Showing posts with label Infiltrate. Show all posts
Showing posts with label Infiltrate. Show all posts

December 21, 2020

A Perfect Biowarfare Attack!

**WARNING.  WARNING.  WARNING**

So how would you conduct a biowarfare attack?

You wouldn't want to release a full-scale deadly pathogen, because then you would endanger your own population as well as your adversary. 

But instead, you release a pathogen (like Coronavirus) that is just deadly and contagious enough to cause a worldwide panic, shutting down countries and economies and threatening to overwhelm hospitals and emergency responders.

Then you would watch patiently as vaccines are developed that everyone would need to get to resume their lives and jobs. Of course, the vaccines get rushed through development, approval, and distribution in order to calm the fearful and disenfranchised populace. 

And here is where you would have your adversaries by their you know what, because if your agents can then infiltrate the vulnerabilities of the overwhelmed and unprepared, civilian pharmaceutical companies, their supply chains, or distribution networks during the emergency, and contaminate the vaccines with a really lethal pathogen, you would ensure that all your adversaries are eliminated (from their leadership on down to the blue collar workers in society), while your own population (which wouldn't get those vaccines from abroad) would be absolutely fine. 

Maybe even the first dose is intentionally passed through okay to lull the population and its leadership into the trap, but then the follow-on doses are tainted once the flies are already in the spider's web. 

Your adversaries are now sick and/or dead, but their countries and infrastructure are fully functioning and in place for you to take as spoils. 

World domination, it can happen as plain and simple as this.

Look around you at what's happening in our times. Mad men or genius, but this is more than any science fiction could offer.  ;-)

(Credit Photo: Pixabay)


Share/Save/Bookmark

November 19, 2015

Vetting The Refugees--Do You Think It'll Work?

So not that anyone was so thrilled with the Syria and Iraq refugee idea post 9/11 to begin with...

But now 31 States have come straight out refusing to take these refugees post the terror attack that happened just last week in Paris--where at least one of the terrorists was...

Guess what?

That's right!  A fake refugee from Syria

But what about the "intensive vetting process" that is being promised for these 10,000 refugees?

Well what can be more intensive than the vetting that the American government does on employees working for highly sensitive agencies like the CIA, FBI, and NSA? 

So how has that worked out?

Probably not too bad, but the problem is that no vetting no matter how thorough is foolproof, hence major spies have infiltrated these organizations for years or even decades and caused immense harm to national security:

Robert Hanssen (former FBI--spied for the Soviets for 21 years)

Aldrich Ames (31-year veteran of the CIA, compromised 2nd largest number of CIA agents after Robert Hanssen)

Edward Snowden (leaked classified information from the NSA on our surveillance programs)

The point is that no matter how well we vet 10,000 or more refugees from Iraq and Syria, with ISIS vowing "to strike America at its center in Washington"--there certainly can be some errors in the screening and final adjudication process.

Again no vetting process is perfect--especially when the refugees themselves are admitting that fake ideas are being given out to them like candy in a candy store. 

So that's the dilemma we now face:

HEART--do what our heart tells us to and help people in need by taking in the refugees.

OR 

HEAD--follow our heads not risking another one or more potentially devastating terror attacks on the U.S. homeland. 

The choice is heartbreaking or headache producing! ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

September 13, 2014

6 D's Of Cyberwar

Popular Science had a interesting article that spelled out the six D's of Cyberwar:

On the offensive side, you want to destroy, deny, degrade, disrupt, and deceive.

"Unlike World War II code breaking, cyber attacks offer the potential to not just read the enemy's radio, but to seize control of the radio itself."

- Step 1: Infiltrate the enemy's networks and communications and gather/exfiltrate information.

- Step 2:  Compromise the enemy's information either by:

1) Corrupting the enemy's information, planting misinformation, sewing erroneous reports, and causing poor decision-making. 
2) Taking control of their networks, disabling or jamming them, and disrupting their command and control or harming their critical infrastructure and causing mass confusion, destruction, and death.

Examples are "not merely to destroy the enemy's tanks, but to make them drive in circles--or even attack each other" or to cyber attack an enemies control systems for electricity, dams, transportation, banking, and so on. 

With the ability to steal information, sow misinformation, seize control, or even stop the information flow altogether, cyberwar is not just another weapon in our arsenal, but "a tool to help achieve the goals of any given operation."

On the flip side, you want to defend against the enemy's use of cyberspace to hurt us.

We need to continue to get serious about cyberwarfare and cybersecurity and become the masters in the information domain, and quickly. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark