The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies Fourth Generation Warfare going on right under America’s nose. As one cyber-terrorist said: “You do not need a gun to wage war in the 21st Century. All you need is a laptop and a good internet connection.” Stay Alert, Stay Armed and…
Category: Future Warfare
When To Trust A Story That Uses Unnamed Sources
When To Trust A Story That Uses Unnamed Sources A Good read in the current fake news climate in which we live. Let us not forget that one of the KEY TACTICS of Fourth Generation Warfare (4GW) currently employed by countries such as Russia, China, Iran and North Korea is the use of Misdirection/Disinformation…
Dose of Truth: The “Future” of War is Now
If any of you have ever read the book Ghost Fleet by P.W. Singer you would realize with a chill down your spine that more and more things listed in that fictional work regarding Military Technology is beginning to unfold right before our eyes. The recent unveiling of China’s new Dark Sword Drone makes the…
China on the Border
CHINESE PURCHASE LARGE MEXICAN RADIO STATION NEAR US BORDER Fourth Generation Warfare continues to be waged by China, this time via radio waves. China has perfected the art of Lawfare, Information Warfare, Cyber-Warfare, Cyber Theft, Economic Terrorism Propaganda and good ole’ fashioned espionage down to a science. Just ask Diane Feinstein about it. This…
Cryptocurrencies and Unconventional Warfare
Cryptocurrencies and Unconventional Warfare (click on title link above to be re-directed to Source) A really interesting read for the forward thinking civilian operator. There are so many applications here that I really could not name them all. One of the key ones I find really relevant is the Partisan/Asymmetric Concept. Stay Alert, Stay Armed…
Surveillance State: Ways Your Wi-Fi Router Can Spy on You
All the Ways Your Wi-Fi Router Can Spy on You (click on above link to be re-directed) Overall, not surprising news by a long shot but you may be shocked at the WAYS in which it can spy on you, specifically, programs like Wi-Key. Like all Technology in the tight hands tools like this could…
Cyber-Warfare for Sale
Hackers claim to auction NSA source code (click above title link to be re-directed to Source page) More shenanigans from State Sponsored hacking groups most likely. Just another reminder that we have not yet begun to see the true capabilities of what warfare in the fifth domain entails. Stay Alert, Stay Armed and Stay Dangerous!
Espionage Files: How Putin Weaponized Wiki-Leaks
Evidence suggests that a Russian intelligence group was the source of the most recent Wikileaks intel dump, which was aimed to influence the U.S. election. Close your eyes and imagine that a hacking group backed by Russian President Vladimir Putin broke into the email system of a major U.S. political party. The group stole thousands…
Modern Warfare: Ukrainian Border Guards in Donbas Suffer Retina Burns From Laser Weapons
Three Ukrainian border guards at the Marinka checkpoint have suffered retina burns of varying severity while conducting terrain surveillance using optical equipment. The Ukrainian State Border Service suspects that prohibited special purpose laser weapons were used against them. “The nature of the burns and preliminary medical diagnosis leads to the conclusion that it’s possible that the enemy used high-power light…
The Surveillance State: Drones and The End of Society
The human race is on the brink of momentous and dire change. It is a change that potentially smashes our institutions and warps our society beyond recognition. It is also a change to which almost no one is paying attention. I’m talking about the coming obsolescence of the gun-wielding human infantryman as a weapon of…
