Privacy Policy

Privacy Policy

This Privacy Policy describes the policies and procedures of The Mighty Networks, Inc. ("we", "our" or "us") on the collection, use and disclosure of your information on www.wearethemighty.com (the "Site") and the services, features, content or applications we offer (collectively with the Site, the "Services"). We receive information about you from various sources, including: (i) if you register for the Site and the Services, through your user account on the Services (your "Account"); (ii) your use of the Services generally; and (iii) from third party websites and services. When you use the Services, you are consenting to the collection, transfer, manipulation, storage, disclosure and other uses of your information as described in this Privacy Policy.


What Does This Privacy Policy Cover?

This Privacy Policy covers the treatment of personally identifiable information ("Personal Information") gathered when you are using or accessing the Services. This Privacy Policy also covers our treatment of any Personal Information that our business partners share with us or that we share with our business partners.

This Privacy Policy does not apply to the practices of third parties that we do not own or control, including but not limited to any third party websites, services and applications, such as Facebook ("Third Party Services") that you elect to access through the Service or to individuals that we do not manage or employ. While we attempt to facilitate access only to those Third Party Services that share our respect for your privacy, we cannot take responsibility for the content or privacy policies of those Third Party Services. We encourage you to carefully review the privacy policies of any Third Party Services you access.

What Information Do We Collect?

The information we gather enables us to personalize, improve and continue to operate the Services. In connection with certain aspects of the Services, we may request, collect and/or display some of your Personal Information. We collect the following types of information from our users.

Account Information:

When you create an Account, you will provide information that could be Personal Information, such as your username, password and email address. You acknowledge that this information may be personal to you, and by creating an account on the Services and providing Personal Information to us, you allow others, including us, to identify you and therefore may not be anonymous. We may use your contact information to send you information about our Services, but only rarely when we feel such information is important. You may unsubscribe from these messages through your Account settings, although we, regardless, reserve the right to contact you when we believe it is necessary, such as for account recovery purposes.

User Content:

Some features of the Services allow you to provide content to the Services, such as written comments. All content submitted by you to the Services may be retained by us indefinitely, even after you terminate your account. We may continue to disclose such content to third parties in a manner that does not reveal Personal Information, as described in this Privacy Policy.

IP Address Information and Other Information Collected Automatically:

We automatically receive and record information from your web browser when you interact with the Services, including your IP address and cookie information. This information is used for fighting spam/malware and also to facilitate collection of data concerning your interaction with the Services (e.g., what links you have clicked on).

Generally, the Services automatically collect usage information, such as the number and frequency of visitors to the Site. We may use this data in aggregate form, that is, as a statistical measure, but not in a manner that would identify you personally. This type of aggregate data enables us and third parties authorized by us to figure out how often individuals use parts of the Services so that we can analyze and improve them.

Email Communications:

We may receive a confirmation when you open an email from us. We use this confirmation to improve our customer service.

Information Collected Using Cookies:

Cookies are pieces of text that may be provided to your computer through your web browser when you access a website. Your browser stores cookies in a manner associated with each website you visit. We use cookies to enable our servers to recognize your web browser and tell us how and when you visit the Site and otherwise use the Services through the Internet.

Our cookies do not, by themselves, contain Personal Information, and we do not combine the general information collected through cookies with other Personal Information to tell us who you are. As noted, however, we do use cookies to identify that your web browser has accessed aspects of the Services and may associate that information with your Account if you have one.

Most browsers have an option for turning off the cookie feature, which will prevent your browser from accepting new cookies, as well as (depending on the sophistication of your browser software) allowing you to decide on acceptance of each new cookie in a variety of ways. We strongly recommend that you leave cookies active, because they enable you to take advantage the most attractive features of the Services.

This Privacy Policy covers our use of cookies only and does not cover the use of cookies by third parties. We do not control when or how third parties place cookies on your computer. For example, third party websites to which a link points may set cookies on your computer.

Information Related to Advertising and the Use of Web Beacons:

To support and enhance the Services, we may serve advertisements, and also allow third parties advertisements, through the Services. These advertisements are sometimes targeted and served to particular users and may come from third party companies called "ad networks." Ad networks include third party ad servers, ad agencies, ad technology vendors and research firms.

Advertisements served through the Services may be targeted to users who fit a certain general profile category may be based on anonymized information inferred from information provided to us by a user, including Personal Information (e.g., gender or age), may be based on the Services usage patterns of particular users, or may be based on your activity on Third Party Services. We do not provide Personal Information to any ad networks for use outside of the Services.

To increase the effectiveness of ad delivery, we may deliver a file (known as a "web beacon") from an ad network to you through the Services. Web beacons allow ad networks to provide anonymized, aggregated auditing, research and reporting for us and for advertisers. Web beacons also enable ad networks to serve targeted advertisements to you when you visit other websites. Because your web browser must request these advertisements and web beacons from the ad network's servers, these companies can view, edit or set their own cookies, just as if you had requested a web page from their site.

Aggregate Information:

We collect statistical information about how both unregistered and registered users, collectively, use the Services ("Aggregate Information"). Some of this information is derived from Personal Information. This statistical information is not Personal Information and cannot be tied back to you, your Account or your web browser.

How, and With Whom, Is My Information Shared?

The Services are designed to help you share information with others. As a result, some of the information generated through the Services is shared publicly or with third parties.

Public Information about Your Activity on the Services:

Some of your activity on and through the Services is public by default. This may include, but is not limited to, content you have posted publicly on the Site or otherwise through the Services, such as written posts, comments, or other submissions by you to the Site.

Registered users may have some of this information associated with their Accounts. Unregistered users will not have this association, but information concerning their use of the Services (such as what pages they have visited) may be tracked anonymously through the use of cookies and stored by us.

Please also remember that if you choose to provide Personal Information using certain public features of the Services, then that information is governed by the privacy settings of those particular features and may be publicly available. Individuals reading such information may use or disclose it to other individuals or entities without our control and without your knowledge, and search engines may index that information. We therefore urge you to think carefully about including any specific information you may deem private in content that you create or information that you submit through the Services.

IP Address Information:

While we collect and store IP address information, that information is not made public. We do at times, however, share this information with our partners, service providers and other persons with whom we conduct business, and as otherwise specified in this Privacy Policy.

Information You Elect to Share:

You may access other Third Party Services through the Services, for example by clicking on links to those Third Party Services from within the Site. We are not responsible for the privacy policies and/or practices of these Third Party Services, and you are responsible for reading and understanding those Third Party Services' privacy policies. This Privacy Policy only governs information collected on the Services.

Aggregate Information:

We share Aggregate Information with our partners, service providers and other persons with whom we conduct business. We share this type of statistical data so that our partners can understand how and how often people use our Services and their services or websites, which facilitates improving both their services and how our Services interface with them. In addition, these third parties may share with us non-private, aggregated or otherwise non Personal Information about you that they have independently developed or acquired.

Email Communications with Us:

As part of the Services, you may occasionally receive email and other communications from us, such as communications relating to your Account. Communications relating to your Account will be sent for purposes important to the Services, such as password recovery. We may use your email address to contact you for editorial purposes, to advise you of any changes to our Site, and to send you messages about our marketing partners' products.

User Profile Information:

User profile information including your username and other information you enter may be displayed to other users to facilitate user interaction within the Services. We will not directly reveal user email addresses to other users.

Information Shared with Our Agents:

We employ and contract with people and other entities that perform certain tasks on our behalf and who are under our control (our "Agents"). We may need to share Personal Information with our Agents in order to provide products or services to you. Unless we tell you differently, our Agents do not have any right to use Personal Information or other information we share with them beyond what is necessary to assist us. You hereby consent to our sharing of Personal Information with our Agents.

Information Disclosed Pursuant to Business Transfers:

In some cases, we may choose to buy or sell assets. In these types of transactions, user information is typically one of the transferred business assets. Moreover, if we, or substantially all of our assets, were acquired, or if we go out of business or enter bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of us or our assets may continue to use your Personal Information as set forth in this policy.

Information Disclosed for Our Protection and the Protection of Others:

We also reserve the right to access, read, preserve, and disclose any information as it reasonably believes is necessary to (i) satisfy any applicable law, regulation, legal process or governmental request, (ii) enforce these Terms of Service, including investigation of potential violations hereof, (iii) detect, prevent, or otherwise address fraud, security or technical issues, (iv) respond to user support requests, or (v) protect our rights, property or safety, our users and the public. This includes exchanging information with other companies and organizations for fraud protection and spam/malware prevention.

Information We Share With Your Consent:

Except as set forth above, you will be notified when your Personal Information may be shared with third parties, and will be able to prevent the sharing of this information.

Is Information About Me Secure?

Your Account information will be protected by a password for your privacy and security. You need to prevent unauthorized access to your Account and Personal Information by selecting and protecting your password appropriately and limiting access to your computer and browser by signing off after you have finished accessing your Account.

We seek to protect Account information to ensure that it is kept private; however, we cannot guarantee the security of any Account information. Unauthorized entry or use, hardware or software failure, and other factors, may compromise the security of user information at any time.

We otherwise store all of our information, including your IP address information, using industry-standard techniques. We do not guarantee or warrant that such techniques will prevent unauthorized access to information about you that we store, Personal Information or otherwise.

What Information of Mine Can I Access?

If you are a registered user, you can access information associated with your Account by logging into the Services. Registered and unregistered users can access and delete cookies through their web browser settings.

California Privacy Rights: Under California Civil Code sections 1798.83-1798.84, California residents are entitled to ask us for a notice identifying the categories of personal customer information which we share with our affiliates and/or third parties for marketing purposes, and providing contact information for such affiliates and/or third parties. If you are a California resident and would like a copy of this notice, please submit a written request to the following address: INSERT ADDRESS

How Can I Delete My Account?

Should you ever decide to delete your Account, you may do so by emailing info@wearethemighty.com. If you terminate your Account, any association between your Account and information we store will no longer be accessible through your Account. However, given the nature of sharing on the Services, any public activity on your Account prior to deletion will remain stored on our servers and will remain accessible to the public.

What Choices Do I Have Regarding My Information?

You can use many of the features of the Services without registering, thereby limiting the type of information that we collect.

You can always opt not to disclose certain information to us, even though it may be needed to take advantage of some of our features.

You can delete your Account. Please note that we will need to verify that you have the authority to delete the Account, and activity generated prior to deletion will remain stored by us and may be publicly accessible.

What Happens When There Are Changes to this Privacy Policy?

We may amend this Privacy Policy from time to time. Use of information we collect now is subject to the Privacy Policy in effect at the time such information is used. If we make changes in the way we collect or use information, we will notify you by posting an announcement on the Services or sending you an email. A user is bound by any changes to the Privacy Policy when he or she uses the Services after such changes have been first posted.

What If I Have Questions or Concerns?

If you have any questions or concerns regarding privacy using the Services, please send us a detailed message to info@wearethemighty.com.

- See more at: http://www.wearethemighty.com/privacy-policy/#sthash.FHexgrjq.dpuf

The Air Force snagged the alleged Minot M240 thief

The Air Force's long national nightmare is over. Its missing M240 machine gun was finally recovered from the home of an airman stationed at the base, according to a press release from the Air Force Global Strike Command.

The theft prompted many to question how it could have been lost, why the Air Force has an M240, does the Air Force really need an M240, how many do they have or need, and would the Air Force notice if I took one.

The Air Force Office of Special Investigations obtained a federal search warrant, executing it at the off-base residence of a Team Minot airman on June 19, 2018.

Missing for little over a month, the automatic weapon and the fallout of its theft made waves across the military-veteran community and in the military news cycle. After a box of 40mm MK 19 grenades fell off the back of a humvee while traversing a Native American reservation, the subsequent inventory of the Air Force arsenal on Minot discovered the missing M240 machine gun. This prompted the 5th Bomb Wing, 91st Missile Wing, and other installations to make a thorough inventory of their weapons.

Keep reading... Show less
Articles

This Microsoft training fast tracks veterans into sweet tech careers

Solaire Brown (formerly Sanderson) was a happy, gung-ho Marine sergeant deployed in Afghanistan when she realized her military career was about to change. She was tasked with finding the right fit for her post-military life – and she knew she wanted to be prepared.

Injuries sustained during mine-resistant vehicle training had led to surgeries and functional recovery and it became clear Brown would no longer be able to operate at the level she expected of herself as a Marine.

Like many of the 200,000 service members exiting the military each year, Brown knew her military training could make her a valuable asset as an employee, but she was unsure of how her skills might specifically translate to employment in the civilian world.

Enter Microsoft Software & Systems Academy (MSSA), a program Microsoft started in 2013 to provide transitioning service members and veterans with critical career skills required for today's growing technology industry.

Keep reading... Show less
History

The horrifying way Iran cleared mines in the Iran-Iraq War

The only good mines are one that are cleared — or better yet, never used in the first place. Today mines are generally seen as relics of bygone eras, deadly weapons that remain dangerous long after the war is fought. Forgotten minefields all over the world kill civilians by the score – more than 8,600 in 2016 alone. Many of these are children.

Many who join armed forces around the world do so with the idea that they can keep their children and families – along with the children and families of their fellow countrymen – safe from the imminent dangers of impending war. When faced with an existential threat, countries will go to horrifying lengths to defend themselves.

This isn't World War I — it's the 1980s. No one told Saddam or Khomeini.

Such was the case in the early 1980s, the nascent years of the Islamic Republic of Iran. Iran fought a brutal war against Iraq since 1980, when Iraqi dictator Saddam Hussein smelled blood in the disorganized post-Revolution Iran and attempted to seize its access to the Persian Gulf by force.

The Iran-Iraq War was particularly brutal, even as far as warfare in the Middle East is concerned. The war was defined by eight years of stalemates and failed offensives, indiscriminate ballistic missile attacks — often using chemical weapons — and insane asymmetrical warfare.

Insane symmetrical warfare is a very clean term for the tactics Iran used to level the playing field of the Western-backed, technologically superior Iraqis. Iran recently purged its professional military of those loyal to the deposed Shah and was by no means ready to fight a war with a series of Revolutionary militias. The Ayatollah Khomeini was no military commander. He saw a success in war in terms of casualties inflicted on the enemy versus the number his forces took, a World War I-era approach to warfare.

They also dug trenches. A lot of trenches.

To Khomeini, as long as the math worked and his fighters were sufficiently motivated by religious fanaticism and revolutionary spirit, he could push all the way to Baghdad. So he enlisted large numbers of civilians with little or no military training to execute his plans. This entrenched incompetence included the field command leadership who most often sent men to die in droves using human wave attacks, another World War I relic. The horror doesn't stop there.

The New York Times' Terence Smith, writing about Iran in 1984, described the use of child soldiers by Iran to clear minefields. Young boys, aged 12-17 years, wore red headbands with the words 'Sar Allah' in Farsi (Warriors of God) and small metal keys that the Ayatollah declared were their tickets to Paradise if they were martyred in their mission. Many were sent into battle against Iraqi tanks without any protection and bound by ropes to prevent desertion.

They were the first wave, making the way for Iranian tanks by clearing barbed wire and minefields with their bodies.

Iranian child soldiers marching off to fight Iraq in the Iran-Iraq War.

These children weren't the only human wave attackers, but they certainly were the most notable – and effective. In the same interview, Smith notes the Iranian commanders are unapologetic. Iraq has many tanks and a lot of support. Iran has very few. What Iran had is exactly what the Ayatollah predicted, a large population filled with religious fervor.

The total number of casualties inflicted on Iran and Iraq throughout the war isn't clearly known, but what is known is a number ranging anywhere between 500,000 to one million killed and wounded in the eight-year slugfest.

Articles

This band hires vets — especially when they go on tour

As veterans re-enter the civilian workforce, many struggle to make the transition. This is why opportunities (ahem — touring with famous heavy metal bands) for employment are so important. Five Finger Death Punch has made it a mission to offer such opportunities.

Keep reading... Show less

11 memes that will make you want to join the Navy

Technically, there are five branches of service to choose from if you're thinking about joining the military (including the Coast Guard). There's a high level of rivalry among branches that can spark a lot of friendly sh*t talking. As veterans, we still love to take cheap shots at one another — but it's always in good fun.

We've said it time-and-time again that the military has a dark sense of humor and we flex those comedic muscles at the other branches as often as possible. Since the U.S. Navy is hands-down the most dominant force to ever patrol the high seas, sailors do things that no other branch can do: kick ass while floating in the middle of nowhere.

The Army and the Air Force can't compete with the Navy since they have no ships. The Marines can't conduct business without the Navy navigating them around the world. Lastly, The Coast Guard is a bunch of land-hugging puddle jumpers.

Since we managed to sh*t talk to everyone (in good fun), it's time to nail each of them, once again, through memes making you reconsider why you didn't join the Navy instead.

Keep reading... Show less
History

Tom Clancy used this wargame for 'Red Storm Rising'

Tom Clancy's 1986 novel Red Storm Rising is arguably his literary tour de force. Following on the heels of 1984's The Hunt for Red October, it cemented Clancy's status as the inventor of the techno-thriller genre. Despite being a massive best-seller, Clancy never won a Pulitzer Prize or Nobel Prize for his contributions to the field of literature.

In Red Storm Rising, "Dance of the Vampires" featured a Soviet attack on a NATO carrier force centered on USS Nimitz (CVN 68), USS Saratoga (CV 60), and the French carrier Foch (R99). In the book, the Nimitz was badly damaged by two AS-6 Kingfish missiles, while the Foch took three hits and was sunk.

There was little understanding of how new technology like the Tu-22M Backfire would play into a war.

(DOD painting)

But how did Clancy manage to make that moment in the book so realistic? The answer lies in a wargame designed by Larry Bond called Harpoon. Bond is best known as a techno-thriller author of some repute himself, having written Red Phoenix, Cauldron, and Red Phoenix Burning, among others. But he designed the Harpoon wargame, which came in both a set of rules for miniatures and a computer game. (Full disclosure: The author is a long-time fan of the game, and owns both miniature and computer versions.)

Alas, poor Foch, you were doomed from the start.

(U.S. Navy photo)

At WargameVault.com, Larry Bond explained that while the end result had been determined, what was lacking was an understand of two big areas: How would all these new systems interact, and what would the likely tactics be? As a result, they ran the game three times, and it was not a small affair: A number of others took part, resulting in each side's "commander" having "staffs" who used written standard orders and after-action reports.

A simulated massacre of Tu-22M Backfires off Iceland also shaped the plot of 'Red Storm Rising.'

(U.S. Navy)

Each of the three games had very different results, but the gaming helped to make Red Storm Rising a literary masterpiece of the last 20th century. Incidentally, Harpoon further shaped Red Storm Rising through a scenario called the "Keflavik Turkey Shoot" – a gaming result that convinced Clancy to include the Soviet Union taking Iceland in the early portions of the book.

While she sits in reserve today, at the time of 'Red Storm Rising,' USS Ticonderoga (CG 47) was the latest and greatest in naval technology.

(US Navy photo)

Bond released a collection of those scenarios, and some other material into an electronic publication called "Dance of the Vampires," available for $8.00 at WargameVault.com. It is a chance to see how a wargame shaped what was arguably the best techno-thriller of all time.

GEAR & TECH

These Dutch destroyers can inflict max pain on the Russian navy

The Royal Netherlands Navy has a long tradition of naval prowess. Throughout its history, this Navy held its own against opponents ranging from England to Indonesia. Today, it is much smaller than it has been in the past, but it is still very potent. If tensions with Russia ever escalate to war, these ships could help defend the Baltic states or be used to escort convoys across the Atlantic.

Today, the centerpiece of the Dutch navy consists of four powerful air-defense vessels. While the Dutch Navy calls them "frigates," these ships actually are really more akin to smaller guided-missile destroyers. Their armament is close to that of the Royal Navy's Type 45 destroyers. These vessels replaced two Tromp-class guided-missile destroyers and two Jacob van Heemskerck-class guided-missile frigates.

Keep reading... Show less
GEAR & TECH

4 reasons why the Navy will always be on missile defense patrols

The Navy has recently wanted to end ballistic missile defense (BMD) patrols. This mission, usually carried out by Arleigh Burke-class guided-missile destroyers equipped with RIM-161 Standard SM-3 surface-to-air missiles, has been to protect American allies from ballistic missiles from rogue states like Iran and North Korea, or from hostile peers or near-peers like Russia and China.

In June 2018 though, the Navy wanted to get away from this mission. The reason? They want to shift this to shore installations to free up the destroyers for other missions. Well, the ballistic missile defense mission is not going to go away any time soon. Here's why:

Keep reading... Show less