WEBVTT

00:00:00.000 --> 00:00:03.879
Welcome to today's deep dive. We have a, well,

00:00:04.019 --> 00:00:06.839
a particularly compelling stack of sources to

00:00:06.839 --> 00:00:08.960
unpack for you today. We really do. Yeah, it

00:00:08.960 --> 00:00:11.539
centers around this brief, highly classified,

00:00:11.800 --> 00:00:15.289
and honestly... somewhat chilling Wikipedia entry.

00:00:15.650 --> 00:00:18.089
We're looking at the presidential successor support

00:00:18.089 --> 00:00:21.030
system. Right. And our mission for you today

00:00:21.030 --> 00:00:24.449
is to navigate the shadowy, deeply complex world

00:00:24.449 --> 00:00:27.890
of U .S. continuity of government programs. You

00:00:27.890 --> 00:00:30.489
know, what you'll often hear referred to as COG.

00:00:30.649 --> 00:00:32.990
Exactly. We're going to be looking closely at

00:00:32.990 --> 00:00:35.250
the sparse details provided in this document.

00:00:35.329 --> 00:00:37.109
But more importantly, we're going to read between

00:00:37.109 --> 00:00:40.810
the lines of its citations because those citations

00:00:40.810 --> 00:00:45.500
reveal a lot about the infrastructure. They absolutely

00:00:45.500 --> 00:00:48.939
do. And the material we are analyzing today is

00:00:48.939 --> 00:00:51.479
technically classified as a stub in Wikipedia

00:00:51.479 --> 00:00:54.340
terminology. Meaning it's incredibly short. Right.

00:00:54.380 --> 00:00:57.119
Very brief. But that brevity is actually a defining

00:00:57.119 --> 00:00:58.579
characteristic of the subject matter itself.

00:00:58.759 --> 00:01:00.520
Oh, for sure. I mean, we're looking at programs

00:01:00.520 --> 00:01:03.359
designed around extreme compartmentalization,

00:01:03.520 --> 00:01:07.180
institutional opacity. The core of this document

00:01:07.180 --> 00:01:11.040
focuses on a concept referred to as leadership

00:01:11.040 --> 00:01:14.650
decapitation. Which is just a stark terrifying

00:01:14.650 --> 00:01:17.689
term. It is. It outlines the most catastrophic

00:01:17.689 --> 00:01:20.930
vulnerability in any command structure and the

00:01:20.930 --> 00:01:22.930
extreme lengths the government goes to in order

00:01:22.930 --> 00:01:25.409
to mitigate that risk. Yeah. And before we delve

00:01:25.409 --> 00:01:27.829
into the specific directives and all that bureaucratic

00:01:27.829 --> 00:01:30.750
architecture, consider this historical scenario

00:01:30.750 --> 00:01:33.750
documented in our sources. It perfectly illustrates

00:01:33.750 --> 00:01:36.129
the level of entrenched secrecy we're talking

00:01:36.129 --> 00:01:38.290
about here. It really sets the stage. Right.

00:01:38.409 --> 00:01:40.790
So imagine stepping into the most powerful office

00:01:40.790 --> 00:01:42.829
in the world. You're the newly elected president

00:01:42.829 --> 00:01:45.120
of the United states. You're getting your initial

00:01:45.120 --> 00:01:47.439
intelligence briefings. You're getting a handle

00:01:47.439 --> 00:01:49.040
on the nuclear apparatus. I believe where all

00:01:49.040 --> 00:01:52.319
the buttons are. Exactly. Then completely by

00:01:52.319 --> 00:01:55.459
accident, your administration uncovers a secret

00:01:55.459 --> 00:01:58.379
doomsday plan left behind by your predecessor.

00:01:58.719 --> 00:02:00.659
It's running in the background. Right. And this

00:02:00.659 --> 00:02:03.480
isn't some minor administrative contingency.

00:02:03.540 --> 00:02:06.799
It's a comprehensive plan that literally hands

00:02:06.799 --> 00:02:09.879
over control of wartime organizations to a group

00:02:09.879 --> 00:02:12.620
of corporate executives. Unbeknownst to you,

00:02:12.780 --> 00:02:15.340
the incoming commander in chief, this sweeping

00:02:15.340 --> 00:02:18.580
apocalyptic contingency plan was just quietly

00:02:18.580 --> 00:02:20.879
doing its thing. And that level of disconnect,

00:02:20.979 --> 00:02:23.319
that's the defining feature of the systems we're

00:02:23.319 --> 00:02:26.219
unpacking today. It really is. It sets a necessary

00:02:26.219 --> 00:02:29.379
baseline for understanding the presidential successor

00:02:29.379 --> 00:02:32.580
support system. which the sources note is also

00:02:32.580 --> 00:02:35.740
abbreviated as PSSS. Or PS cubed, which is what

00:02:35.740 --> 00:02:37.919
they call it colloquially in the circle. Right,

00:02:38.000 --> 00:02:40.379
PS cubed. The system operates entirely within

00:02:40.379 --> 00:02:42.979
the continuity of government framework, but it's

00:02:42.979 --> 00:02:45.379
specifically designated as a black program. Yeah,

00:02:45.439 --> 00:02:47.379
let's unpack that. Because for an audience familiar

00:02:47.379 --> 00:02:49.780
with defense terminology, the designation of

00:02:49.780 --> 00:02:52.360
a black program or a special access program carries

00:02:52.360 --> 00:02:55.039
very specific bureaucratic weight. It's not just

00:02:55.039 --> 00:02:58.199
a top secret stamp. No, not at all. We aren't

00:02:58.199 --> 00:03:00.219
just talking about classified information locked

00:03:00.219 --> 00:03:03.840
in a safe somewhere. Unacknowledged special access

00:03:03.840 --> 00:03:07.219
programs are initiatives that are so highly compartmentalized

00:03:07.219 --> 00:03:10.939
that standard congressional or executive oversight

00:03:10.939 --> 00:03:14.080
essentially just vanishes. The primary security

00:03:14.080 --> 00:03:16.919
objective isn't merely protecting the operational

00:03:16.919 --> 00:03:21.120
data. Right. It's actively obscuring the program's

00:03:21.120 --> 00:03:24.360
very existence from almost everyone in the government.

00:03:24.659 --> 00:03:27.460
To put it in perspective for you listening. Think

00:03:27.460 --> 00:03:29.560
about it like having a hidden app on your phone.

00:03:29.680 --> 00:03:32.060
It's a good analogy. Right. Like an app that

00:03:32.060 --> 00:03:34.199
you don't even know is installed. It's running

00:03:34.199 --> 00:03:37.060
in the background, using battery, gathering data,

00:03:37.199 --> 00:03:39.159
and you can't see it on your home screen. You

00:03:39.159 --> 00:03:41.099
can't find it in the settings. It's completely

00:03:41.099 --> 00:03:43.860
invisible to the user. Exactly. Now scale that

00:03:43.860 --> 00:03:45.840
up to the federal government level with billions

00:03:45.840 --> 00:03:48.240
of dollars and nuclear survival protocols attached

00:03:48.240 --> 00:03:50.939
to it. And the Wikipedia entry itself highlights

00:03:50.939 --> 00:03:53.759
this reality by stating plainly that very few

00:03:53.759 --> 00:03:56.830
details have come to light about PS3. You can

00:03:56.830 --> 00:03:59.650
see the legacy of that extreme secrecy reflected

00:03:59.650 --> 00:04:02.389
in how the article is actually categorized. Oh,

00:04:02.449 --> 00:04:04.750
yeah. It sits in these hidden categories. Right.

00:04:04.750 --> 00:04:06.349
Hidden categories like United States military

00:04:06.349 --> 00:04:08.930
stubs, United States government stubs. Yeah,

00:04:08.949 --> 00:04:11.009
which is so funny to me. There's this undeniable

00:04:11.009 --> 00:04:14.599
irony in seeing the standard. public disclaimer

00:04:14.599 --> 00:04:18.100
on Wikipedia, you know, the one inviting anyone

00:04:18.100 --> 00:04:21.100
to help add missing information on an article

00:04:21.100 --> 00:04:23.800
about a special access program designed specifically

00:04:23.800 --> 00:04:26.620
to evade public awareness. It's definitely palpable

00:04:26.620 --> 00:04:29.899
irony. But the document does provide a few concrete

00:04:29.899 --> 00:04:33.139
data points that anchor this program in a specific

00:04:33.139 --> 00:04:35.819
historical and bureaucratic reality. It does.

00:04:36.079 --> 00:04:38.540
It identifies the managing entity as the National

00:04:38.540 --> 00:04:41.180
Program Office. And this wasn't some legacy department

00:04:41.180 --> 00:04:43.819
left over from World War II. The National Program

00:04:43.819 --> 00:04:47.980
Office was established in 1982. 1982. Yes. And

00:04:47.980 --> 00:04:50.019
the mechanism for its creation was a national

00:04:50.019 --> 00:04:54.169
security decision directive. Specifically. NSDD

00:04:54.169 --> 00:04:56.649
55. And the title of that directive is striking.

00:04:56.810 --> 00:04:58.649
It's so direct. It's called Enduring National

00:04:58.649 --> 00:05:01.290
Leadership. That phrasing, Enduring National

00:05:01.290 --> 00:05:03.990
Leadership, is crucial. It clarifies the foundational

00:05:03.990 --> 00:05:06.170
objective of the directive. Right. It's not Enduring

00:05:06.170 --> 00:05:08.910
National Economy. Or Enduring Infrastructure.

00:05:08.970 --> 00:05:11.600
Or an Enduring Populace, for that matter. The

00:05:11.600 --> 00:05:13.819
stated goal is the preservation of leadership

00:05:13.819 --> 00:05:16.420
structure itself. Just the leadership. And if

00:05:16.420 --> 00:05:18.160
we look closely at the citations provided at

00:05:18.160 --> 00:05:20.439
the bottom of the article, we find a vital piece

00:05:20.439 --> 00:05:23.540
of historical context regarding that 1982 establishment

00:05:23.540 --> 00:05:26.180
date. Yeah, the second reference in the document

00:05:26.180 --> 00:05:28.899
points to the history commons. And the title

00:05:28.899 --> 00:05:32.029
of that specific entry reads, Context of September

00:05:32.029 --> 00:05:35.750
14th, 1982. President Reagan orders overhaul

00:05:35.750 --> 00:05:38.610
of secret emergency plans. Which places the creation

00:05:38.610 --> 00:05:42.410
of the National Program Office and PS3 squarely

00:05:42.410 --> 00:05:44.329
within the geopolitical climate of the early

00:05:44.329 --> 00:05:47.829
1980s. The Reagan era. Exactly. A period defined

00:05:47.829 --> 00:05:50.949
by escalating Cold War anxieties and a really

00:05:50.949 --> 00:05:53.430
intense renewed focus on nuclear deterrence.

00:05:53.870 --> 00:05:56.730
The Reagan administration's mandate to overhaul

00:05:56.730 --> 00:05:59.149
these secret emergency plans, it suggests that

00:05:59.149 --> 00:06:01.329
whatever continuity of government framework existed

00:06:01.329 --> 00:06:04.810
prior to 1982 was deemed insufficient. It just

00:06:04.810 --> 00:06:06.689
wasn't enough for the modern threat landscape.

00:06:07.050 --> 00:06:10.689
Right. They needed a more robust, highly secure

00:06:10.689 --> 00:06:14.170
system to ensure that the chain of command could

00:06:14.170 --> 00:06:18.000
survive a catastrophic first strike. Which brings

00:06:18.000 --> 00:06:20.240
us back to the primary operational nightmare

00:06:20.240 --> 00:06:22.720
these programs are built to solve. The problem

00:06:22.720 --> 00:06:25.319
of leadership decapitation. Let's spend some

00:06:25.319 --> 00:06:28.160
time on that concept. Because leadership decapitation

00:06:28.160 --> 00:06:31.480
isn't just a military setback. It is a constitutional

00:06:31.480 --> 00:06:34.740
crisis occurring in a fraction of a second. A

00:06:34.740 --> 00:06:37.279
literal nightmare scenario. Right. And the sources

00:06:37.279 --> 00:06:40.199
describe prior presidential administrations wrestling

00:06:40.199 --> 00:06:42.620
with this exact scenario. We're talking about

00:06:42.620 --> 00:06:45.699
a sudden catastrophic event that wipes out the

00:06:45.699 --> 00:06:47.579
president, the vice president. the cabinet, the

00:06:47.579 --> 00:06:50.439
military brass. Essentially the entire recognized

00:06:50.439 --> 00:06:53.120
chain of command. All at once. Gone. And the

00:06:53.120 --> 00:06:55.360
logistical nightmare of that cannot be overstated.

00:06:55.769 --> 00:06:57.910
In the context of nuclear command and control,

00:06:58.110 --> 00:07:01.250
the entire deterrent strategy relies on the absolute

00:07:01.250 --> 00:07:03.910
assurance of retaliatory strike. Mutually assured

00:07:03.910 --> 00:07:06.170
destruction. Exactly. So if the leadership is

00:07:06.170 --> 00:07:08.850
decapitated, the immediate questions become who

00:07:08.850 --> 00:07:10.810
possesses the legal authority to command our

00:07:10.810 --> 00:07:13.129
forces? Right. Who authorizes the retaliation?

00:07:13.129 --> 00:07:16.629
And beyond the immediate military response, who

00:07:16.629 --> 00:07:18.470
is left with the authority and the capability

00:07:18.470 --> 00:07:21.329
to run a devastated country? Which brings us

00:07:21.329 --> 00:07:24.740
to Eisenhower. Because President Dwight D. Eisenhower's

00:07:24.740 --> 00:07:27.319
approach to this problem was surprisingly corporate.

00:07:27.959 --> 00:07:30.339
And honestly, it stands out as one of the most

00:07:30.339 --> 00:07:33.000
surreal historical precedents in our source material

00:07:33.000 --> 00:07:35.279
today. It really is fascinating. To solve the

00:07:35.279 --> 00:07:37.800
problem of leadership decapitation, Eisenhower

00:07:37.800 --> 00:07:40.800
designated 10 captains of industry to step in.

00:07:40.920 --> 00:07:43.199
10 corporate executives. Yes. They were tasked

00:07:43.199 --> 00:07:45.639
with taking control of wartime organizations

00:07:45.639 --> 00:07:49.079
to help the country reconstitute itself. This

00:07:49.079 --> 00:07:52.180
group became known as the Eisenhower 10. Choosing

00:07:52.180 --> 00:07:54.579
private sector executives over a deeper bench

00:07:54.579 --> 00:07:57.240
of military commanders or lower -level politicians

00:07:57.240 --> 00:08:00.699
represents a massive philosophical shift. A huge

00:08:00.699 --> 00:08:03.160
shift. It suggests a belief that in the aftermath

00:08:03.160 --> 00:08:06.339
of a total societal collapse, the skill set required

00:08:06.339 --> 00:08:09.579
to reconstitute a nation isn't necessarily military

00:08:09.579 --> 00:08:12.500
strategy or political maneuvering. It's logistics.

00:08:12.959 --> 00:08:15.959
Yes. Industrial logistics, resource management,

00:08:16.019 --> 00:08:19.220
corporate organization. The strategy relied on

00:08:19.220 --> 00:08:21.300
the individuals who ran the nation's manufacturing,

00:08:21.660 --> 00:08:24.360
telecommunications and financial infrastructures

00:08:24.360 --> 00:08:27.240
to effectively rebuild the United States. Just

00:08:27.240 --> 00:08:29.819
imagine the practical application of that strategy

00:08:29.819 --> 00:08:33.879
for a second. A catastrophic event occurs. Washington

00:08:33.879 --> 00:08:36.899
is completely unresponsive and the keys to the

00:08:36.899 --> 00:08:39.919
republic are just quietly handed over to the

00:08:39.919 --> 00:08:42.740
CEOs of major corporations. It's wild to think

00:08:42.740 --> 00:08:45.379
about. You have unelected heads of industry suddenly

00:08:45.379 --> 00:08:47.600
possessing the. ultimate authority to command

00:08:47.600 --> 00:08:50.460
remaining national resources, direct labor and

00:08:50.460 --> 00:08:53.240
manage the survival of the population. I mean,

00:08:53.240 --> 00:08:56.100
it's a continuity strategy that completely bypasses

00:08:56.100 --> 00:08:58.789
the traditional democratic framework. All in

00:08:58.789 --> 00:09:01.330
favor of raw administrative efficiency. Exactly.

00:09:01.350 --> 00:09:03.570
And the historical reality of the Eisenhower

00:09:03.570 --> 00:09:06.529
10 is thoroughly documented in the references.

00:09:06.909 --> 00:09:09.509
There's specifically a citation pointing to an

00:09:09.509 --> 00:09:11.970
archival piece on Connell Rad. Right. But the

00:09:11.970 --> 00:09:14.129
most revealing aspect of this plan isn't simply

00:09:14.129 --> 00:09:17.090
that it existed, it's how long it operated completely

00:09:17.090 --> 00:09:19.250
in the shadows. Yeah. Which brings us back to

00:09:19.250 --> 00:09:20.750
the scenario we discussed at the beginning of

00:09:20.750 --> 00:09:23.570
our deep dive. The Kennedy transition. The document

00:09:23.570 --> 00:09:26.820
outlines this pivotal moment. It says, The existence

00:09:26.820 --> 00:09:29.379
of the Eisenhower 10 was accidentally found by

00:09:29.379 --> 00:09:31.759
the incoming John F. Kennedy administration in

00:09:31.759 --> 00:09:35.440
1961. Found by accident. By accident. A presidential

00:09:35.440 --> 00:09:38.200
transition is theoretically the moment of maximum

00:09:38.200 --> 00:09:40.980
information transfer within the executive branch.

00:09:41.100 --> 00:09:43.159
You'd think so. Right. You have the outgoing

00:09:43.159 --> 00:09:46.059
team briefing the incoming administration on

00:09:46.059 --> 00:09:49.299
covert operations, nuclear protocols, strategic

00:09:49.299 --> 00:09:52.759
threats. And yet an entire continuity of government

00:09:52.759 --> 00:09:55.399
plan, one that delegates supreme authority to

00:09:55.399 --> 00:09:58.600
10 civilians. was entirely omitted from those

00:09:58.600 --> 00:10:01.620
briefings. It highlights a profound structural

00:10:01.620 --> 00:10:04.720
flaw in how special access programs are managed.

00:10:04.919 --> 00:10:06.799
It illustrates a culture of compartmentalization

00:10:06.799 --> 00:10:09.840
so severe that it honestly defeats its own purpose.

00:10:10.100 --> 00:10:12.120
The sitting president of the United States is

00:10:12.120 --> 00:10:14.700
the individual ultimately responsible for executing

00:10:14.700 --> 00:10:17.539
these survival strategies. Right. Yet the Kennedy

00:10:17.539 --> 00:10:19.779
administration essentially stumbled upon the

00:10:19.779 --> 00:10:22.220
Eisenhower 10. They didn't inherit the plan.

00:10:22.419 --> 00:10:25.059
They discovered it by accident. And this phenomenon.

00:10:25.580 --> 00:10:27.440
raises critical questions about institutional

00:10:27.440 --> 00:10:30.860
memory versus autonomous bureaucracy. When a

00:10:30.860 --> 00:10:33.019
program is classified to the degree of a black

00:10:33.019 --> 00:10:35.980
program, the circle of individuals who are read

00:10:35.980 --> 00:10:39.659
in is incredibly small. Tiny, just a handful

00:10:39.659 --> 00:10:42.379
of people. So if those specific individuals leave

00:10:42.379 --> 00:10:44.840
government service, or if they simply decide

00:10:44.840 --> 00:10:47.539
not to brief an incoming administration because

00:10:47.539 --> 00:10:49.620
they don't believe the new team has a need to

00:10:49.620 --> 00:10:52.700
know. Which happens. It does. Then the program

00:10:52.700 --> 00:10:55.309
continues to exist independently. It becomes

00:10:55.309 --> 00:10:58.730
a ghost in the machine, fully funded, fully operational,

00:10:58.929 --> 00:11:01.450
yet completely uncethered from the current elected

00:11:01.450 --> 00:11:04.090
leadership. And that autonomous nature is exactly

00:11:04.090 --> 00:11:06.690
what makes the broader public and the media so

00:11:06.690 --> 00:11:09.230
deeply uneasy about continuity of government

00:11:09.230 --> 00:11:12.190
programs. You can see that unease vividly reflected

00:11:12.190 --> 00:11:14.470
in the external links and citations provided

00:11:14.470 --> 00:11:17.409
in this Wikipedia stub. The citations are very

00:11:17.409 --> 00:11:20.129
revealing. For an article this brief, the references

00:11:20.129 --> 00:11:22.590
do a tremendous amount of heavy lifting in establishing

00:11:22.590 --> 00:11:24.990
the true tone of the subject. They absolutely

00:11:24.990 --> 00:11:27.929
do. The citations point to a distinct pattern

00:11:27.929 --> 00:11:31.029
of media investigation trying to penetrate this

00:11:31.029 --> 00:11:34.149
veil of secrecy. The external links section includes

00:11:34.149 --> 00:11:37.009
three separate parts of a CNN special assignment.

00:11:37.250 --> 00:11:39.190
And the title of that investigative series is

00:11:39.190 --> 00:11:42.330
blunt. It's just called The Doomsday Plan. The

00:11:42.330 --> 00:11:44.990
Doomsday Plan. Right. You also have a citation

00:11:44.990 --> 00:11:47.149
from the week referencing an article titled,

00:11:47.899 --> 00:11:50.899
Washington's secret doomsday plans. There's a

00:11:50.899 --> 00:11:53.200
clear theme there. When major news organizations

00:11:53.200 --> 00:11:56.480
dedicate multi -part special assignments to uncovering

00:11:56.480 --> 00:11:59.340
these protocols, it indicates a significant public

00:11:59.340 --> 00:12:02.519
anxiety. The extreme secrecy surrounding programs

00:12:02.519 --> 00:12:05.059
like P .S. Cubed doesn't necessarily project

00:12:05.059 --> 00:12:07.580
competence or security to the public. No, it

00:12:07.580 --> 00:12:09.679
breeds suspicion. A pervasive suspicion about

00:12:09.679 --> 00:12:11.720
what the government is preparing for behind closed

00:12:11.720 --> 00:12:14.559
doors and, more importantly, who those preparations

00:12:14.559 --> 00:12:17.460
are actually meant to protect. Underlying suspicion

00:12:17.460 --> 00:12:19.620
is brought into sharp focus by reference number

00:12:19.620 --> 00:12:23.139
three. It cites a book published in 2017 by Garrett

00:12:23.139 --> 00:12:25.919
M. Graff. Oh, this is a heavy one. It is. While

00:12:25.919 --> 00:12:28.519
the main text of our source document relies on

00:12:28.519 --> 00:12:31.940
dry bureaucratic language like presidential successor

00:12:31.940 --> 00:12:35.700
support system and national program office, Graff's

00:12:35.700 --> 00:12:37.840
book provides a much more visceral interpretation

00:12:37.840 --> 00:12:39.960
of those terms. Yeah, I'm going to read the full

00:12:39.960 --> 00:12:42.600
title of the cited book for you. It's Raven Rock.

00:12:43.049 --> 00:12:45.190
The Story of the U .S. Government's Secret Plan

00:12:45.190 --> 00:12:47.990
to Save Itself While the Rest of Us Die. That's

00:12:47.990 --> 00:12:50.690
subtitled While the Rest of Us Die. It's profoundly

00:12:50.690 --> 00:12:53.490
cynical, but it directly addresses the logical

00:12:53.490 --> 00:12:57.710
conclusion of NSDD 55. When the mandate is enduring

00:12:57.710 --> 00:13:00.309
national leadership, the infrastructure required

00:13:00.309 --> 00:13:03.149
to execute that mandate is exclusively dedicated

00:13:03.149 --> 00:13:06.090
to a select few. The hardened bunkers like Raven

00:13:06.090 --> 00:13:07.870
Rock, the independent communication networks,

00:13:08.029 --> 00:13:11.090
the stockpiled resources. Exactly. It forces

00:13:11.090 --> 00:13:12.809
you to confront the practical realities of a

00:13:12.809 --> 00:13:15.830
worst case scenario. The citations and the history

00:13:15.830 --> 00:13:18.090
of these programs suggest a stark divergence

00:13:18.090 --> 00:13:20.830
in survival paths. A completely different track

00:13:20.830 --> 00:13:23.769
for them versus us. Right. In the event of a

00:13:23.769 --> 00:13:26.549
true catastrophe, the mechanisms of these black

00:13:26.549 --> 00:13:29.470
programs operate entirely separate from the public.

00:13:29.840 --> 00:13:32.740
The government has a highly classified, heavily

00:13:32.740 --> 00:13:36.059
funded, and potentially autonomous plan to preserve

00:13:36.059 --> 00:13:38.779
its own bureaucracy and chain of command. The

00:13:38.779 --> 00:13:40.679
implication being that continuity of government

00:13:40.679 --> 00:13:42.799
is not synonymous with continuity of society.

00:13:43.179 --> 00:13:46.759
Not at all. The architecture of PS3 and the broader

00:13:46.759 --> 00:13:49.220
National Program Office is designed to ensure

00:13:49.220 --> 00:13:51.600
that the idea of the United States government

00:13:51.600 --> 00:13:55.120
survives, even if the vast majority of its citizenry

00:13:55.120 --> 00:13:58.450
does not. Wow. The source material, despite being

00:13:58.450 --> 00:14:00.870
just a brief stub, sketches out the outlines

00:14:00.870 --> 00:14:03.490
of a parallel infrastructure built specifically

00:14:03.490 --> 00:14:06.269
for an apocalypse. It's a sobering realization

00:14:06.269 --> 00:14:08.769
to pull from just a few lines of text and a handful

00:14:08.769 --> 00:14:11.710
of footnotes. But let's trace the path this document

00:14:11.710 --> 00:14:13.470
has taken us on today. We've covered a lot of

00:14:13.470 --> 00:14:16.090
ground. We really have. We began by decoding

00:14:16.090 --> 00:14:18.460
the presidential successor support system. or

00:14:18.460 --> 00:14:21.360
PS cubed. We examined its status as a highly

00:14:21.360 --> 00:14:23.659
compartmentalized black program operating with

00:14:23.659 --> 00:14:25.720
minimal oversight within the broader continuity

00:14:25.720 --> 00:14:28.480
of government framework. And we contextualized

00:14:28.480 --> 00:14:30.679
its origins, looking at the establishment of

00:14:30.679 --> 00:14:32.700
the National Program Office following President

00:14:32.700 --> 00:14:37.580
Reagan's 1982 mandate, NSDD 55. Which prioritized

00:14:37.580 --> 00:14:40.539
enduring national leadership over all else. Exactly.

00:14:40.659 --> 00:14:43.840
And that led us to the core problem these programs

00:14:43.840 --> 00:14:47.419
attempt to solve. leadership decapitation. We

00:14:47.419 --> 00:14:49.419
explored President Eisenhower's unprecedented

00:14:49.419 --> 00:14:52.820
solution of designating the Eisenhower 10. A

00:14:52.820 --> 00:14:54.940
group of corporate executives tapped to rebuild

00:14:54.940 --> 00:14:57.639
the country if the government fell. And we examined

00:14:57.639 --> 00:15:00.200
the staggering revelation that the incoming Kennedy

00:15:00.200 --> 00:15:03.259
administration only discovered this massive contingency

00:15:03.259 --> 00:15:07.860
plan by sheer accident in 1961. Finally, we analyzed

00:15:07.860 --> 00:15:10.539
the citations, observing how the media's focus

00:15:10.539 --> 00:15:13.259
on doomsday plans in books like Raven Rock highlight

00:15:13.259 --> 00:15:15.700
the profound disconnect between the government's

00:15:15.700 --> 00:15:18.080
secret survival infrastructure and the fate of

00:15:18.080 --> 00:15:20.200
the general public. It's just an incredible amount

00:15:20.200 --> 00:15:22.360
of insight hidden within the negative space of

00:15:22.360 --> 00:15:25.100
a very short Wikipedia entry. And as we wrap

00:15:25.100 --> 00:15:27.080
up this deep dive, there's a final lingering

00:15:27.080 --> 00:15:28.960
thought that builds directly on the historical

00:15:28.960 --> 00:15:31.139
precedents we've discussed today. Yeah, this

00:15:31.139 --> 00:15:33.279
is the thing that really stays with you. We know

00:15:33.279 --> 00:15:35.299
from the source material that the transition

00:15:35.299 --> 00:15:37.759
of power from Eisenhower to Kennedy resulted

00:15:37.759 --> 00:15:40.840
in the accidental discovery of a massive civilization

00:15:40.840 --> 00:15:44.299
-altering doomsday protocol. Right. The compartmentalization

00:15:44.299 --> 00:15:47.820
was so intense that the incoming president was

00:15:47.820 --> 00:15:51.200
left entirely in the dark. So considering the

00:15:51.200 --> 00:15:53.559
uncompromising secrecy of modern special access

00:15:53.559 --> 00:15:56.720
programs like PS3, it raises a critical question

00:15:56.720 --> 00:15:58.899
about the present day. What's happening right

00:15:58.899 --> 00:16:01.980
now. Exactly. How much of our nation's ultimate

00:16:01.980 --> 00:16:04.860
survival architecture is actually known by the

00:16:04.860 --> 00:16:07.519
sitting leadership at any given moment? If an

00:16:07.519 --> 00:16:10.080
administration in 1961 could be completely unaware

00:16:10.080 --> 00:16:12.480
of who was designated to take over the country,

00:16:12.700 --> 00:16:15.159
is it possible that there are active, highly

00:16:15.159 --> 00:16:17.700
classified doomsday directives running in the

00:16:17.700 --> 00:16:19.899
background right now? Autonomous black programs.

00:16:20.120 --> 00:16:22.500
Yes. Autonomous black programs that a modern

00:16:22.500 --> 00:16:24.519
administration has simply never been told to

00:16:24.519 --> 00:16:26.500
look for. That is a thought that will certainly

00:16:26.500 --> 00:16:28.379
change how you view the inner workings of the

00:16:28.379 --> 00:16:30.620
government. Thank you for joining us on this

00:16:30.620 --> 00:16:33.120
deep dive into the complex and shadowy world

00:16:33.120 --> 00:16:35.840
of continuity programs. We hope we've provided

00:16:35.840 --> 00:16:37.820
you with a deeper understanding of the material

00:16:37.820 --> 00:16:40.860
today. Until next time, keep analyzing what you

00:16:40.860 --> 00:16:43.059
read and always look closely at the citations.
