extra.
There is no charge for Operation Code programs and services for active duty military, National Guard and reserve troops, veterans, and their spouses. Information on conference scholarships can be found on the Operation Code website: https://operationcode.org/scholarships.
What about using the Post-9/11 GI Bill to attend one of these coding camps? Currently, 5 code schools across the country accept the New GI Bill: Sabio (Los Angeles), Code Fellows (Seattle), Galvanize, RefactorU and SkillDistillery (Colorado).
Most coding schools, however, are not eligible to receive GI Bill funds. Code Platoon hopes to be eligible for GI Bill funding within a year. Each state has its own authorizing agency that approves programs for participation in the New GI Bill, with two years of school operating experience generally required. More information on this subject can be found on the Operation Code website at https://operationcode.org/code_schools.
Internships, mentoring partners, and job placement are all important considerations for the veteran in selecting a coding camp. Code Platoon, for instance, pairs its students with two industry partners, who work with the student during the entire program.
Operation Code offers its military veteran members ongoing software mentorship through its Software Mentor Protege Program, where its members get help with their code, pairing online in a peer-to-peer learning environment with professional software developers for lifelong learning and understanding in an inclusive and nurturing environment.
And, most coding schools help their graduates with job placement assistance, upon completion of their programs.
It is obvious that veterans need to consider a lot of things before applying to a coding camp.
The different types of programs, whether on-site or online, need to be determined. The reputation of the coding camp, the success of its graduates, costs, potential use of the GI Bill, scholarships, internships, mentoring and job placement assistance all need to be carefully researched.
But, one thing is perfectly clear about obtaining the skills necessary to be a successful computer programmer. It offers the opportunity to have a lasting career in a growing, well-compensated field that’s going to change the world.
And, what could be better than that for veterans and their families?
Watch this introduction to Code Platoon:
And now watch this introduction to Operation Code:
Paul Dillon is the head of Dillon Consulting Services, LLC, a firm that specializes in serving the veteran community with offices in Durham and Chicago. For more visit his website here.
North Korean leader Kim Jong Un reportedly fears being assassinated on his way to Singapore to meet with President Donald Trump, a trip that will take him further outside of his country than he’s been since taking power in 2011.
Kim has long feared assassination, even within his own country. But as the leader of a country that frequently threatens the US with nuclear war, getting on a plane and flying across international airspace to a neutral country provides him even less security.
But North Korea has virtually no air force, and will place its leader on a civilian airliner in a region stacked with surface-to-air threats and a large US military aviation presence. As the downing of flight MH-17 proved, airline crashes can be difficult to attribute, and can be denied.
North Korea maintains that the US has a “hostile policy” towards it and think it would attempt regime change given the chance.
NATICK, Mass. (May 30, 2013) — If you’re familiar with the phrase “rock or something,” then you’ve probably used a Flameless Ration Heater to warm up a Meal, Ready-to-Eat.
To this day, the phrase remains part of a pictogram on the package of the heater, known as the FRH, which was developed at Natick Soldier Research, Development and Engineering Center’s Department of Defense Combat Feeding Directorate and is celebrating its 20th anniversary in 2013. It refers to directions that advise warfighters to place the FRH at an angle when heating up a Meal, Ready-to-Eat, commonly known as an MRE.
“The term ‘rock or something’ has now reached cult status,” said Lauren Oleksyk, team leader of the Food Processing, Engineering and Technology Team at Combat Feeding. “It’s just taken on a life of its own.”
Oleksyk was there at the beginning with colleagues Bob Trottier and now-retired Don Pickard when the FRH and that memorable phrase were born in 1993.
“We were designing the FRH directions and wanted to show an object to rest the heater on,” Oleksyk recalled. “(Don) said, ‘I don’t know. Let’s make it a rock or something. So we wrote ‘rock or something’ on the object, kind of as a joke.”
The joke has legs. As Oleksyk pointed out, there now are T-shirts and other items for sale that bear those words. “Rock or something” even has its own Facebook page.
Introduced to the heater years ago, famed chef Julia Child insisted on following the package directions and activating it by herself. With no rock handy, she decided to employ a wine glass stem.
“Which is so classic Julia,” Oleksyk said, laughing. “So there have been many things other than the rock or something that have been used. There are many, many Soldiers over the years that have their own personal joke about what they might use in place of a rock.”
The FRH is no joke, however. Adding an ounce and a half of water to the magnesium-iron alloy and sodium in the heater will raise the temperature of an eight-ounce MRE entrée by 100 degrees in about 10 minutes.
“Some of the challenges were keeping it lightweight and low volume, and not requiring a lot to activate it,” Oleksyk said.
The heater’s arrival gave warfighters the option of a hot meal wherever they went and whenever they wanted.
“I’ve heard more feedback on this item than any other item I’ve ever worked on in my career here,” said Oleksyk, who has been at Natick nearly 30 years. “They’re so grateful to have this heater in the MRE. It’s almost always used whenever they have 10 minutes to sit down for lunch.”
Prior to the FRH, warfighters used Trioxane fuel bars with canteen cups and cup stands to heat their MRE entrees. As Oleksyk pointed out, the fuel bars couldn’t be packed alongside food in the MRE package.
“So if the fuel bar and the MRE didn’t marry up in the field,” said Oleksyk, “they really had no way to have a hot meal.”
The FRH has remained essentially the same over the past two decades because, as Oleksyk put it, “it’s tough to find a better chemistry that’s lighter in weight, lower in volume and that heats as well.” A larger version has been developed, however.
“We’ve expanded it to a group ration,” Oleksyk said. “So now we have a larger heater that is used to heat the Unitized Group Ration-Express. We call that ration a ‘kitchen in a carton.’ It serves 18 Soldiers.”
The next-generation MRE heater is being tested now, and it will eliminate the need to use one of the most precious commodities in the field.
“The next version of this is a waterless version,” Oleksyk said. “It’s an air-activated heater, so you wouldn’t have to add any water to activate it at all, but that’s still in development and will have to perform better than the FRH overall if it’s ever to replace it.”
Oleksyk remembered sitting on a mountain summit one time during a weekend hike with friends. Suddenly, she heard laughter behind her.
“I hear a guy — sure enough, he says, ‘Yeah, I need a rock or something,'” said Oleksyk, who turned to see him wearing fatigues, holding a Flameless Ration Heater, and telling his buddies how great it was.
“So it’s far reaching,” Oleksyk said. “It really had an impact on the warfighter.”
During the thick of the 1991 Gulf War, anti-Iraqi coalition forces were mounting some 2,000 air sorties against Iraqi targets in the Middle East. In retaliation, Iraqi dictator Saddam Hussein fired scud missiles at Israel.
The U.S. obviously wanted to keep that from happening.
Now, if you’ve been keeping track, the Israelis don’t take kindly to threats. Or attacks. Especially scud missile attacks. Over the course of 17 days, Iraq fired 39 Scud Missiles at the highly populated coastal cities of Tel Aviv and Haifa. An estimated 147 Israelis were killed.
To give you an idea of how Israel tends to retaliate to this sort of thing, the 1972 Munich Olympics attack killed 11 Israelis. In response, Israeli intelligence – the Mossad – launched Operation (no joke) WRATH OF GOD. They hunted down every Arab plotter of the Munich massacre and killed them. For 20 years.
Only the Mossad wasn’t about to wait 20 years to ice Saddam.
In 1992, they came up with Operation Bramble Bush, their plan to assassinate the Iraqi dictator. One agent, Nadav Zeevi, was tasked to find a pattern in Saddam’s movements. Then, the Israelis would track the dictator to where he would spend a longer amount of time. Once Saddam settled into a location, the Israelis would have their revenge.
But instead of an air strike, Israel wanted to mount a “glamorous” commando raid, using Sayeret Matkal special operators in a kill, definitely not capture mission. One version of the proposed raid had commandos launching missiles at Saddam during a funeral.
Israel mounted crazy, balls-out commando raids in the past. Their legendary raid on Entebbe featured a caravan of cars designed to resemble Ugandan dictator Idi Amin’s entourage. They flew into Uganda, landed at the airport, drove off to the terminal, killed every terrorist, and then took their hostages to waiting planes in a hail of gunfire.
Unfortunately for history, they had to abort the idea. It was difficult to track Saddam because of the sheer number of his body doubles. Agent Zeevi even thought to just watch the dictator’s mistresses, but the body doubles also fooled the mistresses.
To make matters worse, a dry run in Israel’s Negev Desert went horribly awry. Troops training for the raid in 1992 accidentally fired a live missile, killing five IDF soldiers. The accident led to officials canceling the operation.
They thought they might try again in 1999, waiting until Saddam was in a designated location. 40 operators divided into two groups; one within 200 meters of the location, painting the location as a target, the other six miles away, firing three Midras missiles on that target.
That plan was scrapped because the Americans and British were bombing Iraq anyway. And in the end, they didn’t have to assassinate the dictator. But let their effort be a lesson: just leave Israel alone.
The Department of Homeland Security as well as the FBI are investigating what is being called possibly the largest scale cyber-attack ever, according to Aljazeera.
On the morning of Oct. 21 the first wave of the cyber-attack began on infrastructure company Dyn, based in New Hampshire. The company is responsible for connecting individual internet users to websites by routing them through a series of unique Internet Protocol numbers. CNN reported that the company monitors more than 150 websites.
Friday’s cyber-attack used botnets — or devices connected to the internet that have been infected with malware — to launch a distributed denial of service attack that impacted companies like CNN, the New York Times, Twitter, PayPal, and others, Aljazeera reported.
USA Today explained that denial of service attacks turn unsuspecting devices into weapons by downloading malware to unprotected devices that allows them to be controlled by hackers. Hackers then use these weaponized botnets to overload the traffic to websites by sending hundreds of thousands of requests through the IP address, giving a false signal that the website is too busy to accept normal requests for access to the site.
While the cyber-attack was mostly annoying for internet users, it ultimately impacted the U.S. on a much larger scale, denying the 77 companies affected by the attack up to $110 million in revenue, according to Dyn CEO John Van Siclen.
The greater security concern is the access to individual devices that is granted because the devices were left with their default password intact, according to The Guardian. The devices used in Friday’s cyber-attack were all traced back to one company, the Chinese tech company XiongMai Technologies, which makes, ironically, security cameras.
The cyber-attack was felt as far away as Europe, and across the U.S. Wikileaks suggested in a tweet late Oct. 21 that its supporters were responsible for the breach, sending out a picture of the most affected areas in the U.S.
Military members can help protect their devices from being used as weapons by following their training on cyber awareness. Consistently changing passwords, logging out of accounts when on public computers, and protecting personally identifying information are recommended.