The Attack on America

The Attack on America

     In our article America Burns, Washington Plays, the failure to tend to the matters of national security were identified. Apart from failing in the role as Commander-in-Chief, from shredding military moral by his homosexual agenda to subverting intelligence gathering by actions so numerous and publicly documented by even the traitorous liberal media as to preclude listing, the real and honest question might be simply asked: “What has Obama done benefiting America to fulfill his oath of office?” or expanding the question “What have his Democrat cronies in Congress done to fulfill their oaths of office?”.
    The answer to that and many other questions to past events of human success and failure are found in the valid historical record. Uncompromised and uncorrupted by human interference, imagination, or invention, historical truth provides a map to future political and economic success. The Framers met in secret for three weeks in Independence Hall to study the political history that provided the foundation for the Constitution. Along with science as they understood it in their time, truth must provide the structure and anchor to advance and elevate the human condition. Always inescapably dependent on truth, humanity has and always will move beyond reason resulting in the repetitive recurrent failures brought by following paths opened by the untruths, lies, and deceptions. Generated by arrogance, pride, and ignorance, political actions magnify the bad, the evil, the undesired, the destructive, the wasted, the diverted, the unwanted, etc. when immutable Law is transgressed. 
    The following is a partial list of the consequences of such political failure failing to “provide for the common defence” addressed in America Burns. It comes from the nonpublic version of the Defense Science Board report Resilient Military Systems and the Advanced Cyber Threat: Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation.
Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation
Terminal High Altitude Area Defense
Patriot Advanced Capability-3
Extended Area Protection and Survivability System (EAPS)
Advanced Harpoon Weapon Control System
Tanker Conversions
Long-term Mine Reconnaissance System
Global Hawk
Navy antenna mechanisms
Global Freight Management System
Micro Air Vehicle
Brigade Combat Team Modernization
Aegis Ballistic Missile Defense System
USMC Tracked Combat Vehicles
Warfighter Information Network-Tactical (WIN-T)
T700 Family of Engines
Full Authority Digital Engine Controller (FADEC)
UH-60 Black Hawk
AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)
Affordable Weapons System
Littoral Combat Ship
Navy Standard Missile (SM-2,3,6)
P-8A/Multi-Mission Aircraft
F/A and EA-18
RC-135 Detect./Collect.
Mk54 Light Weight Torpedo
    In the above list are over two dozen major weapons systems whose designs are critical to U.S. missile defenses and combat aircraft and ships. These weapons are primary components of the Pentagon’s regional missile defense for Asia, Europe and the Persian Gulf. Included are those for the advanced Patriot missile system (PAC-3); the Army’s Terminal High Altitude Area Defense (THAAD) system for shooting down ballistic missiles; and the Navy’s Aegis ballistic-missile defense system. Vital combat aircraft and ships, including the F/A-18 fighter jet, the F-35 Joint Strike Fighter, the V-22 Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship are now compromised.
Directed Energy
UAV video system
Specific Emitter identification
Dual Use Avionics
Fuse/Munitions safety and development
Electronic Intelligence Processing
Tactical Data Links
Satellite Communications
Electronic Warfare
Advanced Signal Processing Technologies for Radars
Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor
Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV)
Space Surveillance Telescope
Materials/processing technologies
IR Search and Track systems
Electronic Warfare systems
Electromagnetic Aircraft Launch
Rail Gun
Side Scan sonar
Mode 5 IFF
Export Control, ITAR, Distribution Statement B,C,D Technical Information
CAD drawings, 3D models, schematics
Software code
Critical technology
Vendor/supply chain data
Technical manuals
PII (email addresses, SSN, credit card numbers, passwords, etc.)
Attendee lists for program reviews and meetings
   On 26 July, 1920, H.L. Mencken, a journalist satirist critic, also a prominent Democrat, wrote an editorial for The Baltimore Evening.
“As democracy is perfected, the office of President represents, more and more closely, the inner soul of the people. On some great and glorious day the plain folks of the land will reach their heart’s desire at last, and the White House will be occupied by a downright fool and complete narcissistic moron.”


      This Memorial Day, in addition to honoring those who bought and paid for our freedom, we should accept our responsibility to “secure the Blessings of Liberty . . . . to . . . . our Posterity“!

     What more can we say?