- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Archive for March, 2012
Smartphones Leak Encryption
Posted by Brian in Gear, News, Threat Watch on 7/Mar/2012 19:26
Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:
The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.
Military Vehicle Expo
|
|||||||
Interested in sponsoring or exhibiting at this event? If so please contact Thomas Boccard at 1-646-253-5517 or tom.boccard@idga.org. |
NSA Creates Secure Call System
Technology Review reports that the NSA has devised a system in which phones with the Android software are able to make encrypted phone calls.
Let’s hope that this tech trickles down to the consumer market.
Maryland Gun Law: Unconstitutional
Another gun law bites the dust, this time in Maryland. The same lawyer who won the Heller case and the case in Chicago is behind the challenge to the Maryland law.
“A citizen may not be required to offer a ‘good and substantial reason’ why he should be permitted to exercise his rights,†Legg wrote. “The right’s existence is all the reason he needs.â€
That’s why we call them “rights”.
Texas DPS Acquires Red River Gun Boats
Posted by Brian in News, Threat Watch on 2/Mar/2012 15:14
From Wired’s Danger Room:
The boats have drawn comparison to Vietnam-era Patrol Fast Craft boats, or Swift Boats. But they’re a bit smaller, with a length of 34 feet in comparison to the Swift Boat’s 50. Swift Boats were also armed with high-explosive mortars, which will not be on board the gunboats. Still, they’re pretty menacing. The gunboats will reportedly carry an arsenal of six mounted machine guns apiece.
Spring Sniper Match – Tac Pro Shooting Center
Posted by Gary in Matches and Competitions, News, Schools on 2/Mar/2012 10:00
From XS-Info
Saturday, March 10th and Sunday, March 11th Tac Pro is hosting their 2012 Spring Sniper Tournament in partnership with Precision Rifle Series
Call 254-968-3112 or email@tacproshootingcenter.com for all the details. Click here for Entry Form!
Web Links Could Compromise Your Smartphone
Technology Review reports that if you have a smartphone that runs a version of Android, be careful about the links you click:
A chilling demonstration to a small, packed room at the RSA security conference today showed how clicking a single bad Web link while using a phone running Google’s Android operating system could give an attacker full remote control of your phone.
The Myth of the End of Terrorism
This is a report from STRATFOR:
By Scott Stewart
In this week’s Geopolitical Weekly, George Friedman discussed the geopolitical cycles that change with each generation. Frequently, especially in recent years, those geopolitical cycles have intersected with changes in the way the tactic of terrorism is employed and in the actors employing it.
The Arab terrorism that began in the 1960s resulted from the Cold War and the Soviet decision to fund, train and otherwise encourage groups in the Middle East. The Soviet Union and its Middle Eastern proxies also sponsored Marxist terrorist groups in Europe and Latin America. They even backed the Japanese Red Army terrorist group. Places like South Yemen and Libya became havens where Marxist militants of many different nationalities gathered to learn terrorist tradecraft, often instructed by personnel from the Soviet KGB or the East German Stasi and from other militants.
The Cold War also spawned al Qaeda and the broader global jihadist movement as militants flocking to fight the Soviet troops who had invaded Afghanistan were trained in camps in northern Pakistan by instructors from the CIA’s Office of Technical Services and Pakistan’s Inter-Services Intelligence directorate. Emboldened by the Soviet withdrawal from Afghanistan, and claiming credit for the subsequent Soviet collapse, these militants decided to expand their efforts to other parts of the world. Read the rest of this entry »