Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By Dr. Bob Uda, Ph.D., CM, CHSP, ILO (Reporter)
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

High-Tech Concepts to Counter ISIS

% of readers think this story is Fact. Add your two cents.



High-Tech Concepts to Counter ISIS

By Dr. Bob Uda, The Cyber-commentator

October 14, 2014

 

 

High-tech equipment and weaponry have its place in the fight against terrorism.  It is not the panacea to the problem.  However, used properly and effectively, it serves a purpose in the War on Terror.  We should use 7th century strategies and tactics against the Islamic State of Iraq and Syria (ISIS).  However, we should not revert to 7th century weapons and equipment.  Our high-tech equipment and weaponry can and will outperform the state of technology currently being used by the ISIS insurgents.  We must continually stay ahead of the technology they employ.

 

Aircraft Security

 

Black box.  Because a plane crash can destroy or lose the “black box,” it is now obsolete.  We must upgrade the black box to transmit automatically in real time the conversations that occur during crises, accidents, or incidents.  The signals should be transmitted to both satellite and ground station transceivers and have the conversations recorded and relayed to the Federal Bureau of Investigation (FBI), police, air traffic control (ATC), and Federal Aviation Administration (FAA) as incidents/accidents occur.

 

Doors to pilot’s cabin.  Develop high-security doors for aircraft.  Explosion proof these doors to the pilot’s cabin.  Make those doors lock from the inside with a deadbolt and door bar.

 

De-arming system.  When the warning system warns the pilot that terrorists are on board in the passenger cabin, the pilot presses a button that quickly sprays sleeping gas throughout the entire passenger cabin.  This system must be a secretly installed so that nobody knows about it…particularly the ISIS terrorists.  All passengers (including terrorists) will quickly fall asleep (become unconscious).  The wall/door to the cockpit must be gas-proof sealed.  The pilot lands the plane, and police arrest the terrorists.  This must be a clandestine system.  Carry-on bags shall not include gas masks.  The passenger cabin includes installed, hidden closed-circuit television (CCTV) cameras so that the pilot could see on an instrument panel screen what is occurring back in the passenger cabin.

 

Cockpit system.  Install in the cockpit a system that gives out very high-pitch, eardrum-piercing sound waves (high decibels) both in the cabin and through the earphones that would destroy the terrorists’ hearing and cause unbearable pain once they kill the pilots and close the cabin door.  The system, which uses a two-minute delay, may achieve activation by the ground controller (i.e., air traffic controller), by the chief flight attendant, or by the plane’s captain just before the terrorists disable him/her.

 

If the terrorists hold their hands to their ears, they will be unable to use their hands to steer the plane or manipulate any of the knobs and switches on the instrument panel.  The plane will eventually crash.  In the event the terrorists were prepared with earplugs, a backup system would release tear gas, sleeping gas (anesthesia), and/or poisonous gas to disable the terrorists operating in the cockpit.  The plane will eventually crash.

 

Warning system.  Develop a warning system in aircraft for passengers to be able to press a button to warn the pilot of on-board terrorists.

 

Voice activation to incapacitate hijacking terrorists.  Install in the aircraft cockpit an Arabic voice-activated system.  This system consists of one or a combination of any of the following six approaches:

 

  • Releases poisonous gas,
  • Shoots bullets from a hidden gun in the instrument panel to the pilot’s position in the seat,
  • Releases a bright flash of light that temporarily blinds the terrorists for at least five minutes,
  • Decompresses the cockpit,
  • Releases a high-decibel eardrum piercing sound, or
  • Explodes a hand grenade-type bomb that releases an excessive amount of shrapnel.

 

Building Protection

 

Skyscrapers Strengthen the building of skyscrapers so that they will not implode, buckle, or progressively collapse from a fire within the building.

Cyber Security

Internet Use the Internet to track down and monitor all computers and laptops used by ISIS terrorists.

 

Hackers.  Use hackers to garble the ISIS terrorist messages transmitted through communications systems and computers.

 

Detection Devices

 

CB warfare agent detectors.  Develop high-technology sniffers that will be able to detect and identify deadly chemical and biological agents used by ISIS terrorists for mass murder/destruction.

 

Electronic scanning devices.  Use electronic scanners to detect nonmetal weapons and explosives.

 

Face scanning devices Use face-scanning devices to match faces in crowds to ISIS terrorist databases.

 

Hand and/or finger scanning devices.  Use hand and/or finger scanning devices to match persons in crowds to ISIS terrorist databases.

 

Lie detectors.  Put arrested or captured suspected ISIS terrorists through a battery of lie detector tests.  If they fail the tests, bingo!  We may have a hot prospect to interrogate even further.

 

Metal detection Develop better metal detectors.

 

MRI.  Use magnetic resonance imaging (MRI) technology for weapons detection.

 

Night vision Use night vision equipment to search out and identify ISIS terrorists at night.

 

Non-metallic weapons detection Develop detectors that can identify non-metallic (e.g., plastic, liquid, and gel) weapons on the body, in carry-on bags, and in suitcases.

 

Retina scanner.  Use retina scanners to identify people that enter high-security, high-value facilities that may be ISIS terrorist targets.

 

Smart cards.  Replace paper passports with plastic smart cards that encode personal information and hand, finger, face, and retina scans.  Match ISIS terrorists with data in an ISIS terrorist database.

 

Voice recognition.  Use voice recognition devices to identify people that enter high-security, high-value facilities that may be ISIS terrorist targets.

 

X-ray Improve the X-ray machines to identify weapons (box cutters, knives, and guns).

 

Listening Devices

 

Bugs.  Use bugs and other listening devices (electronic surveillance) to intercept conversations and wireless phone calls.

 

Eavesdropping devices.  Develop better and more effective eavesdropping devices that evade observation, detection, and/or counteraction.  Embed microminiaturized eavesdropping devices on humans, animals, and equipment so that we can hear sensitive conversations and accumulate data for conducting military actions on the enemy.

 

Sensors

 

Motion sensing Use motion sensors for detecting intruding ISIS terrorists.

 

Vibration sensing Use vibration sensor technology for identifying intruding ISIS terrorists.

 

Surveillance Systems

 

Spy satellites Use our spy satellites to track individual ISIS terrorists.

 

Surveillance.  Use space surveillance to identify, track, and pinpoint ISIS terrorists, cells, and terrorist camps.

 

Spy planes.  Conduct spy plane flights over Afghanistan, Iraq, Syria, Iran, and other ISIS terrorist-supporting countries to gather needed information to conduct successful military operations.

 

Unmanned aerial vehicles (UAVs).  Use UAVs on reconnaissance flights to photograph ISIS terrorist camps.  Use UAVs as kamikaze vehicles/bombs on ISIS terrorist camps and cells.  Position UAVs 90,000 feet above coastlines to sense ISIS terrorists and their missiles.

 

Translation Devices

 

Scanner-translator.  Develop a scanner-translator to translate hard copies of documents written in Arabic languages into English.

 

Translating.  Develop software systems for real-time, accurate translating of Arabic languages into English when wiretapping, listening to wireless phone calls, and intercepting e-mails and faxes.

 

Weapons

 

Miyamoto Musashi said, “There is a time and place for use of weapons.”  We should use all available weapons for appropriate targets of opportunity.  Furthermore, Musashi said, “You should not have a favorite weapon.  To become over-familiar with one weapon is as much a fault as not knowing it sufficiently well.  You should not copy others, but use weapons that you can handle properly.  It is bad for commanders and troopers to have likes and dislikes.  These are things you must learn thoroughly.”

 

Cruise missiles.  Use cruise missiles to bomb ISIS terrorist camps and control centers.

 

Laser weapons Develop laser guns to zap ISIS terrorists from space satellites and space stations.

 

Paraphernalia.  Develop cutting-edge, high technology paraphernalia (i.e., equipment, devices, documents, gadgets, tools, and weapons) used in clandestine missions to trick, attack, or demoralize ISIS terrorists.  These paraphernalia may include such things as:

 

  • Grenades that explode on impact instead of being on a timer,
  • Compass in a clothes button,
  • Miniature pistol that can be concealed easily,
  • Caltrops for puncturing tires,
  • Maps concealed in decks of cards,
  • Silent pistols,
  • Limpet (clings to the hull) mines with acetone time-delay fuses to use against ships,
  • Miniature cameras that could fit into a matchbox,
  • Two-man kayaks,
  • “Aunt Jemima” explosive powder packages in Chinese flour bags, and
  • Inconspicuous letter-drops.

 

Other paraphernalia may include:

 

  • Wiretap devices,
  • Electronic beacons for field agents,
  • Portable radios to allow agents to communicate securely with an aircraft circling high overhead,
  • Fabricated documents (e.g., passports, ration cards, work passes, ID cards, and occupation currency),
  • Specialized boats, equipment, and explosives,
  • Underwater breathing gear,
  • Waterproof watches and compasses,
  • Inflatable motorized surfboard, and
  • Remote-controlled speedboat guided by aircraft. 

 

No idea should be overlooked however unorthodox, ridiculous, or untried.

 

Stealth.  Use the stealth bombers and stealth fighters to attack at night and bomb ISIS terrorist camps and control centers.

 

Guided bombs.  Use satellite-guided bombs launched from warplanes for getting at the ISIS terrorist camps, control centers, and other targets of value.

 

CBR warfare.  Use chemical/gas (poison gas), biological/germ, and radiological/nuclear warfare on the ISIS terrorists after they use these weapons first.

 

Natural and synthetic agents.  Use natural and synthetic agents such as diseases and cultures ranging from exotic anthrax to commonplace, but just as deadly, scourges like the foot-and-mouth epidemic that swept Europe.  Other agents that we can use include smallpox, pneumonic plague, Ebola, and other viral hemorrhagic fevers.  If the ISIS terrorists use these agents on us, use it back on them.

 

Deadly gas.  Use sarin gas, botulin toxin, and nerve gas to fight ISIS terrorists.

 

Defoliants.  Use defoliating agents on their crops to starve the ISIS terrorist population.

 

Cluster bombs.  Use the BL 755 cluster bomb, an area-impact weapon employed by the Royal Air Force’s (RAF’s) Harriers.  Each bomb contains 147 grenade-sized “bomblets” that disperse over an area the size of half a football field.  Each bomblet detonates producing up to 2,000 high-velocity shrapnel fragments.  The effect is similar to a large number of miniature nail bombs exploding simultaneously.  The USAF has a similar weapon, the BCU87B, which contains 202 bomblets.  We dropped more than 10,000 of these bombs during the 1991 Gulf War.

 

Crossbows.  Use Rambo-style crossbows for hunting and killing ISIS terrorists in the mountains of the Levant area.

 

Fuel-air bombs.  Use fuel-air explosive bombs, which are more devastating than conventional bombs.  These bombs succeed the napalm, though typically, they cover a wider area and disperse more evenly.  Sun Tzu said, “There are five ways of attacking with fire:

 

  • The first is to burn soldiers in their camp.
  • The second is to burn stores.
  • The third is to burn baggage trains.
  • The fourth is to burn arsenals and magazines.
  • And the fifth is to hurl dropping fire amongst the enemy.”

 

This last bullet is analogous to dropping fuel-air bombs today.

 

Slurry bombs.  Use this very powerful bomb weighing nearly seven tons and capable of producing blast-effects of up to 1,000 psi, not much less than a small tactical nuclear weapon.

 

Napalm surpluses.  Use up the old, surplus napalm on ISIS terrorist camps.

 

Land mines.  Use more land mines to get the ISIS terrorists.  Arm and mine doorknobs, television sets, and cigarette packages that lay on the ground.  Blow off a hand or two.

 

Missiles.  Use surface-to-air missiles (SAMs) and shoulder-fired missiles to get the ISIS terrorists.

 

Silencers.  Use silencers to shoot ISIS terrorists in terror cells throughout the world.

 

Tactical nuclear weapons Use tactical nuclear weapons on the ISIS terrorist training camps and command/control centers (CCCs).

 

Surplus nuclear weapons Use up our old nuclear bombs on ISIS terrorist camps and CCCs.

 

###



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)
Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen! 
Nascent Iodine - Promotes detoxification, mental focus and thyroid health.
Smart Meter Cover -  Reduces Smart Meter radiation by 96%!  (See Video)

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.