Using the Pressure Washing Business Model to Choose Major Weapon System Acquisitions

Using the Pressure Washing Business Model to Choose Major Weapon System Acquisitions

Pressure Washing Business — For years before retirement, I was in the cleaning business, and we were basically a mobile carwash company, but we also washed many other types of things, and we had a common enemy, we called it dirt. Dirt is a common problem in the world, after all, it was created by God on the first day when he created the heavens and the Earth, as per biblical or creationism theory. That dirt has been getting all over just about everything that mankind has made ever since.

Okay so, you read the title of my article and your probably wondering what on earth the pressure washing business model could possibly have of value to helping the United States military to use in its major weapons system acquisitions. So let me tell you. We built our mobile carwash trucks in such a way that if it was raining we could go clean something else, or if it was in the middle of the night, and no customers wanted their cars washed, we could always find something to clean.

We had to build our equipment so that it could clean concrete, structures, railroad cars, aircraft, marine vessels, cars, trucks, and a number of other things. Remember the enemy was dirt, and he could be lurking anywhere. We had various attachments that we could put on the into the pressure washing hose, and various devices when necessary we could use to help remove the dirty wash water to secure it in a safe location that wouldn’t hurt the environment.

We had our basic equipment; the hot water pressure washers, reclaim tanks, fresh water tank, hoses, special wands, safety equipment, and we often mounted all of this stuff on trailers, truck beds, sometimes enclosed, and sometimes not. Depending on the area in the country where the franchisee was, we would often use modified equipment to serve multiple purposes.

Now then, I would submit to you that the same thing is true in dealing with our dirty enemies abroad. We have different kinds of dirt; that which comes from rogue regimes, hostile militaries, and even international terrorists. There are pirates, state-sponsored hackers, and all sorts of risks to this great nation of ours.

We need different tools, weapon delivery platforms, and various strategies, training, tactics, and specialized equipment to win the war on dirt. Personally, I don’t see any difference – it’s all the same, just playing with hundreds of billions instead of hundreds of thousands of dollars for the right equipment.

We have a job to do in the world, and that is to clean up all the dirt, to protect this nation, and to lead the world forward like this superpower we are. Maybe we can garner some lessons from the mobile pressure washing industry in this regard. Indeed I hope you will please consider all this and think on it.

It is believed that China’s Military is the chief suspect in the attack on Google’s email infrastructure and its servers.
The ability to disable anything – “From power grids to the Stock Exchange”, says Duncan B. Hollis and David G. Post of the National Law Journal. “Thicker Firewalls and better mechanisms to detect and repel cyberspace attack strategy.” How to defend Military, Private, Commercial, and Worldwide infrastructure(s) is a chief concern for cyberspace attack issues.

A Tanker Ship Captain who was requesting aid sent an SOS via wireless radio. The call was heard almost immediately. A helicopter was dispatched as well the sea going vessel that initially received the call. Pirate vessels were descending upon the hapless vehicle, an Indian Oil Tanker.

The pirate boats aborted their attack for fear of the chopper and the arriving rescue ship. The receipt of an SOS by International Law requires its reception by seagoing (air as well) vessels to render assistance “at all possible speed.” This particular incident occurred off the coast of Somalia, January 2009. What about the assistance duties of cyberspace?

A Captains mayday call or distress signal requires immediate response and or assistance. In today’s world of cybernetics, hyperlinks, and various information and data transmission (transportation)…legal issues arise in responsibility assistance and protection in and on the Internet – a virtual sea.

The new type of pirate is here to challenge an threaten all with its “new form of attack(s).” The hacking of a million plus computers that encountered blocked Internet access was commandeered by the hack-attack. Internet networks and Intranets became vulnerable as well.

The cyber attack filled newspaper headlines around the world. Government Network Operations, Emergency Telephone Connections, Electronic Banking Services, Hospitals, Colleges and Universities endured major communication and transmission interruptions in 2007.

Pressure Washing Business

The compromise of these networks and millions of connecting nodes has suffered repeated attacks. It has also been reported that militaries by the dozens have combined its forces and created what’s known as “Cyberforce.”
Security measures, in many cases, challenge hackers to improve their techniques while attacking vulnerable “Open Networks.” Identifying locations of attackers arise from the structure of the Internet.

It is almost impossible to enforce the “Cyberspace Criminal Law(s). Military “Laws of War” do not apply so easily when it comes to law enforcement in cyberspace – the tools are merely instrumental protection for “Internet Users.”

This recognition can therefore be quite effective in the fight against hackers. Entities in a position to assist would have an opportunity to respond to the sender of the SOS. Attackers could be cut off from users in need. The attackers could be traced to its origin(s) and thereby canceling out further interference from the cyber attack source.

Decisions to assist come only from providers that wish to utilize the aid resources. Holding cyberspace attackers accountable for their destruction/disruptions is not an easy task. All that providers can do is to keep the attack to a minimum level and provide assistance upon availability.

The SOS in cyberspace can be heard. Most “Cloud” entities, agencies, and companies are capable of defending their Intranets and Quasi-Networks from major attacks by hackers with many protection tools and firewalls. It does not mean the law can’t or won’t intervene, especially when defensive and/or preventive measures have been implemented.

The point of the matter is that Internet users can and should expect and receive help from the Internet Cops. The village at large is or at least should be involved in the prevention and reporting of cyberspace attacks.
Many military defense contractors, high-tech executives the Silicon Valley, our State Department, and the top brass in the military believe that the Chinese have been stealing high-tech and military secrets for years.

Therefore, anything that we develop, which we think is a secret, is already known by the Chinese, and they are already secretly working on it themselves. In fact in the world of spies, this went on throughout the Cold War, only that time it was Russia.

If you’ll recall every time the US came out with a new fighter aircraft, a missile, a new ship, a new radar system, or a new aircraft bomber, the Russians had one that looked almost identical. This still happens today in fact the T-50, a fifth-generation stealth Russian fighter plane looks a lot like the F-22 raptor. If all this is taking place, then why are we so worried about selling our military equipment to our allies, and why are we so worried that they might spill the beans and give this information to our enemies?

Indeed, the reality is the enemies probably already have it all and they probably already know more than we think about all the high-tech weapons systems we are engineering, and researching presently. According to an article in Taiwan News on July 30, 2010 entitled; “The US Worries About Taiwan’s Military Transfer to China,” and we should be worried about stuff like this. But we should also realize that they probably already have all this information anyhow.

The Chinese don’t like the idea of the United States selling late model fighter aircraft to Taiwan, putting in a missile defense system, or anything else similar to this. However, if the US does go ahead with all of these sales, there is a good chance the Chinese will have this technology sometime in the future when Taiwan and China are reunified in some way and become one in the future. There’s a good chance this could happen down the road without a fight due to China’s enormous military, let’s say in a couple of decades from now.

Should we really be concerned, because if we really are concerned about China getting our secret weapon components, then perhaps we should be more concerned with the 6000 spies that are all over the United States including Silicon Valley, grabbing all of our secret technologies.

We need to do one of two things, we need to stop the spying, increase military intelligence and surveillance on our so-called friends, enemies, and allies who are stealing our military secrets, or we need to just say forget it, and realize they already have it all.

If we choose the latter this could be good for US defense contractors to sell our military technology all over the world. We won’t be giving it to our adversaries or potential future enemies, because they already have it. It seems all too often that we are just kidding ourselves when we think we are somehow protecting our secrets, as we so freely give them away out the back door. Even though this is all philosophical, it does matter, it matters very much, and I am quite concerned. Please consider all this.

Leave a Reply

Your email address will not be published. Required fields are marked *