Stories of Tolerance (Part 3)

18-12-24 and Tibetan troops, to attack the capital. During this critical period, the emperor promoted Guo Ziyi...

Mega-Donor George Soros Began Targeting Arizona and Georgia Elections in 2015

18-11-27 Programs Advisory Board, helped to underwrite a mysterious super PAC that launched attack ads against...

YouTube Scraps Most Popular Channel on China Politics From Search Suggestions

18-10-15 reason for leaving was a cyber attack originating from China that targeted the Google email accounts of...

A Discussion of “Righteousness” (Part 2)

18-10-10 attack your land. The CCP is the same. After it took the land from the landlords, and property from the...

A Discussion of “Righteousness” (Part 1)

18-10-02 Qi general stopped the attack on Lu. He said, “Even a woman from the State of Lu understands the...

协商国防法案 美两党达共识

18-07-27 Advanced Battle Management System)提供资金,空军已提议取代联合监视目标攻击雷达(Joint Surveillance Targeted Attack Radar)飞机,但国会议员...

Fake News and False Flags Are Political Tools

18-07-22 Communist Party, its military has inducted strategies specifically designed to attack perceptions, such as...

Yue Fei and Wuhan (Part 3)

18-07-01 divided the army into two to attack Suizhou, Xiangyang, Tangzhou and Dengzhou (now Tanghe County and Deng...

Iran Admits to Aiding 9/11 Attacks

18-06-18 al-Qaeda member confirms that Iran was willing to provide everything al-Qaeda needed to attack American...

With Sonic Weapon Attack, China Demonstrates Experimental Program

18-06-04 now floating around is an attempt to write the attack off as being not a sonic attack, but instead...

The Wonder of Music Lies in Its Virtue

18-06-04 by musician Shi Yan for King Zhou of the Shang Dynasty. When King Wu launched an attack against King...

Beijing Will Launch ‘Short, Sharp War’ To Take Senkaku Islands from Japan, Report Says

18-04-15 nation. A surprise attack on the Senkakus would seem to be consistent with this strategy.The report...

The Difficulty of Ending Gun Violence in the United States

18-03-18 combined a truck bomb and a gun attack with a standard rifle to kill 77 and injure more than...

North Korea Willing to Discuss Surrender of Nuclear Weapons, Promises to Not Attack South

18-03-11 promised to not attack the south. He stated, “In addition, the North promised not to use not only nuclear...

Manufacturers and Steelworkers Defend Import Tariffs

18-03-11 to defend American steel and aluminum.“The steel and aluminum sectors have been under attack by...

录音证实,俄军在叙利亚蒙受惨重伤亡

18-02-28 (Thomas F. Veale)对彭博社形容这是一个“无端的攻击”(unprovoked attack),并表示7日当天约一个营的亲阿萨德的机动部队向美方开进,他们的武器包括大砲、坦克、火箭系统和迫击砲...

Researcher Reports Soviets Created Child-Trafficking Rings in the West for Blackmail

18-02-23 subversion, it doesn’t seem unusual.“When the communists design an attack, they use such horrible methods...

The Wisdom of Inclusiveness

18-02-23 well-being above personal quarrels. Lin told his aides, "The stronger State of Qin dares not to attack...

Gorka Discusses US National Security

18-01-29 decisions about which targets to attack in the Middle East, that sends a very bad message to the military in...

Loyal and Valiant Yue Fei (Part 1)

18-01-09 internal trouble. In 1136 AD, Yue Fei launched a sudden attack on Liu Yu's army, using part of his...

By Snatching Up British Company, China Closes Gap on US Naval Supremacy

17-12-23 or conflict includes the scenario of a “Taiwan contingency,” an attack or invasion of Taiwan by China...

Mozi

17-12-02 charge of making ladders to attack fortresses. Mozi said to Gongshu Ban, "You are making ladders for...

James O’Keefe: A Truth Seeker in an Age of Media Bias

17-11-20 they claim to represent. In order to hide their actions, these same institutions often attack critics...

Wi-Fi漏洞防堵 5招简单做到

17-10-27 攻击。资安业者趋势科技因此提出5招简单自保措施。中央社报导,趋势科技日前在官方部落格发文表示,“金钥重新安装攻击(Key Reinstallation Attack,简称KRACK)”是一种针对WPA2...

Wi-Fi爆安全漏洞 黑客如影随形

17-10-19 Attack,简称KRACK),为了让Wi-Fi系统研究人员能够紧急研发出补救措施,此一重大发现已经对外封锁了数周。 鲁汶大学研究人员范赫夫(Mathy Vanhoef)发文指出,攻击者可以利用加密协议WPA2...

In Conflict Between US and North Korea, Which Side Is China on?

17-09-08 China to come to North Korea’s aid in the event of an attack, Xi’s administration has begun to show...

Why Cuba Would Launch Sonic Attacks on US and Canadian Diplomats

17-09-03 “The Germans invented them around World War II to attack infantry units,” he said. “These are probably...

大都会名画欣赏 “华盛顿渡德拉威河”

17-06-26 Trenton and attack the Hessian outposts in and around Trenton. The boats to be used for the crossing were...

Despite Allegations, No Evidence of Trump–Russia Collusion Found (Part II)

17-06-10 Democrats to attack Trump in hopes of causing electorally vulnerable Republicans to waver, thus denying...

Despite Allegations, No Evidence of Trump–Russia Collusion Found

17-06-03 the Democratic strategy articulated by Rep. Jerrold Nadler, which urged Democrats to attack Trump in...

五大特点 “战斧”担纲大任

17-04-19  “战斧”式对地攻击导弹”(Tomahawk Land Attack Missiles,简称TLAMs)是1991年以来美国拥有的先进武器之一。“战斧”导弹的5大特点使它们成为了精准空袭叙利亚...

Han Xin: The Most Famous General of the Han Dynasty (2 of 2)

17-02-11 appointed Han Xin as the Left Prime Minister. Han Xin led the Han army to attack the country of Wei. The...

Han Xin: The Most Famous General of the Han Dynasty (1 of 2)

17-02-06 army wouldn't be able to mount an attack until the road was repaired. In the mean time, Han Xin...

Yue Yun: Loyal, Courageous, Kind and Devoted; His Name Lasts Forever (2 of 2)

17-01-28 and defeated the enemy with a surprise attack, and captured seventy-eight leaders of the Jin army. In...

Prefect Kong Yong Peacefully Resolves an Armed Insurgency

16-07-24 numerous conflicts with them, so they attempted to take advantage of this opportunity to attack the city...

组图:法国恐袭 大卡车辗撞人群1英里77死

16-07-15 of an attack on July 14, 2016, after a van ploughed into a crowd leaving a fireworks display in the...

网络勒索案例频 疑涉中共黑客

16-03-19 :“很明显是一群有经验的行动人员,他们有一定的进行入侵的经验。”这3宗案子中,黑客都在利用应用服务器上已存在的弱点,然后散播勒索软件。对每一家公司,黑客都骗了逾百台电脑,装上恶意软件。Attack...

被中共抛弃?大陆黑客疑转战美网络勒索

16-03-15 均被入侵。“Attack Research”、“InGuardians”和“Partners”安全公司均表示,他们自从去年12月份以来就分别调查三起类似勒索软件攻击事件。“Attack Research...

谷歌“盾牌计划”协助独立网站阻黑客攻击

16-02-27 DDoS网路攻击。2月25日谷歌同时推出了Digital Attack Map全球即时DDoS网路攻击监控地图服务,该地图每天显示全球网络正在发生的DDoS网路攻击分布与密度。...

《国家地理》2015年度优秀摄影作品,每张照片都是一个故事

16-01-27 破风》 摄影师:Dominic Roy风太大,宝宝看不见~▷《When Penguins Attack 进击的企鹅》 摄影师:Clinton Berry摄影师花了几个星期研究企鹅的生活习性,最后趁企鹅...