How the Cyber Polycrisis Mirrors COVID-19 Psyop

June 20, 2023

By James Grundvig, American Media Periscope

On Friday, June 16, the online magazine published an article explaining to its readership in the federal government’s agencies and departments that there was “no ‘systemic risk’ to government networks,” last week resulting from a spate of ransomware attacks, according to CISA.

On Saturday, scores of citizen reports began streaming into Twitter feeds and other social media platforms with video clips showing the U.S. military on the move in urban settings. The armed forces mobilized rubber-tire armored vehicles in Center City Philadelphia and V-22 Osprey aircraft transporting Marines to Laksper, California, north of the Golden Gate Bridge in San Franciso. Later, more videos captured trains moving tanks and heavy equipment across several states, tanks on the road in Idaho Falls, and squadrons of UH-60 Black Hawk and AH-64 Apache Attack helicopters flying over San Diego and other places across America.

Not to be outdone, Mexico and Canada jumped into the military transport game on Sunday, moving jeeps and heavily armored vehicles along the south and north borders of the United States. None of the military mobilizations felt like some grand exercise between the trio of North American nations.

[Credit: Anonymous patriot on Twitter marked what the armored vehicle was carrying on a highway in Missouri–rolls of razor-barbed wire to contain or keep crowds out.]

‘All Clear’ Warning from CISA

Two days before the “no systemic risk” notification cited in, the U.S. Cybersecurity Infrastructure & Security Agency (CISA) published an alert titled, “CISA and Partners Release Joint Advisory on Understanding Ransomware Threat Actors: Lockbit.”

The alert encouraged other federal agencies and departments to implement CISA and its partners’ recommendations to lower the cyber risk surface area to prevent falling victim to ransomware attacks.

The recommendations were derived from cyber forensic analysis of the 2022 “Lockbit” hack conducted by the FBI on “indicators compromise associated with Lokbit 2.0,” a Ransomware-as-a-Service (RaaS) that deployed a wide range of data breach tactics and strategies, according to the FBI Flash report.

While CISA and FBI released the comprehensive ransomware prevention guide midweek, several U.S. agencies, including the U.S. Energy Dept., came under a swarm of cyberattacks and data breaches. Mainstream news outlets, from CNN and USNews, to ABC and NBC covered the story as it unfolded.

What was odd about the Big Media blanket coverage, is how the same news outlets failed to cover any of the military mobilizations on the city streets or in the sky, which continued on Monday with additional movements of heavy tanks by trains, from Arizona to California and across other states like Texas.

Back-Channel Intel

Over the same weekend, we came to learn of the potential connection between the U.S. military movements into urban centers and the coordinated ransomware attacks last week.

In two separate videos from Dr. Jason Dean on his Telegram channel @BraveTV, he reported, according to his sources, that at least 17 U.S. cities had fallen prey to ransomware attacks, with as many as 250 cities sharing the same locked-out-of-their IT systems status worldwide.

[Credit: Dr. Jason Dean will be the expert speaker on the “Ask the Expert” segment this Thursday (6/22) night at 8:30 pm; AMP Media.]

In the United States, the federal agencies’ IT networks and systems are separated, for the most part, from cities and states. All cities run similar IT payrolls, human resources, communications, emergency response, energy services, and infrastructure management.

Dr. Jason Dean gave an update on Sunday, here:

What Jason Dean reported on Sunday startled many who followed his reporting. State actors held the ransomware cities, hostage, for two years and more. Looking back that appears to be the reality with such attacks occurring in 2021. As such, the White House followed with a briefing document on the U.S. plan to counter ransomware attacks, as well as ransomware reports from the U.S. DHS and HHS.

Dean’s intel from a CISA insider and an intel source boiled down to: The U.S. military taking over the 17 or more cities with a local or “soft” martial law to come as it swaps out targeted IT systems and installs a new parallel IT network in three waves.

Wave 1: Attacks will target 17 major cities with the military to defend;

Wave 2: The military will implement rolling server shutdowns to collapse the internet;

Wave 3: The changeover, from old to new internet infrastructure—Web 2.0 to Web 3.0 by the U.S. Space Force—will require a dark period of cellular and internet blackout. Shut down the old IT infrastructure and turn on the new satellite-based system.

During such a sensitive operation, the U.S. military, from the U.S. Marines, the U.S. National Guard, U.S. Army, U.S. Navy, and U.S. Air Force would support the mission by tamping down on looters and criminal organizations, while containing outbreaks of violence and public unrest because of food shortage or other events.

World Economic Forum’s Polycrisis

At the January 2023 Davos confab, Klaus Schwab and the World Economic Forum (WEF) planted the seed of the coming polycrisis events with the spearpoint being cyberattacks crippling the healthcare systems and a global economic shutdown. The WEF calculated the costs for the world of one day without would be $50 billion, “and that’s before considering the economic and societal damages, should these devices be linked to essential services, such as transport and healthcare.”

The WEF’s video, “A Cyberattack with COVID-like characteristics,” declared:

“The only way to stop the exponential propagation of a COVID-like cyber threat is to fully disconnect the millions of vulnerable devices from one another and from the internet… All of this in a matter of days.”

The less than two-minute video concludes that COVID-19 was a “known risk” and “So is the digital equivalent…”

Joining the WEF in planting the polycrisis seeds of fear, including UNICEF, NGOs, nonprofits, and mainstream news outlets, such as Fortune magazine.

In the world of predictive programming, Klaus Schwab and his elite minions at the World Economic Forum seized the opportunity the way Dr. Anthony Fauci hexed President Trump’s first term, two weeks before he took the oath of office in January 2017, by guaranteeing there would be a “surprise outbreak” of a coming global pandemic.

The only way Fauci could have predicted the pandemic three years before the SARS-CoV-2 virus arrived—“Fauci is No Nostradamus”—was for him to be directly involved in the Gain-of-Function web of research and sponsorship.

On a parallel path, the only way for Klaus Schwab and WEF could predict the cyber polycrisis “infecting” 250 global cities at the start of this year, was for them to have already been inside those cities’ IT networks, whether by breach or backdoor invite, such as Hillary Clinton’s open server in her Westchester County, New York, home last decade.

Think about it. The dark forces of the “Great Reset” pyramid are already inside the federal, state, and local servers in scores of countries around the world. If so, they could take down the financial systems, and emergency response, and disrupt water, food, and energy systems in densely populated urban cities.

Is this the threat that activated the militaries of the North American countries? Are we about to be invaded by a Red Dawn invasion and attack within our borders?

A Different Viewpoint

In discussing the major points of this thesis with AMP Media’s Jeffrey Prather, show host of “The Prather Brief,” he illuminated several points he discussed on June 14, “Breaking: Whistleblower Nicole Tsai and China Resistance” (Episode No. 69).

Major Prather pointed out that the U.S. military maneuvers over the past three days might be related to Bill Gates and Secretary of State Anthony Blinken’s separate visits to Beijing, China, last week to meet with CCP Chairman Xi Jinping. It’s a show of force to the CCP and PLA cross-border infiltrators to think twice about going to war with America.

In Prather’s view, Bill Gates, as the global leader of the Cabal, visited Xi Jinping to seek military assistance in defeating the Chinese communists’ sworn enemy in the United States. This point lines up well with NATO’s Jens Stoltenberg informing Ukraine that its “arsenals are empty.”

In the case of Blinken’s visit, it was to bow down and kiss the ring of Xi Jinping and apologize for the United States shooting down the Chinese spy balloon that the Biden regime allowed transiting across the United States, collecting and transmitting data every step of the way, before dropping into the Atlantic Ocean off South Carolina.

What Major Jeffrey Prather added about covert warfare is the diversionary tactics.

“Smoke grenades and destroyers deploying smoke screens are used in military warfare to confuse the enemy. The Cabal used crowds to divert attention and sow chaos in the January 6th event. This year, a cyber polycrisis could be used in the same manner,” he said.

Sow chaos. Disrupt services. Keep people in fear. This has been the global elites’ game for the past three years.

In 2020, England’s Prince Charles said, “A pandemic is a chance to reset the global economy.”

Since that’s the case, the cyber polycrisis will be the bridge to the Great Reset.

The only question that remains is: Who will oversee the new order when the ashes of the old guard settle?

Leave a Reply

Previous Story

No, This Is Not Pride | NEWS BEHIND THE NEWS June 20th, 2023

Next Story

ARE YOU PREPARED FOR WHAT’S COMING? | Counter Narrative Ep. 51

Latest from AMP JOURNAL








TUE @ 9:30PM EST

FRI @ 9:30PM EST