India-China Border conflict

India Super Power

Tihar Jail
Banned
Joined
Oct 3, 2020
Messages
2,190
Likes
4,386
Country flag
The various forms of a hypothetical sino-Indian war are part of the fun here
We analyze our threat what's wrong in that
What you guys discuss in sino defense forums conflict with us ? Right
Barely you all would be talking about conflict with bcoz we possess no threat to you if anything will be initiated then it will be by you when you will have an overwhelming advantage over us and which you have
After all who prioritize brown poor weak Indians
If you have any problem with our discussion then get the fuck out of here stop shitting hindi chini bhai bhai
 

ym888

New Member
Joined
Mar 11, 2021
Messages
1,942
Likes
1,212
We analyze our threat what's wrong in that
What you guys discuss in sino defense forums conflict with us ? Right
Barely you all would be talking about conflict with bcoz we possess no threat to you if anything will be initiated then it will be by you when you will have an overwhelming advantage over us and which you have
After all who prioritize brown poor weak Indians
If you have any problem with our discussion then get the fuck out of here stop shitting hindi chini bhai bhai
Why are you so angry


I don't mean that sarcastically
 

Covfefe

New Member
Joined
Aug 17, 2021
Messages
4,214
Likes
28,467
Country flag

yeh lo....Hindi Cheeni Bhai Bhai....The stabbing will continue....
War and business will continue. You cannot stop the capital from the world's largest economy. China is not Pakistan- nature of the fight will be different. Muricans haven't stopped business with the Chinese even when it's their hegemony at stake, why should India be sacrificial? Keep an eye on them, restrict them from certain technology areas but never put a blanket ban. Chinese company investing in a food delivery service in India-where is the harm? Muricans won't invest as much in our country as these Chinese front companies out of Singapore and Malaysia
 

India Super Power

Tihar Jail
Banned
Joined
Oct 3, 2020
Messages
2,190
Likes
4,386
Country flag
Why are you so angry


I don't mean that sarcastically
Bcoz many of them are fed up with this conflict going nowhere and resulting in Chinese objective of pushing us successful
Our govt never took this fucking threat seriously which always creates a big problem and losing it except 1967 and 1986
But still for govt hindi chini bhai bhai bcoz of internal politics
 

ym888

New Member
Joined
Mar 11, 2021
Messages
1,942
Likes
1,212
War and business will continue. You cannot stop the capital from the world's largest economy. China is not Pakistan- nature of the fight will be different. Muricans haven't stopped business with the Chinese even when it's their hegemony at stake, why should India be stupis
Right, business is business



In fact, Chinese media have also reported incidents of Indian hackers attacking Chinese networks
 

ym888

New Member
Joined
Mar 11, 2021
Messages
1,942
Likes
1,212
Bcoz many of them are fed up with this conflict going nowhere and resulting in Chinese objective of pushing us successful
Our govt never took this fucking threat seriously which always creates a big problem and losing it except 1967 and 1986
But still for govt hindi chini bhai bhai bcoz of internal politics
I understand the anxiety of Indians


But few in China talk of a future war between the two countries
 

ym888

New Member
Joined
Mar 11, 2021
Messages
1,942
Likes
1,212
Pls feel free to quote the source
Editor's note: "Flowers of evil in South Asia", "ghost war elephants wandering in the Himalayas", "seduction from beauty"... To most people, these cryptic code names are the stuff of brain-stimulating hacker movies. However, a reporter from the Global Times recently learned from a number of Chinese cybersecurity companies that these codes reveal a sophisticated and complex real network: Top hacker groups from the south Asian continent, represented mainly by India, have been attacking defence and military units and state-owned enterprises in China, Nepal and Pakistan over the past few years with strong support from state and intelligence agencies. In recent years, the Indian military and political leadership and media have repeatedly hyped up the "Threat of Chinese cyber attack", which has been refuted by The Chinese side every time. Facts have proved that China is one of the main victims of hacker attacks. Officials from three major Chinese Internet security companies, Antan Technology Group, 360 Government-enterprise Security Group and Qi Anxin, have provided a large number of detailed first-hand information to this reporter, from which we can find important information about India's frequent cyber attacks on important departments in China. Experts also warned that China needs to improve its immunity to foreign cyber attacks, whether from India or the United States, and professional teams are needed to analyze opponents and take countermeasures accordingly.







Photo credit: Visual China



Not just phishing emails, but social engineering



As a network security national team leading the development of threat detection and defense capabilities, Antian Technology Group has been tracking "phishing" attacks launched against China. Since March, Antian has caught a number of "phishing" attacks targeting China and countries on the South Asian subcontinent, Li Baisong, deputy chief engineer of Antian Technology, told the Global Times. These activities involve a large number of network nodes, and the main targets are the governments, national defense, military and state-owned enterprises of China, Pakistan, Nepal and other countries. The latest batch of phishing attacks can be traced back to April 2019 and originated from India, Antitech found.



The Global Times also learned from 360's government-enterprise security group that in 2020, 360 monitored and captured hundreds of initial attack payloads. Cyber attacks from South Asia, mainly represented by India, have been active since the second half of 2020 and have been on a sharp upward trend. In particular, in the first half of 2021, the frequency of follow-up and granularity of segmentation (database noun, the higher the level of refinement, the smaller the granularity; ) has significantly exceeded the same period last year, mainly targeting China and other South Asian countries, covering education, government, aerospace and defense industries and other geopolitically-related targets.



In terms of technology, cyber attack groups in South Asia, represented by India, have obvious characteristics. They mainly use "phishing" emails and are good at using social engineering methods -- deceiving or attacking by taking advantage of victims' instinctive reactions, curiosity, trust and other psychological factors. According to introducing, these top hackers organization the attacker will own disguised as target countries government or military personnel, to the other party with a "fishing" attachment or mail delivery is embedded with "fishing" link in the email attack, and induce the target through the link to access the attacker through various ways of "fishing" website, collect the victim input password is used for information gathering or lateral attacks.



360 security experts said that the cyber attacks from India and other South Asian countries involved a variety of topics, closely followed the hot issues of current affairs, and the target is highly targeted, it can be inferred that there is intelligence analysis of the target country related to the current affairs, and at the same time to guide them to carry out cyber attacks.



Global Times reporters learned that in 2021, overseas cyber attacks against China not only involve education, government, aerospace and defense industries, but also focus on political, economic and other hot issues and events, targeting key institutions or individuals involved in relevant hot issues.



"National APT" targets government agencies, military enterprises, nuclear energy industry, etc



Such hacking groups are known as national Advanced Persistent Threat (APT) groups. With the support of a state background, they focus on long-term and sustained cyber attacks against specific targets and remain very active.



India is a threat that may be ignored by the world intelligence community and even some countries in South Asia may not be fully aware of its advanced cyber capabilities. As some cyber security observers often put it, "the next world war will not be fought on the ground, in the air or under water, but in virtual cyberspace". Over the years, China has been the victim of cyber attacks, and the enhanced attacks from India captured by Chinese cyber security companies once again show the seriousness of China's cyber security situation and the urgency of speeding up the construction of a cyber security guarantee system.



For example, at the beginning of the COVID-19 outbreak in 2020, an organization named apT-C-48 (CNC) launched an attack on China's medical industry by forging physical examination forms. In April 2021, 360 captured a new round of attacks launched by CNC organization against key units in China; In the middle of June 2021, CNC organization launched a sudden concentrated attack on key units related to China's aerospace field around the hot spots of China's aerospace affairs.



A reporter from the Global Times learned from Red Rain, an advanced threat research team of Qi Anxin, a well-known Chinese Internet security company, Some of the country's most sophisticated hacking groups, which have targeted government agencies, defence companies and the nuclear industry, are known to be concentrated in the quivering, Patchwork, The Quivering and Donot groups.



Let's start with Manlinghua, an APT group with a purported South Asian background. The group has been active since at least November 2013, but went undetected until 2016, when it was first revealed by Forcepoint, a foreign security vendor. In the same year, the Threat Intelligence Center found a similar attack in China and named it "Manlinghua." Since the Revelations, the group has changed its packet structure so that it no longer identifies its packets with "BITTER."



As its attacks continue to be uncovered, the full picture is becoming clearer. The group has a strong political background, mainly targeting Pakistan and China. In 2018, its activities against Saudi Arabia were also detected, targeting government departments, power, military and other related units with the intention of stealing sensitive information. It is understood that in 2019, the organization also intensified attacks against China's import and export industry.



It is worth mentioning that the "Manlinghua" organization most commonly used two means of attack: One of these is the "spear attack" (that is, a hacker using trojans as email attachments, sent to the target computer, induce the victim to open the attachment to infect the Trojan horse), by mail "spear" attack bait are mostly based on different attack object customization, thus has strong focus, and the organization through the "harpoon mail" delivery of various types of bait. Another major method of attack is the "watering hole attack" (when hackers take down legitimate websites), host their attack load on legitimate websites, or set up malicious websites disguised as legitimate websites to entice victims to download. In addition to delivering malware directly to the target through the "puddle website", "Manlinghua" also combines social engineering methods to make "phishing" pages to steal the email accounts of the target. "It is interesting to note that there have been numerous reports suggesting links between Manquivering and suspected attack groups in a South Asian country, including the 'Mahaquira', the quivering 'and the tribrain worm," a security expert at Red Rain told the Global Times.



Next is the "Quivering", whose attacks date back to 2013 but were first publicly disclosed in 2016. Experts believe that the "Quivering" organization is suspected to have originated in India. It has long been targeting the quivering in China, Pakistan, Nepal and other countries and their surrounding areas. It has also targeted government agencies, military industry, nuclear energy industry, trade conferences and communications operations.



The third is "Mahagrass", which mainly targets China, Pakistan and other Asian countries for cyber espionage, mainly targeting the government, military, scientific research, education and other areas. In February 2020, "Mahajo" launched a campaign to target South Korea under the theme of COVID-19. The organization used "Wuhan travel information collection application form. XLSM" "Ministry of Health instructions. Docx" and other bait to attack our country. In August 2021, Mahagrass launched a malicious program called "Lure from beauty" using images of beautiful women as bait.



"Mahajo" is not only the first APT organization to be revealed to use the epidemic to attack, but also frequently uses documents carrying the CVE-2017-0261 vulnerability to carry out attacks in recent years. In January 2021, the Red Raindrop team captured a document called "chinese_Pakistani_Fighter_planes_play_war_games.docx" in which the group used the vulnerability to target domestic bait. This sample is an Office document with Pakistan Air Force exercise as the theme, and EPS script using CVE-2017-0261 vulnerability is embedded inside. When the user opens this document file, EPS interpreter inside Office will execute EPS script triggering vulnerability to execute malicious Shellcode payload.



Finally, there is the "Belly Brain Worm", which was jointly discovered by 360 and the Qianxin Threat Intelligence Center and first revealed in the world. The "belly brain worm" attack was first reported in 2017, but its attacks date back to 2016. The "Belly Brain Worm" group has been active, mainly targeting Pakistan, Kashmir, Sri Lanka, Thailand and other South and Southeast Asian countries and regions, cyber espionage against the government, military and business important people.



"No cyber security, no national security"



With the rapid development of China's Internet industry, network security risks are increasing rapidly. For years, countries like China and Russia have been the main victims of cyber attacks. The Internet has become a new weapon for the US and its "Allies" to suppress other countries in information warfare. Data from China's National Internet Emergency Response Center showed that in 2020, about 52,000 malware control servers located abroad controlled about 5.31 million hosts in China. In terms of the number of hosts controlled in China, the top three control servers were all from NATO member countries.



According to reports, apT-C-39, the US Central Intelligence Agency's cyber attack group, has carried out 11-year cyber infiltration attacks on China's aerospace research institutions, oil industry, large Internet companies and government agencies, among other key areas.



"It tells the Chinese a very simple lesson: in cyber attacks, there is such a thing as a state-level cyber attack." Shen Yi, director of the Research Center for International Governance in Cyberspace at Fudan University, told the Global Times, "When we conduct activities in cyberspace, the information we publish and possess is of national security significance and impact, so it is natural for national intelligence agencies to collect information online." He believes that cyber security is an important part of national security, and it is necessary to understand cyber security from the field of national security and establish security awareness.



"We thought at first that we were a backward country, or a developing country, and on the Internet it seemed that our information was worthless and nothing worth stealing," Shen said. But we are now the second largest economy in the world, and some of our neighbors see you as an adversary and will launch cyber attacks at the national level. India's attacks on us are persistent and are a manifestation of the complexity of cyberspace, the international situation and the system." In Shen's view, although China has been trying to improve relations with India, India has been influenced by Western-style geopolitical thinking and ideology and has done a lot of cooperation with the US on cyber security.



In response to challenges from cyberspace, the Chinese government has introduced a series of legal measures to establish a cyber security governance system. Since 2017, China has built a comprehensive legal guarantee mechanism for cyber security almost from scratch. Shen also suggested that China should improve its cyber security defense and deterrence capabilities. China's cyberspace should be able to defend effectively in an open environment, with cross-border data flow and basically zero trust. At the same time, an information notification mechanism should be established. For example, the United States often writes reports aimed at China, so as to restrict China's international governance in cyberspace, and China should also take corresponding countermeasures.



Qin An, director of the China Institute of Cyberspace Strategy, told the Global Times that the general trend of militarization of cyberspace has taken shape and some countries are stepping up cyber attacks. Qin an believes that for China to improve its immunity, "flood, sewage is water, no matter from India or the United States of America's attack will need a professional team to analyze the opponent, specialized response." (Global Times Reporter Cao Siqi, Guo Yuandan, Liu Caiyu, Yan Yuzhu)
 

karn

New Member
Joined
Apr 17, 2014
Messages
3,715
Likes
15,777
Country flag
Editor's note: "Flowers of evil in South Asia", "ghost war elephants wandering in the Himalayas", "seduction from beauty"... To most people, these cryptic code names are the stuff of brain-stimulating hacker movies. However, a reporter from the Global Times recently learned from a number of Chinese cybersecurity companies that these codes reveal a sophisticated and complex real network: Top hacker groups from the south Asian continent, represented mainly by India, have been attacking defence and military units and state-owned enterprises in China, Nepal and Pakistan over the past few years with strong support from state and intelligence agencies. In recent years, the Indian military and political leadership and media have repeatedly hyped up the "Threat of Chinese cyber attack", which has been refuted by The Chinese side every time. Facts have proved that China is one of the main victims of hacker attacks. Officials from three major Chinese Internet security companies, Antan Technology Group, 360 Government-enterprise Security Group and Qi Anxin, have provided a large number of detailed first-hand information to this reporter, from which we can find important information about India's frequent cyber attacks on important departments in China. Experts also warned that China needs to improve its immunity to foreign cyber attacks, whether from India or the United States, and professional teams are needed to analyze opponents and take countermeasures accordingly.







Photo credit: Visual China



Not just phishing emails, but social engineering



As a network security national team leading the development of threat detection and defense capabilities, Antian Technology Group has been tracking "phishing" attacks launched against China. Since March, Antian has caught a number of "phishing" attacks targeting China and countries on the South Asian subcontinent, Li Baisong, deputy chief engineer of Antian Technology, told the Global Times. These activities involve a large number of network nodes, and the main targets are the governments, national defense, military and state-owned enterprises of China, Pakistan, Nepal and other countries. The latest batch of phishing attacks can be traced back to April 2019 and originated from India, Antitech found.



The Global Times also learned from 360's government-enterprise security group that in 2020, 360 monitored and captured hundreds of initial attack payloads. Cyber attacks from South Asia, mainly represented by India, have been active since the second half of 2020 and have been on a sharp upward trend. In particular, in the first half of 2021, the frequency of follow-up and granularity of segmentation (database noun, the higher the level of refinement, the smaller the granularity; ) has significantly exceeded the same period last year, mainly targeting China and other South Asian countries, covering education, government, aerospace and defense industries and other geopolitically-related targets.



In terms of technology, cyber attack groups in South Asia, represented by India, have obvious characteristics. They mainly use "phishing" emails and are good at using social engineering methods -- deceiving or attacking by taking advantage of victims' instinctive reactions, curiosity, trust and other psychological factors. According to introducing, these top hackers organization the attacker will own disguised as target countries government or military personnel, to the other party with a "fishing" attachment or mail delivery is embedded with "fishing" link in the email attack, and induce the target through the link to access the attacker through various ways of "fishing" website, collect the victim input password is used for information gathering or lateral attacks.



360 security experts said that the cyber attacks from India and other South Asian countries involved a variety of topics, closely followed the hot issues of current affairs, and the target is highly targeted, it can be inferred that there is intelligence analysis of the target country related to the current affairs, and at the same time to guide them to carry out cyber attacks.



Global Times reporters learned that in 2021, overseas cyber attacks against China not only involve education, government, aerospace and defense industries, but also focus on political, economic and other hot issues and events, targeting key institutions or individuals involved in relevant hot issues.



"National APT" targets government agencies, military enterprises, nuclear energy industry, etc



Such hacking groups are known as national Advanced Persistent Threat (APT) groups. With the support of a state background, they focus on long-term and sustained cyber attacks against specific targets and remain very active.



India is a threat that may be ignored by the world intelligence community and even some countries in South Asia may not be fully aware of its advanced cyber capabilities. As some cyber security observers often put it, "the next world war will not be fought on the ground, in the air or under water, but in virtual cyberspace". Over the years, China has been the victim of cyber attacks, and the enhanced attacks from India captured by Chinese cyber security companies once again show the seriousness of China's cyber security situation and the urgency of speeding up the construction of a cyber security guarantee system.



For example, at the beginning of the COVID-19 outbreak in 2020, an organization named apT-C-48 (CNC) launched an attack on China's medical industry by forging physical examination forms. In April 2021, 360 captured a new round of attacks launched by CNC organization against key units in China; In the middle of June 2021, CNC organization launched a sudden concentrated attack on key units related to China's aerospace field around the hot spots of China's aerospace affairs.



A reporter from the Global Times learned from Red Rain, an advanced threat research team of Qi Anxin, a well-known Chinese Internet security company, Some of the country's most sophisticated hacking groups, which have targeted government agencies, defence companies and the nuclear industry, are known to be concentrated in the quivering, Patchwork, The Quivering and Donot groups.



Let's start with Manlinghua, an APT group with a purported South Asian background. The group has been active since at least November 2013, but went undetected until 2016, when it was first revealed by Forcepoint, a foreign security vendor. In the same year, the Threat Intelligence Center found a similar attack in China and named it "Manlinghua." Since the Revelations, the group has changed its packet structure so that it no longer identifies its packets with "BITTER."



As its attacks continue to be uncovered, the full picture is becoming clearer. The group has a strong political background, mainly targeting Pakistan and China. In 2018, its activities against Saudi Arabia were also detected, targeting government departments, power, military and other related units with the intention of stealing sensitive information. It is understood that in 2019, the organization also intensified attacks against China's import and export industry.



It is worth mentioning that the "Manlinghua" organization most commonly used two means of attack: One of these is the "spear attack" (that is, a hacker using trojans as email attachments, sent to the target computer, induce the victim to open the attachment to infect the Trojan horse), by mail "spear" attack bait are mostly based on different attack object customization, thus has strong focus, and the organization through the "harpoon mail" delivery of various types of bait. Another major method of attack is the "watering hole attack" (when hackers take down legitimate websites), host their attack load on legitimate websites, or set up malicious websites disguised as legitimate websites to entice victims to download. In addition to delivering malware directly to the target through the "puddle website", "Manlinghua" also combines social engineering methods to make "phishing" pages to steal the email accounts of the target. "It is interesting to note that there have been numerous reports suggesting links between Manquivering and suspected attack groups in a South Asian country, including the 'Mahaquira', the quivering 'and the tribrain worm," a security expert at Red Rain told the Global Times.



Next is the "Quivering", whose attacks date back to 2013 but were first publicly disclosed in 2016. Experts believe that the "Quivering" organization is suspected to have originated in India. It has long been targeting the quivering in China, Pakistan, Nepal and other countries and their surrounding areas. It has also targeted government agencies, military industry, nuclear energy industry, trade conferences and communications operations.



The third is "Mahagrass", which mainly targets China, Pakistan and other Asian countries for cyber espionage, mainly targeting the government, military, scientific research, education and other areas. In February 2020, "Mahajo" launched a campaign to target South Korea under the theme of COVID-19. The organization used "Wuhan travel information collection application form. XLSM" "Ministry of Health instructions. Docx" and other bait to attack our country. In August 2021, Mahagrass launched a malicious program called "Lure from beauty" using images of beautiful women as bait.



"Mahajo" is not only the first APT organization to be revealed to use the epidemic to attack, but also frequently uses documents carrying the CVE-2017-0261 vulnerability to carry out attacks in recent years. In January 2021, the Red Raindrop team captured a document called "chinese_Pakistani_Fighter_planes_play_war_games.docx" in which the group used the vulnerability to target domestic bait. This sample is an Office document with Pakistan Air Force exercise as the theme, and EPS script using CVE-2017-0261 vulnerability is embedded inside. When the user opens this document file, EPS interpreter inside Office will execute EPS script triggering vulnerability to execute malicious Shellcode payload.



Finally, there is the "Belly Brain Worm", which was jointly discovered by 360 and the Qianxin Threat Intelligence Center and first revealed in the world. The "belly brain worm" attack was first reported in 2017, but its attacks date back to 2016. The "Belly Brain Worm" group has been active, mainly targeting Pakistan, Kashmir, Sri Lanka, Thailand and other South and Southeast Asian countries and regions, cyber espionage against the government, military and business important people.



"No cyber security, no national security"



With the rapid development of China's Internet industry, network security risks are increasing rapidly. For years, countries like China and Russia have been the main victims of cyber attacks. The Internet has become a new weapon for the US and its "Allies" to suppress other countries in information warfare. Data from China's National Internet Emergency Response Center showed that in 2020, about 52,000 malware control servers located abroad controlled about 5.31 million hosts in China. In terms of the number of hosts controlled in China, the top three control servers were all from NATO member countries.



According to reports, apT-C-39, the US Central Intelligence Agency's cyber attack group, has carried out 11-year cyber infiltration attacks on China's aerospace research institutions, oil industry, large Internet companies and government agencies, among other key areas.



"It tells the Chinese a very simple lesson: in cyber attacks, there is such a thing as a state-level cyber attack." Shen Yi, director of the Research Center for International Governance in Cyberspace at Fudan University, told the Global Times, "When we conduct activities in cyberspace, the information we publish and possess is of national security significance and impact, so it is natural for national intelligence agencies to collect information online." He believes that cyber security is an important part of national security, and it is necessary to understand cyber security from the field of national security and establish security awareness.



"We thought at first that we were a backward country, or a developing country, and on the Internet it seemed that our information was worthless and nothing worth stealing," Shen said. But we are now the second largest economy in the world, and some of our neighbors see you as an adversary and will launch cyber attacks at the national level. India's attacks on us are persistent and are a manifestation of the complexity of cyberspace, the international situation and the system." In Shen's view, although China has been trying to improve relations with India, India has been influenced by Western-style geopolitical thinking and ideology and has done a lot of cooperation with the US on cyber security.



In response to challenges from cyberspace, the Chinese government has introduced a series of legal measures to establish a cyber security governance system. Since 2017, China has built a comprehensive legal guarantee mechanism for cyber security almost from scratch. Shen also suggested that China should improve its cyber security defense and deterrence capabilities. China's cyberspace should be able to defend effectively in an open environment, with cross-border data flow and basically zero trust. At the same time, an information notification mechanism should be established. For example, the United States often writes reports aimed at China, so as to restrict China's international governance in cyberspace, and China should also take corresponding countermeasures.



Qin An, director of the China Institute of Cyberspace Strategy, told the Global Times that the general trend of militarization of cyberspace has taken shape and some countries are stepping up cyber attacks. Qin an believes that for China to improve its immunity, "flood, sewage is water, no matter from India or the United States of America's attack will need a professional team to analyze the opponent, specialized response." (Global Times Reporter Cao Siqi, Guo Yuandan, Liu Caiyu, Yan Yuzhu)
Thanks for that .. I will belive our talking heads when they say our cyber security prowess is adequate.
We are laughing at that other guy cause he is your man in India . Him being scared of china is funny to us.
 

Romediablo

New Member
Joined
Sep 8, 2020
Messages
193
Likes
784
Country flag
Wow thats quite heavy and long cyberattack . Is Chinese cyber security weak? Does china has a capability comparable to US . If it can't take Indian ( i guess than Indian ones are quite good).
Editor's note: "Flowers of evil in South Asia", "ghost war elephants wandering in the Himalayas", "seduction from beauty"... To most people, these cryptic code names are political, economic and other hot issues and events, targeting key institutions or individuals involved in relevant hot issues.
 

India Super Power

Tihar Jail
Banned
Joined
Oct 3, 2020
Messages
2,190
Likes
4,386
Country flag
Thanks for that .. I will belive our talking heads when they say our cyber security prowess is adequate.
We are laughing at that other guy cause he is your man in India . Him being scared of china is funny to us.
I don't think scaring or feel threatened is wrong if you are not coward
If you are scared or threatened then only you start finding solutions or countering or destroying that particular threat but you need to be brave strong decisive focused and need to have iron will
What's wrong in saying that our establishment lacks it
China is a imminent threat today or tomorrow they are coming for us
Accept it they are decisive powerful than us wrt quantity and quality
So we need to work hard in countering it and defeating them and we as a nation be it civilian bureaucracy or political brass lack all these qualities and until we don't figure out we are on a position to lose
 
Top