WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

Power Hour 50 Show Notes MILDEC/OPSEC Patel Patriot Apr 4

NSPM - 13 There was an article published recently that the

It is my belief that NSPM-13 plays a major role in how CYBERCOM and the NSA was able to capture the election theft. You can get some background on why it is so important in

Some of the background links as to why NSPM-13 was implemented in the first place can be found here:

NSPM-13 unleashed CYBERCOM and gave them the ability to operate without the bureaucracy holding them back. By almost all objective measures, scaling back NSPM-13 would weaken our military response to cyber threats.

Why would Joe Biden supposedly be looking to do this?

In the last portion of the Power Hour we discussed Military Deception and Operations Security.

It’s important to understand that in any operation, especially one of this magnitude, there will be no leaks or disclosure from anybody involved. In fact, they will likely do everything they can to portray that nothing is happening at all. You can find the Joint Publications here:

And here is some good information relating to classified information:

Be sure to watch the show to get the full scope of our discussion on the topics. See you on Wednesday for the next Power Hour!

THE BEST IS YET TO COME

Patel Patriot

Truth Social:

https://t.me/patelpatriot

Power Hour 50 Show Notes MILDEC/OPSEC Patel Patriot Apr 4 [Devolution Power Hour - Episode 50 (rumble.com)](https://rumble.com/vzfikr-devolution-power-hour-episode-50.html) NSPM - 13 There was an article published recently that the [Biden administration is looking to scale back Trump’s NSPM-13.](https://email.mg2.substack.com/c/eJwlkcuOwyAMRb-m7IgSIGmyYDGb-Y2Ih9syEx4CZ6L8_TitbHlh6_qagzMIz1xPXXJDdpUVzwI6wdE2QITK9gZ1DV4LsYxSKMW8Vn6Yx5mFtj4qQDRh01h3YGW3W3AGQ06XQi7TfVLspb2aoJeT9Q9jJ2XFON0XYefe3N1i-mX-GJvdB0gONPxBPXMCtukXYmk3-XUT35THcXTutFCby7l0Lkdq2uAhcfKPhadWIh8kLxXa1cZgNh4hZv6WcVJEkzw_XgGBvzK9jTawoEUvRK8ohkGOqhOdGBdKkIMDOQ8LdKOC-eex-Zvq41N0bbcNjfu9jmBVp2jr40mzUjPmdCF5T4jIepnuKeC5QjJ2A_-BhR_mb3zrExJU-gu_GtTDpJZeqpnwzfcPG6I5DqO6jmJk7TOpki6k2KjUkPEfR2ycLg) It is my belief that NSPM-13 plays a major role in how CYBERCOM and the NSA was able to capture the election theft. You can get some background on why it is so important in [Devolution Addendum - Part 4.](https://email.mg2.substack.com/c/eJxVkE1uwyAQhU8TdrbMn4MXLCpVuYaFYezQ2mDBkMi3L066aMUwLJ5m3uOzBmGJ6dB7zEjONuKxgw7wzCsgQiIlQxq904wNkjMhiNPCUSUV8XmcE8Bm_KoxFSB7mVZvDfoYzgk-9NdekLuWXCk7q4HO_SAEN2A7fpXGgAQA7q5vY1Och2BBwwPSEQOQVd8R93zhHxd2q7XXtGttyUdsc5kyGvvd2ridWr0OHnEtp31jnIPgytbU9B5ys5uEjbjwW932-SRes46xTtRDKZeiZS2TQy3g1AJXdIBWClBf8-ouotsW9s-PJB22Kc1L1fYUMYYTwkupDMb6biV4PEYIZlrBvfHgm_IL2LhAgFT_40aDmvZi6LhQFZj6pVH5SSrFGYpUaxfrVNB_CfwAUSWWtA) Some of the background links as to why NSPM-13 was implemented in the first place can be found here: [National Security Council: Fractured Advice, Conflicting Messages - Breaking Defense](https://email.mg2.substack.com/c/eJwlkUGO5CAMRU9T7BIFQlJkwaI3c42IYCfNNIEITI_q9uNUCcuWsOz_9ewd4ZHLy165krjTSq8LbcJ_NSIRFtEqljWAVWqZRqW1AKtBmsmIUNe9IJ4uREulobjaFoN3FHK6J8Zlfs5afFs_Ow1-GZUxYJ4gh8mAfO6wzdKA9vtH2DUImDxa_MXyyglFtN9EV32MXw_1h2Mr6H5COgB3TBV7n0_-VYOcuQySU3qLu9hV9K0EenU-t-RD7PbiPLWC0Dn4DR65kXZ2S7yvO7FWd2DlDSJYNSg1aH5SjpPuVa-mhQNH6XE0csF-0mj-7hEeejgP1de2VXL-5zYkik3nVvaDe1fJlNPN591hPCvXsyU2tmJyW0T4kKPPAd4s1wMTFj4MrI6snPUyjNowS_P8gGK0k5z0bUqwNGSeSvbiiciphEz_AcAsoB4) [Thornberry Fears Bureaucracy Hamstrings Cyber Vs. Daesh - Breaking Defense](https://email.mg2.substack.com/c/eJwlkUtuxCAMQE8z7BKFX4YsWHTTa0R8nAxtApEhrXL7Oh1h2RLmydYjuAZrwcsepTZ2p7ldB9gMv3WD1gDZWQHnFK0Qk5ZCKRatitxow1KdFwTYXdpswxPYcfotBddSyTchp_E5KvaynrtRP6PXwwjRcG-0NGGUChYRzRLde7A7Y4IcwMIP4FUysM2-WjvqQ348xCeFR3DfKa8RFsgV-lB2uhUDH6kMd2qvgtkD4tUt4LB2_iTmDOjC1b3cXhsSX7tw0aPup3appkocS1YMQgyKDudSq170Qk8UIHkAafgEvVZgvpYtPtSwr6Kvp6_Nhe97DYY27x6XlXoHllbybeW_Q1JmqvuZU7tmyM5vEN--2lv7v8F5hQxI3xFn1ywf1TRIZcigeb71kFDNtbqXYjQ6FqKyPYjYKGEq7Q9U85xn) [Trump Eases Cyber Ops, But Safeguards Remain: Joint Staff - Breaking Defense](https://email.mg2.substack.com/c/eJwlkcGOhCAMhp9muGkEwZEDh73sa5gKxWFWwQDuxrffOqZNm7T5058PCxWXlE-zp1LZVaZ67mgi_pUVa8XMjoJ5Cs4IoVUvpGTOSMdHNbJQJp8RNwirqflAth_zGizUkOKl6PXwHCR7GWFHzZ8ghOxgVhRaAAAfBjdoJaS_D8PhAkaLBn8xnykiW82r1r08-q-H-KacM8JPiItDj7Fga9NGU9HxkVqnqZCNbW8QCpbGnjPmJu2lmY_aFPC4HJBdafJlOTbvFCLNK3hPShaM6IToJAXnvZKtaIXSlNhzi_3INbZK4vj2q3vIbltEW46Z5PbnMsKyiduc_UK7Paea4sXlsyEsE_XtiKGeE0aYV3Q3sXqD_zCcFoyY6UPcBNXwQequlyMxHJ83IEKquJKXKUanXbqeYXZSrFRySPUfWyqcDg) NSPM-13 unleashed CYBERCOM and gave them the ability to operate without the bureaucracy holding them back. By almost all objective measures, scaling back NSPM-13 would weaken our military response to cyber threats. Why would Joe Biden supposedly be looking to do this? In the last portion of the Power Hour we discussed Military Deception and Operations Security. It’s important to understand that in any operation, especially one of this magnitude, there will be no leaks or disclosure from anybody involved. In fact, they will likely do everything they can to portray that nothing is happening at all. You can find the Joint Publications here: [Military Deception](https://email.mg2.substack.com/c/eJwlkdtu5CAMhp9muJsonHK44KKadqVWu2rVPgBiwEnpEog47Grevk5HWD_G1i9bH9ZUWFO-qT2VSg7R9baDivC_BKgVMmkFsvZOMTZLzoQgTglHJzkRX_SSATbjg6q5AdnbNXhrqk_xcPB5GAdBPpVcLJecj_1I5TJM4BY30NmOfDbUDBO_DzbNeYgWFPyDfEsRSFCfte7lxB9O7BfG11JsF13rwDV8vqVcTSiYjQzlMdm2QaxH4eXCnl8_MHlwzh_7mKDfwTgfVyzSCz-_vGl-pvws9J_n349Pl253C_GK9Yz1Ag-lXIqOdUzOGMCpBT7RGTopYPpagjuJfltZV9q1VGP_djZtJKu4XfOyYm_PqaZ4sPnpIBqN99airzcN0VwDuDu1eof_w1GvECHjpzhtqqKDmHsuJuQ4jXdIiFVSKY6lCI52CV1R7egIKNmn-g2yz5ni) [Operations Security](https://email.mg2.substack.com/c/eJxFkM1uhSAQhZ9GdjX8-rNg0U0X3bRJH8AgjPfSKlgYa3z7ordJw2TgcDKZk88ahFtMh15jRnK2AY8VdIA9z4AIiWwZ0uCd5rxXgktJnJaOdaojPg9TAliMnzWmDci6jbO3Bn0M54Tom7aR5K7blhuqbANyko5KpVQ_2Ykx2TDnKG0fi83mPAQLGn4gHTEAmfUdcc2VeK74S6l932tjv0NEyLWNS_l6RjT2vkDAXNRr9AErrjh9_49yafHERC2u59sK6TLyJT_AbsnjUa9uIl5zyjmV5TAmlKx5zVVfCgSzIDrWQ60kdJ_T7CpJlxuv8zbmkuHrDESSDsuYplvx1hQxhhPO5RQ2Q7mXLZRdAwQzzuAe2PBB_wI53CCc8cANBjVrZE-F7ArI7o9S4aqYkmcoUla7WKaCXsvEXFryEX8Bvq2byQ) And here is some good information relating to classified information: [Security Classification of Information, volume 2 (Quist), Chapter Seven (fas.org)](https://email.mg2.substack.com/c/eJwtkM1uhSAQhZ_msjTKj8qCRTd9DYMwemkRKIxtfPuOvQ2TYcjk5HA-ZxH2XC9TckN2twWvAibBT4uACJWdDeoSvOFcK8GlZN5IP8xqZqEtWwU4bIgG6wmsnGsMzmLI6VYIPU6jZE8zcKH0JCe-gpWz6zmf1lXp0WonuN2ml7E9fYDkwMA31CsnYNE8EUt7iLcHf6dqe-k227pcd3rFsFZbL5q-ztCQ0-CetixT98QjsmA4GfWSzjAIJTvecaWpQAwOxDxo6JSE-WOL_iH7Y-ddO9eG1n12Lh-smnSsddtpV2rGnO6cfxuKudB9nCngtUCyawT_IoAvkH9Mlh0SVALsF4tmGKXuhZyJyfwfmBCpQcn7U4ysfSZVMoUUkVoNGX8Bq7yK7A) Be sure to watch the show to get the full scope of our discussion on the topics. See you on Wednesday for the next Power Hour! THE BEST IS YET TO COME Patel Patriot Truth Social: @patelpatriot https://t.me/patelpatriot

(post is archived)