Showing posts with label PsyOps. Show all posts
Showing posts with label PsyOps. Show all posts

September 1, 2019

Is That An Olive Branch Or A Gun

Please see my new article in The Times of Israel called, "Is That An Olive Branch Or A Gun."
Our adversaries have become adept at terrorizing with one hand and painting themselves as victims with the other....The subterfuge of calling for peace, but seeking to murder has been going on for decades. The PLO charter that calls for the “liberation of Palestine” and the destruction of Israel was supposedly changed in the Oslo Accords, but it was never ratified. And the terrorist tactic of gaining ground (Gaza, West Bank, etc.) to further their strategic aim to attack and destroy Israel is well understood. Arafat became a master of this chicanery already decades ago when he came to the United Nations in 1974 with a “freedom fighters gun” on his hip and an “olive branch” in his offering. Today, the run of the mill terrorist continues this duplicity having become proficient at holding human shields (women and children) in one hand, and a gun or bomb to attack in the other. Similarly, organizations like Hamas and Hezbollah have cunningly split their missions of terrorism and murder of Israelis on one hand with social welfare and political cause for Palestinians on the other. They raise sympathy and seek to gain immunity at the same time as they continue to delegitimize Israel and conduct economic warfare and rampaging killing sprees.

In this regard, I wanted to share two sayings about not letting down our guard when it comes to the safety and security of Israel and our people. One, from the Romans, “If you wish for peace, prepare for war” also known as “peace through strength.” The second saying from former President Ronald Reagan, “Trust but verify” also know as “respect them but suspect them.”


(Credit Photo: Andy Blumenthal)
Share/Save/Bookmark

July 17, 2019

Face Vase

Thought this was a pretty cool Face Vase. 

If you add a digital home assistant to this (like Amazon Echo or Google Assistant) and make the lips move on this vase, it would be quite the futuristic home assistant!

I don't think I'd feel comfortable living in my own house anymore. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 9, 2018

Dr. Insane and Meshuggenah Island

So I want you to know that there is a very thin line between fantasy and reality. 

There are those who want you to not only question reality, but also to accept alternative deceptions. 

They want to substitute fantasy and conspiracy and their version of "truth" for what is happening and real or intentionally phony. 

But (more) fake news and lies are not real news and truth. 

They ask questions, and they provide "answers."

But the answers are more often contrived to make you think they are a reality when they are brainwashing and mindf*cking you. 

They show you maps and pictures--it is nothing but entertainment to sow fear and for mass hysteria and distortion. 

Dr. Insane is running her own Meshuganah Island. 

You can easily get caught up in it. 

But I caution you that there is a thin, thin line between fantasy and reality. 

It's not a game.

The game and joke are on you. 

Misinformation, psychological operations throw you off track. 

Yes, there are secrets--there have to be. 

Not everything is for everyone to know at the moment.

But the world is not run on: I say, he says, she says. 

There is power. There are plans. There is execution. 

Randomness sometimes. 

Intent sometimes. 

Corruption all too often. 

You can't really know. 

Were we smart or just plain lucky?

Someday, the unknown becomes known, but not on rants and raves. 

Follow the data carefully and question it to make sure. 

In the end, the King of Kings is guiding everything and therefore there is no reason to fear. 

The world is going according to plan.

Fear leads to you wanting to gain control. 

Some people want to vent or to pretend they know something when they don't. 

There is no reason to conjecture and cross with Dr. Insane into Meshuganah Island.

Making things up makes things worse.

What we do have to do is to keep good winning over evil with truth. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

May 1, 2017

Fake News CNN and Failing NYT

The Failing New York Times and Fake News CNN...

Have become virtually unwatchable. 

Aside from their relentless bias, they are so endlessly the negative Nellies and depressing!

How about reporting the news instead of trying to direct it?  

On the positive side of things, I heard that FOX news is turning even more mainstream.

And a new conservative network news channel is in the making to balance out the other news lineup already out there. 

Thank G-d, we have choices and they can be more truthful, more fair and balanced, and more spirited and enjoyable to read and watch. 

It doesn't matter what your political leaning is--we value them all as long as we respect everyone and have a honest debate of ideas--and not 24/7 mind control and a media brainwashing session over the masses. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 17, 2016

Getting To Truth

So I saw this quote on someone's t-shirt.

Immediately, I thought this is pretty smart and took a mental photo. 


World
- Lies
Truth

I suppose the question is how much of the world we live in are lies and fallacies to deceive individuals or the masses. 

Lies made up by liars, driven by materialism and greed, by people seeking or taking power, lies to enslave others in thought and deed, lies to get people to do what we want them to or to get them to follow us blindly, lies to get our way or to get others to abandon theirs, lies to cheat, lies to steal, lies to corrupt, lies to control, lies to obscure or cover our tracks, lies to rewrite history, lies to create phony legacies, lies for the sake of lying. 

All the rest is the truth. ;-)

(Source Graphic: Andy Blumenthal)
Share/Save/Bookmark

February 22, 2016

Make Up Your Mind

It all started with the Staples "Easy" button that says robotically when pressed, "That was easy!" 

Then came the "B.S." button that yells out, "That was bullsh*t!"

Now we have the decision and indecisional buttons for "Sorry," "Yes," "Maybe," and "No."

Very much like organizational decision-making and politics where either we can't make up our minds, hedge our bets because we simply don't know, or make decisions on imperfect knowledge or with plenty of biases.

It's funny-sad how instead of decisions and progress, some people lie and pretend that what they are saying has any reality or basis to it despite proof to the compelte opposite. 

For example, over and over again, we hear some politicians say there is no military solution in Syria, yet Russia has proved that completely false turning the tides of the war in Assad's favor and driving back the U.S.-backed rebels and recapturing dozens of towns and cities.

You can probably think of plenty more examples as this is the germy spin that we all must swim and navigate in. 

If only, we could just press a "truth" button to get past all the garbage thrown at us then maybe we could get down to business and really get something done. ;-)

(Source Photo: Dannielle Blumenthal)

Share/Save/Bookmark

October 8, 2015

Please Tell Us Your Diabolical Intentions

So Russia is escalating in Syria (from devastating air strikes to sea-launched cruise missiles, and now a possible land offensive) and even considering expanding into Iraq. 


"We believe this is a fundamental mistake."  --Maybe a mistake for us, but not for Russia who is wielding their mighty bear claws and showing a decisive victory!  


"We are not prepared to cooperate on strategy."  -- Is this perhaps because we don't have one, and Russia apparently does. 

"Syria is not going to turn into a proxy war between the Russia and the United States." -- Okay, so the alternative is to capitulate and give the Middle East over to Russia, like with Crimea and Eastern Ukraine. And what then will we let over to the Russians, Chinese, and Iranians next (because there's no reason for them to stop there)? 

"One of the profound difficulties dealing with Russia in Syria or elsewhere is how opaque Putin's intentions are and how the Russia system lies about what they are up to." -- Gee whiz, we can't figure out what Russia is up to as they slam Assad's opposition (that we are supporting) into smithereens? We're expecting the competition to tell us their strategy, and why should they do that? 

This last one is perhaps the most bizarre as we all implicitly understand that an adversary is not going to divulge their strategy, and moreover are using misinformation and deception to throw us off balance and advance their objectives. 

It is time for us to bring sanity back to the military equation here.

Immediately...

- Establish a no fly zone over Syria. 

- Put our own base on the ground or military assets into sharp play. 

- Issue a cease and desist ultimatum and mean it. 

The time for losing is over, and the time for winning must begin. 

We can pretend that we can look the other way and simply avoid a conflict, but all we are doing is bringing ever more devastating confrontation that much closer as we lose ground, credibility, and allies (who fear the commitment and iron hand of Russia far more than our own wavering and dubious one)--and we deceive ourselves far more than our adversaries could ever deceive us. ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

July 23, 2015

Taking The Spin Off Things

Ok, so here is what I learned over the years about communication...

Question everything, believe nothing (except in G-d).

It's not just that a lot of people out there are full of sh*t--yes, that is true too. 

But also that many powerful people are experts at manipulation and spin. 

Take just some recent some examples:

- We didn't just give America and Israel-hating "suicidal, apocalypse-seeking" Iran a clear path to the bomb and in just half a generations' time (along with hundreds of billions to continue funding global terror and a lifting of the weapons and ballistic missile embargo), instead we have a "comprehensive long term deal with Iran that will prevent it from obtaining a nuclear weapon."

- With the hackers who not only showed how to take wireless control of a moving Jeep Cherokee, but also released information on how to do it, they didn't put another tool in the toolkit of the cyber attackers and terrorists out there, instead "they are bringing atttention to an issue auto makers have for too long ignored."

Could go on and on to issue after issue...

The point is that from a young age we are primed to respect, listen, and automatically believe figures of authority and experts--when our parents, teachers, spiritual leaders or a policeman or fireman says something, we naturally believe them, who they are, and in them. 

This is what politicians and executives and other people in power prey on--that we will believe them over everyone else or any other facts to the contrary. They have the title, the uniform, the badge, or whatever, and so they must be good, honest, and trustworthy.

However, good parents and teachers make sure to tell children not just to take people or what they say at face value. For example, if someone comes to the door and says they are delivering a package, don't just open the door.  Look through the peephole, ask for identification, or have them come with a neighbor, etc. 

I remember in the very first movie of "Death Wish" with Charles Bronson, where his wife and daughter answer the door expecting a simple delivery from the supermarket that they were just at and instead they get a brutal gang that murders the wife and rapes the daughter. 

Similarly, in cases where women get pulled over, attacked, and raped by someone with flashing lights, siren, and even a fake uniform/badge--even as you believe you are obeying the law, others are taking advantage and fooling you.

As comforting as our beliefs are and perhaps even that we just want to believe--things often are not as they appear or what we want or expect them to be--what goes on behind the scenes and the spin that comes out in front are designed to intoxicate the masses. ;-)

(Source Photo: here with attribution to Kristian Niemi)
Share/Save/Bookmark

February 21, 2015

The Monster Under The Bed

For those familiar with Yiddish...

A shiksa is a non-Jewish girl and is sometimes used to refer to Jewish women that don't follow the commandments. 

A shegetz is a similar term used for a male. 

Is it a bad word? 

Well, let's just say it's not a term of endearment. :-)

I guess it's funny that everyone has terms for those who are not just like them.

Of course we all don't have to be and aren't the same, cut from the same mold.

But we all have to have respect for each other and get along. 

I think the worst part of people being different is not even the overt jokes or off-handed remarks which can certainly be hurtful, but much more the backdoor insinuations and aggressive behaviors. 

Lately, to be frank, it seems that ethnic and religious war is brewing big time in the world--anyone else notice?

Not regional, focused on oil and resources, long held dictatorships, human rights, or even "the Palestinian issue."

But rather what no one wants to talk about or confront, a battle of civilizations.

It is so scary, because this is there are big and powerful actors at play whether Russia or China playing for the world's leadership role (one overtly and the other covertly), Iran and North Korea freely wielding nukes and threateningly strutting "their stuff," and ISIS and Al Qaeda looking for the next budding caliphate and  imposition of Sharia law as far and as wide as they can take it.

East meets West, democracy vs. dictatorship, religion against religion, this thing is building up steam, pressure is rising, and the question is whether and how big this is about to blow.

Shhh, if we don't say the words or we pretend to "make nice" and give out jobs, dole out handouts, and use our drones, oh so discretely, maybe no one will notice. 

Are we being phobic about communism, radical Islam, budding economic and military might, and other differences, or are we pointing out what we are all perceiving, but greatly fear to face. 

When I saw recently that some wonderful Muslim people were surrounding synagogues in Europe, not to attack it, but rather to encircle it to defend it, I was not only in complete awe, but also realized how many good and righteous people there are out there.

These people are actually doing something about the injustices and power grabs they are witnessing, and not trying to obfuscate or opiate the masses. 

It's not just about being tolerant of others and stripping hatred from our hearts and lives, but about being truthful when others may choose not to be. ;-)

(Source Photo: Facebook)
Share/Save/Bookmark

September 13, 2014

6 D's Of Cyberwar

Popular Science had a interesting article that spelled out the six D's of Cyberwar:

On the offensive side, you want to destroy, deny, degrade, disrupt, and deceive.

"Unlike World War II code breaking, cyber attacks offer the potential to not just read the enemy's radio, but to seize control of the radio itself."

- Step 1: Infiltrate the enemy's networks and communications and gather/exfiltrate information.

- Step 2:  Compromise the enemy's information either by:

1) Corrupting the enemy's information, planting misinformation, sewing erroneous reports, and causing poor decision-making. 
2) Taking control of their networks, disabling or jamming them, and disrupting their command and control or harming their critical infrastructure and causing mass confusion, destruction, and death.

Examples are "not merely to destroy the enemy's tanks, but to make them drive in circles--or even attack each other" or to cyber attack an enemies control systems for electricity, dams, transportation, banking, and so on. 

With the ability to steal information, sow misinformation, seize control, or even stop the information flow altogether, cyberwar is not just another weapon in our arsenal, but "a tool to help achieve the goals of any given operation."

On the flip side, you want to defend against the enemy's use of cyberspace to hurt us.

We need to continue to get serious about cyberwarfare and cybersecurity and become the masters in the information domain, and quickly. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

September 6, 2014

Chocolate Putin and Lemon ISIS


Ok, so Chocolate Putin and Lemon ISIS are a true recipe for global disaster. 

GLOBAL THREATS: With Chocolate Putin, we have the old Cold War back again (or maybe it was never really gone) with nation states facing off and state-of-the-art weapons galore such as thermonuclear ICBMs onshore, offshore, and aloft. And with Lemon ISIS, we have extremists posing a new level of terrorist threats such that we have never seen before with beheadings, crucifixions, and mass killings, and the potential for (very) dirty bombs. 

PSYCHOLOGICAL INTIMIDATION: While Chocolate Putin still denies his troops are even in Ukraine or that they all along wanted to harbor Snowden, Lemon ISIS tells the whole world they seek to establish a caliphate across the Middle East. Either way the psychological impact is to confuse and scare.

OPPRESSION OF THE PEOPLE: Both Chocolate Putin and Lemon ISIS declare that the people (along with their territory) in their sights are really wanting it--Ukrainians, Georgians, the Baltic States and Poland want to be Russian and maybe really are, while ISIS declares that good Muslims really want to live under strict Sharia law. The victims are not victims, they are willing participants in their own takeover. 

RULING BY AUTOCRACY: Chocolate Putin and Lemon ISIS rule by dictatorship with a supreme leader or all powerful president, the people must follow or be put in the gulag or hung by a tree limb. Either way, you will obey, freedoms begone, and the collective will be better off for it. 

The list of ingredients and description for world chaos and terror can go on and on here...but the point is that we are facing enemies that are digging in to inflict serious metabolic harm on us. 

While some may like chocolate Putin or Lemon ISIS, the results of closing our eyes to the calorie count will be catastrophic to a peaceful world order. 

(Source Photo for Lemon ISIS is Andy Blumenthal and for Chocolate Putin is here with attribution to jlib)
Share/Save/Bookmark

May 10, 2014

The *S*p*y* Named Snowden

So was Edward Snowden a whistleblower (some even call him a patriot) or one of the most ruthless spies this country has ever known?

An editorial in the Wall Street Journal by Edward Jay Epstein makes a strong case that Snowden was a spy galore, and the whistleblowing was his cover.
  1. What he stole? - 1.7 million documents from the NSA with "only a minute fraction of them have anything to do with civil liberties or whistleblowing." Instead, the vast majority "were related to our military capabilities, operations, tactics, techniques, and procedures"--otherwise known as the "keys to the kingdom." Moreover, it seems clear that a "top priority was lists of the computers of U.S. adversaries abroad that the NSA has succeeded in penetrating."
  2. When he stole them? - Snowden took the Booz Allen Hamilton job as a contractor for NSA in March 2013--this was at the "tail end of his operation." Moreover, the Foreign Surveillance Intelligence Act (FISA) court order for Verizon to provide metadata on U.S. phone calls for 90 days had only been issued in April 2013. And Snowden told reporter James Rosen in October 2013, that his last job at NSA gave him access to every active operation against the Chinese and "that is why I accepted the position."
  3. Where did Snowden end up? - First in Hong Kong and then under the protection of the FSB (aka the old KGB) in Russia, which "effectively compromises all the sources and methods" and ties all too nicely with what he stole. A former cabinet official has indicated that the Snowden heist was either Russian espionage, Chinese espionage, or a joint operation. 
If Snowden really was a spy as indicated, then the Whistleblowing of domestic surveillance in the U.S. was a most brilliant ploy by his operators to distract our nation from the true nature of the exfiltration and the harm done to our national security. In a way, it falls right in line with Russia's creative storyline/coverup in taking Crimea in saying that they were only protecting ethnic Russians. Score 2 for Russia!

Are we so easily lied to and manipulated...is public opinion really just jello in the hands of the global spymasters.  

We've got to be smart enough (i.e. critical thinkers) to interpret the noise in the intelligence signals, political speeches, and news stories to unveil the truth of what is really going on. In advertising, when exposing the truth of products and companies, this is sometimes referred to as culture jamming. Can we apply this to the complicated intrigue of global politics and get past the storyline that is fed to us to expose truth?  

It's high time to outmaneuver those that may seek to manipulate the public (whether from outside or even sometimes from within) with some brilliance of our own--in not believing every snippet that is fed to us and instead looking at the bigger picture of political theater, special interests, and national security to see who is now zinging whom and why. ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

March 27, 2014

10 Keys To Influencing And Selling Anything


Brilliant video by Kendra Eash for McSweeney's Internet Tendency.

It is made entirely with stock footage from Dissolve.

What is amazing is how with some great video, nice background music, and a soothing confidant voiceover--we can sell, or be sold on, just about anything.

The 10 Keys to influencing and selling anything, including B.S.:

1. Vague words that show progress (innovation, hope, motherhod, and apple pie--I'll have some of that)

2. Beautiful footage and sound (who wouldn't want to be there type?)

3. High-technology and science (we can solve the world's problems and make money, yippee)

4. Research and development (we're investing in the future and you should invest in us)

5. Global and U.S. (we're beyond borders, but still "made in...", headquartered, or otherwise a U.S. entity)

6. Environmentally conscious (clean water, breathable, air, lush forests, who can argue with that?)

7. High-speed (movers and shakers, we don't stand still, join us or be left behind)

8. Attractive people (this is for real human beings, human kind, we care about you!)

9. Diversity and equality (we love and help everyone--including you and your family)

10. Inspiring (we're thinking big and bringing positive change--buy from us, support our cause)

Throw/superimpose any company, product, country, person, or cause on this video--and poof, you've got an awesome brand--whether you deserve it or not!

This is how we're manipulated one brand at a time, hundreds of brands a day. ;-)
Share/Save/Bookmark

February 21, 2014

Can You Trust Social Media?

Interesting article in BBC about a project underway to develop a system that will rate information on the Internet as trustworthy or not. 

Considering how quickly we get information from the Net and how easy it is to start crazy rumors, manipulate financial investors, or even cause a near panic, it would be good to know whether the source is legitimate and the information has been validated. 

Are we simply getting someone mouthing off on their opinions or what they think may happen or perhaps they are unknowingly spreading false information (misinformation) or even purposely doing it (disinformation)?

Depending how the Internet is being used--someone may be trying to get the real word out to you (e.g. from dissidents in repressive regimes) or they may be manipulating you (e.g. hackers, criminals, or even terrorists). 

To have a reliable system that tells us if information being promulgated is good or not could add some credibility and security online. 

What if that system though itself is hacked? Then lies can perhaps be "verified" as truth and truth can be discredited as falsehood. 

The Internet is dangerous terrain, and as in the life in general, it is best to take a cautious approach to verify source and message. 

The next cyber or kinetic attack may start not with someone bringing down the Internet, but rather with using it to sow confusion and disarm the masses with chaos. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

July 10, 2013

Emergency Alert Or R U Kidding?

BBC News Technology (9 July 2013) reports on how the U.S. Emergency Alert System (EAS) was hacked. 

The EAS is a program of the Federal Emergency Management Agency (FEMA) and was set up "to allow the president to talk to the entire country within 10 minutes of a disaster." It also provides the public with alerts on local weather emergencies, such as tornados and flash floods. 


EAS replaced the Emergency Broadcast System (EBS) in 1997 and with it came security weaknesses.


Earlier this year, those vulnerabilities were tested and exploited when the Montana Television Network was hacked with an alert of a zombie attack.


And it provided advice on how to survive--"Do not approach or apprehend these bodies as they are considered extremely dangerous."


This is reminiscent of the hoax in 1938 when over the radio came a warning that a meteorite had smashed into New Jersey and aliens were attacking New York--an adaptation of H.G. Wells "War of the Worlds."


Well yesterday it was aliens, today it's zombies, and tomorrow it could be an phony announcement of an invasion by country XYZ or perhaps a imminent detonation of a thermonuclear warhead somewhere over the continental U.S. 


Imagine the panic, confusion, and potential loss of life and property from the ensuing chaos. 


It goes without saying that this is not a way to inspire confidence by the citizens in case of a true national emergency. 


If we cannot count on the systems meant to survive an emergency then how can we be expected to survive the emergency itself? 


The EAS may interrupt your regularly scheduled programming with those loud and annoying tests, but what can really ruin you day is a cyber attack on the system that broadcasts something much nastier and more ominous--and you don't really know whether it's the real thing or just another hack. ;-)


(Source Photo: here with attribution to UWW ResNet)

Share/Save/Bookmark

December 19, 2012

What A Dummy!

This guy is a real dummy--no, I am not being mean or rude. 

While this guy looks very real, it is actually a statue and is called "Vendor With Walkman" by Duane Hanson. 

This guy sits in a windowed room in Ft. Lauderdale Airport, and it seems that almost everyone who passes by stops and does a double-take--he is so real looking--it is amazing!

Looks are deceiving, but this takes it to a whole new level--think hard about what is real and fake; it is not always so obvious. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

August 10, 2012

Friends or Foes

People are amazing creatures--they can be sincere and trustworthy or phoney and users.  How do you tell them apart?

I learned in enterprise architecture and information architecture that information is power and currency--i.e. that those who have it rule and those who know how to get it--are the kingpins.

They may get information legitimately through research, study, reading, review, and working with others or they may cozy up to others illegitimately, to more to the point--find out "what's going on?" what have they heard. or "what's the real scoop?" 

In some cases, it is merely benign networking and that is a healthy thing--or as they say, "it's not what you know, but who you know." 

But in other cases, some people may take it too far, and literally prey on others when they are vulnerable, trusting, or simply let their guard down. 

We spend a lot of our waking hours in the office , and therefore people's social needs manifest in work friendships, confiding in others, going out for a coffee, lunch, drinks, etc. 

However, at work, people are also competitive and can be ruthless in getting what they want, making themselves look good, badmouthing others, going for that "gotcha", and even stealing other people's ideas and hard work--now where did they leave that notebook?

So when you tell an associate something--are they trustworthy with your feelings, experiences, information tidbits or will they take what you share and use it for their own ends?

There are a lot of good, decent people out there, but unfortunately, not all of people are.

Is their face for real or a poker face?  Are they playing on your side or playing you?  Will they come to your aid at the moment of truth or use the opportunity to thrust the blade through your back.  

My father used to joke about some people being two-faced, and then why would they choose that (ugly) one that they have on. :-)

I always learned talk is cheap and actions speak volumes. So when someone asks about your latest project, your kids, or ailing parents--is it from someone who genuinely gives a hoot or from someone who'd like to get you off guard, even for that split second.

In the military, this would be related to psychological operations (PsyOps)--getting into the other's person's head, figuring out what makes them tick, and then using that to extract intelligence or inflict mental and emotional "blows."

In law enforcement, perhaps the equivalent would be the old "good cop, bad cop" routine--where one person offers you some cold water or a cigarette and tells you everything will be alright, while the other person slams the table, yells, threatens, and says "your going to be going away for a long time."

There are lots of ways to get into a person's head, under their skin, and get to that valuable information--without going to the levels of physical, "torture" techniques, some of which have since been generally outlawed such as waterboarding.

So which people that you deal with are good, genuine, helpful, and have integrity, and which are selfish, nasty, and cruel?

It is definitely a challenge day-in and day-out to tell who is who--and you shouldn't let the bad apples out there, ruin your trust in all people--you just have to make sure to look beyond the veneer--to see if the other person is more friend or foe.

(Source Photo: here with attribution to BlueRidgeKitties)

Share/Save/Bookmark

December 16, 2011

Decloaking The Adversary

Yes, we lost a drone in Iran and they won't give it back--that stinks!
Initially, the word coming out was it was a mishap, an accident, but the Iranians claimed otherwise--that they brought it down.
Who believed that they could actually do that?
Then there was word that the craft being displayed by the Iranians was a fake, a mock-up, only to reversed with a confirmation, as reported in Christian Science Monitor, that the drone "is almostly certainly the one lost by U.S. forces."
Well now, InformationWeek is reporting (16 December 2011) that Iran really did bring down the stealth drone as well as how they claim to have done it.
First they jammed the communications of the RQ-170 Sentinel, so that with its command, control, and communications (C3) no longer intact, it was forced to go into autopilot and rely on GPS signals to find its way.
Then, the Iranians spoofed the GPS signal making the Sentinel think it was landing at a U.S. base rather than right into hostile territory.
If this is true, then not only is all the captured sensitive technology aboard the craft (such as radar, fuselage, coating, and electronics) in jeopardy of being comprised by reverse engineering, but also as the article states, the Iranians may have demonstrated the means to be able to literally "divert any GPS-guided missiles launched at targets inside its borders."
Quite a scary thought when according to Reuters reports, Iran is less than a year from going nuclear!
So what is the truth and what is misinformation (PsyOps) to confuse or outwit the enemy and how much does any of that really matter if the Iranians have possession of our advanced technology along with the time and the nefarious partners to study it and use it against us?
Or perhaps, this is a great ruse by us and we intended for the Iranians to get the drone--tick, tick, tick... ;-)
We live in a new sophisticated world of electronic and cyber warfare and that combined with nukes makes for some truly dangerous scenarios.
Finally, we should never underestimate the capabilities or intent of our adversaries--surprise may be the the most potent enemy of them all.
(Source Photo: here)

Share/Save/Bookmark