Jade Helm 15 & Cyber Guard 15 Connection

US Dept Defense Cyber News dtd 7 1 2015Jade Helm 15 & Cyber Guard 15 Connection


Jade Helm 15 military exercise is “officially” slated to start next week, July 15, 2015 through September 11, 2015.

However, on a different post, it is noted that this military exercise will be done annually according to Whistleblower Chip Tatum.

Jade Helm 15 Linked to Possible Planned Cyber Attack?

April 14, 2015, I posted an article titled “Jade Helm 15 Linked to Possible Planned Cyber Attack?” citing Cyber/IO Planner, Mia Kelly, to Jade Helm 15:

“Receiving information that the Jade Helm 15 military “exercise” has been linked to a possible planned massive cyber attack since 2014.”

Mia Kelly  Cyber/IO Planner for Exercise JADE HELM at ICE  Fayetteville, North Carolina Area Defense & Space” More… {SeashoreMary}

Cyber Guard 15:

Information is now surfacing that a military cyber exercise from theUS Cyber Command Department of Defense led by the U.S. Cyber Command titled “Cyber Guard 15”  conducted a 20 day cyber exercise between June 8-26, 2015.

“℠2015 – In its fourth year as U.S. Cyber Command’s major exercise depicting a national response to a serious cyber incident, Cyber Guard 15 drew a record number of players representing those who would be most affected by a cyber attack.” {DVIDS}

July 1, 2015 the Department of Defense posted an article confirming the Cyber Guard 15 completed cyber exercise:

Military, Federal, Private-Sector Partners Key to Cyber Guard 15

DoD News, Defense Media Activity

“WASHINGTON, July 1, 2015 – Cyberspace and critical infrastructure operators and experts from more than 100 organizations spanning government, academia, industry and the international coalition participated in the fourth annual Cyber Guard exercise, June 8-26.

U.S. Cyber Command, the U.S. Department of Homeland Security and the Federal Bureau of Investigation co-led the exercise. More than 1,000 participants — including active-duty, National Guard and Reserve units and personnel from all five military services — took part in the exercise in Suffolk, Virginia.

Participants rehearsed a whole-of-nation response to destructive cyber attacks against U.S. critical infrastructure. {source: Defense.gov}

The U.S. critical infrastructure is defined, according to their pdf Cyber Guard 15 Fact Sheet as:

“Three private industry Information Sharing and Analysis Centers, which provide their
respective CI/KR members with information for risk management and incident alert and
  • Financial Services ISAC
  • Electricity Sector ISAC
  • Multi-State ISAC

The Cyber Guard 15 exercise (aka: drill) also rolled out into three phases:

Cyber Guard 15 Phases:
  • Phase 1: State and Federal support to private, municipal, and state owned critical infrastructure/key resources executed in accordance with the National Response Framework and Defense Support to Civil Authorities.
  • Phase 2: Defense support to Federal agencies to include the Federal Aviation Administration.
  • Phase 3: Focused training and certification of DoD cyber teams and joint cyber headquarters elements.

“Under the scenario, banks are affected, oil and gas pipelines and a major commercial port in the United Kingdom are disrupted, and Defense Department information networks — across the department and across the services — are attacked,” said Coast Guard Rear Adm. Kevin E. Lunday, director of training session.”

Digital Guardian Angels:

According to the global 40 page DOD 2014 Annual Report, the DOD is referring to themselves as the “Digital Guardian Angels” from Kentucky to Korea to Kuwait.

Q.  If these cyber exercises which is now in their fourth year, is so high-tech–so “digital guardian angels,” as they are describing themselves and overflowing with multi national organizations including a force of more than 100 federal Homeland Security and FBI personnel including the Federal Aviation, United Kingdom, law enforcement and private security experts, where were they, or any of them, when the digital systems hit a “computer technical glitch” yesterday, simultaneously preventing trading stocks on Wall Street for four hours, China’s market collapsed, grounding United Airlines for the second time in two months for two hours, and Journal’s Wall Street’s Journal home page website went temporarily dark with error code 504 all in one day?

Cyber Guard Exercise Simulated Attacks On Critical Infrastructure

Beta Whistleblower:

{Received from Rose from KY} The CommonSenseShow website posted a whistle blower’s warning in part:

A Strange Phone Call From a “Crackpot”

“The caller told me he was calling me because of an article that I had recently written in which I said that I had information that the downed F-16 which crashed in Arizona, near the Mexican border, was brought down by a satellite based and localized Russian EMP weapon that was also sold to the North Koreans in 2014.

This unidentified caller proceeded to tell me, at 830AM (Eastern), that the Stock Market was going to be hit with a cyber attack in a planned beta test. He said that the Obama minions inside of the “Fast and Furious” DOJ were responsible and were planning to hasten the demise of the American economy once everything was in place (i.e. Jade Helm). The next set of attacks, he said, was going to probe the infrastructure. The conversation then returned to some technical aspects of the space based war going on, designed to destroy each other’s satellites (e.g. China, Russia and the United States). I asked him if he worked the Air Force Space Command and he hung up on me.” More…{source: CommonSenseShow}

I’m going to speculate that Phase 1, the Financial Sector, was completed yesterday and now the next phase or Phase 2 infrastructure would be the Electricity.


If anyone is interested in monitoring live cyber attacks, visit NORSE:



How does one deal with cyber attacks?  If all goes according to cyber plans, we’re all ultimately affected because at one point, our daily lives will not be as we see it today–if our electricity is cut off–then life as we know it, will be no more.

Technology is a great science when used to educate, motivate, cultivate, etc. mankind, exploring is our nature and we build our lives around what we discover.

But when the very nature of what is supposed to help mankind is turned against humanity for the sole purpose of eliminating, imprisoning, dominating or mastering the human domain and now the cyber domain, folks, we have some very sobering issues to resolve.

Don’t mistake or have someone believe that I don’t believe in national security, I do, but is this new field of mastering the cyber domain that turns against humanity really necessary?  Well then I have to question it.

Jade Helm 15 is about mastering the human domain and now we deal with Cyber Guard 15, mastering the cyber domain–the global New World Order.

Are you saved?  Do you know Jesus Christ as your Lord & Savior? Pray to the One who saves man’s soul from eternal damnation.

Stay safe. Be blessed.



“And there will be signs in the sun, in the moon, and in the stars;

and on the earth distress of nations,

with perplexity, the sea and the waves roaring;

{Luke 21:25}



31 thoughts on “Jade Helm 15 & Cyber Guard 15 Connection

  1. FYI…
    Author, Researcher Anthony Patch has posted on his Facebook page re: CERN dated June 21, 2015
    {will no longer discuss CERN issues or interviews. Was visited by Men In Black, fears for his life}

    “Hadron Collider researcher, Anthony Patch, can no longer be reached after his encounter with the infamous M.I.B. (Men in Black). He posted about his encounter on his Facebook page on June 21st and said he would no longer be dealing with the subject of the Hadron Collider or other CERN related topics! Since then, nobody can reach him and his Facebook and Youtube accounts are gone! I ask everybody to pray that Anthony Patch is safe and perhaps in hiding. The sudden disappearance of his youtube and Facebook are very concerning to me.”

    • Wow! Visited by the Men In Black! What does that tell you? It tells me that Anthony was hitting too close to the truth about CERN and the Hadron Collider. He is the one who is making the connection to the elites using CERN’s Hadron Collider to opening up the bottomless pit on Saturn! I mean c’mon, there’s a statue of Shiva outside the CERN building for Pete’s sake. Demon activity has been seen going on around this thing. I think it’s quite clear and obvious what is taking place here. Makes me wonder if Tom Horn and company will get paid a visit. Let’s keep our eyes peeled to see if other youtube channels and websites who talk about CERN suddenly disappear mysteriously.

        • Kev Baker reported on Freaky Friday about this new viral craze, Charlie, Charlie, where you summon up some demon.

          Note: Do not try this.

          What you do is draw a line up the middle of a piece of paper and then draw a line across it. It comes out to a cross, basically. You take two pencils and line them up on the axis. You are balancing the two pencils. You write yes and no in the top boxes and yes and no in the bottom boxes.

          Kev Baker was thinking that the crossing of pencils, and calling out Charlie, Charlie, which summons up a demon, is opening a portal for these demons to enter represented on a micro level. The crossing of beams at CERN, with their intent on opening portals, is represented on the macro level. He goes on to say that this is building up some low-level frequency and vibration, where enough people are doing this is building up a rhythmic type of energy. Kev Baker said that when he repeated Charlie, Charlie slowly to himself it sounded a lot like Kali, Kali. Kali is very similar to Shiva.

          Kālī (/ˈkɑːli/; Sanskrit: काली & Bengali: কালী; IPA: [kɑːliː]), also known as Kālikā (Sanskrit: कालिका), is the Hindu goddess associated with empowerment, or shakti. She is the fierce aspect of the goddess Durga (Parvati).[1] The name Kali comes from kāla, which means black, time, death, lord of death: Shiva. Since Shiva is called Kāla— the eternal time — the name of Kālī, his consort, also means “Time” or “Death” (as in “time has come”). Hence, Kāli is the Goddess of Time, Change, Power and Destruction. Although sometimes presented as dark and violent, her earliest incarnation as a figure of annihilation of evil forces still has some influence.

          If you try to do this, which I hope you do not, make sure to say, goodbye or this demon may be with you for good. http://www.veteranstruthnetwork.com/…/295-cern-end-of-days

          • If the enemy angels in their former estate happened to know where “hackable” “backdoors” are in the reality program (This current Creation), then such legerdemain might simply be the “password” or key to open….

            More generally though, much like riders waiting on a bus, I believe demons jump on those that present themselves at “known bus stops,” such as charged places, idol locations, during holidays, rituals, and invocations. Participation then is like putting a sign on one’s bottom that says “kick here” — meaning that those who want demonic powers (aka super hero powers) and demons that provide them set out to meet at definite times and places.

  2. @ Global BrainNet, 12 Monkeys, and 10 Horns…
    – Pinky and The Brain notwithstanding

    The rat brain networks often performed better than a single brain can, they report, and in the monkey experiment the brains of three individuals “collaborated” to complete a virtual reality-based task too complicated for a single one to perform.

    To build a brain network, the researchers first implant microwire electrode arrays that can record signals as well as deliver pulses of electrical stimulation to neurons in the same region in multiple rat brains. In the case of the rat experiment, they then physically linked pairs of rat brains via a “brain-to-brain interface”

  3. @ NSA (CyberCom), PsyOps, and intentionally Unspeakable Evil

    Back in early 1980s [Michael Aquino] was Commander of the 7th Psychological Group, a Colonel at the time, Colonel Paul Vallely was assigned by Army senior officers to study what the Soviets were doing about mind control, or what we now refer to as Psychological Operations. Major Aquino was a very competent, a graduate of UC Santa Barbara with a PHD. The now famous paper “From PSYOP to Mindwar: The Psychology of Victory”.

  4. http://www.npr.org/sections/thetwo-way/2015/07/09/421502905/opm-21-5-million-social-security-numbers-stolen-from-government-computers

    In addition to Social Security Numbers, quote…

    The background checks contain “some information regarding mental health and financial history“; in addition, approximately 1.1 million of the records contain fingerprints.

    Investigators believe the second intrusion lasted about seven months. Joel Brenner, a former inspector general for the National Security Agency, told NPR’s Dina Temple-Raston that’s a long time to be in the system.

    “They do have a goldmine there is no question about that in what they stole,” said Brenner, “but nobody seems to be paying any attention to what they might have left behind … Once you are in system you can not only steal things from it but you can change what is inside of it.

      • My best guess considering the NSA, Secret Service, and OPM most sensitive data hacks (penetrations / rapes)… is that the executive office and cronies are reaping the results of their own laxness.

        Take for instance focusing law enforcement on only the most severe criminals re: foreign visitors…. Q: So who gets a pass? A: Those with lifestyles likely to compromise others via addictive drugs, sex, and debt. As spies (government or corporate or criminal) are want to do.

        Put more simply — those that call evil “good” (as with the current “black is white house”) — evil will not depart from them.

        So, no mysteries here — they’ve opened up most all their “back doors.”

  5. @ Nome: You were saying something about wanting to live by the edge of the forest. Here’s something to inspire you should you have a need to do so!

    Building a primitive wattle and daub hut from scratch

    • Very encouraging, Mary!

      I really enjoyed to the “bark as roof tiles” and external chimney sections! Cold weather considered.

      Out of all the situations that arise in unending futures — I’ve no doubt I’ll have opportunity to apply (or pass on) all those methods demonstrated.

      Thanks sincerely!

  6. http://www.amazon.com/Informal-Underground-Economy-Smothers-History/dp/0292739273/

    Much has been debated about the presence of undocumented workers along the South Texas border, but these debates often overlook the more complete dimension: the region’s longstanding, undocumented economies as a whole. Borderlands commerce that evades government scrutiny can be categorized into informal economies (the unreported exchange of legal goods and services) or underground economies (criminal economic activities that, obviously, occur without government oversight). Examining long-term study, observation, and participation in the border region, with the assistance of hundreds of locally embedded informants, The Informal and Underground Economy of the South Texas Border presents unique insights into the causes and ramifications of these economic channels.

  7. Pingback: Pluto’s Twin Peaks, Near Earth Asteroid 1994 AW1 Flyby & Jade Helm 15 | Abide In Me Blog

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s