Poor Man Survival
Self Reliance tools for independent minded people…
A Digest of Urban Survival Resources
A tiny Chinese microchip may have infiltrated numerous American governmental and military systems…
A number of issues ago I mentioned how during the Obama presidency Chinese hackers grabbed federal employment databases and stole thousands of supposedly secure files including those of of us who once held Top Secret Security Clearances. The Chinese employ two fulltime divisions of hackers and universities who do nothing but steal tech and other secrets from the US and other nations.
What the Chinese couldn’t steal from Boeing, Bill Clinton was kind enough to give them. Make no mistake, the ultimate goal of the Chinese is to overtake the United States as the premier power on the planet. Russia is their junior partner. Their financial interests in Africa , the South China Sea and elsewhere overshadow ours & Europe. Their merchant fleets are massive compared to ours and Great Britain…the previous administration let our military preparedness against China slide especially in terms of cyber warfare.
Yet, the Democrats only concern themselves with the file from a discredited ex-MI6 agent that the DNC paid for and Mueller appears to have no end in sight to his hunt with the Left urging him onto find some kind of collusion between Trump and the Russians. Good luck with this endless diversion…as a pinhead on twitter told me “I want to know.”
No one with a brain was ever coerced by the Russians into voting for Trump.
China Hacks America-And Few Seem to Care
It isn’t hard to imagine a time in the near future when great numbers of Americans take to the streets. Maybe the trigger would be another divisive presidential election, with half the nation refusing to accept four more years of an administration they loathe. Maybe the trigger would be impeachment hearings or a particularly controversial decision by “Brett Kavanaugh’s Supreme Court,” such as restricting abortion.
Whatever the spark, it isn’t hard to imagine America’s intensifying domestic tensions exploding into mass riots.
Imagine how such a scenario might play out, with some “help” from outside adversaries: Governors call in the National Guard to support local law enforcement. Other military units are deployed to hundreds of cities. But law enforcement and military units are also ideologically divided, and unable to unite against the chaos. After weeks of carnage, few employees are willing to risk leaving their families for work, so businesses stop operating. Food supply chains begin breaking down. In cities, scarcity and looting become rampant.
Global markets take their worst plunges in decades, but the leaders of China and Russia look on eagerly. They quietly activate armies of hackers. Legions of operatives set to work exploiting vulnerabilities secretly planted in U.S. computer systems years earlier and locating new weak spots.
Within hours, the U.S. military suffers a global failure of communications satellites operating with Ka band frequencies. The sudden silence makes clear that the satellites have been hacked and compromised, but authorities can’t identify the origin of the assault. The Pentagon scrambles to reroute communication lines, with limited success.
Meanwhile, a dozen West Coast cities simultaneously go dark. The electric power grid has been hacked and fed poisoned code, taking numerous power stations suddenly offline. Adjoining stations shift into overdrive attempting to carry the extra burden. They fail, and secondary outages roll down from Washington to Arizona. Blackouts and brownouts begin spreading inland.
Nationwide, domestic turmoil is intensifying. City grocery stores have stood empty for weeks, and rampant hunger fuels unspeakable violence.
The Pentagon calls U.S. naval groups and submarines in to help contain the domestic chaos. Suffering from serious communications and weapons-system hacks, they fail to receive Washington’s message. Meanwhile, a fleet of American F-35s crash into the South China Sea after their vaunted Distributed Aperture Systems are hacked, leaving the pilots flying utterly blind.
America is imploding from within and under debilitating cyberattack from without. It is suddenly vulnerable to invasion.
This may sound like a far-fetched, dystopian science-fiction plot. But recent reports and trends show that such a scenario could soon become reality. And Bible prophecy reveals that America is headed for such a future.
China’s ‘Big Hack’
Bloomberg Businessweek published a bombshell report on Oct. 4, 2018, claiming that microchips the size of a grain of rice have been secretly planted on numerous server motherboards made by the hardware manufacturer Super Micro Computer Inc.
According to the report, the chips were secretly inserted at factories operated by manufacturing subcontractors in China, by operatives with direct links to the Chinese military. Bloomberg said U.S. investigators “concluded that this intricate scheme was the work of a People’s Liberation Army unit specializing in hardware attacks.”
Around 30 U.S. companies have used Supermicro’s products, including Apple and Amazon. The Department of Homeland Security, both houses of Congress and nasa have also used their chips. And the alleged hack also has alarming implications for the U.S. military. The compromised hardware, Bloomberg said, “could be found in Department of Defense data centers, the cia’s drone operations, and the onboard networks of Navy warships.”
The chips were placed on the motherboards in locations that would allow attackers to remotely “alter how the device functioned, line by line, however they wanted, leaving no one the wiser,” Bloomberg wrote. “Deviously small changes could create disastrous effects.”
The report said: “This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.”
Apple, Amazon, Supermicro, Homeland Security and others disputed the Bloomberg report, and the Chinese government denied the allegations. But even if this particular report remains unconfirmed, it is not the only time firms with suspected links to the Chinese government have come under scrutiny by the U.S. for similar activities. In May 2018, the Pentagon said no phones built by Chinese manufacturers zte and Huawei can be used on U.S. military bases. And there are ongoing congressional investigations into Facebook and Google regarding their data-sharing with Huawei. In all these scenarios, the concern is America’s national security.
On October 5, John Bolton, who leads the U.S. National Security Council, declined to confirm the hack alleged in the Bloomberg report, but he addressed the broader cyberthreat posed by China. “I don’t want to address anything that might touch on specific intelligence questions,” he told reporters. “But I will say the Chinese efforts to threaten us in cyberspace and across the information technology spectrum are a very high priority for us.”
Some experts say that since the U.S. is so dependent on computer technologies with supply chains linked to China, such threats are something America must learn to live with. “I think we’ve already kind of passed the point where we can, for national security, just insource everything,” Katie Moussouris, ceo of Luta Security, told npr on October 6. “I think we’ve passed that point at least 30 years ago.”
America’s Achilles’ Heel
Consider these statements delivered by Senate Majority Whip John Cornyn, a Republican from Texas, at a Jan. 18, 2018, congressional hearing: “It’s not just that China poses a threat,” he said, “it’s that the kind of threat is unlike anything the U.S. has ever before faced.” China has “weaponized” its investments in America “in order to vacuum up U.S. industrial capabilities from American companies,” he said. China’s goal, he added, is “to turn our own technology and know-how against us in an effort to erase our national security advantage.”
In recent years, the Chinese have repeatedly engaged in acts of industrial espionage, often targeting assets that America has spent billions to develop. Theft and other more subtle, underhanded tactics have allowed China to procure U.S. software and military secrets that have long given the U.S. a battlefield edge, including the blueprints for the U.S.’s top-of-the-line F-35 fighter jets. “Again and again,” Politico wrote on May 22, “high-tech products and military equipment have popped up in China that bear a too-striking resemblance to their American counterparts.”
Minority Leader Chuck Schumer, a New York Democrat, discussed the endemic problem on the Senate floor last year, saying, “China continues to steal our family jewels, the things that have made America great: the intellectual property, the know-how in the highest-end industries. It makes no sense.”
In ordinary circumstances, Schumer would be correct in saying this ongoing nation-threatening thievery of the U.S.’s most prized knowledge and assets “makes no sense.”
China’s ongoing espionage, hacking and theft of American intellectual property will equip it with the knowledge needed to spearhead this historic besiegement against the English-speaking countries.
If China has infiltrated numerous American governmental and military systems with the Supermicro chips, or even if the nation is able to keep stealing the U.S.’s vital security assets, it is or will be in position to implement a siege.
The bad news unfolding around the world today makes the powerful case, though most do not realize it, that the world needs a different type of government. It shows that the governments of West and East are failing. The bad news shows that we need a drastically more aware form of government.
China’s cyber assaults on U.S. computers and in its theft of American security secrets are a real danger that are ignored by our media who act more like bloodthirsty wolves in their pursuit of trying to hang the President.
Yours for a more secure future,
Bruce ‘the Poor Man!’
Contributors and subscribers enable the Poor Man Survivor to post 150+ free essays annually. It is for this reason they are Heroes and Heroines of New Media. Without your financial support, the free content would disappear for the simple reason that I cannot keep body and soul together on my meager book sales & ecommerce alone.
'The Goal Is to Automate Us': Welcome to the Age of Surveillance Capitalism
The FBI Says It Can Neither Confirm Or Deny Social Media Monitoring Programs
Who Owns Your Face? Social Media Mobs Raise New Privacy Concerns
The FBI Says It Can Neither Confirm Or Deny Social Media Monitoring Programs
Who Owns Your Face? Social Media Mobs Raise New Privacy Concerns
5 Steps for Millennials to Pay Off Student Loans (FOX Business)
The nations’ student loan debt has ballooned to over $1.5 trillion, the highest in U.S. history, while late fees and calls from lenders have sadly become the new normal. With the weight of student loans carried by people in their twenties and thirties, long-term debt is now delaying life’s major milestones for many millennials.
It has become clear that Trump is not the “savior” that the liberty movement was hoping for, but many people will continue to defend him all the same because of a specific factor: The increasingly deranged political left.
Consider the endless absurdity of Russiagate; a conspiracy theory with absolutely no evidence to back it. It never seems to die despite all logic and reason, but the motives behind it are not what conservatives assume. Russiagate is a drug, a drug for leftists. They love it, they need it, it dulls the pain of their loss in 2016 and it confirms their biases. They didn't “fail” in 2016, the election was “stolen” from them by Trump and his Russian handlers. Therefore, they are now justified in any level of insanity they display in their activism and opposition. They believe they are righteous.
Three weeks from now the government shutdown fight is set to return. The mainstream media has been avidly reporting that the uncertainty is over, but this is a preposterous conclusion. What the nation faces now is even greater confusion with as the shutdown fight prepares to accelerate in February or a national emergency is declared, or both. My concern is that this is leading to conservative support for extreme measures.
What would a national emergency entail? Simply building a border wall? Building a border wall using the military? What about martial law on the border?
It seems to me that the fight between left and right is being driven beyond the information wars and beyond activism into a realm that could include actual civil war. If the current trend continues, I see no other outcome. But as always, we must ask who benefits the most from this?
While the left has gone off the deep end into cartoonland and must be stopped.
As I shared in 2016 [and was confirmed again by Sen. Lindsay Graham on the evening news last night] this nonsensical file by a disgraced MI6 agent, paid for by the DNC/Hillary Clinton and its magical reach to find “collusion” between Trump and Russia has succeeded in finding some bad players associated with his campaign and by some wishful thinking among Dems made all of us vote for Trump at the polls and somehow tainted the election. Like sharks circling for blood they hold out hope Mueller’s team will find something that will enable them to lynch Pres. Trump…
Finally, grab an emergency power cell!
Having the Patriot Power Cell on-hand for emergencies keeps your essential electronics up and running in case you need to call for help.
“The Cell is a workhorse of power — it’ll charge your phone soup to nuts 3 to 8 times… I think of the Patriot Power Cell as “everyday prepared.” Awesome for travel or avoiding inconveniences while saving your bacon in an outage. It’s a MUST HAVE for your survival lineup."
10,000 mAh Battery/Water Resistant/2 LED Flashlight/1.5 Watt Solar Panel/6-Hour Charge Time
How to Survive the War on the Middle Class
14 of the best reports I’ve assembled on protecting your freedom-Download link.
Social Chaos Survival Guide: Savvy Precautions To Make You Self-Reliant
A Smoking Frog Feature, Shallow Planet Production