- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged china
Pentagon’s New China Plan
From The Washington Times:
The plan calls for preparing the Air Force, Navy and Marine Corps to defeat China’s “anti-access, area denial weapons,†including anti-satellite weapons, cyberweapons, submarines, stealth aircraft and long-range missiles that can hit aircraft carriers at sea.
Chinese Fighters Cross “Middle Line” With Taiwan
Posted by Brian in News, Threat Watch on 25/Jul/2011 22:14
From Financial Times:
Two Chinese fighter jets crossed an unofficial dividing line in the Taiwan Strait late last month in pursuit of a US spy aircraft, according to defence sources in Taipei and Beijing.
Confirmation of the close encounter comes as the US and China are trying to cool tensions in the South China Sea and safeguard a recent improvement in bilateral military relations.
“Defective” Chips could have caused U.S. military shut down by secret ‘back door’
Posted by Jack Sinclair in Comms, News, Threat Watch, Warrior Tools on 13/Jul/2011 11:03
“Sources have confirmed that the U.S. Department of Defense over recent months purchased 59,000 microchips to use in Navy equipment that control everything from missiles to transponders.
But all of the chips turned out to be cheap knock-offs from China, and they ultimately were not installed, according to sources.
Besides being subject to failure, the chips also were designed with a “back door” which would have allowed the chip, and the device it controlled, to be shut down remotely at any time, sources report.
Had the flaw not been detected, the chips could have shut down U.S. warships, aircraft, advanced weapons systems and encoded transponders that distinguish friendly aircraft from hostile attackers.”
Sophisticated Attacks Threaten Major Energy Firms
Posted by Gary in Comms, Threat Watch on 18/Feb/2011 15:29
From: Dark Reading
New advanced persistent threat (APT) attack combines a variety of vectors, seeks to steal sensitive data, McAfee researchers say
By Tim Wilson
Researchers at McAfee yesterday revealed details of a new advanced persistent threat attack that uses a combination of methods in an effort to steal sensitive operations, exploration, and financial data from petroleum and energy companies.The new series of attacks, dubbed “Night Dragon,” may have begun as long ago as 2008, McAfee says in its report about the threat. “Now, new Night Dragon attacks are being identified every day,” the report says. Night Dragon’s creators “appear to be highly organized and motivated in their pursuits,” McAfee says.The attack is “a combination of social engineering and well-coordinated, targeted, cyber attacks using Trojans, remote control software, and other malware.” The report says McAfee has seen evidence of the attacks in virtually every region of the globe, and that it has “identified tools, techniques, and network activities utilized … that point to individuals in China as the primary source. ”
China’s Military Comes Into Its Own
China’s Military Comes Into Its Own is republished with permission of STRATFOR.
By Rodger Baker
Chinese President Hu Jintao is visiting the United States, perhaps his last state visit as president before China begins its generational leadership transition in 2012. Hu’s visit is being shaped by the ongoing China-U.S. economic dialogue, by concerns surrounding stability on the Korean Peninsula and by rising attention to Chinese defense activity in recent months. For example, China carried out the first reported test flight of its fifth-generation combat fighter prototype, dubbed the J-20, during U.S. Defense Secretary Robert Gates’ visit to China the previous week.
The development and test flight of China’s J-20 is not insignificant, but it is also by no means a game changer in the U.S.-China defense balance. More intriguingly, the test highlights how China’s military increasingly is making its interests heard. Read the rest of this entry »
China and its Double-edged Cyber-sword
Posted by Brian in Comms, Threat Watch on 10/Dec/2010 09:25
China and its Double-edged Cyber-sword is republished with permission of STRATFOR.
By Sean Noonan
A recent batch of WikiLeaks cables led Der Spiegel and The New York Times to print front-page stories on China’s cyber-espionage capabilities Dec. 4 and 5. While China’s offensive capabilities on the Internet are widely recognized, the country is discovering the other edge of the sword.
China is no doubt facing a paradox as it tries to manipulate and confront the growing capabilities of Internet users. Recent arrests of Chinese hackers and People’s Liberation Army (PLA) pronouncements suggest that China fears that its own computer experts, nationalist hackers and social media could turn against the government. While the exact cause of Beijing’s new focus on network security is unclear, it comes at a time when other countries are developing their own defenses against cyber attacks and hot topics like Stuxnet and WikiLeaks are generating new concerns about Internet security.
One of the U.S. State Department cables released by WikiLeaks focuses on the Chinese-based cyber attack on Google’s servers that became public in January 2010. According to a State Department source mentioned in one of the cables, Li Changchun, the fifth highest-ranking member of the Communist Party of China (CPC) and head of the Party’s Propaganda Department, was concerned about the information he could find on himself through Google’s search engine. He also reportedly ordered the attack on Google. This is single-source information, and since the cables WikiLeaks released do not include the U.S. intelligence community’s actual analysis of the source, we cannot vouch for its accuracy. What it does appear to verify, however, is that Beijing is regularly debating the opportunities and threats presented by the Internet. Read the rest of this entry »
A Change of Course in Cuba and Venezuela?
A Change of Course in Cuba and Venezuela? is republished with permission of STRATFOR.
By George Friedman and Reva Bhalla
Strange statements are coming out of Cuba these days. Fidel Castro, in the course of a five-hour interview in late August, reportedly told Jeffrey Goldberg of The Atlantic and Julia Sweig of the Council on Foreign Relations that “the Cuban model doesn’t even work for us anymore.â€
Once that statement hit the headlines, Castro backtracked. Dressed in military uniform for the first time in four years (which we suspect was his way of signaling that he was not abandoning the revolution), he delivered a rare, 35-minute speech Sept. 3 to students at the University of Havana. In addition to spending several minutes on STRATFOR’s Iran analysis, Castro addressed his earlier statement on the Cuban model, saying he was “accurately quoted but misinterpreted†and suggesting that the economic model doesn’t work anymore but that the revolution lives on.
Castro, now 84, may be old, but he still seems to have his wits about him. We don’t know whether he was grossly misinterpreted by the reporter during the earlier interview, was acknowledging the futility of the Cuban model and/or was dropping hints of a policy shift. Regardless of what he did or did not say, Castro’s reported statement on the weakness of the revolution was by no means revolutionary. Read the rest of this entry »
Overview of Potential threat: Electromagnetic pulse (EMP) attack
Posted by Jack Sinclair in Threat Watch on 4/Sep/2010 16:48
“If Osama bin Laden’s al-Qaeda — or the dictators of North Korea or Iran — had the ability to destroy America as a superpower, would they be tempted to try?
Wouldn’t that temptation be even greater if that result could be achieved with a single attack, involving just one nuclear weapon, perhaps even one of modest power and relatively unsophisticated design?
And, what if the attacker could be reasonably sure that the United States would not know who was responsible for such a devastating blow?
Chinese missile could shift Pacific power balance
Posted by Jack Sinclair in News, Threat Watch on 18/Aug/2010 17:25
“Nothing projects U.S. global air and sea power more vividly than supercarriers. Bristling with fighter jets that can reach deep into even landlocked trouble zones, America’s virtually invincible carrier fleet has long enforced its dominance of the high seas.
China may soon put an end to that.
U.S. naval planners are scrambling to deal with what analysts say is a game-changing weapon being developed by China…”
http://articles.sfgate.com/2010-08-05/world/22206136_1_carrier-chinese-defense-ministry-north-korea