ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Eyes Wide Shut: An Enigma - Our Cyber Security

Updated on March 7, 2019

Hide In Plain Sight

Fiction: Based Upon Actual Events  ......         .
Fiction: Based Upon Actual Events ...... . | Source

Our Cyber Security - We are at Great Risk

This book has a serious concern:

We, citizens of a great nation are at risk.....OUR Cyber Security!

We need more selected individuals to implement cybersecurity for private enterprises.... Perhaps there is not an understanding of the government philosophy of security. It is a deadly serious "mind-think." Given it is time-consuming: sometimes 6 months of extensive, comprehensive background investigations of everyone you have associated with, their neighbors, past employers and anyone that may have touched, or observed you. You have to be "squeaky-clean." You cannot sleepwalk, talk in your sleep, and many other behavioral attributes. You must not be susceptible to extortion (skeletons in closets). Obviously, the psychological profile of managing duress, extremely focused, goal-oriented, accepts commands, accepts responsibility; does not question authority. Must be 100% committed including dying for, or during execution of commands (orders). Think "on-your-feet," situational resilient (staying focused). Able to prioritize instantaneously. Not given to communicate to those who do not need to know... under the threat of death. Accepts the possibility of torture. Plans many options of "self-elimination." Basically, an "iron anvil." These chosen few are very valuable assets. They are cross-trained into many areas of activities. Most are highly intelligent and quick learners. (Hence, Daemon is a "natural" to go from genetics to Commanding General of Top Secret Experimental Flying Weapon Systems). Leaders (from my MBA background) have transferable leadership skills. There may not be good managers but are outstanding leaders...

Our Cyber Security is at Risk

“Things,” occurrences, mentioned in a "back-handed" manner, inferred, implied are REAL. An example: The United States and several of its allies are building a new, fifth-generation fighter plane, the F-35 Lightning II, cutting edge technology. A foreign government..... hacked into the manufacturing company for the aircraft and downloaded all of the plans. So this plane that hasn't even flown, yet an enemy knows its strengths and weaknesses. How so? Take any piece of computer hardware -- your laptop, your desktop, a has been assembled in one country, but the components were made in two dozen, or more countries (Taiwan, China, Germany and etc...). And the software has been written by thousands of many people in many countries. You can't have high security when you have that many people involved. It is easy to slip a "trap door" into 50 million lines of code for a piece of software. It is so easy to have a microscopic element on a motherboard that allows people to get in without authorization. This is REAL. When in my manuscript, I refer to JR hacking into Damon's quantum computer network, or JR hacking into NSA communications... This is a REAL possibility. The USA is very, very vulnerable. We are the best attacking into other systems (we can get into any of them...) Our weakness is our system of government. You (government) cannot dictate to private enterprise how to develop a good defense. Right now, the US government is only defending itself, and that's largely the military defending the military.

The New World Oder is now embracing augmented reality (AR) and artificial intelligence (AI). These members are not elected. They have cybersecurity under control. Our government must lead, or follow.

No Integrated Cyber Security Plan

The United States government has an attitude that if you're a bank or a railroad or a pipeline company, or power company, you should defend yourself. Another example: At Livermore Lab - Government owned setting, with the company's permission... an oil refinery was hacked into, computer monitors and operation switched to manual and the command was sent to overheat the gas lines & storage tanks. A fire, explosions and complete destruction would have followed, if not stopped. I am sure there are plans and computers ready by foreign governments to "un-arm" us, cripple us before any hostile action is taken. An example: The Israelis had hacked the Syrian equipment so all showed was vast, empty sky. Despite Syria's sophisticated radar, Israeli jets swooped across Syria and bombed a nuclear facility under construction. Syria did not see it coming...

Nation At Risk!

The book has a hidden agenda to somehow wake up the decision-makers as to the dangers. They know. They do not have the will to make a difference. It is not politically popular to scare the hell of the public... I believe we can deal with the uncertainties of life. We must be prepared for the new "REALITY." We can manage, we can thrive, there is hope. We need to make adjustments to the huge technological leaps into activities that would stretch your imagination... There are leaders who are "mere mortals" who have unlimited power & resources hidden behind their authorized activities. Daemon is a composite of ONE individual. He could be someone's sweet, lovable grandpa, yet be more deadly than a million well-armed soldiers... (I know, for book-selling purposes Daemon needs to be "bad." Real life, the "bad" guys are trained to look, act like "good" people). Awareness is but ONE element of the process to enable our grandchildren to enjoy the sunsets and raise their grandchildren.


    0 of 8192 characters used
    Post Comment
    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      8 years ago from Bakersfield, CA


      An informed public is more aware...

      Thanks for your comments.

    • arthurchappell profile image


      8 years ago from Manchester, England

      food for thought - it's not much different in the UK either - we live in terrifying times

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      8 years ago from Bakersfield, CA

      Enlydia Listener, Well, I have hope (faith) that the "good" will prevail... War is hell. Spying, intelligence gathering is not "by-the-rules." I have changed (sanitized) things and I am OK.. Thanks for asking. Besides, this is dated material... Intelligence gathering is beyond your imagination...

    • Enlydia Listener profile image

      Enlydia Listener 

      8 years ago from trailer in the country

      If the bad ones have this much power, don't you worry about even writing fiction about it?

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      8 years ago from Bakersfield, CA

      Our world as we know it is at risk....

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      8 years ago from Bakersfield, CA

      katiem2, Thanks for your comments.

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      8 years ago from Bakersfield, CA

      Angelique Loux, Thanks! I checked your sight and I am following you too.

    • Angelique Loux profile image

      Angelique Loux 

      8 years ago from Ohio

      Great hub, thanks for sharing. Keep up the great writing. I'll rate this one up. Happy to follow you.

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      8 years ago from Bakersfield, CA

      Our leaders needs to take on responsibility and change sooner, rather than later. Our lives as we know it depends on it... Cyber Security is HUGE!!!!

    • katiem2 profile image

      Katie McMurray 

      8 years ago from Westerville

      Aw yes cyber security is a vital concern we all need thank you for the very knowledgeable and helpful tips. Peace :)


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)