Israel has a new drone that launches like a missile, flies over a target like a normal unmanned aerial vehicle, and then strikes with nearly twice the explosive power of a Hellfire missile.
The Harop, manufactured by Israel Aerospace Industries, can loiter over a target area for six hours, watching for bad guys until it’s ready to engage. Then it flies to the target, crashes into it, and detonates its 33-pound warhead.
The Harop is based on another IAI drone, the Harpy. The Harpy is suicide drone that was built specifically to find and engage radar stations.
IAI announced a successful test of the Harop June 7, according to IHS Jane’s 360, who also reported that the drone may have optional landing gear to allow for recovery when it doesn’t find a target.
Over a decade after Marine Lance Cpl. Antonio “Tony” Sledd was killed in Kuwait — marking the first American casualty of the second Iraq War — the terrorist mastermind who was responsible has been killed.
The Pentagon reports that an aerial drone was used to take out two Kuwait men who were tied to Sledd’s death, according to Time Magazine.
Sledd was 20 years old when he was killed on Fylaka Island in October of 2002, about 20 miles east of the city of Kuwait. He and fellow Marines were training on the island, five months before the official invasion.
Sledd had been creating a makeshift baseball diamond during a break when a white truck driven by two Kuwaitis burst through the training exercise, opening fire with AK-47s. One of the men was Mushin al-Fadhli.
The 34-year-old al-Fhadli was killed in a drone strike on July 8 while he drove his vehicle through northwestern Syria.
“Al-Fadhli was the leader of a network of veteran al-Qaeda operatives, sometimes called the Khorasan Group, who are plotting external attacks against the United States and our allies,” Navy Captain Jeff Davis, a Pentagon spokesman, said in a statement. He added that al-Fadhli also was “involved” in the 2002 attack “against U.S. Marines on Faylaka Island in Kuwait.”
It’s not every day that you can say “Today I got a personalized tweet from someone claiming to be with ISIS.” And that’s probably a good thing.
It happened like this: The Twitter account of a military spouse who owns a spouse-focused non-profit was hacked by a group apparently affiliated with the Islamic State in Iraq and Syria (ISIS). The hackers then tweeted messages aimed at specific military spouses, including myself.
“Amy Bushatz! You think you’re safe but the IS is already here, #CyberCaliphate got into your PC and smartphone,” is, I’m told, what the tweet said (I did not actually see it before it was deleted, presumably by Twitter).
Not long thereafter I received a friend request from someone named “Gasper CyberCaliphate Sadz.” When I viewed their profile it was clear that they were not the sort of person I wanted to let into my social life. Within a few seconds the profile had been deleted. And yes, it was really creepy. The same photo and images were used in this account as were used during the CENTCOM hack.
You might be thinking “that’s what you get for being stupid enough to be quoted by name in a CNN article about ISIS and cyber threats.” However, the decision to have my name used in that story wasn’t a hard one. My name is everywhere — here, on Military.com and in other national publications. I am a public person. That ship has sailed.
I’m told the FBI is investigating the situation, and all the proper military officials have been notified by those of us involved. My husband suggested I not let anyone dressed as a terrorist into our house.
I want to face this whole situation with a resolute jaw and a loud “being afraid means the terrorists win.” I’m not the type of person to live in fear or change my life just because some person on the internet wants to scare me. I’ve never done that before and I have no intention of doing it now.
Personal attacks bring up a variety of feelings. On the one hand, I’m super pissed. How dare they threaten me and my friends? Then there’s the maniacal laughter and the semi-inappropriate jokes about not opening the door for anyone in a bomb vest. I’ve got lots of those.
But then, underneath all of that somewhere deep in my core, I am trying to shake off the tiniest bit of what feels an awful lot like fear.
Because being singled out by someone claiming to be with a fairly terrifying terrorist organization? That’s scary. Knowing that, thanks to my job and public profile, my town of residence, spouse’s name and occupation, base, kid’s names and more wouldn’t take a rocket scientist to locate online? More than unnerving.
But I don’t think it’s the fear itself that matters. I think it’s what I choose to do about the fear that is the key. Do I let it change my habits? Do I ignore it completely and hope nothing bad happens?
Do I use it as a cautionary tale to be more vigilant — much like you would react to a story of a home robbery in your neighborhood?
Or do I completely change my life, delete my social media presence and lock down my family because I am afraid?
Being afraid doesn’t mean the terrorists won — it’s the living in fear that gives them the victory. I’m not giving them the victory.
The U.S. military has a lot of great options when it wants to kill the enemy. Some of the world’s best planes, artillery, and helicopters work with ground pounders to dominate lethal operations.
But when it comes to dealing with crowds, the military wants more options. One of its most promising candidates is the Active Denial Technology system, which focuses a beam of energy to heat the target’s skin 1/64 of an inch deep. It creates a sensation of sudden heat and pain, convincing the target to run.
The U.S. Navy Research team published a video on Wednesday showing off the capabilities of its new “Laser Weapon System” or LaWS, and it’s terrifying. It shoots a 30 kilowatt blast within 2 nanometers of its target according to Defense One.
Simply put, it’s an oversized laser pointer on steroids.
The video starts with a time lapse of the weapon aboard a Navy ship while a boat appears over the horizon. It quickly cuts to an operator housed somewhere within the vessel. He’s standing in front of several screens holding what looks like a glorified X-Box controller. A blast is fired but there’s no bang, no smoke, no projectile, and no tracer, all you see is an explosion.
The video switches to a camera aboard the approaching boat for a close-up of the target. It’s a small stack of shells next to a cut-out of a human. The stack is precisely destroyed without damaging the wooden dummy.
Maybe I’ve seen too many comic book movies, but this is like X-Men’s Cyclops with an invisible laser beam.
Defense One reported that this is the Navy’s answer to drone attacks. Drones are becoming cheaper and more accessible, we’ve had them for years, but now American adversaries have begun to roll out their own versions. The LaWS will hopefully help the Navy keep drones at bay.
According to the Office of Naval Research, this isn’t the final version of the weapon. A more powerful 150-kilowatt version is scheduled for testing in 2016.
The Greek tragedian Aeschylus famously wrote: “In war, truth is the first casualty.”
Well, in this new era of so-called “hybrid” or “gray zone” warfare, truth is not only a casualty of war — it has also become the weapon of choice for some of America’s contemporary adversaries.
Recent “deepfake” videos of the actor Tom Cruise illustrate the power of the new technological tools now available to foreign adversaries who wish to manipulate the American people with online disinformation. The three videos, which appear on the social media platform TikTok under the handle @deeptomcruise, are striking in their realism. To the naked eye of the casual observer, it’s difficult to discern the videos as fakes.
Equally as stunning is an artificial intelligence tool called Deep Nostalgia, which animates static, vintage images — including those of deceased relatives. Together, these technological leaps harken back to the famous line by the writer George Orwell: “Who controls the past controls the future; who controls the present controls the past.”
The technology now exists for America’s foreign adversaries, or other malign actors, to challenge citizens’ understanding of their present reality, as well as the past. Coupled with the historic loss in confidence among Americans for their country’s journalistic institutions, as well as our addiction to social media, the conditions are certainly ripe for deepfake disinformation to become a serious national security threat — or a catalyst for nihilistic chaos.
“The internet is a machine, but cyberspace is in our minds. As both expand and evolve faster than we can defend them, the ultimate target — our brains — is closer every day,” Kenneth Geers, a Cyber Statecraft Initiative senior fellow at the Atlantic Council, told Coffee or Die Magazine.
According to a September Gallup Poll, only 9% of Americans said they have “a great deal” of trust in the media to report the news “fully, accurately, and fairly.” On the other hand, when it comes to trusting the media, six out of 10 Americans, on average, responded that they had “not very much” trust or “none at all.” Those findings marked a significant decline in Americans’ trust for the media since polling on the topic began in 1972, Gallup reported.
“Americans’ confidence in the media to report the news fairly, accurately and fully has been persistently low for over a decade and shows no signs of improving,” Gallup reported.
That pervasive distrust in the media leads to increased political polarization and is bad for America’s democratic health, many experts say. Americans’ loss of trust in the media could also portend a national security crisis — especially as contemporary adversaries such as Russia and China increasingly turn to online disinformation campaigns to exacerbate America’s societal divisions.
In fact, Russia already used deepfake technology in its disinformation campaign to influence the 2020 US election, said Scott Jasper, author of the book, Russian Cyber Operations: Coding the Boundaries of Conflict. In advance of the election, Russian cybercriminals working for the Internet Research Agency created a fake news website called “Peace Data,” which featured an entirely fictitious staff of editors and writers, multiple news agencies reported.
“Their profile pictures were deepfakes generated by artificial intelligence,” Jasper told Coffee or Die Magazine. “The fake personas contacted real journalists to write contentious stories that might divide Democratic voters.”
A Soviet doctrine called “deep battle” supported front-line military operations with clandestine actions meant to spread chaos and confusion within the enemy’s territory. Similarly, modern Russia has turned to cyberattacks, social media, and weaponized propaganda to weaken its adversaries from within. According to an August State Department report, Russia uses its “disinformation and propaganda ecosystem” to exploit “information as a weapon.”
“[Russia] invests massively in its propaganda channels, its intelligence services and its proxies to conduct malicious cyber activity to support their disinformation efforts, and it leverages outlets that masquerade as news sites or research institutions to spread these false and misleading narratives,” wrote the authors of the State Department report, Pillars of Russia’s Disinformation and Propaganda Ecosystem.
Some experts contend that the cyber domain has become the proverbial “soft underbelly” of America’s democracy. In the past, America’s journalistic institutions served as gatekeepers, shielding the American people from foreign disinformation or propaganda. However, due to the advent of social media and the internet, America’s adversaries now enjoy direct access into American citizens’ minds. Consequently, the ability to manufacture video content indistinguishable from reality is an exponential force multiplier for adversaries intent on manipulating the American people.
The emerging deepfake threat spurred the Senate in 2019 to pass a bill mandating that the Department of Homeland Security provide lawmakers an annual report on advancements in “digital content forgery technology,” which might pose a threat to national security.
According to the Deepfake Report Act of 2019: “Digital content forgery is the use of emerging technologies, including artificial intelligence and machine learning techniques, to fabricate or manipulate audio, visual, or text content with the intent to mislead.”
The advancement of deepfake technology has been meteoric. Just a couple of years ago, the casual observer would have been able to rather easily tell the difference between genuine humans and their computer-generated, deepfake doppelgangers. Not anymore. Much like the advent of nuclear weapons, the Pandora’s box of deepfake technology has officially been opened and is now impossible to un-invent.
The potential dangers of this technological leap are practically boundless.
Criminals could conceivably concoct videos that offer an alibi at the time of their alleged crimes. Countries could fabricate videos of false flag military aggressions as a means to justify starting a war. Foreign adversaries could generate fake videos of police brutality, or of racially charged acts of violence, as a means to further divide American society.
“I think it’s a safe assumption that video manipulation is a key short-term weapon in the arsenal of less reputable political-military organizations needing to shape some opinions before the contents can be disputed,” Gregory Ness, a Silicon Valley cybersecurity expert, told Coffee or Die Magazine.
There are certain commercially available artificial intelligence, or AI, tools already available to detect deepfake videos with a fidelity surpassing that of the human observer. Microsoft, for example, has already developed an AI algorithm for detecting deepfakes.
Some cybersecurity experts are calling on social media platforms to integrate these deepfake detection algorithms on their sites to alert users to phony videos. For his part, Geers, the Atlantic Council senior fellow, was skeptical that social media companies would step up on their own initiative and police for deepfake content.
“Social media profits from our negativity, vulnerability, and stupidity,” Geers said. “Why would they stop?”
The overarching intent of disinformation campaigns — particularly those prosecuted by Moscow — is not always to dupe Americans into believing a false reality. Rather, the real goal may be to challenge their belief in the existence of any objective truths. In short: The more distrustful Americans become of the media, the more likely they are to believe information based on its emotional resonance with their preconceived biases. The end goal is chaos, not brainwashing.
“If we are unable to detect fake videos, we may soon be forced to distrust everything we see and hear, critics warn,” the cybersecurity news site CSO reported. “The internet now mediates every aspect of our lives, and an inability to trust anything we see could lead to an ‘end of truth.’ This threatens not only faith in our political system, but, over the longer term, our faith in what is shared objective reality.”
Some experts say the US government should get involved, perhaps by leveraging the power of the Department of Defense, to patrol the cyber domain for deepfake videos being spread by foreign adversaries. The Pentagon, for its part, has already been called in to defend America’s elections against online disinformation.
In the wake of Russia’s attack on the 2016 presidential election, the Department of Defense partially shouldered the responsibility of defending against foreign attacks on America’s elections. By that measure, it’s certainly within the bounds of national security priorities for Washington to leverage the US military’s resources to root out and take down deepfake videos.
“Governments will inevitably step in, but what we really need is for democracies to step up and create innovative policies based on freedom of expression and the rule of law,” Geers said.
We live in a world more connected than ever before. Within many of our pockets is a device that can instantly share words, voice, photos, and videos with anyone else connected to the internet. That unprecedented ease of access to information has led many to accidentally share restricted, sensitive information. This is a breach of what’s known within in the military as “operations security” (OPSEC). We all know that loose lips sink ships, but despite that, it seems like lectures have been given on a near-weekly basis in the military to keep information from leaking.
As long as thought is put into what’s posted, no sensitive information is released, and what is posted won’t be used as key puzzle piece for the enemy, no one gives a sh*t.
Here’s what you can share without violating OPSEC. Of course, take all of this with a grain of salt. Take all commands from your superiors and unit’s intelligence analysts. They will always have the final say.
1. Group photos (as long as nothing sensitive is shown)
If you’re deployed to Afghanistan and you want to get a picture to remember the good times, go for it! Post it on Facebook and tag all of your bros so you can reminisce down the road.
Make sure it isn’t taken in a classified location, inside the Ops center, or anywhere else with sensitive information around. Make sure that nothing is shown that hasn’t yet been made public knowledge.
2. General information about yourself
Chances are high that you’re not doing Maverick-level work, so there’s no need to use the “If I told you, I’d have to kill you” line at the bar. If you’re a regular Joe in the formation, it’s not a secret that you’re just rearranging connexes in between the occasional patrol mission.
For the large majority of Uncle Sam’s warfighters, the only real bit of sensitive information about an individual is a social security number — but letting that slip is more of a personal security risk than a national one.
3. General locations (if it’s public knowledge troops are there)
Obviously, you should never post GPS coordinates along with times of your movements. But if someone asks where you are, you can totally reply with, “I don’t know, some sh*thole in the middle of nowhere.” People don’t really need to know, care, or sometimes understand where you’re at.
Plus, we’ve had troops in Afghanistan for almost seventeen years, so they can probably find the country on a globe, and that’s about it.
4. Mailing address (after a certain time)
If you’re out on deployment and someone back home is worried sick about you, it’s completely fine to say where you’re at after the unit allows you to post it.
Deployed mailing addresses are very distinct. The street code is usually the unit, the city and state is “APO, AE,” and the ZIP code starts with a zero. This format is the same for troops in-country, stationed overseas, and at sea. There isn’t much personal information that can be deciphered from a mailing address that can’t be found in hundreds of other ways. “Private Smith is with this unit and isn’t in America” isn’t a shocking discovery.
5. Anything already published
“I don’t know how to break this to you guys — and it’s super serious — troops have supplies somewhere in the Middle East!” See how dumb that sounds? Everyone already knows that.
Posting stuff on social media that’s already published doesn’t breach OPSEC. Why would a terrorist go through the effort to find something on your profile they can get from a quick Google search?
By lucky coincidence, two U.S. special forces operational detachments, each with approximately 13 men, were training in Nepal when the 7.8-magnitude quake hit on April 25. Both teams switched from training to actual operations. The first, training on Mt. Everest, began rendering medical aid and providing humanitarian assistance. The other, which had been training in the jungle near the capital, began coordinating medical response to the mass casualty event. Both teams are working closely with Nepalese forces.
See the full article at SOFREP.com where, in addition to the hard news, a former special forces team member gives a breakdown of what each team member would likely be responsible for in the coming days.
The MTV Music Video Awards was filled with stars that support the military. Our hosts, Marine Corps veteran Weston Scott and Air Force veteran Skye P. Marshall ran into Tito Ortiz, Kool Mo Dee, Jasmine Villegas and more.
We asked our celebrity supporters to snap to attention and give us their best salute, here’s how they fared:
In “That Which I Love Destroys Me,” a newly-released documentary that deals with the current PTSD epidemic, writer and director Ric Roman Waugh (“Felon,” “Snitch”) does exactly what he needed to do to respect the importance and delicacy of the subject matter: He gets out of the way of the story by letting the principals tell it themselves.
“My job was to let them tell their story with unflinching candor,” Waugh said at a recent screening in Los Angeles.
TWILDM follows the post-war lives of two veteran special operators. Jayson Floyd served in Afghanistan as a Sergeant in the U.S. Army’s elite 75th Ranger Regiment, and Tyler Grey was a member of Delta Force and served multiple tours in Iraq and Afghanistan.
Floyd and Grey met at a Forward Operating Base in Afghanistan in 2002, but their friendship blossomed after their complicated paths of post-active duty life joined around the methods they’d unlocked for dealing with their PTSD – mainly understanding the benefits of a supportive community of those wrestling with their own forms of post-traumatic stress.
Waugh sets the tempo of the documentary with soliloquies featuring a number of people, but mostly Floyd and Grey. Their personalities are at once different and complimentary. Floyd is Hollywood-leading-man handsome, moody and brooding, and speaks with a rapid-fire meter that forces you to listen closely to cull out the wisdom therein. Grey is more upbeat, a conversationalist who uses comedy to mute his emotional scars. He is quick with folksy metaphors that show how many times he’s told some of these stories, and he matter-of-factly relates how he sustained massive wounds to his right arm as breezily as a friend talking about a football injury.
The two warriors’ physical appearance changes throughout the documentary, which has the net effect of showing the passage of time and the range of their moods. Sometimes they’re clean-shaven; sometimes they’re bearded. Their hair length varies. The differences color the underlying chaos around the search for identity of those dealing with PTSD.
Others are featured, as well. Grey’s ex-girlfriend singularly comes to represent the toll of PTSD borne by those around the afflicted. She’s beautiful and articulate, and as she speaks from a couch with Grey seated next to her, a pathos emerges that is intense and heartbreaking. You can tell she loves him, but they’ll never be together again. Too much has been said during the darkest days. For his part, his expression evinces resignation for the beast inside of him that he is still taming, as he’ll have to for the rest of his life. The sadness in his eyes is that of a werewolf warning those who would attempt to get close to stay away lest they be torn to shreds in the dark of night.
Floyd’s brother tells of the letter Floyd wrote explaining why he couldn’t be physically present to be the best man at his wedding. As the brother reads the letter he begins to weep, which causes Floyd to weep as well. The image of the tough special operator breaking down is very powerful.
But perhaps the most powerful scene is the one featuring Grey participating in a special operations challenge in Las Vegas. He’s back in his element, wearing the gear he wore so many missions ago, a member of a team of elite warriors bonded by a clear-cut mission.
The team cleanly makes its way through a series of obstacles, but at the last one – where they must each climb a 15-foot rope to ring a bell – Grey falters. His wounded hand won’t hold him. He tries again and again, each attempt increasingly pathetic. It’s hard to watch. He finally gives up.
His teammates pat him on the back and put on the good face, but Grey is obviously crushed by his failure – something that goes against every molecule of his special operations DNA.
Grey convinces his teammates (and the camera crew, as Waugh revealed at the LA screening) to get up early the following day and try again before the event organizers tear down the obstacle course. This time Grey rings the bell. The scene captures the triumph of that day and, in a broader sense, the will to triumph over PTSD.
“Dealing with PTSD is a constant process,” Floyd said. “To do this right we had to rip the scab off and show the wound.”
“We know we’re not the worst case,” Grey added. “This is our story – just about us – and we’re putting ourselves out there not to compare but hopefully to coax people into sharing.”
Find out more about “That Which I Love Destroys Me,” including dates and places for the nationwide tour, here.
China is at it again, starting off the first 100 days of the Biden Presidency with a number of cyberattacks aimed at shaking American businesses, local governments and even those agencies with their own interests in what happens inside the Chinese government.
The latest round of Chinese attacks on American data services was one of the most advanced hacks yet, especially in terms of the measures taken to evade detection. This time, the hackers weren’t necessarily targeting the Department of Defense or critical infrastructure, they were targeting individuals with information China would consider valuable.
A hacking group called Advanced Persistent Threat 5 (or APT5) is the culprit in the latest round of attacks according to Charles Carmakal, chief technology officer of Mandiant, a division of FireEye. FireEye has routinely aided the U.S. government in its cybersecurity efforts and has detected or thwarted a number of high-profile attacks in the past decade.
“This looks like classic China-based espionage,” Carmakal told the Washington Post. “There was theft of intellectual property, project data. We suspect there was data theft that occurred that we won’t ever know about.”
Though the defense department was a target of this round of hacking, a number of other U.S. government agencies were, along with some critical defense contractors. The attacks began in June of 2020 and may even be ongoing. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), acknowledged as much in an April 2021 alert.
This time, the flaws exploited by Chinese hackers were inside of Pulse Secure virtual private network servers (VPN) that allow remote working employees to access company servers while offsite.
Hackers also got into hardware devices near the victims’ locations, and renamed their servers to mimic those of current employees. Hiding in plain sight with a common name and the accounts of persons they just hacked is what made the intrusion so difficult to detect.
FireEye has a long history of exposing high-profile hacks from state actors. In 2015, the company discovered Chinese hackers exploiting vulnerabilities in Microsoft Word and Office applications as well as Adobe Flash Player. In 2016, it discovered a vulnerability in the Android mobile operating system that allowed hackers to access text messages and phone directories.
The cybersecurity firm was also a target of hackers itself in 2020, when state-funded hackers stole the FireEye toolkit. FireEye had to then begin to fight its own software, releasting tools to make the use of its toolkit more difficult in cyberattacks.
Most importantly, FireEye detected the 2020 SolarWinds attack and reported it to the National Security Agency (NSA). The SolarWinds attack allowed hackers to breach multiple government agencies, grant themselves privileged access to their networks. This attack was allegedly conducted by hackers working for the Russian Foreign Intelligence Service, or SVR.
In response, President Biden implemented seeping sanctions on the Russian economy upon taking office. There is no word yet on retaliation against China from the Biden Administration, the White House has only commented that it was aware of the situation and was monitoring it closely.
The most recent cybersecurity breach by APT5 is the third detected attack in 2021, all suspected to have links to China’s Communist Party. One of the previous two attacks hit 30,000 Americans in small business and local government, the other targeted tech giant Microsoft.
“He said there is going to be retribution like ISIS hasn’t seen,” said Republican Rep. Duncan Hunter Jr., a Marine Corps veteran of two tours in Iraq and one in Afghanistan, who was in the meeting with the king. “He mentioned ‘Unforgiven’ and he mentioned Clint Eastwood, and he actually quoted a part of the movie.”
Hunter would not say which part of “Unforgiven” the King quoted, but noted it was where Eastwood’s character describes how he is going to deliver his retribution. There is a scene in the picture in which Eastwood’s character, William Munny, says, “Any man I see out there, I’m gonna kill him. Any son of a bitch takes a shot at me, I’m not only going to kill him, I’m going to kill his wife and all his friends and burn his damn house down.”
Beyond airstrikes, Jordan could further contribute to the fight against ISIS through the use of its extremely effective special forces units.
The world of espionage requires two equally important things: access to information and a means of getting that information back to the other side. Modified DNA might make that a little easier.
Throughout history, spies have concocted many different means of secret communication. In the earliest days of modern spycraft, ink and paper had to be concealed from prying eyes. Spies wrote with anything that could be used as a kind of invisible ink, everything from lemon juice to semen. Hey, sometimes spycraft is just stressful.
As technology advances, using biology to enhance the ability to send covert messages is only increasing, but in a very different way.
Transmitting secret messages via radio or morse code carries risks. Israeli spy Eli Cohen ascended to a high rank in the Syrian Defense Ministry over four years by befriending important people in the Syrian government. The entire time he was transmitting information back to the Mossad through radio. He was caught red-handed during a transmission.
Being able to deliver information will always be the most secure means of communication. Over time, complex cyphers, micro-dots that can hold thousands of documents on a mark the size of a period, and dead drops of actual documents were solid means of getting that information back to handlers. Spy agencies developed incredible technology to obtain information.
A new biological means is taking that technology a step further, using specially-modified strands of DNA to imprint messages on a molecular level.
Though the process is complex for the layman (at the moment, don’t sleep on the CIA’s technological engineers) anyone looking to send a secret message can create a strand of DNA with the coded message. Only the receiver will be able to decode it, and possibly even know it’s there.
Like the microdot, the hidden DNA message can be pasted on a dot in a standard letter and simply mail it to whomever is intended to receive it.
According to the New York Times, the procedure was developed by a civilian, Dr. Carter Bancroft, professor of physiology and biophysics at New York City’s Mount Sinai Hospital.
The idea is to arrange the four nucleotides that comprise DNA into a simple encryption cypher using the letters that denote the nucleotides: A,C, G, and T, then marking them with “primer” DNA. It would be mixed with human DNA and sent off. The receiver would have the key to the cypher.
DNA manipulation can be a useful way to send messages because of the complexity of human DNA. It can be “chopped up” into 30 million different strands.
The Mount Sinai researchers then hid the DNA onto a microdot in a regular letter and mailed it through the U.S. Postal Service.
Once received, a spy agency would then use techniques common in DNA laboratories to replicate the strand containing the hidden message, so long as they know the “primer” sequence. If an intercepting agency suspects a DNA microdot but doesn’t know that sequence will have 30 million possibilities to sift through.
Until the Alan Turing of DNA cyphers is born, that is. To get the general idea of how it works, watch the video below.