RETALIATORY STRIKE: Trump’s Tactical, Surgical-Strike Nukes Target Chinese Tech Giant Huawei

As China’s set to launch nukes of its own, Trump’s poised to retaliate or even launch a first strike, but there’s WAY MORE to this story than just trade…

You can probably blame CNBC for starting this week’s trade war “nuclear option” meme.

The MSM first went full nuclear on Monday, May 13th:

Is China selling over a trillion dollars of US treasuries a “nuclear option” for China?

I think so, yes, as part of the whole.

And what whole am I talking about?

I’m talking about a 4-pronged attack on the US dollar.

China dumping US debt is one prong in the attack, a tactical strike, if you will.

To learn about the other prongs, I’d recommend watching our live-stream from yesterday:

We offer a bunch of analysis on all of the latest developments in the trade war.

Unfortunately, the live-stream cut-out during the show, so there is a Part II that you won’t want to miss if you’ve watched Part I.

Thanks for watching.

Fast forward to the most recent developments, and now it’s the United States’ turn for unveiling its own “nuclear option”.

Again it’s the mainstream media, and this time courtesy of Bloomberg (bold and bold added for emphasis):

Trump’s Huawei Threat Is the Nuclear Option to Halt China’s Rise

The Trump administration is pulling out the big guns in its push to slow China’s rise, with potentially devastating consequences for the rest of the world.

The White House on Wednesday initiated a two-pronged assault on China: barring companies deemed a national security threat from selling to the U.S., and threatening to blacklist Huawei Technologies Co. from buying essential components. If it follows through, the move could cripple China’s largest technology company, depress the business of American chip giants from Qualcomm Inc. to Micron Technology Inc., and potentially disrupt the rollout of critical 5G wireless networks around the world.

“The Trump administration action is a grave escalation with China,” Eurasia Group analysts Paul Triolo, Michael Hirson and Jeffrey Wright wrote in a note. If fully implemented, the blacklist would “put at risk both the company itself and the networks of Huawei customers around the world, as the firm would be unable to upgrade software and conduct routine maintenance and hardware replacement.”

The threat is likely to elevate fears in Beijing that President Donald Trump’s broader goal is to contain China, leading to a protracted cold war between the world’s biggest economies. In addition to a trade fight that has rattled global markets for months, the U.S. has pressured both allies and foes to avoid using Huawei for 5G networks that will form the backbone of the modern economy.

Does this mean we’re about to see if the United States’ “2-pronged assault” is more powerful than China’s “4-pronged attack” as I have been calling it?

If it does, then the fiat currency crisis and US dollar collapse could happen much, much faster than most people realize.

And it’s not just Huawei that is the possible target of a nuclear strike from the United States.

According to Reuters, 70 affiliates have been place on a US trade blacklist.

More from Reuters:

WASHINGTON/NEW YORK (Reuters) – The U.S. Commerce Department said on Wednesday it is adding Huawei Technologies Co Ltd and 70 affiliates to its so-called “Entity List” – a move that bans the telecom giant from buying parts and components from U.S. companies without U.S. government approval.

 Let’s hear from Wilbur Ross:

He’s the Secretary of Commerce.

Before people try to minimize the fact that the US dollar is now in the process of going down in a blaze of, well, on second thought, getting vaporized by a nuke, consider this from the Commerce Department’s own website:

President Trump Declares National Emergency to Secure the Information and Communications Technology Critical Infrastructure Supply Chain

WASHINGTON – Today, President Trump signed an Executive Order: Securing the Information and Communications Technology and Services Supply Chain, declaring that threats to the information and communications technology and services supply chain by foreign adversaries are a national emergency. The Executive Order prohibits transactions that involve information and communications technology or services designed, developed, manufactured, or supplied, by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary whenever the Secretary of Commerce determines that a transaction would pose a threat to national security, as articulated in the Executive Order.

The Secretary’s determination would be based on consultations with the Attorney General, the Secretaries of Treasury, State, Defense, and Homeland Security, the United States Trade Representative, the Director of National Intelligence, the Administrator of General Services, the Chairman of the Federal Communications Commission, and the heads of other appropriate agencies. In carrying out this mission, the Department of Commerce will issue regulations within 150 days to establish procedures for reviewing such transactions.

“President Trump is acting once again to protect U.S. national security. This Executive Order addresses the threat posed by foreign adversaries to the nation’s information and communications technology and services supply chain,” said Secretary of Commerce Wilbur Ross. “Under President Trump’s leadership, Americans will be able to trust that our data and infrastructure are secure.”

Implementation and Reporting

The Secretary of Commerce, in consultation with the Secretary of State, is authorized to submit reports to Congress on the national emergency declared in the Executive Order. The Director of National Intelligence is required to produce an assessment within 40 days of the Executive Order on the risks to the United States Government, critical infrastructure, and the American people from information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary. The Secretary of Homeland Security, in coordination with sector-specific agencies and coordinating councils, must produce a written assessment within 80 days of the Order evaluating vulnerabilities in hardware, software, and services that threaten the national security of the United States. This assessment will also evaluate to what extent the hardware, software, or services are relied upon by service providers and critical infrastructure entities.

Within one year of the Executive Order, the Secretary of Commerce, in consultation as appropriate with the Secretaries of Treasury, Homeland Security, State, Defense, the Attorney General, the United States Trade Representative, the Director of National Intelligence, and the Chairman of the Federal Communications Commission must report to the President whether the actions taken are sufficient and continue as necessary to mitigate the risks identified in the Order.

This is kind-of a big deal.

So let’s hop on over to the White House’s website and check out the entire declaration wrapped-up into an executive order:

Executive Order on Securing the Information and Communications Technology and Services Supply Chain

By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code,

I, DONALD J. TRUMP, President of the United States of America, find that foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services, which store and communicate vast amounts of sensitive information, facilitate the digital economy, and support critical infrastructure and vital emergency services, in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people. I further find that the unrestricted acquisition or use in the United States of information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of foreign adversaries augments the ability of foreign adversaries to create and exploit vulnerabilities in information and communications technology or services, with potentially catastrophic effects, and thereby constitutes an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States. This threat exists both in the case of individual acquisitions or uses of such technology or services, and when acquisitions or uses of such technologies are considered as a class. Although maintaining an open investment climate in information and communications technology, and in the United States economy more generally, is important for the overall growth and prosperity of the United States, such openness must be balanced by the need to protect our country against critical national security threats. To deal with this threat, additional steps are required to protect the security, integrity, and reliability of information and communications technology and services provided and used in the United States. In light of these findings, I hereby declare a national emergency with respect to this threat.

Accordingly, it is hereby ordered as follows:

Section 1. Implementation. (a) The following actions are prohibited: any acquisition, importation, transfer, installation, dealing in, or use of any information and communications technology or service (transaction) by any person, or with respect to any property, subject to the jurisdiction of the United States, where the transaction involves any property in which any foreign country or a national thereof has any interest (including through an interest in a contract for the provision of the technology or service), where the transaction was initiated, is pending, or will be completed after the date of this order, and where the Secretary of Commerce (Secretary), in consultation with the Secretary of the Treasury, the Secretary of State, the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, the United States Trade Representative, the Director of National Intelligence, the Administrator of General Services, the Chairman of the Federal Communications Commission, and, as appropriate, the heads of other executive departments and agencies (agencies), has determined that:

(i) the transaction involves information and communications technology or services designed, developed, manufactured, or supplied, by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary; and

(ii) the transaction:

(A) poses an undue risk of sabotage to or subversion of the design, integrity, manufacturing, production, distribution, installation, operation, or maintenance of information and communications technology or services in the United States;

(B) poses an undue risk of catastrophic effects on the security or resiliency of United States critical infrastructure or the digital economy of the United States; or

(C) otherwise poses an unacceptable risk to the national security of the United States or the security and safety of United States persons.

(b) The Secretary, in consultation with the heads of other agencies as appropriate, may at the Secretary’s discretion design or negotiate measures to mitigate concerns identified under section 1(a) of this order. Such measures may serve as a precondition to the approval of a transaction or of a class of transactions that would otherwise be prohibited pursuant to this order.

(c) The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted prior to the effective date of this order.

Sec. 2. Authorities. (a) The Secretary, in consultation with, or upon referral of a particular transaction from, the heads of other agencies as appropriate, is hereby authorized to take such actions, including directing the timing and manner of the cessation of transactions prohibited pursuant to section 1 of this order, adopting appropriate rules and regulations, and employing all other powers granted to the President by IEEPA, as may be necessary to implement this order. All agencies of the United States Government are directed to take all appropriate measures within their authority to carry out the provisions of this order.

(b) Rules and regulations issued pursuant to this order may, among other things, determine that particular countries or persons are foreign adversaries for the purposes of this order; identify persons owned by, controlled by, or subject to the jurisdiction or direction of foreign adversaries for the purposes of this order; identify particular technologies or countries with respect to which transactions involving information and communications technology or services warrant particular scrutiny under the provisions of this order; establish procedures to license transactions otherwise prohibited pursuant to this order; establish criteria, consistent with section 1 of this order, by which particular technologies or particular participants in the market for information and communications technology or services may be recognized as categorically included in or as categorically excluded from the prohibitions established by this order; and identify a mechanism and relevant factors for the negotiation of agreements to mitigate concerns raised in connection with subsection 1(a) of this order. Within 150 days of the date of this order, the Secretary, in consultation with the Secretary of the Treasury, Secretary of State, the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, the United States Trade Representative, the Director of National Intelligence, the Administrator of General Services, the Chairman of the Federal Communications Commission and, as appropriate, the heads of other agencies, shall publish rules or regulations implementing the authorities delegated to the Secretary by this order.

(c) The Secretary may, consistent with applicable law, redelegate any of the authorities conferred on the Secretary pursuant to this section within the Department of Commerce.

Sec. 3. Definitions. For purposes of this order:

(a)the term “entity” means a partnership, association, trust, joint venture, corporation, group, subgroup, or other organization;

(b)the term “foreign adversary” means any foreign government or foreign non-government person engaged in a long‑term pattern or serious instances of conduct significantly adverse to the national security of the United States or security and safety of United States persons;

(c)the term “information and communications technology or services” means any hardware, software, or other product or service primarily intended to fulfill or enable the function of information or data processing, storage, retrieval, or communication by electronic means, including transmission, storage, and display;

(d)the term “person” means an individual or entity; and

(e)the term “United States person” means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.

Sec. 4. Recurring and Final Reports to the Congress. The Secretary, in consultation with the Secretary of State, is hereby authorized to submit recurring and final reports to the Congress on the national emergency declared in this order, consistent with section 401(c) of the NEA (50 U.S.C. 1641(c)) and section 204(c) of IEEPA (50 U.S.C. 1703(c)).

Sec. 5. Assessments and Reports. (a) The Director of National Intelligence shall continue to assess threats to the United States and its people from information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary. The Director of National Intelligence shall produce periodic written assessments of these threats in consultation with the heads of relevant agencies, and shall provide these assessments to the President, the Secretary for the Secretary’s use in connection with his responsibilities pursuant to this order, and the heads of other agencies as appropriate. An initial assessment shall be completed within 40 days of the date of this order, and further assessments shall be completed at least annually, and shall include analysis of:

(i) threats enabled by information and communications technologies or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary; and

(ii) threats to the United States Government, United States critical infrastructure, and United States entities from information and communications technologies or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the influence of a foreign adversary.

(b)The Secretary of Homeland Security shall continue to assess and identify entities, hardware, software, and services that present vulnerabilities in the United States and that pose the greatest potential consequences to the national security of the United States.The Secretary of Homeland Security, in coordination with sector-specific agencies and coordinating councils as appropriate, shall produce a written assessment within 80 days of the date of this order, and annually thereafter.This assessment shall include an evaluation of hardware, software, or services that are relied upon by multiple information and communications technology or service providers, including the communication services relied upon by critical infrastructure entities identified pursuant to section 9 of Executive Order 13636 of February 12, 2013 (Improving Critical Infrastructure Cybersecurity).

(c) Within 1 year of the date of this order, and annually thereafter, the Secretary, in consultation as appropriate with the Secretary of the Treasury, the Secretary of Homeland Security, Secretary of State, the Secretary of Defense, the Attorney General, the United States Trade Representative, the Director of National Intelligence, and the Chairman of the Federal Communications Commission, shall assess and report to the President whether the actions taken by the Secretary pursuant to this order are sufficient and continue to be necessary to mitigate the risks identified in, and pursuant to, this order.

Sec. 6. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect:

(i) the authority granted by law to an executive department or agency, or the head thereof; or

(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.

(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.

(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

DONALD J. TRUMP

THE WHITE HOUSE,
May 15, 2019.

Does this mean the trade war with China has just been escalated?

It certainly looks that way to me, but notice something that’s very, very important.

That National Emergency basically just gave the US even more control over the Internet.

How so?

Because it is a blanket statement which can be interpreted in any way the government wants.

That’s how.

On the surface, it looks like President Trump is about to open up a Can ‘O Whoop-Ass on China, but when you dig a little deeper, well, this:

 

Full of “strong praise” from Deep State Globalist Marco Rubio.

So all of that, combined with stuff like this:

Amounts to what can only be interpreted as one giant trap to round-up Patriots and send them off to FEMA Camps for extermination.

The Trade War does provide the very best of cover to crush Freedom of Speech and access to truth and information, doesn’t it?

If the plan is to kill off the dollar, which I think is the plan, we may have just gone from currency war to currency nuclear war.

This means the pace of the US dollar collapse will be picking up speed, and as an added bonus, for the Deep State.

Dissenters will fall into the trap that has been laid and activated by Donald ‘Deep State in Patriot’s Clothing’ Trump.

Because as much as they try to censor the truth, you can’t win a War on Truth no matter the destruction.

This will not stop them from trying to domesticate the for-the-most-part still wild and savage Internet.

With the continued very heavy-handed beatings of gold & silver in the fraudulent paper “markets”.

With letting Bitcoin go on a run again so as not to draw attention to the only two real monies.

Things are moving along under the surface, and the final attacks will be surprise attacks.

Since we are talking about the US dollar, this means anybody holding them loses.

Bitcoin cannot and will not be able to protect against what is coming.

The only thing that can protect us from all of this is real money.

And if the Trade War is any indication, we are very close.

It started in 2016 with Candidate Trump talking trade.

The trade war had monthly escalations in 2018.

We have seen weekly escalations in 2019.

Last week, we saw daily escalations.

This week it’s multiple escalations.

Happening every single day.

Both the US and China.

Have their fingers on.

Red launch buttons.

Codes were typed.

All that’s left now.

Is to hit “enter”.

And then?

Boom!

Stack accordingly…

– Half Dollar


 

About the Author

U.S. Army Iraq War Combat Veteran Paul “Half Dollar” Eberhart has an AS in Information Systems and Security from Western Technical College and a BA in Spanish from The University of North Carolina at Chapel Hill. Paul dived into gold & silver in 2009 as a natural progression from the prepper community. He is self-studied in the field of economics, an active amateur trader, and a Silver Bug at heart.

Paul’s free book Gold & Silver 2.0: Tales from the Crypto can be found in the usual places like Amazon, Apple iBooks & Google Play, or online at PaulEberhart.com. Paul’s Twitter is @Paul_Eberhart.

***