[current_date format=l,] [current_date]

Inside The Defense Secretary and Joint Chiefs Chairman News Conference

10 Views

By Akerele Christabel

In the aftermath of what will now be known as the 12-Day war, US Joint Chiefs chairman, Dan Caine, has openly lauded American service men for their roles in the conflict. The briefing occurred in two segments, the first dealing with the Air Defenders in the US base at Udeid. The second segment of the news conference was concerned about Operation Midnight Hammer – the bombing of Iran’s nuclear facility at Fordow. On Monday, 23rd June, 2025, warnings showed that Iran planned to attack American bases in the region. The Al-Udeid Air Base in Qatar, which serves as the headquarters for US forces in the Middle East,  soon emerged as one of the targets for an Iranian bombarding. In response to the looming attack, the brass opted to move

In the aftermath of what will now be known as the 12-Day war, US Joint Chiefs chairman, Dan Caine, has openly lauded American service men for their roles in the conflict. The briefing occurred in two segments, the first dealing with the Air Defenders in the US base at Udeid. The second segment of the news conference was concerned about Operation Midnight Hammer – the bombing of Iran’s nuclear facility at Fordow.

On Monday, 23rd June, 2025, warnings showed that Iran planned to attack American bases in the region. The Al-Udeid Air Base in Qatar, which serves as the headquarters for US forces in the Middle East,  soon emerged as one of the targets for an Iranian bombarding. In response to the looming attack, the brass opted to move most personnel off base to ensure security, leaving behind a small force of 44 American soldiers in their twenties under the control of a 25-year old lieutenant.

Around 12:30 PM local time, Chairman Caine reports, Iran launches an attack that was detected by the Patriot system, leading to multiple missile interceptions. The military higher-ups had previously ordered the base to orient the missile batteries northward before the attacks arrived. In what is now seen as the largest single Patriot missile engagement in US military history, the Al-Udeid base was peppered by a combined hail of metal, debris, and fire. However, with the efforts of the relatively young, inexperienced, but determined US soldiers and their Qatari Patriot crew members.

“There was a lot of metal flying around between taking missiles being hit by Patriots, boosters being hit by Patriots, the Patriots flying around, and debris from the Patriots hitting the ground. A lot of metal flying around. Yet U.S. Air Defenders had only seconds to make complex decisions with strategic impact. These awesome humans, along with their Qatari brothers and sisters in arms, stood between a salvo and the safety of Al Udeid. They are unsung heroes of the 21st Century United States Army, and I know a lot of you have seen the videos online and the excitement as the Patriots departed launch areas and went up and guided. This really demonstrates the combat capability and capacity of our Army Air Defenders. Simply stated, they absolutely crushed it. If you’d flip it over.” Chairman Caine said.

The second part of the briefing dealt with the offensive aspect of the US’ involvement in the 12-Day War.  The Chairman described the ideation of the GBU-57 Ordnance Penetrator weapon, the major bombs used for the attack on Fordow. According to him, there is an organization in the U.S. called the Defense Threat Reduction Agency (DTRA), which he claims is the world’s leading expert on deeply buried underground targets.

In 2009, a Defense Threat Reduction Agency officer, whose name was withheld for security reasons, was brought into a vault at an undisclosed location and briefed on something going on in Iran. He was shown photos and highly classified intelligence of a major construction project in the mountains of Iran. He was tasked to study this facility and work with the intelligence community to understand it and joined by an additional teammate. For the next 15 years, the duo absorbed all details regarding their target – Fordow.

“(They) studied geology, watched Iranians dig it out, he watched construction, weather, discarded material, geology, construction materials, where materials came from, looked at vents, exhaust, electrical system, environmental control system, every nook, every crater, every piece of equipment going in and every piece going out.” Chairman Caine said.

During the course of their research on Fordow, the DTRA team found out that there were no existing weapons with the firepower to destroy the nuclear base. They had  to work with industry and other tacticians to develop the GBU-57. The GBU-57 is a 30,000-pound weapon that can be dropped only by the B-2. It is comprised of steel, explosive, and a fuse programmed bespoke to achieve a particular effect inside the target. Each weapon had a unique desired impact angle, arrival, final heading, and fuse setting. The fuse tells the bomb when to function. A longer delay in a fuse, the deeper the weapon will penetrate and drive into the target.

“The video I’m about to show you is a culmination of over 15 years of development and testing, as I said, hundreds of test shots on various models. This is one weapon, so if you take a view of this as five additional, you will get a sense of what this looks like.” Chairman Caine said while showing a video clip of the weapon.

In the raid on Fordow, the mission operators employed a total of six GBU-57 Ordnance Penetrator Weapon, a mass of firepower they considered strong enough to blow up the highly reinforced nuclear facility. The mission planners focused on two ventilation shafts  as the primary point of entry. The Iranians anticipated this and reinforrced the shafts with concrete. The mission planners accounted for this and tasked the first weapon with forcibly removing the concrete cap. Weapons two, three, four, five were tasked to enter the main shaft, move down into the complex at greater than 1000 feet per second, and explode in the mission space.  Weapons number six was designed as a flex weapon to allow the operators to cover if one of the preceding jets or one of the preceding weapons did not work.

The video on the screen shows the weapons penetrating deeply into the mission space without creating surface craters, as they are designed to detonate underground. All six weapons at each vent of Fordow hit their intended targets. The bomb’s damage comes from blast, fragmentation, and over-pressure, with the primary kill mechanism being over pressure and blast waves destroying critical hardware inside the tunnels. The damage assessment was based on extensive modeling, emphasizing the cumulative effect of multiple weapons detonating simultaneously.

The last part of the news conference was devoted to thanking the crew members of the bomber jets, most of who were graduates of the Air Force Weapons School in Nevada and who ranked from Captain to Colonel.

“ One last story about people. Crews went to work on Friday. They kissed their loved ones goodbye, not knowing when or if they would be home. Late Saturday night, their families became aware of what was happening, and on Sunday, when those jets returned from Whiteman, their families were there, flags flying and tears flowing. I have chills literally talking about this. Jets rejoined into a formation of four airplanes followed by a formation of three and came overhead Whiteman proudly in a traffic pattern, pitching to land right over the base and landing to incredible cheers of their families who sacrifice and serve right alongside their family members”.

Joint Chiefs Chairman Caine wrapped up the news conference with an assurance that the American Joint Force will continue to think, train, test, and learn. He also included a thinly veiled warning to foes around the world, telling them that the US DTRA has eyes on them.

Tag

More on this topic

More Stories

Contact us

Wherever & whenever you are,
we are here always.

The Middle Land

100 Wilshire Blvd., Suite 700 Santa Monica, CA 90401
Footer Contact

Terms and Conditions

October, 2023

Using our website

You may use the The Middle Land website subject to the Terms and Conditions set out on this page. Visit this page regularly to check the latest Terms and Conditions. Access and use of this site constitutes your acceptance of the Terms and Conditions in-force at the time of use.

Intellectual property

Names, images and logos displayed on this site that identify The Middle Land are the intellectual property of New San Cai Inc. Copying any of this material is not permitted without prior written approval from the owner of the relevant intellectual property rights.

Requests for such approval should be directed to the competition committee.

Please provide details of your intended use of the relevant material and include your contact details including name, address, telephone number, fax number and email.

Linking policy

You do not have to ask permission to link directly to pages hosted on this website. However, we do not permit our pages to be loaded directly into frames on your website. Our pages must load into the user’s entire window.

The Middle Land is not responsible for the contents or reliability of any site to which it is hyperlinked and does not necessarily endorse the views expressed within them. Linking to or from this site should not be taken as endorsement of any kind. We cannot guarantee that these links will work all the time and have no control over the availability of the linked pages.

Submissions 

All information, data, text, graphics or any other materials whatsoever uploaded or transmitted by you is your sole responsibility. This means that you are entirely responsible for all content you upload, post, email or otherwise transmit to the The Middle Land website.

Virus protection

We make every effort to check and test material at all stages of production. It is always recommended to run an anti-virus program on all material downloaded from the Internet. We cannot accept any responsibility for any loss, disruption or damage to your data or computer system, which may occur while using material derived from this website.

Disclaimer

The website is provided ‘as is’, without any representation or endorsement made, and without warranty of any kind whether express or implied.

Your use of any information or materials on this website is entirely at your own risk, for which we shall not be liable. It is your responsibility to ensure any products, services or information available through this website meet your specific requirements.

We do not warrant the operation of this site will be uninterrupted or error free, that defects will be corrected, or that this site or the server that makes it available are free of viruses or represent the full functionality, accuracy and reliability of the materials. In no event will we be liable for any loss or damage including, without limitation, loss of profits, indirect or consequential loss or damage, or any loss or damages whatsoever arising from the use, or loss of data, arising out of – or in connection with – the use of this website.

Privacy & Cookie Policy

September 11, 2024

Last Updated: September 11, 2024

New San Cai Inc. (hereinafter “The Middle Land,” “we,” “us,” or “our”) owns and operates www.themiddleland.com, its affiliated websites and applications (our “Sites”), and provides related products, services, newsletters, and other offerings (together with the Sites, our “Services”) to art lovers and visitors around the world.

This Privacy Policy (the “Policy”) is intended to provide you with information on how we collect, use, and share your personal data. We process personal data from visitors of our Sites, users of our Services, readers or bloggers (collectively, “you” or “your”). Personal data is any information about you. This Policy also describes your choices regarding use, access, and correction of your personal information.

If after reading this Policy you have additional questions or would like further information, please email at middleland@protonmail.com.

PERSONAL DATA WE COLLECT AND HOW WE USE IT

We collect and process personal data only for lawful reasons, such as our legitimate business interests, your consent, or to fulfill our legal or contractual obligations.

Information You Provide to Us

Most of the information Join Talents collects is provided by you voluntarily while using our Services. We do not request highly sensitive data, such as health or medical information, racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, etc. and we ask that you refrain from sending us any such information.

Here are the types of personal data that you voluntarily provide to us:

  • Name, email address, and any other contact information that you provide by filling out your profile forms
  • Billing information, such as credit card number and billing address
  • Work or professional information, such as your company or job title
  • Unique identifiers, such as username or password
  • Demographic information, such as age, education, interests, and ZIP code
  • Details of transactions and preferences from your use of the Services
  • Correspondence with other users or business that you send through our Services, as well as correspondence sent to JoinTalents.com

As a registered users or customers, you may ask us to review or retrieve emails sent to your business. We will access these emails to provide these services for you.

We use the personal data you provide to us for the following business purposes:

  • Set up and administer your account
  • Provide and improve the Services, including displaying content based on your previous transactions and preferences
  • Answer your inquiries and provide customer service
  • Send you marketing communications about our Services, including our newsletters (please see the Your Rights/Opt Out section below for how to opt out of marketing communications)
  • Communicate with users who registered their accounts on our site
  • Prevent, discover, and investigate fraud, criminal activity, or violations of our Terms and Conditions
  • Administer contests and events you entered

Information Obtained from Third-Party Sources

We collect and publish biographical and other information about users, which we use to promote the articles and our bloggers  who use our sites. If you provide personal information about others, or if others give us your information, we will only use that information for the specific reason for which it was provided.

Information We Collect by Automated Means

Log Files

The site uses your IP address to help diagnose server problems, and to administer our website. We use your IP addresses to analyze trends and gather broad demographic information for aggregate use.

Every time you access our Site, some data is temporarily stored and processed in a log file, such as your IP addresses, the browser types, the operating systems, the recalled page, or the date and time of the recall. This data is only evaluated for statistical purposes, such as to help us diagnose problems with our servers, to administer our sites, or to improve our Services.

Do Not Track

Your browser or device may include “Do Not Track” functionality. Our information collection and disclosure practices, and the choices that we provide to customers, will continue to operate as described in this Privacy Policy, whether or not a “Do Not Track” signal is received.

HOW WE SHARE YOUR INFORMATION

We may share your personal data with third parties only in the ways that are described in this Privacy Policy. We do not sell, rent, or lease your personal data to third parties, and We does not transfer your personal data to third parties for their direct marketing purposes.

We may share your personal data with third parties as follows:

  • With service providers under contract to help provide the Services and assist us with our business operations (such as our direct marketing, payment processing, fraud investigations, bill collection, affiliate and rewards programs)
  • As required by law, such as to comply with a subpoena, or similar legal process, including to meet national security or law enforcement requirements
  • When we believe in good faith that disclosure is necessary to protect rights or safety, investigate fraud, or respond to a government request
  • With other users of the Services that you interact with to help you complete a transaction

There may be other instances where we share your personal data with third parties based on your consent.

HOW WE STORE AND SECURE YOUR INFORMATION

We retain your information for as long as your account is active or as needed to provide you Services. If you wish to cancel your account, please contact us middleland@protonmail.com. We will retain and use your personal data as necessary to comply with legal obligations, resolve disputes, and enforce our agreements.

All you and our data are stored in the server in the United States, we do not sales or transfer your personal data to the third party. All information you provide is stored on a secure server, and we generally accepted industry standards to protect the personal data we process both during transmission and once received.

YOUR RIGHTS/OPT OUT

You may correct, update, amend, delete/remove, or deactivate your account and personal data by making the change on your Blog on www.themiddleland.com or by emailing middleland@protonmail.com. We will respond to your request within a reasonable timeframe.

You may choose to stop receiving Join Talents newsletters or marketing emails at any time by following the unsubscribe instructions included in those communications, or you can email us at middleland@protonmail.com

LINKS TO OTHER WEBSITES

The Middle Land include links to other websites whose privacy practices may differ from that of ours. If you submit personal data to any of those sites, your information is governed by their privacy statements. We encourage you to carefully read the Privacy Policy of any website you visit.

NOTE TO PARENTS OR GUARDIANS

Our Services are not intended for use by children, and we do not knowingly or intentionally solicit data from or market to children under the age of 18. We reserve the right to delete the child’s information and the child’s registration on the Sites.

PRIVACY POLICY CHANGES

We may update this Privacy Policy to reflect changes to our personal data processing practices. If any material changes are made, we will notify you on the Sites prior to the change becoming effective. You are encouraged to periodically review this Policy.

HOW TO CONTACT US

If you have any questions about our Privacy Policy, please email middleland@protonmail.com

Logout

Are you sure? Do you want to logout of the account?

Article Submission

[forminator_form id="30962"]

New Programs Added to Your Plan

March 2, 2023

The Michelin brothers created the guide, which included information like maps, car mechanics listings, hotels and petrol stations across France to spur demand.

The guide began to award stars to fine dining restaurants in 1926.

At first, they offered just one star, the concept was expanded in 1931 to include one, two and three stars. One star establishments represent a “very good restaurant in its category”. Two honour “excellent cooking, worth a detour” and three reward “exceptional cuisine, worth a

 

February 28, 2023        Hiring Journalists all hands apply

January 18, 2023          Hiring Journalists all hands apply

More

Forgot Password ?

Please enter your email id or user name to
recover your password

Thank you for your participation!
Back to Home
Thank you for your subscription!
Please check your email to activate your account.
Back to Home
Thank you for your participation!
Please check your email for the results.
Back to Home
Thank you for your participation!
Please check your email to activate your account.
Back to Home

Login to Vote!

Thank you for your participation,
please Log in or Sign up to Vote

Thank you for your Comment

Back to Home

Reply To:

New Programs Added to Your Plan

[forminator_form id="31075"]

Login Now

123Sign in to your account