Doctrine is an army’s game plan. Doctrine not only tells an army how to fight but it communicates intent from the institutional Army to the fighting forces. The progression that leads to doctrine stretches across a temporal “reverse highway” that begins well into the future with a vision of how future wars will be fought. At some point along the highway visioning solidifies into warfighting concepts. All too often, the concept phase of this journey is where dead ends and misleading road signs appear. Visioning is cheap and ephemeral. Concepts, on the other hand, tend to ossify ideas that eventually turn into opinions. Opinions, even false ones, are defended by those whose influences are at stake. Opinions lead to investments that launch programs. Eventually the highway ends at the doctrinal present as organizations and weapons emerge to provide the tools and formations to fight wars
This treatise on the recent shortcomings of the Army organizational culture challenges leaders at all levels to evaluate their personal leadership practices and their application of Army policies.
Doctrine is an army’s game plan. Doctrine not only tells an army how to fight but it communicates intent from the institutional Army to the fighting forces. The progression that leads to doctrine stretches across a temporal “reverse highway” that begins well into the future with a vision of how future wars will be fought. At some point along the highway visioning solidifies into warfighting concepts. All too often, the concept phase of this journey is where dead ends and misleading road signs appear. Visioning is cheap and ephemeral. Concepts, on the other hand, tend to ossify ideas that eventually turn into opinions. Opinions, even false ones, are defended by those whose influences are at stake. Opinions lead to investments that launch programs. Eventually the highway ends at the doctrinal present as organizations and weapons emerge to provide the tools and formations to fight wars
This treatise on the recent shortcomings of the Army organizational culture challenges leaders at all levels to evaluate their personal leadership practices and their application of Army policies.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
National Security Agency - NSA mobile device best practices
NLMB: Slides 1 to 32
1. NON-LINEAR MANEUVER BRIGADE
"In war the chief incalculable is the human will, which manifests
itself in resistance, which in turn lies in the province of tactics.
Strategy has not to overcome resistance, except from nature. Its
purpose is to diminish the possibility of resistance, and it seeks to
fulfil this purpose by exploiting the elements of movement and
surprise."
--Sir Basil H. Liddell-Hart
Air
Land
Sea
2004 1st Tactical Studies Group (Airborne) dynmicpara@aol.com
2. The Two Basic Battles
1. The Battle Against the Earth: Hart’s “Nature”
"We have severely underestimated the Russians, the extent of the country and the
treachery of the climate. This is the revenge of reality."
- German General Heinz Guderian, letter to his wife 1941
Open terrain
Observation Closed terrain
Closed terrain: mobile forces automatically lighter and 3D air transportable linkage; note
world is URBANIZING rapidly
Open terrain: roads, rural areas where we grow food, prairies require GROUND
FORCES TO CONTROL---we must be able to control these areas...requires 2D
optimization Future Land Forces must FIRST be “powerful against the earth” in terms
of mobility, firepower, survivability, and sustainability--if the earth itself easily smothers
their combat power how can they even begin to think of overwhelming the human
enemy?
3. “Amateurs talk tactics; experts talk logistics”
Training, Equipping, Feeding and Supplying armed men on the
earth to get a military effect is an un-natural act; destructive violence doesn’t
grow food or build things
To create and sustain military force on the earth is a constant battle against
the earth itself; not only are friendly forces under this vise of need, so are
enemy forces---if you can strengthen the resiliency of your forces vis-à-vis the
earth you can focus more efforts against the human enemy for decisive effects
A corollary to this is if you can weaken the enemy’s hold against the earth by cutting
his supply lines and/or denying him supplies then he will be struck down by terrain,
weather, hunger, disease and lack of ammunition if not defeating him outright at least
preparing him for collapse at the hand of your own human attack
Examples of exploiting the Battle Against the Earth
* Sherman’s March to the sea in U.S. Civil War destroying Southern infrastructure
he got rid of camp furniture for high 4-7 mph foot mobility
* VC/NVA caches of supplies fed by Ho Chi Minh Trail to fight faster on their feet
* Phyrrus fighting over-extended Hannibal in losing battles to save Rome
* 11th ACR in Vietnam packing M113 Gavin light tracked AFVs with supplies for
bold, x-country, independent operations w/o depending on supply lines
4. A Land Force that can inter-changeably MANEUVER
at will over the earth has a powerful superiority: it can
PHYSICALLY exploit opportunities as they arise and
fight faster than the enemy can think/react as per the
Boyd Cycle “OODA Loop” tactic
4-7 MPH on Foot, SERE skills
gear to live off-land
5-30 MPH aided by ATACS carts
and pedal eBikes
5-600 MPH by air/land/sea vehicles
with 30+ days of ammo, food
Air Land
Sea
5. 2. The Battle Against Man
"Natural hazards, however formidable, are inherently less dangerous and less
uncertain than fighting hazards. All conditions are more calculable, all obstacles
more surmountable than those of human resistance".
--Sir Basil H. Liddell-Hart
The Two competing 21st Century War Thought-Forms in the West
RMA: 4GW:
Firepower Maneuver
VS.
RMA/TOFFLERIANS 4GW/VAN CREVALD/FEHRENBACHIANS
6. RMA is a failure in Iraq and Afghanistan!
RMA: Physicality vs. Earth (that’s “2nd Wave”)
NOT Important! We will mouse-click firepower!
We will “cherry pick” and avoid problems
Defeat on the Battlefield:
no boots-on-the-ground, tracked
Wheeled Truck Madness: easily blown up decisive, encircling MANEUVER
can’t MANEUVER x-country, swim, airdrop or fight;
infantry will suffer bloody WWI stalemates in cities: USMC in Fallujah
IRAQ Afghanistan: Taliban/al Queda
escape by C3D2
SOMALIA
Kosovo: Serb Army unscathed
FCS LAV3STRYKER
7. ITS 2D/3D MANEUVER AND FIREPOWER:
WAR PHILOSOPHIES WE SHOULD BE STUDYING FOR
21st CENTURY VICTORY THRU 2D/3D OPTIMIZATION--IF WE
WERE OVER THE FIREPOWER VERSUS MANEUVER
CONUNDRUM!
SUN TZU
War is about whose ideas dominate
HART/FULLER
Defeat the mind of the enemy
VAN CREVALD
4th Generation War is mind warfare
BIBLE
Make enemy your friend
MAN HAS ALWAYS BEEN TECHNOLOGICALLY ADVANCED, BUT
HE’S A KILLER ANGEL; AS TIME GOES ON DANGERS INCREASE
8. NON-LINEAR MANEUVER BRIGADE
A
COMMAND B CW
300
PATH
60
STRIKE 3D 2D ARB
12 50 24
22
6 22
24
12
6
12 500 192
200
48 355
9. PURPOSE
The NLMB is composed of primarily existing equipment innovatively
organized as a self-contained, self-sufficient air/ground combined-arms
multi-dimensional force manned by non-narcissistic thinker/doers with an
accurate view of who they are and the world around them to render
appropriate military actions. In today’s 4th Generation Warfare (4GW)
world the center of gravity is the will of the people; whose ideas dominate
requires persuasion as well as coercion. The NLMB is designed and sized
to control and influence large areas for independent or operations in
conjunction with Special Operations Forces (SOF) while preserving
OPSEC and a zero or minimalist presence deep in contested ground and
territory to avoid alienating civilians into the enemy’s camp. Today’s non-
linear battlefield requires combined 2D/3D air/ground maneuver
synergism to locate, encircle and kill/capture sub-national terror groups
and asymmetric advantage seeking nation-state armies. The NLMB is able
to operate without massive logistics yet provides SOF agile, stealthy
armored air/ground decisive maneuver to finish the job against stubborn
and fleeting enemies--a capability it sorely lacks. The NLMB has the
muscle and cultural warfare (CW) expertise to keep supply lines and
civilian commerce flowing, and be Quick-Reaction Forces (QRFs) in the
absence of friendly nation-state security.
10. THE THREAT: FROM ALL DIRECTIONS
The enemy of freedom-based nation-states realizes that the western way
of war using lots of machines to “send a bullet and not a man”
(Firepower) is not able to MANEUVER into difficult closed terrain or
separate civilians from their fighters. The enemy realizes at close range
under 1000 meters, we are weaker than them with our M16 bullet
shooters versus their AKM bullets, Rocket Propelled Grenades (RPGs)
and roadbombs. Furthermore, our ponderously large ground forces
require vast amounts of fuel, ammo, food, water resupply ground
vulnerable wheeled truck convoys that are easily ambushed/destroyed.
As a large U.S. presence not gaining decisive results by maneuver,
patrols in vulnerable wheeled trucks that are easily destroyed, we
alienate the civil population by our presence and earn their contempt
because we cannot defend ourselves much less keep them secure to
have peaceful civilian lives. The enemy has learned his number #1
weapon is the bomb be it
projected in a grenade or set off when U.S. forces pass by. To evade our
unmanned aircraft sensor detection and separation walls/barriers
designed to encourage belligerents to stop terror attacks and face their
own problems, the enemy is going underground with tunnels and
sapping. The enemy without any moral restraints can attack in any
direction at any time; the 21st century battlefield is non-linear (NLB).
11. THE SOLUTION: 2D/3D MANEUVER IN ALL
DIRECTIONS BY NLMB FORCE STRUCTURE
The NLMB solves the riddle of the 4GW NLB by an austere, logistically
light force structure that doesn’t need to resupply itself at all by ground
truck convoys, it resupplies itself economically by air if it chooses to. The
NLMB however, does not use problem avoidance as an excuse for
weakness; its completely tracked and armored and DOES NOT HAVE ANY
VULNERABLE RUBBER-TIRED WHEELED TRUCKS. Everybody works
and everybody fights in the NLMB. The NLMB’s light, medium and heavy
tracked armored fighting vehicles (AFVs) have x-country mobility to avoid
road ambushes and are modified to withstand large roadside bombs and
RPG/ATGM attacks to decisively maneuver against the enemy. The NLMB
has an affordable continuous overhead air combat human presence
“Killer Bees” to deny the enemy the ability to sap roads and combat
engineers with anti-tunneling and urban warfare siege engines to prevail
in urban combats. The NLMB on the ground has swarms of “Army Ants”;
all-terrain, stealthy AFVs and RPG/rifle-hand grenade equipped infantry-
sappers that are optimized for the two basic terrain types on earth; 2D
maneuver forces for open and 3D forces for closed terrains. The NLMB
can go deep anywhere in the world to get the enemy and defeat him up
close without harming civilians.
12. CAPABILITIES
* NLMB does missions that cannot be accomplished by conventional units like the
Army's existing BDEs or recently constructed UoA's or USMC MEUs
* Self-sufficient
* Everyone works, everyone fights
* All teeth, no tail
* No underclass, everyone is a warrior/intel collector
*Everything can move on ground via armored tracks including light aircraft
* No vulnerable rubber-tired wheeled trucks PERIOD
* Can provide continuous air surveillance/attack 24/7/365
* Logistically light; doesn't require huge fuel costs
* Small presence on land does not inflame locals or compromise OPSEC
* No presence on land if operating from RO-RO Commando Carrier
* Low-Cost do-able NOW
* Simple-to-maintain platforms
* Every platform with affordable C4ISR package
* Optimized for non-linear battlefield of weak or subdued nation-state army where
integrated air defenses are not present or suppressed by USAF
* Assumes enemy is all around and no secure Main Supply Routes (MSRs) exist
* Can fight way into a territory and hold a forward operating base for SOF or a
larger force
* Can execute 2D and 3D operational maneuver of brigade-size as spearhead for
larger conventional force or as adjunct to small unit SOFs
13. U.S. must be able to rapidly air-deploy anywhere in the world
to overcome enemy nation-state Surveillance Strike Complex
observation/fires and/or reach hiding by C3D2 sub-national
terror groups without heavy friendly casualties: Tracked
armored vehicles are needed to boldly 2D and 3D decisively
maneuver since surprise is fleeting in media connected age
14. C-27J Spartan: “the Baby Herk”
Can carry baseline NLMB M113 Amphigavin and land on
aircraft carrier if modified with tail hook such that a 12-
aircraft squadron could be seabased. C-130J Hercules can do
the former but not the latter. Can carry NLMB A/MH-6 Little
Bird helicopters. With organic C-27Js, all of NLMB can self-
deploy by air and once in their AO do 3D tactical assaults by
parachute airdrop or STOL airland. C-27Js can bulk resupply
NLMB by “fat cow” or fuel blivet refueling. FOBs build around
2,000 foot landing strip for C-27J airlanding operations.
15. 24 x A/MH-6 Little Bird CLOSE/MANEUVER AIR
SUPPORT ATTACK, OBSERVATION & TRANSPORT
HELICOPTERS
Fireteam Attack
Transport
Long-Range Air Deployment in
C-27Js
Ground mobile by XM1108 Amphigavins
V/TOL from100
foot openings
16. 12 x U-27 CARAVAN CLOSE/MANEUVER AIR
SUPPORT ATTACK, OBSERVATION & TRANSPORT
PLANES
6 underwing hardpoints for gun and rocket pods
and small bombs
17. U-27 CARAVAN can carry
3,000 pounds of cargo or 10
Paratroopers + 2 crew for 1400
miles; 7 hours endurance
@ 200 mph
Small underbelly
cargo pod is
common
18. U-27 CARAVAN can operate from land or sea...
Floats only slightly reduce
flight performance and have
Powerful but fuel wheels for runway landings
miserly PT6 turboprop
engine easy-to-maintain
19. The Squadron
of 12 x U-27
CARAVANs can
surveil hundreds of
square miles 24/7/365
@100 mph faster
speeds than
helicopters and
pounce on detected
enemies immediately
FLIR and image intensifier
360 degree surveillance
balls already in use on
Caravans
Attack Pathfinders laser target mark for guided 2.75” Hydra-70mm rockets
20. Each U-27 CARAVAN can airdrop 10
freefall or static-line Paratroopers or
cargo bundles; an entire rifle squad
21. U-27 CARAVANs
can land on very
short 2,000 foot
or less flat surfaces
delivering troops
and supplies and
operating from
austere forward bases
alongside
ground troops
Attack Pathfinders survey and
mark assault landing zones (AZs),
ABN-AMPHIB Combat Engineers
improve AZs into 2,000 runways
for C-27J and U-27 airlanding
operations
22. U-27 CARAVANs on land can be towed on
trailers by XM1108 cargo-carrying Amphigavins
eliminating handicap to work around their need for
landing strips; increases ground maneuver
force flexibility: NLMB air power always remains
“in its hip pocket”
XM1108s will
need ARIS SPA
Amphigavin noses
and waterjets
23. U-27 CARAVANs can with
floats land on sea and land
as amphibians to link up
with the NLMB RO-RO
Commando Carrier as well
as insert/extract SOF small boat
combat swimmer teams
under earth curvature to hide
from enemy radars
U-27 CARAVAN’s
armament can fight way through
enemy forces if encountered
to include enemy fighters
using Stinger missiles
24. U-27 CARAVANs with floats can be LO-LOed onto
the deck of RO-RO ship decks; wings detach in
under 1 hour to save space so entire 12 plane
squadron can be embarked
Ship’s
cranes
U-27 CARAVANs could shuttle Soldiers
to RO-RO ships as they sail to the
LOTS destination to off-load the vehicles on board
25. RO-RO Commando Aircraft and Ground Vehicle
Carrier Version 1.0
Current T-AKR RO-RO ships have only a
V/TOL flight deck; OK if we operate only
floatplane U-27s and Little Bird helicopters
24 x A/MH-6 Little Birds
12 x U-27 Caravans
26. RO-RO Commando Aircraft and Ground Vehicle
Carrier Version 2.0
Wheel landing gear C-27Js, U-27s with tailhooks in addition
to Little Bird helicopters could operate from the RO-RO
Commando Carrier if a large flight deck were added
12 x C-27Js
LCAC
24 x A/MH-6 Little Birds
12 x U-27 Caravans
27. F-35 JSFs with lift-fan STOVL
capabilities could operate from the RO-
RO Commando Carrier; each can carry
JPODs which can each carry 2 SOF
commandos for 600+ mph fast infil/exfil
28. JPODs: A new capability for Joint Forces
Cargo and personnel carrying pod attaches to underwing hardpoints of attack
aircraft
JSF V/TOL light
STOVL heavy load
AH-64D Apache
AV-8B Harrier II
Vertical Take-Off and Landing strike aircraft can recover Isolated Personnel;
insert/extract SOF personnel
29. JPOD precision glide/parachute delivery of weapons,
supplies and/or Exfiltration Vehicles to Isolated
Personnel Partial and Full Recovery Option
31. Possible Exfiltration Vehicles
that could be carried by JPODs
to Isolated Personnel & SOF
Powered Parachutes
Folding Mountain Bikes
Small All-Terrain Vehicles