Power Hour 50 Show Notes
MILDEC/OPSEC
Patel Patriot
Apr 4
NSPM - 13
There was an article published recently that the
It is my belief that NSPM-13 plays a major role in how CYBERCOM and the NSA was able to capture the election theft. You can get some background on why it is so important in
Some of the background links as to why NSPM-13 was implemented in the first place can be found here:
NSPM-13 unleashed CYBERCOM and gave them the ability to operate without the bureaucracy holding them back. By almost all objective measures, scaling back NSPM-13 would weaken our military response to cyber threats.
Why would Joe Biden supposedly be looking to do this?
In the last portion of the Power Hour we discussed Military Deception and Operations Security.
It’s important to understand that in any operation, especially one of this magnitude, there will be no leaks or disclosure from anybody involved. In fact, they will likely do everything they can to portray that nothing is happening at all. You can find the Joint Publications here:
And here is some good information relating to classified information:
Be sure to watch the show to get the full scope of our discussion on the topics. See you on Wednesday for the next Power Hour!
THE BEST IS YET TO COME
Patel Patriot
Truth Social:
https://t.me/patelpatriot
Power Hour 50 Show Notes
MILDEC/OPSEC
Patel Patriot
Apr 4
[Devolution Power Hour - Episode 50 (rumble.com)](https://rumble.com/vzfikr-devolution-power-hour-episode-50.html)
NSPM - 13
There was an article published recently that the [Biden administration is looking to scale back Trump’s NSPM-13.](https://email.mg2.substack.com/c/eJwlkcuOwyAMRb-m7IgSIGmyYDGb-Y2Ih9syEx4CZ6L8_TitbHlh6_qagzMIz1xPXXJDdpUVzwI6wdE2QITK9gZ1DV4LsYxSKMW8Vn6Yx5mFtj4qQDRh01h3YGW3W3AGQ06XQi7TfVLspb2aoJeT9Q9jJ2XFON0XYefe3N1i-mX-GJvdB0gONPxBPXMCtukXYmk3-XUT35THcXTutFCby7l0Lkdq2uAhcfKPhadWIh8kLxXa1cZgNh4hZv6WcVJEkzw_XgGBvzK9jTawoEUvRK8ohkGOqhOdGBdKkIMDOQ8LdKOC-eex-Zvq41N0bbcNjfu9jmBVp2jr40mzUjPmdCF5T4jIepnuKeC5QjJ2A_-BhR_mb3zrExJU-gu_GtTDpJZeqpnwzfcPG6I5DqO6jmJk7TOpki6k2KjUkPEfR2ycLg)
It is my belief that NSPM-13 plays a major role in how CYBERCOM and the NSA was able to capture the election theft. You can get some background on why it is so important in [Devolution Addendum - Part 4.](https://email.mg2.substack.com/c/eJxVkE1uwyAQhU8TdrbMn4MXLCpVuYaFYezQ2mDBkMi3L066aMUwLJ5m3uOzBmGJ6dB7zEjONuKxgw7wzCsgQiIlQxq904wNkjMhiNPCUSUV8XmcE8Bm_KoxFSB7mVZvDfoYzgk-9NdekLuWXCk7q4HO_SAEN2A7fpXGgAQA7q5vY1Och2BBwwPSEQOQVd8R93zhHxd2q7XXtGttyUdsc5kyGvvd2ridWr0OHnEtp31jnIPgytbU9B5ys5uEjbjwW932-SRes46xTtRDKZeiZS2TQy3g1AJXdIBWClBf8-ouotsW9s-PJB22Kc1L1fYUMYYTwkupDMb6biV4PEYIZlrBvfHgm_IL2LhAgFT_40aDmvZi6LhQFZj6pVH5SSrFGYpUaxfrVNB_CfwAUSWWtA)
Some of the background links as to why NSPM-13 was implemented in the first place can be found here:
[National Security Council: Fractured Advice, Conflicting Messages - Breaking Defense](https://email.mg2.substack.com/c/eJwlkUGO5CAMRU9T7BIFQlJkwaI3c42IYCfNNIEITI_q9uNUCcuWsOz_9ewd4ZHLy165krjTSq8LbcJ_NSIRFtEqljWAVWqZRqW1AKtBmsmIUNe9IJ4uREulobjaFoN3FHK6J8Zlfs5afFs_Ow1-GZUxYJ4gh8mAfO6wzdKA9vtH2DUImDxa_MXyyglFtN9EV32MXw_1h2Mr6H5COgB3TBV7n0_-VYOcuQySU3qLu9hV9K0EenU-t-RD7PbiPLWC0Dn4DR65kXZ2S7yvO7FWd2DlDSJYNSg1aH5SjpPuVa-mhQNH6XE0csF-0mj-7hEeejgP1de2VXL-5zYkik3nVvaDe1fJlNPN591hPCvXsyU2tmJyW0T4kKPPAd4s1wMTFj4MrI6snPUyjNowS_P8gGK0k5z0bUqwNGSeSvbiiciphEz_AcAsoB4)
[Thornberry Fears Bureaucracy Hamstrings Cyber Vs. Daesh - Breaking Defense](https://email.mg2.substack.com/c/eJwlkUtuxCAMQE8z7BKFX4YsWHTTa0R8nAxtApEhrXL7Oh1h2RLmydYjuAZrwcsepTZ2p7ldB9gMv3WD1gDZWQHnFK0Qk5ZCKRatitxow1KdFwTYXdpswxPYcfotBddSyTchp_E5KvaynrtRP6PXwwjRcG-0NGGUChYRzRLde7A7Y4IcwMIP4FUysM2-WjvqQ348xCeFR3DfKa8RFsgV-lB2uhUDH6kMd2qvgtkD4tUt4LB2_iTmDOjC1b3cXhsSX7tw0aPup3appkocS1YMQgyKDudSq170Qk8UIHkAafgEvVZgvpYtPtSwr6Kvp6_Nhe97DYY27x6XlXoHllbybeW_Q1JmqvuZU7tmyM5vEN--2lv7v8F5hQxI3xFn1ywf1TRIZcigeb71kFDNtbqXYjQ6FqKyPYjYKGEq7Q9U85xn)
[Trump Eases Cyber Ops, But Safeguards Remain: Joint Staff - Breaking Defense](https://email.mg2.substack.com/c/eJwlkcGOhCAMhp9muGkEwZEDh73sa5gKxWFWwQDuxrffOqZNm7T5058PCxWXlE-zp1LZVaZ67mgi_pUVa8XMjoJ5Cs4IoVUvpGTOSMdHNbJQJp8RNwirqflAth_zGizUkOKl6PXwHCR7GWFHzZ8ghOxgVhRaAAAfBjdoJaS_D8PhAkaLBn8xnykiW82r1r08-q-H-KacM8JPiItDj7Fga9NGU9HxkVqnqZCNbW8QCpbGnjPmJu2lmY_aFPC4HJBdafJlOTbvFCLNK3hPShaM6IToJAXnvZKtaIXSlNhzi_3INbZK4vj2q3vIbltEW46Z5PbnMsKyiduc_UK7Paea4sXlsyEsE_XtiKGeE0aYV3Q3sXqD_zCcFoyY6UPcBNXwQequlyMxHJ83IEKquJKXKUanXbqeYXZSrFRySPUfWyqcDg)
NSPM-13 unleashed CYBERCOM and gave them the ability to operate without the bureaucracy holding them back. By almost all objective measures, scaling back NSPM-13 would weaken our military response to cyber threats.
Why would Joe Biden supposedly be looking to do this?
In the last portion of the Power Hour we discussed Military Deception and Operations Security.
It’s important to understand that in any operation, especially one of this magnitude, there will be no leaks or disclosure from anybody involved. In fact, they will likely do everything they can to portray that nothing is happening at all. You can find the Joint Publications here:
[Military Deception](https://email.mg2.substack.com/c/eJwlkdtu5CAMhp9muJsonHK44KKadqVWu2rVPgBiwEnpEog47Grevk5HWD_G1i9bH9ZUWFO-qT2VSg7R9baDivC_BKgVMmkFsvZOMTZLzoQgTglHJzkRX_SSATbjg6q5AdnbNXhrqk_xcPB5GAdBPpVcLJecj_1I5TJM4BY30NmOfDbUDBO_DzbNeYgWFPyDfEsRSFCfte7lxB9O7BfG11JsF13rwDV8vqVcTSiYjQzlMdm2QaxH4eXCnl8_MHlwzh_7mKDfwTgfVyzSCz-_vGl-pvws9J_n349Pl253C_GK9Yz1Ag-lXIqOdUzOGMCpBT7RGTopYPpagjuJfltZV9q1VGP_djZtJKu4XfOyYm_PqaZ4sPnpIBqN99airzcN0VwDuDu1eof_w1GvECHjpzhtqqKDmHsuJuQ4jXdIiFVSKY6lCI52CV1R7egIKNmn-g2yz5ni)
[Operations Security](https://email.mg2.substack.com/c/eJxFkM1uhSAQhZ9GdjX8-rNg0U0X3bRJH8AgjPfSKlgYa3z7ordJw2TgcDKZk88ahFtMh15jRnK2AY8VdIA9z4AIiWwZ0uCd5rxXgktJnJaOdaojPg9TAliMnzWmDci6jbO3Bn0M54Tom7aR5K7blhuqbANyko5KpVQ_2Ykx2TDnKG0fi83mPAQLGn4gHTEAmfUdcc2VeK74S6l932tjv0NEyLWNS_l6RjT2vkDAXNRr9AErrjh9_49yafHERC2u59sK6TLyJT_AbsnjUa9uIl5zyjmV5TAmlKx5zVVfCgSzIDrWQ60kdJ_T7CpJlxuv8zbmkuHrDESSDsuYplvx1hQxhhPO5RQ2Q7mXLZRdAwQzzuAe2PBB_wI53CCc8cANBjVrZE-F7ArI7o9S4aqYkmcoUla7WKaCXsvEXFryEX8Bvq2byQ)
And here is some good information relating to classified information:
[Security Classification of Information, volume 2 (Quist), Chapter Seven (fas.org)](https://email.mg2.substack.com/c/eJwtkM1uhSAQhZ_msjTKj8qCRTd9DYMwemkRKIxtfPuOvQ2TYcjk5HA-ZxH2XC9TckN2twWvAibBT4uACJWdDeoSvOFcK8GlZN5IP8xqZqEtWwU4bIgG6wmsnGsMzmLI6VYIPU6jZE8zcKH0JCe-gpWz6zmf1lXp0WonuN2ml7E9fYDkwMA31CsnYNE8EUt7iLcHf6dqe-k227pcd3rFsFZbL5q-ztCQ0-CetixT98QjsmA4GfWSzjAIJTvecaWpQAwOxDxo6JSE-WOL_iH7Y-ddO9eG1n12Lh-smnSsddtpV2rGnO6cfxuKudB9nCngtUCyawT_IoAvkH9Mlh0SVALsF4tmGKXuhZyJyfwfmBCpQcn7U4ysfSZVMoUUkVoNGX8Bq7yK7A)
Be sure to watch the show to get the full scope of our discussion on the topics. See you on Wednesday for the next Power Hour!
THE BEST IS YET TO COME
Patel Patriot
Truth Social: @patelpatriot
https://t.me/patelpatriot
(post is archived)