- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Things to Think About Before Israel Attacks Iran
Posted by Gary in Threat Watch on 8/Mar/2012 14:45
From: Defense Media Network
For several years, Israel has publicly and explicitly stated that if Iran attempts to develop a nuclear weapon, Israel will attack to prevent the program from succeeding or to destroy Iran’s nuclear capability…
The State of the World: Assessing China’s Strategy
This report is republished from STRATFOR:
By George Friedman
Simply put, China has three core strategic interests.
Paramount among them is the maintenance of domestic security. Historically, when China involves itself in global trade, as it did in the 19th and early 20th centuries, the coastal region prospers, while the interior of China — which begins about 160 kilometers (100 miles) from the coast and runs about 1,600 kilometers to the west — languishes. Roughly 80 percent of all Chinese citizens currently have household incomes lower than the average household income in Bolivia. Most of China’s poor are located west of the richer coastal region. This disparity of wealth time and again has exposed tensions between the interests of the coast and those of the interior. After a failed rising in Shanghai in 1927, Mao Zedong exploited these tensions by undertaking the Long March into the interior, raising a peasant army and ultimately conquering the coastal region. He shut China off from the international trading system, leaving China more united and equal, but extremely poor.
The current government has sought a more wealth-friendly means of achieving stability: buying popular loyalty with mass employment. Plans for industrial expansion are implemented with little thought to markets or margins; instead, maximum employment is the driving goal. Private savings are harnessed to finance the industrial effort, leaving little domestic capital to purchase the output. China must export accordingly. Read the rest of this entry »
Smartphones Leak Encryption
Posted by Brian in Gear, News, Threat Watch on 7/Mar/2012 19:26
Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:
The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.
Military Vehicle Expo
![]() |
|||||||
|
|||||||
| Interested in sponsoring or exhibiting at this event? If so please contact Thomas Boccard at 1-646-253-5517 or tom.boccard@idga.org. |
NSA Creates Secure Call System
Technology Review reports that the NSA has devised a system in which phones with the Android software are able to make encrypted phone calls.
Let’s hope that this tech trickles down to the consumer market.
Maryland Gun Law: Unconstitutional
Another gun law bites the dust, this time in Maryland. The same lawyer who won the Heller case and the case in Chicago is behind the challenge to the Maryland law.
“A citizen may not be required to offer a ‘good and substantial reason’ why he should be permitted to exercise his rights,†Legg wrote. “The right’s existence is all the reason he needs.â€
That’s why we call them “rights”.
Texas DPS Acquires Red River Gun Boats
Posted by Brian in News, Threat Watch on 2/Mar/2012 15:14
From Wired’s Danger Room:
The boats have drawn comparison to Vietnam-era Patrol Fast Craft boats, or Swift Boats. But they’re a bit smaller, with a length of 34 feet in comparison to the Swift Boat’s 50. Swift Boats were also armed with high-explosive mortars, which will not be on board the gunboats. Still, they’re pretty menacing. The gunboats will reportedly carry an arsenal of six mounted machine guns apiece.
Spring Sniper Match – Tac Pro Shooting Center
Posted by Gary in Matches and Competitions, News, Schools on 2/Mar/2012 10:00
From XS-Info
Saturday, March 10th and Sunday, March 11th Tac Pro is hosting their 2012 Spring Sniper Tournament in partnership with Precision Rifle Series
Call 254-968-3112 or email@tacproshootingcenter.com for all the details. Click here for Entry Form!
Web Links Could Compromise Your Smartphone
Technology Review reports that if you have a smartphone that runs a version of Android, be careful about the links you click:
A chilling demonstration to a small, packed room at the RSA security conference today showed how clicking a single bad Web link while using a phone running Google’s Android operating system could give an attacker full remote control of your phone.
The Myth of the End of Terrorism
This is a report from STRATFOR:
By Scott Stewart
In this week’s Geopolitical Weekly, George Friedman discussed the geopolitical cycles that change with each generation. Frequently, especially in recent years, those geopolitical cycles have intersected with changes in the way the tactic of terrorism is employed and in the actors employing it.
The Arab terrorism that began in the 1960s resulted from the Cold War and the Soviet decision to fund, train and otherwise encourage groups in the Middle East. The Soviet Union and its Middle Eastern proxies also sponsored Marxist terrorist groups in Europe and Latin America. They even backed the Japanese Red Army terrorist group. Places like South Yemen and Libya became havens where Marxist militants of many different nationalities gathered to learn terrorist tradecraft, often instructed by personnel from the Soviet KGB or the East German Stasi and from other militants.
The Cold War also spawned al Qaeda and the broader global jihadist movement as militants flocking to fight the Soviet troops who had invaded Afghanistan were trained in camps in northern Pakistan by instructors from the CIA’s Office of Technical Services and Pakistan’s Inter-Services Intelligence directorate. Emboldened by the Soviet withdrawal from Afghanistan, and claiming credit for the subsequent Soviet collapse, these militants decided to expand their efforts to other parts of the world. Read the rest of this entry »







