In 1999, two Chinese colonels wrote a book called Unrestricted Warfare, about warfare in the age of globalization. Their main argument: Warfare in the modern world will no longer be primarily a struggle defined by military means — or even involve the military at all. They were about a decade and a half before their…
Category: Information Warfare
The Surveillance State: The CIA is Investing in Firms that “Mine” Your Twitter and Instagram Data
SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept….
Espionage Files: Naval Espionage in an A2AD Age
U.S. Navy Lt. Edward Lin, a native of Taiwan, speaks about his path to US citizenship at a naturalization ceremony in Honolulu, Hawaii, in this US Navy handout photo taken December 3, 2008. Lin, a US Navy officer with access to sensitive US intelligence, faces espionage charges over accusations he passed state secrets, possibly…
Modern Crime: Fed’s Try To Unlock Phones Because of Drugs NOT Terrorism
UNTIL THE FBI backed down from its battle with Apple over accessing the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, it seemed the agency had chosen a near-perfect case on which to make its stand against encryption. By refusing to write software to help law enforcement crack Farook’s phone, Apple was made to…
Cyber-Warfare: Policing The Dark Web and How it Can Effect National Sovereignty
Cops hack into foreign computers to find cyber criminals As crime continues to proliferate on the so-called dark web, law enforcement agencies are sometimes having to work outside of their jurisdiction. When a suspected criminal acts on the dark web, authorities are unlikely to know where in the world he or she is physically located….
The Long History of “Little Green Men” Tactics and How They Were Defeated
In both Crimea and the subsequent fighting in the Donbas region of Ukraine, Russia’s signature tactic has been the use of so-called “Green Men,” soldiers without identifying insignia whose identity as Russian soldiers the Kremlin denied. Ukraine, Georgia, and even NATO members like Estonia now fear that they could be the next target for Russia’s…
Crusader Corner: ISIS Publishes Kill List with Names and Addresses of Minnesota Cops
Just like Great Britian, This is the end-result of a Govt. that pacifies and emboldens Terrorist. With this kind of policy, Nobody is safe anymore. Take Responsibility for you and your family’s safety NOW. -SF “Islamic State hackers post ‘kill list’ of Minnesota cops,” by Kellan Howell, The Washington Times, March 15, 2016: A group…
“Predictive Policing”: The Cyber Version of “Stop and Frisk”
Thanks America! How China’s Newest Software Could Track, Predict, and Crush Dissent Armed with data from spying on its citizens, Beijing could turn ‘predictive policing’ into an AI tool of repression. What if the Communist Party could have predicted Tiananmen Square? The Chinese government is deploying a new tool to keep the population from uprising. Beijing is building…
The Rise of the Hybrid Warriors: From Ukraine to the Middle East
The Iraqi Army defenders of Ramadi had held their dusty, stony ground for over a year and become familiar with the increasing adeptness of their opponents waving black flags. At first, these Iraqi Army units simply faced sprayed rifle fire, but then it was well-placed sniper rounds that forced these weary units to keep under…
STRATFOR Founder Warns: “Be Ready for War”
Interstate warfare is a thankfully unusual occurrence in the present day. State-assisted nonstate groups frequently fight governments, a scenario currently unfolding in Syria, Eastern Ukraine, and a host of other places. But you’d have to go back to the US-led invasion of Saddam Hussein’s Iraq in 2003, or the Eritrea-Ethiopia conflict of the late 1990s for an example…