Transitioning from the kill chain to the kill web
- Social network for WAR (Web Application Resource)
- Highly secure tactical cloud-based 'kill web' to link together its intelligence systems and smart weapons.
- Interdimensional Warfare
While this is talking about the cyber domain it is an interdimensional strategy model
This is messy, real messy! The bad news is that your body has been infiltrated by intelligent micro-computers known as nanoparticles. There is good news, but you must learn about the bad first. Defense planners at the Defense Advanced Research Projects Agency (DARPA) are now looking at transitioning from a kill chain to an interdimensional kill web. Weaponized Nanoparticle Arrays have been strategically deployed and embedded within, let us say, all original lifeforms. Is the season rapidly approaching for the slaughter of original lifeforms only to be replaced with synthetic AI forms? Have we become causalities of WAR-Web Application Resources?
This idea is complex and it impacts not only your body but scales up to international affairs because it has so many different applications, platforms, sensors, and actors.
For instance: APT28 is a threat actor that has reportedly been operating since at least 2004 APT28 (FireEye’s initial designation of the actor) is also known as Fancy Bear (CrowdStrike), Pawn Storm (TrendMicro), Sednit (ESET), Sofacy Group (FSecure), Strontium (Microsoft), Threat Group -4127 (SecureWorks), Tsar Team (Trustwave) and one of the two Grizzly Steppe threat actors (Department of Homeland Security of the United States). The actor appears to have (re)claimed the battle name (Dutch): 'geuzennaam’ Fancy Bear(s) in its self publications of collected confidential information.
Over the last years, the attacks by APT28 have increased tenfold, making APT28 one of the most prolific, agile and dynamic threat actors in cyberspace. The advanced and persistent attacks by APT28 are consistent with nation-state level capabilities. These threat actors display pro-Russian Federation biases, which are reasons one has to sagely listen to media reports, as these are background attacks are not generally made public. Who the real actors are in this age of deception is anyone's guess.
Purposeful Killing Artifact
The scheme will use data from ubiquitous sensors to form a Tactical Cloud. This has been designed as a Purposeful Artifact, namely kill chain that can represent the end-to-end modus operandi of various real-world attackers to support analysis, comparisons and defense. The term kill chain describes an end-to-end-process or the entire chain of events, that is required to perform a successful attack carried out by the dual purpose Red Team in a MITRE’s ATT&CK™.
The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target. Each domain such as sea, land, cyber, electromagnetic spectrum and so forth has its own kill chain with a unique and independent OODA (observe, orient, decide, and act).
The goal of the Adapting Cross-domain Kill-webs (ACK) program is to develop an overall framework, algorithms, and software prototypes for decentralized construction and adaptation of multi-domain kill webs, i.e. software decision aids to coordinate the selection of the specific sensors, effectors, and support elements across domains to form kill webs delivering desired effects on targets. FedBizOpps
These kill chain's operate at various speeds and can operate only as fast as the slowest one. General John Jumper suggests that we need to execute our complete kill chain in ten minutes or less.
In the past warfare, one domain's kill chain had to wait for another kill chain to be completed. The new interdimensional models for the kill web erase boundaries and smear domains together eliminating the stovepiping dependencies. The kill web in essence hybridizes sensor-to-shooter, cross-domain fires, multi-domain warfare, and cross-domain warfare into one overlapping web of death reducing the time it takes to slaughter.
Many years ago the Lord gave me a model to engage in spiritual and physical warfare for these days and times. It is very easy, His Word! Each step of the way I will illuminate the adversary's tool and contrast it with what the Bible has to say on the topic. You will clearly see that the adversary plans evil but he uses the building blocks that God laid at the very foundation of creation. The words of the Lord are promises to us when we abide in Him. Let us dig in!
Reconnaissance: Futurists and Post-Human advocates with significant funding and ancient technologies have located precisely who they want to target. If you are reading this post, you have been targeted.
Send men to scout out the land of Canaan I am giving to the Israelites. Send one man who is a leader among them from each of their ancestral tribes. Numbers 13:2
Be careful to always give a good report of God and His provision.
Weaponization: Your body has been embedded with hundreds if not thousands of intelligent nanoparticles with deliverable payloads. These particles can be access anywhere or anytime. For most of us these particles are laying in wait until the moment to activate is given.
No weapon formed against you shall prosper,
And every tongue which rises against you in judgment
You shall condemn.
This is the heritage of the servants of the Lord,
And their righteousness is from Me,”
Says the Lord. Isaiah 54:17
Delivery: All it will take to activate these nanoparticles is the communication kill order. These nanoparticles have their own antenna's and power source, oftentimes harvesting energy from your own body.
You are my hiding place; you will protect me from trouble and surround me with songs of deliverance. Psalm 32:7
Exploitation: Your body has been compromised creating vulnerabilities and can be exploited anytime. There are spiritual remedies to counteract this exploitation.
And such as do wickedly against the covenant shall he corrupt by flatteries; but the people who do know their God shall be strong, and do exploits. Daniel 11:32
Installation: As you read this, your body is continually receiving devices yet to be installed. These devices each have their own backdoors for off the books exploitation and are also creating backdoors into your body that can be hacked.
Then shall the kingdom of heaven be likened unto ten virgins, which took their lamps, and went forth to meet the bridegroom.
And five of them were wise, and five were foolish.
They that were foolish took their lamps, and took no oil with them:
But the wise took oil in their vessels with their lamps.
While the bridegroom tarried, they all slumbered and slept.
And at midnight there was a cry made, Behold, the bridegroom cometh; go ye out to meet him.
Then all those virgins arose, and trimmed their lamps.
And the foolish said unto the wise, Give us of your oil; for our lamps are gone out.
But the wise answered, saying, Not so; lest there be not enough for us and you: but go ye rather to them that sell, and buy for yourselves. Matthew 25
Command and Control will determine when the kill order is given. Surveillance will be persistent through beacons place within your body. I am wondering how many of these intelligent devices are needed to be installed into our body potentially weakening us biologically and spiritually. In other words, when do we loose our sovereign will and become controlled by the beast system?
For I know the plans I have for you, declares the Lord, plans for welfare and not for evil, to give you a future and a hope. Jeremiah 29:11
Warfare Action is the moment of truth when the mission of the attack becomes visible. For many of this that will mean death.
Put on the full armor of God, so that you can take your stand against the devil's schemes. For our struggle is not against flesh and blood, but against the rulers, against the authorities, against the powers of this dark world and against the spiritual forces of evil in the heavenly realms. Therefore put on the full armor of God, so that when the day of evil comes, you may be able to stand your ground, and after you have done everything, to stand. Stand firm then, with the belt of truth buckled around your waist, with the breastplate of righteousness in place, and with your feet fitted with the readiness that comes from the gospel of peace. In addition to all this, take up the shield of faith, with which you can extinguish all the flaming arrows of the evil one. Take the helmet of salvation and the sword of the Spirit, which is the word of God. Ephesians 6:11-17
This is an integrated, end-to-end process described as a chain because an interruption at any stage can interrupt the entire process.
Simultaneous Kill Web
Image Access:This is a Hot Chart https://www.csacademy.nl/images/scripties/2018/Paul_Pols_-_The_Unified_Kill_Chain_1.pdf
The simultaneous kill web builds on the previous concepts while add detailed objectives. Thus kill web will be comprised of accelerating rolling events, circumstances, and objectives. Flowing as below:
Persistence: Any access, action or change to a system that provides an attacker with a persistent presence.
I tell you, He will defend and protect and avenge them speedily. However, when the Son of Man comes, will He find [ persistence in] faith on the earth? Luke 18:8
This is because we weary with the persistent assaults in waves of attack.
Privileged Escalation: We are currently seeing an increase in our society for privileged access whether that is in social media, news, and soon to your own body. You body has been modified to the degree that its operation can be patented because it is no longer considered God's creation. These techniques that provide an attacker with higher permissions on a system or network.
For you have been given the privilege of serving Christ, not only by believing in him, but also by suffering for him. Philippians 1:29
Defense Evasion: Whether it is treatment for a particular disease or a CBRNe attack for the last 20 years we have seen that if you prepare or treat for one thing it actually aggravates another condition, thereby making survival almost impossible.
He has granted to us His precious and magnificent promises, so that by them you may become partakers of the divine nature, having escaped the corruption that is in the world by lust. 2 Peter 1:4
Credential Access: Techniques resulting in the access of, or control over, system, domain or service credentials.
It is interesting that the technology we battle comes from fallen angels while access is Scripture the word access comes from: ak'-ses (prosagoge, "a leading to or toward," "approach" as in access to God.
Thrice used in the New Testament to indicate the acceptable way of approach to God and of admission to His favor. Jesus said, "I am the way" (John 14:6). His blood is the "new and living way" (Hebrews 10:20). Only through Him have we "access by faith into this grace wherein we stand" (Romans 5:2); "Through him we both have access by one Spirit unto the Father" (Ephesians 2:18 the King James Version); "in whom we have .... access in confidence, through our faith in him" (Ephesians 3:12).
Discovery: Techniques that allow an attacker to gain knowledge about a system and its internal network.
Call to me and I will answer you, and will tell you great and hidden things that you have not known. Jeremiah 33:3
It is the glory of God to conceal things, but the glory of kings is to search things out. Proverbs 25:2
Lateral Movement: Techniques that will enable an attacker to access and control remote systems and nodes (you are considered a node) on a network.
While evil people and impostors will go on from bad to worse, deceiving and being deceived. But as for you, continue in what you have learned and have firmly believed, knowing from whom you learned it and how from childhood you have been acquainted with the sacred writings, which are able to make you wise for salvation through faith in Christ Jesus. All Scripture is breathed out by God and profitable for teaching, for reproof, for correction, and for training in righteousness, that the man of God may be competent, equipped for every good work. 2 Timothy 3:14-17
Pivoting: Tunneling traffic through a controlled system to other systems that are not directly accessible.
The pivots on the thresholds shook at the voices of those who called, and the house filled with smoke.
And I said: "Woe is me! I am lost, for I am a man of unclean lips, and I live among a people of unclean lips; yet my eyes have seen the King, the Lord of hosts!" Isaiah 6:4-5
Target Manipulation: Techniques aimed at manipulation of the target system to achieve the objective of the attack.
Behold, I am sending you out as sheep in the midst of wolves, so be wise as serpents and innocent as doves. Matthew 10:16
Execution: Techniques that result in execution of attacker-controlled code on a local or remote system.
Now muster your troops, Daughter Troop!
They have laid siege against us;
with a rod they will strike the cheek of the judge of Israel.
As for you, Bethlehem of Ephrathah,
though you are the least significant of Judah’s forces,
one who is to be a ruler in Israel on my behalf will come out from you.
His origin is from remote times, from ancient days. Micah 5
Collection: Techniques used to identify and gather information from a target network prior to exfiltration. This will create your CORAS profile:
...even the darkness is not dark to You, but the night shines like the day, for darkness is as light to You. For You formed my inmost being; You knit me together in my mother’s womb. I will praise You, for I am fearfully and wonderfully made. Marvelous are Your works, and I know this very well.…Psalm 139:13
Exfiltration: Techniques that result or aid in an attacker removing files and information from a target network. This can be at a social engineered level where you are isolated or it can mean that you are physical deleted or terminated. As a fictional introductory account watch the movie The Last Enemy (watch with caution).
I eagerly expect and hope that I will in no way be ashamed, but will have complete boldness, so that now as always Christ will be exalted in my body, whether by life or by death. For to me, to live is Christ, and to die is gain. But if I go on living in the body, this will mean fruitful labor for me. So what shall I choose? I do not know.…Philippians 1:21
Command and Control: Techniques that allow attackers to communicate with controlled systems within a target network.
When you come into the land that the Lord your God is giving you, you shall not learn to follow the abominable practices of those nations. There shall not be found among you anyone who burns his son or his daughter as an offering, anyone who practices divination or tells fortunes or interprets omens, or a sorcerer or a charmer or a medium or a necromancer or one who inquires of the dead, for whoever does these things is an abomination to the Lord. And because of these abominations the Lord your God is driving them out before you. Deuteronomy 18:9-12
Objectives: Socio-technical objectives of an attack that are intended to achieve a strategic goal.
The Lord also has His objectives:
And he said to them, Go into all the world and proclaim the gospel to the whole creation. Mark 16:15
This is an extremely complex topic. By its very nature, a kill web will present a lot of “targets of opportunity” for precision weaponry that can be found in almost every discipline from education, medicine to government. The kill web can shrink (scale) the kill zone in land wars, or expand it in large scale sea wars. If you want to dig into this subject in detail, you can start with the Modern War Institute at West Point. There are some good diagrams of a battlefield kill web with all the players identified in the articles.
Now you have been introduced to the kill web concept you can see how it is a tool in the military’s toolkit for implementation of Metcalfe’s Law which is the more devices you add to the network, the more powerful and valuable (value-added) the network becomes.
There is rivalry between the services for NDAA monies and so it will be interesting to watch the next couple of years to see where that money is invested: communications, new weapon platforms, or hardware.
This kill web is being designed to be robust in various types of environments.
The good news is that Isaiah 54:17 tells us:
No weapon formed against you shall prosper,
And every tongue which rises against you in judgment
You shall condemn.
This is the heritage of the servants of the Lord,
And their righteousness is from Me,”
Says the Lord.
So, although there are weapons being arrayed against us from within and without we can be assured that when we abide in Jesus we will prevail. Yes, we may physically die, but for those of us who believe we will live with Jesus for all eternity, and that my friends in true security.
If you consider this article informative please consider becoming a Patron to support my work.
Going where angels fear to tread...
A special thank-you to my proof-reader Beate.
Celeste has worked as a contractor for Homeland Security and FEMA. Her training and activation's include the infamous day of 911, flood and earthquake operations, mass casualty exercises, and numerous other operations. Celeste is FEMA certified and has completed the Professional Development Emergency Management Series.
- Incident Command
- Integrated EM: Preparedness, Response, Recovery, Mitigation
- Emergency Plan Design including all Emergency Support Functions
- Principles of Emergency Management
- Developing Volunteer Resources
- Emergency Planning and Development
- Leadership and Influence, Decision Making in Crisis
- Exercise Design and Evaluation
- Public Assistance Applications
- Emergency Operations Interface
- Public Information Officer
- Flood Fight Operations
- Domestic Preparedness for Weapons of Mass Destruction
- Incident Command (ICS-NIMS)
- Multi-Hazards for Schools
- Rapid Evaluation of Structures-Earthquakes
- Weather Spotter for National Weather Service
- Logistics, Operations, Communications
- Community Emergency Response Team Leader
- Behavior Recognition
Celeste grew up in a military & governmental home with her father working for the Naval Warfare Center, and later as Assistant Director for Public Lands and Natural Resources, in both Washington State and California.
Celeste also has training and expertise in small agricultural lobbying, Integrative/Functional Medicine, asymmetrical and symmetrical warfare, and Organic Farming.
I am inviting you to become a Shepherds Heart Patron and Partner.
My passions are:
- A life of faith (emunah)
- Real News
- Healthy Living
Please consider supporting the products that I make and endorse for a healthy life just for you! Or, for as little as $1 a month, you can support the work that God has called me to do while caring for the widow. This is your opportunity to get to know me better, stay in touch, and show your support. More about Celeste
We live in a day and age that it is critical to be:
- Spiritually prepared,
- Purity in food and water can
- Secure protection against EMF and RF
- Deters radiation
- Supports Christian families
I use and endorse Helix Life products because they oxygenate the body, deters radiation, creates a healthy oasis bubble around your body. No outside power necessary, easily cleanable.
The Pendant is for personal protection $229-
The Tower will protect your home and structure and is also portable. $1895-
The Array will protect your home, land, or farm $10,200
Steve Quayle Bundles for deep savings and some of my handcrafted products.
Montana Plus-Pendant, Tower and some of my soap products $1849
Frazzled Mom Bundle-Pendant, Tower, Soaps and Cream $1589
Montana Bundle-Pendant and soap $258
HelixLife.com offers 0 % financing for 6 months. Telephone and Chat support for questions. They also have scientific studies and resources on why you need EMF protection. You can view testimonials from satisfied customers.
Special: Try the pendant for 10 days for $99! You can purchase the Pendant or return it, hassle free!