Topic: Military history (Page 11)

You are looking at all articles with the topic "Military history". We found 259 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

🔗 Pigeon photography

🔗 Military history 🔗 Military history/Military science, technology, and theory 🔗 Military history/World War I 🔗 Military history/German military history 🔗 Birds 🔗 Photography 🔗 Photography/History of photography 🔗 Military history/European military history

Pigeon photography is an aerial photography technique invented in 1907 by the German apothecary Julius Neubronner, who also used pigeons to deliver medications. A homing pigeon was fitted with an aluminium breast harness to which a lightweight time-delayed miniature camera could be attached. Neubronner's German patent application was initially rejected, but was granted in December 1908 after he produced authenticated photographs taken by his pigeons. He publicized the technique at the 1909 Dresden International Photographic Exhibition, and sold some images as postcards at the Frankfurt International Aviation Exhibition and at the 1910 and 1911 Paris Air Shows.

Initially, the military potential of pigeon photography for aerial reconnaissance appeared interesting. Battlefield tests in World War I provided encouraging results, but the ancillary technology of mobile dovecotes for messenger pigeons had the greatest impact. Owing to the rapid perfection of aviation during the war, military interest in pigeon photography faded and Neubronner abandoned his experiments. The idea was briefly resurrected in the 1930s by a Swiss clockmaker, and reportedly also by the German and French militaries. Although war pigeons were deployed extensively during World War II, it is unclear to what extent, if any, birds were involved in aerial reconnaissance. The United States Central Intelligence Agency (CIA) later developed a battery-powered camera designed for espionage pigeon photography; details of its use remain classified.

The construction of sufficiently small and light cameras with a timer mechanism, and the training and handling of the birds to carry the necessary loads, presented major challenges, as did the limited control over the pigeons' position, orientation and speed when the photographs were being taken. In 2004, the British Broadcasting Corporation (BBC) used miniature television cameras attached to falcons and goshawks to obtain live footage, and today some researchers, enthusiasts and artists similarly deploy crittercams with various species of animals.

Discussed on

🔗 Zip gun

🔗 Military history 🔗 Military history/Military science, technology, and theory 🔗 Military history/Weaponry

Improvised firearms (sometimes called zip guns or pipe guns) are firearms manufactured other than by a firearms manufacturer or a gunsmith, and are typically constructed by adapting existing materials to the purpose. They range in quality from crude weapons that are as much a danger to the user as the target to high-quality arms produced by cottage industries using salvaged and repurposed materials.

Improvised firearms are commonly used as tools by criminals and insurgents and are often associated with such groups; other uses include self-defense in lawless areas and hunting game in poor rural areas.

Discussed on

🔗 The 1788 Doctors' Riot

🔗 Military history 🔗 Military history/North American military history 🔗 Military history/United States military history 🔗 Medicine 🔗 New York City

The doctors' riot was an incident that occurred in April 1788 in New York City, where the illegal procurement of corpses from the graves of the recently deceased caused a mass expression of discontent from poorer New Yorkers that was directed primarily at physicians and medical students.

Discussed on

🔗 Operation Popeye

🔗 Military history 🔗 Military history/North American military history 🔗 Military history/United States military history 🔗 Military history/Asian military history 🔗 Military history/Southeast Asian military history 🔗 Vietnam

Operation Popeye (Project Controlled Weather Popeye / Motorpool / Intermediary-Compatriot) was a highly classified weather modification program in Southeast Asia during 1967–1972. The cloud seeding operation during the Vietnam War ran from March 20, 1967 until July 5, 1972 in an attempt to extend the monsoon season, specifically over areas of the Ho Chi Minh Trail. The operation was used to induce rain and extend the East Asian Monsoon season in support of U.S. government efforts related to the War in Southeast Asia.

The former U.S. Secretary of Defense, Robert S. McNamara, was aware that there might be objections raised by the international scientific community but said in a memo to the president that such objections had not in the past been a basis for prevention of military activities considered to be in the interests of U.S. national security.

The chemical weather modification program was conducted from Thailand over Cambodia, Laos, and Vietnam and allegedly sponsored by Secretary of State Henry Kissinger and CIA without the authorization of then Secretary of Defense Melvin Laird who had categorically denied to Congress that a program for modification of the weather for use as a tactical weapon even existed.

Discussed on

🔗 Fire balloon

🔗 Aviation 🔗 Military history 🔗 Military history/Military aviation 🔗 Military history/Military science, technology, and theory 🔗 Military history/Weaponry

An incendiary balloon (or balloon bomb) is a balloon inflated with a lighter than air gas such as hot air, hydrogen, or helium, that has a bomb, incendiary device, or Molotov cocktail attached. The balloon is carried by the prevailing winds to the target area, where it falls or releases its payload.

Discussed on

🔗 List of Assassination Attempts on Adolf Hitler

🔗 Germany 🔗 Military history 🔗 Death 🔗 Lists 🔗 Politics 🔗 LGBT studies 🔗 Discrimination 🔗 Military history/World War II 🔗 Military history/German military history 🔗 Politics/Fascism 🔗 Jewish history 🔗 Military history/European military history

This is an incomplete list of documented attempts to assassinate Adolf Hitler.

All attempts occurred in the German Reich, except where noted. All attempts involved citizens of the German Reich, except where noted. No fewer than 42 plots have been uncovered by historians. However, the true numbers cannot be accurately determined due to an unknown number of undocumented cases.

Discussed on

🔗 Fulton Surface to Air Recovery System

🔗 Military history 🔗 Military history/North American military history 🔗 Military history/United States military history 🔗 Military history/Military science, technology, and theory

The Fulton surface-to-air recovery system (STARS) is a system used by the Central Intelligence Agency (CIA), United States Air Force and United States Navy for retrieving persons on the ground using aircraft such as the MC-130E Combat Talon I and Boeing B-17. It involves using an overall-type harness and a self-inflating balloon with an attached lift line. An MC-130E engages the line with its V-shaped yoke and the person is reeled on board. Red flags on the lift line guide the pilot during daylight recoveries; lights on the lift line are used for night recoveries. Recovery kits were designed for one and two-man retrievals.

This system was developed by inventor Robert Edison Fulton, Jr., for the Central Intelligence Agency in the early 1950s. It was an evolution from a similar system that was used during World War II by American and British forces to retrieve both personnel and downed assault gliders following airborne operations. The earlier system did not use a balloon, but a line stretched between a pair of poles set in the ground on either side of the person to be retrieved. An aircraft, usually a C-47 Skytrain, trailed a grappling hook that engaged the line, which was attached to the person to be retrieved.

Discussed on

🔗 Unethical human experimentation in the United States

🔗 Human rights 🔗 Military history 🔗 Military history/North American military history 🔗 Military history/United States military history 🔗 Military history/Military science, technology, and theory 🔗 Military history/Weaponry 🔗 Medicine 🔗 Biology 🔗 Military history/World War II 🔗 Military history/Cold War 🔗 United States History 🔗 Medicine/Society and Medicine

Unethical human experimentation in the United States describes numerous experiments performed on human test subjects in the United States that have been considered unethical, and were often performed illegally, without the knowledge, consent, or informed consent of the test subjects. Such tests have occurred throughout American history, but particularly in the 20th century. The experiments include: the exposure of humans to many chemical and biological weapons (including infection with deadly or debilitating diseases), human radiation experiments, injection of toxic and radioactive chemicals, surgical experiments, interrogation and torture experiments, tests involving mind-altering substances, and a wide variety of others. Many of these tests were performed on children, the sick, and mentally disabled individuals, often under the guise of "medical treatment". In many of the studies, a large portion of the subjects were poor, racial minorities, or prisoners.

Funding for many of the experiments was provided by the United States government, especially the United States military, the Central Intelligence Agency, or private corporations involved with military activities. The human research programs were usually highly secretive, and in many cases information about them was not released until many years after the studies had been performed.

The ethical, professional, and legal implications of this in the United States medical and scientific community were quite significant, and led to many institutions and policies that attempted to ensure that future human subject research in the United States would be ethical and legal. Public outrage in the late 20th century over the discovery of government experiments on human subjects led to numerous congressional investigations and hearings, including the Church Committee and Rockefeller Commission, both of 1975, and the 1994 Advisory Committee on Human Radiation Experiments, among others.

Discussed on

🔗 British Expedition to Abyssinia

🔗 Military history 🔗 Military history/African military history 🔗 Ethiopia 🔗 Military history/British military history

The British Expedition to Abyssinia was a rescue mission and punitive expedition carried out in 1868 by the armed forces of the British Empire against the Ethiopian Empire. Emperor Tewodros II of Ethiopia, then often referred to by the anglicized name Theodore, imprisoned several missionaries and two representatives of the British government in an attempt to get the attention of the British government, which had decided against his requests for military assistance. The punitive expedition launched by the British in response required the transportation of a sizable military force hundreds of miles across mountainous terrain lacking any road system. The formidable obstacles to the action were overcome by the commander of the expedition, General Sir Robert Napier, who was victorious in every battle with the troops of Tewodros, captured the Ethiopian capital and rescued all the hostages. The expedition was widely hailed on its return for achieving all its objectives.

Harold G. Marcus described the action as "one of the most expensive affairs of honour in history."

Discussed on

🔗 Stuxnet

🔗 United States 🔗 Computing 🔗 Military history 🔗 Military history/North American military history 🔗 Military history/United States military history 🔗 Military history/Military science, technology, and theory 🔗 Military history/Weaponry 🔗 Iran 🔗 Computing/Software 🔗 Computing/Computer Security 🔗 Military history/Middle Eastern military history

Stuxnet is a malicious computer worm, first uncovered in 2010, thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel.

Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including gas centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet's design and architecture are not domain-specific and it could be tailored as a platform for attacking modern supervisory control and data acquisition (SCADA) and PLC systems (e.g., in factory assembly lines or power plants), most of which are in Europe, Japan, and the US. Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges. Targeting industrial control systems, the worm infected over 200,000 computers and caused 1,000 machines to physically degrade.

Stuxnet has three modules: a worm that executes all routines related to the main payload of the attack; a link file that automatically executes the propagated copies of the worm; and a rootkit component responsible for hiding all malicious files and processes, to prevent detection of Stuxnet. It is typically introduced to the target environment via an infected USB flash drive, thus crossing any air gap. The worm then propagates across the network, scanning for Siemens Step7 software on computers controlling a PLC. In the absence of either criterion, Stuxnet becomes dormant inside the computer. If both the conditions are fulfilled, Stuxnet introduces the infected rootkit onto the PLC and Step7 software, modifying the code and giving unexpected commands to the PLC while returning a loop of normal operation system values back to the users.

In 2015, Kaspersky Lab noted that the Equation Group had used two of the same zero-day attacks prior to their use in Stuxnet and commented that "the similar type of usage of both exploits together in different computer worms, at around the same time, indicates that the Equation Group and the Stuxnet developers are either the same or working closely together".

Discussed on