Tag Archive: Financial Institutions


I had the opportunity to interview a terrorism expert that specializes in financial security and its direct link to terrorism, and what I learned is that all consumers need to ask their financial institutions about their firewall protection and whether or not they restrict access to their online banking system since terrorists often target financial institutions since they can be used to fund terror cells that are located inside the United States and all over the world.

I was also informed that sophisticated terror networks often set up fake companies that are either internet based or bricks and mortar operations, and that the terrorists seek to exploit weak firewalls or firewalls that do not restrict foreign access to the financial institution’s online banking system, and that this is why President Trump’s ban on bringing electronics into the country from the 6 banned nations is an extremely good idea since it’s not only about potential bombs or explosives, but also about terrorists potentially accessing firewalls from within the United States that could not be accessed from outside of the country due to a strong firewall that restricts certain countries that are on the financial institution’s internal list.    

My terrorism expert also explained that a bank customer can also have his or her account accessed from outside of the country prior to a bill payment being set up for a fake company due to a firewall that does not restrict foreign access from certain countries that are known to be terror hot spots.

Terrorists will also report a debit card stolen right after they change the address online. This particular deceptive act allows the terrorist to withdraw up to five hundred dollars a day before the fraud department or the customer discovers the unauthorized activity. The money is not only used to pay for terrorist supplies, but to also deliver messages according to my terrorism expert who states that terrorists often write Arabic messages on their money and that this is their low tech way of carrying out terrorist operations while certain intelligence agencies are glued to a computer screen since they believe that everyone thinks like they do and that all of the terror data is electronic in nature when it is not since many of the terrorists are using 2000 year old terror tactics that cannot be picked up by a computer since there’s a group of terrorists that are completely unplugged and that cannot be contacted by cellphone or by computer since they operate off of spoken and written words that are either mailed or delivered in person due to the ubiquitous electronic surveillance that we’ve heard about.                         

Nathaniel Armstrong, Jr.

Cerritos, CA –

The OFAC And Terrorism

When we think about terrorism and the federal agencies that are fighting against it, we immediately think about the FBI or Homeland Security, however, the Office of Foreign Assets Control which has its very own sanctions lists plays a key role in fighting terrorism.

The OFAC is dedicated to monitoring certain individuals as well as certain organizations that might be engaging in money laundering for the purpose of funding terrorism throughout the Continental United States and the world at large. Money laundering is a key component in all national and international terrorist operations since nothing can be accomplished without the appearance of legitimate funding and unless this concept is fully embraced the terrorists can never be defeated.  

The OFAC should be added to all future discussion that are centered around fighting terrorism since terrorists often utilize two extremely powerful tools that the general public and certain news agencies are not aware of and these frightening tools are identity theft and social engineering.

Identity theft is not limited to stealing the bank account number or the credit card number or the name or the telephone number or the address of an individual because it also involves the theft of a person’s “Social Identity” which allows special access to certain areas that are normally closed off to strangers. For example, a terrorist may learn all of the aspects of the local drug trade and may even allow his or herself to be arrested with a small amount of drugs which builds street credit that can then be used to smuggle weapons and explosives that are disguised as an ordinary drug shipment.

Terrorists are chameleons by nature and they will pretend to be homosexuals while engaging in social identity theft since it is not a sin to use treachery against infidels. Terrorists will also pretend to be Christians in an effort to deceive their victims since they do not have to tell their victims the truth. The important thing to remember is that not all Muslims are terrorists and that a terrorist can also be Christian and a Hindu as well as other religious adherents or even atheists.

Social engineering which is the second tool that is used by terrorists who are essentially engaged in espionage involves gathering knowledge about systems and how they can be used to carry out acts of unstoppable terror. For example, a terrorist may show up to a financial institution dressed as someone who is important and he or she may possess all of the correct terminology that is needed in order to deceive the unsuspecting person that greets him or her. And once access and trust are gained the terrorist can then transfer money to an account that will be used for the purpose of carrying out a devastating terrorist attack.

The terrorist that successfully gains access to sensitive areas as well as the full trust of certain unsuspecting individuals through treachery can then steal passwords and identities that can be used for further access to various systems which could include federal bank accounts and communications systems and power sources that are linked to these accounts. This form of social engineering is completely different from the kind of social engineering that Alex Jones of Infowars often talks about since it deals with financial crimes that have to do with stealing information and gaining access to sensitive systems that can be used for terrorism.

The citizens that are living in certain terrorist affected areas that can be found throughout Africa and the Middle East and in certain parts of China are quite familiar with “The Treacherous Acts of Terrorism.”      

 Nathaniel Armstrong, Jr.

Cerritos, CA –