From the Editor

America’s Achilles’ Heel

 

Most of us have heard of the story of Achilles, the warrior who was only vulnerable in his heel. America is the greatest superpower this world has ever known. But we have a very vulnerable point in our military—our own Achilles’ heel. It is so dangerous that I am amazed it hasn’t received more publicity.

Here is a quote from the Intelligence Digest of Cheltenham, England, by Joseph de Courcy, March 20, 1992 (emphasis mine): “We will be hearing a lot more about computer crime, computer terrorism, and computer warfare. Every moment of the day in modern, technological societies is dominated by computers. These computers are highly vulnerable to criminal, terrorist or enemy sabotage. For the moment, the public is only dimly aware of exactly how vulnerable a computer-run society is, whilst criminals, terrorists and would-be aggressors are only just beginning to understand the potential available to them. This will change.…

“Furthermore, every computer has a ‘backdoor key,’ by-passing access codes, for the convenience of the technical experts. Backdoor keys can be created by special instruction in order to ensure continued access regardless of changing security codes. No computer system is totally secure, or anywhere near it.…

“One growing concern to Western security authorities is the expanding, semi-underground, network of young computer hackers in Germany. It is thought that some at least of these highly skilled computer wizards are ideologically motivated—or could become so. With their expertise, a terrorist organization could achieve a far greater impact on everyday life than has ever been achieved by conventional terrorism.

“As to the implications for defense, the Gulf War showed what a critical role technology now plays in warfare. But the course of a battle would be very different if effective technology-sabotaging measures could be instituted against the superior force.…

“Computer dependence is the Western world’s Achilles’ heel, and within a few years this weakness could be tested to the full.”

As Mr. De Courcy said, “No computer system is totally secure, or anywhere near it”!

Germany is the first nation to have their own air force base in America. It’s located in Alamogordo, New Mexico.

There are probably more German pilots being trained in the U.S. than there are from any other nation—most of it being done because of nato. Sheppard Air Force Base in Wichita Falls, Texas, is one example. They are actively teaching and training German pilots how to operate U.S. war planes. An American heads the group. A German is second in command. Germany is learning a great deal about our military. Along with that, they are learning a lot about the modern-day computer technology that plays such a big role in U.S. military operations.

One of the major concerns of Western security authorities is about a “network of young computer hackers in Germany.” That the computer hackers are from Germany should also send a warning message—especially if you understand German history and Bible prophecy.

Winston Churchill said Germany had a history of surprise attacks against enemies and nations who thought they were friends with Germany.

Who has an unparalleled history of destroying many nations in warfare? Germany has a long history of such conquests. They tried hard to conquer and rule the whole world in World Wars I and II.

We seem to have forgotten the history of Germany. Assuming the Germans are trustworthy military allies, or lovers (Bible terminology), is going to be a fatal delusion!

One of the main reasons we won World War II was because the British broke German radio code. We knew about most of their war plans in advance! Quite a gigantic advantage. Some experts think we would have lost the war without that knowledge.

We could lose the next war before we even begin, if somebody breaks our military codes.

A powerful Germany is disturbing many people as it once again bullies Europe. Is America being exposed to a great risk in its love affair with Germany?

GoogleContact Gerald Flurry by e-mail. You can read his past articles here.
Recent articles: