Communications troops don’t get nearly the amount of love that they deserve. Sure, the job description is very attractive to the more nerdy troops in formation and they’re far more likely to be in supporting roles than kicking in doors with the grunts, but they’re constantly working.
In Afghanistan, while everyone else is still asleep, the S-6 shop is up at 0430 doing radio work. This is just one of the many tasks the commo world is gifted with having.
(U.S. Army Photo)
The reason they’re up so early is because they need to change the communications security (or COMSEC) regularly. In order to ensure that no enemy force is able to hack their way into the military’s secure radio systems, the crypto-key that is encoded onto the radio is changed out.
Those keys are changed out at exactly the same moment everywhere around the world for all active radio systems. Because it would be impractical to set the time that COMSEC changes over at, the global time for radio systems is set in Zulu time, which is the current time in London’s GMT/UTC +0 time zone.
For troops stationed in Korea or Japan, this gives them a pleasant 0900 to change the COMSEC. Troops on America’s west coast have 1600 (which is great because it’s right before closeout formation.) If they’re stationed in Afghanistan however, they get the unarguably terrible time of 0430.
Each and every radio system that will be used needs to be refilled by the appropriate radio operator. When this is just before a patrol, the sole radio operator with the SKL (the device used to encrypt radios) will usually be jokingly heckled to move faster. The process usually takes a few minutes per radio, which could take a while.
This is also why the radios themselves are set to Zulu time. If the radio is not programmed to Zulu time — or if it’s slightly off —it won’t read the encryption right and radio transmissions won’t be effective. This goes to the exact second.
So maybe cut your radio guy some slack. The only time they could be spending sleeping is used to program radios.
It happens all the time. You open your Facebook and find a new friend request; zero mutual friends, no information, but a smoking hot profile picture.
Don’t flatter yourself. According to an Oxford University study, it’s more than likely not a “her” but is instead a bot account created to get fake pro-Putin news into your feed.
The Computational Propaganda Project, the team behind the study, says the political actors use bots to manipulate conversations, demobilize opposition, and generate false support on popular social media sites.
While the bots target both politically left and right leaning users, the study finds that it’s higher and more successful among Twitter users than Facebook. The bot would follow trending hashtags within the veteran community, such as #GoArmy and #Iraq, to find their target.
The account would have a generic name and a profile picture of an attractive person to lure users in. Once they’ve accepted or followed back, then it’s on.
John D. Gallacher, Oxford Professor of Cognitive Health, explains in his study that they analyzed data from subgroups of Twitter and Facebook users to target U.S. military personnel and veterans with junk news about military affairs, misinformation, and conspiracy theories.
To explain how this all would play out Barney-style: Something happens and it’s in the Kremlin’s best interest that Americans think of it a certain way. A programmer would create thousands of fake accounts that search for U.S. troops and veterans.
If they are successful in luring the troop or veteran in, they are barraged with a mix of fake news and legitimate content until the seed of doubt blooms.
Virginia Democrat Sen. Mark Warner told CNN that the epidemic of fake social media accounts is far larger than it appears. He told CNN the the 470 accounts Facebook identified as pro-Kremlin bots “doesn’t pass the smell test.” He further explained that prior to the recent French presidential election, Facebook took down over 30,000 bot accounts.
It should be noted however, that Russian journalists and activists are reportedly trying to take down the “troll farms” that spread misinformation across Europe and the United States.
“If it’s stupid and it works, it isn’t stupid,” is how the old saying goes. Though it isn’t said much anymore, the meaning behind it still rings true – and has for generations. A tactic that seems so stupid can be useful to the right mind. It can goad an enemy into losing focus and abandoning caution. These tactics can be used to influence an enemy’s thoughts and actions. It can even change the future for millions.
So don’t be so quick to judge.
Napoleon at Austerlitz
In the beginning of the 19th Century, Napoleon was making his presence known across Europe. The end of the old order was at hand as “The Little Corporal” from Corsica took control of the French and dominated the armies and rulers of Europe. But the social order wasn’t the only thing he upended. Napoleon upended the entire doctrine warfare, how battles were fought, forever. Nothing is more obvious than his win at Austerlitz, where a seemingly rookie mistake was the key to victory.
As Napoleon fielded the French to take on a superior Russian-Austrian force outside of Vienna, things looked bleak, and the French were widely expected to lose and be forced to flee Austria. With every passing day, Napoleon’s enemies became stronger. To goad them into a fight in the place of his choosing, he occupied the heights overlooking the town of Austerlitz, basic military strategy since the days of Sun-Tzu. As the combined enemy army approached, they saw the French abandon those heights. The battle was on, and Napoleon used the heights as a psych-out. Once the French took the heights in combat, the battle was over for the Russian-Austrian allies, and Napoleon was Master of Europe.
When the state of Israel was proclaimed in 1948, it was a jubilant day for the Jewish people – and no one else in the region. The Jews of the new nation of Israel were immediately surrounded on all sides by Arab enemies with superior numbers, technology, money, and basically anything else you might need to win a protracted war for independence. What the Israelis had going for them was a ton of World War II veterans and a lot of cunning brainpower. So even when they had to make bombing runs in single-engine prop planes, they managed to win the day even if they didn’t have bombs.
As an advancing Arab army approached Tel Aviv, the Jewish forces in the area were at a loss on how to repel them. They had no bombs to support the Israeli troops in the region, and even if they did, they had no bombers to fly them. They needed an equalizer. Someone with combat experience in WWII remembered that seltzer bottles tend to whistle like bombs when dropped from a height. When full of seltzer, they also explode with a loud bang. So that’s what the nascent IAF used. The Arabs didn’t really have seltzer or those old-timey bottles used to spray it, so they really thought they were being bombed – and disbursed.
The army led by a zombie
Some people are just so necessary for success you can’t afford to let them go. Unfortunately for Rodrigo Díaz de Vivar and the people of Valencia, one such person was missing when Muslim armies from Morocco were marching their way. They must have gotten wind that Rodrigo was no longer with the army of Valencia, which was true. Rodrigo was no longer among those defenders because Rodrigo was also no longer among the living. Since the Christian knight had never lost a battle, his reputation alone was enough to keep invaders at bay.
Luckily for Rodrigo – whom you might know better as El Cid – he had a pretty cunning wife, Jimena. Jimena ordered El Cid’s dead, decomposing body be fully armored and dressed, then lashed to his horse. Jimena then told the army to make a valiant last cavalry charge to break the siege, with El Cid at the head. When the Muslims saw the Spaniards coming at them with El Cid at the head of the attack, they immediately broke ranks and tried to flee but were cut down by the Spanish defenders.
Strong men marry strong women. Remember that.
Island-hopping to fight another day
In 1942, things looked really bad for the allied naval forces in the Pacific. The December 1941 attack on the U.S. Navy at Pearl Harbor came at the same time of a half dozen other surprise Japanese attacks throughout the region. Attempts to hit the Japanese back at the Java Sea and the Sunda Straits were met with abject failure. After the Japanese Empire captured the Dutch East Indies, the Navy was limping pretty bad. Hong Kong, Malaya, Burma, and more had all fallen to the mighty Japanese initiative. As all allied ships were ordered to retreat to Australia, one was somehow left behind.
That was the HNLMS Abraham Crijnssen, a Dutch minesweeper which was separated after the attacks on the East Indies. Armed with one three-inch gun and two 20mm cannons, the minesweeper was no match for any of the Japanese warships floating around the islands. In order to stay undetected, the Dutch covered the ship in foliage and painted the hull the color of rocks. They moored the ship near islands by day and moved only by night – and it worked. She not only made it to Australia, she survived the war.
(Laughs in Mongol)
Mongols think differently
For much of the Western World in the Middle Ages, a retreat was not a good thing. If a cavalry force appears routed, it might lead to the infantry breaking ranks and running. Even the most orderly of retreats was considered as an option only at the last possible moments. That was not how the Mongols under Genghis Khan thought of a retreat. A retreat was a tactic to be used like any other tactic.
There are many examples of the use of a feigned retreat in this history of the Mongol conquests. The reason for this is because it worked. It worked really really well. Troops from China to Poland would be locked in a life-or-death struggle against the Mongol hordes when suddenly the Mongols would turn tail and run, their spirit to fight seemingly broken. As a chorus of cheers went up from the exhausted defenders, they would inevitably give chase to the invaders – only to watch as the retreating Mongols turn again, in full force, and on ground that supports them.
“You can’t wrap love in a box, but you can wrap a person in a hug.” – Anonymous
US Air Force Veteran Elizabeth Laird, better known as the “Hug Lady” of Fort Hood, recently passed away at 83 years old. Over the years she wrapped her arms around more than 500,000 soldiers, according to the estimates of Army officials.
Initially, Laird volunteered to shake soldier’s hands. According to an interview with NBC’s Today Show, one soldier offered to give her a hug after she shook his hand. She went from handshakes to hugs from that moment on.
In 2003, she and Command Sgt. Maj. William “Joe” Gainey signed a memorandum of understanding formalizing her mission: Laird was now officially authorized to hug every Fort Hood soldier departing or arriving. She was there with open arms – no matter the time, weather, how large or small of a group, family circumstances, or her own cancer diagnosis.
“[She] wanted to make sure someone here at home is interested and waiting for them to come home again,” Laird’s son Richard Dewee said.
Col. Christopher C. Garver, a military spokesman, released a the following statement on Laird’s passing:
On behalf of the Soldiers, Airmen, Civilians, and Families of III Corps and Fort Hood, I want to extend our sincere condolences to the family of Mrs. Elizabeth Laird, known throughout Central Texas as “The Hug Lady.” She has long been associated with Fort Hood for her dedication, support, and genuine care for our Soldiers, Families and Civilian employees. For more than a decade, she has been personally saying farewell to our troops as they deploy and greeting them as they return. It is with heavy hearts that we express our gratitude for Elizabeth, not only for her service with the U.S. Air Force, but also in recognition of her tireless efforts to show her appreciation for our Soldiers and her recognition of their many sacrifices. Our thoughts and prayers are with her family and loved ones; she will be deeply missed.
Laird’s niece Becky Triplett posted the following on her Facebook page:
“When I talked to her the last time, she had been invited to the Rachel Ray show. When I asked if she was going she said ‘No I don’t think so, it wouldn’t be fair to the soldier coming or going. They deserve that hug more.’ She left a very good legacy. RIP Aunt Betty.”
An online petition to name the Fort Hood Deployment Center in Elizabeth Laird’s honor can be found here.
In accordance with the Justice Department’s recent efforts to disrupt business email compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals, including many senior citizens, the Department announced Operation Keyboard Warrior, an effort coordinated by United States and international law enforcement to disrupt online frauds perpetrated from Africa. Eight individuals have been arrested for their roles in a widespread, Africa-based cyber conspiracy that allegedly defrauded U.S. companies and citizens of approximately $15 million since at least 2012.
Acting Assistant Attorney General John P. Cronan of the Justice Department’s Criminal Division, U.S. Attorney D. Michael Dunavant of the Western District of Tennessee, Executive Assistant Director David T. Resch of the FBI and Acting Special Agent in Charge William C. Hoffman of the FBI Memphis Field Office, made the announcement on June 25, 2018.
Five individuals were arrested in the United States for their roles in the conspiracy including Javier Luis Ramos Alonso, 28, a Mexican citizen residing in Seaside, California; James Dean, 65, of Plainfield, Indiana; Dana Brady, 61, of Auburn, Washington; Rashid Abdulai, 24, a Ghanaian citizen residing in the Bronx, New York, who has been charged in a separate indictment; and Olufolajimi Abegunde, 31, a Nigerian citizen residing in Atlanta, Georgia. Maxwell Atugba Abayeta aka Maxwell Peter, 26, and Babatunde Martins, 62, of Ghana and Benard Emurhowhoariogho Okorhi, 39, a Nigerian citizen who resides in Ghana, have been arrested overseas and are pending extradition proceedings to face charges filed in the Western District of Tennessee.
The indictment also charges Sumaila Hardi Wumpini, 29; Dennis Miah, 34; Ayodeji Olumide Ojo, 35, and Victor Daniel Fortune Okorhi, 35, all of whom remain at large. Abegunde had his detention hearing today before U.S. District Court Judge Sheryl H.
Lipman of the Western District of Tennessee, who ordered him detained pending trial, which has been set for October 9, 2018.
(Cliff / Flickr)
“The defendants allegedly unleashed a barrage of international fraud schemes that targeted U.S. businesses and individuals, robbing them to the tune of approximately million,” said Acting Assistant Attorney General Cronan. “The Department of Justice will continue to work with our international partners to aggressively disrupt and dismantle criminal enterprises that victimize our citizens and businesses.”
U.S. Attorney D. Michael Dunavant said: “Frauds perpetrated through the Internet cause significant financial harm to businesses and individuals in our District and throughout the United States. Because those committing Internet fraud hide behind technology, the cases are difficult – but not impossible – to investigate. We will continue to deploy our resources to take on these difficult cases and seek justice for citizens harmed by Internet scammers.”
“The devastating effects that cybercrime and business email compromise have on victims and victim companies cannot be understated, and the FBI has made it a priority to work with our law enforcement partners around the world to end these fraud schemes and protect the hard-earned assets of our citizens,” said William C. Hoffman, Acting Special Agent in Charge of the Memphis Field Office of the Federal Bureau of Investigation. “These charges are the result of the diligence, hard work and tenacity of the best and smartest investigators and prosecutors, to overcome the challenges faced when dealing with sophisticated efforts to hide criminal activity that involves numerous people in multiple countries, and should send a signal that criminals will not go undetected and will be held accountable, regardless of where they are.”
The indictment was returned by a grand jury in the U.S. District Court for the Western District of Tennessee on Aug. 23, 2017, and charges the defendants with conspiracy to commit wire fraud, wire fraud, conspiracy to commit money laundering, conspiracy to commit computer fraud, and aggravated identity fraud.
The indictment alleges that the Africa-based co-conspirators committed, or caused to be committed, a series of intrusions into the servers and email systems of a Memphis-based real estate company in June and July 2016. Using sophisticated anonymization techniques, including the use of spoofed email addresses and Virtual Private Networks, the co-conspirators identified large financial transactions, initiated fraudulent email correspondence with relevant business parties, and then redirected closing funds through a network of U.S.-based money mules to final destinations in Africa. Commonly referred to as business email compromise, or BEC, this aspect of the scheme caused hundreds of thousands in loss to companies and individuals in Memphis.
(Photo by Christiaan Colen)
In addition to BEC, the Africa-based defendants are also charged with perpetrating, or causing to be perpetrated, various romance scams, fraudulent-check scams, gold-buying scams, advance-fee scams, and credit card scams. The indictment alleges that the proceeds of these criminal activities, both money and goods, were shipped and/or transferred from the United States to locations in Ghana, Nigeria, and South Africa
through a complex network of both complicit and unwitting individuals that had been recruited through the various Internet scams. The defendants are also charged with concealing their conduct by, among other means, stealing or fraudulently obtaining personal identification information (PII) and using that information to create fake online profiles and personas. Through all their various schemes, the defendants are believed to have caused millions in loss to victims across the globe.
An indictment is merely an allegation and the defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
The FBI led the investigation. The FBI’s Transnational Organized Crime of the Eastern Hemisphere Section of the Criminal Investigative Division, Major Cyber Crimes Unit of the Cyber Division, and International Organized Crime Intelligence and Operations Center all provided significant support in this case, as did INTERPOL Washington, the U.S. Marshals Service, and the U.S. Attorney’s Offices of the Northern District of Georgia, Western District of Washington, Central District of California, Southern District of New York, and the Northern District of Illinois.
Senior Trial Attorney Timothy C. Flowers of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Debra L. Ireland of the U.S. Attorney’s Office for the Western District of Tennessee are prosecuting the case, with significant assistance from the Department of Justice’s Office of International Affairs.
This article originally appeared on the United States Department of Justice. Follow @WDTNNews on Twitter.
When America needs to break its way into an enemy country, these are the people who slip, kick, or explode their way past the defenses and blaze the way for follow-on forces.
1. Marine Raiders
Marine Raiders are the rank and file of the Marine Special Operations Command. MARSOC fields three Raider battalions that conduct special reconnaissance, counterinsurgency, and direct action missions. The Raiders trace their lineage to World War II where Marine Raiders led beach assaults, conducted raids and used guerrilla tactics against Japanese defenders.
2. Green Berets
The Army’s special forces soldiers were famously some of the first troops in Afghanistan where they rode horses to get to the enemy. They guarded Hamid Karzai when he was an unknown politician putting together a militia to aid an American invasion, and they’ve served in dozens of unpublicized conflicts around the world.
They got Bin Laden in Pakistan, saved Capt. Richard Phillips from Somali pirates, and produced “American Sniper” legend Chief Petty Officer Chris Kyle. Navy SEALs are the sea services’ most capable fighters on terra firma.
5. Army Rangers
U.S. Army Rangers first led the way into combat in 1775. These elite infantrymen took out key positions on D-Day, led the way into Panama in Operation Just Cause, played a huge role in Somalia, and conducted airborne assaults into both Afghanistan and Iraq.
6. Force Recon Marines
Recon Marines work for Marine ground commanders, moving ahead of other forces into any area where the commander needs “eyes on” but can’t otherwise get them.
The popular miniseries “Generation Kill” followed a group of these Marines spearheading the invasion of Iraq and feeding information up the chain to Gen. James “Mad Dog” Mattis and other senior leaders.
7. Carrier-based aircraft
The Navy’s carrier groups provide an awesome platform for launching jets against American enemies, quickly conducting air strikes when the wars opened in Afghanistan, Iraq, and then Syria. This is done primarily by Navy Super Hornet air wings, though Marine Corps Harriers fly missions from carriers as well.
8. F-22 fighter wings
The F-22 proved its capabilities in Syria. When it entered the fight about a month after airstrikes against ISIS began, it slipped past enemy air defenses to take out protected targets. It now escorts other jets past enemy air defenses, using its sensors to detect threats and targets.
9. Naval ships
While U.S. ships rarely get to mix it up with enemy navies these days, they still get to launch the opening blows in a fight by using long range cruise missiles, especially the Tomahawk Block IV. Navy destroyers, cruisers, and submarines have launched Tomahawks against Syria, Libya, Iraq, Sudan, Afghanistan, Kosovo … ( actually, just see the full list at the Naval History Blog).
10. 509th Bomb Wing
The 509th Bomb Wing operates most of America’s B-2s, the stealth bomber that can slip into enemy airspace, destroy air defenses and runways, and then leave without the enemy knowing what happened. The B-2 has been used in strikes in Kosovo, Afghanistan, and Iraq and flew many of its missions from Missouri to the target and back, taking about 30 hours for each mission.
On Nov. 16, 2018, the Air Force announced the first two bases that will host its new, highly advanced bomber for testing and maintenance.
The service said in a release that Tinker Air Force Base in Oklahoma would coordinate maintenance and sustainment for the B-21 Raider and that Edwards Air Force Base in California had been picked to lead testing and evaluation of the next generation long-range strike bomber.
Robins Air Force Base in Georgia and Hill Air Force Base in Utah will support Tinker with maintaining and, when necessary, overhauling and upgrading the new bomber, the Air Force said.
Personnel at those bases will be equipped to rebuild the aircraft’s parts, assemblies, or subassemblies as well as to test and reclaim equipment as necessary for depot activations.
The first B-21 is expected to be delivered in the mid-2020s.
A B-2A stealth bomber at Tinker Air Force Base in Oklahoma during a visit on April 11, 2017.
(US Air Force photo by Greg L. Davis)
The release noted the “deep and accomplished history” of the Air Logistics Complex of the Air Force Sustainment Center at Tinker and said officials believe the base has the knowledge and expertise to support the new bomber.
“With a talented workforce and decades of experience in aircraft maintenance, Tinker AFB is the right place for this critical mission,” Air Force Secretary Heather A. Wilson said.
Edwards Air Force Base is also home to the Air Force Test Center, which leads the service’s testing and evaluation efforts.
“From flight testing the X-15 to the F-117, Edwards AFB in the Mohave Desert [sic] has been at the forefront of keeping our Air Force on the cutting edge,” Air Force Chief of Staff Gen. David L. Goldfein said. “Now testing the B-21 Raider will begin another historic chapter in the base’s history.”
Air Force Brig. Gen. Carl Schaefer, head of the 412th Test Wing at Edwards, said in 2018 that the B-21 would be tested at the base. Few details about the B-21’s development have been released, and previous reports suggested it could be tested at the Air Force’s secretive Area 51 facility.
A B-1B Lancer bomber awaits maintenance at Tinker Air Force Base in Oklahoma, Jan. 27, 2017
(US Air Force photo by Greg L. Davis)
The B-21 acquisition cycle is currently in the engineering and manufacturing-development phase, the Air Force said. The Raider’s design and development headquarters is at Northrop Grumman’s facility in Melbourne, Florida.
The Air Force expects to buy about 100 of the new bomber, with each cost over 0 million, according to Air Force Times.
The Air Force said in May 2018 that once the new bombers begin arriving they will head to three bases in the US — Dyess Air Force Base in Texas, Ellsworth Air Force Base in South Dakota, and Whiteman Air Force Base in Missouri.
The service said those bases were “reasonable alternatives” for the new bomber, although it will likely not make a final basing decision until 2019.
The B-21 is to replace the B-1 Lancer and B-2 Spirit bombers at those bases, but the Air Force doesn’t plan to retire the existing bombers until there are enough B-21s to replace them.
Using existing bomber bases would reduce operational impact, lower overhead, and minimize costs, the Air Force said in May. “Our current bomber bases are best suited for the B-21,” Wilson said at the time.
This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
By the time Nazi Germany launched Operation Barbarossa, they were already at war with the British Empire, Yugoslavia, and Greece. Poland, France, and much of Western Europe had already fallen, but governments in exile joined the Allied effort against the Axis powers. So, the natural thing to do would be invade the world’s largest country, right?
If you’re Hitler, obviously, your answer is yes.
But Hitler just secured dominance of Continental Europe and was risking it by going up against a major world power with whom he had a treaty of nonaggression. Hitler’s lebensraum theory aside, the reason he launched the 1941 attack on the Soviet Union is that he just didn’t know how strong the Soviet Union actually was.
Intel and all that.
Yeah, no big deal.
There is only one audio recording of Adolph Hitler speaking in a conversational voice, as opposed to the multitude of films of the man making incendiary speeches at rallies and events. He is speaking with the Commander-In-Chief of Finnish Defense Forces Carl Gustaf Emil Mannerheim, who was engaged with the Third Reich in a war against the USSR.
“If someone had told me that a country could start with 35,000 tanks, then I’d have said, ‘You are crazy!’,” the German dictator told Mannerheim in the 1942 recording. “If one of my generals had stated that any nation had 35,000 tanks, I’d have said: ‘You, my good sir, you see everything twice or ten times.You are crazy, you are seeing ghosts.’“
In the 11-minute audio clip obtained by the History Channel, Mannerheim and Hitler were recorded secretly by a Finnish engineer, since Hitler would never allow such recordings. The SS soon realized the dictator was being recorded and ordered the engineer to shut it off immediately. He was somehow allowed to keep it a secret — and he did, until 1957.
“It was unbelievable,” he said of a factory in Donetsk that was able to produce some 3,000-6,000 tanks alone before the Nazis shut it down.
But Hitler goes on to say that even if he had known about the military and industrial capacity of the Soviet Union’s massive centralized labor force and output potential, he would have invaded anyway. By the winter of 1939-1940, he says, it was clear there would be war between them. He just knew he couldn’t fight the Soviets and the Western Allies in a two-front war — saying it would have broken Nazi Germany.
Well, he got that part right at least.
The Führer goes on to admit that the Germans were poorly prepared to fight a war in the extreme weather of the Eastern Front.
“Our whole armament, you know, is a pure good weather armament,” He said. “It is very capable, very good, but is unfortunately just a good weather armament. Our weapons were naturally made for the West… and it was the opinion from the earliest of times: you cannot wage war in winter.”
I’m pretty sure this depiction of Soviet General Winter is what inspired Metallica’s “Enter Sandman.”
Hitler goes on to talk smack about the “weakness of Italy,” referring to Mussolini’s failures in North Africa, Albania, and Greece, where German army and air assets were forced to divert from the buildup to invading the USSR to instead go rescue Italian troops being repulsed by the Greeks. Three entire divisions were sent to reinforce the Italians instead of invading Russia.
He believed the Soviets had their own designs on ruling all of Europe and that he had to launch when he did to keep them from capturing the oil fields in Romania, which Hitler believed would have been Nazi Germany’s death blow — which wasn’t entirely wrong.
That’s why the U.S. Army Air Corps blew it up in 1943.
Since the recording was cut off, no one really knows what else the two men talked about in their secret meeting that day, but it’s believed that in that meeting, Mannerheim realized Hitler’s position was weak and would no longer act subordinate to him for the duration of World War II.
There has been widespread speculation that Russia played a hand in their incapacitation, and Foreign Secretary Boris Johnson said it has “echoes” of the Litvinenko case, when a former Russian spy was poisoned in Britain with a radioactive isotope in 2006.
It’s not yet clear what caused the Skripals’ illness, and Russia has strongly and repeatedly denied any involvement. But The Sun reports that military scientists working on the case believe the pair might have been poisoned with “hybrid” kind of thallium, a hard-to-trace heavy metal.
Thallium has historically been used in rat poison, according to MedicineNet, and “is particularly dangerous because compounds containing thallium are colorless, odorless, and tasteless.”
Meanwhile, The Daily Mail reports that investigators are considering the possibility that a poison — whatever chemical it was — was sprayed in Skripal’s face, hence his rapid deterioration and collapse. There has also been speculation from experts without inside knowledge of the case that it might have been a nerve agent administered in an aerosol.
At a young age, Carlos Norman Hathcock II would go into the woods with his dog and the Mauser his father brought back from World War II to pretend to be a soldier. Hathcock dreamed of being a Marine throughout his childhood, and on May 20, 1959, at the age of 17, he enlisted.
In 1966, Hathcock started his deployment in South Vietnam. He initially served as a military policeman and later, owing to his reputation as a skilled marksman, served as a sniper.
The Hathcock brothers and a friend, shooting as children.
During the Vietnam War, Hathcock had 93 confirmed kills of North Vietnamese Army (NVA) and Viet Cong personnel. However, kills had to be confirmed by an acting third party, who had to be an officer, besides the sniper’s spotter. Hathcock estimated that he actually killed between 300 and 400 enemy soldiers.
In one instance, Hathcock saw a glint reflecting off an enemy sniper’s scope. He fired at it, sending a round through the enemy’s own rifle scope, hitting him in the eye and killing him.
Hathcock’s notoriety grew among the Viet Cong and NVA, who reportedly referred to him Du kích Lông Trắng (“White Feather Sniper”) because of the white feather he kept tucked in a band on his bush hat. The enemy placed a bounty on his head. After a platoon of Vietnamese snipers tried to hunt him down, many Marines donned white feathers to deceive the enemy. Hathcock successfully fought off numerous enemy snipers during the remainder of his deployment.
Hathcock did once remove the white feather from his bush hat during a volunteer mission. The mission was so risky he was not informed of its details until he accepted it. Transported to a field by helicopter, Hathcock crawled over 1,500 yards in a span of four days and three nights, without sleep, to assassinate an NVA general. At times, Hathcock was only a few feet away from patrolling enemy soldiers. He was also nearly bitten by a snake. Once in position, Hathcock waited for the general to exit his encampment before shooting. After completing this mission, Hathcock came back to the United States in 1967. However, missing the service, he returned to Vietnam in 1969, taking command of a sniper platoon.
On September 16, 1969, an AMTRAC Hathcock was riding on struck an anti-tank mine. He pulled seven Marines from the vehicle, suffering severe burns in the process. Hathcock received the Purple Heart while he was recuperating. Nearly 30 years later, he received a Silver Star for this action.
After returning to active duty, Hathcock helped establish the Marine Corps Scout Sniper School at the Marine base in Quantico, Virginia. However, he was in near constant pain due to his injuries, and in 1975, his health began to deteriorate. After diagnosed with multiple sclerosis, he medically discharged in 1979. Feeling forced out of the Marines, Hathcock fell into a state of depression. But with the help of his wife, and his newfound hobby of shark fishing, Hathcock eventually overcame his depression. Despite being retired from the military, Hathcock continued providing sniper instruction to police departments and select military units, such as SEAL Team Six.
In any case, it’s probably the coolest thing any movie spy was ever issued. James Bond, with his “00” designation has one, and maybe a whole handful of real-world MI6 agents do too — because they’re real.
The result was no, of course they didn’t. But what it did reveal was a look at how the intelligence agency operates, especially in regards to targeted killings. It turns out British operatives are allowed to kill their enemies.
But first they need a Class Seven Authorisation and the personal signature of the Foreign Secretary.
Richard Dearlove, the former head of Britain’s spy agency, revealed this during the inquiry. Diana and her lover, Dodi al-Fayed, were killed in a 1997 car accident in Paris. Ten more agents were required to give testimony in 2008 as the royal family faced accusations of wrongdoing from al-Fayed’s father, Mohamed.
Actually getting the Class Seven Authorisation is easier than it sounds. According to Dearlove’s testimony, once the paperwork is finished, it has to be signed off by a “senior regional official.” Then, it would have to go through the chief of the agency — in Diana’s case, it would have been Dearlove.
After that, it would have to “go down restricted channels to the Foreign Secretary.”
Socialism turns even the smallest tasks into a whole bureaucratic ordeal. I bet the process was much smoother when Maggie Thatcher was in office.
If fighting the well-defended Viet Cong on their home turf wasn’t dangerous enough, imagine having to crawl your way through a series of extremely tight and narrow underground tunnels to capture or kill them.
Armed with only a flashlight, a single pistol, or maybe just a knife, a “Tunnel Rat” didn’t have much in the way of defense.
“The most dangerous part would be psyching up to get into the tunnel,” Carl Cory says, a former 25th Infantry Div Tunnel Rat. “That was the part that was most frightening because you didn’t what you were getting into.”
It was the duty of the brave Tunnel Rat to slide alone into the tunnel’s entrance then search for the enemy and other valuable intelligence. Due to the intense and dangerous nature of the job, many Tunnel Rats became so emotionally desensitized that entering a spider hole was just another day at the office — no big deal.
With danger lurking around every corner, the Tunnel Rat not only had to dodge the various savage booby traps set by the Viet Cong, but typically only carried 6-7 rounds of ammunition with him even though the tunnels were commonly used to house up to a few dozen enemy combatants.
With all those physical dangers to consider, the courageous troop still needed to maintain a clear and precise mental state of mind and not let the fear get the best of him.
After completing a search, many American and South Vietnamese units would rig the tunnels with C-4 explosives or bring in the always productive flamethrowers to flush out or kill any remaining hostiles.