The Attack on America

The Attack on America

     In our article America Burns, Washington Plays, the failure to tend to the matters of national security were identified. Apart from failing in the role as Commander-in-Chief, from shredding military moral by his homosexual agenda to subverting intelligence gathering by actions so numerous and publicly documented by even the traitorous liberal media as to preclude listing, the real and honest question might be simply asked: “What has Obama done benefiting America to fulfill his oath of office?” or expanding the question “What have his Democrat cronies in Congress done to fulfill their oaths of office?”.
 
    The answer to that and many other questions to past events of human success and failure are found in the valid historical record. Uncompromised and uncorrupted by human interference, imagination, or invention, historical truth provides a map to future political and economic success. The Framers met in secret for three weeks in Independence Hall to study the political history that provided the foundation for the Constitution. Along with science as they understood it in their time, truth must provide the structure and anchor to advance and elevate the human condition. Always inescapably dependent on truth, humanity has and always will move beyond reason resulting in the repetitive recurrent failures brought by following paths opened by the untruths, lies, and deceptions. Generated by arrogance, pride, and ignorance, political actions magnify the bad, the evil, the undesired, the destructive, the wasted, the diverted, the unwanted, etc. when immutable Law is transgressed. 
 
    The following is a partial list of the consequences of such political failure failing to “provide for the common defence” addressed in America Burns. It comes from the nonpublic version of the Defense Science Board report Resilient Military Systems and the Advanced Cyber Threat: Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation.
Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation
 
SYSTEM DESIGNS
 
Terminal High Altitude Area Defense
 
Patriot Advanced Capability-3
 
Extended Area Protection and Survivability System (EAPS)
 
F-35
 
V-22
 
C-17
 
Hawklink
 
Advanced Harpoon Weapon Control System
 
Tanker Conversions
 
Long-term Mine Reconnaissance System
 
Global Hawk
 
Navy antenna mechanisms
 
Global Freight Management System
 
Micro Air Vehicle
 
Brigade Combat Team Modernization
 
Aegis Ballistic Missile Defense System
 
USMC Tracked Combat Vehicles
 
Warfighter Information Network-Tactical (WIN-T)
 
T700 Family of Engines
 
Full Authority Digital Engine Controller (FADEC)
 
UH-60 Black Hawk
 
AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)
 
Affordable Weapons System
 
Littoral Combat Ship
 
Navy Standard Missile (SM-2,3,6)
 
P-8A/Multi-Mission Aircraft
 
F/A and EA-18
 
RC-135 Detect./Collect.
 
Mk54 Light Weight Torpedo
 
    In the above list are over two dozen major weapons systems whose designs are critical to U.S. missile defenses and combat aircraft and ships. These weapons are primary components of the Pentagon’s regional missile defense for Asia, Europe and the Persian Gulf. Included are those for the advanced Patriot missile system (PAC-3); the Army’s Terminal High Altitude Area Defense (THAAD) system for shooting down ballistic missiles; and the Navy’s Aegis ballistic-missile defense system. Vital combat aircraft and ships, including the F/A-18 fighter jet, the F-35 Joint Strike Fighter, the V-22 Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship are now compromised.
 
 
TECHNOLOGIES
 
Directed Energy
 
UAV video system
 
Specific Emitter identification
 
Nanotechnology
 
Dual Use Avionics
 
Fuse/Munitions safety and development
 
Electronic Intelligence Processing
 
Tactical Data Links
 
Satellite Communications
 
Electronic Warfare
 
Advanced Signal Processing Technologies for Radars
 
Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor
 
Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV)
 
Space Surveillance Telescope
 
Materials/processing technologies
 
IR Search and Track systems
 
Electronic Warfare systems
 
Electromagnetic Aircraft Launch
 
Rail Gun
 
Side Scan sonar
 
Mode 5 IFF
 
Export Control, ITAR, Distribution Statement B,C,D Technical Information
 
CAD drawings, 3D models, schematics
 
Software code
 
Critical technology
 
Vendor/supply chain data
 
Technical manuals
 
PII (email addresses, SSN, credit card numbers, passwords, etc.)
 
Attendee lists for program reviews and meetings
 
   On 26 July, 1920, H.L. Mencken, a journalist satirist critic, also a prominent Democrat, wrote an editorial for The Baltimore Evening.
“As democracy is perfected, the office of President represents, more and more closely, the inner soul of the people. On some great and glorious day the plain folks of the land will reach their heart’s desire at last, and the White House will be occupied by a downright fool and complete narcissistic moron.”

 

      This Memorial Day, in addition to honoring those who bought and paid for our freedom, we should accept our responsibility to “secure the Blessings of Liberty . . . . to . . . . our Posterity“!

     What more can we say?

CftC