‘Golden Age of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping

‘Golden Age Of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping

 

“Longstanding interest by US national security leaders has been heightened by Chinese advancements in quantum computing. For example, in 2017 China became the first country to demonstrate ‘quantum entanglement’ from a satellite to Earth. It could lead to much more secure communications between satellites and ground stations, as well as highly encrypted transponder feeds for communications.”

Stay Alert, Armed and Dangerous!

 

Advertisements

Google Removes The Mask: How Chrome Is Surveillance Software

Great Read.

Share it with someone you care about.

Beneath the Velvet Glove lay an Iron Fist- a digital one. So what’s Google been up to and what’s your course of action?

via Google Removes The Mask: How Chrome Is Surveillance Software — American Partisan

The End of Passwords: DISA Test Walkabout Identity System

End Of Passwords: DISA Tests Walkabout Identity System

 

The Future is Now.

Stay Alert, Armed and Dangerous!

 

Artificial Intelligence in Warfare: “Predictive” Maintenance

Fix It Before It Breaks: SOCOM, JAIC Pioneer Predictive Maintenance AI

 

For those of you that have served you know all too well the term “Preventative Maintenance” (PM). Remember those little White books attached by a dog tag chain to every piece of friggin equipment? Well in the 21st century you can scratch that term and replace it with “Predictive” Maintenance. What?

Stay Alert, Armed and Dangerous!

 

This Person Does Not Exist

 

Ever wonder how all those American, Russian and Chinese BOT accounts on Twitter, Facebook, Instagram, YouTube, Linked-In etc. got the actual human face avatars for their accounts? How about all those legit looking PHISHING attacks? Well, they created them out of thin air of course! Yep folks, in the 21st century world of cyber-manipulation and warfare, there’s an App for that, it’s called (wait for it) This Person Does not Exist.

It’s really user friendly. There are not even any menu’s or buttons, just refresh your page for a new, ambiguous, non-existent human face! Creepy huh? Of course creating fake BOT and PHISHING accounts is just the tip of the proverbial iceberg in the 4th and 5th Generations of Cyber Warfare.

Welcome to a Brave New World.

 

Stay Alert, Armed and Dangerous!

Future Warfare: China and the Big Hack

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

Fourth Generation Warfare going on right under America’s nose.

As one cyber-terrorist said: “You do not need a gun to wage war in the 21st Century. All you need is a laptop and a good internet connection.”

Stay Alert, Stay Armed and Stay Dangerous!

 

Dose of Truth: The “Future” of War is Now

 

If any of you have ever read the book Ghost Fleet by P.W. Singer you would realize with a chill down your spine that more and more things listed in that fictional work regarding Military Technology is beginning to unfold  right before our eyes.

The recent unveiling of China’s new Dark Sword Drone makes the 4GW tactic of “Drone Swarming” more realistic than ever.

The book’s primary goal is not just a fictional account of World War 3, but how a future conflict with China and Russia will most likely LOOK LIKE, and by that I mean in the parameters of 4th Generation Warfare Tactics.

Not only will Technology play a major role but also the MANNER in which a future war will be waged, (false flag events, proxy military actions, fake news, unconventional warfare tactics,  etc.)

I urge all martial civilians to get familiar with these tactics and technology because who knows, one day we might, like the Wolverines in Red Dawn, find ourselves ‘smack dab in the middle of World War Three.’

Stay Alert, Stay Armed and Stay Dangerous!