- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Archive for category Threat Watch
Terrorism Hits Sweden
Posted by Brian in News, Threat Watch on 12/Dec/2010 15:05
A Muslim terrorist blew himself up in a Swedish shopping center yesterday.
Here is the Reuters report.
TT said the letter promised attacks over Sweden’s presence in Afghanistan, where it has 500 troops with the U.S.-led NATO force, and the cartoons drawn three years ago by Lars Vilks.
Vilks, the target of several attacks, told Reuters Television he was safe and was getting used to being a target.
“Sweden is panicking of course because this has never been the case before that you have an act of terrorism directed toward the public, and this will of course create fear in Sweden,” he said in an interview.
Now we will see the resolve of the Swedish government. Will they bow to a culture stuck in the 5th century or will they double their efforts to eradicate the enemy.
China and its Double-edged Cyber-sword
Posted by Brian in Comms, Threat Watch on 10/Dec/2010 09:25
China and its Double-edged Cyber-sword is republished with permission of STRATFOR.
By Sean Noonan
A recent batch of WikiLeaks cables led Der Spiegel and The New York Times to print front-page stories on China’s cyber-espionage capabilities Dec. 4 and 5. While China’s offensive capabilities on the Internet are widely recognized, the country is discovering the other edge of the sword.
China is no doubt facing a paradox as it tries to manipulate and confront the growing capabilities of Internet users. Recent arrests of Chinese hackers and People’s Liberation Army (PLA) pronouncements suggest that China fears that its own computer experts, nationalist hackers and social media could turn against the government. While the exact cause of Beijing’s new focus on network security is unclear, it comes at a time when other countries are developing their own defenses against cyber attacks and hot topics like Stuxnet and WikiLeaks are generating new concerns about Internet security.
One of the U.S. State Department cables released by WikiLeaks focuses on the Chinese-based cyber attack on Google’s servers that became public in January 2010. According to a State Department source mentioned in one of the cables, Li Changchun, the fifth highest-ranking member of the Communist Party of China (CPC) and head of the Party’s Propaganda Department, was concerned about the information he could find on himself through Google’s search engine. He also reportedly ordered the attack on Google. This is single-source information, and since the cables WikiLeaks released do not include the U.S. intelligence community’s actual analysis of the source, we cannot vouch for its accuracy. What it does appear to verify, however, is that Beijing is regularly debating the opportunities and threats presented by the Internet. Read the rest of this entry »
Medevac in Afghanistan Can Mean Life or Death
Posted by Gary in Medic, News, Threat Watch, Warriors on 9/Dec/2010 16:16
From: Arizona Daily Star
EDITOR’S NOTE: Associated Press photographer Brennan Linsley recently spent a week embedded with Charlie Company, from the 6th Battalion and 101st Aviation Regiment, known as Shadow Dustoff. He describes the work of Army medevac teams in the war zone of southern Afghanistan.
HELMAND PROVINCE, Afghanistan – It was pushing dusk when the call came: “One Category Alpha.” The voice crackled over the radio, urgent but matter-of-fact. Translation: One man severely wounded, medical care needed right away.
The medical evacuation team – a pilot, co-pilot, crew chief, flight medic and, on this day, an AP photographer – scrambled into the Black Hawk helicopter. In a few minutes we were zigzagging at more than 150 mph, the fields and mud compounds blurring past like a movie in fast forward. The crew chief held up two fingers: Distance from landing zone, two minutes.
Landing amid gunfire
As darkness fell, the Marines ignited a colored smoke grenade to mark the landing zone. The Black Hawk touched down only to be fired on by insurgents hiding nearby, despite the clear red cross marked on its nose and sides. It rose again and circled.
When it landed the second time, the crew chief threw open the side door to a storm of dust. Within seconds the Marines hauled aboard their comrade, who had a gunshot wound to the head.
The helicopter flew off, low and fast under fire. The medic went straight to work. But the wound was too severe.
The Marine died. Lance Cpl. Ross S. Carver of Rocky Point, N.C., was 21 years old.
Cyber-Threat Whitepapers
Posted by Gary in Comms, Threat Watch on 9/Dec/2010 14:31
Cyber Warfare
Posted by Gary in Comms, Threat Watch on 8/Dec/2010 17:07
From IDGA
Over the last year there have been multiple instances of breaches in cyber security in the DoD and government. Most recently a report detailing the fact that in April massive amounts of internet data traffic was re-routed through servers in China which then had access to the potentially sensitive information. The incident which lasted 18 minutes was traced back to China Telecom, a state owned telecommunications firm. The data included information from .mil and .gov sources as well as large corporations such as Microsoft and IBM.
It is not clear if any compromising information was gained from this effort or how or if any of the gathered data will be used. But it is concerning for many of the agencies and companies involved as they are unsure of where they stand or what could potentially be used against them in the future.
This is not an isolated incident and the U.S. government and the Pentagon have been battling cyber attacks, hacking, and other forms of internet crime for years now. However, in the last several years these attacks are growing in number and sophistication and are resulting in security breaches that could have grave consequences. Many seem to be coming from sources in Eastern Europe including Russia and an increasing number from China. However, it is unclear whether these attacks can be linked to government intelligence networks or are a result of cyber terrorists operating on their own personal agenda.
Solution: Kill The Enemy
Posted by Brian in News, Threat Watch on 7/Dec/2010 18:10
The Washington Examiner has a great article on our military capturing and releasing combatants.
A marine stationed in southern Afghanistan’s volatile Helmand province told The Examiner that efforts to detain insurgent fighters are “worthless.”
Earlier this year, his unit held a man known to be working with the Taliban. The Marines had gathered evidence that the man was transporting hundreds of pounds of bomb-making equipment and explosives for the Taliban. But, shortly after they captured him, he was set free.
“Less than two weeks later, we saw the same guy walking through the bazaar,” said the marine, who spoke on condition that he not be named. “He recognized us. I wanted to shoot him right then and there. We got the guy, and yet there he was, walking around planning to kill again, and we couldn’t do a thing about it.”
If the military brass and politicians would stop trying to direct the war and instead focus on killing those who take up arms against us and those who are helping them, I think the morale of the soldiers would be higher and the war would be over. It seems ever since World War II we decided to fight the rest of our wars with one hand tied behind our back.
Tire Shop Robber Shot by Armed Citizen (TX)
Posted by Jack Sinclair in News, Threat Watch on 6/Dec/2010 17:11
A Texas shop owner with a concealed carry permit defends himself from armed robbers.
77 Year Old Apartment Owner Shoots Invader
Posted by Jack Sinclair in News, Threat Watch on 6/Dec/2010 17:09
After several apartment invasions in the area, an elderly Cincinnati apartment owner had his gun at the ready when the crooks knocked down his door.
Armed Citizen saves his family from intruders – Houston, Texas
Posted by Jack Sinclair in News, Threat Watch on 6/Dec/2010 17:07
In Dcember 2007, a Houston homeowner was awakened by a loud noise. Suspecting foul play, he sent his wife and young children to shelter and retrieved his handgun. Upon entering his bedroom, he spied a suspect crawling through the window and fired several shots. The suspect, whom other reports indicate was a repeat offender with multiple felonies, died at the scene. The case was referred to a Texas grand jury, who has just cleared the homeowner of wrongdoing.
Lebanese Bank Customer Pulls Gun, Stops Robber
Posted by Jack Sinclair in News, Threat Watch on 6/Dec/2010 17:05
Armed Homeowner Shoots Robbers During Daytime Invasion (AZ)
Posted by Jack Sinclair in News, Threat Watch on 6/Dec/2010 17:04
Arizona Citizens Defense League
Posted by Jack Sinclair in Law, News, Threat Watch on 6/Dec/2010 17:00
WikiLeaks Reveals Hostilities Between Russia and Georgia
Posted by Brian in News, Threat Watch on 3/Dec/2010 16:09
Wired’s Danger Room reports that Russia may have been secretly trying to destabilize Georgia before the battle in 2008.
The brief shooting war between Russia and Georgia in 2008 was just the final, action-packed scene of a years-long drama. As the U.S. Embassy in the Georgian capitol of Tblisi saw it, Moscow spent much of the previous decade destabilizing the former Soviet republic, using “missile attacks and murder plots,†natural-gas “sabotage†and support to Georgian separatists.
Attacks on Nuclear Scientists in Tehran
Posted by Brian in News, Threat Watch on 3/Dec/2010 14:15
Attacks on Nuclear Scientists in Tehran is republished with permission of STRATFOR.
By Ben West
On the morning of Nov. 29, two Iranian scientists involved in Iran’s nuclear development program were attacked. One was killed, and the other was injured. According to Iranian media, the deceased, Dr. Majid Shahriari, was heading the team responsible for developing the technology to design a nuclear reactor core, and Time magazine referred to him as the highest-ranking non-appointed individual working on the project.
Official reports indicate that Shahriari was killed when assailants on motorcycles attached a “sticky bomb†to his vehicle and detonated it seconds later. However, the Time magazine report says that an explosive device concealed inside the car detonated and killed him. Shahriari’s driver and wife, both of whom were in the car at the time, were injured.
Meanwhile, on the opposite side of town, Dr. Fereidoon Abassi was injured in a sticky-bomb attack reportedly identical to the one officials said killed Shahriari. His wife was accompanying him and was also injured (some reports indicate that a driver was also in the car at the time of the attack). Abassi and his wife are said to be in stable condition. Abassi is perhaps even more closely linked to Iran’s nuclear program than Shahriari was, since he was a member of the elite Iranian Revolutionary Guard Corps and was named in a 2007 U.N. resolution that sanctioned high-ranking members of Iran’s defense and military agencies believed to be trying to obtain nuclear weapons. Read the rest of this entry »
Net Centric Warfare Webinar
Posted by Gary in Comms, Threat Watch, Training on 29/Nov/2010 17:29
Coevolution of NCW: Challenges with Cyberspace and Organizational Development
This FREE webinar will be on:
Thursday, December 16, 2010, 2:00 PM – 3:00 PM ET
Presenter: Maj. Trisha Carpenter
The U.S. military is facing an entire new front in warfare, the cyber domain. Controlling and dominating this new technological theater is becoming critically important as U.S. Military leadership relies heavily on computer networks to communicate, gather INTEL, and even launch weapons and coordinated strikes. At the same time the military is striving to perfect the concept of Net Centric Warfare to effectively use technology to gain advantage and superiority over enemy forces. Two main obstacles may stand in the way of a successful transformation from the current haphazard state of cyberspace operations to a more productive future state required of Network Centric Warfare (NCW). The first obstacle is the military’s lack in knowledge of cyberspace operations. The second obstacle is the difficulty in understanding organizational change. This Webinar first presents a working definition of NCW to show how cyberspace and organizational change are related in the form of coevolution. It then discusses the organizational growth challenges faced by any organization operating in this domain, with a focus on the security missions likely to be given to cyber commands.
In this webinar participants will learn:
• An Operational Illustration of NCW
• Key Challenges in Cyberspace:
• Technical Environment: Cyber Triad
• Non-Technical Environment: Organizational Design