Using a Meteor Shower as Decoy for ICBM Attack

In the event of that a threatening nation to the security of America requires a pre-emptive attack, we may wish to consider creating a News Event of an expected meteor shower in the media or consider launching the attack during a real meteor shower. There are many events such as Solar Flares, Space Weather which could give us a few minutes of additional surprise as the enemy looks to consider if in fact it is something else, before they launch, thus giving our multiple warheads time to reach separation point, it also allows us to allow for separation of multiple dummy warheads as decoys to overwhelm the enemies defenses to help us fulfill our kill ratios on desired targets.

On the flip side our Missile Defense system should categorize all solar storms, meteor showers, UFOs, etc, so that we can in fact determine the differences so we do not try to launch a defense against nothing and jeopardize the integrity of our missile supply. A computer program needs to be developed to instantly tell us if we are seeing a solar anomaly or if the meteor shower is exactly what it is and not an enemy surprise attack under cloak of the known meteor shower.

If you have thoughts on our Missile Defense System or ideas on using ICBMs to surgically attack key targets of our enemy without risking pilots, planes and expensive equipment in the battlespace to protect the American People and serve our political will and most of all to WIN.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

disinfecting cleaning services Winnetka ..
In The News:

Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.

Politics

The Republican Party became popular due to its view on... Read More

Bilderbergs

In the words of a secret agent who has signed... Read More

True Democracy and a Way Forward

The process of researching this topic has been an interesting... Read More

Globalization

Often we see protests at the sites of global leader... Read More

Reprisal of the Bill of Proposed Electronic Crime Act 2004

The clause (c) of Electronic Crime Act 2004 has been... Read More

Did 9-11 Change Everything for the Business Community

For the business community 9-11 changed everything. In our company,... Read More

Boston Bankers

Many people make a lot of money in war. In... Read More

Cuba: Havana the Good

When North Americans discuss Cuba, they always focus the intense... Read More

Counter Intelligence: Accurate Words to Describe Our Dealings with Islamic Terrorists!

Introduction:Although politicians and so-called "Intelligence Experts" are the ones appearing... Read More

Bush Panders America?s Kids to Saudi Pederasts

President Bush and Secretary Powell should hang their heads in... Read More

The Criminality of Transition

Lecture given at the Netherlands Economic Institute (NEI) on 18/4/2001Human... Read More

De-Population

Judgment and detective work requires thinking about possibilities. One of... Read More

The Rosicrucian Council of Three

THE ROSICRUCIAN COUNCIL OF THREE:A Thelema/OTO leader who became a... Read More

Poverty in America: Over 35 Million Living Below the Poverty Line

The problem of poverty in America comes as a surprise.... Read More

The Transformation Of Political Science And The Rise In Crime Rates

The current field of political sciences is dominated by a... Read More

Government Credit Card Abuse

Veterans Affairs Employees using government credit cards on personal items?... Read More

The Halakah and Neo Cons

These leaders like the Rothschilds who backed Crowley's Hermetic Order... Read More

Predator or Prey; Hunter or the Hunted; Teacher or the Pupil; Winning or Losing?

This is a thought on the study of Home and... Read More

Global Entrepreneurs, Mining and Raw Materials

There are many mines around the world, which are owned... Read More

Snowbirds and American Migration and Mobile Populations

We have seen an increase in Snowbirds from Northern States... Read More

Fire Fighting and Healthy Forests

There is debate about the methodology of forestry and also... Read More

Eurovision Song Contest - Kiss My Butt Neighbours

Tonight I resigned myself to the fact that this is... Read More

Monetary Flows, Retained Earnings, Over Regulation and Abundant Resources

All countries have specific things that are abundant in the... Read More

China: Tibet Standoff

The People's Liberation Army of China invaded Tibet in 1949.... Read More

Profiling Eco-terrorists

The FBI recently before Congress stated that Eco-Terrorism was on... Read More

last minute cleaning help Highland Park ..