EMP Attack May Be Undeterrable, US Air Force Suggests

https://www.centerforsecuritypolicy.org/wp-content/uploads/2018/12/AdobeStock_85824568.jpeg

 

One of the most important conclusions in a new report by the U.S. Air Force’s recently established Electromagnetic Defense Task Force (EDTF) is traditional deterrence, based on threat of retaliation, may not work against nuclear EMP attack.

EDTF’s independent analysis concurs with warnings made by the Congressional EMP Commission for 17 years. Continue reading

China Hacks America—and ‘None Goes to Battle’

https://www.thetrumpet.com/files/W1siZiIsIjIwMTgvMTIvMTEvcXB1dWFoMDNtX0ZpbmFsX0NoaW5hX2hhY2tzX0FtZXJpY2FfZmluYWwuanBnIl1d/4ec1fdb69453ca06/Final%20-%20China%20hacks%20America%20final.jpg

Gary Dorning/Trumpet

 

A tiny Chinese microchip may have infiltrated numerous American governmental and military systems, giving insight into how several specific Bible prophecies could come to pass.

It isn’t hard to imagine a time in the near future when great numbers of Americans take to the streets. Maybe the trigger would be another divisive presidential election, with half the nation refusing to accept four more years of an administration they loathe. Maybe the trigger would be impeachment hearings or a particularly controversial decision by “Brett Kavanaugh’s Supreme Court,” such as restricting abortion.

Whatever the spark, it isn’t hard to imagine America’s intensifying domestic tensions exploding into mass riots. Continue reading

Russia’s Pearl Harbor 2.0 Asymmetrical War Plans, Gulftainer, Club-K, and EMP

For further information on the Club-K system, attacks on America from within America, please see the following previous articles:

 

 

 

Translations from a Russian defense journal and from a secret Iranian military handbook suggest that Russia and Iran have developed a Pearl Harbor 2.0 plan to sink the entire U.S. Navy fleet as part of coordinated asymmetrical attacks against the United States and U.S. military bases around the world.

The plan is to launch Russian Kalibr cruise missiles from submarines, freighter ships, and Trojan Horse Club-K Container Missile System intermodal cargo “containers” that can be smuggled into U.S. ports and moved into the U.S. interior aboard trains and semi-trucks.

In 2015 the Russian journal “Natsionalnaya Oborona (translation: National Defense) outlined a plan to “hit them in their ports” with Kalibr cruise missiles that could sink entire US Navy fleets docked in ports across the United States, Europe, and the Middle East. Continue reading

FBI Chief Says Threats From Drones to U.S. ‘Steadily Escalating’

https://www.theepochtimes.com/assets/uploads/2018/10/10/2018-10-10T154629Z_1_LYNXNPEE991DJ_RTROPTP_4_USA-SECURITY.jpg

FBI Director Christopher Wray, testifies before a Senate Homeland Security and Government Affairs Committee hearing on “Threats to the Homeland” at the Dirksen Senate Office Building in Washington on Oct. 10, 2018. REUTERS/Alex Wroblewski

 

WASHINGTON—FBI director Christopher Wray told a U.S. Senate panel on Wednesday that the threat from drones “is steadily escalating” even as Congress gives agencies new tools to address threats.

Wray told the Senate Homeland Security committee that the FBI assesses that “given their retail availability, lack of verified identification requirement to procure, general ease of use, and prior use overseas, (drones) will be used to facilitate an attack in the United States against a vulnerable target, such as a mass gathering.” Continue reading

The U.S. Is “Morphing” Into The U.S.S.A. – The United States Of Soviet America

https://www.zerohedge.com/sites/default/files/inline-images/america-crumbling.jpg?itok=LTUqPjkw

 

We are experiencing an ever-increasing level of  surveillance over the citizenry, government censorship and closed-door policies, control and manipulation of the media, and a “hardline” shift of all institutions to the left. The institutions I’m referring to specifically are the educational system (better termed a system of indoctrination), the courts, the religious institutions…every one of them are all “leaning” toward (if not striving toward) full blown socialism. Let us recall a key quote:

“The goal of Socialism is Communism.” – Lenin Continue reading

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

Recognition of this urgent and grave matter is finally receiving recognition by the mainstream media. Chinese microchips have been planted within every facet of U.S. life, from the military to household PC components, as well as everyday appliances such as irons and microwaves.

Further information previously archived on Global Geopolitics can be found within the following previous posts:

The Secret Ways of Chinese Telecom Giant Huawei (2013)

Security backdoor found in China-made US military chip (2012)

 

Click for a larger animated version. (Illustrator: Scott Gelber for Bloomberg Businessweek)

 

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.

In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA. Continue reading

America Is Not Ready for Exploding Drones

https://cdn.defenseone.com/media/img/upload/2018/08/07/AP_18217006452029/defense-large.jpg

Venezolana de Television via AP

 

An apparent assassination attempt in Venezuela shows how technology is moving faster than governments can counter it.

Venezuelan President Nicolas Maduro was intoning something about economic renewal, flanked by his wife and a handful of high officials, in a country gripped by poverty, starvation, and shortages. Then, in a moment broadcast live on television that has since gone viral, his wife’s face changed. For an instant she seemed to duck as she reached for the official next to her; Maduro glanced up with apparent concern. The camera panned to the National Guardsmen in formation on the street before him as dozens suddenly started running. According to the government and witnesses, they had seen explosions in the sky. Continue reading

China, Russia, Iran Engaged in Aggressive Economic Cyber Spying

https://fb13.akamaized.net/up/2018/07/china-economic-spying.png

 

Counterintelligence report details foreign spies theft of advanced U.S. technology

Foreign spies from China, Russia, and Iran are conducting aggressive cyber operations to steal valuable U.S. technology and economic secrets, according to a U.S. counterintelligence report.

The report by the National Counterintelligence and Security Center, a DNI counterspy unit, concludes China is among the most aggressive states engaged in stealing U.S. proprietary information as part of a government-directed program. Continue reading

Signs of sophisticated cellphone spying found near White House, U.S. officials say

https://www.washingtonpost.com/resizer/Smgx_AoHZ60OBOdXQWkeCSb7RzY=/1484x0/arc-anglerfish-washpost-prod-washpost.s3.amazonaws.com/public/YMY6POTOEU3KJIP43OKRBYZH3U.jpg

Members of the Secret Service patrol from the top of the White House. (Jabin Botsford/The Washington Post)

 

A federal study found signs that surveillance devices for intercepting cellphone calls and texts were operating near the White House and other sensitive locations in the Washington area last year.

A Department of Homeland Security program discovered evidence of the surveillance devices, called IMSI catchers, as part of federal testing last year, according to a letter from DHS to Sen. Ron Wyden (D-Ore.) on May 22. The letter didn’t specify what entity operated the devices and left open the possibility that there could be alternative explanations for the suspicious cellular signals collected by the federal testing program last year. Continue reading

President Trump Keeping Promise On EMP Protection

 

President Donald Trump on Monday (December 18, 2017) in what may well be remembered as an historic speech describing his new “America First” National Security Strategy, broke new ground by promising to protect U.S. critical infrastructures from “cyber, physical, and electromagnetic attacks.”

After 8 years of the Obama Administration ignoring the existential threat posed by electromagnetic pulse (EMP), President Trump deserves the gratitude of his nation for being the first president to include EMP in his National Security Strategy.  Continue reading

Israel reportedly behind discovery of Russian antivirus company’s spy links

Computer hacking

 

Israeli spy services were reportedly behind the United States government’s recent decision to purge Kaspersky Lab antivirus software from its computers, citing possible collusion with Russian intelligence. Last month, the US Department of Homeland Security issued a directive ordering that all government computers should be free of software products designed by Kaspersky Lab. Formed in the late 1990s by Russian cybersecurity expert Eugene Kaspersky, the multinational antivirus software provider operates out of Moscow but is technically based in the United Kingdom. Its antivirus and cybersecurity products are installed on tens of millions of computers around the world, including computers belonging to government agencies in the US and elsewhere. But last month’s memorandum by the US government’s domestic security arm alarmed the cybersecurity community by alleging direct operational links between the antivirus company and the Kremlin. Continue reading

Trump chief of staff’s phone was breached for nearly a year, say sources

https://upload.wikimedia.org/wikipedia/commons/thumb/c/cb/John_Kelly_official_DHS_portrait.jpg/220px-John_Kelly_official_DHS_portrait.jpg

 

The personal cell phone of the White House Chief of Staff John Kelly (photo) was compromised by persons unknown and may have been bugged for nearly a year, according to United States government officials. General Kelly retired from the US Marine Corps in 2016, after serving as chief of the US Pentagon’s Southern Command, where he supervised American military operations in Latin America and the Caribbean. Soon afterwards, he was appointed by US President Donald Trump to lead the Department of Homeland Security, which he joined in January of 2017. Six months later, however, he replaced Reince Priebus, who resigned abruptly from the post of White House Chief of Staff, citing differences over management style with the Trump administration. Continue reading

FEMA Is Preparing For A Solar Storm That Would Take Out The Grid

 

FEMA (Federal Emergency Management Administration) is planning for a massive solar storm that would be so strong, it would take down the power grid.

Noting that the rare, yet “high-consequence” scenario has “the potential for catastrophic impact on our nation and FEMA’s ability to respond.” Continue reading

NSA and CIA is the enemy of the people

 

Astute students of history understand that government agencies often further their own interests and not the administration they are designated to serve. Seldom is the genuine national security advanced when bureaucrats pledge their loyalty to their respective fiefdoms of projecting influence and power. Absent in this supremacy struggle equation is the abstract notion that state legitimacy is founded upon the will and consent of the people. Such a quaint concept does not reflect a chapter in the training manual that breeds the spooks who operate as above the law and unaccountable super spies.

Guarding signals traffic or capturing foreign communication is a logical task to protect national secrets, while gathering information on intentions and operations from adversaries. Once upon a time the National Security Agency directed the ECHELON project as a cold war network. Over the decades the functions of electronic surveillance broadened into collection on all forms of data, no matter the source or the national origin of the subject. Continue reading

Georgia’s secretary of state: DHS tried to breach our firewall

Georgia’s secretary of state has claimed the Department of Homeland Security tried to breach his office’s firewall and has issued a letter to Homeland Security Secretary Jeh Johnson asking for an explanation.

Brian Kemp issued a letter to Johnson on Thursday after the state’s third-party cybersecurity provider detected an IP address from the agency’s Southwest D.C. office trying to penetrate the state’s firewall. According to the letter, the attempt was unsuccessful.   Continue reading