Hacking our Freedom – By Unplugging the Power Grid | Columnists


In 2009, When President Obama called for a “smart grid“” he was not just referring to the vast network of electrical transmission lines that crisscross our nation. While Obama spoke about integrating all power sources, including solar, wind, nuclear, and hydro, into one coordinated system that would seamlessly connect the US power grid into a Goliath that we could easily manage using advanced information technology via the web, he was preparing us for something greater than efficiencies of scale through the use of smart meters. Obama, now known by many as the ‘Puppet Master,’ was planning something greater, something much larger than internet control of the American Power Grid.

As General Thomas McInerney warned just four years earlier in 2005, China began a cyber and biowarfare policy directed against the United States. McInerney accused President Obama of constructing ‘The Swan‘’ which meant corrupting the justice system, the intelligence community, and various government agencies to accomplish a covert overthrow of our Constitution. Finally, and most significantly, McInerney noted secret collaboration with China – i.e., Fauci’s funding of the Wuhan bioweapon, COVID-19.

Obama appointed Melissa Hathaway as Senior Director of Cyber Security in January 2009. However, by August, she had tendered her resignation due to her inability to get her recommended protections implemented. Hathaway’s credentials as a top US intelligence official and former adviser to President Bush were impeccable. Although she attempted to downplay her resignation for personal reasons, her later outspoken criticism of the smart grid is revealing.

Hathaway became highly critical and vocal of Obama’s ‘smart grid’ idea and has disparaged it as “a dangerously dumb idea.”

The only problem with that description is that Barack Obama is anything but dumb. If one did not know better, one might conclude it was intentional. 

How a smart grid can be hacked is similar to the methods of attacking other items controlled by the internet. In another article in Scientific American, Thomas Campbell and Peter Haynes provide real-world examples. The first in 2010 occurred when the Stuxnet…

Source…