To give you an idea of the range of a 1.4 megaton nuclear explosion initiated Electro-Magnetic Pulse (EMP) pulse
in 1962 during Operation Starfish, at a proper altitude:
on July 9, 1962, the United States Navy exploded a 1.4 megaton nuke over Johnson Island that took out a British, a U.S. Naval, and an AT&T satellite (all rarities in orbit at the time), with an effective range of secondary interference at a distance of 9,000 miles (i.e., Argentina in relation to Johnson Island). The length of the secondary EMP radio interference was about one year. The explosion was not a perfect circular pulse, but an oblong after the pattern of the photograph available at the link above...to which Hawaii was on the narrow of the oblong, some 750 miles away, experiencing blackouts and blown transformers as a consequence of that high altitude nuclear detonation experiment.
You can just imagine what a 14 to 20 megaton nuclear warhead could strategically do to an entire computer technology dependent culture as we have stupidly become today, especially as when many of the standard paper filing and manual backup capabilities once present in this nation have been functionally removed in the name of “progress” and instead have made us nationally more vulnerable and helpless both individually and as a functional society on purpose. Yet, when lead is the most effective element against EMP, and the illegal Obama administration through "nudging" abusively with its out of control Environmental Protection Agency "nudged" it out of business,
exactly what are we supposed to as a nation or on a state or smaller government or even on an individual level to do to protect electronic infrastructure and integrity? Nothing, except be made helpless as if you were plunged instantly into a stone age where nothing works if it isn't manually or somehow animal operated. Nothing. Lead is also a necessary component in many batteries, and needed to remain until a crossover technology is fully in place, but that doesn't stop those in illegal control of the Federal Government to dictate ways we must become dependant to the dictates of foreign powers and subservient to them by being unable to produce anything for ourselves anymore. As an Indonesian by maternal birth and childhood rearing, and a Kenyan by paternity, Obama - Soetoro and his co-conspirators never seem to tire in their zeal to destroy and suicide America and American exceptionalism.
Obama and his co-conspirators have one of two choices. 1) Help foreign powers strip and neutralize Americans and turn them into neo-feudal slaves and serfs. 2) Strip America of its nuclear capacity to defend itself, give U.S. technologies to its most dire adversaries, and give them ever opportunity and encouragement to nuke and utterly destroy the United States.
Obama is simultaneously following a both of the above policy, and it seems as everyone is too aghast that it is too incredulous to believe, and refuse to believe it until after it is by then only a 20/20 hindsight that like some dope addict or alcoholic who sobers up, as if a congenital idiot, mutters "Who knew? It was impossible to have known. Except.... Oh duh, why didn't I see it for what it was?" No kidding. What survivors are left will probably claim "no one could have known" because they like the Scarecrow in the Wizard of Oz will be singing "If I only had a brain?"
But in order to destroy American exceptionalism entirely, they of and those conspiring with the Traitors of the Obama Administration have to destroy vast quantities of stored historical information, and then rewrite the history as it never was, so that idiots in the present generation sorely desire to believe lies tinged with hatred of whites and Christians and U.S. patriots of all types, and future generations not having access to the truth would believe the big lie even were books and evidences presented to them because they have been dumbed down (autisticized) through over vaccinations, as well as be subject to chronic public school and media and various propaganda mind alteration techniques used to rape or hypnotize or strip their minds in one way or another.
One popular science magazine
“In 1989, a solar storm took down the power grid in Quebec, Canada, leaving about six million people without power for several hours. The largest solar storm ever recorded was in 1859 when communications infrastructure was limited to telegraphs. The 1859 solar storm hit telegraph offices around the world and caused a giant aurora visible as far south as the Caribbean Islands.”
On August 14, 2003, the Northeast of the United States, and parts of Eastern Canada were hit by a computer initiated blackout. http://www.scientificamerican.com/article.cfm?id=2003-blackout-five-years-later
A comprehensive study and report was made on that August 14, 2003 black-out, and the specified problem then was Computer vulnerabilities.
On Page 11 of the pdf., you will notice the map showing the 140 main power points within the 10 regions of Utility Operations in the lower 48 United States as of 2003.
FirstEnergy (FE) consists of seven electric utility operating companies, and the report will generally concern itself with Ohio Edison, Toledo Edison, The Illuminating Company, and Penn Power when referring to “FE” in this report.
EMS: An energy management system is a computer control system used by electric utility dispatchers to monitor the real time performance of various elements of an electric system and to control generation and transmission facilities.
SCADA: Supervisory Control and Data Acquisition system; a system of remote control and telemetry used to monitor and control the electric system.
FE’s Computer Failures:
14:14 EDT to 15:59 EDT
Overview of This Phase
Starting around 14:14 EDT, FE’s control room operators lost the alarm function that provided audible and visual indications when a significant piece of equipment changed from an acceptable to a problematic condition. Shortly thereafter, the EMS system lost a number of its remote control consoles. Next it lost the primary server computer that was hosting the alarm function, and then the backup server such that all functions that were being supported on these servers were stopped at
14:54 EDT. However, for over an hour no one in FE’s control room grasped that their computer systems were not operating properly, even though FE’s Information Technology support staff knew of the problems and were working to solve them, and the absence of alarms and other symptoms offered many clues to the operators of the EMS system’s impaired state. Thus, without a functioning EMS or the knowledge that it had failed, FE’s system operators remained unaware that their electrical system condition was beginning to
degrade. Unknowingly, they used the outdated system condition information they did have to discount information from others about growing system problems.
Key Events in This Phase
2A) 14:14 EDT: FE alarm and logging software failed. Neither FE’s control room operators nor FE’s IT EMS support personnel were aware of the alarm failure.
2B) 14:20 EDT: Several FE remote EMS consoles failed. FE’s Information Technology (IT) engineer was computer auto-paged.
2C) 14:27:16 EDT: Star-South Canton 345-kV transmission line tripped and successfully reclosed.
2D) 14:32 EDT: AEP called FE control room about AEP indication of Star-South Canton 345-kV line trip and reclosure. FE had no alarm or log of this line trip.
2E) 14:41 EDT: The primary FE control system server hosting the alarm function failed. Its applications and functions were passed over to a backup computer. FE’s IT engineer was auto-paged.
2F) 14:54 EDT: The FE back-up computer failed and all functions that were running on it stopped. FE’s IT engineer was auto-paged.
Failure of FE’s Alarm System FE’s computer SCADA alarm and logging software failed sometime shortly after 14:14 EDT (the last time that a valid alarm came in), after voltages had begun deteriorating but well before any of FE’s lines began to contact trees and trip out. After that time, the FE control room consoles did not receive any further alarms, nor were there any alarms being printed or posted on the EMS’s alarm logging facilities.
Power system operators rely heavily on audible and on-screen alarms, plus alarm logs, to reveal any significant changes in their system’s conditions. After 14:14 EDT on August 14, FE’s operators were working under a significant handicap without these tools. However, they were in further jeopardy because they did not know that they were operating without alarms, so that they did not realize that system conditions were changing.
Alarms are a critical function of an EMS, and EMS-generated alarms are the fundamental means by which system operators identify events on the power system that need their attention. Without alarms, events indicating one or more significant system changes can occur but remain undetected by the operator. If an EMS’s alarms are absent, but operators are aware of the situation and the remainder of the EMS’s functions are intact, the operators can potentially continue to use the EMS to monitor and exercise control of their power system.
In such circumstances, the operators would have to do so via repetitive, continuous manual scanning of numerous data and status points located within the multitude of individual displays available within their EMS. Further, it would be difficult for the operator to identify quickly the most relevant of the many screens available.
In the same way that an alarm system can inform operators about the failure of key grid facilities, it
can also be set up to alarm them if the alarm system itself fails to perform properly. FE’s EMS did not have such a notification system.
During the years of 2002 - 2005, it was already known that 61% of the Utilities Computerized system problems were EXTERNALLY caused, presumably hackers as well as inclement weather which includes high winds and lightning strikes, and that number of externally caused incidents was increasing with each year.
As technology grows, so does the off-site access to SCADA (Supervisory Control And Data Acquisition) because they are designing its control that way to save on labor as a means of excuse of increased efficiency. Unfortunately, there is a higher associated cost of new technology transfer and repair, decreased direct access human oversight security that is relegated over to computer software being correctly programmed to sound off its bells and whistles alarms; and with this decreased oversight efficiency for computer high tech stream-lining people out of jobs, engaging in the known risk of enabling the ability of hackers to access SCADA (Supervisory Control And Data Acquisition) by mimicking a limited but now obtainable field of authorized active employee LAN logo-on accounts through too many potential and actual unsecured off-site access points into the system that are best left not named off or even hinted at.
Even with the aftermath of 9/11/2001, and the changing political environment that began shifting to a new reliance and counter-hacking activity in the growing Internet technology boom, reports even in 2002, though written in regard to nation states pursuing cyber-warfare, were still yet to be foolishly downplayed in the tone of the language used --
for example, a 2002 Center For Strategic and International Studies (CSIS) report on page 2 states that:
"A preliminary review of these factors suggests that computer network vulnerabilities are an increasingly serious business problem but that their threat to national security is overstated." http://www.steptoe.com/publications/231a.pdf
-- so that someone who is not internally motivated on the subject, might not be externally motivated to put into action what he ought to be doing for our National Security. However, in just 2 years, the mood had changed to one based more in reality as seen through a 2004 Dartmouth Institute For Security Technologies Report http://www.ists.dartmouth.edu/docs/cyberwarfare.pdf
In 2009, another major Northeast Coast power blackout occurred, this time allegedly from a bolt of lightning, http://www.cbsnews.com/2100-201_162-568422.html which could just as well be recreated another way, with much the same results, if terrorists or rogue elements within the U.S. Government loyal to Obama over any other loyalty (such as the Constitution WITH the Bill of Rights intact) have a mind to.
In 2011, we read of hackers shutting down the primary pumps at a water utilities plant here in the United States at a location just west of Springfield, Illinois on November 8 of that year: http://www.reuters.com/article/2011/11/18/us-cybersecurity-attack-idUSTRE7AH2C320111118
Soon after, a hacker just trying to make a point on U.S. vulnerability, hacked the internal computers at a waste-water treatment facility in "South Houston," Texas, and was reported to have posted a scathing one page rebuke about utility computer vulnerabilities and to have also utilized screenshots which he posted to prove their point: http://www.earthtimes.org/business/water-systems-hacked-illinois-texas/1644/
On July 6, 2012, the illegal to be in power Obama Administration ensured a preliminary (allegedly Continental United States) Internet kill-switch and black-out communications technologies and capabilities put into place.
In February 2013, the citizens of the United States were nationally made aware that the Chinese Government has most of an entire building that its Government operates as a hacking base in Shanghai.
In the China Daily News, some 6 months after the event, they too did a story and had watched the video of the United States "Aurora Generator Test". Of interest is a quote near the end of the China Daily News article of a Security Expert who states:
"What keeps your lights on are some very, very old technology," said Joe Weiss, a security expert who has testified before Congress about such threats. "If you can get access to these systems, you can conceptually cause them to do whatever it is you want them to do."
The alternative Media and alert American Patriots already know that the illegal Obama Administration committed yet another of its long line of acts of TREASON (and in this case, open violations which could charge those like Obama and those who authorized such data transfer and sharing to foreign governments with espionage) when it shared the electro-magnetic vulnerabilities of the United States first with Russian military troops on U.S. soil (in Colorado) in 2012, and then with Chinese Army Troops on U.S. soil (in Hawaii) in November 2013
by inviting the foreign adversarial or enemy forces of the Chinese Army to observe first-hand a top secret operation of a simulated nuclear explosion designed to destroy the U.S. Utility and Communications grids over the Continental U.S., even though the Chinese Army have specifically and PUBLICLY gone on record in the past several years that they wish to soon use this very tactic to destroy the United States by an inferred sneak attack upon us.
Are we so soon to forget and forgive an unforgivable usurper traitorous scumbag as Obama? We should never do either act because to forget and forgive is utterly irresponsible.
Are we so soon to forget and forgive an unforgivable usurper traitorous scumbag as Obama? We should never do either act because to forget and forgive is utterly irresponsible.
Western Journalism writes:
The Communist People’s Republic of China was invited take part in a massive drill dubbed GridExII that took place on November 12-14, 2013. The drill simulated the detonation of a massive nuclear warhead high above the skies of the United States, creating a giant EMP—Electro Magnetic Pulse—that took out the U.S. electrical grid,communications,banking services,and all computers,simulating a helpless America completely dependent on its all-wise government.
According to declassified (but heavily redacted) intelligence documents released in 2011,the Chinese were reportedly working on a “Super Electromagnet Pulse Bomb.”
And no doubt the Chinese have perfected this EMP bomb by now.
So exactly why the Chinese are involved in a drill of this nature is unclear. The only logical explanation,as crazy as it sounds,is that the Department of Homeland Security—Obama’s “Civilian National Security Force” (the entity overseeing this drill)—is secretly working with the Communist Chinese government!
Which is not surprising,given that Barack Hussein Obama has long been suspected of being an ardent Marxist.
The exercise in which the Chinese participated was preceded by another exercise 2 months earlier in September 2013,
in which a search and rescue mission simulation was conducted by U.S. Advisers aboard a Chinese Missile destroyer. The Chinese Army published the ff. two captions and the two ff. photos below affirming that pre-Grid II exercise in Hawaii.
U.S. observers ... aboard Chinese navy's missile destroyer Qingdao near Hawaii, the United States, Sept. 9, 2013. Four naval ships, including Chinese navy's missile destroyer Qingdao, missile frigate Linyi and USS Lake Erie, and three helicopters, conducted a joint search-and-rescue exercise near Hawaii.... (Xinhua/Zha Chunming)
The picture shows a scene of the China-U.S. joint maritime search-and-rescue exercise. (Chinamil.com.cn/ Chen Guoquan and Zhang Gang)
Under the Constitution, its contemporaneous language demands the understanding of the Founders and later those who drafted and debated the 14th Amendment, that the child have a United States Citizen Father at birth, be born on U.S. Soil, and have sole or singular nationality to the United States.
The Congressional Globe, 1st session, May 30, 1866 (see Mr. Trumbull, page 2893):
"The provision is, "that all persons born in the United States, and subject to the jurisdiction thereof, are citizens." That means "subject to the complete jurisdiction thereof"... What do we mean by "subject to the jurisdiction of the United States"? Not owing alliance to anybody else. That is what it means.
It cannot be said of any...who owes allegiance, partial allegiance if you please, to some other Government [at birth] that he is "subject to the jurisdiction of the United States."
McPherson v. Blacker, 146 U.S. 1 (1892) @27
“The framers of the Constitution employed words in their natural sense; and, where they are plain and clear, resort to collateral aids to interpretation is unnecessary, and cannot be indulged in to narrow or enlarge the text; but where there is ambiguity or doubt, or where two views may well be entertained, contemporaneous
[existing, occurring, or originating during the same time period]
and subsequent practical construction is entitled to the greatest weight. Certainly plaintiffs in error cannot reasonably assert that the clause of the Constitution under consideration so plainly sustains their position as to entitle them to object that contemporaneous history
[that history existing, occurring, or originating during the same time period]
and practical construction are not to be allowed their legitimate force, and, conceding that their argument inspires a doubt sufficient to justify resort to the aids of interpretation thus afforded, we are of opinion that such doubt is thereby resolved against them, the contemporaneous practical exposition of the Constitution being too strong and obstinate to be shaken or controlled. Stuart v. Laird, 1 Cranch 299, 5 U. S. 309.” (1803)
One U.S. Air Force Master Sergeant ex-serviceman said to me yesterday, "But then you would have the blacks burning down the country from one end to the other if you arrest Obama." My response is, "Yeah. So what? If that's what it takes to save this nation to have to go through that ... if that's what needs to happen for us to have to go through. So?"
If after a nuclear holocaust, or an EMP attack that entirely destroyed all electronics in the United States, you could have the option of legal representatives of the Federal Government of the United states justifiably arresting Obama and his chief co-conspirators of TREASON, and seeing these legally convicted by public trial and sentenced without parole or to execution (whatever a legal court decides) and the United States going through a few weeks of riots and mass national violence... or you could just accept the entire destruction of the USA as a nation where whether by EMP or direct nuclear strikes more than 100,000,000 will be guaranteed casualties and you can have that and the all the disease and never ending chaos and violence and starvation and thirst that accompanies that, believe me, you would relish the chance to say you would rather see the legal arrests and the temporary and very recoverable consequences of that upholding of the Constitution and United States Code upon those who would destroy us all and daily relish in the gradual doing so.
For now, that's my input.