Please disable your Ad Blocker to better interact with this website.

By Wes Walker,

What’s the easiest way to win a fight? By having the other guy forfeit.

That philosophy has been at the heart of the Peace Through Strength approach to the US military for a long time. If you’re the biggest, baddest guy on the block, people will think twice before messing with you.

But it doesn’t take a rocket scientist to understand there can be more than one application to that same philosophy.

We put it into practice every time we take action against hostile targets… we knock out Commmand & Control centers — and airfields — so that the other side can’t organize their defenses or an effective counter-strike.

Imagine if you could infiltrate the other side’s digital communications. Instead of firing off hundreds or thousands of missiles, you could accomplish the same kind of chaos with just a few keystrokes.

Now imagine the other side doing the same thing to us.

You need not ‘imagine’ it. China has already done that, and we’re unsure how bad the damage is.

Now would be a perfect time to know that our enemy doesn’t have leverage on our Commander-in-Chief with, say, secret financial deals where the First Family had been paid millions of dollars for a product or service that (aside from the possible explanation of political favors granted) seems wildly out-of-alignment with any ‘deliverables’ that family could have offered in return.

U.S. officials are aggressively searching for malware that they say hackers from China have implanted into American infrastructure to disrupt U.S. military operations in the event that the communist nation launches an attack on Taiwan.

Officials said that the malicious computer code, which penetrated U.S. systems well over a year ago but was only detected by Microsoft in May, was especially troubling because its purpose was not traditional spying, i.e., information gathering. Microsoft and the U.S. government both said the malware came from China.

The malware was hidden “deep inside the networks controlling power grids, communications systems and water supplies that feed military bases in the United States and around the world,” The New York Times reported. It infected systems that impact not only the U.S. military but also U.S. citizens and the economy.

Officials said that while the effort to destroy the malware has been underway for months, they still don’t know how widespread it is.

Officials say there were two possible goals when China infected utility infrastructure that “serve both civilian populations and nearby military bases,” the Times reported. The malware has not been detected in classified systems. — DailyWire

We know that China seeks global supremacy and the ability to leverage power over rivals to bend others to their will.

They have stated that control of supply chains, for instance, lets them threaten other nations by being ‘cut off’ from vital technologies. Pharmaceuticals, for example.

They have also made it clear that they view Taiwan as a ‘rogue’ state (despite that Island having NEVER bowed the knee to the devouring hunger known as Maoism)… a state that they intend to swallow by 2027.

Chinese leader Xi Jinping has ordered the Chinese military to be ready to seize Taiwan by 2027, according to CIA Deputy Director David Cohen this week.

CNN reporter Katie Bo Lillis tweeted, “Chinese President Xi Jinping has told his military that he wants to have the capability to take control of Taiwan by force by 2027, per CIA Deputy Director David Cohen—but, he said, the [intelligence community] does not currently believe that Beijing has made a decision about whether to proceed.” — American Military News

How much good does a world-class military help us if they use their dominance of digital manufacturing or hacking to exploit some way of preventing us from mobilizing it?

Cross-Posted With Clash Daily


Guest Column


Join the conversation!

We have no tolerance for comments containing violence, racism, vulgarity, profanity, all caps, or discourteous behavior. Thank you for partnering with us to maintain a courteous and useful public environment where we can engage in reasonable discourse.


Need help, have a question, or a comment? Send us an email and we'll get back to you as soon as possible.


Log in with your credentials

Forgot your details?