Military and Security Developments Involving the People’s Republic of China 2020: Annual Report to Congress

From the Report's PREFACE: "2020 marks an important year for the People’s Liberation Army (PLA) as it works to achieve important modernization milestones ahead of the Chinese Communist Party’s (CCP) broader goal to transform China into a 'moderately prosperous society' by the CCP’s centenary in 2021." "... the PLA’s objective is to become a 'world-class'... Continue Reading →

Unclassified and Secure: A Defense Industrial Base Cyber Protection Program for Unclassified Defense Networks

From the Report: "The defense industrial base (DIB) is under attack. Foreign actors are stealing large amounts of sensitive data, trade secrets, and intellectual property every day from DIB firms — contributing to the erosion of the DIB and potentially harming U.S. military capabilities and future U.S. military operations. The U.S. Department of Defense (DoD)... Continue Reading →

Emerging Military Technologies: Background and Issues for Congress (Nov. 10, 2020)

From the Report's SUMMARY: "Members of Congress and Pentagon officials are increasingly focused on developing emerging military technologies to enhance U.S. national security and keep pace with U.S. competitors. The U.S. military has long relied upon technological superiority to ensure its dominance in conflict and to underwrite U.S. national security. In recent years, however, technology... Continue Reading →

Premenstrual Syndrome (PMS)

"The present paper will start by arguing that PMS is a medicalization of normal female emotions and feelings surrounding menstruation, rather than a real psychological/physical disorder rooted in female physiology. This position will first be supported by evidence gleaned from feminist sources on the subject, before being challenged by evidence found in medical, scientific sources.... Continue Reading →

Pwning the pen tester: Malicious Wireshark packet capture file risk revealed

"Maliciously constructed Wireshark packet capture files might be used to distribute malware, providing recipients can be tricked into double clicking file URL fields. Variants of the same attack could potentially be thrown against users of the popular network security tool, widely used by security analysts and penetration testers, whether they use Windows or Xubuntu Linux-based systems." Full article:... Continue Reading →

Blog at WordPress.com.

Up ↑

Design a site like this with WordPress.com
Get started