Situation Update, Dec. 3rd – Trump invokes foreign interference provision of his 2018 executive order, authorizing military response to cyber warfare, see NSPM 13


Bypass censorship by sharing this link:
New
Image: Situation Update, Dec. 3rd – Trump invokes foreign interference provision of his 2018 executive order, authorizing military response to cyber warfare, see NSPM 13

(Natural News) Ask yourself this question: What was the purpose of yesterday’s White House speech about election fraud and vote rigging?

If you think it was all about Trump communicating to the people, think again. This speech was really about Trump communicating with Chris Miller and the DoD about foreign interference in the U.S. election while laying out the key national security justifications that are necessary to invoke what I’m calling the “national security option” for defending the United States against an attempted cyber warfare coup.

In this article, I present details from 10 USC, Section 394. Subtitle A, Part 1, Chapter 19, “Authorities concerning military cyber operations” as well as National Security Presidential Memoranda (NSPM) #13, covering “offensive cyber operations.” See below.

In today’s Situation Update (Dec. 3rd), I lay out all the details of how Trump just invoked the legal framework — and national security provisions — necessary to allow the Secretary of Defense (Chris Miller) to activate military processes that lead to a tactical takedown of domestic enemies and active traitors.

Here’s the full podcast for Dec. 3rd. Tomorrow’s podcast (Dec. 4th) will provide even more details on the NSPM and other efforts put in place by Trump’s DOD intelligence team to trap the Democrats in acts of treason and warfare against America.

Brighteon.com/85eb594a-046e-48b7-989d-25a1d868ba67

Decoding President Trump’s Dec. 2nd speech

Consider what Trump said in yesterday’s speech. You can watch the full speech here, but if you don’t know what to listen for, you’ll miss all the important language. About 95% of this speech was filler. Only 5% really matters, as I detail below:

First, he lays out that he has a sworn oath to defend the United States Constitution against the wartime “siege” that’s under way:

As President I have no higher duty than to defend the laws and the constitution of the United States. That is why I am determined to protect our election system, which is now under coordinated assault and siege.

He then explains that the vote was criminally rigged with “fraud” (which is a crime) and that it’s now time to overturn the election results and correct them:

Millions of votes were cast illegally in the swing states alone, and if that’s the case, the results of the individual swing states must be overturned, and overturned immediately.

Then he explains that China was part of this entire plan from the very beginning, via their engineering and launching of the coronavirus, which Democrats used to justify mass mail-in ballots which were used to steal the election. This statement specifically invoked national security elements of our defense protocols:

The Democrats has this election rigged right from the beginning. They used the pandemic as an excuse to mail out tens of millions of ballots, which led to a big part of the fraud… and there is no one happier than China.

Trump then calls for a “full forensic audit,” which can obviously only take place under military authority, since the local elections officials are corrupt, fraudulent criminals. He explains this himself:

Dramatically eroding the integrity of our elections was the Democrats’ number one priority. For a simple reason: They wanted to steal the 2020 presidential election. All of the Democrat efforts to expand mail-in balloting laid the groundwork for the systematic and pervasive fraud that occurred in this election.

Then, about 30 minutes into the speech, he invokes legal language that clearly references Trump’s Sep. 12, 2018 executive order which describes remedies for foreign interference in U.S. elections. Here’s what Trump says:

The only conceivable reason why you would block commonsense measures to verify legal eligibility for voting, is you are trying to encourage, enable, solicit or carry out fraud. It is important for Americans to understand that these destructive changes to our election laws were NOT a necessary response to the pandemic. The pandemic simply gave the Democrats an excuse to do what they were trying to do with many many years.

Note carefully the phrase, “…trying to encourage, enable, solicit or carry out fraud.”

Where have we heard something very similar before? In the 2018 EO, which describes who will be subjected to having all their assets seized by the United States government — and note that this applies to corporations, individuals, partnerships and even non-profits: (emphasis added)

Sec. 2. a (ii) to have materially assisted, sponsored, or provided financial, material, or technological support for, or goods or services to or in support of, any activity described in subsection (a)(i)

Sec. 2. a (i) to have directly or indirectly engaged in, sponsored, concealed, or otherwise been complicit in foreign interference in a United States election;

Thus, Trump just invoked the 2018 EO and sent an undeniable signal to Chris Miller at the DoD (as well as many other groups) that the Democrats, the treasonous media and the complicit Big Tech giants have all engaged in concealing, advocating or supporting “foreign interference” in the U.S. election.

Treason, rendition flights and military tribunals

What is the remedy for such actions of treason against the United States?

Under existing U.S. law, it’s a felony crime to try to rig votes. Under military law during a time of war, it’s treason. And under the 2018 EO, each of the entities engaging in this behavior will have all their assets seized by the U.S. Treasury.

Translated into plain language, this means that Twitter, Facebook, CNN, the Washington Post, Google, MSNBC, etc., are all now able to be completely seized, shut down or taken over by the Trump administration, as they all engaged in the defined behaviors outlined in the 2018 EO, which Trump just cited.

Consider that as I list all the evidence that Trump’s attorneys and DoD “white hat” team members now possess, much of which will surely be presented to SCOTUS, most likely by Sidney Powell, once one of her cases reaches that level of the judicial system:

  • CIA director Gina Haspel admitting to election interference in a full confession which has now been acquired. (This is covered in the Dec. 3rd Situation Update podcast, above.)
  • Dominion executives confessing to engineering backdoors into the systems, which has also been acquired.
  • Packet analysis results from “white hats” who intercepted all the real-time vote rigging traffic, which includes the specific instructions from CIA servers to add the hundreds of thousands of votes in real time to Dominion tabulation machines in swing states. This is now publicly confirmed by Col. Phil Waldron.
  • Log files and software evidence from the seized CIA servers in Frankfurt, which provides physical and intellectual proof that the CIA inserted hundreds of thousands of votes into the Dominion tabulation machines.

All this evidence exists right now. Trump has it all. His speech lays the official groundwork that can now be cited by other officials (namely, in the DoD and Treasury, which runs the US Secret Service), in order to justify their own initiation of orders for further arrests, rendition flights and wartime activities necessary to defend the United States of America against foreign enemies who are waging cyber warfare against the United States.

10 USC 394: Authorities concerning military cyber operations

In case you’re wondering whether the U.S. military under Trump really has the authorization to respond to acts of cyber warfare with coordinated conventional military actions, read 10 USC, Section 394. Subtitle A, Part 1, Chapter 19, which is available via uscode.house.gov:

(I’m bolding the especially important sections):

§394. Authorities concerning military cyber operations
(a) In General.-The Secretary of Defense shall develop, prepare, and coordinate; make ready all armed forces for purposes of; and, when appropriately authorized to do so, conduct, military cyber activities or operations in cyberspace, including clandestine military activities or operations in cyberspace, to defend the United States and its allies, including in response to malicious cyber activity carried out against the United States or a United States person by a foreign power.

(b) Affirmation of Authority.- Congress affirms that the activities or operations referred to in subsection (a), when appropriately authorized, include the conduct of military activities or operations in cyberspace short of hostilities (as such term is used in the War Powers Resolution (Public Law 93–148; 50 U.S.C. 1541 et seq.)) or in areas in which hostilities are not occurring, including for the purpose of preparation of the environment, information operations, force protection, and deterrence of hostilities, or counterterrorism operations involving the Armed Forces of the United States.

(c) Clandestine Activities or Operations.- A clandestine military activity or operation in cyberspace shall be considered a traditional military activity for the purposes of section 503(e)(2) of the National Security Act of 1947 (50 U.S.C. 3093(e)(2)).

f) Definitions.-In this section:

(1) The term “clandestine military activity or operation in cyberspace” means a military activity or military operation carried out in cyberspace, or associated preparatory actions, authorized by the President or the Secretary that-

(A) is marked by, held in, or conducted with secrecy, where the intent is that the activity or operation will not be apparent or acknowledged publicly; and

(B) is to be carried out-

(i) as part of a military operation plan approved by the President or the Secretary in anticipation of hostilities or as directed by the President or the Secretary;

(ii) to deter, safeguard, or defend against attacks or malicious cyber activities against the United States or Department of Defense information, networks, systems, installations, facilities, or other assets; or

(iii) in support of information related capabilities.

Trump announced “offensive cyber operations” just one week after signing his Sep 12, 2018 Executive Order

As you ponder all the implications of that, note carefully that just 8 days after President Trump signed his September 12, 2018 executive order, the Trump administration announced the launch of “offensive cyber operations” against foreign enemies. This was reported by the Washington Post, which explained, “The strategy incorporates a new classified presidential directive that replaced one from the Obama administration… It allows the military and other agencies to undertake cyber operations intended to protect their systems and the nation’s critical networks.”

What would be considered “offensive cyber operations?” Kraken, of course. The 305th military intelligence battalion.

Of course, just 8 days earlier, President Trump had designated elections infrastructure as “critical infrastructure.” So now the pieces fit. The circle is complete. The election theft was cyber warfare against critical U.S. infrastructure. This authorizes all kinds of national security activities, such as using U.S. Army Special Forces units to raid the CIA server farm in Frankfurt, which took place shortly after the election.

Also in 2018, President Trump had authorized the National Security Presidential Memoranda (NSPM) #13, covering “offensive cyber operations.” Here’s a list of all the NSPMs, but notably, “offensive cyber operations” is a secret and is not publicly shown.

In fact, the Trump administration fought to keep this document hidden from Congress, given that in 2018, the House was run by Pelosi and other treasonous actors who had just pulled off the 2018 cyber attack on the U.S. elections infrastructure, stealing dozens of House seats in order to “win” a majority in the House, from which Adam Schiff could launch his impeachment scheme to try to remove Trump from power.

Trump was able to prevent the House from reading NSPM #13 for 17 months, according to Fifth Domain, which reported:

“On a bipartisan basis some of us sent a letter to the Trump administration demanding that they share with, at least some of the leadership on the Armed Services Committees, the rules of engagement for certain cyber contingencies,” Rep. Mac Thornberry, R-Texas, said at the time. “The Obama folks did give us that information, the Trump people changed it, but then they were reluctant to show us.”

What we now know is that Trump was planning the 2020 election sting / cyber warfare “trap” in 2018, and that these cyber warfare response protocols were intentionally kept from Congress for as long as possible while plans were put in place to catch the Democrats stealing the next election (the 2020 election).

I will discuss this in greater detail in tomorrow’s Situation Update (Dec. 4th), which will be posted at the HRR channel on Brighteon.com:

https://www.brighteon.com/channels/hrreport

Rest assured, what we now know with absolute certainty is that Trump, Miller, Cohen-Watnick and other key players put the cyber warfare infrastructure in place in 2018 that would allow them to unleash a domestic military response to arrest, detain and prosecute all those who were complicit in the attack on America.

The patriots, in other words, really are in charge. And they planned all this since 2018, putting in place the framework to trigger the appropriate national security resources once the Democrats took the bait and tried to steal the 2020 election.

GITMO must be getting close to full capacity at this point, with lots more detainees on their way. The mass arrests are coming. Trump is in charge, and the Dems who know what’s really happening are beyond terrified. They know they’ve been caught. Some will be charged with treason. Many will face military tribunals. A few will likely be executed after found guilty of treason.

Finally, lock and load, patriots, because Trump may still need a million armed patriots to show up in D.C. as the critical moments of all this are publicly announced. Stand by for further instructions from your Commander-In-Chief.


Receive Our Free Email Newsletter

Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.

About the author: Mike Adams (aka the “Health Ranger“) is a best selling author (#1 best selling science book on Amazon.com called “Food Forensics“), an environmental scientist, a patent holder for a cesium radioactive isotope elimination invention, a multiple award winner for outstanding journalism, a science news publisher and influential commentator on topics ranging from science and medicine to culture and politics. Follow his videos, podcasts, websites and science projects at the links below.

Mike Adams serves as the founding editor of NaturalNews.com and the lab science director of an internationally accredited (ISO 17025) analytical laboratory known as CWC Labs. There, he was awarded a Certificate of Excellence for achieving extremely high accuracy in the analysis of toxic elements in unknown water samples using ICP-MS instrumentation. Adams is also highly proficient in running liquid chromatography, ion chromatography and mass spectrometry time-of-flight analytical instrumentation. He has also achieved numerous laboratory breakthroughs in the programming of automated liquid handling robots for sample preparation and external standards prep.

The U.S. patent office has awarded Mike Adams patent NO. US 9526751 B2 for the invention of “Cesium Eliminator,” a lifesaving invention that removes up to 95% of radioactive cesium from the human digestive tract. Adams has pledged to donate full patent licensing rights to any state or national government that needs to manufacture the product to save human lives in the aftermath of a nuclear accident, disaster, act of war or act of terrorism. He has also stockpiled 10,000 kg of raw material to manufacture Cesium Eliminator in a Texas warehouse, and plans to donate the finished product to help save lives in Texas when the next nuclear event occurs. No independent scientist in the world has done more research on the removal of radioactive elements from the human digestive tract.

Adams is a person of color whose ancestors include Africans and American Indians. He is of Native American heritage, which he credits as inspiring his “Health Ranger” passion for protecting life and nature against the destruction caused by chemicals, heavy metals and other forms of pollution.

Adams is the author of the world’s first book that published ICP-MS heavy metals analysis results for foods, dietary supplements, pet food, spices and fast food. The book is entitled Food Forensics and is published by BenBella Books.

In his laboratory research, Adams has made numerous food safety breakthroughs such as revealing rice protein products imported from Asia to be contaminated with toxic heavy metals like lead, cadmium and tungsten. Adams was the first food science researcher to document high levels of tungsten in superfoods. He also discovered over 11 ppm lead in imported mangosteen powder, and led an industry-wide voluntary agreement to limit heavy metals in rice protein products.

In addition to his lab work, Adams is also the (non-paid) executive director of the non-profit Consumer Wellness Center (CWC), an organization that redirects 100% of its donations receipts to grant programs that teach children and women how to grow their own food or vastly improve their nutrition. Through the non-profit CWC, Adams also launched Nutrition Rescue, a program that donates essential vitamins to people in need. Click here to see some of the CWC success stories.

With a background in science and software technology, Adams is the original founder of the email newsletter technology company known as Arial Software. Using his technical experience combined with his love for natural health, Adams developed and deployed the content management system currently driving NaturalNews.com. He also engineered the high-level statistical algorithms that power SCIENCE.naturalnews.com, a massive research resource featuring over 10 million scientific studies.

Adams is well known for his incredibly popular consumer activism video blowing the lid on fake blueberries used throughout the food supply. He has also exposed “strange fibers” found in Chicken McNuggets, fake academic credentials of so-called health “gurus,” dangerous “detox” products imported as battery acid and sold for oral consumption, fake acai berry scams, the California raw milk raids, the vaccine research fraud revealed by industry whistleblowers and many other topics.

Adams has also helped defend the rights of home gardeners and protect the medical freedom rights of parents. Adams is widely recognized to have made a remarkable global impact on issues like GMOs, vaccines, nutrition therapies, human consciousness.

In addition to his activism, Adams is an accomplished musician who has released over fifteen popular songs covering a variety of activism topics.

Click here to read a more detailed bio on Mike Adams, the Health Ranger, at HealthRanger.com.

Find more science, news, commentary and inventions from the Health Ranger at:

Brighteon.com:
Brighteon.com/channel/hrreport

Diaspora: (uncensored social network)
Share.NaturalNews.com

GAB:
GAB.com/healthranger

Podcasts:
HealthRangerReport.com

Online store:
HealthRangerStore.com

#1 Bestselling Science Book Food Forensics:
FoodForensics.com

iTunes:
itunes.apple.com/us/podcast/the-health-ranger-report/id1063165791

SoundCloud:
Soundcloud.com/healthranger

Health Ranger’s science lab
CWClabs.com

Health Ranger bio
HealthRanger.com
TruthWiki.org

Search engine:
Webseed.com


Disqus