• China Uncensored
    11 replies, posted
[video=youtube;Hlr_AUIxvIs]https://www.youtube.com/watch?v=Hlr_AUIxvIs[/video]
They spout these facts but were are these facts coming from?
No idea. I stumbled upon the channel and thought it was interesting.
[url]https://info.publicintelligence.net/USASOC-CounterUnconventionalWarfare.pdf[/url]
[QUOTE=JohhnyCarson;49263622]No idea. I stumbled upon the channel and thought it was interesting.[/QUOTE] Shame it blindly sides with the ROC and grabs onto sensationalist stuff just to make PRC look bad.
[QUOTE=formatme;49263634][url]https://info.publicintelligence.net/USASOC-CounterUnconventionalWarfare.pdf[/url][/QUOTE] dam [QUOTE] Russia used cyber-attacks to support conventional military operations against Georgia in 2008. The Georgian government launched an attack against South Ossetia in response to missile attacks launched by rebels. The Russian Army launched an attack the next day supported by a DDOS cyber-attack targeted at government websites and media outlets preventing the flow of information.65 The Georgian Government tried to counter the cyber-attacks; however, the Russian’s were able to reroute the attack packets making them appear to come from China.66 The controller computer was located in Moscow with botnets hosted on servers in Canada, Turkey and Estonia.67 The Russian’s had the botnets target the international banking system with attacks appearing to originate from Georgia causing a shutdown of the banking system in Georgia.68 While the DDOS is an unsophisticated cyber-attack, Russia demonstrated to the world the potential of what its cyber-attack can accomplish. Russia most certainly has more sophisticated cyber-attack capabilities that could impact U.S. government and private sector infrastructure. [/QUOTE] this some crazy ass shit [QUOTE] Recent Chinese doctrine articulates the use of a wide spectrum of warfare against its adversaries, including the United States. The People’s Liberation Army (PLA) Colonels Liang and Xiangsui outline China’s vision on how China will attack the United States through a combination of military and nonmilitary actions. Qiao Liang states “the first rule of unrestricted warfare is that there are no rules, with nothing forbidden.”69 Qiao Liang’s rule suggests any method will be used to win the war at all cost. Liang’s theory presents challenges because the United States must prepare for all worse case scenarios. According to Liang and Xiangsui, China will use a host of methods, many of which lie out of the realm of conventional warfare. These methods include trade warfare, financial warfare, ecological warfare, psychological warfare, smuggling warfare, media warfare, drug warfare, network warfare, technological warfare, fabrication warfare, resources warfare, economic aid warfare, cultural warfare, and international law warfare.70 [/QUOTE]
But doesn't the US also do this to China? I'm pretty sure the US even does this to European countries (and they probably do it back, also). Everybody is constantly hacking everyone.
[QUOTE=Zyler;49263655]But doesn't the US also do this to China? I'm pretty sure the US even does this to European countries (and they probably do it back, also). Everybody is constantly hacking everyone.[/QUOTE] maybe but if so who is winning?
[QUOTE=formatme;49263915]maybe but if so who is winning?[/QUOTE] Im guessing them. Do realize this is to highlight his channel. Not just one video. [video=youtube;uK9fWNuC3U0]https://www.youtube.com/watch?v=uK9fWNuC3U0[/video]
[QUOTE=Zyler;49263655]But doesn't the US also do this to China? I'm pretty sure the US even does this to European countries (and they probably do it back, also). Everybody is constantly hacking everyone.[/QUOTE] The difference is that America just listens, China listens AND steals.
[QUOTE=Zyler;49263655]But doesn't the US also do this to China? I'm pretty sure the US even does this to European countries (and they probably do it back, also). Everybody is constantly hacking everyone.[/QUOTE] The US has a very opportunistic SIGINT program, but as far as I know doesn't do directed attacks against foreign countries*; the NSA's goals are primarily for domestic security, instead of active attacks (Which would be left to the CIA and other unnamed sub-organizations). The NSA does have some guidelines for securing home networks, though I can't seem to find them anymore. In my opinion this is what the NSA [I]should[/I] be doing, helping Americans secure their digital information from other countries cyberwarfare programs, instead of bulk collecting data on US citizens. *Barring Stuxnet, which was unlikely to be NSA work.
Been watching pretty much his entire channel lately. It helps that he has playlists that are well made which make bulk watching considerably easier. Although I do find his lack of sources annoying. At one point he made the claim that the washington post and new york times had been bribed to stop reporting on falun gong. Which while certainly possible as both are shitty news papers is a pretty bold claim to make. I couldn't easily confirm it with google anywho as when I searched washington post bribed instead I just got a lot of articles from the washington post talking about how other people got bribed.
Sorry, you need to Log In to post a reply to this thread.