I had the opportunity to interview a terrorism expert that specializes in financial security and its direct link to terrorism, and what I learned is that all consumers need to ask their financial institutions about their firewall protection and whether or not they restrict access to their online banking system since terrorists often target financial institutions since they can be used to fund terror cells that are located inside the United States and all over the world.

I was also informed that sophisticated terror networks often set up fake companies that are either internet based or bricks and mortar operations, and that the terrorists seek to exploit weak firewalls or firewalls that do not restrict foreign access to the financial institution’s online banking system, and that this is why President Trump’s ban on bringing electronics into the country from the 6 banned nations is an extremely good idea since it’s not only about potential bombs or explosives, but also about terrorists potentially accessing firewalls from within the United States that could not be accessed from outside of the country due to a strong firewall that restricts certain countries that are on the financial institution’s internal list.    

My terrorism expert also explained that a bank customer can also have his or her account accessed from outside of the country prior to a bill payment being set up for a fake company due to a firewall that does not restrict foreign access from certain countries that are known to be terror hot spots.

Terrorists will also report a debit card stolen right after they change the address online. This particular deceptive act allows the terrorist to withdraw up to five hundred dollars a day before the fraud department or the customer discovers the unauthorized activity. The money is not only used to pay for terrorist supplies, but to also deliver messages according to my terrorism expert who states that terrorists often write Arabic messages on their money and that this is their low tech way of carrying out terrorist operations while certain intelligence agencies are glued to a computer screen since they believe that everyone thinks like they do and that all of the terror data is electronic in nature when it is not since many of the terrorists are using 2000 year old terror tactics that cannot be picked up by a computer since there’s a group of terrorists that are completely unplugged and that cannot be contacted by cellphone or by computer since they operate off of spoken and written words that are either mailed or delivered in person due to the ubiquitous electronic surveillance that we’ve heard about.                         

Nathaniel Armstrong, Jr.

Cerritos, CA –

Advertisements