Things to Think About Before Israel Attacks Iran

From: Defense Media Network

For several years, Israel has publicly and explicitly stated that if Iran attempts to develop a nuclear weapon, Israel will attack to prevent the program from succeeding or to destroy Iran’s nuclear capability…

Read More

, , ,

No Comments

Oppose HR 3523, the Cyber Intelligence Sharing and Protection Act of 2011

From the Electronic Frontier Foundation:

Congress is considering legislation that would give companies a free pass to monitor and collect communications, including huge amounts of personal data like your text messages and emails, and share that data with the government and anyone else. All a company has to do is claim its privacy violations were for “cybersecurity purposes.” Tell Congress that they can’t use vaguely-defined “cybersecurity threats” as a shortcut to bypassing the law.

, , , , , , ,

No Comments

The State of the World: Assessing China’s Strategy

This report is republished from STRATFOR:

By George Friedman

Simply put, China has three core strategic interests.

Paramount among them is the maintenance of domestic security. Historically, when China involves itself in global trade, as it did in the 19th and early 20th centuries, the coastal region prospers, while the interior of China — which begins about 160 kilometers (100 miles) from the coast and runs about 1,600 kilometers to the west — languishes. Roughly 80 percent of all Chinese citizens currently have household incomes lower than the average household income in Bolivia. Most of China’s poor are located west of the richer coastal region. This disparity of wealth time and again has exposed tensions between the interests of the coast and those of the interior. After a failed rising in Shanghai in 1927, Mao Zedong exploited these tensions by undertaking the Long March into the interior, raising a peasant army and ultimately conquering the coastal region. He shut China off from the international trading system, leaving China more united and equal, but extremely poor.

The current government has sought a more wealth-friendly means of achieving stability: buying popular loyalty with mass employment. Plans for industrial expansion are implemented with little thought to markets or margins; instead, maximum employment is the driving goal. Private savings are harnessed to finance the industrial effort, leaving little domestic capital to purchase the output. China must export accordingly. Read the rest of this entry »

, , ,

No Comments

Smartphones Leak Encryption

Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:

The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.

, , , , ,

No Comments

Guns and Ammo 2012 Annual

On newsstands now:

, , ,

No Comments

Military Vehicle Expo

Military Vehicles Exhibition & Conference

Dear Colleague,

Invest your time wisely at the LARGEST stand alone vehicles event in the world – it’s your only chance on US soil to network with over 2,500 vehicle professionals and top military experts from the US and around the world!

Register for your EXPO PASS and benefit from:

• Real-Time Networking Opportunities
Meet more people and see more products from all those involved in the vehicle supply chain in two days than you will all year.

• Influential Speakers and Presentations
Get up-to-the-minute information on major US and international military vehicle programs and learn about next-generation technologies being researched at labs and universities during the two day Presentation Theater sessions. Download the Presentation Theater Agenda.

• Interactive Exhibition
Evaluate the latest vehicles, components and after market add-on products from hundreds of exhibitors side-by-side from across the globe during in-depth hands-on demonstrations.

This is your chance to come together with the largest cross-section of the military vehicles community and its supporting product and service providers!

WAYS TO REGISTER

Online: www.MilitaryVehiclesExpo.com
Phone: 1-800-882-8684
Email: info@idga.org
* Use code: IDGA2

Join the Conversation!
LinkedIn Facebook Twitter

Mark Your Calendar

Tell a Colleague

Expo Pass
Program Agenda 2012

Vehicle

 

Interested in sponsoring or exhibiting at this event?
If so please contact Thomas Boccard at 1-646-253-5517 or tom.boccard@idga.org.

, ,

No Comments

NSA Creates Secure Call System

Technology Review reports that the NSA has devised a system in which phones with the Android software are able to make encrypted phone calls.

Let’s hope that this tech trickles down to the consumer market.

, , , , ,

No Comments

Maryland Gun Law: Unconstitutional

Another gun law bites the dust, this time in Maryland. The same lawyer who won the Heller case and the case in Chicago is behind the challenge to the Maryland law.

“A citizen may not be required to offer a ‘good and substantial reason’ why he should be permitted to exercise his rights,” Legg wrote. “The right’s existence is all the reason he needs.”

That’s why we call them “rights”.

, , ,

No Comments

Win Barrett’s 30th Anniversary M107A1

Barrett is raffling off a special version of their 50 caliber rifle for the HAVA veterans group.

Enter to WIN the 30th tribute M107A1â„¢ in our raffle to benefit HAVA.
Honored American Veterans Afield
This piece of history is a nickel-Teflon coated .50 caliber rifle, engraved with the Barrett 30th Anniversary logo and “Rifle 1 of 1”. You can view this rifle in person at the 2012 NRA Show booth #931 (St. Louis, MO April 13-15).  100% of the proceeds will benefit Honored American Veterans Afield (HAVA).

, , ,

No Comments

Gunblast Review Diamondback DB9

, , , ,

No Comments

Texas DPS Acquires Red River Gun Boats

From Wired’s Danger Room:

The boats have drawn comparison to Vietnam-era Patrol Fast Craft boats, or Swift Boats. But they’re a bit smaller, with a length of 34 feet in comparison to the Swift Boat’s 50. Swift Boats were also armed with high-explosive mortars, which will not be on board the gunboats. Still, they’re pretty menacing. The gunboats will reportedly carry an arsenal of six mounted machine guns apiece.

, , , , ,

No Comments

Inside The Cockpit

, , ,

No Comments

Spring Sniper Match – Tac Pro Shooting Center

From XS-Info

Tac Pro Shooting CenterSaturday, March 10th and Sunday, March 11th Tac Pro is hosting their 2012 Spring Sniper Tournament in partnership with Precision Rifle Series

Call 254-968-3112 or email@tacproshootingcenter.com for all the details. Click here for Entry Form!

,

No Comments

Web Links Could Compromise Your Smartphone

Technology Review reports that if you have a smartphone that runs a version of Android, be careful about the links you click:

A chilling demonstration to a small, packed room at the RSA security conference today showed how clicking a single bad Web link while using a phone running Google’s Android operating system could give an attacker full remote control of your phone.

, , , , ,

No Comments

The Myth of the End of Terrorism

This is a report from STRATFOR:

By Scott Stewart

In this week’s Geopolitical Weekly, George Friedman discussed the geopolitical cycles that change with each generation. Frequently, especially in recent years, those geopolitical cycles have intersected with changes in the way the tactic of terrorism is employed and in the actors employing it.

The Arab terrorism that began in the 1960s resulted from the Cold War and the Soviet decision to fund, train and otherwise encourage groups in the Middle East. The Soviet Union and its Middle Eastern proxies also sponsored Marxist terrorist groups in Europe and Latin America. They even backed the Japanese Red Army terrorist group. Places like South Yemen and Libya became havens where Marxist militants of many different nationalities gathered to learn terrorist tradecraft, often instructed by personnel from the Soviet KGB or the East German Stasi and from other militants.

The Cold War also spawned al Qaeda and the broader global jihadist movement as militants flocking to fight the Soviet troops who had invaded Afghanistan were trained in camps in northern Pakistan by instructors from the CIA’s Office of Technical Services and Pakistan’s Inter-Services Intelligence directorate. Emboldened by the Soviet withdrawal from Afghanistan, and claiming credit for the subsequent Soviet collapse, these militants decided to expand their efforts to other parts of the world. Read the rest of this entry »

, , , , , , ,

No Comments