Pentagon Admits U.S. Allied Afghans Are Raping Children

For further info on how the Pentagon is punishing soldiers who attempt to stop the abuse of children, please see HERE.

 

A senior Pentagon official admitted to the Washington Free Beacon late Monday that Afghan forces allied with U.S. troops in the war-torn country have been caught sexually abusing children.

The admission comes on the heels of reports that the Obama administration has been punishing U.S. soldiers who blew the whistle on this sexual abuse.

U.S. lawmakers early Monday expressed shock and outrage over the report and called on Martin Dempsey, the chairman of the Join Chiefs of Staff, to immediately address a policy of ordering U.S. troops to ignore such sexual abuse. Continue reading

China’s Military Buildup Worrisome, Japan’s U.S. Ambassador Says

China’s “spectacularly active” naval posture and “massive” military buildup in Asia are part of a pattern of belligerent behavior toward Japan and other neighbors over maritime disputes, according to Japan’s ambassador to the U.S.

Speaking at a Bloomberg Government breakfast in Washington yesterday, Japanese Ambassador to the U.S. Kenichiro Sasae described China’s increasingly frequent forays to lodge territorial claims in the resource-rich East and South China Seas as “harassing” and “provocative.” Continue reading

Hacker uses an Android to remotely attack and hijack an airplane

PlaneSploit Android app to hijack airplanes by Hugo Teso

 

The Hack in the Box (#HITB2013AMS) security conference in Amsterdam has a very interesting lineup of talks [pdf]. One that jumped out was the Aircraft Hacking: Practical Aero Series presented by Hugo Teso, a security consultant at n.runs in Germany. According to the abstract, “This presentation will be a practical demonstration on how to remotely attack and take full control of an aircraft, exposing some of the results of my three years research on the aviation security field. The attack performed will follow the classical methodology, divided in discovery, information gathering, exploitation and post-exploitation phases. The complete attack will be accomplished remotely, without needing physical access to the target aircraft at any time, and a testing laboratory will be used to attack virtual airplanes systems. Continue reading

‘Paralysis warfare’: China’s cyber focus is to cripple U.S. infrastructure

China’s cyber warfare capabilities have become sophisticated enough to easily cripple key elements of the U.S. national defense infrastructure in a pre-emptive attack, according to a new report.

The bipartisan congressional U.S.-China Economic and Security Commission released an analysis on March 8 titled “Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage.” The 136-page report details China’s spectacular advances in cyber warfare capabilities specifically targeting the U.S. military.

The Chinese call this type of preemptive cyber attack “paralysis warfare,” say the report’s authors, Bryan Krekel, Patton Adams and George Bakos, information security experts for Northrop Grumman.

“Unlike traditional air or ballistic missile strikes, network attack and exploitation in particular can be initiated prior to the start of traditional hostilities without being a de-facto cassus belli and if done properly, can be implanted with little or no attribution back to China,” the report states.

Full article: ‘Paralysis warfare’: China’s cyber focus is to cripple U.S. infrastructure (World Tribune)