Terms of Use

Terms of Use

Effective date: May 1, 2015.


Acceptance of the Terms of Use

We Are The Mighty (www.wearethemighty.com) is a website owned by The Mighty Networks, Inc., a California company. You are invited to submit articles, post comments, sign up to receive newsletters and RSS feeds, and visit We Are The Mighty in accordance with these Terms of Use. These Terms of Use, together with any documents they expressly incorporate by reference, govern your access to and use of We Are The Mighty on all platforms, whether accessed via web browser, mobile device, non-browser application, or e-mail (collectively, the "Site"). "You" and "your" refer to you as the user of the Site. "We Are The Mighty," "we," "us" and "our" refer to The Mighty Networks, Inc. and our successors, partners, affiliates, subsidiaries, and assigns.

By using the Site, you expressly accept and agree to be bound and abide by these Terms of Use and our Privacy Policy, incorporated herein by reference. If you do not agree to be bound by these Terms of Use, you may not access or use the Site.

Changes to the Terms of Use

The Mighty Networks, Inc. reserves the right to modify these Terms of Use at any time and will publish notifications of material modifications in our sole discretion. All changes are effective immediately when we post them and apply to all access to and use of the Site thereafter.

By continuing to access the Site after notice of such modifications have been published, you signify your agreement to be bound by them. You are expected to check this page from time to time so you are aware of any changes, as they are binding on you.

Accessing the Site and Account Security

We reserve the right to withdraw or amend this Site, and any service or material we provide on the Site, in our sole discretion without notice. We will not be liable if for any reason all or any part of the Site is unavailable at any time or for any period. From time to time, we may restrict access to some parts of the Site, or the entire Site, to users.

You are responsible for making all arrangements necessary for you to have access to the Site and ensuring that all persons who access the Site through your Internet connection comply with these Terms of Use.

To access the Site or some of the resources it offers, you may be asked to provide certain details or other information to become a registered user ("Registered User"). It is a condition of your use of the Site that all the information you provide on the Site is correct, current, and complete. You agree that all information you provide to register with this Site or otherwise is governed by our Privacy Policy, and you consent to all actions we take with respect to your information consistent with our Privacy Policy.

If you choose, or are provided with a user name, password, or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any other person or entity. You also acknowledge that your account is personal to you and agree not to provide any other person with access to this Site or portions of it using your user name, password, or other security information. You agree to notify us immediately of any unauthorized access to or use of your user name or password or any other breach of security.

We have the right to disable any user name, password, or other identifier, whether chosen by you or provided by us, at any time if, in our opinion, you have violated any provision of these Terms of Use.

Terms of Sale

You are not required to purchase anything in order to access the Site, register, post comments, sign up to receive certain newsletters and RSS feeds.

Intellectual Property Rights

The Site and its entire contents, features, and functionality (including but not limited to all information, software, text, displays, images, video and audio, and the design, selection and arrangement thereof), are owned by The Mighty Networks, Inc., its licensors, or other providers of such material and are protected by United States and international copyright, trademark, patent, trade secret, and other intellectual property or proprietary rights laws.

These Terms of Use grant you a personal, non-exclusive, non-transferable, revocable license to access and use the Site. You may access the material on the Site only for your own personal, non-commercial use. You must not reproduce, distribute, modify, create derivative works of, publicly display, publicly perform, republish, download, store or transmit any of the material on our Site, except as incidental to normal web browsing, such as the making of temporary copies in RAM or the cache of your Internet browser, and for features of the Site that enable sharing via e-mail, social media, linking, and other platforms expressly enabled by the Site.

You must not:

Modify copies of any materials from this site.

Use any illustrations, photographs, video or audio sequences or any graphics separately from the accompanying text.

Delete or alter any copyright, trademark, or other proprietary rights notices from copies of materials from this site.

Reverse-engineer or otherwise attempt to steal the software code of the Site

Any use of the Site not expressly permitted by these Terms of Use is a breach of these Terms of Use and may violate copyright, trademark, and other laws.

Copyright

"The Mighty Networks, Inc.," and all related names, logos, product and service names, designs, and slogans are copyrights The Mighty Networks, Inc.. You must not use such marks without our prior written permission. All other names, logos, product and service names, designs, and slogans on this Site are the trademarks of their respective owners.

Linking to Website and Social Media Features

You may link to our homepage or other pages on the Site provided you do so in a way that is fair and legal and does not damage or take advantage of our reputation, but you must not establish a link in a way that suggests any form of association, approval, or endorsement on our part. This Site may provide certain social media features that enable you to:

Link to the Site from your own or third-party website

Send e-mails or communications with Site content or links to Site content

Cause portions of Site content to display or appear on your own or third-party websites

You may use these features solely as they are provided by the Site, and solely with respect to the Site content they are displayed with and otherwise in accordance with any additional terms and conditions we provide with respect to such features.

Prohibited Uses of the Site

You may use the Site only for lawful purposes and in accordance with these Terms of Use. You agree not to use the Site:

In any way that violates any applicable federal, state, local, or international law or regulation.

For the purpose of exploiting, harming or attempting to exploit or harm minors in any way by exposing them to inappropriate content, asking for personally identifiable information, or otherwise.

To send, knowingly receive, upload, download, use, or re-use any material which does not comply with the Content Standards set out in these Terms of Use.

To transmit, or procure the sending of, any advertising, promotional, or otherwise unsolicited material, including but not limited to any "junk mail", "chain letter," "spam," or any other similar solicitation.

To impersonate or attempt to impersonate The Mighty Networks, Inc., a The Mighty Networks, Inc. employee, another user, or any other person or entity (including, without limitation, by using their e-mail addresses or screen names).

To engage in any other conduct that restricts or inhibits anyone's use or enjoyment of the Site, or which, as determined by us, may harm The Mighty Networks, Inc. or users of the Site or expose them to liability.

To monitor, scrape, index, or otherwise copy any of the material on the Site by means of any robot, spider, or other automatic device, process, or means, regardless of whether such use may be considered a fair use under United States copyright law.

Additionally, you agree not to interfere with or attempt to interfere with the proper working of the Site, including but not limited to:

Use the Site in a manner that could disable, overburden, damage, or impair the site or interfere with any other party's use of the Site;

Use any device, software or routine that interferes with the proper working of the Site; introducing any viruses, Trojan horses, worms, logic bombs or other material which is malicious or technologically harmful;

Attempt to gain unauthorized access to, interfere with, damage or disrupt any parts of the Site, the server on which the Site is stored, or any server, computer, or database connected to the Site; or

Attack the Site via a denial-of-service attack or distributed denial-of-service attack.

Engaging in a prohibited use of the Site may result in civil, criminal, and/or administrative penalties, fines, or sanctions against the user and those assisting the user.

User Contributions

The Site may contain features that allow users to post, submit, publish, display, or transmit to other users or other persons content or materials (collectively, "User Contributions") on or through the Site.

All User Contributions must comply with the Content Standards set out in these Terms of Use.

Any User Contribution you post to the Site will be considered non-confidential and non-proprietary. By posting any User Contribution on the Site, you grant us and our affiliates and service providers, and each of their and our respective licensees, successors, and assigns a perpetual, royalty-free, and irrevocable right and license to use, reproduce, modify, adapt, publish, translate, distribute, transmit, publicly display, publicly perform, sublicense, create derivative works from, transfer, and sell any such User Contribution.

You represent and warrant that you own or control all rights in and to the User Contributions, including the right to license such User Contributions, and that all of your User Contributions do and will comply with these Terms of Use.

You understand and acknowledge that you are responsible for any User Contributions you submit or contribute, and you, not The Mighty Networks, Inc., have full responsibility for such content, including its legality, reliability, accuracy, and appropriateness.

We are not responsible, or liable to any third party, for the content or accuracy of any User Contributions posted by you or any other user of the Site.

Disclosure, Monitoring, and Enforcement Related to User Contributions

We have the right to:

Remove or refuse to post any User Contributions for any or no reason in our sole discretion.

Take any action with respect to any User Contribution that we deem necessary or appropriate in our sole discretion, including if we believe that such User Contribution violates the Terms of Use, infringes any intellectual property right or other right of any person or entity, threatens the personal safety of users of the Site or the public, or could create liability for the Company.

Disclose your identity or other information about you to any third party who claims that material posted by you violates their rights, including their intellectual property rights or their right to privacy.

Take appropriate legal action, including without limitation, referral to law enforcement, for any illegal or unauthorized use of the Site.

Terminate or suspend your access to all or part of the Site for any or no reason, including without limitation, any violation of these Terms of Use.

Without limiting the foregoing, we have the right to fully cooperate with any law enforcement authorities or court order requesting or directing us to disclose the identity or other information of anyone posting any materials on or through the Site. YOU WAIVE AND HOLD HARMLESS The Mighty Networks, Inc. AND ITS AFFILIATES, LICENSEES AND SERVICE PROVIDERS FROM ANY CLAIMS RESULTING FROM ANY ACTION TAKEN BY ANY OF THE FOREGOING PARTIES DURING OR AS A RESULT OF ITS INVESTIGATIONS AND FROM ANY ACTIONS TAKEN AS A CONSEQUENCE OF INVESTIGATIONS BY EITHER SUCH PARTIES OR LAW ENFORCEMENT AUTHORITIES.

However, we cannot and do not undertake to review material before it is posted on the Site and cannot ensure prompt removal of objectionable material after it has been posted. Accordingly, we assume no liability for any action or inaction regarding transmissions, communications, or content provided by any user or third party. We have no liability or responsibility to anyone for performance or nonperformance of the activities described in this section.

Content Standards for User Contributions

These Content Standards apply to any and all User Contributions. You are responsible for your own User Contributions, and you agree that, to the best of your knowledge, your User Contributions will comply with applicable local and federal laws. Do not make User Contributions that involve the following:

Securities for sale, barter, or exchange

Harassment, defamation, threats, stalking, bullying, or violations of the legal rights of others

Illegal activities

Impersonation of any person or entity, or falsely state or misrepresent your affiliation with a person or entity

Infringement of another's intellectual property of any type, including, but not limited to, trade secrets, trademarks, and copyrights

Obscene, vulgar, bigoted, hateful, or racially offensive language or images

Commercial advertising

Gambling, contests, chain letters, "pyramid schemes," or "multi-level marketing" schemes

Violations of any applicable local, state, national, or international law in connection with your use of the Site, including securities laws and regulations.

Personally attacking the author of a post or other users

Furthermore, you agree that, if a third party claims that any User Contribution you have contributed to the Site is unlawful, you will bear the full burden of establishing that the User Contribution complies with all applicable laws.

How to Report Violations

If you believe that any content on the Site violates the Terms of Use, please notify the Site by sending an email to info@wearethemighty.com. The Site does not guarantee that any action will be taken as a result of your e-mail.

Do Not Rely on Information Posted

The content of the Site is offered for general information, discussion, and entertainment purposes only. Some of the content is unmoderated and reflects the personal opinions of users. You should be skeptical about any information on the Site because the information may be offensive, harmful, and/or wrong. Neither the content of the Site, nor the links to other websites contained therein, are routinely moderated, screened, approved, reviewed, or endorsed by The Mighty Networks, Inc. or any affiliated person or entity.

We do not warrant the accuracy, completeness, or usefulness of the information on the Site. Any reliance you place on such information is strictly at your own risk. We disclaim all liability and responsibility arising from any reliance placed on such materials by you or any other visitor to the Site, or by anyone who may be informed of any of its contents.

This Site may include content provided by third parties, including materials provided by other users, bloggers, and third-party licensors, syndicators, aggregators, and/or reporting services. All statements and/or opinions expressed in these materials, and all articles and responses to questions and other content, other than the content provided by The Mighty Networks, Inc., are solely the opinions and the responsibility of the person or entity providing those materials. Such materials do not necessarily reflect the opinion of The Mighty Networks, Inc.. We are not responsible, or liable to you or any third party, for the content or accuracy of any materials provided by any third parties.

Age and User Contribution Removal

We Are The Mighty is not intended for children under 13 years of age. If you are under 13, do not use or provide any information on the Site or on or through any of its features, register on the Site, use any of the interactive or public comment features on the Site, or provide any information about yourself to us. See our Privacy Policy for more information about contacting The Mighty Networks, Inc. if you believe we have collected information from a child under 13.

The Mighty Networks, Inc. allows minors under the age of 18 years old to access, or become Registered Users of, the Site. Notwithstanding this, if you are a minor under the age of 18 years old and a Registered User you may request removal of your User Contributions posted on the Site. To request removal of a User Contribution, you must notify us at info@wearethemighty.com. When you contact The Mighty Networks, Inc. to request removal of a User Contribution, we require you to authenticate your status as a Registered User and to identify the particular User Contribution to be removed by providing the (1) URL to the User Contribution, (2) the date and time at which the User Contribution was posted, and (3) the contents of the User Contribution. If you do not properly notify us, authenticate your status as a Registered User, or properly identify the particular User Contribution to be removed, The Mighty Networks, Inc. is not required to remove your User Contribution and removal will be in our sole discretion.

Removal of User Contributions from the Site does not ensure complete or comprehensive removal of your User Contributions from the Site. The Mighty Networks, Inc., in our sole discretion, may retain your User Contributions on our servers in some form. However, removal will render your User Contribution invisible to other users of the Site. We may, in our sole discretion, decide to anonymize your User Contribution such that you cannot be individually identified, rather than remove the User Contribution. In the event your User Contribution is anonymized, it will remain visible to other users of the Site.

The Mighty Networks, Inc. is not responsible for the removal of User Contributions that are cached, copied, or reposted by third parties. Likewise, to the extent that any provision of federal or state law requires us to maintain certain User Contributions, we will not remove the User Contribution from the Site.

Disclaimer and Limitation on Liability

The Site and any information, products, or services therein are provided on an "as is" and "as available" basis, without any warranties of any kind, either express or implied. The Mighty Networks, Inc. hereby disclaims all warranties of any kind, whether express or implied, statutory or otherwise, including without limitation, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement.

The Mighty Networks, Inc. does not warrant that the Site will operate in an uninterrupted or error-free manner or that the Site is free of viruses or other harmful components. Use of the Site or information obtained from or through the Site is at your own risk.

In no event will The Mighty Networks, Inc., its affiliates or their licensors, service providers, employees, agents, officers, or directors be liable for any loss or damages, under any legal theory, arising out of or in connection with your use, or inability to use, the Site, any websites linked to the Site, any content on the Site or such other websites or any services obtained through the Site or such other websites, including any direct, indirect, special, incidental, consequential, or punitive damages, including but not limited to, personal injury, pain and suffering, emotional distress, loss of revenue, loss of profits, loss of business or anticipated savings, loss of use, loss of goodwill, loss of data, and whether caused by tort (including negligence), breach of contract or otherwise, even if foreseeable.

Neither The Mighty Networks, Inc. nor the Site is an intermediary, broker/dealer, investment advisor, or exchange, and neither provides services as such.

Choice of Law and Forum

You agree that any dispute arising out of or relating to the Site, these Terms of Use, or any content posted to the Site, including copies and republication thereof, whether based in contract, tort, statutory, or other law, will be governed by the laws of the State of California, excluding its conflicts of law provisions. You further consent to the personal jurisdiction of and exclusive venue in the federal and state courts located in and serving Berkeley, California as the legal forum for any such dispute.

Copyright Policy

Pursuant to 17 USC. § 512 as amended by Title II of the Digital Millennium Copyright Act (the "DMCA"), we have instituted procedures to receive written notification of claimed infringements and to process such claims in accordance with the DMCA. If you believe your copyrights are being infringed, please fill out the Notice of Infringement form below and mail it to us.

The Notice of Infringement contains requested information that substantively complies with the safe harbor provisions of the Digital Millennium Copyright Act, 17 USC. § 512(c)(3)(A), providing that to be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:

A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works are covered by a single notification, a representative list of such works at that Site.

Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.

Information reasonably sufficient to permit the service provider to contact the complaining party such as an address, telephone number, and if available, an electronic mail address at which the complaining party may be contacted.

A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent or the law.

A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

Notification from a copyright owner or from a person authorized to act on behalf of the copyright owner that fails to comply substantially with the provisions above shall not be considered as providing actual knowledge or an awareness of facts or circumstances from which infringing activity is apparent.

Our designated agent to receive copyright infringement notifications is listed below on the Notice of Infringement form. Please mail a separate Notice of Infringement each time you would like to report an alleged act of infringement.

Indemnification

You agree to indemnify, defend, and hold harmless The Mighty Networks, Inc. from any claims, losses, or damages, including legal fees, resulting from your violation of these Terms of Use, your use of the Site, or your placement of any content onto the Site, and to fully cooperate in The Mighty Networks, Inc.'s defense against any such claims.

Waiver and Severability

No waiver of or by us of any term or condition set forth in these Terms of Use shall be deemed a further or continuing waiver of such term or condition or a waiver of any other term or condition, and our failure to assert a right or provision under these Terms of Use shall not constitute a waiver of such right or provision.

If any provision of these Terms of Use is held by a court or other tribunal of competent jurisdiction to be invalid, illegal, or unenforceable for any reason, such provision shall be eliminated or limited to the minimum extent such that the remaining provisions of these Terms of Use will continue in full force and effect.

Integration

These Terms of Use constitute the entire agreement between you and The Mighty Networks, Inc. with respect to the subject matter herein and supersedes any and all prior or contemporaneous oral or written agreements.

Notice of Infringement Form

The Mighty Networks, Inc.

2690 N. Beachwood Dr.

Los Angeles, CA 90068

info@wearethemighty.com

Date: ______________

Dear Madam or Sir:

I, the undersigned, CERTIFY UNDER PENALTY OF PERJURY that the information in this Notice of Infringement is accurate, and that I am the owner or an agent authorized to act on behalf of the owner of certain intellectual property rights. The name of such owner is ______________________________ (the "Owner").

I have a good faith belief that the material identified below is not authorized by the above Owner, its agent, or the law and thus infringes the Owner's rights. Please act promptly to remove or disable the access to the material or items claimed to be infringing.

Location of the alleged infringing material:

____________________________________________

Description of the infringing material:

____________________________________________

Description of the copyrighted work that you claimed is infringed:

____________________________________________

You may contact me at:

Name: ___________________________________

Title: ___________________________________

Company: ________________________________

Street address: ____________________________

City, State: _______________________________

Zip: ___________________________________

Tel.: ___________________________________

E-mail: ___________________________________

Fax: _____________________________________

Contact Us

If you have any feedback, comments, or questions relating to these Terms of Use or the Site, please e-mail questions to info@wearethemighty.com. You can also reach us by mail at 2690 N. Beachwood Dr., Los Angeles, CA 90068.

 

The Air Force snagged the alleged Minot M240 thief

The Air Force's long national nightmare is over. Its missing M240 machine gun was finally recovered from the home of an airman stationed at the base, according to a press release from the Air Force Global Strike Command.

The theft prompted many to question how it could have been lost, why the Air Force has an M240, does the Air Force really need an M240, how many do they have or need, and would the Air Force notice if I took one.

The Air Force Office of Special Investigations obtained a federal search warrant, executing it at the off-base residence of a Team Minot airman on June 19, 2018.

Missing for little over a month, the automatic weapon and the fallout of its theft made waves across the military-veteran community and in the military news cycle. After a box of 40mm MK 19 grenades fell off the back of a humvee while traversing a Native American reservation, the subsequent inventory of the Air Force arsenal on Minot discovered the missing M240 machine gun. This prompted the 5th Bomb Wing, 91st Missile Wing, and other installations to make a thorough inventory of their weapons.

Keep reading... Show less
Articles

This Microsoft training fast tracks veterans into sweet tech careers

Solaire Brown (formerly Sanderson) was a happy, gung-ho Marine sergeant deployed in Afghanistan when she realized her military career was about to change. She was tasked with finding the right fit for her post-military life – and she knew she wanted to be prepared.

Injuries sustained during mine-resistant vehicle training had led to surgeries and functional recovery and it became clear Brown would no longer be able to operate at the level she expected of herself as a Marine.

Like many of the 200,000 service members exiting the military each year, Brown knew her military training could make her a valuable asset as an employee, but she was unsure of how her skills might specifically translate to employment in the civilian world.

Enter Microsoft Software & Systems Academy (MSSA), a program Microsoft started in 2013 to provide transitioning service members and veterans with critical career skills required for today's growing technology industry.

Keep reading... Show less
History

The horrifying way Iran cleared mines in the Iran-Iraq War

The only good mines are one that are cleared — or better yet, never used in the first place. Today mines are generally seen as relics of bygone eras, deadly weapons that remain dangerous long after the war is fought. Forgotten minefields all over the world kill civilians by the score – more than 8,600 in 2016 alone. Many of these are children.

Many who join armed forces around the world do so with the idea that they can keep their children and families – along with the children and families of their fellow countrymen – safe from the imminent dangers of impending war. When faced with an existential threat, countries will go to horrifying lengths to defend themselves.

This isn't World War I — it's the 1980s. No one told Saddam or Khomeini.

Such was the case in the early 1980s, the nascent years of the Islamic Republic of Iran. Iran fought a brutal war against Iraq since 1980, when Iraqi dictator Saddam Hussein smelled blood in the disorganized post-Revolution Iran and attempted to seize its access to the Persian Gulf by force.

The Iran-Iraq War was particularly brutal, even as far as warfare in the Middle East is concerned. The war was defined by eight years of stalemates and failed offensives, indiscriminate ballistic missile attacks — often using chemical weapons — and insane asymmetrical warfare.

Insane symmetrical warfare is a very clean term for the tactics Iran used to level the playing field of the Western-backed, technologically superior Iraqis. Iran recently purged its professional military of those loyal to the deposed Shah and was by no means ready to fight a war with a series of Revolutionary militias. The Ayatollah Khomeini was no military commander. He saw a success in war in terms of casualties inflicted on the enemy versus the number his forces took, a World War I-era approach to warfare.

They also dug trenches. A lot of trenches.

To Khomeini, as long as the math worked and his fighters were sufficiently motivated by religious fanaticism and revolutionary spirit, he could push all the way to Baghdad. So he enlisted large numbers of civilians with little or no military training to execute his plans. This entrenched incompetence included the field command leadership who most often sent men to die in droves using human wave attacks, another World War I relic. The horror doesn't stop there.

The New York Times' Terence Smith, writing about Iran in 1984, described the use of child soldiers by Iran to clear minefields. Young boys, aged 12-17 years, wore red headbands with the words 'Sar Allah' in Farsi (Warriors of God) and small metal keys that the Ayatollah declared were their tickets to Paradise if they were martyred in their mission. Many were sent into battle against Iraqi tanks without any protection and bound by ropes to prevent desertion.

They were the first wave, making the way for Iranian tanks by clearing barbed wire and minefields with their bodies.

Iranian child soldiers marching off to fight Iraq in the Iran-Iraq War.

These children weren't the only human wave attackers, but they certainly were the most notable – and effective. In the same interview, Smith notes the Iranian commanders are unapologetic. Iraq has many tanks and a lot of support. Iran has very few. What Iran had is exactly what the Ayatollah predicted, a large population filled with religious fervor.

The total number of casualties inflicted on Iran and Iraq throughout the war isn't clearly known, but what is known is a number ranging anywhere between 500,000 to one million killed and wounded in the eight-year slugfest.

Articles

This band hires vets — especially when they go on tour

As veterans re-enter the civilian workforce, many struggle to make the transition. This is why opportunities (ahem — touring with famous heavy metal bands) for employment are so important. Five Finger Death Punch has made it a mission to offer such opportunities.

Keep reading... Show less

11 memes that will make you want to join the Navy

Technically, there are five branches of service to choose from if you're thinking about joining the military (including the Coast Guard). There's a high level of rivalry among branches that can spark a lot of friendly sh*t talking. As veterans, we still love to take cheap shots at one another — but it's always in good fun.

We've said it time-and-time again that the military has a dark sense of humor and we flex those comedic muscles at the other branches as often as possible. Since the U.S. Navy is hands-down the most dominant force to ever patrol the high seas, sailors do things that no other branch can do: kick ass while floating in the middle of nowhere.

The Army and the Air Force can't compete with the Navy since they have no ships. The Marines can't conduct business without the Navy navigating them around the world. Lastly, The Coast Guard is a bunch of land-hugging puddle jumpers.

Since we managed to sh*t talk to everyone (in good fun), it's time to nail each of them, once again, through memes making you reconsider why you didn't join the Navy instead.

Keep reading... Show less
History

Tom Clancy used this wargame for 'Red Storm Rising'

Tom Clancy's 1986 novel Red Storm Rising is arguably his literary tour de force. Following on the heels of 1984's The Hunt for Red October, it cemented Clancy's status as the inventor of the techno-thriller genre. Despite being a massive best-seller, Clancy never won a Pulitzer Prize or Nobel Prize for his contributions to the field of literature.

In Red Storm Rising, "Dance of the Vampires" featured a Soviet attack on a NATO carrier force centered on USS Nimitz (CVN 68), USS Saratoga (CV 60), and the French carrier Foch (R99). In the book, the Nimitz was badly damaged by two AS-6 Kingfish missiles, while the Foch took three hits and was sunk.

There was little understanding of how new technology like the Tu-22M Backfire would play into a war.

(DOD painting)

But how did Clancy manage to make that moment in the book so realistic? The answer lies in a wargame designed by Larry Bond called Harpoon. Bond is best known as a techno-thriller author of some repute himself, having written Red Phoenix, Cauldron, and Red Phoenix Burning, among others. But he designed the Harpoon wargame, which came in both a set of rules for miniatures and a computer game. (Full disclosure: The author is a long-time fan of the game, and owns both miniature and computer versions.)

Alas, poor Foch, you were doomed from the start.

(U.S. Navy photo)

At WargameVault.com, Larry Bond explained that while the end result had been determined, what was lacking was an understand of two big areas: How would all these new systems interact, and what would the likely tactics be? As a result, they ran the game three times, and it was not a small affair: A number of others took part, resulting in each side's "commander" having "staffs" who used written standard orders and after-action reports.

A simulated massacre of Tu-22M Backfires off Iceland also shaped the plot of 'Red Storm Rising.'

(U.S. Navy)

Each of the three games had very different results, but the gaming helped to make Red Storm Rising a literary masterpiece of the last 20th century. Incidentally, Harpoon further shaped Red Storm Rising through a scenario called the "Keflavik Turkey Shoot" – a gaming result that convinced Clancy to include the Soviet Union taking Iceland in the early portions of the book.

While she sits in reserve today, at the time of 'Red Storm Rising,' USS Ticonderoga (CG 47) was the latest and greatest in naval technology.

(US Navy photo)

Bond released a collection of those scenarios, and some other material into an electronic publication called "Dance of the Vampires," available for $8.00 at WargameVault.com. It is a chance to see how a wargame shaped what was arguably the best techno-thriller of all time.

GEAR & TECH

These Dutch destroyers can inflict max pain on the Russian navy

The Royal Netherlands Navy has a long tradition of naval prowess. Throughout its history, this Navy held its own against opponents ranging from England to Indonesia. Today, it is much smaller than it has been in the past, but it is still very potent. If tensions with Russia ever escalate to war, these ships could help defend the Baltic states or be used to escort convoys across the Atlantic.

Today, the centerpiece of the Dutch navy consists of four powerful air-defense vessels. While the Dutch Navy calls them "frigates," these ships actually are really more akin to smaller guided-missile destroyers. Their armament is close to that of the Royal Navy's Type 45 destroyers. These vessels replaced two Tromp-class guided-missile destroyers and two Jacob van Heemskerck-class guided-missile frigates.

Keep reading... Show less
GEAR & TECH

4 reasons why the Navy will always be on missile defense patrols

The Navy has recently wanted to end ballistic missile defense (BMD) patrols. This mission, usually carried out by Arleigh Burke-class guided-missile destroyers equipped with RIM-161 Standard SM-3 surface-to-air missiles, has been to protect American allies from ballistic missiles from rogue states like Iran and North Korea, or from hostile peers or near-peers like Russia and China.

In June 2018 though, the Navy wanted to get away from this mission. The reason? They want to shift this to shore installations to free up the destroyers for other missions. Well, the ballistic missile defense mission is not going to go away any time soon. Here's why:

Keep reading... Show less