Friday, 24 May 2024
More

    Policy ─ tag

    Latest articles

    Strategic Bombing and Gentle War

    Much of the modern way of war springs from the writings of 4 men from the 1920s: Gen. Giulio Douhet, LtGen. Walther Wever, Marshal Hugh Montague “Boom” Trenchard, and of course, Col. Billy Mitchell.All were believers in “strategic bombing,” the idea that bombing the right targets would destroy morale while also destroying industrial capacity and disabling lines of communication, and drive any nation to surrender.Over the years the theory, particularly in the west, has undergone some modifications

    Marshall, Eisenhower and Ukraine

    On January 25th, 1942, USS Sargo (SS-186 (under the command of LtCmdr Tyrell Jacobs)) pulled into Surabaya, Indonesia after finishing a short war patrol, offloaded her remaining torpedoes, loaded 1 million rounds of small-arms ammunition, and headed to Mindanao, the Philippines to provide some ammunition to the US and the Philippine Armies. She then picked up 24 maintenance specialists from the B-17 wing and evacuated them from the Philippines. Jacobs, after three patrols in which he fired a great many torpedoes but sank no ships, turned over command, and ended the war working on, and significantly improving, US torpedoes.

    Putin, Xi, and the Pirate King

    In the news this week, Alexei Navalny, the dissident Russian politician who was serving 30 years in an Arctic Gulag, died. Navalny was a longtime rival of Tsar Vlad, had campaigned against corruption - Putin’s corruption - and after returning to Russia in 2021, had been found guilty of “extremism” and “fraud” - what were clearly nonsense charges, and sentenced to 30 years in prison. 

    Admiral Claus and his Sleigh

    by Navy Capt. (Ret) Peter O'Brien We all know that NORAD (The North American Air Defense Command) traces Santa every year. But, here at the...

    About the Cybersecurity Project

    The cyber world now touches almost every part of our lives and offers great benefits. But it also comes with new vulnerabilities, some of which are not well understood by those not involved in a connected technical field

    Find us on

    Latest articles

    - Advertisement - spot_imgspot_img