Don't let the lights go out in America... Get smart and take action!... Learn the facts and what to do in A Call to Action for America.

VIDEO: Critical Infrastructure Vulnerability Experts

American Center for Democracy Critical Infrastructure Vulnerability Expert Panel Discussion. Q&A session with experts in the field of Energy, EMP and Cyber/Space Warfare.

Critical infrastructure vulnerability expert speakers include:
Dr.Rachel Ehrenfeld
Ambassador R. James Woolsey
Dr. William R. Forstchen
Dr. Peter Vincent Pry
Dr. M.V. “Coyote” Smith
William B. Scott
Steven Chabinsky
Dr. John M. Templeton, Jr.
Greg Wessling
Cynthia Ayers
Eva-Jane Lark
Sid Morris
David Huges

 

Box Quote MarkACD published over 500 articles on these and related issues in their daily blog.  And they are also focused heavily on terrorist financing, on the financial picture of what’s happening with the radical Islamist movement such as the Brotherhood and Al Qaeda, Lebanon’s Hezbollah, not only in the Middle East but well beyond. Rep. Randy Weber of the 14th District of Texas, was supposed to join us today, but apparently is held up in Congress. He is the Vice Chairman of the Energy Subcommittee, is also on the House Committee on Science, Space, and Technology, and is Vice Chairman of the Subcommittee on Africa and Global Human Rights, as well as on the International Organization’s Subcommittee of the Committee of Foreign Affairs.  He has a lot of positions to which what we’re doing here today is relevant. If we should miss him today, we’ll find an opportunity to get together with him separately.

In the meantime, let me just say a very quick word about the scope of what we hope to talk about and swap some ideas with you.  First of all, as Peter Pry keeps saying — and hopefully is succeeding in restructuring the terminology to some extent — when we talk about cyber, we should include electromagnetic pulse.  It is so included by the Chinese, the Russians, the North Koreans, and the Iranians, and not because cyber and EMP are exactly the same thing, but because their functions have sort of total information warfare overlap.

Critical Infrastructure Vulnerability

More on this critical infrastructure vulnerability expert panel from American Center for Democracy.