Possibly Chinese Co...
 
Notifications
Clear all

Possibly Chinese Connection In B52 Live Nuke Incident?

1 Posts
1 Users
0 Reactions
657 Views
Joe_J.
(@joe_j)
Posts: 2129
Illustrious Member
Topic starter
 

Interesting, but long, read. Recommended. It may or may not all be true but it gives food for thought. One thing is for sure, the incident was not an 'accident'. There are way too many safeguards for such a thing to happen.

In fact, nuclear weapons like these are carefully crated for shipment between bases, and placed inside the bomb bays or cargo compartments of transporting aircraft. In stunning contrast, this reporter has learned from two independent and highly placed sources that the six Advanced Cruise Missiles dangling from the B-52's fatigued and flexible wings were fully armed and ready to fire-except for a single fail/safe switch under the Command Pilot's control.

The quickly blacked out episode has prompted an Air Force investigation. Gates, whose official defense computer was hacked last June, necessitating the shutdown of the entire SecDef network, has ordered daily briefings on the Air Force inquiry. The Minot base commander, who might turn out to be the hero in this frightening affair, was relieved of his command.

According to Hank, at least three high-ranking officers were escorted into Minot AFB's nuclear arms bunker after passing through multiple doors secured by pass codes, whose complete sequences were supplied each officer, who only knew part of each code. One hiccup, a fumbled code sequence, or “the wrong wrench” would have cancelled the loadout instantly.

Within hours, an airplane with a wingspan longer than the Wright Brothers' first flight was safely loaded with avgas, sandwiches, and six nuclear weapons. Uploaded to the bomber using an accordion cradle on each missile trolley, each Advanced Cruise Missile was fueled once it was secured to a hard point under the aircraft's wings. Because the ACMs were not inside a bomb bay, where they could be armed in flight, each underslung missile had to be fully armed before takeoff. “Wing walker” is not a B-52 job description.

The plates connecting the firing circuits of each warhead to the cockpit were then activated, and the safeties were pulled from each clearly marked “nuclear weapon”-rendering it “live”. For the Explosive Ordnance Disposal detail who performed the loadout, there could be no doubt they were activating six nuclear weapons.

Alarms on the flight line should have sounded as soon as they sniffed hot ions leaking from the pulled pile rods in six slowly fissioning warheads. But the alarms remain silenced. That order, Hank insisted, could only have come under the properly coded signature of the National Command Authority-Commander-in-Chief G.W. Bush or Secretary of Defense, Robert Gates.

The ensuing takeoff was an event branded on the central nervous system of every creature in auditory range as eight jet engines at maximum takeoff thrust levitated six missiles, up to 46,000 gallons of fuel, and an airplane the length of a 150-foot ship into a blue yonder that had just become much wilder. Everyone within miles knew that a B-52 had come into Minot and taken off again. But only God and the devil knew where it was going.

There was only one problem regarding the originators of those orders, Hank emailed me:

“IT WAS NOT US.”

FAULTY (COMPUTER) TOWERS
Let us quickly review. My earlier exclusive on my former website, willthomas.net, disclosed how in October 2006, North Korea's leaders asked China to take out Japan's shiny new recon satellite before it could be tasked by American officers to monitor Pyongyang's first atomic test. Blowing up someone's satellite is an act of war. But overriding its “Made In China” microchips with a remote command from the ground could never be proven. Even if no solar flares were recorded at the time.

This first Chinese demo got the Pentagon's attention. After all, their stated goal of “Full Spectrum Dominance” over Earth's land, seas, airspace and electromagnetic spectrum depends on America's successful weaponization of space. But as the Joint Chiefs are only now discovering, many of the supposedly secure chips in America's civilian infrastructure-as well as all military communications, surveillance and weapons systems-have been “Wal-Marted” by U.S. corporations to low-bid Chinese suppliers-who rigged them for failure or takeover by “command override” in the event of war.

The next Chinese digital demo came last June. In what came to be called “the most successful cyber attack ever mounted on the U.S. defence department,” Chinese military hacked into a Pentagon computer network serving the defense secretary's personal office.

Like their American counterparts, the People's Liberation Army (PLA) regularly probes U.S. military networks. But American officials said these latest cyber attack caused grave concern when China demonstrated it “could disrupt U.S. defenses systems at critical times.”

“The PLA has demonstrated the ability to conduct attacks that disable our system... and the ability in a conflict situation to re-enter and disrupt on a very large scale,” revealed a former official, adding that the PLA has also penetrated the networks of U.S. arms corporations and war-launching think-tanks. [Financial Times Sept 3/07]

While White House fundamentalists remained mesmerized by the firepower ostensibly under their command, Beijing kept trying to send a very different message. Their next installment came in early September 2007, when U.S. Air Force officers passed through multiple levels of security and entered the inner computer sanctum of America's Air and Space Command deep under Cheyenne Mountain. This digital repository stores regularly updates archives needed to execute "clean reinstalls" in case air force computer systems crash or are otherwise compromised.

Entering the quietly humming room, the air force officers were shocked to see monitors aglow with light. The displays were supposed to be off. As they watched in shock and awe, randomly typed letters scrolled across a screen. The words were gibberish. But the message was heart-stoppingly clear: "We Can Play With Your Toys!"

The sender "left breadcrumbs," Hank related. The deliberately attached ISP (Internet Service Provider) pointed to China.

This was bad enough. But what really freaked out the officers was the realization that none of these "stand alone" machines was online. None of them contained a modem!

The only way to access these machines, Hank revealed, is to "use the sneaker net to walk up to it and tap on the keyboard. And yet they were interacting, and they were doing it in real time. They fussed with our stuff. These guys were able to go into what was a stand alone system and take control of it."

How did the PLA hack supposedly secure air force computers lacking network modems? Just like as select power companies can now pipe the Internet to home computers through electrical power lines, the Chinese were able to play on SAC's supposedly secure computers through the AC power cables connecting them to the national power... "grid".

But how did they break supposedly "unbreakable" military encryption?

And how were they able to transmit signals to override specific chips buried under a mountain of granite halfway around the globe? According to Hank, the International Space Station was not in line-of-sight with China when it's onboard computers and back-up systems simultaneously went down.

A former counter-terrorism expert with the CIA and the State Department shares his concern. Larry Johnson does not buy the official story that six nuclear weapons were "mistakenly" flown over the USA-not after a retired B-52 pilot reminded him. "The only time you put such weapons on a plane is when they are on alert, or if the crew has been tasked to move the weapons to a specific site." Besides running nuclear war exercises like the Global Guardian drill it ran on the morning of 9/11, Barksdale AFB deploys "heavies" to the Middle East.

Despite all the Hollywood hype, cruise missiles are notoriously inaccurate. Just ask the folks ducking strays in Kuwait or Iran. Still, a cruise missile striking within 30 miles would have taken out that Iranian power plant. But if the nuclear-tipped ACM had detonated over its pile?

"Bad. Bad. Very bad," as Hank would say. Because the resulting electromagnetic pulses from such a synergistic chain reaction would have--among other things--fried every unhardened Chinese microchip aboard every American ship, plane and vehicle in the Persian Gulf.

"You don't have to sink the CAG, just turn it off," Hank said, referring to the formidable--yet completely microchip dependent--Carrier Air Group steaming off the coast of Iran. "Once they realized that these ships were just bobbing around out there," the bad guys would have "launched 10,000 rowboats" from surrounding shorelines to go play pirates.

Was this why several Chinese Aegis destroyers were steaming in from the east about 250 nautical miles from the Straits of Hormuz? Was this why two or three Chinese submarines had been deployed to the area of the transiting destroyers the week before?

Or were the two Chinese anti-aircraft destroyers part of an elaborate fail-safe in case the demonstration glitched and the bomber could not be recalled? Even if their anti-aircraft missiles could not reach the distant plane (easily tracked through its rigged Chinese chips), specific signals sent from the ship could have turned the plane around. Or its fuel off.

http://www.willthomasonline.net/willthomasonline/Command_Override.html

http://www.willthomasonline.net/willthomasonline/Verification.html


The average kwan is of such low quality that he'd shoot himself if he had any self awareness.
-Joe from Ohio

 
Posted : 19/09/2007 7:25 pm
Share: