Between 2006 and 2010, some 30,000 single mothers had deployed to Iraq and Afghanistan during the Global War on Terror. Meanwhile, the number of homeless female veterans doubled in the same time period.
There are now an estimated 55,000 homeless women veterans in America, and they’re the fastest growing homeless population in America.
When Lysa Heslov first heard about how easily female veterans can fall into poverty and homelessness she had no idea just how widespread the problem was. She was at lunch with a friend who told her about the Ms. Veteran America Pageant, which provides housing for female veterans and their children – and why it’s so important.
“I was embarrassed. I was embarrassed as an American, I was embarrassed as a woman,” Heslov told We Are The Mighty. “I couldn’t believe that this was happening. I couldn’t believe that women were coming back and being treated this way. I’ve gone up to many service men in my life, and said, ‘Thank you for your service.’ I hadn’t gone up to one woman my entire life.”
There are many factors that go into a veteran falling into homelessness; a lack of affordable housing, sudden or insufficient income, PTSD, substance abuse, lack of familial and social support networks — the list goes on and on. Suffice to say, it could happen to anyone.
Heslov is a director, producer, philanthropist who founded a non-profit for disadvantaged youth with her husband. She helped a New Orleans family recover from Hurricane Katrina. She decided she would put her skills to work to raise awareness for female veterans at risk of homelessness. In 2015, she filmed the new documentary film “Served Like a Girl.”
“Served Like a Girl” follows five female veterans from the Army, Air Force, Navy, and Marines from around the U.S. as they prepare to compete in the Ms. Veteran America competition.
The women face more than a transition from military to civilian life. As they ready themselves to earn the crown, they describe how they deal with divorce, PTSD, serious illnesses, and sexual trauma they experienced while in the military.
Heslov immediate set out to learn everything she could about the issue. She watched CNN’s “Heroes” documentary on Jas Boothe, the founder of Final Salute, Inc. — the main beneficiary of Ms. Veteran America. Booth is a 16-year Army veteran of both OIF and OEF, a cancer survivor, and author who was once fell into homelessness herself after a series of tragic events.
Her brush with the void inspired her to ensure every female veteran would never be left without somewhere to turn.
“We offer wrap-around services,” Boothe told CNN. “Anything they could possibly need to help get themselves back in a state of independence. We give all the tools that you need, but your success in this program is up to you.”
Final Salute, Inc. also offers interest-free loans, child care, job placement, and more.
“There’s nothing wrong with serving like a girl,” Boothe said, introducing the film at the 2016 Fort Meyer VETRACON event. “Men killed Bin Laden. A woman found him.”
“Directing this was terrifying and exciting and became so much more than I ever thought it could be,” Heslov says. “The women featured in it became more than just subjects in my documentary, they have become my family. I can say I’ve never cried so many tears and I’ve never laughed as hard. My life will never be the same and my hope is, through sharing this film, theirs won’t have to be either.”
“Served Like a Girl” is a descriptive, informative film that thoroughly covers the possible pitfalls and unique challenges for women vets who transition from the military. The women featured in the film are real women veterans, facing real struggles that could undo not only their hopes of winning the competition, but affect the rest of their lives.
The film also features a new song “Dancing Through the Wreckage,” composed by Linda Perry, Grammy-nominated lead of the band 4 Non Blondes, and sung by the legendary Pat Benatar.
“Served Like a Girl” is in theaters in Los Angeles and New York. It will open in other areas soon.
To learn more about the Ms. Veteran America Competition or donate to fight female veteran homelessness, visit their website.
The military has very talented photographers in its ranks, and they constantly attempt to capture what life as a service member is like during training and at war. This is the best of what they shot this week:
A C-130 Hercules receives fuel from a KC-135 Stratotanker Oct. 22, 2015, over the Atlantic Ocean. The two aircraft, assigned to Royal Air Force Mildenhall, England, were training in Trident Juncture, an exercise designed to help militaries respond more effectively to regional crises with NATO allies and partners — improving security of borders, ensuring energy security and countering threats of terrorism.
Two pilots, assigned to the 71st Rescue Squadron at Moody Air Force Base, Ga., fly a C-130J Super Hercules during rescue and refueling training near Beja Air Base, Portugal, Oct. 23, 2015. The training was in support of Trident Juncture 2015, the largest NATO exercise conducted in the past 20 years, involving more than 35,000 troops from over 30 NATO member nations and partners.
Soldiers, assigned to the 173rd Airborne Brigade, and Italian soldiers, assigned to Folgore Brigade, Esercito Italiano conduct a combined airborne operation at Lidia Drop Zone, Siena, Italy, during Exercise Mangusta 15, Oct. 26, 2015.
Army paratroopers, assigned to 173rd Airborne Brigade, fire an M224 60 mm mortar system during a live-fire exercise as part of Exercise Rock Proof V, in support of Operation Atlantic Resolve, at Pocek Range, Postonja, Slovenia.
U.S. 5TH FLEET AREA OF OPERATIONS (Oct. 21, 2015) Navy Diver 2nd Class David Close, assigned to Commander, Task Group (CTG) 56.1, conducts a ship’s husbandry dive to inspect running gear. CTG 56.1 conducts mine countermeasures, explosive ordnance disposal, salvage-diving, and force protection operations throughout the U.S. 5th Fleet area of operations.
PACIFIC OCEAN (Oct. 19, 2015) U.S. Naval aircraft and aircraft from the Chilean Air Force participate in a fly-by adjacent to aircraft carrier USS George Washington (CVN 73). UNITAS 2015, the U.S. Navy’s longest running annual multinational maritime exercise, is part of the Southern Seas deployment planned by U.S. Naval Forces Southern Command/U.S. 4th Fleet. This 56th iteration of UNITAS is conducted in two phases: UNITAS Pacific, hosted by Chile, Oct. 13-24, 2015 and UNITAS Atlantic, hosted by Brazil scheduled for November.
Take Aim: Lance Cpl. Dakota A. Kaiser engages enemy units during a raid on Combat Town, Central Training Area, Okinawa, Japan, October 26, 2015. The raid was part of Blue Chromite 2016, a large-scale amphibious exercise that achieves high-level training at a low cost, while keeping naval forces in a forward-deployed posture.
Corporal Derek Detzler, a bugler with the 2nd Marine Division Band, performs Taps during the 32nd Beirut Memorial Observance Ceremony in Jacksonville, North Carolina, Oct. 23, 2015. The ceremony was held to honor the memory of service members, most of whom were from 1st Battalion, 8th Marines, 24th Marine Amphibious Unit, killed in the 1983 Marine Barracks bombing in Beirut, Lebanon.
A golden sunrise starts the day at USCG Station Islamorada, Florida.
Crews from USCG Cutter Frank Drew, U.S. Navy Amphibious Construction Battalion Two and City of Virginia Beach work to reflect a 6,100 pound buoy discovered on the beach after Hurricane Joaquin.
If you were wondering about why China didn’t bother to show up to that hearing at the Hague on their South China Sea island claims — when their boycott of the process only made the adverse ruling a guarantee — well, now you know why.
China, like Cersei Lannister from “Game of Thrones,” had no intention of accepting the consequences for their failure to take part.
According to reports from the Wall Street Journal and CBSNews.com, China has deployed weapons to at least seven of the artificial islands it has built in the South China Sea, despite a promise from Chinese president Xi Jingpin.
The report from the Asia Maritime Transparency Initiative noted that satellite photos showed various anti-aircraft weapons on the islands. These join the 10,000-foot airstrips on the islands, which have operated J-11 Flankers. Two such locations in the Spratly Islands are Mischief Reef and Fiery Cross Reef, located about 650 nautical miles from the northernmost point of Hainan Island.
In essence, China has turned these islands into unsinkable, albeit immobile, aircraft carriers. China’s J-15, for instance, has a combat radius of about 540 nautical miles, according to GlobalSecurity.org. By getting those unsinkable aircraft carriers, the J-15s (as well as J-11 and J-16 Flankers in the Chinese inventory) can now carry more weapons, and less fuel, and spend more time dogfighting their adversaries.
When combined with China’s aircraft carrier Liaoning, these bases greatly increase the striking power of the Chinese in the region. The Liaoning, like its sister ship, the Russian Admiral Kuznetsov, has a very limited aircraft capacity (about 18 Su-33 Flankers or MiG-29K Fulcrums for the Russian carrier, and a similar number of J-15 Flankers for the Chinese ship).
That alone cannot stand up to a United States Navy aircraft carrier (carrying 36 F/A-18E/F Super Hornets and 10 F-35C Lightnings). The islands also provide alternate bases, to avoid those embarrassing splash landings that are common with the Kuznetsov.
However, these island bases, if each had a squadron of J-11, J-15 or J-16 Flankers, suddenly change the odds, especially if the Philippines refuse to host land-based fighters. Now, the Chinese could have a numerical advantage in the region against one carrier group, and inflict virtual attrition on the United States Navy.
The forward bases have caused concern from other countries, like the Philippines.
“It would mean that the Chinese are militarizing the area, which is not good,” the Philippine defense secretary told CBSNews.com.
The Philippines have been trying to modernize their forces, including with the recent purchase of a dozen KA-50 jets from South Korea, and the acquisition of second-hand Hamilton-class high-endurance cutters from the U.S. Coast Guard.
They still are badly out-classed by Chinese forces in the region.
The U.S. Navy has conducted freedom of navigation exercises in the South China Sea. In one of the recent operations, the USS John S. McCain (DDG 56) “conducted routine operations” while transiting the region, which is claimed by China. Navy surveillance and maritime patrol aircraft in the region had had a series of close calls with Chinese fighters, including an Aug. 2014 intercept where a J-11 came within 20 feet of a U.S. Navy P-8 Poseidon.
Tensions with China increased when President-elect Donald Trump accepted a congratulatory phone call from Taiwanese president Tsai Ing-wen after winning the Nov. 8 presidential election. Trump had taken a tough line on trade with China during the campaign.
From the punitive expedition to Mexico before World War I to the mountains of Korea, American service members relied on one iconic pistol above any other, the Colt M1911. In fact, some special operators still carry modified and reworked versions of the same sidearm today.
The famous pistol came, like many of the best weapons, from an urgent battlefield necessity. Soldiers and Marines fighting the Spanish in the Phillippines during the Spanish-American War ended up in combat with a rebel group that had been active in the islands for years, the Moro.
The Moro fighters were known as fanatics and used opiates to keep going even if they were hit. The troops engaged in combat with them found out quickly that their pistols, .38-caliber weapons, often needed a few hits to bring down a fighter. This gave attacking Moro fighters time to get an extra couple knife swings or trigger pulls in before they were killed.
Soldiers reached back to their last sidearm, the Colt Model 1873 Revolver which fired a .45-caliber round. The .45 got the job done, and the Army put out a call for a modern weapon that fired it, preferably with semi-automatic technology and smokeless powder.
After a long competition, the winner was a Colt pistol from famed designer John Browning. It was a semi-automatic weapon that fired the desired .45-caliber cartridge packed with smokeless powder, allowing troops to defend themselves with lots of firepower on demand without giving away their position.
The Army designated the weapon the M1911 for the year it was adopted and got it out to the field. The gun got a trial with the Punitive Expedition to Mexico in 1916 where it performed admirably, but it cemented its place in troops’ hearts in 1917 when the American Doughboys carried it with them to Europe.
In World War I, the Army, Navy, and Marine Corps carried the weapon. Army Cpl. Alvin C. York was part of an attack through German lines to destroy or capture some enemy machine guns. The initial attack was successful but everything went sideways and York was the highest ranking of the survivors.
Army Lt. Frank Luke, Jr., another Medal of Honor recipient, used the pistol after he was shot down in an attempt to fight off the German infantry trying to take him prisoner. While Luke was eventually killed, he took seven of the infantrymen with him.
Love for the M1911 spread to America’s allies. Great Britain, for instance, bought the guns for the Navy and the Flying Corps. In World War II, the Colt M1911 was once again the pistol of choice and Americans were lucky enough to get it as standard issue.
Through Korea and Vietnam, the M1911 was the standard sidearm and a favorite of troops who cited its stopping power, ergonomics, and reliability.
But the weapon’s .45-caliber ammunition made it less operable with NATO allies and when the U.S. encouraged standardizing weapons and ammo across the alliance, it was sent to the chopping block. In 1992, the military branches transitioned to the Beretta M9 and its smaller 9mm ammunition.
But some M1911s are still floating around as special operations units reworked the M1911A1 variant introduced in 1926, allowing them to use the .45-caliber ammunition.
If the Empire ever makes it here from its galaxy far, far away, America is going to be in a tough pickle.
And the Empire has already had a long time to get here. So what would it look like if the Empire landed one of its most feared vehicles — the All Terrain Armored Transport — in the plains of the midwest?
Surely, the Air Force would be hard-pressed to take them out, but here are five strategies that the beloved A-10 should try first:
Strategy 1: Punch out the walker’s teeth
The AT-ATs armor is too thick for firing at it center mass, but aiming at the crew cabin in the “head” will give the A-10 pilots a good chance of hitting the laser turrets mounted around it. These weapons have only light armor and the barrels are largely exposed.
This won’t take down the walker entirely, but it would turn it into a stomping reconnaissance tool instead of a lethal, anti-armor and anti-bunker monster.
Strategy 2: Low flying pass to hit the Imperial walker’s fuel slug
The walkers use a solid “slug” of fuel kept in a tank in the belly of the beast. This is the same type of fuel that powers starfighters, and everyone knows how spectacularly they blow up.
To hit this tank, the A-10s will need to conduct flights at near ground level and should approach from the walker’s 1, 5, 7, or 11 o’clock to avoid its limited skirt armor. Pilots should launch the TV-guided AGM-65 Maverick missile with its 300-pound, shaped-charge warhead and a delayed fuze.
Even if the missile doesn’t make it to the fuel tank before it explodes, the blast should cut through some of the drive mechanisms for the legs, granting a mobility kill and possibly causing the AT-AT to topple.
Strategy 3: Cripple its feet
Speaking of mobility kills, the AT-AT relies on ankle drive motors and terrain scanners in the “feet” to keep it balanced and moving forward. But the metal supports around these feet aren’t particularly strong.
In at least two occasions, Sith and Jedi have cut the feet off of a walker.
While A-10s don’t have a plasma saber to cut through the leg, the shaped charges in the AGM-65 with a contact fuse could slice deep enough for the remaining support to snap under the massive weight of the AT-AT.
Alternatively, the pilot could fire the Maverick missile against the foot itself in an attempt to cut through the armor to disable the sensors and motors inside, increasing the chances that the foot will trip on the terrain, similar to the effect in the GIF above.
Strategy 4: Wait for it to discharge troops and fill it with 30mm
The AT-AT is a troop transport, and patient A-10 pilots could wait for it to attempt and discharge its stormtroopers and speeder bikes. When the walker opens to release its deadly cargo, pilots would have only a short window to attack through the open armor panels.
This is a job for the GAU-8 Avenger. Pilots should fire a sustained stream of 30mm through the opening. Don’t get shy, the crew compartment is connected to the transport area only through a thin tunnel. Even with high-explosive rounds, the A-10 needs to get a lot of ammo into the troop transport section to guarantee that at least a few bits of shrapnel bounce through the cabin.
Strategy 5: Cut its head off
In the Battle of Hoth, snow speeders managed to get a mobility kill on an AT-AT by wrapping its legs up in a tow cable. Before the walker crew could escape, a flight of snow speeders fired on the AT-AT’s flexible neck section, the tunnel between the crew cabin and the troop transport area.
Just two blasts to the neck section set off a massive explosion that destroyed the walker and rained debris for hundreds of meters. While it isn’t known what in the neck caused the massive, second detonation, there’s no reason to think that an A-10’s GAU-8 Avenger couldn’t punch through this vulnerable section.
To hit it, pilots should conduct nearly vertical attacks from high altitude, sending the 30mm rounds into the neck joint perpendicular to the armor.
China is working on a third aircraft carrier, one expected to be much more technologically advanced and powerful than its predecessors, the Department of Defense said in its new report on China’s growing military might.
China has one carrier — the Liaoning — in service with the People’s Liberation Army Navy. Formerly a Soviet heavy aircraft-carrying cruiser, this vessel is the flagship of China’s navy.
China is believed to be close to fielding its second aircraft carrier, the country’s first domestically produced aircraft carrier. This new ship recently completed its fifth sea trial, and the Pentagon reported that this vessel will “likely join the fleet by the end of 2019.”
Type 001A, China’s first domestically produced carrier.
While based on the Liaoning, the second carrier is slightly bigger, creating the potential for a larger carrier air wing, most likely consisting of the J-15 “Flying Sharks,” with which the Liaoning sails. Like the Liaoning, the Chinese navy’s newest carrier will use a ski-jump-assisted short-takeoff-but-arrested-recovery (STOBAR) launch system to sortie aircraft.
Incorporating this new aircraft carrier into the fleet will be a major milestone, but that achievement may be overshadowed by a more impressive achievement in just a few years, the Department of Defense said in its latest report.
“China began construction of its second domestically built aircraft carrier in 2018, which will likely be larger and fitted with a catapult launch system,” the Pentagon said in its annual report to Congress on military and security developments involving China. “This design will enable it to support additional fighter aircraft, fixed-wing early-warning aircraft, and more rapid flight operations.”
Catapult launch systems are much more effective than the ski jumps, which tend to put greater strain on the aircraft and tend to result in reductions in operational range, payload size, and ultimately the number of flights the onboard aircraft can fly.
A J-15 taking off from Chinese aircraft carrier Liaoning.
“The new one is something that might be a little more interesting, a little more compelling,” Matthew Funaiole, a fellow with the China Power Project at the Center for Strategic and International Studies, previously told Business Insider. “If the third carrier does have some catapult-assisted launch system, that will be a huge step forward for China.”
“They would very quickly have moved closer to what current technology is,” he added. “That’s something that very few countries can do. That would put China in a very elite status.”
It is unclear if the catapult launch system will be steam-powered, like those on the US Nimitz-class carriers, or electromagnetic, like the catapults on the Ford-class carriers. It is also unclear whether or not the new Chinese carrier will be conventionally powered or nuclear-powered, like those of the US. China has expressed an interest in the latter, but the country may not have overcome the developmental hurdles to building one.
China is focused on building a world-class military, and a key part of China’s military-modernization program is building power-projection platforms, such as increasingly capable aircraft carriers. The country still has a ways to go to catch up to the US Navy, which has 11 modern aircraft carriers in its arsenal.
China’s third carrier is expected to be completed and operational by 2022.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
While the World Wide Web was initially invented by one person (see: What was the First Website?), the genesis of the internet itself was a group effort by numerous individuals, sometimes working in concert, and other times independently. Its birth takes us back to the extremely competitive technological contest between the US and the USSR during the Cold War.
The Soviet Union sent the satellite Sputnik 1 into space on October 4, 1957. Partially in response, the American government created in 1958 the Advanced Research Project Agency, known today as DARPA—Defense Advanced Research Projects Agency. The agency’s specific mission was to
…prevent technological surprises like the launch of Sputnik, which signaled that the Soviets had beaten the U.S. into space. The mission statement has evolved over time. Today, DARPA’s mission is still to prevent technological surprise to the US, but also to create technological surprise for our enemies.
To coordinate such efforts, a rapid way to exchange data between various universities and laboratories was needed. This bring us to J. C. R. Licklider who is largely responsible for the theoretical basis of the Internet, an “Intergalactic Computer Network.” His idea was to create a network where many different computer systems would be interconnected to one another to quickly exchange data, rather than have individual systems setup, each one connecting to some other individual system.
He thought up the idea after having to deal with three separate systems connecting to computers in Santa Monica, the University of California, Berkeley, and a system at MIT:
For each of these three terminals, I had three different sets of user commands. So if I was talking online with someone at S.D.C. and I wanted to talk to someone I knew at Berkeley or M.I.T. about this, I had to get up from the S.D.C. terminal, go over and log into the other terminal and get in touch with them…. I said, oh man, it’s obvious what to do: If you have these three terminals, there ought to be one terminal that goes anywhere you want to go where you have interactive computing. That idea is the ARPAnet.”
So, yes, the idea for the internet as we know it partially came about because of the seemingly universal human desire to not have to get up and move to another location.
With the threat of a nuclear war, it was necessary to decentralize such a system, so that even if one node was destroyed, there would still be communication between all the other computers. The American engineer Paul Baran provided the solution to this issue; he designed a decentralized network that also used packet switching as a means for sending and receiving data.
Many others also contributed to the development of an efficient packet switching system, including Leonard Kleinrock and Donald Davies. If you’re not familiar, “packet switching” is basically just a method of breaking down all transmitted data—regardless of content, type, or structure—into suitably sized blocks, called packets. So, for instance, if you wanted to access a large file from another system, when you attempted to download it, rather than the entire file being sent in one stream, which would require a constant connection for the duration of the download, it would get broken down into small packets of data, with each packet being individually sent, perhaps taking different paths through the network. The system that downloads the file would then re-assemble the packets back into the original full file.
The platform mentioned above by Licklider, ARPANET was based on these ideas and was the principle precursor to the Internet as we think of it today. It was installed and operated for the first time in 1969 with four nodes, which were located at the University of California at Santa Barbara, the University of California at Los Angeles, SRI at Stanford University, and the University of Utah.
The first use of this network took place on October 29, 1969 at 10:30 pm and was a communication between UCLA and the Stanford Research Institute. As recounted by the aforementioned Leonard Kleinrock, this momentous communiqué went like this:
We set up a telephone connection between us and the guys at SRI… We typed the L and we asked on the phone,
“Do you see the L?”
“Yes, we see the L,” came the response.
We typed the O, and we asked, “Do you see the O.”
“Yes, we see the O.”
Then we typed the G, and the system crashed… Yet a revolution had begun.
By 1972, the number of computers that were connected to ARPANET had reached twenty-three and it was at this time that the term electronic mail (email) was first used, when a computer scientist named Ray Tomlinson implemented an email system in ARPANET using the “@” symbol to differentiate the sender’s name and network name in the email address.
Alongside these developments, engineers created more networks, which used different protocols such as X.25 and UUCP. The original protocol for communication used by the ARPANET was the NCP (Network Control Protocol). The need for a protocol that would unite all the many networks was needed.
In 1974, after many failed attempts, a paper published by Vint Cerf and Bob Kahn, also known as “the fathers of the Internet,” resulted in the protocol TCP (Transmission Control Protocol), which by 1978 would become TCP/IP (with the IP standing for Internet Protocol). At a high level, TCP/IP is essentially just a relatively efficient system for making sure the packets of data are sent and ultimately received where they need to go, and in turn assembled in the proper order so that the downloaded data mirrors the original file. So, for instance, if a packet is lost in transmission, TCP is the system that detects this and makes sure the missing packet(s) get re-sent and are successfully received. Developers of applications can then use this system without having to worry about exactly how the underlying network communication works.
On January 1, 1983, “flag day,” TCP/IP would become the exclusive communication protocol for ARPANET.
Also in 1983, Paul Mockapetris proposed a distributed database of internet name and address pairs, now known as the Domain Name System (DNS). This is essentially a distributed “phone book” linking a domain’s name to its IP address, allowing you to type in something like todayifoundout.com, instead of the IP address of the website. The distributed version of this system allowed for a decentralized approach to this “phone book.” Previous to this, a central HOSTS.TXT file was maintained at Stanford Research Institute that then could be downloaded and used by other systems. Of course, even by 1983, this was becoming a problem to maintain and there was a growing need for a decentralized approach.
This brings us to 1989 when Tim Berners-Lee of CERN (European Organization for Nuclear Research) developed a system for distributing information on the Internet and named it the World Wide Web.
What made this system unique from existing systems of the day was the marriage of the hypertext system (linked pages) with the internet; particularly the marriage of one directional links that didn’t require any action by the owner of the destination page to make it work as with bi-directional hypertext systems of the day. It also provided for relatively simple implementations of web servers and web browsers and was a completely open platform making it so anyone could contribute and develop their own such systems without paying any royalties. In the process of doing all this, Berners-Lee developed the URL format, hypertext markup language (HTML), and the Hypertext Transfer Protocol (HTTP).
Around this same time, one of the most popular alternatives to the web, the Gopher system, announced it would no longer be free to use, effectively killing it with many switching to the World Wide Web. Today, the web is so popular that many people often think of it as the internet, even though this isn’t the case at all.
Also around the time the World Wide Web was being created, the restrictions on commercial use of the internet were gradually being removed, which was another key element in the ultimate success of this network.
Next up, in 1993, Marc Andreessen led a team that developed a browser for the World Wide Web, named Mosaic. This was a graphical browser developed via funding through a U.S. government initiative, specifically the “High Performance Computing and Communications Act of 1991.″
This act was partially what Al Gore was referring to when he said he “took the initiative in creating the Internet.” All political rhetoric aside (and there was much on both sides concerning this statement), as one of the “fathers of the internet,” Vincent Cerf said, “The Internet would not be where it is in the United States without the strong support given to it and related research areas by the Vice President [Al Gore] in his current role and in his earlier role as Senator… As far back as the 1970s, Congressman Gore promoted the idea of high speed telecommunications as an engine for both economic growth and the improvement of our educational system. He was the first elected official to grasp the potential of computer communications to have a broader impact than just improving the conduct of science and scholarship… His initiatives led directly to the commercialization of the Internet. So he really does deserve credit.” (For more on this controversy, see: Did Al Gore Really Say He Invented the Internet?)
As for Mosaic, it was not the first web browser, as you’ll sometimes read, simply one of the most successful until Netscape came around (which was developed by many of those who previously worked on Mosaic). The first ever web browser, called WorldWideWeb, was created by Berners-Lee. This browser had a nice graphical user interface; allowed for multiple fonts and font sizes; allowed for downloading and displaying images, sounds, animations, movies, etc.; and had the ability to let users edit the web pages being viewed in order to promote collaboration of information. However, this browser only ran on NeXT Step’s OS, which most people didn’t have because of the extreme high cost of these systems. (This company was owned by Steve Jobs, so you can imagine the cost bloat… ;-))
In order to provide a browser anyone could use, the next browser Berners-Lee developed was much simpler and, thus, versions of it could be quickly developed to be able to run on just about any computer, for the most part regardless of processing power or operating system. It was a bare-bones inline browser (command line / text only), which didn’t have most of the features of his original browser.
Mosaic essentially reintroduced some of the nicer features found in Berners-Lee’s original browser, giving people a graphic interface to work with. It also included the ability to view web pages with inline images (instead of in separate windows as other browsers at the time). What really distinguished it from other such graphical browsers, though, was that it was easy for everyday users to install and use. The creators also offered 24 hour phone support to help people get it setup and working on their respective systems.
And the rest, as they say, is history.
Bonus Internet Facts:
The first domain ever registered was Symbolics.com on March 15, 1985. It was registered by the Symbolics Computer Corp.
The “//” forward slashes in any web address serve no real purpose according to Berners-Lee. He only put them in because, “It seemed like a good idea at the time.” He wanted a way to separate the part the web server needed to know about, for instance “www.todayifoundout.com”, from the other stuff which is more service oriented. Basically, he didn’t want to have to worry about knowing what service the particular website was using at a particular link when creating a link in a web page. “//” seemed natural, as it would to anyone who’s used Unix based systems. In retrospect though, this was not at all necessary, so the “//” are essentially pointless.
Berners-Lee chose the “#” for separating the main part of a document’s url with the portion that tells what part of the page to go to, because in the United States and some other countries, if you want to specify an address of an individual apartment or suite in a building, you classically precede the suite or apartment number with a “#”. So the structure is “street name and number #suite number”; thus “page url #location in page”.
Berners-Lee chose the name “World Wide Web” because he wanted to emphasize that, in this global hypertext system, anything could link to anything else. Alternative names he considered were: “Mine of Information” (Moi); “The Information Mine” (Tim); and “Information Mesh” (which was discarded as it looked too much like “Information Mess”).
Pronouncing “www” as individual letters “double-u double-u double-u” takes three times as many syllables as simply saying “World Wide Web.”
Most web addresses begin with “www” because of the traditional practice of naming a server according to the service it provides. So outside of this practice, there is no real reason for any website URL to put a “www” before the domain name; the administrators of whatever website can set it to put anything they want preceding the domain or nothing at all. This is why, as time goes on, more and more websites have adopted allowing only putting the domain name itself and assuming the user wants to access the web service instead of some other service the machine itself may provide. Thus, the web has more or less become the “default” service (generally on port 80) on most service hosting machines on the internet.
The earliest documented commercial spam message on an internet is often incorrectly cited as the 1994 “Green Card Spam” incident. However, the actual first documented commercial spam message was for a new model of Digital Equipment Corporation computers and was sent on ARPANET to 393 recipients by Gary Thuerk in 1978.
The famed Green Card Spam incident was sent April 12, 1994 by a husband and wife team of lawyers, Laurance Canter and Martha Siegal. They bulk posted, on Usenet newsgroups, advertisements for immigration law services. The two defended their actions citing freedom of speech rights. They also later wrote a book titled “How to Make a Fortune on the Information Superhighway“, which encouraged and demonstrated to people how to quickly and freely reach over 30 million users on the Internet by spamming.
Though not called spam, back then, telegraphic spam messages were extremely common in the 19th century in the United States particularly. Western Union allowed telegraphic messages on its network to be sent to multiple destinations. Thus, wealthy American residents tended to get numerous spam messages through telegrams presenting unsolicited investment offers and the like. This wasn’t nearly as much of a problem in Europe due to the fact that telegraphy was regulated by post offices in Europe.
The word “internet” was used as early as 1883 as a verb and adjective to refer to interconnected motions, but almost a century later, in 1982, the term would, of course, be used to describe a worldwide network of fully interconnected TCP/IP networks.
In 1988, the very first massive computer virus in history called “The Internet Worm” was responsible for more than 10 percent of the world’s Internet servers shutting down temporarily.
The term “virus,” as referring to self-replicating computer programs, was coined by Frederick Cohen who was a student at California’s School of Engineering. He wrote such a program for a class. This “virus” was a parasitic application that would seize control of the computer and replicate itself on the machine. He then specifically described his “computer virus” as: “a program that can ‘infect’ other programs by modifying them to include a possibly evolved copy of itself.” Cohen went on to be one of the first people to outline proper virus defense techniques. He also demonstrated in 1987 that no algorithm could ever detect all possible viruses.
Though it wasn’t called such at the time, one of the first ever computer viruses was called “Creeper” and was written by Bob Thomas in 1971. He wrote this virus to demonstrate the potential of such “mobile” computer programs. The virus itself wasn’t destructive and simply printed the message “I’m the creeper, catch me if you can!” Creeper spread about on ARPANET. It worked by finding open connections and transferring itself to other machines. It would also attempt to remove itself from the machine that it was just on, if it could, to further be non-intrusive. The Creeper was ultimately “caught” by a program called “the reaper” which was designed to find and remove any instances of the creeper out there.
While terms like “Computer Worm” and “Computer Virus” are fairly commonly known, one less commonly heard term is “Computer Wabbit.” This is a program that is self-replicating, like a computer virus, but does not infect any host programs or files. The wabbits simply multiply themselves continually until eventually causing the system to crash from lack of resources. The term “wabbit” itself references how rabbits breed incredibly quickly and can take over an area until the environment can no longer sustain them. Pronouncing it “wabbit” is thought to be in homage to Elmer Fudd’s pronunciation of “rabbit.”
Computer viruses/worms don’t inherently have to be bad for your system. Some viruses are designed to improve your system as they infect it. For instance, as noted previously, the Reeper, which was designed to go out and destroy all instances of the Creeper it found. Another virus designed by Cohen would spread itself on a system to all executable files. Rather than harm them though, it would simply safely compress them, freeing up storage space.
Al Gore was one of the so called “Atari Democrats.” These were a group of Democrats that had a “passion for technological issues, from biomedical research and genetic engineering to the environmental impact of the greenhouse effect.” They basically argued that supporting development of various new technologies would stimulate the economy and create a lot of new jobs. Their primary obstacle in political circles, which are primarily made up of a lot of “old fogies,” was simply trying to explain a lot of the various new technologies, in terms of why they were important, to try to get support from fellow politicians for these things.
Gore was also largely responsible for the “Information Superhighway” term becoming popular in the 1990s. The first time he used the term publicly was way back in 1978 at a meeting of computer industry workers. Originally, this term didn’t mean the World Wide Web. Rather, it meant a system like the Internet. However, with the popularity of the World Wide Web, the three terms became synonymous with one another. In that speech, Gore used the term “Information Superhighway” to be analogous with Interstate Highways, referencing how they stimulated the economy after the passing of the National Interstate and Defense Highways Act of 1956. That bill was introduced by Al Gore’s father. It created a boom in the housing market; an increase in how mobile citizens were; and a subsequent boom in new businesses and the like along the highways. Gore felt that an “information superhighway” would have a similar positive economic effect.
Eleven militants were reportedly killed and no coalition forces were killed or wounded, according to US Africa Command spokeswoman Samantha Reho. She added that two of the militants were wearing suicide vests.
“The purpose of the mission was to set the conditions for future partner-led operations against violent extremist organizations in the region,” Reho said in The Times. “There was no aspect of this mission focused on pursuing enemy militants, and the combined force was postured to respond as necessary in case contact with the enemy occurred.”
But according to an anonymous military official familiar with the incident, the mission was to sweep through a potentially dangerous area so that Nigerien troops would be able to build an outpost.
Though Reho did not disclose why the Defense Department did not notify others of the incident, a House Republican aide told The Times that other lawmakers were notified of the December 2017 attack after it occurred.
Lawmakers previously pressured the White House and Pentagon for more information on the circumstances surrounding the ambush in October 2017, after military officials appeared to leave several congressional leaders in the dark.
“That’s not how the system works,” Sen. John McCain of Arizona said to CNN in October 2017. “We’re coequal branches of government. We should be informed at all times.”
The firefight was initially referenced in an unclassified report given to lawmakers this week as part of a broader report on the legality of using military force, according to The Times. The report notes that US-Nigerien troops were attacked “by elements assessed to be part of ISIS,” and that coalition forces “responded with armed force in self-defense.”
US Army Brig. Gen. Donald C. Bolduc, the former commander of US Special Operations in Africa, said that US troops and local training partners were attacked around 10 times from 2015 to 2017, The Times reported. Though enemy combatants were killed in these attacks, no US troops were reportedly killed.
The incident highlights some of the danger in conducting military operations in West Africa, just as military officials aim to curb the number of riskier missions. US Army Staff Sgt. Bryan Black, Staff Sgt. Jeremiah Johnson, Staff Sgt. Dustin Wright, and Sgt. La David Johnson were killed in October 2017 after they were ambushed by ISIS-affiliated militants.
Nazi Germany may have been one of the most evil regimes in history, but that regime also had some very good equipment. The Tiger tank, the Bf 109 and FW 190 fighters, the U-boat, and the MG42 machine gun were all very good.
Perhaps the most notorious weapon they had was called the “88.” Technically, it was called the 8.8 centimeter Flak 18, 36, 37, or 41, but most folks just described it with the number that referred to the gun’s bore diameter in millimeters. That was a measure of how notorious the gun was.
The first 88s were intended as anti-aircraft guns to kill bombers. They were very good at that – as many allied bomber crews found out to their sorrow. But the gun very quickly proved it was more than just an anti-aircraft gun, starting with its “tryout” in the Spanish Civil War. The gun also proved it could kill tanks.
According to MilitaryFactory.com, it could kill tanks from a mile away. When the Germans discovered that, they began to churn out 88mm guns as quickly as they could. As many as 20,700 were built, and they found themselves used on everything from Tiger tanks to naval vessels. Even after the war, the gun hung around, and during the war, it was something that allied forces quickly tried to neutralize. The 88 was even pressed into service with some Seventh Army units due to an ammo shortage.
The gun had a crew of seven, and weighed nine tons. The gun could be fired at targets as far as nine miles away. Very few of these guns are around now, but in World War II, many Allied troops wondered if the Germans would ever run out.
You can see video of one of the few surviving “88s” being fired below.
As the Marine Corps continues to adjust fire in the face of the ongoing COVID-19 pandemic, General David H. Berger, Commandant of the Marine Corps, has ordered a halt to Physical Fitness Tests (PFTs) across the Corps until further notice. Despite testing being suspended, however, Marines are still expected to stay in fighting shape.
Marines, the PFT requirement for this semi-annual period is cancelled in accordance with COVID-19 prevention guidelines. Our fitness to fight remains a priority, and I expect each of us to continue to maintain our fighting condition. Find details in a forthcoming MARADMIN.
“Marines, the PFT requirement for this semi-annual period is cancelled in accordance with COVID-19 prevention guidelines. Our fitness to fight remains a priority, and I expect each of us to continue to maintain our fighting condition. Find details in a forthcoming MARADMIN.” General Berger wrote.
The forthcoming MARADMIN, or Marine Administrative Message, will likely provide further guidance upon its release, including when Marines can expect to commence testing again.
The Marine Corps PFT, which consists of three timed events, is one of two fitness tests the Marine Corps uses to assess the physical readiness of each Marine. The PFT consists of dead hang pull ups (which can be substituted for push ups), crunches, and a three mile run. Because Marines do their crunches with a spotter that both holds their knees and keeps tally of the repetitions, it may have been deemed impossible to effectively practice social distancing during the execution of the test. Other events do not necessarily include such close proximity to other Marines, but may still have resulted in unnecessary exposure.
The military as a whole has been taking proactive steps to ensure the health and safety of service members, their families, and civilian DoD personnel. Recently, all members of the military were ordered to wear cloth masks in circumstances that don’t allow for social distancing, and everyone on base, regardless of whether they are military or civilian, are expected to wear masks when in close proximity with others.
Despite multiple overlapping initiatives, the military has seen a sharp rise in the number of infected service members in recent weeks, many of which hail from the Nimitz-class aircraft carrier the USS Theodore Roosevelt. Thus far, nearly 700 Sailors from the Roosevelt have tested positive for the coronavirus. The USS Harry S. Truman carrier strike group has been ordered to remain at sea for the time being in order to ensure the safety of the crew and the readiness of America’s rapid response to any potential threats.
Marines have played an active role in numerous DoD efforts relating to COVID-19, including a small detachment of Marines deployed to Guam to support the recovery of the Roosevelt’s crew. Marines from Lima Company, 3rd Battalion, 2nd Marine Regiment made headlines around the world last week when they sprinted life-saving oxygen tanks to ambulances waiting to transfer COVID-19 patients that were stuck waiting in traffic.
Taking care of others, and showing love and appreciation for others, is a core reason why retired Maj. Dennis “DJ” Skelton chose to stay in the Army. He continued to serve for 21 years, even after suffering grievous wounds during Operation Iraqi Freedom in 2004.
Skelton told his story to a large crowd of soldiers, veterans, and Army civilians during the “Why We Serve” ceremony hosted by the Army’s chief information officer/G-6, Sept. 5. During the event, 30 young men and women from the Baltimore and Richmond areas raised their right hand to take the Oath of Enlistment.
“I was kind of a punk kid growing up in a small farming community in South Dakota,” he said. “I barely graduated high school and had absolutely no discipline whatsoever, which is why I had a hard time holding down a job.”
Shortly after getting expelled from the University of South Dakota, Skelton eventually found his way to an Army recruiting office. A year later he was sent to training at Monterey, California, to learn Chinese at the Defense Language Institute.
Retired Maj. Dennis “DJ” Skelton shared his story to a large crowd of soldiers, veterans, and Army civilians during a “Why We Serve” ceremony, Sept. 5, 2019.
(Courtesy photo Maj. Dennis DJ Skelton)
At one point, two officers pulled Skelton aside and asked him, “‘Why are you here?'” Skelton looked up and couldn’t answer the question, he said.
Instead of turning Skelton away, the two officers decided to take an opportunity to encourage the young private. They encouraged him to become an Army officer.
“That was the first time in my life that I had been pulled aside by someone that looked at me from a distance and chose to spend some extra time with someone they did not know. They saw something in me that I didn’t see,” Skelton said.
Skelton eventually made it to the U.S. Military Academy at West Point, New York. After graduation, he moved to Joint Base Lewis-McChord, Washington. Not long after his arrival, he was told to prepare for a deployment in Iraq.
“I remember sitting on the tarmac waiting for the plane to load up,” he said. “No one in my unit has ever [deployed] before. I remember standing in front of my platoon — naive — and I looked at those family members and said, “‘I promise you this: I will bring all of your sons and daughters home.'”
Two months later, Skelton was wounded and in a coma. One of his soldiers, “went through a volley of fire to drag my body through the kill zone,” during a battle in Fallujah, Skelton said emotionally.
Battling for his life, Skelton was flown back for treatment at Walter Reed Army Medical Center in Maryland.
“This is 2004, and there was no Warrior Transition Unit. West Point professors, [and] enlisted soldiers that I served with found out that I was wounded and showed up at the hospital. They would cook food every night and delivered it to my parents, sister, and loved ones, because I couldn’t do that,” he said with sorrow.
Retired Maj. Dennis “DJ” Skelton discusses why he chose to stay in the Army after suffering grievous wounds during Operation Iraqi Freedom in 2004, during a “Why We Serve” ceremony at Fort Belvoir, Va., Sept. 5, 2019.
(Army CIO G6 photo)
A year later, Skelton was out of the hospital, and the Army was quick to start his medical evaluation board process. It was one thing to be injured, but the feeling of rejection and being told he no longer provided value to the Army felt worse, he said.
Skelton eventually convinced the Army to let him stay as he spent the next six years bouncing through various assignments.
“For six years, I did what everyone told me to do: ‘Be resilient.’ And for six years … what I learned is that I hate the word resilient more than any other word in the English language.”
To others, resilience is the measurement of time that it takes to get back to normal, Skelton added.
“For six years, I tried to get back to the point where I had two eyes [and] two limbs so I could go hunting, climbing, and fishing. That was a source of happiness. I want to go back to a time when I was not peppered with shrapnel so that I can look handsome again,” said Skelton, with sadness in his voice.
“The reality is we can’t; these negative things that happen to us are now forever part of us,” he said.
It took time, but Skelton eventually saw his injury as a source of his strength. Through it all, he recognized that each person brings value and worth to a team or organization, he said.
So to answer the question, ‘Why do I serve?’ I made a promise on a tarmac that I bring my soldiers home,” he said.
“Even though it took six years, I finally made my way back into the infantry. And even though it wasn’t [my same] platoon, I got to command the same company in which I was a platoon leader,” he said. “Some of my privates were now my NCOs. And I got to bring them back home.”
QUANTICO–In the Marine Corps’ rush to drop weight, one of the most beloved and storied pieces of gear could be left behind. At the service’s first Equipping the Infantry Challenge here Sept. 27, program managers said they’re looking for a lighter, more practical alternative to the iconic ammunition can.
Scott Rideout, program manager for ammunition at Marine Corps Systems Command, told industry leaders that the rectangular can, which today looks much the same as it did during World War II and Vietnam, may be overdue for an upgrade.
Marine Corps ammo comes to the warfighter, he said, “in the same metal can that it’s come in for 100 years. That metal can is one of those things that when the ammunition is brought to Marines, they take the ammunition out, distribute it however they’re going to distribute it, then throw [the can] away. The ammo can itself provides no value added to the Marine, except to help get the ammunition there.”
Some may disagree. The blog Shooter’s Log in 2013 listed 50 possible uses for the ammo can that range from improvised washing machine to anchor. Another website, Survival List Daily, topped that with 74 uses, including field toilet and cook pot.
The gear is even more central to Marine Corps identity: one of the elements of the Combat Fitness Test that all Marines must pass once a year is the ammunition can lift, in which troops are tested on the number of times they can lift a 30-pound can above their head and shoulders within two minutes.
But the calculus is simple, Rideout said: “Ounces equal pounds, and pounds equal pain.”
Emerging technology, such as logistics drones that might be able to carry resupply items to troops in the field, may also put limits on how much a new delivery of ammunition can weigh.
The cans, which weigh anywhere between three and seven pounds depending on their make and the caliber of ammunition, can amount to a quarter of the ammo weight that Marines are carrying, Rideout said.
“If we can get that weight out of the system, that’s more ammunition that can be resupplied to Marines to allow them to do their jobs,” he said. “So we need lighter-weight packaging. Ammo is what ammo is, but there are a couple areas out there where we can reduce weight to enable Marines to do their jobs better, especially against a near-peer type competitor or distributed ops.”
Ammo cans aren’t the only area getting a look.
Rideout and Mary Flower LeMaster, chief engineer for ammunition at SYSCOM, said the brass casing that houses bullets may also be ripe for improvement.
“The brass provides no value added to the weapons system; it’s just to enable the round and the propellant to interface with the weapon to provide effect downrange,” Rideout said. “That’s where we need to attack that weight. And there is technology out there that can do that and so we’re looking for industry to help us there.”
Rideout and LeMaster provided no alternatives to these key ammunition items, and it’s unclear how the Marine Corps might move forward with service-specific improvements to items used by multiple service branches, like ammo cans and brass. But this call-out to industry is in keeping with a broader service effort to solicit revolutionary ideas to improve the way Marines fight on the battlefield. During the same Infantry Equipping Challenge event, SYSCOM Commander Brig. Gen. Joseph Shrader said he wanted ideas for a meal, ready-to-eat optimized for Marine infantrymen in the field, with more efficient and practical packaging.
Currently, the ammunition managers said, they’re looking for ideas to improve five different calibers of ammo, as well as the cans: 9mm, 5.56, .762, .50-caliber, and .300 Winchester Magnum.
North Korean delegates scheduled to meet their counterparts from South Korea in the first dialogue between the countries in over two years will cross the contentious military demarcation line (MDL) separating the border, South Korean news outlet KBS reported Jan. 8.
South Korea’s Unification Ministry said that the North Korean officials will walk across the MDL at 9:30 a.m. local time to the Peace House at Panmunjom, or “truce village,” according to KBS. The walk from the MDL to the Peace House is roughly 250 meters, South Korean news outlet YTN reported.
The Peace House, located in the South Korean portion of Panmunjom, was previously used to hold talks with North Korea, including the prospect of reunifying families separated during the Korean War in the 1950’s.
The itinerary for the historic trip has been fully planned out, according to Reuters, and the discussion will focus around the upcoming 2018 Winter Olympics in South Korea next month, including the possibility of having North Korean athletes attend the event.
The MDL has seen escalated tensions in recent weeks, particularly due to several North Korean defections.
On Dec. 20, a “low ranking” soldier reportedly defected to South Korea, causing South Korean troops to fire warning shots towards North Korean border guards who approached the MDL in what appeared to be a search for their comrade.
In November, another defector crossed the border in a dramatic escape under a hail of gunfire. Video footage of the incident showed North Korean soldiers firing their weapons at the defector, and crossing the MDL in violation of the UN Armistice Agreement.