From an Information Security standpoint, this seems like a terrible idea. Shouldn't everything for military purposes go through strict accessibility procedures? What happens when foreign armies use the same training tactics as the US? — couldn't that pose a possible threat? possibly something in the article I missed;…