Proxies and Guerillas: Delayed Armageddon

Guerrilla warfare is nothing new. Neither is proxy war. China’s history of using indirect methods to erode and undermine their enemies without battle goes back to the earliest treatises on warfare written by the general T’ai Kung. (Sun Tzu’s admonition that supreme excellence is found in victory without fighting has nothing to do with pacifism […]

Attack of the Digital Dragon: Protecting Against Cyber Attacks

Any modern country has a wide variety of assets to protect. Some of those assets are more necessary than others for the country’s security, welfare, and economy in general. Such critical assets include power grids, water supplies, public-transit systems, and telecommunications, to name a few. Critical infrastructure has to be protected from a wide variety of […]

The Importance of Realistic Threat Assessment

There has been a trend in recent years that seems to the author to be metastasizing, one in which people view current threats, particularly the asymmetric ones, in a binary, black-and-white sort of way. Either a threat is an existential one, that is going to leave the U.S. in complete wreckage, or it is nothing. Examples […]

The Harmonious Fist of China: Artifacts

The term “artifact” has at least two meanings: From a technical perspective, an artifact is an unintentional pattern in data, arising from processes of collection and management. From a cultural perspective, an artifact is a designed object, with a social and material history. -Yanni Loukissas As I laid out in the first part of this […]

The Harmonious Fist Of China: Twenty Years of Strategy In The Making

The artifice on which every intra-state relationship with the People’s Republic of China (PRC) stands is: “In China, ‘win-win” means China wins twice.” There have been a few articles on the PRC here on SOFREP. I recently worked on a project that dealt with this, and thus my decision to write on it was appropriately […]

Best of SOFREP: US Government Hackers

In this week’s Best of SOFREP, we look at Coriolanus’ post, Government Hackers and the Dark Web Part 1, which covers the deep web and its relationship to analytics, and the dark web and its relationship to nefarious activity in brief. Coriolanus is the real deal, a US government super-secret good guy patriotic hacker who […]

So You Wanna Be a Hacker?

The first image that most often comes to people’s minds when they hear the term “hacker” is some young, video-game-loving, Mountain Dew drinking, Doritos-eating guy with glasses living in his parents’ basement. Add to that your typical presumption of a lack of social skills, pussy-pulling ability and more, and one tends to think that becoming […]

How China Would Wage War in the Pacific

Sino-American relations have evolved drastically over the last several decades. The rise of China has created fears and concerns within certain sectors of the US defense establishment. The question that is asked time and time again is whether or not China poses a threat to American’s regional interests in East Asia. This paper seeks to summarize […]