In our article America Burns, Washington Plays, the failure to tend to the matters of national security were identified. Apart from failing in the role as Commander-in-Chief, from shredding military moral by his homosexual agenda to subverting intelligence gathering by actions so numerous and publicly documented by even the traitorous liberal media as to preclude listing, the real and honest question might be simply asked: “What has Obama done benefiting America to fulfill his oath of office?” or expanding the question “What have his Democrat cronies in Congress done to fulfill their oaths of office?”.
The answer to that and many other questions to past events of human success and failure are found in the valid historical record. Uncompromised and uncorrupted by human interference, imagination, or invention, historical truth provides a map to future political and economic success. The Framers met in secret for three weeks in Independence Hall to study the political history that provided the foundation for the Constitution. Along with science as they understood it in their time, truth must provide the structure and anchor to advance and elevate the human condition. Always inescapably dependent on truth, humanity has and always will move beyond reason resulting in the repetitive recurrent failures brought by following paths opened by the untruths, lies, and deceptions. Generated by arrogance, pride, and ignorance, political actions magnify the bad, the evil, the undesired, the destructive, the wasted, the diverted, the unwanted, etc. when immutable Law is transgressed.
The following is a partial list of the consequences of such political failure failing to “provide for the common defence” addressed in America Burns. It comes from the nonpublic version of the Defense Science Board report Resilient Military Systems and the Advanced Cyber Threat: Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation.
Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitationSYSTEM DESIGNSTerminal High Altitude Area DefensePatriot Advanced Capability-3Extended Area Protection and Survivability System (EAPS)F-35V-22C-17HawklinkAdvanced Harpoon Weapon Control SystemTanker ConversionsLong-term Mine Reconnaissance SystemGlobal HawkNavy antenna mechanismsGlobal Freight Management SystemMicro Air VehicleBrigade Combat Team ModernizationAegis Ballistic Missile Defense SystemUSMC Tracked Combat VehiclesWarfighter Information Network-Tactical (WIN-T)T700 Family of EnginesFull Authority Digital Engine Controller (FADEC)UH-60 Black HawkAMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)Affordable Weapons SystemLittoral Combat ShipNavy Standard Missile (SM-2,3,6)P-8A/Multi-Mission AircraftF/A and EA-18RC-135 Detect./Collect.Mk54 Light Weight TorpedoIn the above list are over two dozen major weapons systems whose designs are critical to U.S. missile defenses and combat aircraft and ships. These weapons are primary components of the Pentagon’s regional missile defense for Asia, Europe and the Persian Gulf. Included are those for the advanced Patriot missile system (PAC-3); the Army’s Terminal High Altitude Area Defense (THAAD) system for shooting down ballistic missiles; and the Navy’s Aegis ballistic-missile defense system. Vital combat aircraft and ships, including the F/A-18 fighter jet, the F-35 Joint Strike Fighter, the V-22 Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship are now compromised.TECHNOLOGIESDirected EnergyUAV video systemSpecific Emitter identificationNanotechnologyDual Use AvionicsFuse/Munitions safety and developmentElectronic Intelligence ProcessingTactical Data LinksSatellite CommunicationsElectronic WarfareAdvanced Signal Processing Technologies for RadarsNanostructured Metal Matrix Composite for Light Weight Ballistic ArmorVision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV)Space Surveillance TelescopeMaterials/processing technologiesIR Search and Track systemsElectronic Warfare systemsElectromagnetic Aircraft LaunchRail GunSide Scan sonarMode 5 IFFExport Control, ITAR, Distribution Statement B,C,D Technical InformationCAD drawings, 3D models, schematicsSoftware codeCritical technologyVendor/supply chain dataTechnical manualsPII (email addresses, SSN, credit card numbers, passwords, etc.)Attendee lists for program reviews and meetings
On 26 July, 1920, H.L. Mencken, a journalist satirist critic, also a prominent Democrat, wrote an editorial for The Baltimore Evening.
“As democracy is perfected, the office of President represents, more and more closely, the inner soul of the people. On some great and glorious day the plain folks of the land will reach their heart’s desire at last, and the White House will be occupied by a downright fool and complete narcissistic moron.”
What more can we say?