Using a Meteor Shower as Decoy for ICBM Attack

In the event of that a threatening nation to the security of America requires a pre-emptive attack, we may wish to consider creating a News Event of an expected meteor shower in the media or consider launching the attack during a real meteor shower. There are many events such as Solar Flares, Space Weather which could give us a few minutes of additional surprise as the enemy looks to consider if in fact it is something else, before they launch, thus giving our multiple warheads time to reach separation point, it also allows us to allow for separation of multiple dummy warheads as decoys to overwhelm the enemies defenses to help us fulfill our kill ratios on desired targets.

On the flip side our Missile Defense system should categorize all solar storms, meteor showers, UFOs, etc, so that we can in fact determine the differences so we do not try to launch a defense against nothing and jeopardize the integrity of our missile supply. A computer program needs to be developed to instantly tell us if we are seeing a solar anomaly or if the meteor shower is exactly what it is and not an enemy surprise attack under cloak of the known meteor shower.

If you have thoughts on our Missile Defense System or ideas on using ICBMs to surgically attack key targets of our enemy without risking pilots, planes and expensive equipment in the battlespace to protect the American People and serve our political will and most of all to WIN.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

disinfecting cleaning services Winnetka ..
In The News:

Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.

The Rosicrucian Council of Three

THE ROSICRUCIAN COUNCIL OF THREE:A Thelema/OTO leader who became a... Read More

North Korea and Diplomatic Solutions; Random Thoughts Part I

You know now that North Korea is backing down on... Read More

Dealing with Massive Prisoners of War

In the last Gulf War we saw thousands of enemy... Read More

Politicians Will Save Civilization

Most politicians are completely out to lunch and totally Machiavellian... Read More

Environmentalists Say GM Seeds are Bad News

Environmentalists say GM Seeds are bad for the environment, dangerous... Read More

What is the Filibuster-Breaking Nuclear Option?

What is the so-called "nuclear option" that Senator Bill Frist... Read More

The World of Diplomatic Backstage

De-classification of official documents have been a routine practice in... Read More

CBM?s Indo-Pak Peace Process

Will a bus running across the borders bring cordial relations... Read More

Joseph Campbell - Permanent Human Values

At the start of the US involvement in WWII Joseph... Read More

Was Pakistan a British Creation?

The furore in the BJP camp in India, triggered by... Read More

How Can You Have True Freedom if They Control Every Aspect of Your Life?

Freedom is in the eyes of the beholder. In Communist... Read More

The Cost of the COLD WAR

Many people who are expert in the issue of the... Read More

Public Procurement and Very Private Benefits

In every national budget, there is a part called "Public... Read More

The History of Trade and Using it as a Weapon for Peace

The Flow of Trade is a major consideration of civilizations... Read More

The Civil War - FOGC

Thomas Jefferson wrote a letter to Lafayette in 1823 that... Read More

Will They Sterilize Vagabonds and Drunkards in Belarus?

In Belarus parliament is going to struggle with degeneration of... Read More

Why Can?t We Have a More Responsive Government?

The great people of the United States of America deserve... Read More

William Seward and the Alaska Purchase

Aren't you glad you purchased Alaska? You got a bargain,... Read More

Why Dont We Listen To Entrepreneurs?

I just got done reading a series of articles dating... Read More

Where have all the Heroes gone

America is filled with standouts and perserverance; our nation has... Read More

Road Map Wont Work Cause PA Are Liars

The US-backed Road Map peace plan had no real chance... Read More

Open Source and Post-Capitalistic Society

Capitalism as the social structure was founded in order to... Read More

Steel Import Tariff Taxes Hurt Industry, Not Help Them

US Steel prices have cost franchisees in my company and... Read More

Between Hiroshima Japan 6 August and the NY 11 September!

Japan lit its candles of pure, "noble sadness" on the... Read More

Monetary Flows, Retained Earnings, Over Regulation and Abundant Resources

All countries have specific things that are abundant in the... Read More

last minute cleaning help Highland Park ..