ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Books, Literature, and Writing

Eyes Wide Shut: An Enigma - Our Cyber Security

Updated on July 18, 2015

Hide In Plain Sight

Fiction: Based Upon Actual Events  ......         .
Fiction: Based Upon Actual Events ...... . | Source

Our Cyber Security - We are at Great Risk

Book has a serious concern:

We, citizens of a great nation are at risk.....OUR Cyber Security!

We need more selected individuals to implement cyber security for private enterprises.... Perhaps there is not an understanding of the government philosophy of security. It is a deadly serious "mind-think." Given it is time-consuming: sometimes 6 months of extensive, comprehensive background investigations of everyone you have associated with, their neighbors, past employers and anyone that may have touched, or observed you. You have to be "squeaky-clean." You cannot sleep walk, talk in your sleep, and many other behavioral attributes. You must not be susceptible to extortion (skeletons in closets). Obviously, psychological profile of managing duress, extremely focused, goal-oriented, accepts commands, accepts responsibility; does not question authority. Must be 100% committed including dying for, or during execution of commands (orders). Think "on-your-feet," situational resilient (staying focused). Able to prioritize instantaneously. Not given to communicating to those who do not need to know... under the threat of death. Accepts possibility of torture. Plans many options of "self-elimination." Basically, an "iron anvil." These chosen few are very valuable assets. They are cross-trained into many areas of activities. Most are highly intelligent and quick learners. (Hence, Daemon is a "natural" to go from genetics to Commanding General of Top Secret Experimental Flying Weapon Systems). Leaders (from my MBA background) have transferable leadership skills. There may not be good managers, but are outstanding leaders...

Our Cyber Security is at Risk

“Things,” occurrences, mentioned in a "back-handed" manner, inferred, implied are REAL. An example: The United States and several of its allies are building a new, fifth-generation fighter plane, the F-35 Lightening II, cutting edge technology. A foreign government..... hacked into the manufacturing company for the aircraft and downloaded all of the plans. So this plane that hasn't even flown, yet an enemy knows its strengths, and weaknesses. How so? Take any piece of computer hardware -- your laptop, your desktop, a has been assembled in one country, but the components were made in two dozen, or more countries (Taiwan, China, Germany and etc...).. And the software has been written by thousands of many people in many countries. You can't have high security when you have that many people involved. It is easy to slip a "trap door" into 50 million lines of code for a piece of software. It is so easy to have a microscopic element on a motherboard that allows people to get in without authorization. This is REAL. When in my manuscript, I refer to JR hacking into Damon's quantum computer network, or JR hacking into NSA communications... This is a REAL possibility. USA is very, very vulnerable. We are the best attacking into other systems (we can get into any of them...) Our weakness is our system of government. You (government) cannot dictate to private enterprise how to develop a good defense. Right now, the US government is only defending itself, and that's largely the military defending the military.

No Integrated Cyber Security Plan

The Obama administration's attitude seems to be that if you're a bank or a railroad or a pipeline company, or power company, you should defend yourself. Another example: At Livermore Lab - Government owned setting, with the company's permission... an oil refinery was hacked into, computer monitors and operation switched to manual and the command was sent to overheat the gas lines & storage tanks. A fire, explosions and complete destruction would have followed, if not stopped. I am sure there are plans and computers ready by foreign governments to "un-arm" us, cripple us before any hostile action is taken. An example: The Israelis had hacked the Syrian equipment so all showed was vast, empty sky. Despite Syria's sophisticated radar, Israeli jets swooped across Syria and bombed a nuclear facility under construction. Syria did not see it coming...

Nation At Risk!

The book has a hidden agenda to somehow wake up the decision-makers as to the dangers. They know. They do not have the will to make a difference. It is not politically popular to scare the hell of the public... I believe we can deal with the uncertainties of life. We must be prepared for the new "REALITY." We can manage, we can thrive, there is hope. We need to make adjustments to the huge technological leaps into activities that would stretch your imagination... There are leaders who are "mere mortals" who have unlimited power & resources hidden behind their authorized activities. Daemon is a composite of ONE individual. He could be someone's sweet, lovable grandpa, yet be more deadly than a million well armed soldiers... (I know, for book-selling purposes Daemon needs to be "bad." Real life, the "bad" guys are trained to look, act like "good" people). Awareness is but ONE element of the process to enable our grandchildren to enjoy the sunsets and raise their grandchildren.


    0 of 8192 characters used
    Post Comment

    • dallas93444 profile image

      Dallas W Thompson 6 years ago from Bakersfield, CA


      An informed public is more aware...

      Thanks for your comments.

    • arthurchappell profile image

      arthurchappell 6 years ago from Manchester, England

      food for thought - it's not much different in the UK either - we live in terrifying times

    • dallas93444 profile image

      Dallas W Thompson 7 years ago from Bakersfield, CA

      Enlydia Listener, Well, I have hope (faith) that the "good" will prevail... War is hell. Spying, intelligence gathering is not "by-the-rules." I have changed (sanitized) things and I am OK.. Thanks for asking. Besides, this is dated material... Intelligence gathering is beyond your imagination...

    • Enlydia Listener profile image

      Enlydia Listener 7 years ago from trailer in the country

      If the bad ones have this much power, don't you worry about even writing fiction about it?

    • dallas93444 profile image

      Dallas W Thompson 7 years ago from Bakersfield, CA

      Our world as we know it is at risk....

    • dallas93444 profile image

      Dallas W Thompson 7 years ago from Bakersfield, CA

      katiem2, Thanks for your comments.

    • dallas93444 profile image

      Dallas W Thompson 7 years ago from Bakersfield, CA

      Angelique Loux, Thanks! I checked your sight and I am following you too.

    • Angelique Loux profile image

      Angelique Loux 7 years ago from Ohio

      Great hub, thanks for sharing. Keep up the great writing. I'll rate this one up. Happy to follow you.

    • dallas93444 profile image

      Dallas W Thompson 7 years ago from Bakersfield, CA

      Our leaders needs to take on responsibility and change sooner, rather than later. Our lives as we know it depends on it... Cyber Security is HUGE!!!!

    • katiem2 profile image

      katiem2 7 years ago from I'm outta here

      Aw yes cyber security is a vital concern we all need thank you for the very knowledgeable and helpful tips. Peace :)