The Veterans Affairs Make the Connection team is looking for veterans who want to share their stories about seeking support for mental health challenges and take part in a national mental health campaign.
The same obstacles that may, at first, seem insurmountable to an individual are much less daunting when faced by a team. More than 500 veterans and military family members have already stepped up to be that team for their brothers and sisters by sharing their stories in videos on MakeTheConnection.net, a mental health website from the U.S. Department of Veterans Affairs.
Make the Connection helps veterans and their loved ones realize that reaching out for support and seeking mental health treatment is a sign of strength, and thousands of veterans have found help to overcome their challenges.
The Make the Connection team will be conducting more on-camera interviews in Los Angeles on Friday, Feb. 23, and Saturday, Feb. 24, and is looking for veterans who want to share their stories about seeking help and overcoming mental health and other challenges. Veterans who participate in the video shoot will receive a stipend to offset their expenses for time and travel. When the videos are posted on the Make the Connection website, only the first names of participants are used.
Since its launch six years ago, the Make the Connection campaign has spread positive stories about veteran mental health via Facebook, Instagram, and YouTube. Veterans featured on the website and in social media have served across all branches of service in every U.S. conflict, from WWII to today. They also represent the full diversity of the military community. Each veteran has coped with conditions, such as addiction, anxiety, depression, serious mental illness, PTSD, and the effects of military sexual trauma and traumatic brain injury.
Veterans who want to tell their stories to help fellow veterans like them can email their name, phone number, and email address to firstname.lastname@example.org or call our outreach team directly at 1-323-813-1426.
A bipartisan group of US lawmakers unveiled legislation on Oct. 4 that would overhaul aspects of the National Security Agency’s warrantless internet surveillance program in an effort to install additional privacy protections.
The bill, which will be formally introduced as soon as Oct. 5, is likely to revive debate in Washington over the balance between security and privacy, amid concerns among some lawmakers in both parties that the US government may be too eager to spy on its own citizens.
The legislation, written by the House Judiciary Committee, is seen by civil liberties groups as the best chance in Congress to reform the law, known as Section 702 of the Foreign Intelligence Surveillance Act, before its expiration on December 31.
Senior US intelligence officials consider Section 702 to be among the most vital tools they have to thwart threats to national security and American allies.
It allows US intelligence agencies to eavesdrop on and store vast amounts of digital communications from foreign suspects living outside the United States.
But the program, classified details of which were exposed in 2013 by former NSA contractor Edward Snowden, also incidentally scoops up communications of Americans, including those with targets living overseas. Those communications can then be subject to searches without a warrant by the Federal Bureau of Investigation.
A discussion draft of the legislation, a copy of which was seen by Reuters, partially restricts the FBI’s ability to access American data collected under Section 702 by requiring the agency to obtain a warrant when seeking evidence of a crime.
That limit would not apply, however, to requests of data that involve counterterrorism or counterespionage.
The narrower restriction on what some have called a “backdoor search loophole” has disappointed some civil liberties groups. Several organizations sent a letter this week saying they would not support legislation that did not require a warrant for all queries of American data collected under Section 702.
Renewal for six years
The legislation would also renew the program for six years and codify the National Security Agency’s decision earlier this year to halt the collection of communications that merely mentioned a foreign intelligence target. But that codification would end in six years as well, meaning NSA could potentially resume the activity in 2023.
The spy agency has said it lost some operational capability by ending so-called “about” collection due to privacy compliance issues and has lobbied against a law that would make its termination permanent.
Republican senators introduced a bill earlier this year to renew Section 702 without changes and make it permanent, a position backed by the White House and intelligence agencies.
But that effort is expected to face major resistance in the House, where an influential conservative bloc of Republicans earlier this year said it opposed renewal unless major changes were made, reflecting disagreement within the majority party.
Separately, Senators John Cornyn of Texas, the No. 2 Republican in the chamber, and Democratic Senator Dianne Feinstein of California are working on Section 702 legislation that may also be introduced this week and include fewer reforms.
Democratic Senator Ron Wyden of Oregon and Republican Senator Rand Paul of Kentucky are also planning to introduce a bill that would require a warrant for any query of Section 702 involving data belonging to an American.
When retired U.S. Marine Willis “Bill” Hansen was shipped off to the Vietnam War, he took his sea-bag and a library book…which traveled with him for 52 years.
Hansen joined the Marine Corps in 1964 as an unassigned infantryman and was later attached to a battalion in Okinawa, Japan. Although Hansen deployed to Vietnam as a machine gunner, he was provided the opportunity to work in recon through the length of the war.
He held on to the book The Kimono Mind by Bernard Rudofsky, during his entire 13-month deployment in Vietnam and never got around to returning it to the base library.
In an interview, he states, “When I first got to the island, I wanted to learn a little bit about the culture and where I was staying. So I checked out a book from the library that I figured would give me a little insight into the culture. I intended to return the book, but it slipped my mind.”
Going full circle, Hansen’s son, Lt. Col. Richard Hansen, who used to dress up in his father’s recon uniforms as a child, is now the commander of the same unit in Okinawa that Hansen served under in the Vietnam War.
The coincidence of it all renders a fateful moment. Hansen finally got the chance to return the book when he was invited to the 3rd Reconnaissance Marine Corps birthday ball in Okinawa. He was welcomed by the current staff of the library and relinquished his possession of his literary companion to their shelves (fee-free), where it will stay, until someone else checks it out and flips through its pages, oblivious to its journey through time.
A confrontation between Russian and Ukrainian ships in the Black Sea in November 2018 ended with Ukraine’s ships seized and its sailors jailed.
It was the first direct clash between Moscow and Kiev in years, and it stoked tensions that have been elevated for years, especially after Russia intervened in Ukraine in 2014 and seized the Crimean Peninsula and then backed separatist movements along Ukraine’s eastern border.
The Nov. 25, 2018 clash took place in the Kerch Strait, which divides Crimea and mainland Russia and connects the Black Sea to the Sea of Azov. Photos show Russia appears to have struck one of the Ukrainian ships with a heavy weapon, such as a 30mm gun or missile.
Since claiming Crimea, Russia has taken a more aggressive stance toward the Sea of Azov, declaring invalid a 2003 agreement in which Moscow and Kiev agreed to share the body of water.
In 2015, Russia began construction of a bridge over the Kerch Strait. The sea is already the world’s shallowest, no deeper than 50 feet, and the height of the bridge further restricted the size of ships that could pass through.
Russia has also interfered with Ukrainian shipping in the area and at times closed the strait completely — all of which is particularly challenging for Ukraine, which has major ports on the Sea of Azov.
Ukraine and Russia have both pursued a military buildup in the area, but Russia has more forces and their activity has been more substantial.
US Navy guided-missile destroyer USS Ross, background, conducts an underway exercise with the Ukrainian navy.
Moscow’s moves in the Black Sea region are of a piece of with what it’s been doing throughout Eastern Europe amid heightened tensions with NATO.
‘An arc of A2/AD’
Since 2014, Russia has “built up tremendous amounts of capability” in Crimea, said Omar Lamrani, a senior military analyst at geopolitical-analysis firm Stratfor.
Russian forces in the area now amount to about 30,000 troops and more than 100 combat aircraft, up from dozens that were in the area prior to the takeover, Lamrani said. (In May 2018, 17 Russian planes swarmed a British warship sailing just 30 miles from Crimea.)
“They have now three battalions of S-400s, plus other air-defense systems, like the S-300 [and the] Buk M2,” Lamrani said. Another division of S-400 missiles is on its way to Crimea, where it will be the fourth on duty, according to Russian state media.
“They installed a number of coastal missile-defense batteries” firing weapons like Bastion and Bal cruise missiles, which can strike land and sea targets, Lamrani said. Russian state media also said this week that more Bal and other anti-ship missiles were headed to the Crimean city of Kerch, which overlooks the strait of the same name.
“They have some Iskander missiles they rotate through the area, lots of new artillery systems, lots of new armor,” Lamrani added, referring to Russian short-range, nuclear-capable cruise missiles. “They didn’t really have main battle tanks there before 2014. Now they do.”
Russia sees Crimea as a stronghold from which to pressure Ukraine and assert control over a broader swath of the Black Sea, Lamrani said.
Weapons like the S-400 and coastal-defense systems can be employed as a part of anti-access/area-denial, or A2/AD, strategy, and their presence in Crimea and elsewhere along Russia’s eastern frontiers has garnered attention from NATO.
Russian “A2/AD capability [runs] from the high north through Kaliningrad, down to Crimea and all the way down into [Russia’s] base at Tartus in Syria,” Ben Hodges, who commanded the US Army in Europe before retiring at the end of 2017, told Business Insider at the beginning of November 2018.
The S-400, considered Russia’s most advanced air-defense system, is also deployed in Kaliningrad on the Baltic Sea and near Latakia on the Syrian coast. The S-300, which is older but still highly capable, has been deployed in the region, including in the breakaway Georgian province of Abkhazia, which borders the Black Sea.
“There are varying degrees of capabilities” at each of those sites, Hodges added, “but the one in Kaliningrad and the one in Crimea are the most substantial, with air- and missile-defense and anti-ship missiles and several thousands of troops” from Russia’s army, navy, and air force. “That’s part of creating an arc of A2/AD, if you will.”
Russia S-400 air-defense systems in Syria.
(Russian Defense Ministry)
Russian moves around the Black Sea were particularly worrisome, Hodges said, comparing the seizure of Crimea and subsequent territorial claims in the Black Sea to China’s claims and island construction in the South China Sea.
Some of the NATO members bordering the sea, like Romania and Bulgaria, don’t have a major naval presence there, but Turkey would likely prevent Russia from having free reign in the sea.
With the vantage point provided by Crimea, Russian combat aircraft and land-based weapons systems like the S-400 and Bal missiles can extend their reach hundreds of miles into and over the Black Sea.
“They can effectively support their navy with an umbrella defense of surface-to-air missiles and anti-ship missile systems that can keep NATO away in case of any threat,” Lamrani said.
A2/AD systems could provide similar defense in a place like Kaliningrad, which has Russia’s only year-round, ice-free Baltic Sea port and is close to St. Petersburg, Russia’s second-largest city. In western Syria, where Russian S-400 systems have already been deployed, US-led coalition forces have worked hard to avoid Russian airspace.
Standing NATO Maritime Group Two (SNMG2) flagship HMS Duncan, arrives to the harbor in Constanta, Romania, Feb. 2, 2018.
(NATO / CPO FRA C.Valverde)
‘Alive to these challenges’
Russian forces are outstripped by NATO as a whole, and an all-out Russian attack on another country is considered unlikely.
But concern has grown that Russian A2/AD in areas like eastern Syria or the Baltic and Black seas could create layered defensive bubbles and limit NATO’s freedom of movement — especially in an engagement below the threshold of war.
In the decades since the Cold War, NATO members also shifted their attention away from a potential conflict with a peer or near-peer foe, focusing instead on smaller-scale operations like counterterrorism. (The US and others have started to reverse this shift.)
“There’s been decline in … investments rather in this type of warfare, as NATO attention has shifted to other priorities,” Lamrani said of A2/AD.
But, he noted, Russia has pursued the mismatch to compensate for a weakness.
“Russia is stronger than NATO in air defenses and stronger than NATO in land-based anti-ship missile systems, as well as anti-missile systems in general,” Lamrani said. “That came out of Russia trying to mitigate its disadvantages in other areas. For instance, NATO naval forces are much stronger than Russia, and NATO air power as a whole is much stronger than Russia.”
Advanced stealth platforms, like the US-made F-35 Joint Strike Fighter, are seen as potential counters to A2/AD systems. And other assets, like the Navy’s EA-18G Growler electronic-attack aircraft, could help thwart them.
But it’s not clear those resources are available in the numbers needed to do so, nor is it likely such an engagement could be conducted without heavy losses.
Nevertheless, while Russia may find an advantage within the specific area of A2/AD, Lamrani said, “that doesn’t mean that NATO hasn’t been developing its own capabilities in other areas [and it] doesn’t mean that NATO hasn’t been thinking about this type of stuff.”
“Let’s just say the alliance is alive to these challenges, and it … will be prepared to use all the different things that would be required,” Hodges said in early November, without elaborating. “This is not something … the alliance has not looked at very closely.”
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
North Korea’s state-sponsored news agency issued a rare press release on Feb. 12, in which the regime’s leader, Kim Jong-un, was said to have “expressed satisfaction” after the country’s delegation arrived back from a trip to the Winter Olympics in South Korea.
Korean Central News Agency (KCNA), the propaganda outlet for the regime, claimed that Kim Jong-un said South Korea’s “specially prioritized” efforts to accommodate North Korea’s delegates were “very impressive,” according to a translation from KCNA Watch.
North Korea sent a delegation that included Kim Jong-un’s sister and head of its propaganda department, Kim Yo-jong, and the nominal head of state, Kim Yong-nam, to South Korea ahead of the Olympic Games in Pyeongchang.
After North Korea agreed in January 2017, it took several steps that, at least on the surface, appeared to be an effort to thaw its relationship with South Korea. The regime sent Kim Yo-jong there, the first time the regime’s ruling family visited the South in decades, as cameras fawned over images of her smiling with South Korean president Moon Jae-in.
During this trip, Kim Yo-jong invited Moon to visit North Korea. A potential visit by Moon would be the first meeting of Korean leaders in Pyongyang since then-South Korean President Roh Moo-hyun met with North Korean leader Kim Jong-il for an inter-Korean summit in 2007.
North Korea’s recent statement and actions are a stark departure from its usual, bellicose rhetoric, and that has prompted White House officials and foreign-policy experts to be cautious about the overtures.
Vice President Mike Pence, who reportedly floated the possibility of diplomatic engagement with North Korea, said on Feb. 12 that President Donald Trump’s campaign of “maximum pressure” would continue.
“Despite potential talks, and irrespective of if they happen w/USA or S. Korea, new strong sanctions are coming very soon and the maximum pressure campaign will only intensify until North Korea abandons its nuclear program,” Pence tweeted. “All our allies agree!”
And despite being seen cheering for the joint-Korean Winter Olympics team and having luncheons with the North Korean delegation, Moon — who has been accused of being swayed by North Korea’s “charm offensive” — has given some indication that he remains wary of North Korea’s motives.
Instead of explicitly agreeing to North Korea’s invitation to Pyongyang, Moon responded by suggesting the two countries “accomplish this by creating the right conditions,” and encouraged the North to “actively pursue” talks with the U.S.
Moon is also believed to have signaled his commitment to exerting pressure on North Korea. According to Pence on Feb. 10, “both of us reiterated to each other tonight that we will continue to stand strong and work in a coordinated way to bring maximum economic and diplomatic pressure to bear on North Korea.”
It’s not every day that the mild-mannered janitor at your school turns out to be a bad ass Medal of Honor recipient. But that was exactly the case for thousands of cadets at the United States Air Force Academy.
The story starts in Italy in 1943. Pvt. William Crawford was serving as a scout in I Company, 3rd Battalion, 142nd Infantry Regiment, 36th Infantry Division, as it fought its way up the Italian peninsula.
After landing at Salerno, Crawford’s unit was advancing against stiff German resistance. Just four days after the landings, I Company launched an attack against Hill 424. Once his platoon gained the crest, they became pinned down by intense German machine gun fire.
Ignoring the hail of bullets, Crawford advanced on the German position and silenced it with a hand grenade.
When his platoon was once again pinned down, Crawford didn’t hesitate to charge forward, this time to destroy two machine gun emplacements.
He first attacked the machine gun to the left and destroyed it and the crew with a hand grenade. He then worked his way to the next machine gun under intense fire. When he was in range he again tossed a hand grenade that sent the crew running.
Later during the intense fighting in Italy, the Germans captured Crawford. His status was listed as missing, presumed dead.
When his Medal of Honor was approved in 1944, it was presented to his father, posthumously.
However, Crawford had in fact survived and in 1945 was liberated from a German POW camp by advancing Allied forces.
Crawford was discharged after the war and returned home before marrying in 1946. He decided to reenlist in 1947 and served another 20 years before retiring with the rank of Master Sergeant in 1967.
His next career move would prove fateful. He took a position as a janitor at the Air Force Academy in his home state of Colorado.
Despite his courage in combat, Crawford had always been rather mild-mannered and didn’t care much to talk about himself. As such, the cadets at the Academy paid him no mind, assuming he was just any other janitor.
Crawford carried on his duties until 1976 when one cadet, James Moschgat, noticed a picture in a history book about World War II.
Moschgat couldn’t believe what he was seeing and showed the picture to his roommate saying, “I think Bill our janitor is a recipient of the Medal of Honor.”
The next day Moschgat and his roommate confronted Crawford to ask if it was truly him that was talked about in the book. According to Moschgat’s account Crawford simply looked at the picture and replied, “Yep, that’s me.”
Astonished by what they had just learned, they quickly asked why he had never mentioned it before. Crawford’s reply once again showed his humility. He simply said, “That was one day in my life and it happened a long time ago.”
Word quickly spread around campus that there was a Medal of Honor recipient in their midst.
The story could have easily ended here with a known recipient of the Medal of Honor working as a janitor at the Air Force Academy. Most people would have never heard the story.
However, the cadets weren’t done.
They eventually found out that because of the circumstances, mainly that Crawford was a POW at the time, he had never had a formal ceremony to present him with his medal.
So, when the Class of 1984 reached graduation they invited Crawford as their special guest. And they had a special surprise in store for him. President Ronald Reagan was giving the commencement speech at the Academy that year.
Even the most innocuous data posted to a social media feed can be married up with other publicly available information to provide online criminals the tools they need to exploit members of the military or general public, an Army special agent said.
Special Agent Deric Palmer, program manager for the Digital Personal Protection Program, part of the Major Cybercrime Unit at the U.S. Army Criminal Investigation Command, explained how those who aren’t careful or aren’t paying attention can unwittingly provide scammers and other online criminals all the information they need to exploit them.
Social media accounts, Palmer said, serve as fertile ground for digging up the kinds of information that can be used to impersonate someone, steal identities or break into other online accounts, such as banking or insurance.
A Facebook page, for example, might contain current and past physical addresses where a person has lived, phone numbers, email addresses, names of pets, significant events such as birthdays and anniversaries, hobbies and other interests. Just browsing a Facebook page, Palmer said, he can figure out your favorite music, books, TV shows, political and religious leanings.
All that, he said, serves as “an attack vector” that an unscrupulous person can use to communicate with users further and gain their trust. Additional communications can bring out even more details that might later be used to break into online accounts or exploit users in other ways. Some social media users, Palmer added, even volunteer critical information that could be used to access their online financial accounts that they’d never divulge if they were asked by a stranger.
Some online memes, he noted, pose as games that get users to volunteer information that, coupled with other easily obtainable information, can be used to exploit them. A quick search online reveals a simple graphic meme that purportedly allows users to choose “your new cat name” and then post the results, along with the meme itself, on their own social media feed.
For the “cat name” meme, users would use the last digit of their phone number as a selector for any of nine name prefixes, their zodiac sign to choose from a list of 12 middle names, and their favorite color to choose from a list of eight potential last names.
A user might end up with “Count Sassy Pants” as a silly name for their cat. When they post that on their social media feed, along with the meme image itself, would-be criminals will know their phone number ends in 8, they were born in either August or September, and that their favorite color is yellow. Coupled with data already on their social media feed, and with data that can be obtained from data brokers, the information makes it easier to exploit users, Palmer explained.
Image memes such as this one ask users to construct and share on their social media feeds new, “fun” information that is constructed from their personal information.
Military personnel also are candidates to be impersonated online — malicious users might opt to use imagery of real-world service members available online to exploit other users. The U.S. military is one of the most trusted institutions in the nation, and online criminals, Palmer said, take advantage of that.
“The U.S. military is viewed as a prestigious club … It’s an indicator of prestige,” Palmer said. “It’s instant respect. If I can pretend to be a U.S. general, unwitting people will respect me immediately.”
With that respect, he said, a criminal can exploit other users while pretending to be a member of the U.S. military. Palmer’s advice to service members: don’t post your picture in uniform with the name tape visible. “It immediately makes you a target,” the special agent said.
Palmer offered some tips to avoid being scammed:
Immediate red flag! Be suspicious if you are asked for money or a wire transfer to pay for a purported service member’s transportation, medical bills, communication fees or marriage-processing charges.
Be suspicious if the person with whom you are corresponding wants you to mail anything to a foreign country.
Be aware that military members at any duty location or in a combat zone have access to mail, cyber cafes, Skype and other means of communicating with their families, and they have access to medical and dental treatment.
The military will ensure that family members are notified should a service member is injured.
Insist on a “proof of life.” The scammers will not video chat with you, because they know you will catch them in their lie.
Trust your instincts! If it seems too good to be true, it probably is.
The special agent also provided eight points for better security online, and to make users less likely to be victimized by online criminals:
Permanently close old, unused accounts.
Enable two-factor authentication on any platform that allows it.
Use strong passwords, and use different passwords for every account.
On social media, accept friend requests selectively.
Configure the strongest privacy settings for each social media account.
Think before you post.
Limit use of third-part applications on social media applications, read the license agreement, and be sure exactly what those applications want to be able to access.
Change answers to security questions, and use false answers so that online criminals can’t use information they gather online to gain access to your accounts.
Twenty-four years after the Marine Corps got its first female aviator, another woman pilot is making history.
Capt. Anneliese Satz is the Marine Corps’ first-ever female F-35B Lighting II Joint Strike Fighter jet pilot. The 29-year-old from Boise, Idaho, has spent the past four years training as a naval aviator.
Now, she’s cleared to operate the cutting-edge fifth-generation stealth, supersonic fighter aircraft in combat. She’s the first woman to complete the F-35B Basic Course, designed specifically for the Marine Corps variant of the fighter jet. The F-35B can take off and land vertically from amphibious assault ship flight decks and austere locations with little runway space.
Satz is joining the “Green Knights” with the Japan-based Marine Fighter Attack Squadron 121. VMFA-121 was the first F-35B squadron to complete an operational deployment with a Marine expeditionary unit aboard a Navy ship.
Capt. Anneliese Satz conducts pre-flight checks prior to a training flight aboard Marine Corps Air Station Beaufort.
(U.S. Marine Corps photo by Sgt. Ashley Phillips)
Satz recalled the first time she took off in the Joint Strike Fighter in a Marine Corps news release announcing her career milestone.
“The first flight in an F-35 is by yourself,” she said. “… It’s an exhilarating experience.”
Satz was licensed to fly the single-engine Robinson R44 light helicopter before joining the Marine Corps. Since switching to fixed wing, she’s flown the T-6 Texan II tandem-seat, turboprop trainer and the T-45C Goshawk carrier capable jet trainer, which prepares naval aviators for tactical missions.
Capt. Anneliese Satz puts on her flight helmet prior to a training flight aboard Marine Corps Air Station Beaufort.
(U.S. Marine Corps photo by Sgt. Ashley Phillips)
She then joined Marine Fighter Attack Training Squadron 501, where she trained to fly the military’s newest fighter jet. Showing up and working hard are what allowed her to succeed, she said in the release.
Satz also credited the instructors, maintainers and other members of Marine Fighter Attack Training Squadron 501 for helping her complete the F-35B Basic Course.
“This is a phenomenal program made possible by all of their hard work,” she said in a Marine Corps news release. “I am thankful to have had the opportunity to learn from all of them. I am incredibly excited to get to VMFA-121 and look forward to the opportunity to serve in the Fleet Marine Forces.”
Capt. Anneliese Satz conducts pre-flight checks prior to a training flight aboard Marine Corps Air Station Beaufort.
(U.S. Marine Corps photo by Sgt. Ashley Phillips)
Earlier this week, another female Marine aviator made history when she became the first woman selected to fly the Corps’ other Joint Strike Fighter variant — the F-35C.
First Lt. Catherine Stark will join the Navy’s fleet replacement squadron, Strike Fighter Squadron 125, where she’ll fly the F-35 variant designed for carrier operations.
Female Marines have been able to fly only since 1993 when the service opened pilot positions to women. Then-2nd Lt. Sarah Deal, a CH-53E heavy-lift helicopter pilot, became the Marine Corps’ first female aviator in 1995. And Capt. Vernice Armour, an AH-1W Cobra pilot, became the service’s first black female pilot in 2001.
This article originally appeared on Military.com. Follow @militarydotcom on Twitter.
After months of delay, the Trump administration is finalizing plans to revamp the nation’s military command for defensive and offensive cyber operations in hopes of intensifying America’s ability to wage cyber war against the Islamic State group and other foes, according to US officials.
Under the plans, US Cyber Command would eventually be split off from the intelligence-focused National Security Agency.
Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks. The officials weren’t authorized to speak publicly on the matter so requested anonymity.
The goal, they said, is to give US Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, internet, and other intelligence data from around the world — a responsibility that can sometimes clash with military operations against enemy forces.
Making cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea, and in space.
The move reflects the escalating threat of cyberattacks and intrusions from other nation states, terrorist groups, and hackers, and comes as the US faces ever-widening fears about Russian hacking following Moscow’s efforts to meddle in the 2016 American election.
Experts said the command will need time to find its footing.
“Right now I think it’s inevitable, but it’s on a very slow glide path,” said Jim Lewis, a cybersecurity expert with the Center for Strategic and International Studies. But, he added, “A new entity is not going to be able to duplicate NSA’s capabilities.”
The NSA, for example, has 300 of the country’s leading mathematicians “and a gigantic super computer,” Lewis said. “Things like this are hard to duplicate.”
He added, however, that over time, the US has increasingly used cyber as a tactical weapon, bolstering the argument for separating it from the NSA.
The two highly secretive organizations, based at Fort Meade, Maryland, have been under the same four-star commander since Cyber Command’s creation in 2009.
But the Defense Department has been agitating for a separation, perceiving the NSA and intelligence community as resistant to more aggressive cyber warfare, particularly after the Islamic State’s transformation in recent years from an obscure insurgent force into an organization holding significant territory across Iraq and Syria and with a worldwide recruiting network.
While the military wanted to attack IS networks, intelligence objectives prioritized gathering information from them, according to US officials familiar with the debate. They weren’t authorized to discuss internal deliberations publicly and requested anonymity.
Then-Defense Secretary Ash Carter sent a plan to President Barack Obama last year to make Cyber Command an independent military headquarters and break it away from the NSA, believing that the agency’s desire to collect intelligence was at times preventing the military from eliminating IS’ ability to raise money, inspire attacks, and command its widely dispersed network of fighters.
Carter, at the time, also pushed for the ouster of Adm. Mike Rogers, who still heads both bodies. The Pentagon, he warned, was losing the war in the cyber domain, focusing on cyberthreats from nations such as Iran, Russia, and China, rather than on countering the communications and propaganda campaigns of internet-savvy insurgents.
Officials also grew alarmed by the growing number of cyberattacks against the US government, including several serious, high-level Defense Department breaches that occurred under Rogers’ watch.
“NSA is truly an intelligence-collection organization,” said Lauren Fish, a research associate with the Center for a New American Security. “It should be collecting information, writing reports on it. Cyber Command is meant to be an organization that uses tools to have military operational effect.”
After President Donald Trump’s inauguration, officials said Defense Secretary Jim Mattis endorsed much of the plan. But debate over details has dragged on for months.
It’s unclear how fast the Cyber Command will break off on its own. Some officials believe the new command isn’t battle-ready, given its current reliance on the NSA’s expertise, staff, and equipment. That effort will require the department to continue to attract and retain cyber experts.
Cyber Command was created in 2009 by the Obama administration to address threats of cyber espionage and other attacks. It was set up as a sub-unit under US Strategic Command to coordinate the Pentagon’s ability to conduct cyber warfare and to defend its own networks, including those that are used by combat forces in battle.
Officials originally said the new cyber effort would likely involve hundreds, rather than thousands, of new employees.
Since then, the command has grown to more than 700 military and civilian employees. The military services also have their own cyber units, with a goal of having 133 fully operational teams with as many as 6,200 personnel.
Its proposed budget for next year is $647 million. Rogers told Congress in May that represents a 16 percent increase over this year’s budget to cover costs associated with building the cyber force, fighting IS, and becoming an independent command.
Under the new plan being forwarded by the Pentagon to the White House, officials said Army Lt. Gen. William Mayville would be nominated to lead Cyber Command. Leadership of the NSA could be turned over to a civilian.
Mayville is currently the director of the military’s joint staff and has extensive experience as a combat-hardened commander. He deployed to both Iraq and Afghanistan, leading the 173rd Airborne Brigade when it made its assault into Iraq in March 2003 and later heading coalition operations in eastern Afghanistan.
“Thousands of our post-9/11 veterans carry the invisible burden of post-traumatic stress, and there is an overwhelming need to expand the available treatment options,” DeSantis said in a statement. “The VA should use every tool at their disposal to support and treat our veterans, including the specialized care offered by service dogs.”
The Puppies Assisting Wounded Servicemembers (PAWS) Act is a five-year, $10 million program to give post-9/11 veterans with a service dog and veterinary health insurance. The veteran must have been treated for PTSD and have completed an established evidence-based treatment. They must remain significantly symptomatic, rating a 3 or 4 on the PTSD scale.
Service dogs are known to be effective in treating veterans with anxiety disorders, physical pain, and other limitations. The animals are proven to give new life and independence to recovering veterans.
At the end of January in 1968, the Viet Cong launched an offensive that turned the tide of the Vietnam War.
The Tet Offensive began on January 30 as the North Vietnamese occupied the city of Hue. US Marines spent nearly a month fighting a brutal urban battle to retake the city — which was 80% destroyed by the battle’s end, according to H.D.S. Greenway, a photographer embedded with the Marines during the war.
An estimated 1,800 Americans lost their lives during the battle.
But in the midst of the chaos, five men who faced harrowing circumstances risked their lives to save those of their comrades — and earned the nation’s highest award for courage in combat, the Medal of Honor.
During one of the ceremonies honoring these heroes, President Richard Nixon remarked on the incredible risks they took.
“They are men who faced death, and instead of losing courage they gave courage to the men around them,” he said.
U.S. Deputy Secretary of Defense inducts U.S. Marine Corps Sgt. Maj. (Ret.) John L. Canley into the Hall of Heroes during a ceremony at the Pentagon in Washington, D.C., on Oct. 18, 2018, after being awarded the Medal of Honor by the President.
(DoD photo by U.S. Army Sgt. Amber I. Smith)
Gunnery Sergeant John L. Canley received his award over 50 years after carrying wounded Marines to safety.
Gunnery Sgt. John Canley, suffering from shrapnel wounds, led his men in the destruction of enemy-occupied buildings in Hue City.
When his men were injured, he leapt over a wall in plain sight — twice — to carry them to safe positions.
He was awarded the Medal of Honor in October 2018, over 50 years after he risked his life for his men.
Medal of Honor recipient Joe Hooper listens as his citation is read during the award ceremony in March 1969.
Sergeant Joe Hooper is described as the most decorated soldier of the Vietnam War.
Sgt. Hooper earned the Medal of Honor on the same day as company mate Staff Sgt. Sims.
Hooper suffered extraordinary wounds as he fought during the Battle of Hue City, during which he destroyed numerous enemy bunkers and raced across open fields under intense fire to save a wounded comrade.
Army equipment officials have issued a reminder to soldiers that the service’s authorized protective eyewear list is being updated regularly with high-tech options like lenses that adjust to changing light in the blink of an eye.
The Transition Combat Eye Protection lens features sensors with much greater sensitivity than commercial transitional lenses because they are designed to respond to visible light instead of UV rays, according to a recent Army press release.
“It’s a one-second button,” Capt. Michael McCown, assistant product manager of Head Protection at Program Executive Office Soldier, said in the release. “It’s not like your transition lenses that you get from your doctor that change as you go in and outdoors … it’s electronic.”
The authorized protective eyewear list, or APEL, is updated about every two years and offers a wide range of brands and styles of protective sunglasses and goggles which feature the APEL logo. All of the 27 types of eyewear on the list have been through rigorous ballistic and non-ballistic testing at Aberdeen Proving Ground, Maryland, according to the release.
(U.S. Army photo)
Soldiers who chose to buy non-authorized eyewear run the risk of suffering irreversible injuries, Lt. Col. Ginger Whitehead, the product manager for protective equipment at PEO Soldier, said in the release.
“We have seen some really horrific injuries with roadside bombs,” Whitehead said.
Facial injuries will still occur with authorized eyewear, but there is a chance the soldier’s eyes will be protected, she said in the release.
“The soldier’s face is all chewed up,” Whitehead said. “But when they pull his glasses off, where the skin is intact around their eyes, where you know without a doubt that eyewear saved their eyes.”
Soldiers can check out the Army’s APEL online and buy approved eyewear at most Army and Air Force Exchange Service stores.
This article originally appeared on Military.com. Follow @militarydotcom on Twitter.
Ongoing U.S. and allied drone, helicopter and aircraft attacks against ISIS have led the Army to massively rev up its production of air-launched HELLFIRE missiles, a weapon regularly used to destroy Islamic State buildings, bunkers, armored vehicles, fighter positions and equipment.
The war against ISIS has depleted existing inventory of the weapon and generated a fast-growing national and international demand for HELLFIRE missiles, Army officials told Scout Warrior.
“Production of HELLFIRE has increased for quantities ordered in Fiscal Year 14 and Fiscal Year 15,” Dan O’Boyle, spokesman for Program Executive Office Missiles and Space, said in a written statement.
As the principle manufacturer of HELLFIRE missiles, the Army provides the weapon to national and international entities to include the Marine Corps, Air Force and Navy arsenals, among others. Overall, there as many as 15 or more international customers using HELLFIRE missiles, many of them partners in the U.S.-led coalition to destroy ISIS.
While Army officials did not provide specific numbers of production increases or plans to provide particular allied nations with HELLFIREs, the Pentagon has requested $1.8 billion in its 2017 budget for munitions, bombs and missiles needed to replenish or maintain stockpiles and sustain the attacks against ISIS.
As part of a separate effort, the Air Force did request and receive $400 million in reprogrammed dollars to address an air-to-ground munitions shortage, particularly with Hellfire missiles.
“The Air Force worked with the Army to re-prioritize HELLFIRE missile deliveries to the Air Force, requested additional funding for HELLFIRE missiles, reduced aircrew training expenditures, and is working a procurement plan to increase production to reconstitute munitions stocks as quickly as possible,” an Air Force official told Scout Warrior.
While precision-guided air-to-ground weapons are typically needed during aerial bombing efforts, they are of particular urgent value in the ongoing attacks on ISIS. ISIS fighters regularly hide among civilians and at times use women and children as human shields, making the need for precision all the more pressing.
In service since the 1970s, HELLFIRE missiles originated as 100-pound tank-killing, armor piercing weapons engineered to fire from helicopters to destroy enemy armored vehicles, bunkers and other fortifications.
In more recent years, the emergence of news sensors, platforms and guidance technologies have enabled the missile to launch strikes with greater precision against a wider envelope of potential enemy targets.
HELLFIRE Missile Technologies and Platforms
These days, the weapon is primarily fired from attack drones such as the Air Force Predator and Reaper and the Army’s Gray Eagle; naturally, the HELLFIRE is also used by the Army’s AH-64 Apache Attack helicopter, OH-58 Kiowa Warriors and AH-1 Marine Corps Super Cobras, among others. Although not much is known about when, where or who — HELLFIREs are also regularly used in U.S. drone strikes using Air Force Predators and Reapers against terrorist targets around the globe.
The HELLFIRE missile can use radio frequency, RF, guidance – referred to as “fire and forget” – or semi-active laser technology. A ground target can be designated or “painted” by a laser spot from the aircraft firing the weapon, another aircraft or ground spotter illuminating the target for the weapon to destroy.
There are multiple kinds of HELLFIRE warheads to include a High-Explosive Anti-Tank, or HEAT, weapon and a Blast-Fragmentation explosive along with several others. The HEAT round uses what’s called a “tandem warhead” with both a smaller and larger shaped charge; the idea is to achieve the initial requisite effect before detonating a larger explosion to maximize damage to the target.
The “Blast-Frag” warhead is a laser-guided penetrator weapon with a hardened steel casing, incendiary pellets designed for enemy ships, bunkers, patrol boats and things like communications infrastructure, Army documents explain.
The “Metal Augmented Charge” warhead improves upon the “Blast-Frag” weapon by adding metal fuel to the missile designed to increase the blast overpressure inside bunkers, ships and multi-room targets, Army information says. The “Metal Augmented Charge” is penetrating, laser-guided and also used for attacks on bridges, air defenses and oil rigs. The missile uses blast effects, fragmentation and overpressure to destroy targets.
The AGM-114L HELLFIRE is designed for the Longbow Apache attack helicopter platform; the weapon uses millimeter-wave technology, radar, digital signal processing and inertial measurement units to “lock-on” to a target before or after launch.
The AGM-114R warhead is described as a “Multi-Purpose” explosive used for anti-armor, anti-personnel and urban targets; the weapon uses a Micro-Electro Mechanical System Inertial Measurement Unit for additional flight guidance along with a delayed fuse in order to penetrate a target before exploding in order to maximize damage inside an area.
The AGM-114R or “Romeo” variant, which is the most modern in the arsenal, integrates a few additional technologies such as all-weather millimeter wave guidance technology and a fragmentation-increasing metal sleeve configured around the outside of the missile.
The “Multi-Purpose” warhead is a dual mode weapon able to use both a shaped charge along with a fragmentation sleeve. The additional casing is designed to further disperse “blast-effects” with greater fragmentation in order to be more effective against small groups of enemy fighters.
“The “Romeo” variant is an example of how these efforts result in a more capable missile that will maintain fire superiority for the foreseeable future,” O’Boyle said.
Additional HELLFIRE Uses
Although the HELLFIRE began as an air-to-ground weapon, the missile has been fired in a variety of different respects in recent years. The Navy has fired a Longbow HELLFIRE from a Littoral Combat Ship, or LCS, to increase its lethality; the Navy’s 2017 budget request asks for Longbow HELLFIRE missiles, beginning with the LCS surface-to-surface mission module, Navy officials told Scout Warrior. Also, the Army has fired the weapon at drone targets in the air from a truck-mounted Multi-Mission Launcher on the ground and international U.S. allies have fired the HELLFIRE mounted on a ground-stationed tripod.