Archive for category News

The State of the World: Assessing China’s Strategy

This report is republished from STRATFOR:

By George Friedman

Simply put, China has three core strategic interests.

Paramount among them is the maintenance of domestic security. Historically, when China involves itself in global trade, as it did in the 19th and early 20th centuries, the coastal region prospers, while the interior of China — which begins about 160 kilometers (100 miles) from the coast and runs about 1,600 kilometers to the west — languishes. Roughly 80 percent of all Chinese citizens currently have household incomes lower than the average household income in Bolivia. Most of China’s poor are located west of the richer coastal region. This disparity of wealth time and again has exposed tensions between the interests of the coast and those of the interior. After a failed rising in Shanghai in 1927, Mao Zedong exploited these tensions by undertaking the Long March into the interior, raising a peasant army and ultimately conquering the coastal region. He shut China off from the international trading system, leaving China more united and equal, but extremely poor.

The current government has sought a more wealth-friendly means of achieving stability: buying popular loyalty with mass employment. Plans for industrial expansion are implemented with little thought to markets or margins; instead, maximum employment is the driving goal. Private savings are harnessed to finance the industrial effort, leaving little domestic capital to purchase the output. China must export accordingly. Read the rest of this entry »

, , ,

No Comments

Smartphones Leak Encryption

Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:

The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.

, , , , ,

No Comments

Guns and Ammo 2012 Annual

On newsstands now:

, , ,

No Comments

Military Vehicle Expo

Military Vehicles Exhibition & Conference

Dear Colleague,

Invest your time wisely at the LARGEST stand alone vehicles event in the world – it’s your only chance on US soil to network with over 2,500 vehicle professionals and top military experts from the US and around the world!

Register for your EXPO PASS and benefit from:

• Real-Time Networking Opportunities
Meet more people and see more products from all those involved in the vehicle supply chain in two days than you will all year.

• Influential Speakers and Presentations
Get up-to-the-minute information on major US and international military vehicle programs and learn about next-generation technologies being researched at labs and universities during the two day Presentation Theater sessions. Download the Presentation Theater Agenda.

• Interactive Exhibition
Evaluate the latest vehicles, components and after market add-on products from hundreds of exhibitors side-by-side from across the globe during in-depth hands-on demonstrations.

This is your chance to come together with the largest cross-section of the military vehicles community and its supporting product and service providers!

WAYS TO REGISTER

Online: www.MilitaryVehiclesExpo.com
Phone: 1-800-882-8684
Email: info@idga.org
* Use code: IDGA2

Join the Conversation!
LinkedIn Facebook Twitter

Mark Your Calendar

Tell a Colleague

Expo Pass
Program Agenda 2012

Vehicle

 

Interested in sponsoring or exhibiting at this event?
If so please contact Thomas Boccard at 1-646-253-5517 or tom.boccard@idga.org.

, ,

No Comments

Maryland Gun Law: Unconstitutional

Another gun law bites the dust, this time in Maryland. The same lawyer who won the Heller case and the case in Chicago is behind the challenge to the Maryland law.

“A citizen may not be required to offer a ‘good and substantial reason’ why he should be permitted to exercise his rights,” Legg wrote. “The right’s existence is all the reason he needs.”

That’s why we call them “rights”.

, , ,

No Comments

Win Barrett’s 30th Anniversary M107A1

Barrett is raffling off a special version of their 50 caliber rifle for the HAVA veterans group.

Enter to WIN the 30th tribute M107A1â„¢ in our raffle to benefit HAVA.
Honored American Veterans Afield
This piece of history is a nickel-Teflon coated .50 caliber rifle, engraved with the Barrett 30th Anniversary logo and “Rifle 1 of 1”. You can view this rifle in person at the 2012 NRA Show booth #931 (St. Louis, MO April 13-15).  100% of the proceeds will benefit Honored American Veterans Afield (HAVA).

, , ,

No Comments

Texas DPS Acquires Red River Gun Boats

From Wired’s Danger Room:

The boats have drawn comparison to Vietnam-era Patrol Fast Craft boats, or Swift Boats. But they’re a bit smaller, with a length of 34 feet in comparison to the Swift Boat’s 50. Swift Boats were also armed with high-explosive mortars, which will not be on board the gunboats. Still, they’re pretty menacing. The gunboats will reportedly carry an arsenal of six mounted machine guns apiece.

, , , , ,

No Comments

Spring Sniper Match – Tac Pro Shooting Center

From XS-Info

Tac Pro Shooting CenterSaturday, March 10th and Sunday, March 11th Tac Pro is hosting their 2012 Spring Sniper Tournament in partnership with Precision Rifle Series

Call 254-968-3112 or email@tacproshootingcenter.com for all the details. Click here for Entry Form!

,

No Comments

Web Links Could Compromise Your Smartphone

Technology Review reports that if you have a smartphone that runs a version of Android, be careful about the links you click:

A chilling demonstration to a small, packed room at the RSA security conference today showed how clicking a single bad Web link while using a phone running Google’s Android operating system could give an attacker full remote control of your phone.

, , , , ,

No Comments

Build Your Own Firearm

The Truth About Guns has an interesting article on a little known law that allows individuals to build their own guns without serial numbers if the gun is 80% or less complete. There are some stipulations:

The machine work must be done by the end-user—no contracting it out or having a friend do it. The finished firearm can not be transferred in ANY manner. No willing it to your kids. No giving it to a friend. If you no longer want it, after your inheritors pry it from your cold, dead hands, it MUST be destroyed.

These rules seem arbitrary and silly.

,

No Comments

101st Acquires M26 Shotgun

Via Clarkson Online:

It weighs 3.5 pounds, has a barrel length of 7.75 inches, fires 12-gauge shells and can be mounted on the M4 carbine or act as a stand alone firearm; it is the M26 Modular Accessory Shotgun System and the 2nd Brigade Combat Team, 101st Airborne Division (Air Assault) is the first unit in the Army to be issued the combat enhancer.

, , , ,

No Comments

Future Body Armor

According to Defense Media Network, the Army’s PEO Soldier program is working on new lighter designs for body armor.

The next generation of body armor development will be focused on the need for a multi-functional, modular, scalable protection system that improves soldier physiological performance while reducing system/component redundancy and logistic footprint…

,

No Comments

American Servicemen Murdered Over Book Burning

From: Danger Room

Protests — some better called riots — have spread into their sixth day. Most shockingly, an Interior Ministry employee killed two U.S. servicemembers working in the ministry’s Kabul headquarters, reportedly by shooting them in the head on Saturday with a silencer-equipped pistol. Pentagon press secretary George Little called the killings “murder.”

More proof that Islam really is no different than any other religion. Muslims are just like Baptists, Buddhists and Lutherans, who will also slit throats and shoot you in the head if someone from your country burns their holy book.

, ,

No Comments

Forced Hard Drive Decryption Is Unconstitutional, Appeals Court Rules

From: Threat Level

Forcing a criminal suspect to decrypt hard drives so their contents can be used by prosecutors is a breach of the Fifth Amendment right against compelled self-incrimination, a federal appeals court ruled Thursday.

It was the nation’s first appellate court to issue such a finding. And the outcome comes a day after a different federal appeals court refused to entertain an appeal from another defendant ordered by a lower federal court to decrypt a hard drive by month’s end.

Thursday’s decision by the 11th U.S. Circuit Court of Appeals said that an encrypted hard drive is akin to a combination to a safe, and is off limits, because compelling the unlocking of either of them is the equivalent of forcing testimony.

, , , , ,

No Comments

The Making of Act Of Valor

Defense Media Network has the inside scoop on how this movie was made.

, , , ,

No Comments