To Defeat a System First You Must Know How It Works
The other day an acquaintance at the local Starbucks explained to me his recent success in finding gorgeous blondes who would put out on the first date.
He told me it was simple, just go onto LinkedIn and write about how you have all the security clearances (top Secret) and how you are working with a special project with a team of engineers on an advanced weapon system, preferably stealth, electronic countermeasures or missile defense.
Then post how you are looking for a date on another social media site to which you provide the link on LinkedIn.
Sure enough all the Russian spies, mostly hot blondes, come out of the woodwork.
He told me that his strategy was to feed them BS and then have them over every night for a month or so, then tell them that he lost his job and was having amnesia.
Soon, they'd leave, and he'd work on getting another one, maybe Chinese this time or an Israeli spy you know someone willing to really go out of their way and do it for their country.
Now then, you might laugh at my joke, but don't laugh too hard or for too long because we have spies amongst us and they really want to learn about our military defense systems, so they are all over the hierarchy in the military trying to get in with the right crowd and all over our top defense contractors too - for the simple reason; they know they cannot defeat our systems until they are sure they know how they work.
Let's face it the "honeypot" trick has been used since ancient times to gather the intelligence advantage, perhaps it goes back to a survival of the fittest instinct, who knows.
Since our enemy is looking for information as to how the system works, to exploit it and gain even more information, it makes perfect sense that they'd use these old strategies to gain access, passwords, and information about our computer networks.
And they are busy ripping us off blind.
They are getting into our defense contractors, military, and the highest political positions in our government.
Gaining little bits of information from many potential sources means putting together a puzzle, once they have the key, they are in, and all that information is lost.
Therefore, how the systems work must remain classified and considered operational intelligence of the highest order.
Please consider all this and think on it.
He told me it was simple, just go onto LinkedIn and write about how you have all the security clearances (top Secret) and how you are working with a special project with a team of engineers on an advanced weapon system, preferably stealth, electronic countermeasures or missile defense.
Then post how you are looking for a date on another social media site to which you provide the link on LinkedIn.
Sure enough all the Russian spies, mostly hot blondes, come out of the woodwork.
He told me that his strategy was to feed them BS and then have them over every night for a month or so, then tell them that he lost his job and was having amnesia.
Soon, they'd leave, and he'd work on getting another one, maybe Chinese this time or an Israeli spy you know someone willing to really go out of their way and do it for their country.
Now then, you might laugh at my joke, but don't laugh too hard or for too long because we have spies amongst us and they really want to learn about our military defense systems, so they are all over the hierarchy in the military trying to get in with the right crowd and all over our top defense contractors too - for the simple reason; they know they cannot defeat our systems until they are sure they know how they work.
Let's face it the "honeypot" trick has been used since ancient times to gather the intelligence advantage, perhaps it goes back to a survival of the fittest instinct, who knows.
Since our enemy is looking for information as to how the system works, to exploit it and gain even more information, it makes perfect sense that they'd use these old strategies to gain access, passwords, and information about our computer networks.
And they are busy ripping us off blind.
They are getting into our defense contractors, military, and the highest political positions in our government.
Gaining little bits of information from many potential sources means putting together a puzzle, once they have the key, they are in, and all that information is lost.
Therefore, how the systems work must remain classified and considered operational intelligence of the highest order.
Please consider all this and think on it.
Source...