Grok Image

In an increasingly interconnected world, unmanned aerial vehicles (UAVs) have reshaped global industries, from healthcare to agriculture. However, these advancements bring unparalleled risks when foreign adversaries like China exploit UAV technology for espionage and infiltration. This concern is not new; it is a modern iteration of a pattern we pioneered during the Balkan wars of the 1990s, where drone technology played a pivotal role in reshaping conflict dynamics. Drawing from historical precedents and detailed analysis, I authored a white paper 15 months ago that underscored these risks. I sent it to President Trump at Mar-a-Lago (Maybe that was intercepted along with my Education Reform one). The paper warned of vulnerabilities in modern drone systems, referencing data we collected during the Serbian war, and stressed the urgent need to secure the U.S. against similar tactics employed by adversarial nations.

The UN WFP had the head of their AG division, a CCP guy who handed out “free” drones globally from China, which means that all those nations have been compromised by way of a “logic bomb.” It’s pretty much Stuxnet, a sophisticated cyberweapon designed to target and disable specific industrial systems. Imagine how many critical infrastructures have been compromised with the interface software required by these “AG” drones where China can disable power grids, water systems can be poisoned, and more with a single push of a button or command.

Lessons from the Balkan Wars: The Strategic Role of UAVs

During the conflicts in the former Yugoslavia, drones became a cornerstone of intelligence operations. The United States deployed drones to monitor troop movements and political and critical infrastructure in Serbia, Croatia, and Bosnia. These UAVs, stationed in “mountain hangars” within Albania, were equipped with advanced reconnaissance technology that allowed us to observe and infiltrate the digital systems of opposing governments. Through the drone software, we gained access to Croatian, Serbian, and Bosnian government networks, collecting critical intelligence that shaped U.S. and NATO strategies.

This success was not accidental. It was facilitated by the integration of sophisticated data-collection systems into drone software. These systems allowed us to tap into the Balkan states’ communication networks, databases, and military infrastructures. After all, the plan was to fracture them, and genocide was the byproduct. The intelligence gathered helped the U.S. guide military and diplomatic efforts in our favor. However, the operation also revealed how such tools could be weaponized to influence sovereign governments and control narratives. It was a testing ground. In some sick way, it was almost as if the war was triggered to see how effective such tools are, like the target practice Obama had with civilians in Northern Africa to kill innocent civilians while testing facial recognition and “gait identifying technology”.

Interestingly, during this period, the late Joe Biden, then-Senator Joe Biden, played a role in influencing U.S. policy in the region. While championing humanitarian intervention, Biden’s actions were to provide cover and facilitate some operational outcomes. In an unusual twist of diplomacy, Serbia later named a highway after the Bidens, maybe for his efforts to destroy them. This honor raised questions about the underlying motivations and outcomes of his engagement in the region.

The Modern Parallel: Biotech Drones and Foreign Exploitation

Fast-forward to today, the risks posed by drone technology have been magnified. Foreign adversaries, particularly China, have identified drones as a gateway for surveillance and infiltration. For example, Chinese firms like DJI embed themselves into critical sectors through partnerships with Canadian companies or direct engagement with U.S. industries. In biotech, drones are now used for life-saving applications like organ delivery, pioneered by companies such as United Therapeutics Corporation.

The same systems that facilitate innovation also create vulnerabilities that adversaries can exploit. ~Tore Maras

Drawing from the Balkan precedent, modern drones designed for benign purposes can be equipped with data-collection systems that extend their functionality into espionage. For example:

Software vulnerabilities

Chinese drones are frequently outfitted with proprietary software to retrieve, store, and send information back to government-controlled servers. That provides a direct channel for collecting sensitive U.S. information.

Commercial Off-the-Shelf (COTS) Components

Most drones have COTS components, which are often not scrutinized, either. They may also have back doors that enable access to U.S. networks.

The Problem That President Trump Needs to Address

Many essential agencies, such as the Department of Health and Human Services, USDA, and forestry services, lack the expertise or directive to review UAV security. This widespread unregulated status for drones operating within these sectors makes adversaries capable of infiltrating the inner blinds of crucial infrastructures without standing out.

The Risks of Chinese Partnerships

The white paper I authored highlighted how Chinese UAVs could serve as Trojan horses. China can effectively mask its involvement by embedding COTS components and leveraging partnerships with Canadian and Mexican firms. Canadian companies or Canadian-based U.S. subsidiaries could rebrand Chinese drones, taking advantage of trade agreements like the USMCA to enter the U.S. market under the guise of North American products. These drones, deployed in healthcare, agriculture, and other critical sectors, could be happening, and I will demonstrate that further.

This concern is especially pertinent in government-operated systems. Drones integrating with federal and state databases, whether for public health, agriculture, or disaster response, allow adversaries to access sensitive information.

For example, drones managing organ transport could interact with hospital networks and government health databases, creating a backdoor for foreign entities to infiltrate U.S. systems. The collected data could be used for strategic manipulation, economic espionage, or coercion. (more on this further on in Expose section of this piece).

The Highway in Serbia and Senator Biden’s Role

Reflecting on the Balkan wars, the peculiar story of Joe Biden’s highway in Serbia offers insight into the complexities of U.S. foreign policy. During the conflict, Biden was a vocal advocate for U.S. intervention, influencing the administration’s approach to the region. The Biden highway symbolized gratitude for his efforts to push for NATO involvement and support for the Kosovar Albanians. However, the move highlighted how diplomacy and influence intertwine with strategic intelligence operations.

Hunter Biden emails. www.toresays.com

Considering the late Joe Biden pardoned his son for crimes committed between January 1, 2014, and the present, it becomes evident that this operation predates those events and serves as a stark example of how corrupt politicians not only manipulate nations and relationships but also exploit them for financial gain and influence. A striking illustration of this is the exchange of Chinese hostages on Thanksgiving Day, framed as a diplomatic victory to shift public perception. The narrative suggested the swap was motivated by the individuals being exchanged rather than acknowledging that the Chinese spy in custody was, in fact, the child of a high-ranking CCP official. This carefully orchestrated maneuver highlights the lengths political figures may go to serve their personal and geopolitical agendas, all while shaping public opinion to mask the true motives behind their actions.

Regardless, these connections underscore a broader pattern of how U.S. actions abroad, especially those involving emerging technologies like drones, leave long-lasting impressions and consequences. The success of drone intelligence in the Balkans was not just a tactical victory but a demonstration of how UAVs can be used to reshape geopolitical landscapes—a lesson that adversaries like China have been applying globally and are now applying against the U.S.

Conclusion and Recommendations

The use of drone technology in critical sectors represents a double-edged sword. While the innovation potential is vast, the vulnerabilities are equally significant. Drawing from historical precedents like the Balkan wars and current gaps in U.S. drone regulation, it is clear that the integration of foreign-manufactured UAVs into essential services poses an existential risk to national security.

To mitigate these threats, the U.S. must:

  1. Implement stricter oversight and interagency coordination, ensuring intelligence and defense agencies vet all drones used in government or critical sectors. A Drone Czar is necessary.
  2. Prohibit the use of foreign-manufactured drones. Many US-based companies use US-based technology and software – especially in sensitive operations, particularly those with known vulnerabilities or ties to adversarial nations. The USA relies on ISRAEL DRONE TECH way too much.
  3. Invest in domestic drone technology to reduce dependency on foreign systems and foster innovation within secure parameters and aid with their R&D specified for our nation’s needs.

As the Balkan wars demonstrated, drones are not merely tools but strategic assets capable of reshaping power dynamics.The lessons learned then must guide our approach today to safeguard against foreign exploitation and ensure that drone technology serves U.S. interests without compromising its security. We can also adjudicate the CRIMES Obama committed with unauthorized drone strikes in Northern Africa – please reference part of my whistleblower attempts below:

What Needs to Happen

While banning DJI drones is a direct prohibition in the United States, subsidiaries of US companies in Mexico and Canada are a segue for their drones, and tech and software repackaged are not.

The employment of drone technology in non-sensitive and sensitive sectors is a double-edged sword. As much as the innovation potential is endless, risks are also infinite.

In a meeting back in 2013 when Northern Africa was being pillaged, I said to President Barack Obama’s WMD staff, “ In an age of UAVs and urban warfare, it could be all of us,” when addressing the usage of drones with his staff, hoping to give them pause or reflection.

Except, wait a minute. How could they be all of us? Well, foreign-manufactured UAVs are being integrated into essential services, which is an existential threat to U.S. national security. How do we know this? Well, take examples of Balkan wars and the legislatures, both state and federal, that are clueless and the lack of U.S. drone regulation after the 2001 terrorist attacks. Most think AI-like CHAT GPT interfaces are new or emerging technology, but they have existed since the late 80’s.

We need to introduce tighter controls and interagency coordination to ensure that all drones operating in any state of federal government agency or sensitive sectors are vetted by intelligence and defense agencies.

Ban foreign-made drones from being used in sensitive operations, especially those with known weaknesses or associations with hostile nations, and in finality, ban all foreign drones as a whole.

Disallow “US” companies like Alphabet Inc’s drone company WING from providing drones or collaborating with foreign nations or foreign or subsidiary companies offshore for tech.

Using and establishing US drone technology reduces dependence on foreign systems and drives innovation continuously and safely.

As the Balkan wars proved, drones are not just tools but strategic assets that can reshape power dynamics. The lessons of that moment must inform our response today to promote U.S. interests in the new technology while defending against foreign exploitation and protecting the security of the drone itself.

After all, Wing (ALPHABET’S drone company) has partnered with EDGE and Walmart to collect data. How? By giving Walmart FREE DRONES in exchange for images of your face, your voice, your IMEI numbers, and your backyard, among all things in their path as they cruise over your home to deliver 3-D printed meat and veggies and watered-down US milk, we buy back (after we sell it) from Canada. State LEGISLATORS need to get to work to PROTECT the PII of their state residents, and the HOUSE needs to get to work better.

My suggestion: Let’s start with ANTI-TRUST. Walmart-Google and Microsoft DATA aggregation partnership with drones is KEY>

With just one click, the LYE in the WATER TREATMENT plants can increase, killing millions in minutes. The Ventilators at the hospitals can pop the lungs, and the power in your states can be out for days, to name a few remedial activities such as unprotected ports of entry can provide.

_________________________________________________________________

EXPOSE BONUS

Unither Bioelectronics, a subsidiary of United Therapeutics Corporation, is working on using autonomous drone technology to deliver organs. The company reached another important milestone in September 2021 when it successfully flew donor lungs by drone between the Toronto Western Hospital and Toronto General Hospital. It was the first time that lung transplantation had received a drone delivery.

For this groundbreaking mission, Unither Bioelectronics employed a DJI M600 Pro drone—a trusted workhorse in the industry. Due to the delicate nature of the cargo, the drone was modified by removing its landing gear and payload rack so that it could carry a specially designed lung transport box.

Who is United Therapeutics Corporation?

United Therapeutics Corporation is a biotechnology company focused on developing unique products to address the medical needs of patients with chronic and life-threatening conditions. Founded in 1996 by Martine Rothblatt, the company is co-headquartered in Silver Spring, Maryland, and Research Triangle Park, North Carolina.

United Therapeutics is known for treating pulmonary arterial hypertension (PAH) and developing technologies to expand the availability of transplantable organs. They have gained FDA approval for several medicines and continuously conduct clinical trials. The company is also the first publicly traded biotech or pharmaceutical company to become a public benefit corporation (PBC), aiming to provide superior financial performance while benefiting patients and communities.

While pursuing financial gains, PBCs are legally obligated to consider the interests of all stakeholders, including employees, customers, the community, and the environment, in addition to shareholders. This obligation differentiates PBCs from traditional corporations, which prioritize maximizing shareholder value.

In summary, the PBC model combines the financial flexibility of a for-profit corporation with the ethical accountability of a mission-driven organization. This hybrid approach enables PBCs to generate profits, attract investment, and pursue sustainable dividends while remaining committed to their stated public benefit.

United Therapeutics Corporation, through drones of its Canadian subsidiary company, Unither Bioelectronics, seeks to make organ delivery faster and more dependable, benefiting people awaiting transplants. Unither Bioelectronics is helping develop electrified, optionally piloted, powered-lift aircraft that can perform vertical takeoffs and landings at hospitals. These advances are part of a larger plan to create a fleet of autonomous aircraft that can quickly transport an infinite number of manufactured transplantable organs, thus solving the dire shortage of donor organs.

URGENCY : 31 DECEMBER 2024

The Obama holdovers since 2016 are pushing regulations to get through before President Trump takes office to allow unfettered drone data collection since States have not passed laws to protect their citizens from data collection, and the “banning” of Chinese drones has only hindered some activity. United Therapeutics is only one of many COMPANIES that utilized seasoned subsidiaries out of Canada or Mexico, exploiting the USMCA to penetrate our borders, collect data, and infiltrate systems without any pushback for indirect access.

Unither Bioelectronics has successfully partnered with this US pioneer in HELO tech ,possibly indirectly providing Chinese softwar.e

This report was based on my 45-page white paper titled:

“China and Avionics | A parsimonious approach for combating the invisible enemy”

In the modern realm of avionics, where technology drives innovation and dominance in the skies, infiltration has replaced invasion as the weapon of choice. This makes espionage a silent but formidable threat that demands unwavering vigilance and decisive action.

If you like my work, you can tip or support me via TIP ME or subscribe to me on Subscribestar! You can also follow and subscribe to me on Rumble and Locals or subscribe to my Substack. I am 100% people-funded.

Leave a Reply

Sign Up for Our Newsletters

Subscribe to newsletters to get latest posts in your email.