Political tools

We all daydream and I am no exception. Yet I believe that my brain is bonkers (probably related to the casing it is in). This all started last week when I saw Official Secret (2019), now I need no encouragement to watch anything with Keira Knightley, so when I saw the name, I picked up the title. I saw it was a spy story based on actual events. It was seeing the film that overwhelmed me. The movie was amazing, one that John Le Carre would have ben proud of if he had written it (it was written by history). It was still in the back of my mind when it crossed tracks with an event that started to play out two weeks ago. A man named Sywert van Lienden had allegedly “send a series of critical tweets to ensnare the Dutch health ministry, the tweets were arranged to create pressure”. From my side (not the most popular one) I believe that the Dutch Health department was foolish on a few levels. In the first Twitter is not a reliable source, so ego driven politicians jumped up fast and they did not do their homework by testing the tweet origins. Trolls have been using that method for years, so I think that Sywert was aggressively creative, some will call him deviously sneaky. Yet the two parts gave me an idea. In the proposed setting of all these honourable military complex vendors. You see, hackers are always the ones copying data FROM servers. Now consider the setting that an ammunition maker has devised a new kind of shell, a .50 shell that works like a drill, it might only in part get through bulletproof glass, but the delay and impact pressure will change the course. So the inner part like a mercury exploding bullet, there are a few items that [secret patent content deleted from story

So here we are, a manufacturer who has the inside track that no one else has. However, the Pentagon is not willing to buy it, because there is no need. So the maker engages with hackers to insert a secret file into the RFARP (Russian Foundation for Advanced Research Projects) server. The department also known as “Фонд перспективных исследований” will be hacked (the makers arranged that via another channel), so the hackers upload a similar but not identical one, it even has a fixed flaw that the makers left untouched. So when the CIA makes enquiry the report is given (a little) praise with the setting that they will incorporate that design in the next batch for testing. Now with the Russian data the maker secures an initial order of 50,000 bullets with a larger order coming if the first order proves its worth (and of course it does). A station where the CIA is ‘used’ as a tool for selling hardware the Americans never really needed. 

Now consider the setting as the hackers overwrite the server with an inserted trojan over a seemingly empty damaged file. Now they are in the clear and it becomes a CIA versus GRU game. The stage of what some think they need whilst the deciding players never correctly did their homework. A setting that could make for an entertaining (thrilling) 97.2 minutes.

Just an idea.

P.S. To any Russian investigator, I have no idea how this story got on my blog. (Nudge nudge wink wink)

Advertisement

Leave a comment

Filed under Media, Military, movies, Politics

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.