Our Privacy Policy, effective May 23, 2025, is live: manolin.us/privacy-policy

MANOLIN
HOME
ASYMMETRIC SOLUTIONS
CONTACT
MANOLIN
HOME
ASYMMETRIC SOLUTIONS
CONTACT
More
  • HOME
  • ASYMMETRIC SOLUTIONS
  • CONTACT
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • HOME
  • ASYMMETRIC SOLUTIONS
  • CONTACT

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Asymmetric solutions for the invisible war

Asymmetric solutions for the invisible warAsymmetric solutions for the invisible warAsymmetric solutions for the invisible war

Manolin Defense Intelligence

The Ephemeral Battlespace

Profound advances across the spectrum of technical intelligence collection—including but not limited to measurement and signals intelligence (SIGINT), geospatial intelligence (GEOINT), and imagery intelligence (IMINT)—intersect with the introduction of satellite-mounted directed energy weapons (DEWs) and other offensive space-based assets to eviscerate the concept of a limited battlespace.


Long gone is the age wherein national borders and geographic regions limit the bounds of intellectual and kinetic vulnerability.


This is the age of plausibly deniable invisible energy weapons, as readily employed to disrupt critical infrastructure as to manipulate the thoughts and behavior of an unsuspecting target population through frequency warfare.

INFILTRATION AND SUBVERSION AGENTS

Decades of destabilization throughout the Global South and the Middle East have catalyzed unprecedented mass migration into the West.


Amongst millions of legitimate refugees and laborers seeking better lives are subversion and infiltration agents, terrorists and intelligence professionals, dispatched from hostile state and non-state actors with the express purpose of establishing espionage operations and terrorist sleeper cells within the West, including within the continental United States (CONUS).


Tens of thousands of trained terrorists and hostile foreign intelligence service (FIS) personnel roam CONUS unmonitored and undetected.

MANOLIN

Strength and Honor

DECEITFUL INTERNATIONALISM

A seemingly innocuous bridge constructed to transport yucca through the jungles of the Global South today may be employed to support the weight of an armored convoy of combatants tomorrow.


State actors such as the People's Republic of China (PRC) are employing irregular warfare strategies to subversively erect road, bridge, and rail networks across the globe under the auspices of the facilitation of innocent commercial endeavors.


These networks—such as the Belt and Road Initiative (BRI)—represent proactive measures intended to support the logistical networks of adversarial militaries in anticipation of kinetic conflict.

THREAT VECTORS

Counter-terrorism

COUNTER-INTELLIGENCE

TRANSNATIONAL CRIME

Read Reports

TRANSNATIONAL CRIME

COUNTER-INTELLIGENCE

TRANSNATIONAL CRIME

Read Reports

COUNTER-INTELLIGENCE

COUNTER-INTELLIGENCE

COUNTER-INTELLIGENCE

Read Reports

"...we are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence—on infiltration instead of invasion, on subversion instead of elections...on guerrillas by night instead of armies by day." -John F. Kennedy

  • LEGAL DISCLAIMER
  • PRIVACY POLICY

MANOLIN DEFENSE, LLC — UNITED STATES

EPHESIANS 5:11

Copyright © 2025 Manolin Defense, LLC - All Rights Reserved.

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept