SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : The Financial Collapse of 2001 Unwinding -- Ignore unavailable to you. Want to Upgrade?


To: elmatador who wrote (13594)7/2/2025 4:37:48 AM
From: nicewatch  Respond to of 13774
 
Just strengthen your immune system and I don't mean shots! :-) Sorry to hear that about your trip.



To: elmatador who wrote (13594)7/2/2025 4:53:53 AM
From: nicewatch  Respond to of 13774
 
I guess these clowns are running wild in their analysis?

Unsecured Fronts: How Hybrid Warfare Influences Strategic Competition

Situation Reports - June 25, 2025 - By Nicholas A. Weber

Modern warfare has undergone a profound transformation. Modern adversaries, whether capable of traditional methods of warfare or not, now readily engage in hybrid activities that fuse political, economic, military, and informational disciplines into extremely effective, rapid, and low-cost operations with strategic effects. These new warfare strategies, if unaddressed, will usher in an age of national security uncertainty in which US dominance (established by innovation, wealth, expertise, and geography) will be perpetually threatened.

Until comprehensive legal, technical, and defense countermeasures are developed, the United States remains exposed across both its military and civilian sectors. The battlefield has expanded. Participating in strategic competition has never been easier due to low “buy-in” cost. No longer confined to traditional theaters of war, it now includes farmland, shipping containers, substations, and telecom relays—any space where adversaries can operate under the radar, they will.

At the heart of this trend lies the principle that physical proximity to sensitive infrastructure enables an adversary the opportunity to conduct operations with disproportionate strategic gains. Land near military installations can host surveillance equipment, signal intercept platforms, or serve as launch sites for expendable, one-way munitions. Civilian infrastructure—transformers, cables, or utility networks—can be Trojan horses for sabotage, pre-installed to degrade national resilience at a place and time of the adversary’s choosing.

These tactics reflect the logic of hybrid warfare: blending conventional and unconventional tools to achieve political and military objectives before and after the threshold of war. What was once considered benign—real estate transactions, transformer sales, commercial shipping—now carries the potential to become a vector for organized crisis and strategic leverage.

Chinese Trojan Horse Infrastructure

In May 2025, a Reuters report detailed an investigation by the US Department of Energy that revealed several high-voltage transformers manufactured in China were deployed across the US power grid and contained hidden communication capabilities. The devices reportedly provide ‘backdoors’ that allow remote access into the grid, yielding the potential to disable or disrupt services at a moment’s notice. This would, theoretically, allow China to queue a large-scale infrastructure crisis while simultaneously delaying the US government or US military’s ability to respond to threats or begin mobilization.

The 2024 Annual Threat Assessment from the Office of the Director of National Intelligence (ODNI) indicated that such vulnerabilities were likely the result of intentional adversary operations, and represent a growing Chinese hybrid warfare capability. The incident demonstrates that adversaries do not need direct military confrontation to undermine US dominance or defense readiness; they can accomplish it through seemingly routine infrastructure integration, itself the result of loose legislation.

Critical Infrastructure Vulnerabilities

In addition to cyber operations or material Trojan horses, China’s non-conventional sabotage also poses a growing risk to infrastructure critical to the national security apparatus. Between November 2024 and February 2025, the United States and allied intelligence services identified a Chinese sabotage campaign in which, on three separate occasions, Chinese vessels targeted and destroyed undersea telecommunications cables. These cables connect the digital economies and military commands of key allies. Operating under plausible deniability, Beijing used maritime platforms to disrupt global communications infrastructure and extort resources of its adversaries.

While not direct actions against US property or interests, the operations reflect a growing propensity in Beijing to engage in hybrid activities below the threshold of war. Undersea cables, like land purchases near defense facilities, represent critical infrastructure that adversaries can target preemptively in the gray zone and before open conflict. The physical access and time-on-station required to conduct such sabotage underscore the operational value of proximity, including covert basing, staging, and freedom of navigation.

Ukraine’s Operation Spiderweb

On June 1, Ukraine initiated Operation Spiderweb, a large-scale, hybrid warfare campaign that targeted Russia’s strategic bomber force. The operation saw the deployment of one-way attack drones–from concealed positions inside Russia. The drones, deployed from crates on trucks staged near Russian bases, struck strategic aircraft, such as Tu-95 bombers, across five Russian airbases.

The Ukrainian case highlights how physical access—secured through commercial, covert, and low-profile means—is an enabler of modern hybrid operations. It also displays the advances in technology that provide efficient, low-cost, and easy-to-use solutions to conventional and unconventional warfighters. Prior to Operation Spider’s Web, ODNI officials suggested in the 2025 Threat Assessment that aligned strategic adversaries, deeply suspicious of the United States, are likely to develop similar capabilities near US infrastructure, military bases, and government facilities with the purpose of destruction or sabotage in the event of conflict.

Israel’s Operation Rising Lion

On June 12, Israeli forces conducted Operation Rising Lion to strike Iranian infrastructure, key personnel, military sites, and nuclear facilities due to Iran’s state sponsorship of terror, proxy wars, and nuclear proliferation. Much like Ukraine’s Operation Spiderweb, Israel’s operation included Mossad’s deployment of drones and missile launchers from covert sites inside Iran. The ordnance, when deployed, was controlled by embedded operatives and delivered to strategic targets such as munitions factories and air defense batteries. The key facet being that they were all planned, organized, and deployed within Iran and within strike range of Israeli Defense Force (IDF) targets, facilitating accurate, rapid, and efficient strikes to targets by the Israeli Air Force. This demonstrates how new warfare tactics can yield strategic effects, especially when employed as shaping operations for conventional forces.

Legislation’s Role in Hybrid Warfare Strategy

While battlefield technologies continue to evolve, the U.S. remains hamstrung by political and legislative apathy. Critical infrastructure procurement often lacks adversary screening. Land near military bases remains unprotected under federal law. And while measures like the Protect Our Bases Act (2023) were introduced to restrict land purchases by foreign adversaries, legislative momentum has stalled due to economic, political, and civil liberty concerns.

Such inaction is not neutral—it is strategically permissive. Laws must evolve to account for the modern character of hybrid threats. This includes targeted restrictions on adversary-controlled firms purchasing land near defense sites, stronger inspection of imported dual-use systems, and a doctrinal shift recognizing homeland infiltration as a core vector of modern conflict.

To blunt hybrid tactics and deny adversaries the proximity advantage, US strategy must evolve in five key areas:

Infrastructure Hardening: Require adversary-aware procurement screening for critical utilities, transformers, and communications nodes.

Land and Access Control: Restrict land acquisitions and long-term leases near sensitive military or national security installations by state-linked foreign entities.

Hybrid Threat Doctrine: Codify hybrid warfare as a strategic threat category within national defense doctrine and interagency planning.

Public-Private Threat Integration: Formalize intelligence sharing and threat coordination across civilian-owned infrastructure sectors.

Legislative Agility: Advance narrowly tailored laws—such as reforms modeled after the Protect Our Bases framework—to close regulatory loopholes without compromising constitutional norms.

New warfare is no longer limited to deterrence and conventional forces competing for dominance in their respective sphere of influence or realm of conventional capabilities. New warfare is holistic; it now includes ports, farmlands, telecommunications networks, social media, commercial products, and lawfare activities, to name a few.

geopoliticalmonitor.com

fwiw.



To: elmatador who wrote (13594)7/2/2025 7:58:46 AM
From: carranza21 Recommendation

Recommended By
elmatador

  Respond to of 13774
 
RSV here affects children and older people like us.

I took the RSV shot last year. Pneumonia shot, too.