The Fall of Man

 

Cyberterrorism Speaking Engagement & Fallenness of Man

C-ASHA Presentation, Cyberterrorism & Fallenness of man, Kris M. Milne, Resident Ph.D. , M.S., B.S.

As transcribed, August 4, 2022

(greatly offered in a meaningful response to the literature of  W. Burns.)

This morning, I would like to put a laser focus on personality traits, as observed as on hand and never ready to hand, of leadership styles, cultures, development, and states of being as they inductively inform many criminal activities and need for further development in natures.

Historically, and as an odd place for my speech to start, is the attacks of 911. For context, I was collaborating online with someone from the Agency on nonprofit neurological care work for underprivileged.  We were on a conference call when a message came over the radio: 19 suspected terrorists were entering points northeast to carry out a synchronized plot. This recorded data was obtained via recordings in airport terminals.  In fear, I asked my nonprofit colleague if we were in danger and he ignored my question. Purportedly illustrated is that when holistic systems of philosophy, and attributes as behavioral tenets, of individuals hold relevant information, and when an inductive alignment of connecting the dots isn’t possible, intel must be shared to attain national and world objectives.

Philosophically, we recall there is a higher purpose, a knowing, and there is a collectiveness of our souls that can’t be ransomed. The literature, we recall illustrates this by sense of being, absence of dark personality traits, a level of authenticity, and observed manifestations of inauthenticity (through IT data collection) as exposed artifacts of terrorism. The literature of Husserl, and particularly Heidegger, and Personality traits of individuals and their well-being.

Transformational leadership styles, as cultural adaptations, inform state and local law enforcement and agencies, with Gestalt-like synthesis to address valid and reliable threats as artifacts. Collectively, and with cultural competency, our eyes and ears in the communities help us identify antecedents, as inductive in nature, with laser like Gestalt means of sourcing and prevention of attributes of nature.

Laser focus has, as its coordinated effort, evolved from physical attacks on buildings, shopping malls, bridges, and support for ground peace keeping missions, to metaphorical control alt del attacks in words made famous by America’s great Bill Gates.

That’s what I want to talk with you about today, not applause afforded to those representative of dark personality traits of ID, but instead a valid focus on hidden threats of our cyber adversaries. Considered is the context of the literature and what these individuals, as a culture, pose to businesses and institutions, as a cntl alt dlt, of things we take for granted. Moreover, there is an identified need to bring private sector partners together, in efforts to decipher through fast moving intel and operations, your journaling of daily interfaces as environmental exchanges, for your philosophical leadership.

This journaling, as you have learned, will help identifying profit minded criminals and nation state adversaries of the Agency. The two work in tandem, as observed like step brotherhoods, and facilitate toxicity toward backward momentum. You may recall a recent attack impacting billing systems and IT systems used to monitor relevant work typologies, as inductive or deductive measurement status of research. KFC shut down operations of the “pipe hierarchy” until safety was confirmed.

In the days following, people panicked until we ran out of medical and technology systems, used to track health status, until access to medical and technology forensic clinics were made available again. You may be familiar with the context of the literature embodied in philosophy, ethics, and humanities in medicine, as given in a recent speech given by counterterrorism “The hurt you feel at home” at C-ASHA.  We can’t think of anything ransomware groups would consider off-limits from targeting innocent individuals through research activities, such as the Stanford Prison Experiment or MIAs, to behavioral experiments aligned with MK ULTA.  The bottom line: Ransomware complaints reported to agencies has increased nearly 90 percent.

As an example of what the Russian-based Reveal hacker activities, in the context of reported data since 2019, they’ve attacked more than 40,000 U.S.-based victims and received $150 million in ransom through useful currencies like Bitcoin and Monero.

To put things in perspective, recently, we have seen ransomware incidents against 14 of 16 U.S. critical infrastructure sectors, and that’s just ransomware. Such as last May, when a ransomware attack on a protein supplier of beef, chicken, and pork, called to a stop meat production facility in the U.S., Canada, and Australia. Thus, not only do cyber criminals affect our ability to put food on the table, but the type of food and safety grown within. You heard about the new disease reported by the CDC that stems from soil in the Florida region. This alignment between antecedents and outcomes can be dizzying if allowed.

Much like completing training proving grounds, there is a shine when completed. Thus, we conclude themes of leadership styles, cultures, development/academia, and states of being, that when synthesized, reveal typology as identifiers of cyberterrorists.

Targeting United States vital networks with cyberterrorism sounds, as one can auditorily verify through recognition of beeping horns, identified things as contributors, to cyber challenges.  The bottom line: the decryption key is evidenced as unavailable to bid.

We pass intel we develop to partners in the U.S. and abroad and, in particular, to risk management and threat agencies.

 

Comments

Popular posts from this blog

Border Crimes & Border State Theft

A New Fix: ABCs of REBT & Gestalt Therapy