Could your computer activity warrant a lethal action? A troubling global precedent that can possibly endanger your life was set on May 5, 2019 while many people were enjoying Cinco de Mayo. The Israeli's and the Palestinians have been skirmishing for decades but this recent engagement established a threshold for using kinetic weapons against a cyber threats. This precedent establishes cross domain retaliatory response for cyber threats. In the past, a cyber threat would be dealt with in the cyber domain, but now a cyber threat has been expanded to include illicit lethal force.
The world of cyber is now ubiquitous in each of our lives and is now a part of modern warfare. The exponential progression of cyber capabilities worldwide has resulted in codified laws, ethics, and norms have not yet caught up for every situation.
The military and the corporate world seek 'small windows of opportunity' to exploit whether to quell resistance to expand control. Life has its oscillating cycle's and we are now seeing these cycles converge and certain powers want to control the cycle as well as the narrative.
There are three stages that we will be witnessing with greater contrast and clarity very soon. The three stages are competition, crisis, and conflict. The first overt use of lethal kinetic action will occur during the crisis phase between competing ideologies and conflict. The thought is to deescalate the situation before it spreads like wildfire resulting in physical conflict and violence. The crisis phase is a delicate balance of communication, interpretation, analysis, and assumption.
May 5th Backgrounder
On May 5, 2019 Israel responded with a real-time response to an attempted cyber-attack from Hamas by destroying the building which housed Hamas’ cyber operations. The international playbook had changed its rules permitting a state to respond with kinetic force to a cyber attack. This action was the first openly-acknowledged, immediate kinetic strike in response to a cyber-attack. The United States first used physical force to counter cyber activity in 2015 when it attacked ISIS hacker Junaid Hussain.
Appearances can be deceiving in this age of warfare and some are exceedingly troubling:
- The kinetic response was conducted after the threat had been neutralized thus making this a case of overkill, literally.
- The action is clearly a psychological operation reminding the inferior side who possesses 'overwhelming capabilities' and is ready to use them.
The action was historic and unprecedented reflecting the ongoing continuum of Palestinian/Israeli kinetic strikes and counter strikes. We can expect multi-domain operations to be crossed even in single engagements. As we move towards more asymmetrical warfare traditional ply book responses may not apply to every situation. As digital technology is integrated each case will be fully measured and weighed to avoid misinterpretations with global repercussions. These actions will be packed with dynamism that is full of energy and new and exciting ideas to garner approval for the action.
This action by Israel settled the ethical debate regarding the status or the role of hackers and online personas. They are now having been determined to be combatants and a viable target for government or military kinetic action.
The U.S. “prefers an effect with consequences-based interpretation of “force” or “armed attack” with respect to cyber-attacks.” There have been international conversations about legislating cyberspace. As technology increases there are pressures to define warfare and conflict-inducing activities. To date, nothing has been codified or ratified.
The U.S. Department of Defense has long maintained that it reserves the right to use any response, including a kinetic response, against a cyber-attack. The action would be determined by a cost-benefit analysis.
Cyber-attacks are becoming normalized facets of the competition, crisis, and conflict cycle. Future multi-domain operations decisions regarding conflict escalation management will very likely depend on actions taken that are unseen by the public. The precedent has been set that kinetic responses are acceptable in the context of ongoing conflict. The threshold for using kinetic weapons does not appear to be matter of >if<, but >when<, and weighed judiciously of when not to use kinetic action.
Siding with Jesus Christ
What threat is this to the average Christian or any person using their computer? As the beast system expands, and wickedness abounds, the true believer in Jesus Christ will find yourself at odds with that system. When you communicate that dissatisfaction, make the decision to empower truth to others, or even gather information so that you can determine truth from propaganda, you may find yourself a target of lethal kinetic action. The military is currently seeking leaders capable of operating in 'ill-defined' spaces and willing to make the decision to initiate a lethal kinetic action for an undefined cyber activity.
___________________________________________________________
Author Information
For those who are actively pray for my ministry I humbly want to thank each one of you!
If you consider this article informative please consider becoming a Patron to support my work.
Going where angels fear to tread...
Celeste has worked as a contractor for Homeland Security and FEMA. Her training and activation's include the infamous day of 911, flood and earthquake operations, mass casualty exercises, and numerous other operations. Celeste is FEMA certified and has completed the Professional Development Emergency Management Series.
- Train-the-Trainer
- Incident Command
- Integrated EM: Preparedness, Response, Recovery, Mitigation
- Emergency Plan Design including all Emergency Support Functions
- Principles of Emergency Management
- Developing Volunteer Resources
- Emergency Planning and Development
- Leadership and Influence, Decision Making in Crisis
- Exercise Design and Evaluation
- Public Assistance Applications
- Emergency Operations Interface
- Public Information Officer
- Flood Fight Operations
- Domestic Preparedness for Weapons of Mass Destruction
- Incident Command (ICS-NIMS)
- Multi-Hazards for Schools
- Rapid Evaluation of Structures-Earthquakes
- Weather Spotter for National Weather Service
- Logistics, Operations, Communications
- Community Emergency Response Team Leader
- Behavior Recognition
And more….
Celeste grew up in a military & governmental home with her father working for the Naval Warfare Center, and later as Assistant Director for Public Lands and Natural Resources, in both Washington State and California.
Celeste also has training and expertise in small agricultural lobbying, Integrative/Functional Medicine, asymmetrical and symmetrical warfare, and Organic Farming.
I am inviting you to become a Shepherds Heart Patron and Partner.
My passions are:
- A life of faith (emunah)
- Real News
- Healthy Living
Please consider supporting the products that I make and endorse for a healthy life just for you! Or, for as little as $1 a month, you can support the work that God has called me to do while caring for the widow. This is your opportunity to get to know me better, stay in touch, and show your support. More about Celeste
We live in a day and age that it is critical to be:
- Spiritually prepared,
- Purity in food and water can
- Secure protection against EMF and RF
- Deters radiation
- Supports Christian families
I use and endorse Helix Life products because they oxygenate the body, deters radiation, creates a healthy oasis bubble around your body. No outside power necessary, easily cleanable.
The Pendant is for personal protection $229-
The Tower will protect your home and structure and is also portable. $1895-
The Array will protect your home, land, or farm $10,200
HelixLife.com offers 0 % financing for 6 months. Telephone and Chat support for questions. They also have scientific studies and resources on why you need EMF protection. You can view testimonials from satisfied customers.
Special: Try the pendant for 10 days for $99! You can purchase the Pendant or return it, hassle free!
Fair Use Act Disclaimer This site is for educational purposes only. Fair Use Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education and research.
Fair use is a use permitted by copyright statute that might otherwise be infringing.
Fair Use Definition Fair use is a doctrine in United States copyright law that allows limited use of copyrighted material without requiring permission from the rights holders, such as commentary, criticism, news reporting, research, teaching or scholarship. It provides for the legal, non-licensed citation or incorporation of copyrighted material in another author’s work under a four-factor balancing test.