Using a Meteor Shower as Decoy for ICBM Attack

In the event of that a threatening nation to the security of America requires a pre-emptive attack, we may wish to consider creating a News Event of an expected meteor shower in the media or consider launching the attack during a real meteor shower. There are many events such as Solar Flares, Space Weather which could give us a few minutes of additional surprise as the enemy looks to consider if in fact it is something else, before they launch, thus giving our multiple warheads time to reach separation point, it also allows us to allow for separation of multiple dummy warheads as decoys to overwhelm the enemies defenses to help us fulfill our kill ratios on desired targets.

On the flip side our Missile Defense system should categorize all solar storms, meteor showers, UFOs, etc, so that we can in fact determine the differences so we do not try to launch a defense against nothing and jeopardize the integrity of our missile supply. A computer program needs to be developed to instantly tell us if we are seeing a solar anomaly or if the meteor shower is exactly what it is and not an enemy surprise attack under cloak of the known meteor shower.

If you have thoughts on our Missile Defense System or ideas on using ICBMs to surgically attack key targets of our enemy without risking pilots, planes and expensive equipment in the battlespace to protect the American People and serve our political will and most of all to WIN.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

disinfecting cleaning services Arlington Heights ..
In The News:

ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.

Victims of Child Support

"Similar to Medieval Inquisitions, judges have been given the authority,... Read More

Federal Trade Commission Franchising Division; Inept?

Why are we over regulating the franchising industry? What are... Read More

Arson Neighborhood Mobile Watch Program for Summer Fire Season

Due to the bizarre weather patterns this winter California got... Read More

How Can You Have True Freedom if They Control Every Aspect of Your Life?

Freedom is in the eyes of the beholder. In Communist... Read More

The FTC Purports and Misrepresents Their Law Enforcement Experience as It Attacks Business

We should all give much kudos to the Federal Trade... Read More

William Seward and the Alaska Purchase

Aren't you glad you purchased Alaska? You got a bargain,... Read More

The Elephant Roared and Brought Forth a Turd: A Case Against Democratizing the Middle East

The original vulgarity was bylined: ?The Constipation of America's Mid-East... Read More

The New Goo Review is Coming Right At You

Non-lethal Goo Concepts have been tossed around by many war... Read More

Intellectual Property: The ECJ Extends the Use of Trade Marks to Goods and Services

The European Court of Justice ("ECJ") ruled in Praktiker Bau-... Read More

The Public Is Enemy Number One

There is something egregiously wrong about a government that will... Read More

Another Round of EU-Iran Talks Starts April 10 - Will Iran Be Referred To The UN Security Council?

Iran's objection to ratifying the International Atomic Energy Agency's Additional... Read More

Does America Get It about Terrorism?

I have to be honest. It is time to come... Read More

Truckers Take Some Hits and Keep On Trucking

After 9-11 insurance rates on Independent Truck Drivers and smaller... Read More

What could Macedonia Learn from a Tiger? Asian Tigers and Uninterrupted Economic Growth

The first reaction of economies in transition is a sharp... Read More

Arrogance Of Terror

The man on the tape raised his hand, pointing a... Read More

Protecting Our Buses from International Terrorists

We know that the International Terrorists like the idea of... Read More

Garbage in Garbage out; California Blackouts

Why did the California energy crisis happen? Who is to... Read More

The Mother of All Political Battles Has Begun!

News is spreading of the retirement of Supreme Court Justice... Read More

Maryland State Legislator wants to kill jobs and small business

Last year a Maryland State Legislator whom I presume never... Read More

When Will the World Wake Up?

How can any human being today, anywhere in this world,... Read More

War with Red China Eminent Now

An irresponsible Chinese General made a very telling comment recently.... Read More

Government Franchise Model; taking it virtual

Our government is set up like a modern day franchise.... Read More

On The Privatization of Social Security

Reform Social Security has been talked of Capital Hill for... Read More

Cloning; The Possibilities and Advantages of Thought Swapping

We can all see the issues involved in the cloning... Read More

WiMax Election Strategy

So you are ready to run for public office are... Read More

bathroom cleaning service Mundelein ..