The World Out of Kilter: Occupation and Zombification

The World Out of Kilter: Occupation and Zombification

by Paul Cudenec, Winter Oak
April 22, 2024

 

 

The kind of society I long for is an organic one, in which people live in the way they see fit, guided by their own inclinations, the customs they have inherited and the circumstances of place.

As an anarchist, I am obviously opposed to all authority imposed from above, to any kind of formalised, entrenched power, but that does not mean that there could be no kind of moral “authority” or guidance in the world I want to see.

Traditional societies often look to village elders, wise women, and other respected individuals to help steer their decision-making.

The advice they give arises from within the community concerned and, in order to be followed, will have to correspond to a generally-shared sense that the proposed direction is the right one.

This is not the case with those who exercise power over us today. Due to the corruption of our society, authority is wielded in the interests of a group which neither identifies with the people as a whole nor is prepared to be guided by its wishes.

Instead, it seeks to impose its own agenda on the population by any means necessary – by propaganda and persuasion, if possible, or otherwise by outright deceit, intimidation and physical violence.

Even worse is that this ruling gang, which is essentially nothing but an occupying force, shares neither the specific local moral codes of the various peoples it rules over, nor the general human sense of right and wrong that would once have been shared by its own ancestors.

This is because it is a rogue element, a criminal entity, intent only on increasing its own wealth and power, and has no use for ethics.

Indeed, it takes sadistic pleasure out of using, manipulating and inverting the majority population’s values – their sense of justice, their fondness for their homeland or their love of nature – in order to advance its own venal programme.

Individuals in such a society are unable to follow their own moral compass, to act according to their own innate desires, to follow their dreams, pay respect to the archetypal template in their unconscious.

This is not just because they are physically constrained, by authority, from acting and living in ways that they feel are right, but also because they have been mentally conditioned not to listen to the voice within.

They are besieged, through all their waking hours, by messaging, by propaganda that tells them they have to live, think and behave in the ways set out by the ruling gang.

A natural society will produce all kinds of individuals who complement each other in the ways that they contribute to its well-being.

There are those who are drawn to caring for others, to teaching the young, to growing, to feeding, to building, to physically defending the community, to resolving disputes and so on.

There are also the artists, poets, preachers and prophets, the antennae of the people, who are sensitive to the overall feel of the society and can sense when something is wrong.

Young people often start out with this gift – think of all the different generations rebelling, in their varying ways, against this modern world! – only to be ground down into compliance by the satanic mills of power.

But some carry on noticing and sounding the alert, with the aim of waking up the population as a whole to the danger they are facing.

It is therefore important for the ruling occupying force to isolate the small minority who remain connected to their own deep knowing and to the organic spirit of the community.

They do this by insulting, mocking, demonising, dismissing, intimidating, criminalising and imprisoning them – by presenting them, in their usual inverted manner, as a menace to the very society whose well-being they are trying to defend.

This is psychologically difficult for these social antennae, who risk being deeply wounded by a rejection that they feel comes as much from their own community as from the occupying force.

Banding together in self-defence, they can become inward-looking, cultish, and unable to properly communicate with others outside their ranks.

Or, as individuals, they can become bitter and angry with those who refuse to listen to them, dismissing most members of their community as ignorant fools who deserve no better.

In either case, they have completed the work of the ruling gang by cutting themselves off from the social organism to which they belong.

That organism therefore has no more brain, no more soul, but is a social zombie, staggering on towards its own destruction under the malevolent control of the life-sucking criminocracy.

 

Connect with Paul Cudenec substack | website

Cover image credit: CDD20




FDA Modernization Act 2.0 & The Avatar

FDA Modernization Act 2.0 & The Avatar

by Rosanne Lindsay, Traditional Naturopath, Nature of Healing
April 18, 2024

 

In the Covidian Era, science has moved on to a digital upgrade of itself called Scientism, the religion of science, where science is god, and part of a new global Technocracy.

“Technocracy is the science of social engineering,” says Patrick Wood, author of Technocracy Rising.

Social engineering used to mean molding the minds of people to conform to new norms. This goes back to 1928, Ed Bernays, and his book Propaganda.  However, in a Technocracy, not only minds, but bodies, too, can be molded. If you did not get the memo, Technocracy has brought humanity from Human to Posthuman and Transhuman.

In the 2022 Journal Global Trends, Russian scientists describe the difference between Posthuman and Transhuman:

The fundamental idea of posthumanism is the rejection of biological, ethical, and ontological anthropocentrism. Transhumanism focuses on changing and improving natural human characteristics through biological, technological, and cognitive modifications…Transhumanism has the potential to preserve man as an effective economic and cognizing agent.

In other words, man as an “economic agent” refers to the cybernetic human as a commodity in a modern world. This means the laws of the nations need to change to catch up.

The U.S. FDA is meeting that goal for change with its FDA Modernization Act 2.0.  What is the FDA Modernization Act 2.0?

The new law amends the Federal Food, Drug, and Cosmetic Act by authorizing sponsors of novel drugs to make use of “certain alternatives to animal testing, including cell-based assays and computer models, to obtain an exemption from the Food and Drug Administration to investigate the safety and effectiveness of a drug.

It is the FDA giving itself permission to transition from testing animal models to directly testing humans.

In the 2023 Journal of Clinical Investigation, authors cite a long list of excuses to change research models:

  1. cost
  2. low approval rates in clinical trials
  3. lack of efficacy in trail outcomes
  4. high rate of failure in therapeutics
  5. species differences between animals and humans

After decades of extrapolating animal studies to humans, suddenly animals are no longer scientifically valid. Does this transition make obsolete more than a century of animal-based research? In one sense, such a transition is long-awaited and frees innocent animals from needless torture. In another sense, it moves the mark to a new target.

Scientists now claim humans are diverse, and therefore require different models.  They propose, “human cell-based models that more accurately reflect the diversity of human genetics may guide the development of treatments that are more reliable and successful in real-world applications.”

In Scientism, humans are considered commodities.  Some Transhumanists propose transferring consciousness to a machine to create a brain-machine interface. The Russian Posthuman authors propose that consciousness may be a feature exclusive to humans. They appear not to know for sure. They state:

Accordingly, it is still possible that there is a fundamental difference between man and other objects of the world.

The new strategy is one of large-scale experiments using pooled cell lines or “cell villages” and bar codes, i.e., human commodities will receive a digital ID. With human-like neural computing, soon humanoid robots will replace humans in the workplace.  The United Nations calls this Biodigital Convergence as part of its Sustainable Goals for Smart™ cities by 2030. CeNSE is the Central Nervous System for the Earth. Networks within networks.

Personalized Medicine & Precision Public Health

Digital IDs reflect a digital avatar in Precision Healthcare. “Precision Healthcare” refers to a remote medical model of healthcare. According to a 2021 study in the Journal of Personalized Medicine:

A digital twin is a virtual model of a physical entity, with dynamic, bi-directional links between the physical entity and its corresponding twin in the digital domain.

In March 2024, Dept. of Defense (DoD) officials testified on its own priorities before the House Armed Services Subcommittee. The digital ID is a natural progression from the trend toward non-binary humans who do not identify with a specific gender.  This makes the transition, from human to digital Posthuman, effortless. All humans with a digital ID belong to an A.I., industrial (not biological) system—Transhumanism.

The rapid development of technology—in particular, artificial intelligence—accelerates the processes of industrial automation. This, in turn, raises the question of the role of man in the economy of the future: if artificial systems can more effectively perform the functions of man, then what place will man, as a potentially inefficient economic agent, take in the economy?

Studying humans in large-scale experiments has already happened. The deployment of COVID EUA medical countermeasures (MCMs), sometimes referred to as vaccines, was tested during the COVID pandemic. However, unlike vaccines, which are FDA-approved, MCMs are not. According to the CDC, MCMs include: biological products, drugs, and devices.

Be aware that MCMs are already recognized in many Federal Acts, including the 21st Century Cures Act, the Medical Countermeasures Surge Capacity Act of 2022, The Public Readiness and Emergency Preparedness Act (PREP Act)The Prioritizing Medical Countermeasures for National Security Act of 2023.

Testing humans in Real Time, as a digital Avatar, puts the Tele in Telehealth. It is a strategy of “emergent technology,” even though emergent technology, such as TeleMedicine, is already 10 years old.  Further, this technology prevents the need for long-term genotoxicological and carcino-toxicological vaccine studies. Any adverse events (AEs) can be released later. Or not.

For example, post-COVID, drugmaker Pfizer was court-ordered to release safety data for its BioNTech EUA ‘vaccine.’ In its first data dump of February 2021, 1300 adverse events were listed among 42,000 serious case reports. With results such as these, the dial from health to disease is turned up, as disease becomes the new normal.

Without defining, ‘modernization 2.o,’ in human terms, science and government have paved the way for a new religion in a Posthuman synthetic, digital world. To maintain the inner human is to be aware of Technocracy, and turn toward the Natural world, and the heart center.

Related articles:

 

Connect with Rosanne Lindsay, Traditional Naturopath

Cover image credit: patrypguerreiro




Whirling Fish, Bees, Worms, Sheep, Turtles, Penguins

Whirling Fish, Bees, Worms, Sheep, Turtles, Penguins

by Arthur Firstenberg, Cellular Phone Task Force
April 16, 2024

 

 

More Than Fifty Species of Fish Circling and Spinning Until They Die

Several of my subscribers have called my attention to this. In February 2023, in the middle of the Florida Keys — a long, narrow string of islands hooking down into the ocean from Miami — many different kinds of fish, both common and rare, began spinning round and round, or swimming frantically in circles, until they beached themselves and died. This has continued, and as of April 5, 2024 has been observed in more than 50 species, including: sharks, rays, snappers, pilchards, grunts, blue runners, squid, Goliath grouper, tarpon, snook, redfish, leatherjacket, yellowfin mojarra, scaled sardine, toadfish, mullet, permit, ballyhoo, jack crevalle, yellow jack, bonefish, pinfish, bigeye scad, sand perch, needlefish, spadefish, and the critically endangered smalltooth sawfish, which is pictured above.

No cause for this has been found. There is no evidence of a red tide, low oxygen levels, high temperatures, or parasites in the dead fish.

I was skeptical that RF radiation from cell towers could be causing this because water reflects the radiation and it shouldn’t be killing fish like it is killing birds. But I decided to investigate. Because the greatest number of reports have come from a 10-mile-long stretch of the Keys between Big Pine Key and Sugarloaf Key, I wondered if there is a military facility in that area, and there is, or was. On Cudjoe Key, located between Big Pine Key and Sugarloaf Key, there was an Air Force Base that is now operated by the Department of Homeland Security. And above Cudjoe Key floats a radar blimp, called an “aerostat”, that is part of U.S. border surveillance and scans an area around it for 200 miles in every direction. Powerful radar can injure fish when they swim to the surface in these shallow waters, called the Florida Keys flats, where the water is only a few feet deep. Local residents call this blimp Fat Albert.

There may be underwater sonar in use at this facility as well, which would be likely to affect all the fish, either alone or in combination with the radar. In November 2022, the Tethered Aerostat Radar System (TARS) at Cudjoe Key began recruiting for a variety of positions, including Flight Director, Site Laborer, Logistics Supply Coordinator, Logistician, General Maintenance Worker, and one position that was advertised as “Electronic Technician – Aerostat Sonar / Radar – Blimp Surveillance System – Cudjoe Key, FL”.

The sudden large number of job openings makes one suspect that this facility has recently been upgraded and has increased the scope of its operations, which evidently now includes ocean sonar.

The person who first observed fish circling to death, and called attention to it, was Gregg Furstenwerth, a diver who lives in Cudjoe Key.

Circling Worms and Sheep

As I reported three years ago, the launching of almost 100 satellites by SpaceX and OneWeb on a single day on March 24, 2021 caused illness all over the planet in both humans and animals. Among the effects on animals was a spiraling, or circling phenomenon in worms (photo taken in Hoboken, New Jersey on March 25, 2021):

 

and in sheep (photo taken in England on March 26, 2021):

 

Circling Turtles, Seals, Penguins, Sharks and Whales

In 2021, Japanese scientists reported on bizarre circling behavior of green sea turtles, Antarctic fur seals, king penguins, a whale shark, a tiger shark, and a Cuvier’s beaked whale. This was observed in the seas off Oahu, Hawai’i; Okinawa, Japan; Moheli Island, Comoro; Chichijima Island, Japan; Possession Island in the Indian Ocean; Bird Island in South Georgia; and the Ogasawara Islands in the western North Pacific Ocean. The animals circled round and round for up to an hour. “One turtle swam in large circles 76 times, with each loop taking 16 to 20 seconds”reported New Scientist. This behavior was also caused by radiation: all these different whirling sea animals wore computers (“multi-channel data loggers”) and VHF transmitters, and the sea turtles also wore GPS devices. Instead of enabling them to study the animals’ behavior, the devices were causing the bizarre behavior.

Circling Bees

Grayson in North Carolina is one of my subscribers who sent me information about the circling fish in the Florida Keys. He reports also on circling bees: 

“I still have the sample of carpenter bees harmed by a wi-fi light sensor at my home in 2016ish. They did the same thing. They passed through the sensor’s field and dropped to the base of the light and crawled around in circles for days… There were 23 total and they did not respond to water or honey and water or anything. They just crawled around in circles.”

 

Arthur Firstenberg
President, Cellular Phone Task Force
Author, The Invisible Rainbow: A History of Electricity and Life
P.O. Box 6216
Santa Fe, NM 87502
USA

 

Connect with Arthur Firstenberg

Cover image credit: Forrest Samuels




The Fury of Europe’s Farmers Shocks EU Technocrats

The Fury of Europe’s Farmers Shocks EU Technocrats

by Fraser Myers, sourced from Technocracy News & Trends

 

The continent-wide fury of EU farmers is blazing a trail straight to the heart of Technocracy, namely, the green agenda, net zero, and the war on energy and food. The late Rosa Koire warned Europe between 2010-2015 about “the blueprint, the comprehensive plan of action for the 21st century to inventory and control all land, all water, all plants, all minerals, all animals, all construction, all means of production, all energy, all law enforcement, all health care, all food, all education, all information, and all human beings in the world.” 

The farmers got it and are now fighting for their lives and livelihoods. Technocrats spin out these suicidal policies using their oracle of pseudoscience as their god. However, it is no god but rather base scientism, which C.S. Lewis laid bare in his Abolition of Man (1943). 

These are those whose intent is to destroy the earth (Rev. 11:18). Will we stop them before it is too late?

~ Technocracy News Editor



Europe’s farmers are rising up – and the elites are terrified. In France, farmers recently staged a four-day ‘siege of Paris’, blocking major roads around the French capital. In January, thousands of tractors descended on Berlin in Germany, lining the streets leading up to the Brandenburg Gate. In Brussels, farmers have gathered from all over Europe to demonstrate against the EU and pelt the European Parliament with eggs. In the Netherlands, tractors have caused the longest traffic jam in the nation’s history, as part of a years-long battle between farmers and the government. This farmers’ revolt is now truly Europe-wide. From Portugal to Poland, from Ireland to Italy, almost every EU country has been rocked by protests. So what is driving this populist uprising? What do the farmers want?

Farmers in each country have their own specific grievances, of course. But there is a common root to their anger. What connects them is the European Union’s green agenda, which has been imposed on agriculture from on-high. It has made farmers’ lives a misery, sacrificing their livelihoods at the altar of climate alarmism. Bureaucrats who have no idea how farmers work and live, have essentially been condemning farms – many of them run by families for generations – to oblivion, all at the stroke of the regulator’s pen. And farmers are simply not putting up with it anymore.

The first stirrings of revolt began in 2019, in the Netherlands, with the so-called nitrogen crisis. The Dutch Supreme Court ruled that the government was failing to cut nitrogen pollution to EU-approved levels. In response, the Dutch government promised ‘drastic measures’ to cut nitrogen emissions. In all but name, it declared war on its nation’s farmers. Suddenly, the government had turned against one of its most important and impressive sectors. You see, the Netherlands, despite its small size, is the second-largest exporter of food in the entire world, thanks to the world-beating efficiency of its farms. And nitrogen is intrinsic to this efficiency. Fertilisers are rich in nitrogen, and farmers need fertilisers to maximise their crop yields. Nitrogen is also an inevitable byproduct of animal farming. Livestock release ammonia, a compound of nitrogen and hydrogen, through their excrement. The Netherlands has over four million cows, 13million pigs and 104million chickens. Which is a lot of manure and a lot of nitrogen. Any crackdown on nitrogen emissions was always going to hit farmers hard. Even so, the Dutch government’s proposals went even further than anyone could have imagined. It said it would buy out thousands of the most polluting farms and simply shut them down. Other farms would have to cull a proportion of their animals. This would mean slaughtering around half of all the livestock in the Netherlands. In all, this represented an unthinkable act of national economic self-harm.

Thus, the farmers’ revolt was born. Huge protests erupted in 2019. After a brief hiatus during the Covid pandemic, they came roaring back in 2021 and 2022. Dutch farmers blocked roads, railways and canal bridges with tractors and hay bales. They defied government bans to bring tractors into the Hague. Tens of thousands took part in the demonstrations. But the Dutch government did not back down. It kept proposing new targets, new measures and new restrictions on nitrogen. In 2022, the government’s own figures revealed that around 30 per cent of farms would have to close to meet their targets. And last year, it drew up a list of the 3,000 farms that it wants to forcibly close within the next few years.

All of this has been done with the approval and encouragement of the EU. And there is worse to come in the Netherlands and beyond. The absurd nitrogen rules that are threatening Dutch farms come from an EU environmental directive that dates back to the 1990s. But the EU’s eco-mania has intensified massively since then. Farmers now have to contend with the drive to Net Zero, too. According to Laurence Tubiana, chief executive of the European Climate Foundation and the architect of the Paris Climate accords, Net Zero will require ‘the biggest overhaul of farming since the Second World War’. And yet, once again, farmers haven’t been consulted on this. Targets have simply been drawn up by the technocrats and rubber stamped by national governments, without any consideration for their impact on farmers and their ability to produce food.

Under the EU’s so-called Green Deal, every EU member state has to reach Net Zero carbon emissions by 2050. And the EU’s emissions rules for agriculture are especially, insanely, stringent. The punishing green policies don’t stop there, either. The Farm to Fork strategy, announced in 2020, calls for 10 per cent of farmland to be set aside for non-agricultural use. It says that at least a quarter of EU farms should become organic. It says fertiliser use must fall by 20 per cent. Pesticide use must be cut by 50 per cent. And all of this should be done by 2030. Each of these demands would be enough to put thousands of farms out of business on their own. When combined, they pose an existential threat to European agriculture. And if the EU’s laws weren’t bad enough, member states are actually gold plating these regulations. The EU had already demanded the impossible of farmers. Now national elites in Berlin, Paris and The Hague want to go even further.

This is why farmers are out on the streets across the continent. It’s why they’re taking matters into their own hands. It’s why they feel they have no choice but to block roads with their tractors, bring life to a standstill and dowse public buildings with manure. They are determined to remind the powers-that-be just how essential they are to the functioning of modern life.

At first, the elites tried to dismiss the protests. They resorted to their usual playbook. They called the farmers fascists, far right and pawns of online disinformation. But this propaganda campaign has flopped. Not only have these smears failed to demoralise the farmers, they have also failed to turn the public against the protests. In country after country, European peoples are backing their farmers, even as the protests disrupt daily life.

In the Netherlands, where our story began, a farmers’ party briefly managed to storm electoral politics, too. The Farmer-Citizen Movement – or BBB – was set up in 2019 amid the nitrogen-crisis demonstrations. Less than four years later, the BBB swept the board in the Dutch provincial elections. It won the popular vote in all 12 provinces – the first time any party had achieved this in Dutch history. While the farmers’ protests managed to bring tens of thousands on to the streets, the farmers’ party managed to mobilise almost 1.5million voters.

The fury of the farmers has now become impossible to ignore. The usually tin-eared elites across Europe have been forced to listen and respond. In Germany, farmers have got their government to delay planned cuts in subsidies for agricultural fuel. And they have managed to keep their tax breaks on tractors and farm vehicles, which were also under threat. In France, farmers have extracted millions of euros in additional grants. And they’ve put paid to government plans to hike fuel taxes. In Ireland, a deranged government proposal to cull 200,000 cows has quietly been shelved. Even at the EU level, farmers have already chalked up some significant victories. Remember that plan to halve the use of pesticides by 2030? It’s now been torn up.

But the protests aren’t going to stop anytime soon. How could they? These concessions, though welcome, do not go nearly far enough. The green agenda is diametrically opposed to the interests of agriculture. So long as European politicians are committed to Net Zero, then the farmers will always be in their sights. What’s more, the farmers’ cause will continue to resonate with ordinary people, who are also served poorly by their environmentalist leaders, whose policies are pushing up prices and obliterating food and energy security. The farmers are merely the canaries in the coalmine. They were just the first group of people to be pushed to breaking point – and to get organised in response.

The farmers offer a cautionary tale to Europe’s rulers. The green elites assumed that farmers would take their bitter medicine. They had no idea just how devastating their regulations would be to farmers’ way of life. They failed to see the human beings behind the emissions figures on their spreadsheets. And the broader push for Net Zero could soon generate much more resistance, from a much broader section of society. After all, under the current plans, our energy bills are set to soar, as we replace reliable fossil fuels with unreliable renewables. Our trusty gas boilers could soon be ripped out, replaced with expensive and inefficient heat pumps. Older, cheaper vehicles are being banned or taxed off the road in the push towards electric cars. Yet again, the establishment seems to think it can change our way of life and shred our living standards without a peep of discontent. This is bound to provoke an almighty backlash. And the farmers have shown us the way.

Long may the farmers’ revolt continue. And here’s hoping it inspires many more people to take a stand.

 

Connect with Spiked

Connect with Technocracy News & Trends

Cover image credit: European Commission (Christophe Licoppe)
Demonstration of farmers in the European Quarter in Brussels, Feb 1, 2024
Creative Commons




The Psychological Battle for Truth — and the Power of the Farmers’ Uprising

The Psychological Battle for Truth — and the Power of the Farmers’ Uprising

by Julian Rose
sourced from Activist Post
April 1, 2024

 

The ‘deep state’ has no power over you. None. It can only try and make you believe it does.

And in this it is very clever, using sophisticated psychological techniques that give the impression of holding the dominant position and exercising the dominant power.

But this is a chimera; and immediately one sees it as such one manifests the authoritative position and the deep state is in check; it can only operate defensively.

This it does by putting up ever greater barriers to freedom of expression, movement and choice.

It knows it’s on the losing side, so has to pull all the tricks in the trade to make itself appear to be in control. It’s a psychological battlefield.

Edward Bernays, the founder of modern advertising, has had much to do with weaponising the powers of perception and deception. He found that you can get people to believe and do almost anything once you learn how to exploit their psyche with carefully chosen imagery and words.

Once you tap into people’s widespread subconscious attraction to the trappings of seductive consumables.

The deep state’s corporate/banker led ‘seeming’ global dominance draws on Bernays’s cunning, using advanced insights concerning how to influence the functions of different areas of the human brain.

The objective is to come up with a blanket like web of virtual signposting pointing to the direction life must go in in order to overcome some purposefully manufactured crisis. A crisis that is claimed will otherwise cook, starve or destroy people and the planet.

People in a state of funk take all this to be real, of course, and plod on with their tunnel vision acceptance of the pathological diktats of the status quo.

The deep state cabal has a mental hold over their perception of what is and is not true, and rolls out the moderators, fact checkers and ‘sudden silencers’ to counteract anything that emerges as an emissary of truth. Many of us have had firsthand experience of this executioner formula.

Nevertheless, ‘we the purposeful people’ are winning through. There is simply too much informative material on the loose for the thought/surveillance police to cover, in spite of their algorithmic interventions.

Their tactic is therefore to try to gain the upper hand by pushing harder on the ‘disaster agenda.’ This is exemplified by the global dissemination of the dystopian agenda laid out in Klaus Schwab’s Fourth Industrial Revolution.

The most ubiquitous cooked-up disaster is, of course, ‘man-made global warming’ – with its stated solution to be the Transhuman. All steps in between are sold as vital to advancing the speed and efficiency of the ‘human to inhuman’ transformation process.

The digitalisation of life is central to the architects of control argument that humanity is incapable of managing itself and that, without their intervention, the outcome will be the complete breakdown of planetary life.

Only a race of soulless computer assisted ‘super beings’ can save the day, say the likes of Yuval Noah Harari, Elon Musk and Klaus Schwab.

Consider how this agenda plays on the psychology of those who have yet to find in themselves the self-assurance to discard that which has no practical sense of purpose and no foundation in basic common sense.

The architects of control count on the majority remaining unresistant to the rolling out of their high-tech hegemonic master plan. So much so that they can freely announce that by following it “You will own nothing and you will be happy.”

In the psychological battle for truth, the perpetrators of the lie have access to a vast storehouse of mind-bending persuasion techniques to make their agenda seem the only choice.

They recognise that when a high percentage of individuals believe themselves to be unable to operate without a mobile phone – they will be sufficiently unfocussed and distracted so as to be unable to rebel against a fateful acceptance of slavery to the big brother of convenience.

Easily manipulated victims of digital mass hypnosis.

Here lies the rub: if the upwardly mobile urban ‘educated’ segment of society sees no problem conducting their lives within a credit card bubble of hypermarket convenience shopping, digital EMF communication systems, computer fed entertainment packages and a well-paid job in a global or trans national corporation – where is the resistance going to come from?

If this genre of people is already too far gone to register an internal kick when faced by a high-level plan to ‘happily’ have all their material assets taken away from them – then who or what is going to raise the alarm?

It looks to me as though only a small percentage of mankind can read the script being outlined for their future behind bars. Only a few can grasp the psychology of the insentient psychopath and his soulless urge to possess and control, at any price.

But once one moves outside the world of Godless urban shopping obsessed nine to fivers and ‘well-educated’ university trained job hunters, a potential to get real starts to emerge.

Amongst those working people who regularly get their hands dirty, who till the fields; build shelters; repair cars; mend pipes; fix electrics and dig drains, the virtual reality digital cybernetic future of the Fourth Industrial Revolution – and Green New Deal – looks like pure fantasy. The ravings of the unhinged.

They don’t need to mentally struggle in order to try to grasp the twisted logic being broadcast by the global media mafia. They simply know in their gut that it’s so much ‘bull’.

It is those who form the foundation of pyramid who hold society together. Who glue together the basic infrastructure which supports our daily lives. And it is from here that an increasing percentage reject the psychology of mental indoctrination and the promotion of a digitalised virtual future.

The ‘Throw out Green Deal’ remarkable, unified farmer uprisings happening in all parts of Europe and beyond are testimony to this. They are rising up against the imposition of phony ‘Net Zero by 2045’ rules that demand an end to farmers working the land and an end to the livestock that keep that land fertile.

These farmers are out in their tens of thousands. In Poland they are mounting month long tractor blockades of cities, supermarkets and border crossings. Coals miners, faced by being shut out by large scale ‘stop global warming’ redundancies, are joining the uprising.

Farmers say they will not cease their disruptions until their demands are met by government and by the EU.

This is the refreshingly undiluted language of genuine defiance.

It has the authorities rattled. Green Deal is, after all, the very backbone of the agenda to enslave us all to a Brave New World of synthetic everything – from food to nature to people.

The general public are in sympathy with the farmers’ actions.  Approximately 80% of European citizens are on their side according to opinion surveys.

Getting a solid core of consumers to rise up and participate in this bottom-up movement for the survival of real food and real farming will be vital to maintaining the momentum.

Coming from an unlikely place, a solid earthed uprising is gathering pace. The farmers’ demands are essentially for economic fairness, respect and recognition of the vital roll they play in the food security of the nation.

Under ‘Green Deal’ none of these demands are taken seriously. The WEF solution is not to support the agricultural community but to destroy it!

In the 2024 battle for truth, everyone should behave as resolutely as the farmers. The need is to be uncompromising in one’s face to face dealings with political liars and hypocrites.

We are the trustees of Planet Earth. In order to maintain its balance and equilibrium – we have no choice other than to enter into a pactless fight against all opposing forces.

Those who have land, can grow food and draw water from the well, are the last independent individuals on the planet. They are not about to capitulate to a bunch of psychos in Brussels, London, Warsaw, Washington or Paris – and nor are we.

Everyone’s life is dependent upon having access to nourishing food. Therefore, everyone’s life is dependent upon the survival and future prosperity of the farmer.

Support them now in their hour of need. Their need is also your need.

They have no future – and nor do we – without a lifesaving revolution that re-establishes the priorities for what is actually important in life. Think deeply about this and then act on it without delay.

And if you’re left in doubt – ask farmers who actually controls the food chain. Who is really in the driving seat when it comes to feeding the world?

Rise up, all good people. Take your destiny in both hands. Vigorously join together in forging a great victory for humanity over inhumanity.

Allowing oneself to slide into a state of abject slavery is a doctrine of the graveyard.

All those retaining some life-giving red blood corpuscles know that the road to truth accepts no compromise and can never be subverted by the orchestrated opium of mass indoctrination.

Julian Rose is an organic farmer, writer, broadcaster and international activist. 

 

Connect with Julian Rose

Cover image credit: European Commission (Christophe Licoppe)
Tractors parked and road traffic at a standstill in the European Quarter in Brussels, February 1, 2024 — creative commons




Nano Drug Delivery Systems in Smart Healthcare

Nano Drug Delivery Systems in Smart Healthcare

by Rosanne Lindsay, Traditional Naturopath, Nature of Healing
March 14, 2024

 

In the interest of answering questions generated by the article, ”Pretending to be Alternative,” I am expanding on nano delivery systems. Buckle your seatbelts!

Are all brands of Ivermectin alike?

There are many formulations of Ivermectin on the market. If Ivermectin is used ‘off-label’ then it can be prescribed for unapproved uses. Ivermectin was intended as an anti-parasitic medication, for repeated use, since it only kills adult parasites, not the eggs.

Several pharmaceutical companies manufacture and supply Ivermectin on a global scale. Unless you, as a patient, request the package insert of the drug, you will not necessarily know the specific lot# or ingredients to ask questions of the medical doctors who dispense them.

Today, as an ‘off-label’ drug, Ivermectin is sold for many different symptoms.  In Australia, since June 2023, the prescribing of oral ivermectin for ‘off-label’ uses will no longer be limited to specialists such as dermatologists, gastroenterologists and infectious diseases specialists. In the U.S., Ivermectin is still not FDA-approved to treat COVID.

Most people who choose to take Ivermectin, do so because it is marketed as “alternative” and is “not FDA-approved.” These phrases seem to hold special powers to some people, even though Ivermectin is still a pharmaceutical drug.

At the same time, pharmaceuticals have been upgraded to keep up with “advances” in technology.

Do All Ivermectin drugs contain Nano Lipid Particles (NLPs)?

Little is known about when lipid nanocarriers first appeared on the Ivermectin scene, but lipid and nano-drug delivery systems have been used in pharma-drugs since at least 1995. A 2017 study used nano lipid carriers as an Ivermectin delivery system for head lice.

Ivermectin was not well publicized before doctors began prescribing it ‘off-label,’ as an “alternative” treatment for COVID-19.

To assess the efficacy and safety of Ivermectin for COVID, a 2021 study reported: “Of the 41 study results contributed by included studies, about one third were at overall high risk of bias.”  The study concluded:

Overall, the reliable evidence available does not support the use ivermectin for treatment or prevention of COVID-19 outside of well-designed randomized trials.

Generally, if scientists are writing about a protocol in their research, it implies it is used in practice as an industry standard. How else are these drugs delivered to the right part of the body? A 1995 study described the Nano Lipid Carrier delivery method:

Nano lipid carriers are a delivery system composed of a solid matrix that contains liquid nano-fatty particles. These nanoparticles are approved by the Food and Drug Administration (FDA) and European Medicines Agency (EMA) and possess a controlled and continuous release capability, have a cellular dimension and are compatible with tissues and cells

Did Ivermectin, in 2021, contain NanoLipid Carrier (NPC)  Delivery Systems?

It is confusing to know for sure whether Ivermectin, or other “alternative” pharmaceutical drugs, of 2021 or earlier, used lipid nanoparticles as a drug delivery system. From the the 2019 study featured in my earlier article on Ivermectin, this statement is noted under “Methods:”

To overcome the limitations observed in some drug formulations and resistance, we used nano lipid carriers (NLCs) as a targeted and sustained drug delivery system for IVM.

This statement does not make known whether NLCs are standard practice in the market, or typical for this drug. However, we can assume this methodology is standard practice at least in the last few decades. According to this 2023 study:

Over the past several decades, liposomes have been extensively developed and used for various clinical applications such as in pharmaceutical, cosmetic, and dietetic fields, due to its versatility, biocompatibility, and biodegradability, as well as the ability to enhance the therapeutic index of free drugs.

Per this 2016 study: the authors wrote: “Nanomedicine is an emerging field that employs nanosized materials for applications in disease diagnosis and therapeutics. For example, nanotechnology-based methods and materials have been developed for the diagnosis and treatment of cancer. Nano-carrier delivery systems are also used in the treatment of Neuropsychiatric disorders and as targeted therapy in chronic diseases since 2019. Further, off-label medications for psychiatric disorders are frequently used for unapproved indications.

To be clear, my article on Pretender Alternatives focused on nanotechnology in general not only on NLCs. Whether products are lipid-based-nano or Beeswax-based-nano, it is still “nano.”

The doctors who prescribe nano-drugs are not trained in nanomedicine or their delivery systems. By plausible deniability, doctors can deny any knowledge of nanotech in their drugs. Thus, they are not responsible for disclosing known health effects of nanobots to patients.

Nano-electric Delivery Systems

Nano-medicine implies electronics.

In the 1990s, research conducted in the microelectronics industry was applied to the design of immunoassays, and since then the applications for immunoassays have expanded using nanotechnology.

This movement has been dubbed as microfluidic and lab-on-a-chip technology. Research in LOC systems is expected to extend towards downscaling of fluid handling structures as well, by using nanotechnology.

In 2024, the National Nanotechnology Initiative (NNI), celebrates 25 years of nanotechnology. That suggests 25 years in products, medicines, and food. It is also floats in the air as Smart Dust and microplastic rain.  Cloudy with a chance of plastics? The purpose of Smart Dust Smart rain, and Smart Healthcare is for wireless monitoring and surveillance.

Smart dust is a system of tiny electromechanical sensors that detect and wirelessly transmit real-time data from their environment. Measured at one cubic millimeter or less, these devices are dispersed in large quantities as a networked cluster suspended in mid-air.

Point of Care Diagnostics

Biosurveillance, through biosensors, implies remote access to the body as part of the global Smart Health evolution.  This happens through point of care diagnostics:

Glucose meters can also be used by diabetics at home to monitor levels and to adjust their insulin if necessary.

Biosensors are electrochemical transducers found on, and inside, the body that turn biological signals into wireless electrical signals. See Timeline here.

There is no reason to look for chip technology as RFID chips, or implantable chips. In a digital-nano world chips are invisible. Biosensors are now wireless and non-invasive, used in Point of Care applications to monitor people in biomedical healthcare settings such as Telehealth and Biotelemetry.

What about binders, such as zeolites? 

Zeolites are advertised to remove toxic metals by binding to them for removal from the body. Would zeolite be of assistance when it comes to nanotech?

The industry has already thought of that. Today, zeolite binds, while also building its own system.  Zeolites are used in many biomedical applications from detoxification to Diabetes and bone formation, including biosensors. This way, a biosensor map of the world can identify people in real-times, whether you are pharmaceutical-friendly or “alternative.” Biosensing is basis of Smart Delivery, Monitoring, Surveillance, and Healthcare.

Usage of zeolites improves characteristics of the biosensors. In particular, sensitivity, linear range, and limit of detection are enhanced.

Everyone must do their own research to understand the world of electronics, its applications, and its implications for the future of health.

 

Rosanne Lindsay is a Traditional Naturopath, Herbalist, Writer, and Author of the books The Nature of Healing, Heal the Body, Heal the Planet and Free Your Voice, Heal Your Thyroid, Reverse Thyroid Disease Naturally. Find her on Facebook at facebook.com/Natureofhealing. Consult with her remotely at www.natureofhealing.org.

 

Connect with Rosanne Lindsay, Traditional Naturopath

Cover image credit: CDD20


See related:

Pretending to be Alternative: Toxic Pharmaceuticals With “Intelligent Surfaces”




New International Coalition: Global Radiation Emergency

New International Coalition: Global Radiation Emergency

by Arthur Firstenberg, Cellular Phone Task Force
February 28, 2024

 

Global Radiation Emergency is a just-formed coalition of individuals, organizations and scientists on six continents whose mission is to save Planet Earth.  Birds are disappearing from our skies, bees from our flowers, insects from our forests, worms from our soils, animals from their dens, and health from our bodies.

Our coalition will be contacting leaders in science and medicine, directors of environmental organizations, law institutes, government officials, astronomers, universities, religious leaders, and groups representing parents, children and schools. Our website is radiationemergency.org.

The Electrosmog Policy Brief, so far in Englishfrançaisitalianosvenska and日本語will be our roadmap and our guideposts. The Radio Wave Packet, so far in Englishfrançaisnorsk and Nederlands, will be a basic tool with which to penetrate the wall of denial, to place wireless technology alongside climate change on the world’s agenda of greatest assaults on life and most immediate threats to survival.

If you or your organization wants to join our coalition, please send a message to Global Radiation Emergency on the contact page of the website.

Arthur Firstenberg
President, Cellular Phone Task Force

Subscribe to Cellular Phone Task Force newsletters.

 

Connect with Arthur Firstenberg website | substack

Cover image credit: Mysticsartdesign


See Related:

Rainbow Lorikeets Dropping From the Sky

5G, Satellites & the Global Wireless Rollout: On the Irradiation of Cats, Dogs, Birds & All of Our Natural World

Arthur Firstenberg: An Autumn’s Tale




Watchlisted: You’re Probably Already on a Government Extremism List

Watchlisted: You’re Probably Already on a Government Extremism List

by John & Nisha Whitehead, The Rutherford Institute
January 23, 2024

 

“In a closed society where everybody’s guilty, the only crime is getting caught.”
— Hunter S. Thompson

According to the FBI, you may be an anti-government extremist if you’ve:

a) purchased a Bible or other religious materials,

b) used terms like “MAGA” and “Trump,”

c) shopped at Dick’s Sporting Goods, Cabela’s, or Bass Pro Shops,

d) purchased tickets to travel by bus, cars, or plane,

e) all of the above.

In fact, if you selected any of those options in recent years, you’re probably already on a government watchlist.

That’s how broadly the government’s net is being cast in its pursuit of domestic extremists.

We’re all fair game now, easy targets for inclusion on some FBI watch list or another.

When the FBI is asking banks and other financial institutions to carry out dragnet searches of customer transactions—warrantlessly and without probable cause—for “extremism” indicators broadly based on where you shop, what you read, and how you travel, we’re all in trouble.

Clearly, you don’t have to do anything illegal.

You don’t even have to challenge the government’s authority.

Frankly, you don’t even have to care about politics or know anything about your rights.

All you really need to do in order to be tagged as a suspicious character, flagged for surveillance, and eventually placed on a government watch list is live in the United States.

This is how easy it is to run afoul of the government’s many red flags.

In fact, all you need to do these days to end up on a government watch list or be subjected to heightened scrutiny is use certain trigger words (like cloud, pork and pirates), surf the internet, communicate using a cell phone, limp or stutter, drive a car, stay at a hotel, attend a political rally, express yourself on social media, appear mentally ill, serve in the military, disagree with a law enforcement official, call in sick to work, purchase materials at a hardware store, take flying or boating lessons, appear suspicious, appear confused or nervous, fidget or whistle or smell bad, be seen in public waving a toy gun or anything remotely resembling a gun (such as a water nozzle or a remote control or a walking cane), stare at a police officer, question government authority, or appear to be pro-gun or pro-freedom.

We’re all presumed guilty until proven innocent now.

It’s just a matter of time before you find yourself wrongly accused, investigated and confronted by police based on a data-driven algorithm or risk assessment culled together by a computer program run by artificial intelligence.

For instance, a so-called typo in a geofence search warrant, which allows police to capture location data for a particular geographic area, resulted in government officials being given access to information about who went where and with whom within a two-mile long stretch of San Francisco that included churches, businesses, private homes, hotels, and restaurants.

Thanks to the 24/7 surveillance being carried out by the government’s sprawling spy network of fusion centers, we are all just sitting ducks, waiting to be tagged, flagged, targeted, monitored, manipulated, investigated, interrogated, heckled and generally harassed by agents of the American police state.

Without having ever knowingly committed a crime or been convicted of one, you and your fellow citizens have likely been assessed for behaviors the government might consider devious, dangerous or concerning; assigned a threat score based on your associations, activities and viewpoints; and catalogued in a government database according to how you should be approached by police and other government agencies based on your particular threat level.

Before long, every household in America will be flagged as a threat and assigned a threat score.

Nationwide, there are upwards of 123 real-time crime centers (a.k.a. fusion centers), which allow local police agencies to upload and share massive amounts of surveillance data and intelligence with state and federal agencies culled from surveillance cameras, facial recognition technology, gunshot sensors, social media monitoring, drones and body cameras, and artificial intelligence-driven predictive policing algorithms.

These data fusion centers, which effectively create an electronic prison—a digital police state—from which there is no escape.

Yet this crime prevention campaign is not so much about making America safer as it is about ensuring that the government has the wherewithal to muzzle anti-government discontent, penalize anyone expressing anti-government sentiments, and preemptively nip in the bud any attempts by the populace to challenge the government’s authority or question its propaganda.

As J.D. Tuccille writes for Reason, “[A]t a time when government officials rage against ‘misinformation’ and ‘disinformation’ that is often just disagreement with whatever opinions are currently popular among the political class, fusion centers frequently scrutinize peaceful dissenting speech.”

These fusion centers are the unacknowledged powerhouses behind the government’s campaign to censors and retaliate against those who vocalize their disagreement and discontent with government policies.

It’s a setup ripe for abuse.

For instance, an investigative report by the Brennan Center found that “Over the last two decades, leaked materials have shown fusion centers tracking protestors and casting peaceful activities as potential threats. Their targets have included racial justice and environmental advocates, right-wing activists, and third-party political candidates.”

One fusion center in Maine was found to have been “illegally collecting and sharing information about Maine residents who weren’t suspected of criminal activity. They included gun purchasers, people protesting the construction of a new power transmission line, the employees of a peacebuilding summer camp for teenagers, and even people who travelled to New York City frequently.”

This is how the burden of proof has been reversed.

Although the Constitution requires the government to provide solid proof of criminal activity before it can deprive a citizen of life or liberty, the government has turned that fundamental assurance of due process on its head.

Each and every one of us is now seen as a potential suspect, terrorist and lawbreaker in the eyes of the government.

Consider some of the many ways in which “we the people” are now treated as criminals, found guilty of violating the police state’s abundance of laws, and preemptively stripped of basic due process rights.

Red flag gun confiscation laws: Gun control legislation, especially in the form of red flag gun laws, allow the police to remove guns from people “suspected” of being threats. These laws, growing in popularity as a legislative means by which to seize guns from individuals viewed as a danger to themselves or others, will put a target on the back of every American whether or not they own a weapon.

Disinformation eradication campaigns. In recent years, the government has used the phrase “domestic terrorist” interchangeably with “anti-government,” “extremist” and “terrorist” to describe anyone who might fall somewhere on a very broad spectrum of viewpoints that could be considered “dangerous.” The ramifications are so far-reaching as to render almost every American an extremist in word, deed, thought or by association.

Government watch lists. The FBI, CIA, NSA and other government agencies have increasingly invested in corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram in order to identify potential extremists and predict who might engage in future acts of anti-government behavior. Where many Americans go wrong is in naively assuming that you have to be doing something illegal or harmful in order to be flagged and targeted for some form of intervention or detention.

Thought crimes programs. For years now, the government has used all of the weapons in its vast arsenal—surveillance, threat assessments, fusion centers, pre-crime programs, hate crime laws, militarized police, lockdowns, martial law, etc.—to target potential enemies of the state based on their ideologies, behaviors, affiliations and other characteristics that might be deemed suspicious or dangerous. It’s not just what you say or do that is being monitored, but how you think that is being tracked and targeted. There’s a whole spectrum of behaviors ranging from thought crimes and hate speech to whistleblowing that qualifies for persecution (and prosecution) by the Deep State. It’s a slippery slope from censoring so-called illegitimate ideas to silencing truth.

Security checkpoints. By treating an entire populace as suspect, the government has justified wide-ranging security checkpoints that subject travelers to scans, searches, pat downs and other indignities by the TSA and VIPR raids on so-called “soft” targets like shopping malls and bus depots.

Surveillance and precrime programs. Facial recognition software aims to create a society in which every individual who steps out into public is tracked and recorded as they go about their daily business. Coupled with surveillance cameras that blanket the country, facial recognition technology allows the government and its corporate partners to warrantlessly identify and track someone’s movements in real-time, whether or not they have committed a crime.

Mail surveillance. Just about every branch of the government—from the Postal Service to the Treasury Department and every agency in between—now has its own surveillance sector, authorized to spy on the American people. For instance, the U.S. Postal Service, which has been photographing the exterior of every piece of paper mail for the past 20 years, is also spying on Americans’ texts, emails and social media posts.

Constitution-free zones. Merely living within 100 miles inland of the border around the United States is now enough to make you a suspect, paving the way for Border Patrol agents to search people’s homes, intimately probe their bodies, and rifle through their belongings, all without a warrant. Nearly 66% of Americans (2/3 of the U.S. population, 197.4 million people) now live within that 100-mile-deep, Constitution-free zone.

Vehicle kill switches. Sold to the public as a safety measure aimed at keeping drunk drivers off the roads, “vehicle kill switches” could quickly become a convenient tool in the hands of government agents to put the government in the driver’s seat while rendering null and void the Constitution’s requirements of privacy and its prohibitions against unreasonable searches and seizures. As such, it presumes every driver potentially guilty of breaking some law that would require the government to intervene and take over operation of the vehicle or shut it off altogether.

Biometric databases. “Guilt by association” has taken on new connotations in the technological age. The government’s presumptions about our so-called guilt or innocence have extended down to our very cellular level with a diabolical campaign to create a nation of suspects predicated on a massive national DNA database.

Limitations on our right to move about freely. At every turn, we’re tracked in by surveillance cameras that monitor our movements. For instance, license plate readers are mass surveillance tools that can photograph over 1,800 license tag numbers per minute, take a picture of every passing license tag number and store the tag number and the date, time, and location of the picture in a searchable database, then share the data with law enforcement, fusion centers and private companies to track the movements of persons in their cars. With tens of thousands of these license plate readers now in operation throughout the country, police can track vehicles in real time.

The war on cash. Digital currency provides the government and its corporate partners with a mode of commerce that can easily be monitored, tracked, tabulated, mined for data, hacked, hijacked and confiscated when convenient. This push for a digital currency dovetails with the government’s war on cash, which it has been subtly waging for some time now. In recent years, just the mere possession of significant amounts of cash could implicate you in suspicious activity and label you a criminal. Americans are having their bank accounts, homes, cars electronics and cash seized by police under the assumption that they have been associated with some criminal scheme.

These programs push us that much closer towards a suspect society where everyone is potentially guilty of some crime or another and must be preemptively rendered harmless.

In this way, the groundwork is being laid for a new kind of government where it won’t matter if you’re innocent or guilty, whether you’re a threat to the nation, or even if you’re a citizen.

What will matter is what the government—or whoever happens to be calling the shots at the time—thinks. And if the powers-that-be think you’re a threat to the nation and should be locked up, then you’ll be locked up with no access to the protections our Constitution provides.

In effect, you will disappear.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, our freedoms are already being made to disappear.

 

Connect with The Rutherford Institute

Cover image credit: GDJ




Whitney Webb: “They’ve Been Planning This Cyber Attack for Years”

Whitney Webb: “They’ve Been Planning This Cyber Attack for Years”
Clayton Morris of Redacted interviews investigative journalist Whitney Webb 

by Redacted News
December 13, 2023

 



[Should this video be  taken down by Youtube, Whitney’s segment can be found in this full version at Rumble starting at 36:40.]

 

Transcript of video introduction by Clayton Morris:

“Is the deep state mafia setting up a massive cyber attack false flag on the American people that will disrupt the 2024 election?
Well, it turns out that the United States intel agencies have been running tabletop exercises on this exact scenario. And now the Department of Homeland Security head, Mayorkas, says the greatest cyber threat to America is something called Killware.
So what’s really going on here? Are we being set up for a massive false flag?
And investigative journalist Whitney Webb has been writing
about these cyber attack tabletop exercises for years. And she’s been exposing what they’ve been up to. And then this week, we had a crazy “cyber attack” that seemed to shut down half the internet this week. Banks. Rumble was down.
What exactly is going on here? Are we being played like a fiddle?”

 

Connect with Redacted News at Youtube | Rumble

Connect with Whitney Webb at Unlimited Hangout

Cover image credit: cliff1126




Arthur Firstenberg: An Autumn’s Tale

Arthur Firstenberg: An Autumn’s Tale

by Arthur Firstenberg, Cellular Phone Task Force
December 12, 2023

 

Imagine a world in which everyone was convinced to point a musical gun at their head, which shot a continuous stream of tiny bullets, so small that they caused no pain. But every bullet destroyed brain cells on its way through the skull. Imagine millions of gun towers strafing the surface of the earth 24/7 with similar bullets, entertaining the people while destroying all life.

And all the plants and animals were sickening and dying, and the humans were sick and having strokes and heart attacks, but because the bullets were so tiny, few people realized why. Plant biologists blamed the decline on acid rain. Ornithologists blamed influenza. Entomologists blamed climate change and pesticides. The medical profession blamed diet and lack of exercise, and an ever-expanding list of bacteria and viruses.

And here and there, a very few people were screaming, STOP! THROW AWAY YOUR GUNS! TAKE DOWN THE GUN TOWERS! DISABLE THE SATELLITES THAT ARE STRAFING THE EARTH! But because everyone was busy listening to the music, they paid no attention. And the people screaming, who were also sick and having strokes and heart attacks, went to their doctors who, instead of sounding a worldwide alarm, told their patients “You must be gun sensitive” and gave them tranquilizers and antidepressants so they would go away and stop screaming.

And so these people concluded there must be something wrong with them. They formed support groups for people with gun sensitivity, and asked the rest of the world to please take pity on them and stop shooting them. And when there was no place left in the world that was not being strafed, they pleaded with their governments to please establish refuges where they could live out their lives free from bullets. But no one took them seriously.

______________

That is the world we live in today.

“Electromagnetic hypersensitivity” (EHS) is a term that allows doctors to pretend that electricity is harmless, and that radiation does not injure their patients. It allows people who have discovered they can feel electricity and radiation to pretend that there is something wrong with them and that everyone else does not feel it. It allows environmentalists to pretend that the vanishing of birds and wildlife and the collapse of the Earth’s life support systems are due to something else. And it allows people who use cell phones to pretend they do not feel the radiation and that their insomnia, headaches, joint pains, digestive problems, panic attacks, memory loss, tinnitus, nosebleeds, high blood pressure, heart failure, neurological problems, and diabetes are caused by something else.

It is late autumn here in Santa Fe.

And it is late autumn in the life of the Earth. We must prevent winter from coming, for there will be no spring if it does. It is up to all of us.

Arthur Firstenberg
President, Cellular Phone Task Force
Author, The Invisible Rainbow: A History of Electricity and Life
P.O. Box 6216
Santa Fe, NM 87502 USA
phone: +1 505-471-0129
arthur@cellphonetaskforce.org


JOIN The Network of PEOPLE WITHOUT CELL PHONES
The only way to diminish the demand for bandwidth that is turning the Earth into a giant computer, with all living beings electrocuted inside of it, is to stop using cell phones. Not to use them less frequently, but to throw them away. The ability to use them, no matter how infrequently, requires the entire planet to be irradiated. Please join our network by forming a local chapter where you live.

You can set your own rules, but it is important to have meetings in person. Please contact me if you need help and let me know that you are doing it.

Our goal is to establish an expanding global presence of communities that do not use cell phones.

 

Connect with Arthur Firstenberg

Cover image credit: MikeGoad




5G, Satellites & the Global Wireless Rollout: On the Irradiation of Cats, Dogs, Birds & All of Our Natural World

5G, Satellites & the Global Wireless Rollout: On the Irradiation of Cats, Dogs, Birds & All of Our Natural World

 

“If I were a pet owner with one or two pets it would be dismissed but not when for 23 years we run a perfect pet sanctuary and all of a sudden many injuries, it is obvious something is wrong in the skies. We are off the grid, no cell phones and the router is turned off at night. We survived without cell phones and all of this high tech killing technology.”

 

Dogs, Cats, Birds, and Maui

by Arthur Firstenberg, Cellular Phone Task Force
December 5, 2023

 

Cat with radio transmitter

In response to my last newsletter, “Don’t irradiate the birds!,” readers have sent me accounts from far and wide of what has been happening not only to the insects, birds, plants, etc., but also to their pets from being irradiated. I have also discovered more information about the birds of Maui — information that makes the case for radiation killing the birds, and not malaria, even more compelling.

Update on Birds of Maui

The bird in my last newsletter called WILD1 — the one who disabled his radio transmitter less than a day after his release into the forest — was seen, alive and very healthy, on July 23, 2021, 632 days after being released! This was reported in the Honolulu Star Advertiser and in The Maui News. Here is my updated newsletter, amended accordingly: https://cellphonetaskforce.org/dont-irradiate-the-birds/.

Irradiated Dogs and Cats

Sidnee from California writes:

“A cat appeared one day with a tracking device on a harness. I wrapped the device in aluminum foil and taped a note on the back, telling whoever was the owner that he or she was harming his cat with that device. I included my phone number. A man called me and we chatted. Turns out the cat lived in the house behind me. I told him that the wireless radiation would be making his cat sick, but he didn’t care. His response? ‘He’s an expensive cat and he likes to wander. I need to know where he goes.’

“The Tile Tracker works with Bluetooth. I measured the RFR [radio frequency radiation]. It ranged from the hundreds of thousands to 2.5 million μW/m2. And the cat wore this all the time. He was so skinny, hyperactive and aggressive toward my own sweet orange kitty.”

The neighbor’s cat, like some of the birds on Maui, kept managing to remove his transmitter. The owner put a different transmitter on him, this time made by Apple. Sidnee continues:

“Good news. Since the cat kept losing the trackers, the owner has finally given up and the cat has no more devices on his harness! What a different cat! He is mellow, sweet and gets along great with my orange kitty, who is 17 years old.”

Stacy in the Netherlands tells what she has observed in nature, in her cats, and in herself, since the advent of 5G: 

“I have seen a kill-off of insects since 5G has been rolled out. I had 3 ant nests in my house and balcony, they are all dead now and I didn’t do anything. Also my plants on my balcony have not been visited by bees or any insects for that matter.

“Also lots of plants did poorly, the tops of the plants looked like they had been irradiated from the sky, the leaves clumped together, turned and died.

“I have also noted that in the evening I wake up feeling like I have been choked, my mouth and throat completely dried, my lips parched and I can drink a lot of water but it leaves my body very rapidly. I also suffer from a lot of hair loss as do my cats, they have bald patches and I buy them the best of food I can find. I have never had cats with bald patches before, they say it’s old age but it’s not true. I have it with both cats, a male and a female.

“I also notice food does not taste the same any more. I always loved fruit but it has lost its lustre. It also looks withered, less yummie/eat me. It’s like the light has gone out of things and a darkness has entered and for the first time in my life I am worried to the bone and scared.”

Richard in Houston reports a drastic decline in both birds and insects: 

“In Houston this year almost all the birds are gone. There used to be hundreds of doves, this year I have seen ONE. The only other birds I have seen are some blue jays which I feed daily and a hawk which preys upon them. I have fed birds for many years and always had a host of them. This year only the squirrels and rats are eating the bird food. The sky is almost empty of birds.

“The bees have disappeared as well. From hundreds last year to one or two this year.

“The lives of birds and Earth are way more important than the ‘convenience’ of deadly cell phones.”

Smart Bird Feeders

Robyn from Colorado alerted me to smart bird feeders, which several companies are now marketing. She writes: 

“I noticed an advertisement today from our local hardware store for a Smart Feeder made by Feit Electric. This device sends pictures of the birds at a feeder directly to someone’s phone. I couldn’t help but think about how dangerous this exposure might be to birds who come for birdseed. Or maybe in their infinite intelligence, they don’t come near it.”

Here are pictures of three different companies’ smart feeders:

The Effects of Starlink Dishes

Mary from Guffey, Colorado, who has an animal sanctuary at 9,000 feet in the Rockies, tells a story very similar to the one Mark Broomhall told UNESCO (see previous newsletter). A deterioration in the health of all the animals has accompanied each advance in wireless communication. A cell tower provided the first cell phone service in that remote location 10 years ago. The tower was upgraded about 2 years ago. And most people in Guffey got a Starlink satellite dish this past summer. “Just about everyone in Guffey has one”, says Mary. She wrote the following on November 6:

“I live at 9000 feet in Guffey, Colorado. Have for 24 years. Starting about 10 years ago I noticed strange things happening on our animal sanctuary. I would find a cat dead, not killed by an animal, not sickly. About 2 years ago it became even worse. Because we have an animal sanctuary we need to keep good care of these animals, not because of legal ramifications but because that is how it should be. This past year and a half has been worse. My vets believe me because we have so many animals that they have treated seeing no natural reasons for their injuries.

“This past month while walking 2 dogs, one was on leash and one can run around and have fun. That night I noticed the dog on a leash was walking strangely, but my husband had no idea why. The next morning when I went to the cat condo to feed the cats I found one lying in a corner in a pool of urine. When I when to pick her up her skin felt like it was detached from her body. Another cat was making loops around the condo. Round and round. I hurried back to the house to call the vets and told my husband I think the animals have been hit by emf’s. He asked me what I meant. I said like someone hitting you on the back. His reply was ‘Is that what happened?’ I asked him what he meant and he said while walking the dog he felt like someone had hit him but when he looked around there was nothing there.

“By then the dog who was on the leash was walking round and round chasing her tail. I then hurried to the chicken coop to see if they were all right. I found a lovely hen lying dead on the ground in the enclosed run. It looked like she had been dropped from up high but there was nothing there to fall from. The rooster seemed in a daze. I took the cat who was critically injured to the vet and had to be put down, was told to get cbd from a Vet CBD company as they formulate the meds specifically for animals, and was told that the dog was suffering from neurological problems, had developed eye problem and a massive ear infection. We will probably have to euthanize her before the end of the year. The rest of the hens are no longer laying eggs except one a day, down from 10 to 12 per day. All of this in a matter of one day and continuing onward.

“Now in addition to our problem a friend in Divide which is also at 9000 feet said while out playing with their dog and three of their neighbors and their dogs, the dogs got sick and the other people took their dogs to the vet, could find nothing physically wrong and they put the dogs down. My friend is still treating her dog with holistic methods. As an afternote, I have taken 8 cats into the vet due to weight loss and just not looking right. All cats lost from 1 to 2 pounds, blood work found no problems other than stress. We will have to probably put a couple of the cats down if I cannot get them better.

“We allow another non-profit to graze some horses on our 250-acre sanctuary and one of her old horses had to be put down due to cancer. I was talking with the gravedigger while waiting for the lady to come to put her horse down and told him about the problems we had with the animals. He just looked at me and said his chickens were doing the same as mine. If they laid an egg they were soft shell and few eggs. I asked him how long and he said it started about 3 weeks ago.

One of numerous Starlink dishes in Guffey

“If I were a pet owner with one or two pets it would be dismissed but not when for 23 years we run a perfect pet sanctuary and all of a sudden many injuries, it is obvious something is wrong in the skies. We are off the grid, no cell phones and the router is turned off at night. We survived without cell phones and all of this high tech killing technology.”

Starlink is 5G phased array technology from the sky. When a Starlink dish is online, that means a satellite is aiming a narrow beam at it. But by the time the beam reaches Earth from a few hundred miles up in space, the beam can be 8 miles in diameter or more. The dish also aims a beam of radiation directly at the satellite, and scatters radiation around it. If there are a lot of dishes in a 10-mile radius, as there are in Guffey, radiation from Earth and space is scattered far and wide.

 

Connect with Arthur Firstenberg

Cover image credit: Pheladiii


See Related:

Humans, Bees and Wildlife in 2023 — Smart Cities Are Killing All Life

Global Extent of Bird Armageddon: Avian Flu or Radiation?

Amphibians in the Mine: “The Frogs and Salamanders Are Telling Us…It Is a Matter of Their Survival and Ours.”

After Being Fitted With Cell Phones, Horses at Churchill Downs Began to Die During Races

Arthur Firstenberg: Update on Satellites, Birds and Bones

Arthur Firstenberg: Ecocide From Space




Beyond Orwell’s 1984, 5G and the Launching of 6G: “Easy to Take Down a Society that Is Digital”

Beyond Orwell’s 1984, 5G and the Launching of 6G: “Easy to Take Down a Society that Is Digital”

 

People, do not be fooled. It is a confrontation between the powerful elites, namely the Financial, Military, IT, Media, Pharma Complex (FMIMPC) and the We the People, namely Humanity acting Worldwide at the Grassroots of Society.”

 

Beyond Orwell’s 1984, 5G and the Launching of 6G: “Easy to Take Down a Society that Is Digital”. UNCTAD Attempts Accomplishing this Doom Scenario

by Peter Koenig, Global Research
November 19, 2023

 

“Hell is Empty and the Devils are All Here”. 
~ William Shakespeare, “The Tempest”, 1623
Peter Koenig’s Contemporary Analysis of “The Tempest 2020-2030”

 

From 5G to 6G

We, the People, are in a race against the Globalists committed to Depopulation; control the survivors, exploit us, dehumanize us, and ultimately digitize us, so that we can be remotely controlled by 5G;

And, now, just “launched” by China, 6G. See China launches ultra-high-speed next-generation Internet backbone – SHINE News.

 Incidentally, has the health impact of 6G been studied? Maybe. But nobody divulges the results.

This is how Qualcomm describes 5G:

5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices. See this.

Nobody has openly spoken about the health impact of 5G, though, that has been studied. Yet, the studies are not revealed to the public.

Beyond George Orwell’s 1984 

There is “guessing”; and scientists who come forward with the truth depicting the impact caused on wildlife and humans by these ultra-microwaves, are most often labeled “conspiracy theorists.” 

This is the “shut-up” phrase for everything the mainstream, the Cabal, the Matrix, the Globalists do not want the public to know. We are way beyond George Orwell’s “1984.”

The 6th Generation Mobile Network or 6G is about 100 times faster, more powerful, than 5G. It will be able to digitize everything. 

This is what RantCell has to say about 6G:

It is Operating at terahertz frequency bands, 6G will deliver a peak data rate of 1,000 gigabits/s having air latency less than 100 microseconds. When we talk about 5G vs 6G network speed, 6G speed is expected to be 100 times faster than 5G with enhanced reliability and wider network coverage. See this. 

We, the People, are in a race – life against death. If we wake up and counteract, the Globalist’s, namely the project of the diabolical protagonists of UN Agenda 2030 and The Great Reset will “be doomed”.

But if we keep letting us being duped, We, the People, “Will go to Hell”.  

This is the reason why the entire UN system is desperate to get the world digitized. The faster the better so, there may be not enough time for We, the People, to wake up in masses to take our world, our lives back before it is too late.

The Financial, Military, IT, Media, Pharma Complex Nominates UNCTAD  

Therefore, the United Nations, the political body under full control of the Globalist Cabal (openly led by Washington), but really, by the powerful Financial, Military, IT, Media, Pharma Complex (FMIMPC), has nominated one of its under-agents, the UN Conference on Trade and Development (UNCTAD) as the flag-carrier – at least for now – for the deadly onslaught of All-Digitization.

UNCTAD –in blatant derogation of its historical mandate on behalf developing countries, namely the Global South–, will level the playing field, as the saying goes, on behalf of the entire UN System by announcing in a Press Release in Geneva on 15 November 2023, its e-Week from 4 to 8 December 2023, in a major revamp of its annual e-Commerce Week series which began in 2016.

UNCTAD’s Secretary-General, Rebecca Grynspan said,

“The digital economy plays a critical role in advancing development goals at all levels. Through inclusive and multi-stakeholder discussions, we can together build a global digital future that works for all.” 

UNCTAD’s infamous e-Week is called

“UNCTAD e-Week 2023 to Mobilize Global Support for a More Inclusive Digital Economy.”

Sub-titled:

“More than 3,000 stakeholders from 130 countries will examine how to turn digital opportunities into shared development gains and close existing divides for a sustainable future.”

The text of the Press Release abounds in sloganism, niceties and “noneties” (senseless talk for the “sold to the system gnomes”).

For example…. 

“The Conference is themed for “Shaping the Future of the digital economy”. The topics will feature over 150 sessions focused on tackling pressing issues related to digitalization. Key topics will range from platform governance, the development impact of artificial intelligence (AI), eco-friendly digital practices, to empowering women through digital entrepreneurship and accelerating digital readiness in developing countries.”

This intro-phrase hardly misses one of meaningless globalist jargons, that are now current and circulate in the minds of people, without them giving a second thought of what they really mean. 

Wait a minute, they forgot the term “sustainable”. Surely, it will appear later in the text.

UNCTAD and the “Digital Playing Field”

Very Important Persons (VIP) attending. They also talk about several high-level speakers like Amandeep Sing Gill, the UN Secretary General’s Envoy on Technology; Nizar Ben Neji, Tunisa’s minister of communication and technologies; as well as Henry Puna, Secretary General of the Pacific Islands Forum; and many more IT-VIPs.

The AI Potential. They are not missing out on Tapping the Artificial Intelligence (AI) potential, reminding the world that time is of the essence as the world navigates uncertainties surrounding emerging technologies, including the rapid uptake of AI, which is increasingly revolutionizing the digital economy.

It is clear – our future, the People’s future, is being planned as a digital future. And that, without any consultation. The UN body and those who pull its strings are planning to decide for We, the People. But only if we let them.

Leveling the digital playing field will concentrate on the massive data flows from the digital economy, call for global governance responses to market concentration and unequal distribution of benefits. 

They say that over 70% of the global digital advertising revenue goes to just five digital platforms.

So, what are they planning to do about it? Nothing. Because these five digital platforms control already the world – Alphabet, Amazon, Apple, Meta and Microsoft. These behemoths control about 9 trillion dollars-worth of IT communication. And now add “X” (former Twitter) and the horizon for change looks ultra-bleak, especially not by a minor UN body, called UNCTAD. 

This is by far not all.

On the agenda also is another slogan: Harnessing the digital promise, which predicts and promises that the data-driven digital economy holds vast potential for countries to spur economic growth, foster innovation and reduce geographic and physical barriers to inclusive development.

Here is the final icing on the cake:

Digitalization for development – the UNCTAD e-Week platform for constructive and inclusive dialogue is to generate insights and actions that can feed into global efforts, particularly the ongoing UN Global Digital Compact, aimed at catalyzing an open, free, and secure digital future for all, leading up to the UN’s 2024 Summit of the Future.

And for all of that, they need Stronger partnerships; especially with multiple global crises unfolding on geopolitical, economic and climate fronts, countries must make critical decisions to chart digitalization paths for equitable and sustainable development.

They may be talking about the unethical and illegal 2019 compact between Klaus Schwab’s World Economic Forum (WEF) and the United Nations as well as the wantonly man-made worldwide wars and conflicts, chaos, and killings, just to keep the population at bay, confused and distracted. 

This completes the sloganism: Equitable and sustainable is not forgotten.

“Taking Down a Society That Is Digital”

When reading between the lines and beyond the slogans and digital jargon propaganda, it is not difficult to see that we are ever-more rapidly moving towards digital enslavement.

Consider what Tucker Carlson has to say in a recent interview that it is easy to “Take Down a Society That is Digital.”

Think about it.

If everything around us is run by digital signals that are controlled by the “Globalist Cabal” (namely the FMIMPC) one or a few switches can turn off our different networks:

  • water supply, electricity, gas, all kinds of energy,
  • food supply,
  • fuel deliveries,
  • traffic signals,
  • all transportation,
  • all communication,
  • the money in our accounts, and much more.

The impacts on people’s lives are beyond description. It does not need a nuclear explosion to implement its depopulation agenda, or the so-called “useless eaters” (a quote from WEF’s Israeli Yuval Noah Harari), that could also endanger those who control the switches. 

And We, the People, would be completely powerless. 

Listen to Tucker Carlson’s interview (start at 05:00).

Video



By now, it should be clear to all of us what is being gradually and, in many ways, imperceptibly prepared for us, We, the People, is “Pure Evil”.

It is, We, who are in the Matrix. The Elites that control the few switches to run the End Game are outside the Matrix. They will keep their supply lines open – of everything, hoping to live in paradise where, We, the People, own nothing but are happy. 

They remote control the Matrix. We self-proclaimed “red-pilled” people thought we were outside and could watch the chaos being created inside.

It is the other way around.

People, do not be fooled. It is a confrontation between the powerful elites, namely the Financial, Military, IT, Media, Pharma Complex (FMIMPC) and the We the People, namely Humanity acting Worldwide at the Grassroots of Society.


Peter Koenig is a geopolitical analyst and a former Senior Economist at the World Bank and the World Health Organization (WHO), where he worked for over 30 years around the world. He is the author of Implosion – An Economic Thriller about War, Environmental Destruction and Corporate Greed; and co-author of Cynthia McKinney’s book “When China Sneezes: From the Coronavirus Lockdown to the Global Politico-Economic Crisis” (Clarity Press – November 1, 2020). 

Peter is a Research Associate of the Centre for Research on Globalization (CRG). He is also a non-resident Senior Fellow of the Chongyang Institute of Renmin University, Beijing. 

 

Connect with Global Research

Cover image credit: Bluemoont




Trouble in Toyland: How the $16 BILLION “Smart Toys” Industry Spies on Your Children and Makes Their Data Available to Child Traffickers

Trouble in Toyland: How the $16 BILLION “Smart Toys” Industry Spies on Your Children and Makes Their Data Available to Child Traffickers

by Brian Shilhavy, Vaccine Impact
November 18, 2023

 

If your end-of-year holiday traditions include buying presents for your children and grandchildren, please avoid high-tech toys such as the growing “smart toy” sector with toys connected to the Internet. These “toys” are mainly data collection tools to collect as much information on your children as possible, including their location.

It is a dream scenario for child traffickers.

The publication “Trouble in Toyland” by the U.S. PIRG Education Fund has just published their 2023 report with a significant section on “smart toys”.

Excerpts from their Executive Summary:

Last month, an 11-year-old girl was kidnapped by a man she encountered while playing a game online. Fortunately, she was found safe a short time later, about 135 miles away from her home. The game, Roblox, is one of the most popular mobile games this year.

This past spring, the Federal Trade Commission accused Amazon of violating the Children’s Online Privacy Protection Act Rule (COPPA) through its Alexa service by keeping the voice recordings of children indefinitely and failing to delete childrens’ transcripts, even when a parent requested they be deleted. Amazon also gathered geolocation data and used childrens’ transcripts for its own purposes.

A few years ago, Fisher Price’s Smart Toy Bear was discontinued. It was created for children ages 3 through 8 as “an interactive learning friend that talks, listens, and ‘remembers’ what your child says and even responds when spoken to,” according to WeLiveSecurity. But research found a security flaw in the app would allow hackers to get information about children without permission.

This toy bear is not an isolated case. Multiple toys from major manufacturers have been discontinued in recent years after research from various groups showed that children’s voices, images, locations and other information was being improperly collected or hacked. In other cases, vulnerable toys are still for sale.

These days, we’re surrounded by smart devices – all of these things with microphones, cameras, connectivity, location trackers and more. These devices connect to the internet and/or to the outside world, and  they gather and store data, sometimes very poorly. Our children’s holiday gift wish lists may be filled with stuffed animals that listen and talk, devices that learn their habits, games with online accounts, smart  speakers and watches, or all kinds of toys that require you to download an app.

The global market for smart toys grew from $14.1 billion in 2022 to $16.7 billion this year, according to a large market research firm. The business of smart toys is expected to more than double by 2027.

Download the full report.

 

Connect with Vaccine Impact

Cover image credit: nikscoop




We the Exploited: The U.S. Government Buys and Sells Its Citizens for Profit and Power

We the Exploited: The U.S. Government Buys and Sells Its Citizens for Profit and Power

by John & Nisha Whitehead, The Rutherford Institute
November 15, 2023

 

Americans have become easy prey for hackers, scammers, snitches, spies, and con artists.

But don’t be fooled into thinking the government is protecting you.

To the contrary, the U.S. government is selling us (or rather, our data) to the highest bidders.

By the way, those highest bidders also include America’s political class and the politicians aspiring to get elected or re-elected. As the Los Angeles Times reports, “If you have been to a political rally, a town hall, or just fit a demographic a campaign is after, chances are good your movements are being tracked with unnerving accuracy by data vendors on the payroll of campaigns.”

Your phones, televisions and digital devices are selling you out to politicians who want your vote.

“Welcome to the new frontier of campaign tech — a loosely regulated world in which simply downloading a weather app or game, connecting to Wi-Fi at a coffee shop or powering up a home router can allow a data broker to monitor your movements with ease, then compile the location information and sell it to a political candidate who can use it to surround you with messages,” writes journalist Evan Halper.

In this way, “we the people” have been reduced to economic units to be bought, bartered and sold by all and sundry.

On a daily basis, Americans have been made to relinquish the most intimate details of who we are—our biological makeup, our genetic blueprints, and our biometrics (facial characteristics and structure, fingerprints, iris scans, etc.)—in order to navigate an increasingly technologically-enabled world.

Those intimate details, in turn, have become the building blocks of massive databases accessed by the government and its corporate partners in crime, vulnerable to data breaches by hackers, cyberattacks and espionage.

For years now, and with little real oversight or restrictions, the government has been compiling massive databases comprised of all manner of sensitive information on the citizenry.

Biographical information. Biometric information. Criminal backgrounds. Travel records.

There is not a single person in the U.S. who is not in some government database or another, and these databases are increasingly being shared between agencies, fusion centers, and the police.

The government has also, with little oversight and few guidelines, been adding to its massive trove of data on Americans by buying commercially available information (CAI) from third-party sources. As a report by the Office of the Director of National Intelligence revealed:

“[Commercially purchased data] can reveal sensitive and intimate information about the personal attributes, private behavior, social connections, and speech of U.S. persons and non-U.S. persons. It can be misused to pry into private lives, ruin reputations, and cause emotional distress and threaten the safety of individuals. Even subject to appropriate controls, CAI can increase the power of the government’s ability to peer into private lives to levels that may exceed our constitutional traditions or other social expectations.”

In other words, this is the diabolically sneaky way in which the government is attempting to sidestep the Fourth Amendment, which requires that government agents have probable cause and a warrant before spying on Americans or searching and seizing their private property.

It’s bad enough that the government is building massive databases comprised of our personal information without our knowledge or consent, but then they get hacked and we suffer for it.

Earlier this year, for instance, several federal agencies, state governments and universities were targeted in a global cyberattack that compromised the sensitive data of millions of Americans.

Did that stop the government’s quest to keep building these databases which compromise our privacy and security? Of course not.

In fact, the government has also been selling our private information. According to Vice, Departments of Motor Vehicles in states around the country have been selling drivers’ personal information “to thousands of businesses, including private investigators who spy on people for a profit.”

Where there’s a will, there’s a way, and the government has become a master at finding loopholes that allow it to exploit the citizenry.

Thus, although Congress passed the Driver’s Privacy Protection Act (DPPA) in 1994 to prevent the disclosure of personal information, it hasn’t stopped state DMVs from raking in millions by selling driver data (names, dates of birth, addresses, and the cars they own) to third parties.

This is just a small part of how the government buys and sells its citizens to the highest bidders.

The why is always the same: for profit and power, of course.

Welcome to the age of surveillance capitalism.

Have you shopped at Whole Foods? Tested out target practice at a gun range? Sipped coffee at Starbucks while surfing the web? Visited an abortion clinic? Watched FOX News or MSNBC? Played Candy Crush on your phone? Walked through a mall? Walked past a government building?

That’s all it takes for your data to be hoovered up, sold and used to target you.

Incredibly, once you’ve been identified and tracked, data brokers can travel back in time, digitally speaking, to discover where you’ve been, who you’ve been with, what you’ve been doing, and what you’ve been reading, viewing, buying, etc.

Once you’ve been identified in this way, you can be tracked endlessly.

No one is spared.

In this regard, we are all equals: equally suffering the indignity of having every shred of privacy stripped away and the most intimate details of one’s life turned into fodder for marketers and data profiteers.

This creepy new era of for-profit surveillance capitalism—in which we’re being listened to, watched, tracked, followed, mapped, bought, sold and targeted—is made possible with our cooperation.

All those disclaimers you scroll though without reading them, the ones written in minute font, only to quickly click on the “Agree” button at the end so you can get to the next step—downloading software, opening up a social media account, adding a new app to your phone or computer—those signify your written consent to having your activities monitored, recorded and shared.

Think about it.

Every move you make is being monitored, mined for data, crunched, and tabulated in order to form a picture of who you are, what makes you tick, and how best to influence and/or control you.

With every smartphone we buy, every GPS device we install, every Twitter, Facebook, and Google account we open, every frequent buyer card we use for purchases—whether at the grocer’s, the yogurt shop, the airlines or the department store—and every credit and debit card we use to pay for our transactions, we’re helping Corporate America build a dossier for its government counterparts on who we know, what we think, how we spend our money, and how we spend our time.

The technology has advanced so far that marketers (political campaigns are among the worst offenders) can actually build “digital fences” around your homes, workplaces, friends and family’s homes and other places you visit in order to bombard you with specially crafted messages aimed at achieving a particular outcome.

If anyone else stalked us in this way—tailing us wherever we go, tapping into our calls, reading our correspondence, ferreting out our secrets, profiling and targeting us based on our interests and activities—we’d call the cops.

Unfortunately, the cops (equipped with Stingray devices and other Peeping Tom technologies) are also in on this particular scam.

It’s not just the surveillance and the buying and selling of your data that is worrisome.

The ramifications of a government—any government—having this much unregulated, unaccountable power to target, track, round up and detain its citizens is beyond chilling.

Imagine what a totalitarian regime such as Nazi Germany could have done with this kind of unadulterated power.

Imagine what the next police state to follow in Germany’s footsteps will do with this kind of power. Society is definitely rapidly moving in that direction.

We’ve made it so easy for the government to stalk us.

Government eyes see your every move: what you read, how much you spend, where you go, with whom you interact, when you wake up in the morning, what you’re watching on television and reading on the internet.

Every move you make is being monitored, mined for data, crunched, and tabulated in order to form a picture of who you are, what makes you tick, and how best to control you when and if it becomes necessary to bring you in line.

Chances are, as the Washington Post has reported, you have already been assigned a color-coded threat assessment score—green, yellow or red—so police are forewarned about your potential inclination to be a troublemaker depending on whether you’ve had a career in the military, posted a comment perceived as threatening on Facebook, suffer from a particular medical condition, or know someone who knows someone who might have committed a crime.

In other words, you might already be flagged as potentially anti-government in a government database somewhere—Main Core, for example—that identifies and tracks individuals (so they can be rounded up and detained in times of distress) who aren’t inclined to march in lockstep to the police state’s dictates.

The government has the know-how.

As The Intercept reported, the FBI, CIA, NSA and other government agencies are increasingly investing in and relying on corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram in order to identify potential extremists and predict who might engage in future acts of anti-government behavior.

Surveillance, digital stalking and the data mining of the American people—weapons of compliance and control in the government’s hands, especially when the government can listen in on your phone calls, monitor your driving habits, track your movements, scrutinize your purchases and peer through the walls of your home—add up to a society in which there’s little room for indiscretions, imperfections, or acts of independence.

This is the creepy, calculating yet diabolical genius of the American police state: the very technology we hailed as revolutionary and liberating has become our prison, jailer, probation officer, stalker, Big Brother and Father Knows Best all rolled into one.

It turns out that we are Soylent Green.

The 1973 film of the same name, starring Charlton Heston and Edward G. Robinson, is set in 2022 in an overpopulated, polluted, starving New York City whose inhabitants depend on synthetic foods manufactured by the Soylent Corporation for survival.

Heston plays a policeman investigating a murder, who discovers the grisly truth about the primary ingredient in the wafer, soylent green, which is the principal source of nourishment for a starved population. “It’s people. Soylent Green is made out of people,” declares Heston’s character. “They’re making our food out of people. Next thing they’ll be breeding us like cattle for food.”

Oh, how right he was.

Soylent Green is indeed people or, in our case, Soylent Green is our own personal data, repossessed, repackaged and used by corporations and the government to entrap us.

We, too, are being bred like cattle but not for food.

Rather, as I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, we’re being bred, branded, bought and sold for our data.

As the insidious partnership between the U.S. government and Corporate America grows more invasive and more subtle with every passing day, there’s virtually no way to opt out of these assaults on your digital privacy short of being a modern-day Luddite, completely disconnected from all technology.

What we desperately lack and urgently need is an Electronic Bill of Rights that protects “we the people” from predatory surveillance and data-mining business practices.

Without constitutional protections in place to guard against encroachments on our rights in the electronic realm, it won’t be long before we find ourselves, much like Edward G. Robinson’s character in Soylent Green, looking back on the past with longing, back to an age where we could speak to whom we wanted, buy what we wanted, think what we wanted without those thoughts, words and activities being tracked, processed and stored by corporate giants such as Google, sold to government agencies such as the NSA and CIA, and used against us by militarized police with their army of futuristic technologies.

 

Connect with The Rutherford Institute

Cover image credit: Eukalyptus


See Related:

Five Ways to Prepare for the Online Privacy Crackdown

UN & Bill Gates Launch “50in5” Global Digital Infrastructure Plans

The End of Privacy Is Near




The End of Privacy Is Near

The End of Privacy Is Near

by Dr. Joseph Mercola
November 17, 2023

 

Story-at-a-Glance
  • “CITIZENFOUR” is a documentary about NSA whistleblower Edward Snowden. It came out in 2014, but it’s even more pertinent today than it was then
  • In January 2013, when documentary film director/producer Laura Poitras received an encrypted email from a stranger who called himself “Citizen Four”
  • In June 2013, Poitras flew to meet Snowden at the Mira Hotel in Hong Kong, together with columnist Glenn Greenwald and Guardian intelligence reporter Ewen MacAskill. After four days of interviews, Snowden’s identity was made public at his request
  • Today, Snowden’s warnings ring truer than ever. Artificial intelligence now scours social media, podcasts and videos for key words identifying “anti-vaxxers,” for example. It doesn’t even matter if they agree with what you’re writing or saying. The mere inclusion of certain words will get you axed from the platform
  • Next, the plan is to eliminate privacy altogether by requiring a digital identity to access the internet

 

“CITIZENFOUR” is a documentary about U.S. National Security Agency (NSA) whistleblower Edward Snowden. It came out in 2014, but it’s even more pertinent today than it was then, so if you haven’t seen it, I urge you to do so.

The Snowden story began in January 2013, when documentary film director/producer Laura Poitras received an encrypted email from a stranger who called himself “Citizen Four.” Snowden reportedly chose this codename “as a nod to three NSA whistleblowers who came before him: Bill Binney, J. Kirk Wiebe and Thomas Drake.”

Poitras had already spent several years working on a film about monitoring programs in the U.S., and had been placed on a secret watch list after her 2006 film “My Country, My Country,”1 a documentary about Iraqis living under U.S. occupation. In his initial email, Snowden wrote:

“Laura. At this stage, I can offer nothing more than my word. I’m a senior government employee in the intelligence community. I hope you understand that contacting you is extremely high risk and you’re willing to agree to the following precautions before I share more. This will not be a waste of your time …
The surveillance you’ve experienced means you’ve been ‘selected’ — a term which will mean more to you as you learn about how the modern SIGINT system works.
For now, know that every border you cross, every purchase you make, every call you dial, every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet your route, is in the hands of a system whose reach is unlimited, but whose safeguards are not.
Your victimization by the NSA system means that you’re well aware of the threat that unrestricted secret police pose for democracies. This is a story few but you can tell.”
Summary of Snowden’s Journey

In June 2013, Poitras flew to meet Snowden at The Mira Hong Kong, together with columnist Glenn Greenwald and Ewen MacAskill, an intelligence reporter for The Guardian. After four days of interviews, Snowden’s identity was made public at his request.

Within two weeks, the U.S. government demanded Snowden’s extradition. Facing prosecution in the United States, Snowden scheduled a meeting with the United Nations High Commissioner for Refugees and applied for refugee status.

He managed to depart Hong Kong, but became stranded at the Sheremetyevo International Airport in Moscow when his passport was canceled. There he remained for 40 days, until the Russian government finally granted him asylum.

The Greatest Weapon of Oppression Ever Built

The U.S. government implemented Stellar Wind, a program to actively — and illegally — spy on all Americans within days of the 2001 9/11 attack. Ten years later, in 2011, construction began on a NSA data center in the Utah desert. It’s now the largest surveillance storehouse in the U.S.

In his correspondence, Snowden warned Poitras that “telecommunication companies in the U.S. are betraying the trust of their customers.” Through Stellar Wind, all phone calls and text messages were being intercepted and stored, and the Stellar Wind program has only expanded from there.

The NSA not only intercepts American citizens emails, phone conversations and text messages, but also Google searches, Amazon.com orders, bank records and more.

“We are building the greatest weapon for oppression in the history of man,” Snowden wrote, “yet its directors exempt themselves from accountability … On cyber operations, the government’s public position is that we still lack a policy framework. This … was a lie.
There is a detailed policy framework, a kind of martial law for cyber operations created by the White House. It’s called ‘Presidential Policy Directive 20’ and was finalized at the end of last year.”
Linkability, the Key to Control — and Entrapment

As explained in the film, a key aspect of control through surveillance is the linkability of data. One piece of data about you is linked to another piece. For example, your bus pass can be linked to the debit card you used to buy the pass. Your debit card is also linked to all other purchases.

With two key pieces of information — WHERE you went on a given day, and WHEN you made purchases, they can determine who you spoke with and met up with by linking those data points with those of other people who were in the vicinity at the same time. And that’s without even using your cellphone data.

When all these various data points are aggregated — location data, purchases, phone calls, texts, social media posts and more — you end up with a collection of metadata that tells a story about you. However, while the story is made up of facts, it’s not necessarily true.

For example, just because you were standing at a particular street corner does not mean you had anything to do with the crime that was reported on that same corner at the time you happened to be there. The problem is, your data could be used against you in that way.

The January 6 prisoners are a perfect example of how bits and pieces of data can be misused. Many have now spent years in jail simply because their cellphone data showed them as being in the wrong place at the wrong time.

State Power Versus the People’s Power to Oppose That Power

When asked by Greenwald why he decided to become a whistleblower, Snowden replied:

“It all comes down to state power against the people’s ability to meaningfully oppose that power. I’m sitting there every day, getting paid to design methods to amplify that state power.
And I’m realizing that if the policy switches that are the only thing that restrain these states were changed, you couldn’t meaningfully oppose [them].
I mean, you would have to be the most incredibly sophisticated tactical actor in existence. I’m not sure there’s anybody, no matter how gifted you are, who could oppose all of the offices and all the bright people, even all the mediocre people out there with all of their tools and all their capabilities.
And as I saw the promise of the Obama administration be betrayed … and in fact, [how they] actually advanced the things that had been promised to be sort of curtailed and reined in and dialed back … As as I saw that, that really hardened me to action …
We all have a stake in this. This is our country, and the balance of power between the citizenry and the government is becoming that of the ruling and the ruled, as opposed to the elected and the electorate.”
A Decade Later Snowden’s Words Ring Truer Than Ever

“I remember what the internet was like, before it was being watched, and there’s never been anything in the history of man like it,” Snowden said.

“You could have children from one part of the world having an equal discussion, where they were sort of granted the same respect for their ideas and conversation, with experts in a field from another part of the world on any topic, anywhere, anytime, all the time.
It was free and unrestrained. And we’ve seen the chilling of that, and the changing of that model towards something in which people self police their own views. They literally make jokes about ending up on ‘the list’ if they donate to a political cause, or if they say something in a discussion. It’s become an expectation that we’re being watched.
Many people I’ve talked to have mentioned that they’re careful about what they type into search engines, because they know that it’s being recorded, and that limits the boundaries of their intellectual exploration.”

Today, after the extreme ramp-up of censorship, surveillance and harassment we’ve endured since the COVID pandemic began, Snowden’s warnings ring truer than ever.

Artificial intelligence now scours social media, podcasts and videos for key words identifying “anti-vaxxers,” for example. It doesn’t even matter if they agree with what you’re writing or saying. The mere inclusion of certain words will get you axed from the platform.

Snowden’s worst fears have indeed come true, and today most people have come to realize just how dangerous this kind of blanket surveillance can be. Countless individuals whose only “crime” was to share their story of how the COVID shot ruined their lives have had their posts censored and social media accounts shut down.

Canadians whose only “crime” was to donate a few dollars to a peaceful protest had their bank accounts frozen. Small companies and nonprofit organizations with the “wrong” viewpoints have had their online payment services cancelled, effectively strangling their ability to make a living and keep the operation going.

Others have been debanked without recourse, including yours truly. My CEO and CFO and all of their family members also had their accounts and credit cards canceled, apparently for no other reason than the fact that they work for me. In other words, guilt by association.

Will the Internet as We Know It Disappear in the Next Year?

I recently posted an interview with investigative journalist Whitney Webb in which she talks about the next steps in the ramp-up of tyranny. The World Economic Forum has warned we may face a cyberattack on the banks before the end of 2024. That means we almost definitely will, seeing how they like to announce plans ahead of time.

Such a cyberattack will not only destroy the current banking system and usher in programmable central bank digital currencies. It will also eliminate privacy online by requiring everyone to have a digital identification tied to their ISP.

The principles of “know your customer” (KYC) will be imposed on everybody for everything, and anything that doesn’t have that will be made illegal under National Security justifications.

Essentially, what we’re looking at is a cyber Patriot Act, which will allow for the unfettered surveillance of everyone’s online activities, and the ability to restrict or block access to the internet. As noted by Webb, “The internet as you know it will not exist after this happens.”

The goal is to surveil all online activity in real time and have AI perform predictive policing to prevent crime before it happens. At that point, all bets are off. Data points alone may land you behind bars. Thought-crimes will also have ramifications, potentially resulting in the seizure of private property and/or removal of “privileges” previously understood as human rights.

A Global Infrastructure Has Been Built

During their first meeting with Snowden in Hong Kong, he explained that a global infrastructure, built by the NSA with the cooperation of other governments, was already in place. That was 10 years ago, so you can imagine how it’s grown since then.

At that time, that network was already automatically intercepting every digital communication, every radio communication and every analog communication. This blanket siphoning of data allows the NSA and others that have access to the network to retroactively search an individual’s communications, even if all they have is a single identifier. Snowden explained:

“So for example, if I wanted to see the content of your email … all I have to do is use what’s called a selector, any kind of thing in the communications chain that might uniquely or almost uniquely identify you as an individual.
I’m talking about things like email addresses, IP addresses, phone numbers, credit cards, even passwords that are unique to you that aren’t used by anyone else.
I can input those into the system, and it will not only go back through the database … it will basically put an additional level of scrutiny on it moving into the future that says, ‘If this is detected now or at any time in the future, I want this to go to me immediately,’ and [it will] alert me in real time that you’re communicating with someone. Things like that.”

According to Snowden, the British Government Communications Headquarters (GCHQ) has “the most invasive network intercept program anywhere in the world.” That program, Tempora, intercepts all content, in addition to metadata, on everything and everyone.

Snowden also describes the “SSO,” which stands for Special Sorters Operations. The SSO passively collects data across networks, both in the U.S. and internationally. Domestically, this is done primarily through corporate partnerships.

“They also do this with multinationals that might be headquartered in the U.S. whom [they can] just pay into giving them access,” Snowden said. They also do it bilaterally with the assistance of other governments.

You’re Being Spied Upon Everywhere

Snowden also pointed out some of the many ways in which you’re being spied upon by the digital devices around you. As just one example, all VoIP phones, which transmit calls over an IP network such as the internet, have little computers inside of them that can be hot mic’d even if servers are down. As long as the phone is plugged in, someone can use it to listen in on your conversations.

Within days of their first meeting in Hong Kong, Greenwald and Poitras were publishing stories about the NSA’s illegal blanket spying domestically and internationally. CNN Live reported:

“Another explosive article has just appeared, this time in the Washington Post … that reveals another broad and secret U.S. government’s surveillance program.
The Washington Post and The Guardian in London reporting that the NSA and the FBI are tapping directly into the central servers of nine leading internet companies, including Microsoft, Yahoo, Google, Facebook, AOL, Skype, YouTube, and Apple.
The Post says they’re extracting audio, video, photographs, emails, documents, and connection logs that enable analysts to track a person’s movements and contacts over time.”

 

Greenwald also made numerous live news appearances. In one, he stated:

“In 2008, they eliminated the warrant requirement for all conversations, except ones that take place among Americans exclusively on American soil.
So they don’t need warrants now for people who are foreigners outside of the U.S., but they also don’t need warrants for Americans who are in the United States, communicating with people reasonably believed to be outside of the U.S.
So … the fact that there are no checks, no oversight about who’s looking over the NSA’s shoulder, means that they can take whatever they want, and the fact that it’s all behind a wall of secrecy, and they threaten people who want to expose it, means that whatever they’re doing, even violating the law is something that we’re unlikely to know until we start having real investigations and real transparency into what it is that the government is doing.”
Beyond Transparency

At this point, we’re beyond merely needing transparency. The intent to surveil and control every move we make and thought we express is now being openly expressed.

We can just assume that any digital devices can and probably are collecting data on our activities and whereabouts, and that those data are nowhere near held private and can be used against us in myriad ways.

Everyone must now choose between freedom and enslavement, and the option to choose freedom is rapidly closing.

Today, a decade after Snowden broke the dam of secrecy around the global surveillance scheme, we have but one choice left, and that is to actively reject that system by changing how we live our day to day lives. Everyone must now choose between freedom and enslavement, and the option to choose freedom is rapidly closing. Putting off making that choice is itself a choice.

Rejecting the control system means reverting back to “dumb” appliances and devices to the extent you’re able. It means getting savvier about privacy technologies such as deGoogled phones and computers2 that cannot spy on you. It means using cash as much as possible and rejecting CBDCs and digital tokens. As noted by Whitney Webb in the interview I linked to earlier:

“There’s a huge need for to divest from Big Tech as much as possible, and it needs to happen quickly, because the choice is either participate in the system being designed for you by crazy people and become a slave, or don’t become a slave. And if you don’t want to be a slave, you have to invest now in Big Tech alternatives, unless you want to live a completely analog life …
The easiest route is to go the slavery route, and that’s how they’ve designed it on purpose. The whole selling point of that system is that it’s convenient and easy. So, obviously, it’s going to take some work to go the other route, but the future of human freedom depends on it so I think it’s a pretty easy choice.”

Connect with Dr. Joseph Mercola

Cover image credit: CDD20


See Related:

Five Ways to Prepare for the Online Privacy Crackdown




UN & Bill Gates Launch “50in5” Global Digital Infrastructure Plans

UN & Bill Gates Launch “50in5” Global Digital Infrastructure Plans

by Kit Knightly, OffGuardian
November 16, 2023

 

Last week the United Nations Development Program officially launched their new initiative promoting “Digital Public Infrastructure” (DPI) around the world.

The “50in5” program – so-called because it aims to introduce DPI in fifty countries in the next five years – began with a live-streamed event on November 8th.

For those of you unsure what “Digital Public Infrastructure” is, the 50in5 website is quite clear:

Digital public infrastructure (DPI) – which refers to a secure and interoperable network of components that include digital payments, ID, and data exchange systems.

There’s nothing new there, for anyone who has been paying even the slightest bit of attention. Digital identity and digital payment systems are self-explanatory (and we’ve covered them before). “Data Exchange Systems” essentially means national governments will share identity and financial records of citizens across borders with other nations, or indeed with global government agencies.

The key word is “interoperable”.

As we have written before, the “global government” won’t be one single health care system, identity database, or digital currency – but dozens of notionally separate systems all carefully designed to be fully “interoperable”.

As well as being a project of the UNDP, UNICEF, and the Inter-American Development Bank, the 50in5 is funded by various globalist NGOs and non-profits including the Bill & Melinda Gates Foundation and (indirectly through an NGO called “Co-Develop”) the Rockefeller Foundation.

The eleven counties taking part in the program so far are Bangladesh, Brazil, Estonia, Ethiopia, Guatemala, Moldova, Norway, Senegal, Sierra Leone, Singapore, Sri Lanka, and Togo. A careful spread from every continent, including first, second, and third-world nations.

It is a list noteworthy for including NATO, EU, and BRICS members. Interesting implications on supposed “multipolarity” there.

In related news, on the exact same day the 50in5 program launched, the European Parliament and Council of Europe agreed on a new framework for a region-wide European Digital Identity (eID) system.

According to the official press release [emphasis added]:

The revised regulation constitutes a clear paradigm shift for digital identity in Europe aiming to ensure universal access for people and businesses to secure and trustworthy electronic identification and authentication. Under the new law, member states will offer citizens and businesses digital wallets that will be able to link their national digital identities with proof of other personal attributes (e.g., driving licence, diplomas, bank account). Citizens will be able to prove their identity and share electronic documents from their digital wallets with a click of a button on their mobile phone.

This comes on the back of announcements that the European Central Bank is moving on to the “next phase” of its Digital Euro plans this month. The digital euro will – according to former IMF (and apparent numerology nut) Christine Lagarde – afford some “limited control” over people’s spending.

India, another BRICS nation, has been at the forefront of DPI development for years, and now articles are appearing in publications like Forbes, claiming “India Has A Digital Infrastructure, America Needs One”.

At the same time, China is making strides toward ending online anonymity, while Western politicians like Nikki Haley say we should be doing the same.

As the world focuses on Hamas and Israel, the global re-organization phase of the Great Reset is just quietly going about its business. Building a net and waiting to tighten it.

 

Connect with OffGuardian

Cover image credit: irfanahmad




Five Ways to Prepare for the Online Privacy Crackdown

5 Ways to Prepare for the Online Privacy Crackdown
With legislation around the world seeking to gut encryption and online anonymity, Ramiro Romani offers an overview of what’s coming and several solutions for divesting from Big Tech products and protecting your online privacy.

 

by Ramiro Romani, Unlimited Hangout
November 6, 2023

 

The internet is about to change. In many countries, there’s currently a coordinated legislative push to effectively outlaw encryption of user uploaded content under the guise of protecting children. This means websites or internet services (messaging apps, email, etc.) could be held criminally or civilly liable if someone used it to upload abusive material. If these bills become law, people like myself who help supply private communication services could be penalized or put into prison for simply protecting the privacy of our users. In fact, anyone who runs a website with user-uploaded content could be punished the same way. In today’s article, I’ll show you why these bills not only fail at protecting children, but also put the internet as we know it in jeopardy, as well as why we should question the organizations behind the push.

Let’s quickly recap some of the legislation.

European Union

– Chat Control: would require internet services (Email, chat, storage) to scan all messages and content and report flagged content to the EU. This would require that every internet based service scans everything uploaded to it, even if it’s end-to-end encrypted. Content would be analyzed using machine learning (i.e. AI) and matches would automatically be reported to the police. This is awaiting a vote from the EU LIBE committee.

United Kingdom

The Online Safety Act 2023: would require user service providers to enforce age limits and checks, remove legal but harmful content for children, and require scanning photos for materials related to child sexual abuse & exploitation, as well as terrorism. It would require providers to be able to identify these types of materials in private communications and to take down that content. This means providers would need visibility into messaging, even those messages are end-to-end encrypted. End to end encrypted messaging providers such as WhatsApp, Viber, Signal, and Element have indicated in an open letter that surveillance on of this type simply isn’t possible without breaking end to end encryption entirely, and have threatened to leave the UK if the bill was passed & enforced without the offending Clause 122. This bill was recently passed by parliament unchanged and will become enforceable in 2024.

United States

– The EARN IT Act 2023: would allow US states to hold websites criminally liable for not scanning user uploaded content for CSAM (child sexual abuse material). This would effectively ban end to end encryption. This bill has 22 cosponsors and is awaiting an order to report to the Senate.

– The STOP CSAM Act 2023 (Full Text): would allow victims who suffered abuse or exploitation as children to sue any website that hosted pictures of the exploitation or abuse “recklessly”, e.g. if your website was not automatically scanning uploads. Websites are already required by law to remove CSAM if made aware of it, but this would require providers to scan all files uploaded. This bill has 4 cosponsors, and is awaiting an order to report to the Senate.

– Kids Online Safety Act (KOSA): would require platforms to verify the ages of its visitors and filter content promoting self-harm, suicide, eating disorders, and sexual exploitation. This would inherently require an age verification system for all users and transparency into content algorithms, including data sharing with third parties. This bill has 47 bi-partisan cosponsors and is awaiting an order to report to the Senate.

Its important to note that the language in these bills and the definition for “service providers” extends to any website or online property that has user-uploaded content. This could be as simple as a blog that allows comments, or a site that allows file uploads. It could be a message board or chatroom, literally anything on the internet that has two-way communication. Most websites are operated by everyday people – not huge tech companies. They have neither the resources or ability to implement scanning on their websites under threat of fine or imprisonment. They would risk operating in violation or be forced to shut down their website. This means your favorite independent media site, hobbyist forum, or random message board could disappear. These bills would crumble the internet as we know it and centralize it further for the benefit of Big Tech who are rapidly expanding the surveillance agenda.

We must pause and ask ourselves, is this effort to ramp up surveillance really about protecting children?

How do companies currently deal with CSAM?

In the United States, tracking CSAM is recognized as a joint effort between ESPs (Electronic Service Providers) like Google, and the National Center for Missing & Exploited Children (NCMEC) a private non-profit established by Congress in 1984 and primarily funded by the United States Department of Justice. Unlimited Hangout has previously reported on the NCMEC and its ties to figures such as Hillary Clinton and intelligence-funded NGOs such as Thorn. They also receive corporate contributions from big names such as Adobe, Disney, Google, Meta, Microsoft, Palantir, Ring Doorbell, Verizon, and Zoom.

Ashton Kutcher’s NGO Supplies Police with ‘Free’ CIA-linked Surveillance Tool to ‘Protect Kids’

Electronic service providers in the United States are already required to report to the CyberTipline (Federal statute 18 USC 2258A) if they become aware of CSAM, otherwise they may face fines or prison time. These CyberTipline reports combine offending content with additional information such as identifying the potential perpetrator, the victim, and other context that is combined and sent off to law enforcement.

Photo & content scanning measures are not required. However, several prominent companies have voluntarily implemented scanning of communications and media, such as Gmail, YouTube, Google Photos, Facebook, Instagram Messenger, Skype, Snapchat, iCloud email, and Microsoft’s Xbox. If you use these services, then your messages and media may automatically be scanned for abusive material.

Ironically and not surprisingly, its these very platforms that have the most malicious activity, including drug & guns saleschild abuse material, and cyberbullying/harassment.

Does voluntary content scanning actually help protect children?

Google began publishing a CSAM transparency report in 2021 which gives numbers on how much CSAM was identified and reported on across Google & Youtube. It includes data since 2020, with counts for how many reports were made to the NCMEC, how many different Google accounts were disabled, and how many “hashes” (photo fingerprints) were contributed to the NCMEC hash database.

It is unclear exactly when Google started creating “hashes” of its users photos, but they have contributed 2.5 million new hashes to National Center for Missing and Exploited Children’s Hash Database to date. Reports are published every 6 months, and we’ve seen staggering growth in all types of reports since 2020. For example, Google’s CyberTipline reports have grown from ~547,000 in 2020, ~870,000 in 2021, to more than 2.1 million reports in 2022. The first half of 2023 has shown a decline, totaling ~750,000 reports from January to June.

As seen on NCMEC’s CyberTipline Data page, Google’s reports represent a mere fraction of the total number of reports submitted to the NCMEC, which works with over 1,500 ESPs – mostly US companies. 5 electronic service providers (Facebook, Instagram, Google, WhatsApp, and Omegle) accounted for more than 90% of the 32 million reports in 2022. Around half (49%) of these reports in 2022 are “actionable”, meaning there is sufficient information for law enforcement to proceed with an investigation. Additionally, 89.9% of reports involved content uploaded by users outside of the US.

The NCMEC also reports the numbers of CyberTipline reports made to different law enforcement organizations such as Internet Crimes Against Children, Local LE, Federal LE, and International LE.

Law enforcement is not required to give any feedback on what happens with these reports and, as a result, they hardly provide feedback. Using the NCMEC’s own numbers, we can see there is little visibility on how the reports are used.

In 2022, we saw the following rates of feedback from law enforcement and other groups who received reports.

  • International Crimes Against Children Groups – 491,655 actionable reports resulted in 41.59% Feedback
  • Local Law Enforcement – 1,462 actionable reports resulted in 3.48% Feedback
  • Federal Law Enforcement – 1,356,988 reports resulted in 0.03% Feedback
  • International Law Enforcement – 13,995,567 reports resulted in 0.4% Feedback

Keep in mind, a feedback response doesn’t necessarily mean an arrest or conviction. Feedback responses could may indicate the report was closed or incomplete feedback. Also, these results are not open to the public, although a FOIA request could change that. However, these numbers make it clear that whether companies are voluntarily scanning their content or creating reports after becoming aware of CSAM – there’s no visibility on what actually happens with the reports.

Given the huge volume of reports not acted upon, forcing technology providers to automatically scan content & generate reports is not going to magically change things. It will require law enforcement to act on reports to put child predators behind bars and save children. That is, after all, what legislators say they want.

That’s not to say nothing is being done. A 2022 report of CyberTipline success stories in the United States stated that close to 714 different cases used CyberTipline reports. Only 16 of these cases explicitly reported the assistance of a service provider.

Again, out of 1.35 million actionable CyberTipline reports in the United States in 2022, there have been 714 arrests so far. Its possible there are ongoing investigations that will bring this number higher, but we can only guess without transparency. I was unable to find success stories for any prior years.

I commend these efforts to protect children from dangerous predators; however, these efforts do not necessitate automatic scanning of everyone’s messages or the gutting of encryption. Generating more reports from service providers obviously does not lead to more arrests being made. Lastly, the majority of CSAM material comes from big tech providers, many of whom are voluntarily scanning content anyways. Why enforce this requirement on every website on the internet?

If legislators around the world want to make a genuine impact on child abuse, then they should push for transparency and accountability practices for law enforcement and work to ensure that law enforcement properly investigates the millions upon millions of reports they already receive every year, and make the data available to the public.

We the people need to know that the groups responsible for investigating child abuse are doing their jobs with the processes and data already available, rather than further sacrifice our individual privacy and security for more of the same. The bills/laws in question also lack an understanding of encryption, are not technically feasible to implement, put unnecessary legal liability on technology companies, and lack evidence that the policies will improve outcomes for children.

How can the online child abuse laws across Western countries be so consistent with their practices? How did they all reach the same strategies of age verification, content filtering, and client side scanning?

The framework for this legislation has been in the works for years. One key architect of this push has been the WePROTECT Global Alliance, a merger of initiatives between the European Commission, the US Department of Justice, and the UK Government. Their first summit was hosted in 2014 and is now comprised of 97 governments, 25 technology companies, and 30 civil society organizations.

UNICEF, a member of WePROTECT, released a “model national response” which outlines many of the elements we see in these different child safety bills today. UNICEF and organizations like the US Department of Justice state that sexual exploitation of children cannot be addressed by one country, company, or organization working in isolation. Troublingly, both of those groups have a history of turning a blind eye to child abuse in their respective organizations and/or jurisdictions (see hereherehere and here for examples).

Working groups like the “Five Country” government counterparts (Five Eyes) – USA, UK, Australia, Canada, New Zealand– have met with the corporate executives of Facebook, Google, Microsoft, Roblox, Snap, and Twitter to collaborate on guidelines such as the “Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse” (justice.gov link). These groups are all working together, via public-private partnerships like the Global Cyber Allianceamong others, to change the face of the internet.

Earlier this year, the Department of Justice outlined the “risky” aspects of technology in a 2023 National Strategy Report on Child Exploitation:

 

– an uneven response to online child safety by the tech sector;
– a CyberTipline system that is overwhelmed;
– anonymization of offenders;
– encryption of data storage and communications;
– online environments where children and adults interact without supervision or controls;
– globalized, often sovereignless, platforms;
– remote, often extraterritorial, storage; and
– a compounding lack of public awareness of these risks.

While the issue of child exploitation online is grave and child abusers need to be held accountable – this shouldn’t come of our individual privacy and freedom. From the publicly stated perspectives of these groups, anonymization, encryption, and not allowing governments or tech companies to track all content is equivalent to contributing to child exploitation.

Ignoring the child abuse right in front of their noses

As noted earlier, many of these groups have a track record of responding very poorly to serious child abuse issues when these crimes involve their own organization or persons with political value. For instance, there have been nearly 2,000 allegations of child sexual abuse and exploitations made against U.N “Peacekeepers” worldwide between 2004 and 2016, as reported by the Associated Press. This includes the child sex ring in Haiti from 2004 to 2007 where Sri Lankan UN “Peacekeepers” traded food in exchange for sex with children as young as nine years old.

The names of the offenders are kept confidential by the UN, and the UN puts the responsibility on member states to investigate & prosecute. UN records on these allegations are also incomplete and hundreds of cases have been closed without explanation. The United Nations even continues to send Sri Lankan peacekeepers to Haiti, despite the scandals. In the United States, we can see a similar level of accountability with the Department of Justice still withholding the client list for Jeffrey Epstein’s child prostitution ring, among many, many other examples.

The very organizations that try to convince us to give up our individual liberties for the sake of the children will completely ignore crimes against children when it suits them. Can we really trust these organizations to protect children?

The real-time monitoring of messages and outlawing of privacy will not protect children. On the contrary, it would put their communications into the hands of more third parties. The wiser choice would be to encourage parental awareness and conscious use of technology, e.g. not giving children unlimited access to mobile phones or devices and avoiding use of popular social media platforms and messengers.

If these actors truly cared about protecting children, then they would call an end to the genocide & war crimes occurring in Gaza. Instead, the US is rushing to provide aid to Israel in the form of munitions. In the UK, only 80 out of 650 MP’s have called for a ceasefire. Instead, there is more interest in clamping down on and controlling the internet, a crucial resource for all people in a time of great need.

Inter-governmental organizations are pushing towards an internet where our identities are verified and our messages are tracked. With such legislation coming our way all over the world, how can we retain any privacy?

The answer is simple – do not comply. Do not follow along with big tech companies that voluntarily follow legislative guidelines. Find ways to decentralize your use of software. Invest your time into divesting from big tech and learning alternative solutions for communications, storage, and encryption. Given the stakes, there has never been a more important time to divest from these companies and their software.

Thankfully, there are still many ways that individuals can limit their dependence on centralized software services that perform content or AI scanning. We can boycott those Big Tech companies that scan our content including Microsoft, Google, Apple and countless others. It’s just a matter of learning how to take back our technology.

At this point you might be asking:

  • How do we continue to find information on the internet without Google’s search engine?
  • Or use our computers without Microsoft’s Windows and Apple’s macOS?
  • Or use our phones without Google’s Android or Apple’s iOS?
  • Or use our browser without Google’s Chrome, Microsoft’s Edge, or Apple’s Safari? (the oligopoly of these behemoths extends everywhere.)

Solving these problems with alternative software has been the mission of my initiative Take Back Our Tech, and today I am honored to share 5 Ways To Protect Yourself from Incoming Internet Surveillance Bills with the Unlimited Hangout community.

1. Use a “free” operating system for your computer.

Traditional operating systems (“OSs”) like Windows and macOS are proprietary software, which is distinct from free software. It’s important to understand the difference between the two, as the topic will come up again. So let’s define proprietary and free software.

Proprietary software, or “non-free software,” is not available for users to study, observe, or change. As the user, you are given no rights.

For example, only the developers of Microsoft Windows can get a clear look at the code of the operating system and understand what it does. Users have no way to view the code, and verify what the program does.

In contrast, free software (also known as Free & Open Source Software FOSS) gives users rights. The Free Software Foundation, one of the leading organizations behind the Free Software movement, provides an extended definition:

“Free software” means software that respects users’ freedom and community. Roughly, it means that the users have the freedom to run, copy, distribute, study, change and improve the software. Thus, “free software” is a matter of liberty, not price. To understand the concept, you should think of “free” as in “free speech,” not as in “free beer.” We sometimes call it “libre software,” borrowing the French or Spanish word for “free” as in freedom, to show we do not mean the software is gratis.

You may have paid money to get copies of a free program, or you may have obtained copies at no charge. But regardless of how you got them, you always have the freedom to copy and change the software, even to sell copies.

Alternative operating systems based on GNU/Linux are free software. They offer many intended benefits:

  • Visibility into changes: Any user or developer can take a look at code updates and ensure that the operating system is not acting unexpectedly or maliciously. For instance, users of the Ubuntu OS fought back against changes that sent search results to Amazon and got the changes overturned.
  • More choices: Because others can modify and distribute free software at will, far more software choices exist in the free software ecosystem — choices that often outcompete and provide more value than proprietary software.
  • Costs: All Linux distributions are FREE as in cost. Compare this to paying for Windows activation keys.
  • Freedom: Your computer will not automatically track every program that you run, as does macOS, or force updates on you, as Windows does (and to which you agree in their terms of service, a document very few take the time to read).

So what are you waiting for? Throw your proprietary software in the trash and enjoy an operating system that respects your freedom and your data.

Here are some recommendations for free operating systems based on Linux. You can download the .iso file (in which the OS is contained) for each operating system from the following links as well as feature walkthroughs.

Once you’ve made your decision of OS you can follow the guide linked above to get it installed on your machine.

2. Use open-source software on your phone.

The two main choices for traditional mobile operating systems today is Google’s Android, and Apple’s iOS. These two options make up 99%+ of the global market share of mobile operating systems. With over 6.6 billion phones on earth, the data pipeline to these two companies is incomprehensibly large – they’ve got real-time data for almost every person on the planet.

Observational studies of both Android and iOS-based phones found that these devices connect back to their parent companies every 5 minutes. In addition, they collect unique device identifiers, phone numbers, locations, and other surprising info.

Although it would be too lengthy to discuss these issues in-depth in this article, if you’d like to see exactly what tracking and data collection occurs on these mobile operating systems, you can read #TBOT’s analysis here.

A few alternative operating systems have popped up in recent years that can compete with the likes of Google and Apple. These operating systems are referred to as “de-googled” operating systems, and are typically built on top of Android’s Open Source Platform (AOSP). This code is maintained by Google, but other developers have been able to build new features on top of it, and more importantly, to remove any behind-the-scenes tracking or data collection.

You can use one of these alternative operating systems today to configure your own “privacy phone.”

I recommend these three operating systems (note that each is compatible with only certain phones):

You can get more information on supported phones and the install instructions on each website.

Alternatively, if you are pressed for time or don’t want to do the research and make the tech decisions yourself, you can get a phone out of the box that comes complete with GrapheneOS and useful free software apps and communication services, through my project Above Phone.

De-googled phones use alternative app stores like F-Droid (where all apps are free software) and Aurora Store (which will allow you to download apps anonymously from the Google Play Store).

Normal Android phones also have access to these apps, but will still suffer from centralized tracking through Google Services. If you have an Android-based phone you can get started with these alternative app stores right away. Get more details on the links below:

F-Droid FOSS App Catalogue: https://f-droid.org/
Aurora Store: https://auroraoss.com/

You may be surprised at how easily you can transition to a de-googled phone — there are user friendly, private, and functional options for almost all of your app needs. You can also use apps like Uber & AirBnb, which don’t work without Google services, but there is usually a workaround, like using those services from within a web browser, or by using advanced features like GrapheneOS’s sandboxing to isolate Google Services from the rest of your phone.

3. Own your data.

If a major cyber event caused the internet to go down, how would you recover the photos/files/information you stored on cloud services? How would you get the information you needed to prepare for a survival situation?

It would be best to have this information on hand when you need it – not desperately trying to recover it in the event of a cyber disaster.

At a minimum, you should back up all of the following on your local computer instead of on the cloud service you use currently: passwords, legal documents, books, photos, reference material, and maps.

Here are some suggestions to be “cyber-pandemic” ready.

  1. Knowledge is power. Download all the books you need in PDF format. A great site to start is PDFDrive
  2. Need to navigate offline? Organic Maps (available on F-Droid and for Android phones) lets you download maps of most of the regions on the planet — and you can route to different locations using GPS only (which means you don’t need a SIM card in your phone).
  3. If you use Google Drive or iCloud, now is the time to export all of your photos, videos, and documents to a local hard drive. Here’s a tutorial on how to export Google Drive files. Here’s an tutorial on how to export files on iCloud.
  4. Are you managing your passwords in the cloud? Know that cloud password managers are not immune to hacking attempts. The best place for your passwords is in an encrypted password vault on your computer. An attacker would need not only the password vault file on your computer, but also the master password used to encrypt the vault. A collection of software called Keepass offers a cohesive way to manage and sync passwords locally on your computer and on your phone.
4. Support alternatives.

A wide range of software can serve as alternatives in the open-source software ecosystem. I’ve categorized and listed several great ones below, all of which are programs for Linux computers!

You can also find an important set of core software for Linux with details on how to use it on #TBOT’s Open-Source Survival Toolkit. A larger list of programs is available on #TBOT’s Open Source Survival Library.

Password Managers

KeepassXC: Offline password manager.
Bitwarden: Cloud-based password manager

Privacy / Security

I2P: Private peer-to-peer networking layer.
VeraCrypt: Open-source cross-platform disk encryption

Browsers

Ungoogled Chromium: A (fork) copy of Google’s Chromium engine with tracking removed
LibreWolf: Firefox fork with improved privacy
Falkon: KDE Project’s web browser

Email

Evolution: A mail client, calendar, address book, and task manager in one
Thunderbird: Mozilla Foundation’s email, chat, and calendaring client
Mailspring: Easy-to-use, modern mail client with integrations to major email providers
KMail: KDE’s email client that supports many mail protocols

Communication

Kotatogram: Alternate Telegram client with improved offline features
AnyDesk: Remote desktop / support software
Jitsi: Free video conferencing
Jami: Free and open-source peer-to-peer video conferencing.

Social Media

Nostr: a decentralized social media protocol
PeerTube: Decentralized video broadcasting
Nitter: Alternative twitter front end
Invidious: Alternative YouTube front end
Libreddit: Alternative Reddit front end
Owncast: Self-hosted live video and web chat server

Graphics

Krita: Free and open source digital illustration program
Inkscape: Professional vector-based graphics editor
GIMP: One of the oldest and best- known image editors
Pinta: Bitmap editor similar to Paint.NET
Gravit Designer: Vector-based design app
Blender: End-to-end 3D creation suite

Photography

DarkTable: Virtual light table and darkroom for photography
DigiKam: Personal photo management

Video Editors

Kdenlive: The KDE project’s video editor
Davinci Resolve: High-end professional video editor
OpenShot: Easy-to-use, powerful video editor

Video Utilities

OBS Studio: Video recording and live streaming
Kazam: Record videos of your screen
Peek: Record videos and gifs of your screen
Spectacle: KDE’s screenshot tool

Technical Tools

Remmina: A remote desktop client
VirtualBox: Create virtual machines

Writing

CherryTree: Hierarchical note-taking application that stores multimedia notes in an encrypted database (not markdown)
Trillium Notes: Build knowledge bases & graphs with this extensible note-taking application (not markdown)
Joplin Notes: Create simple notes and to do lists using markdown

Reading

Foxit PDF: Feature-rich PDF reader.
Sioyek: PDF reader for academic papers.

Office

LibreOffice: Most popular open-source office suite for Linux
OnlyOffice: Collaborative online document editor
CryptPad: Browser-based encrypted document editor
HomeBank: Personal money management

5. Own your communications.

Although social messengers like WhatsApp, Signal, Telegram, and Facebook Messenger can be useful, many of them are not open source. Even the ones that claim to be open source often only make the front end of the application visible for inspection (that part you interact with directly), not the server-side code that is responsible for delivering messages.

Chat protocols like XMPP and Nostr are fully open source, meaning the code is available for the client and server. This is especially important because it means that you can run the server-side software yourself on a computer under your control. This is called self-hosting, and it’s crucial to censorship resistance and verifying that a software does what it says.

XMPP is over 20 years old and can support tens of thousands of users on a single server. It offers end-to-end encrypted messaging, voice calls, and video calls (as well as files and audio messages). It can be used on computers, phones, and in a web browser, and it’s also completely free to join (you can join any public server). It can even be bridged to the phone network (anonymous phone numbers without needing a SIM card anyone?).

It’s a wonder why XMPP isn’t more well known, but part of the reason could be that it’s hard to monetize (make money) on XMPP. The protocol has been used under the hood for major chat services run by big tech companies scaling to millions of users, unfortunately these big companies hid the underlying technology.

Above Phone is attempting to change this. The Above Privacy Suite offers a professional XMPP service with enhanced privacy. It comes in a bundle with 5 other privacy services.

Conclusion

The internet is changing and battle lines are being drawn. On one side, government organizations have become obsessed with invading our personal communications and drastically advancing the ever encroaching surveillance state, supposedly “for the sake of the children.” Together with enthusiastic help from Big Tech, they threaten to monitor even single thought, idea, or creation you share on the internet.

On the other side are people who are not going to let that happen. We’re the underdogs, a small but growing number of people who are demanding privacy and freedom over convenience. It doesn’t have to be their way or the highway when it comes to technology, we can carve our own path, experimenting with software that is friendly and in alignment with our values. Hopefully, this guide can give you a starting point to understand your technology and places to find alternatives.

I encourage you to not only explore and use the software listed in this guide, but to support the developers with financial donations. Their projects may be the key to both surviving and thriving in the growing surveillance state.

 

Connect with Above Phone project

Connect with Unlimited Hangout

Cover image credit: Franz26




Sweden: New Dystopian DIGITAL ID

Sweden: New Dystopian DIGITAL ID
Now people need a phone with a camera and NFC to register their new digital ID

by Peter Imanuelsen, The Freedom Corner
September 10, 2023

 

Do you remember when people were called “conspiracy theorists” for warning about the covid passports? Turns out that those who warned about them were correct!

The same people have now been warning for quite some time about digital ID, and with good reason.

In Scandinavia, we have already had digital ID for a long time. People need it to be able to do everyday tasks like online banking, buying things online and much more.

Now, the digital ID system in Sweden called “BankID” is getting a few changes regarding security.

When setting up your digital ID, people can be asked to have passport or national ID card available.

The way it works is that you have to have a smartphone with a camera and NFC contactless reader built in.

When setting up the new digital ID, you simply take a picture of the photo on your passport or ID card, then you “touch” the phone against the passport or ID to scan the contactless NFC chip – And boom you have verified your digital ID.

Yes, Swedish passports have a contactless NFC chip built into them. So when you use your phone to scan your passport it confirms your identity.

You can watch the video on how Swedish people have to set up their digital ID in this video from Swedbank.



Have you ever wondered what digital ID really is and the real plan behind this agenda?

It is all about control. Imagine a world where we have central bank digital currencies. Everyone needs a digital ID to access their digital wallet.

Imagine how easy it is for the state to control everything people do and buy.

In fact, there is already a Swedish company that has technology to track your purchases and calculate your C02 emissions. Many banks are already using this technology to inform people of their carbon emissions based on what they buy. In other words, tracking your purchases.

If you haven’t already, make sure to read my in-depth article on the TRUTH about the digital ID.

The truth about digital ID 
But it gets worse!
In Sweden, thousands of people have already implanted microchips in their hands to use for contactless payments. All you have to do is hold your hand over the card reader and it gets scanned.

During covid, some people even used their implanted microchips for their covid passports, meaning they just scanned their hands to show up their “green” covid passport status.

This is scary stuff.

You can read my article on this here:

 People are now paying with microchips in their hand.

 

Connect with Peter Imanuelsen

Cover image credit: PixxlTeufel




We the Targeted: How the Government Weaponizes Surveillance to Silence Its Critics

We the Targeted: How the Government Weaponizes Surveillance to Silence Its Critics

by John & Nisha Whitehead, The Rutherford Institute
August 29, 2023

 

“Once a government is committed to the principle of silencing the voice of opposition, it has only one way to go, and that is down the path of increasingly repressive measures, until it becomes a source of terror to all its citizens and creates a country where everyone lives in fear.”

— President Harry S. Truman

Ever since Martin Luther King Jr. delivered his groundbreaking “I Have a Dream” speech during the March on Washington for Jobs and Freedom on Aug. 28, 1963, the Deep State has been hard at work turning King’s dream into a living nightmare.

The end result of the government’s efforts over the past 60 years is a country where nothing ever really changes, and everyone lives in fear.

Race wars are still being stoked by both the Right and the Left; the military-industrial complex is still waging profit-driven wars at taxpayer expense; the oligarchy is still calling the shots in the seats of government power; and the government is still weaponizing surveillance in order to muzzle anti-government sentiment, harass activists, and terrorize Americans into compliance.

This last point is particularly disturbing.

Starting in the 1950s, the government relied on COINTELPRO, its domestic intelligence program, to neutralize domestic political dissidents. Those targeted by the FBI under COINTELPRO for its intimidation, surveillance and smear campaigns included: Martin Luther King Jr., Malcom X, the Black Panther Party, John Lennon, Billie Holiday, Emma Goldman, Aretha Franklin, Charlie Chaplin, Ernest Hemingway, Felix Frankfurter, and hundreds more.

In more recent decades, the powers-that-be have expanded their reach to target anyone who opposes the police state, regardless of their political leanings.

Advances in technology have enabled the government to deploy a veritable arsenal of surveillance weapons in order to “expose, disrupt, misdirect, discredit, or otherwise neutralize” perceived threats to the government’s power.

Surveillance cameras mounted on utility poles, traffic lights, businesses, and homes. License plate readers. Ring doorbells. GPS devices. Dash cameras. Drones. Store security cameras. Geofencing and geotracking. FitBits. Alexa. Internet-connected devices. Geofencing dragnets. Fusion centers. Smart devices. Behavioral threat assessments. Terror watch lists. Facial recognition. Snitch tip lines. Biometric scanners. Pre-crime. DNA databases. Data mining. Precognitive technology. Contact tracing apps.

What these add up to is a world in which, on any given day, the average person is now monitored, surveilled, spied on and tracked in more than 20 different ways by both government and corporate eyes and ears.

Consider just a small sampling of the ways in which the government is weaponizing its 360 degree surveillance technologies to flag you as a threat to national security, whether or not you’ve done anything wrong.

Flagging you as a danger based on your feelings. Customs and Border Protection is reportedly using an artificial intelligence surveillance program that can detect “sentiment and emotion” in social media posts in order to identify travelers who may be “a threat to public safety, national security, or lawful trade and travel.”

Flagging you as a danger based on your phone and movements. Cell phones have become de facto snitches, offering up a steady stream of digital location data on users’ movements and travels. For instance, the FBI was able to use geofence data to identify more than 5,000 mobile devices (and their owners) in a 4-acre area around the Capitol on January 6. This latest surveillance tactic could land you in jail for being in the “wrong place and time.” Police are also using cell-site simulators to carry out mass surveillance of protests without the need for a warrant. Moreover, federal agents can now employ a number of hacking methods in order to gain access to your computer activities and “see” whatever you’re seeing on your monitor. Malicious hacking software can also be used to remotely activate cameras and microphones, offering another means of glimpsing into the personal business of a target.

Flagging you as a danger based on your DNA. DNA technology in the hands of government officials completes our transition to a Surveillance State. If you have the misfortune to leave your DNA traces anywhere a crime has been committed, you’ve already got a file somewhere in some state or federal database—albeit it may be a file without a name. By accessing your DNA, the government will soon know everything else about you that they don’t already know: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc. After all, a DNA print reveals everything about “who we are, where we come from, and who we will be.” It can also be used to predict the physical appearance of potential suspects. It’s only a matter of time before the police state’s pursuit of criminals expands into genetic profiling and a preemptive hunt for criminals of the future.

Flagging you as a danger based on your face. Facial recognition software aims to create a society in which every individual who steps out into public is tracked and recorded as they go about their daily business. Coupled with surveillance cameras that blanket the country, facial recognition technology allows the government and its corporate partners to identify and track someone’s movements in real-time. One particularly controversial software program created by Clearview AI has been used by police, the FBI and the Department of Homeland Security to collect photos on social media sites for inclusion in a massive facial recognition database. Similarly, biometric software, which relies on one’s unique identifiers (fingerprints, irises, voice prints), is becoming the standard for navigating security lines, as well as bypassing digital locks and gaining access to phones, computers, office buildings, etc. In fact, greater numbers of travelers are opting into programs that rely on their biometrics in order to avoid long waits at airport security. Scientists are also developing lasers that can identify and surveil individuals based on their heartbeats, scent and microbiome.

Flagging you as a danger based on your behavior. Rapid advances in behavioral surveillance are not only making it possible for individuals to be monitored and tracked based on their patterns of movement or behavior, including gait recognition (the way one walks), but have given rise to whole industries that revolve around predicting one’s behavior based on data and surveillance patterns and are also shaping the behaviors of whole populations. One smart “anti-riot” surveillance system purports to predict mass riots and unauthorized public events by using artificial intelligence to analyze social media, news sources, surveillance video feeds and public transportation data.

Flagging you as a danger based on your spending and consumer activities. With every smartphone we buy, every GPS device we install, every Twitter, Facebook, and Google account we open, every frequent buyer card we use for purchases—whether at the grocer’s, the yogurt shop, the airlines or the department store—and every credit and debit card we use to pay for our transactions, we’re helping Corporate America build a dossier for its government counterparts on who we know, what we think, how we spend our money, and how we spend our time. Consumer surveillance, by which your activities and data in the physical and online realms are tracked and shared with advertisers, has become a $300 billion industry that routinely harvests your data for profit. Corporations such as Target have not only been tracking and assessing the behavior of their customers, particularly their purchasing patterns, for years, but the retailer has also funded major surveillance in cities across the country and developed behavioral surveillance algorithms that can determine whether someone’s mannerisms might fit the profile of a thief.

Flagging you as a danger based on your public activities. Private corporations in conjunction with police agencies throughout the country have created a web of surveillance that encompasses all major cities in order to monitor large groups of people seamlessly, as in the case of protests and rallies. They are also engaging in extensive online surveillance, looking for any hints of “large public events, social unrest, gang communications, and criminally predicated individuals.” Defense contractors have been at the forefront of this lucrative market. Fusion centers, $330 million-a-year, information-sharing hubs for federal, state and law enforcement agencies, monitor and report such “suspicious” behavior as people buying pallets of bottled water, photographing government buildings, and applying for a pilot’s license as “suspicious activity.”

Flagging you as a danger based on your social media activities. Every move you make, especially on social media, is monitored, mined for data, crunched, and tabulated in order to form a picture of who you are, what makes you tick, and how best to control you when and if it becomes necessary to bring you in line. As The Intercept reported, the FBI, CIA, NSA and other government agencies are increasingly investing in and relying on corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram in order to identify potential extremists and predict who might engage in future acts of anti-government behavior. This obsession with social media as a form of surveillance will have some frightening consequences in coming years. As Helen A.S. Popkin, writing for NBC News, observed, “We may very well face a future where algorithms bust people en masse for referencing illegal ‘Game of Thrones’ downloads… the new software has the potential to roll, Terminator-style, targeting every social media user with a shameful confession or questionable sense of humor.”

Flagging you as a danger based on your social network. Not content to merely spy on individuals through their online activity, government agencies are now using surveillance technology to track one’s social network, the people you might connect with by phone, text message, email or through social message, in order to ferret out possible criminals. An FBI document obtained by Rolling Stone speaks to the ease with which agents are able to access address book data from Facebook’s WhatsApp and Apple’s iMessage services from the accounts of targeted individuals and individuals not under investigation who might have a targeted individual within their network. What this creates is a “guilt by association” society in which we are all as guilty as the most culpable person in our address book.

Flagging you as a danger based on your car. License plate readers are mass surveillance tools that can photograph over 1,800 license tag numbers per minute, take a picture of every passing license tag number and store the tag number and the date, time, and location of the picture in a searchable database, then share the data with law enforcement, fusion centers and private companies to track the movements of persons in their cars. With tens of thousands of these license plate readers now in operation throughout the country, affixed to overpasses, cop cars and throughout business sectors and residential neighborhoods, it allows police to track vehicles and run the plates through law enforcement databases for abducted children, stolen cars, missing people and wanted fugitives. Of course, the technology is not infallible: there have been numerous incidents in which police have mistakenly relied on license plate data to capture out suspects only to end up detaining innocent people at gunpoint.

Flagging you as a danger based on your political views. The Church Committee, the Senate task force charged with investigating COINTELPRO abuses in 1975, concluded that the government had carried out “secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power.” The report continued: “Groups and individuals have been harassed and disrupted because of their political views and their lifestyles… Intelligence agencies have served the political and personal objectives of presidents and other high officials.” Nothing has changed since then.

Flagging you as a danger based on your correspondence. Just about every branch of the government—from the Postal Service to the Treasury Department and every agency in between—now has its own surveillance sector, authorized to spy on the American people. For instance, the U.S. Postal Service, which has been photographing the exterior of every piece of paper mail for the past 20 years, is also spying on Americans’ texts, emails and social media posts. Headed up by the Postal Service’s law enforcement division, the Internet Covert Operations Program (iCOP) is reportedly using facial recognition technology, combined with fake online identities, to ferret out potential troublemakers with “inflammatory” posts. The agency claims the online surveillance, which falls outside its conventional job scope of processing and delivering paper mail, is necessary to help postal workers avoid “potentially volatile situations.”

Now the government wants us to believe that we have nothing to fear from these mass spying programs as long as we’ve done nothing wrong.

Don’t believe it.

As Matthew Feeney warns in the New York Times, “In the past, Communists, civil rights leaders, feminists, Quakers, folk singers, war protesters and others have been on the receiving end of law enforcement surveillance. No one knows who the next target will be.

The government’s definition of a “bad” guy is extraordinarily broad, and it results in the warrantless surveillance of innocent, law-abiding Americans on a staggering scale.

Moreover, there is a repressive, suppressive effect to surveillance that not only acts as a potentially small deterrent on crime but serves to monitor and chill lawful First Amendment activity, and that is the whole point.

Weaponized surveillance is re-engineering a society structured around the aesthetic of fear.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, the police state wants us silent, servile and compliant.

They definitely do not want us to engage in First Amendment activities that challenge the government’s power, reveal the government’s corruption, expose the government’s lies, and encourage the citizenry to push back against the government’s many injustices.

And they certainly do not want us to remember that we have rights, let alone attempting to exercise those rights peaceably and lawfully, whether it’s protesting police brutality and racism, challenging COVID-19 mandates, questioning election outcomes, or listening to alternate viewpoints—even conspiratorial ones—in order to form our own opinions about the true nature of government.

 

Connect with The Rutherford Institute

Cover image credit: Tumisu




Ramiro Romani With James Corbett: Take Back Our Tech

Ramiro Romani With James Corbett: Take Back Our Tech

 

“So there’s so many things coming at once. There’s essentially four freedoms that technology has allowed. But then also there are powers — we all know these organizations that are also very scared of us having these freedoms.

“So those are the freedom to travel, the freedom to exchange (which has been bolstered by things like cryptocurrency), the freedom of speech and the freedom of privacy.

“And these four things make it really easy to interact in a way that is in alignment, right, that is voluntary with what you would like.

“And now you see pretty much a law in most Western countries that are coming after these exact freedoms…

“It’s almost like the simulation itself is making it so — it’s forcing us to leave these bigger platforms and into smaller, decentralized community-based groups.

“So throughout things we’ve seen over the past few years — we’ve seen technology being used to try and track and trace every single one of our movements.

“COVID-19 was a perfect example of this. And an article I’m working on talks specifically about contact tracing, which, if people didn’t know, most phones have the ability through Google and Apple for them to install an app on their phone and actually activate it. And they did that en masse to millions of people at once…

“We see technology and we are throwing it out. We’re not going to use it…

“You’re cutting yourself off. You’re doing your own thing, which I completely support your right to live a life free of technology. That’s absolutely your right…

“Ignoring it is not going to make it go away. It’s not going to make these people stop their plans. Understanding it, working with it, changing it — which you absolutely have the possibility to change it. That is the way you can make it better for everyone.”

~ Ramiro Romani

 

Take Back Our Tech

by James Corbett, The Corbett Report
August 23, 2023

 

Ramiro Romani of TakeBackOurTech.org and AbovePhone.com joins us today to discuss technology: what it is, how it works, and how we can make it work for us.

We discuss how governments and big tech corporations are collaborating to undermine our rights to privacy, free expression and even freedom of travel and how we can remove the Big Brother surveillance and controls from our devices.



Watch on Archive / BitChute / Odysee / Rokfin / Rumble / Substack

Show Notes:

TakeBackOurTech.org

Building a digital army: UN peacekeepers fight deadly disinformation

AbovePhone.com

Who Can We Call On? How Our Phones Are Tracked By Big Tech, Telecom, and Government

Electromagnetic Radiation – Shield & Educate Yourself, Save a Life

 

Connect with The Corbett Report




We’re All Suspects in a DNA Lineup, Waiting to be Matched With a Crime

We’re All Suspects in a DNA Lineup, Waiting to be Matched With a Crime

by John & Nisha Whitehead, The Rutherford Institute
August 21, 2023

 

“Make no mistake about it…your DNA can be taken and entered into a national DNA database if you are ever arrested, rightly or wrongly, and for whatever reason… I doubt that the proud men who wrote the charter of our liberties would have been so eager to open their mouths for royal inspection.”

—Justice Antonin Scalia dissenting in Maryland v. King

Be warned: the DNA detectives are on the prowl.

Whatever skeletons may be lurking on your family tree or in your closet, whatever crimes you may have committed, whatever associations you may have with those on the government’s most wanted lists: the police state is determined to ferret them out.

In an age of overcriminalization, round-the-clock surveillance, and a police state eager to flex its muscles in a show of power, we are all guilty of some transgression or other.

No longer can we consider ourselves innocent until proven guilty.

Now we are all suspects in a DNA lineup waiting to be matched up with a crime.

Suspect State, meet the Genetic Panopticon.

DNA technology in the hands of government officials will complete our transition to a Surveillance State in which prison walls are disguised within the seemingly benevolent trappings of technological and scientific progress, national security and the need to guard against terrorists, pandemics, civil unrest, etc.

By accessing your DNA, the government will soon know everything else about you that they don’t already know: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc.

It’s getting harder to hide, even if you think you’ve got nothing to hide.

Armed with unprecedented access to DNA databases amassed by the FBI and ancestry website, as well as hospital newborn screening programs, police are using forensic genealogy, which allows police to match up an unknown suspect’s crime scene DNA with that of any family members in a genealogy database, to solve cold cases that have remained unsolved for decades.

As reported by The Intercept, forensic genetic genealogists are “combing through the genetic information of hundreds of thousands of innocent people in search of a perpetrator.”

By submitting your DNA to a genealogical database such as Ancestry and 23andMe, you’re giving the police access to the genetic makeup, relationships and health profiles of every relative—past, present and future—in your family, whether or not you or they ever agreed to be part of such a database.

Indeed, relying on a loophole in a commercial database called GEDmatch, genetic genealogists are able to sidestep privacy rules that allow people to opt out of sharing their genetic information with police. The end result? Police are now able to identify and target those very individuals who explicitly asked to keep their DNA results private.

In this way, merely choosing to exercise your right to privacy makes you a suspect and puts you in the police state’s crosshairs.

It no longer even matters if you’re among the tens of millions of people who have added their DNA to ancestry databases. As Brian Resnick reports, public DNA databases have grown so massive that they can be used to find you even if you’ve never shared your own DNA.

That simple transaction—a spit sample or a cheek swab in exchange for getting to learn everything about one’s ancestral makeup, where one came from, and who is part of one’s extended family—is the price of entry into the Suspect State for all of us.

After all, a DNA print reveals everything about “who we are, where we come from, and who we will be.” It can also be used to predict the physical appearance of potential suspects.

It’s what police like to refer to a “modern fingerprint.”

Whereas fingerprint technology created a watershed moment for police in their ability to “crack” a case, DNA technology is now being hailed by law enforcement agencies as the magic bullet in crime solving, especially when it helps them crack cold cases of serial murders and rapists.

After all, who wouldn’t want to get psychopaths and serial rapists off the streets and safely behind bars, right?

At least, that’s the argument being used by law enforcement to support their unrestricted access to these genealogy databases, and they’ve got the success stories to prove it.

For instance, a 68-year-old Pennsylvania man was arrested and charged with the brutal rape and murder of a young woman almost 50 years earlier. Relying on genealogical research suggesting that the killer had ancestors who hailed from a small town in Italy, investigators narrowed their findings down to one man whose DNA, obtained from a discarded coffee cup, matched the killer’s.

In another cold case investigation, a 76-year-old man was arrested for two decades-old murders after his DNA was collected from a breathalyzer during an unrelated traffic stop.

Yet it’s not just psychopaths and serial rapists who are getting caught up in the investigative dragnet. In the police state’s pursuit of criminals, anyone who comes up as a possible DNA match—including distant family members—suddenly becomes part of a circle of suspects that must be tracked, investigated and ruled out.

In this way, “guilt by association” has taken on new connotations in a technological age in which one is just a DNA sample away from being considered a person of interest in a police investigation. As Jessica Cussins warns in Psychology Today, “The fundamental fight—that data from potentially innocent people should not be used to connect them to unrelated crimes—has been lost.”

Until recently, the government was required to at least observe some basic restrictions on when, where and how it could access someone’s DNA. That was turned on its head by various U.S. Supreme Court rulings that heralded the loss of privacy on a cellular level.

For instance, the U.S. Supreme Court ruled in Maryland v. King that taking DNA samples from a suspect doesn’t violate the Fourth Amendment. The Court’s subsequent decision to let stand the Maryland Court of Appeals’ ruling in Raynor v. Maryland, which essentially determined that individuals do not have a right to privacy when it comes to their DNA, made Americans even more vulnerable to the government accessing, analyzing and storing their DNA without their knowledge or permission.

It’s all been downhill since then.

Indeed, the government has been relentless in its efforts to get hold of our DNA, either through mandatory programs carried out in connection with law enforcement and corporate America, by warrantlessly accessing our familial DNA shared with genealogical services such as Ancestry and 23andMe, or through the collection of our “shed” or “touch” DNA.

Get ready, folks, because the government has embarked on a diabolical campaign to create a nation of suspects predicated on a massive national DNA database.

This has been helped along by Congress (which adopted legislation allowing police to collect and test DNA immediately following arrests), President Trump (who signed the Rapid DNA Act into law), the courts (which have ruled that police can routinely take DNA samples from people who are arrested but not yet convicted of a crime), and local police agencies (which are chomping at the bit to acquire this new crime-fighting gadget).

For example, Rapid DNA machines—portable, about the size of a desktop printer, highly unregulated, far from fool-proof, and so fast that they can produce DNA profiles in less than two hours—allow police to go on fishing expeditions for any hint of possible misconduct using DNA samples.

Journalist Heather Murphy explains: “As police agencies build out their local DNA databases, they are collecting DNA not only from people who have been charged with major crimes but also, increasingly, from people who are merely deemed suspicious, permanently linking their genetic identities to criminal databases.”

All 50 states now maintain their own DNA government databases, although the protocols for collection differ from state to state. Increasingly, many of the data from local databanks are being uploaded to CODIS, the FBI’s massive DNA database, which has become a de facto way to identify and track the American people from birth to death.

Even hospitals have gotten in on the game by taking and storing newborn babies’ DNA, often without their parents’ knowledge or consent. It’s part of the government’s mandatory genetic screening of newborns. In many states, the DNA is stored indefinitely. There’s already a move underway to carry out whole genome sequencing on newborns, ostensibly to help diagnose rare diseases earlier and improve health later in life, which constitutes an ethical minefield all by itself.

What this means for those being born today is inclusion in a government database that contains intimate information about who they are, their ancestry, and what awaits them in the future, including their inclinations to be followers, leaders or troublemakers.

For example, police in New Jersey accessed the DNA from a nine-year-old blood sample of a newborn baby in order to identify the child’s father as a suspect in a decades-old sexual assault.

The ramifications of this kind of DNA profiling are far-reaching.

At a minimum, these DNA databases do away with any semblance of privacy or anonymity.

These genetic databases and genomic technology also make us that much more vulnerable to creeps and cyberstalkersgenetic profiling, and those who would weaponize the technology against us.

Unfortunately, the debate over genetic privacy—and when one’s DNA becomes a public commodity outside the protection of the Fourth Amendment’s prohibition on warrantless searches and seizures—continues to lag far behind the government and Corporate America’s encroachments on our rights.

Moreover, while much of the public debate, legislative efforts and legal challenges in recent years have focused on the protocols surrounding when police can legally collect a suspect’s DNA (with or without a search warrant and whether upon arrest or conviction), the question of how to handle “shed” or “touch” DNA has largely slipped through without much debate or opposition.

As scientist Leslie A. Pray notes:

We all shed DNA, leaving traces of our identity practically everywhere we go… In fact, the garbage you leave for curbside pickup is a potential gold mine of this sort of material. All of this shed or so-called abandoned DNA is free for the taking by local police investigators hoping to crack unsolvable cases… shed DNA is also free for inclusion in a secret universal DNA databank.

What this means is that if you have the misfortune to leave your DNA traces anywhere a crime has been committed, you’ve already got a file somewhere in some state or federal database—albeit it may be a file without a name.

As the dissenting opinion to the Maryland Court of Appeals’ shed DNA ruling in Raynor rightly warned, “A person can no longer vote, participate in a jury, or obtain a driver’s license, without opening up his genetic material for state collection and codification.”

It’s just a matter of time before government agents will know everywhere we’ve been and how long we were at each place by following our shed DNA. After all, scientists can already track salmon across hundreds of square miles of streams and rivers using DNA.

Today, helped along by robotics and automation, DNA processing, analysis and reporting takes far less time and can bring forth all manner of information, right down to a person’s eye color and relatives. Incredibly, one company specializes in creating “mug shots” for police based on DNA samples from unknown “suspects” which are then compared to individuals with similar genetic profiles.

Of course, none of these technologies are infallible.

DNA evidence can be wrong, either through human error, tampering, or even outright fabrication, and it happens more often than we are told.

What this amounts to is a scenario in which we have little to no defense against charges of wrongdoing, especially when “convicted” by technology, and even less protection against the government sweeping up our DNA in much the same way it sweeps up our phone calls, emails and text messages.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, it’s only a matter of time before the police state’s pursuit of criminals from the past expands into genetic profiling and a preemptive hunt for criminals of the future.

 

Connect with The Rutherford Institute

Cover image credit: OpenClipart-Vectors




Who Caused the Fire in Hawaii?: On the WEF, Global Plans for Smart City Governance & Deliberate Destruction of Key Locations

Who Caused the Fire in Hawaii?: On the WEF, Global Plans for Smart City Governance & Deliberate Destruction of Key Locations

 

“…Because we all know the World Economic Forum are the ones pulling the strings. Right?

“So if we know that, when we see a fire like that, then the second that we hear that the plans are to bring in a Smart City, you’ll know why it was done.”

~ The End of the Beginning from ‘The Maui Experiment! How They Destroyed Lahaina to Bring In a WEF Smart City Governance…’ 

 

Truth Comes to Light editor’s note:

Below is a compilation of work by Sam Tripoli and The End of the Beginning YouTube channel, along with photo images courtesy of the US Coast Guard.

Transcript of Sam Tripoli’s short video at X was prepared by Truth Comes to Light.

Links to related documents and articles are also provided as references.

~Kathleen

* Update by Sam Tripoli has been added. See his videos below. 1) People are being turned away by the military who want to help and donate. 2) The warning system didn’t go off and they are claiming it must have been a” malfunction”. 3) An executive order was signed in July stating they could take your land if you needed to be rezoned.

 

Who Caused the Fire in Hawaii?

Transcript:

So today we’re going to give a little update on the Hawaiian fires.

Now I want you to look at this footage. And this doesn’t look like a fire to me.
It looks like something almost exploded, or something went off.

Now what’s interesting is certain things are still standing, while other things are not.

Now the governor did say this is climate change doing this. Interesting.

What they don’t talk about is in January, how they had in Maui, a Smart City Conference to turn Maui into an entire Smart Island — changing everything to electric. Renewables. Solar panels. And pushing everybody into electric vehicles. 15-Minute Smart Cities.

So now what’s also interesting is next month, in September, Hawaii is hosting the Digital Government Summit, utilizing AI to govern the island.

Hmmm. It’s almost like they’re resetting something to start rebuilding for this, which they’re trying to push.

Now we look at all the climate change narrative that they’re going to try to push, but they’re not going to talk about the Weather Modification Act of 1976.

I highly recommend everybody look to this act. Because who is involved in the weather modification activities?

Department of Agriculture. Department of Defense. Department of Interior. EPA. And NASA.

So if they’re modifying the weather, then could they have caused this event?

So if we see that the Department of Defense and other factions are responsible for modifying the weather, well then if we look at Direct Energy weapons, we can maybe see how this can all relate to this event.

[Important update by Sam Tripoli]

Related Links:

Hungry Heroes Hawaii Emergency Fire Response
~~ Fundraiser
~~

 

Hawaii Digital Government Summit 2023

Hawaii International Conference on System Sciences 2023

 Weather Modification Act (1976)

World Economic Forum: Our alliance is creating smart city governance


 

The images below are courtesy of United States Coast Guard and are in the public domain.

Lahaina Lighthouse surrounded by ruins after August 2023 wildfire (source)

Burned out cars and the remains of buildings are seen in Lahaina town in this image captured Wednesday by U.S. Civil Air Patrol. (source)

Two Hawaii Army National Guard CH-47 Chinook perform aerial water bucket drops on the Island of Maui to assist the fight of wildfires, Maui, Hawaii, August 09, 2023. The two air crews performed 58 total bucket drops in 5 hours in up country Maui totaling over one hundred thousand gallons dropped on the fires. (U.S. National Guard Video by Air Force Master Sgt. Andrew Jackson) (source)

The Coast Guard, along with federal, state, and local partners continue to respond following the Lahaina wildfires in Maui, HI August 9, 2023. A total of 17 lives were saved from the water and 40 survivors were located ashore by Coast Guard Station Maui boat crews. (source)

Damage in the harbor of Lahaina on the island of Maui following a devastating wildfire, via the U.S. Coast Guard (source)

 

See related by The End of the Beginning YouTube channel:
‘The Maui Experiment! How They Destroyed Lahaina to Bring In a WEF Smart City Governance…’ 

 

That Didn’t Take Long! Look Who Donated $100 Million to Maui’s Smart City Rebuild!



 

Cover image credit: US Coast Guard (source) (source)


See Related Articles:

Chemtrails Exposed: The Deep State and the New Manhattan Project

“Apocalyptic Scene”: Out-of-Control Wildfire Spreads on Hawaii’s Maui Island

Wildfires As a Weapon: US Military Exposed

Dane Wigington: Geoengineering Is Fueling Firestorm Catastrophes

Dr. Reiner Fuellmich With Andrew Johnson on Undisclosed “Black Technology”, the Truth About 9/11, Planned UFO False Flag Events, Steven Greer’s “Disclosure Project”, Directed Energy Weapons, the Cover-Up of Free Energy Already Available, “Psychological Terrorism” & the Attack on Human Consciousness

DEW (Directed Energy Weapon) Beams Into New Madrid Seismic Zone as 1,100F Temps Flare Up

Geoengineering: Romanian General Emil Strainu on the Terrifying Possibilities of Geo-Warfare

Weather Warfare: Beware the US Military’s Experiments with Climatic Warfare

Australia Burning: Disaster Capitalism or Something Else?

Joseph P. Farrell: An Odd Thing About Those Fires in Greece…

Reiner Fuellmich With Peter Mac Isaac: Why Are Canada´s Forests Burning? 




Nanotechnology Found in Both Vaxxed And Un-Vaxxed

Nanotechnology Found in Both Vaxxed And Un-Vaxxed

by Greg Reese, The Reese Report
August 5, 2023

 



Doctor Charles Morgan, former CIA and consultant for the US military on neurological sciences, spoke to cadets at West Point in 2018 about the current state of technology. He briefed the cadets on experiments from 2013 where humans were given neural implants that allowed them to control prosthetic arms with their thoughts. Experiments where one person can control another person’s hands by just wearing an EEG cap. Experiments where information is transmitted from one mind to another. And experiments where memories are erased.

Doctor Morgan admits they have the technology to target an individual person and are working on the ability to erase the memories of any human they choose. Their biggest challenge five years ago was being able to interface with the hippocampus without the use of physical wires. And this is most likely one of the motivating factors for the deployment of the experimental COVID shots.

Using Dark-field microscopy, Doctor Ana Maria Mihalcea has captured in great detail what the scientific literature describes as effective technologies that exist today. Technology such as Quantum Dots.

Quantum Dots are nanotechnology with the ability to organize, operate, communicate, and build structures within the blood. They do so with a tunable photoluminescence that can be programmed to dictate various tasks via optical communication. The description and images displayed in the scientific literature compared to what Mihalcea’s Dark-field microscopy has captured are the same. You can see the Quantum Dots blinking in different colors acting as the artificial intelligence directing the self-assembly around them. Bubbles are created within the blood that act as construction sites. Within these construction bubbles, the Quantum Dots organize the various materials into self-assembly.

These technologies are being found in both the blood of the vaccinated and in the blood of the un-vaccinated. Depending on what materials are available, the Quantum Dots will trigger them into self-assembly. The COVID vaccines are full of rare and heavy metals to make all manner of nanotechnology. But it seems as if almost everyone is infected with some sort of nano-tech. According to several research teams, everyone’s blood seems to contain the materials required to produce the filaments, and the lattice work for this technology. Blood samples that appear to be healthy have been completely transformed by applying a mere 10 milliamps of electric current for two hours. And it looks as if we may have been infected by the Chemtrails.

Morgellons disease was first reported in 2002. It’s when synthetic fibers or filaments are growing in a person’s body. It has been theorized for decades that this was being spread via Chemtrails. And under a microscope, it appears to be the same filaments that people today are calling blood clots. And what the scientific journals call self-assembled hydrogels. According to Dane Wiggington from Geoengineering watch dot org, nanoparticles are being sprayed worldwide.

The good news is that Doctor Mihalcea’s research has found a remedy. The iron in the infected blood has been oxidized to a 3-plus state. And by taking antioxidants one is able to dissolve these filament clots. She has found that EDTA Chelation therapy will remedy infected blood within 3 days. And mega-dosing Vitamin C also works.

 

Connect with The Reese Report

Cover image credit: PublicDomainPictures




“Remembering Nearfield” Awarded Best Health Film at Cannes World Film Festival, July 2023

“Remembering Nearfield” Awarded Best Health Film at Cannes World Film Festival, July 2023

 

Remembering Nearfield from SC on Vimeo.

 

by Patricia Burke, Safe Tech International
sourced from Activist Post
July 31, 2023

 

It’s a winner.

In just over three months, Remembering Nearfield, has become an internationally acclaimed animated short film. Its aim is to break down taboos around the subject of electromagnetic harm in our society and catalyze global conversations about electromagnetic hypersensitivity (EHS), a disability which brings an uncertain future for those highly sensitized and intolerant of the radiation from man-made electromagnetic fields.

The health impacts of EMF radiation exposure on society have remained subject to relentless scientific scrutiny. EHS is constantly being flagged up by scientists in their appeals to address a host of shortcomings in existing globally-adopted EMF radiation exposure guidelines to raise questions about public safety and draw attention to the most vulnerable, like children and those with EHS (who are not considered in the one-size-fits-all attitude of these industry-friendly guidelines).

Remembering Nearfield is eloquently narrated by Corriëlle van Vuuren. She’s an entrepreneur stricken by electromagnetic hypersensitivity compelled to speak out about her disability. Comfortable in the belief that technologies are safe, society prefers to remain naive. Her testimony challenges this blind trust.

No-one Should Be Excluded

As Corriëlle’s revelatory testimony reveals, people with EHS become so overwhelmed and ill, as their health declines, they can eventually lose everything: property, possessions, status, family and social relationships, and income. No-one in society should be excluded because of the nature of their disability. Education matters.

Professor Olle Johansson formerly of the Karolinska Institute in Sweden, has this to say about Remembering Nearfield: “For an academic scientist like myself, it is always very impressive to see skilled movie makers, artists, and performers, summarize in less than 10 minutes a staggering 45 years of research!”

Educational, original, and often moving, this animated film’s wide and enthusiastic reception indicates that the world is ready to learn about EHS. Remembering Nearfield has been awarded Best Health Film at the prestigious Cannes World Film Festival in July 2023.

As well as being selected and nominated by many other festivals of note, it has won ten awards since entering an array of over 235 film festivals since April 2023.

The recognition of film festivals and prospective screenings throughout the year are wonderful affirmations about the mission of the film to raise awareness and educate. The film underscores the value of EMF awareness and safety that concerns all of society. It also exposes the discrimination that has stood in the way of progress in this regard. Remembering Nearfield stands for social change, to drive equality for people with electromagnetic hypersensitivity, to bring equal recognition, accommodation, and support on par with other disabilities.

Remembering Nearfield opens our eyes anew to a neglected and misunderstood disability in a world of virtually unavoidable EMF pollution and guides us towards practical, easy-to-achieve solutions so society can reduce EMF radiation. People with EHS may no longer live in exclusion or isolation when society realizes that lowering environmental EMF not only leads to a better place for people with EHS to live and work but can have boundless potential for improving health for all.

 

Connect with Safe Tech International

Cover image credit: geralt




Technocensorship: The Government’s War on So-Called Dangerous Ideas

Technocensorship: The Government’s War on So-Called Dangerous Ideas

by John & Nisha Whitehead, The Rutherford Institute
August 1, 2023

 

“There is more than one way to burn a book. And the world is full of people running about with lit matches.”

—Ray Bradbury

What we are witnessing is the modern-day equivalent of book burning which involves doing away with dangerous ideas—legitimate or not—and the people who espouse them.Seventy years after Ray Bradbury’s novel Fahrenheit 451 depicted a fictional world in which books are burned in order to suppress dissenting ideas, while televised entertainment is used to anesthetize the populace and render them easily pacified, distracted and controlled, we find ourselves navigating an eerily similar reality.

Welcome to the age of technocensorship.

On paper—under the First Amendment, at least—we are technically free to speak.

In reality, however, we are now only as free to speak as a government official—or corporate entities such as Facebook, Google or YouTube—may allow.

Case in point: internal documents released by the House Judiciary Select Subcommittee on Weaponization of the Federal Government confirmed what we have long suspected: that the government has been working in tandem with social media companies to censor speech.

By “censor,” we’re referring to concerted efforts by the government to muzzle, silence and altogether eradicate any speech that runs afoul of the government’s own approved narrative.

This is political correctness taken to its most chilling and oppressive extreme.

The revelations that Facebook worked in concert with the Biden administration to censor content related to COVID-19, including humorous jokes, credible information and so-called disinformation, followed on the heels of a ruling by a federal court in Louisiana that prohibits executive branch officials from communicating with social media companies about controversial content in their online forums.

Likening the government’s heavy-handed attempts to pressure social media companies to suppress content critical of COVID vaccines or the election to “an almost dystopian scenario,” Judge Terry Doughty warned that “the United States Government seems to have assumed a role similar to an Orwellian ‘Ministry of Truth.’

This is the very definition of technofascism.

Clothed in tyrannical self-righteousness, technofascism is powered by technological behemoths (both corporate and governmental) working in tandem to achieve a common goal.

The government is not protecting us from “dangerous” disinformation campaigns. It is laying the groundwork to insulate us from “dangerous” ideas that might cause us to think for ourselves and, in so doing, challenge the power elite’s stranglehold over our lives.

Thus far, the tech giants have been able to sidestep the First Amendment by virtue of their non-governmental status, but it’s a dubious distinction at best when they are marching in lockstep with the government’s dictates.

As Philip Hamburger and Jenin Younes write for The Wall Street Journal: “The First Amendment prohibits the government from ‘abridging the freedom of speech.’ Supreme Court doctrine makes clear that government can’t constitutionally evade the amendment by working through private companies.”

Nothing good can come from allowing the government to sidestep the Constitution.

The steady, pervasive censorship creep that is being inflicted on us by corporate tech giants with the blessing of the powers-that-be threatens to bring about a restructuring of reality straight out of Orwell’s 1984, where the Ministry of Truth polices speech and ensures that facts conform to whatever version of reality the government propagandists embrace.

Orwell intended 1984 as a warning. Instead, it is being used as a dystopian instruction manual for socially engineering a populace that is compliant, conformist and obedient to Big Brother.

This is the slippery slope that leads to the end of free speech as we once knew it.

In a world increasingly automated and filtered through the lens of artificial intelligence, we are finding ourselves at the mercy of inflexible algorithms that dictate the boundaries of our liberties.

Once artificial intelligence becomes a fully integrated part of the government bureaucracy, there will be little recourse: we will all be subject to the intransigent judgments of techno-rulers.

This is how it starts.

First, the censors went after so-called extremists spouting so-called “hate speech.”

Then they went after so-called extremists spouting so-called “disinformation” about stolen elections, the Holocaust, and Hunter Biden.

By the time so-called extremists found themselves in the crosshairs for spouting so-called “misinformation” about the COVID-19 pandemic and vaccines, the censors had developed a system and strategy for silencing the nonconformists.

Eventually, depending on how the government and its corporate allies define what constitutes “extremism, “we the people” might all be considered guilty of some thought crime or other.

Whatever we tolerate now—whatever we turn a blind eye to—whatever we rationalize when it is inflicted on others, whether in the name of securing racial justice or defending democracy or combatting fascism, will eventually come back to imprison us, one and all.

Watch and learn.

We should all be alarmed when any individual or group—prominent or not—is censored, silenced and made to disappear from Facebook, Twitter, YouTube and Instagram for voicing ideas that are deemed politically incorrect, hateful, dangerous or conspiratorial.

Given what we know about the government’s tendency to define its own reality and attach its own labels to behavior and speech that challenges its authority, this should be cause for alarm across the entire political spectrum.

Here’s the point: you don’t have to like or agree with anyone who has been muzzled or made to disappear online because of their views, but to ignore the long-term ramifications of such censorship is dangerously naïve, because whatever powers you allow the government and its corporate operatives to claim now will eventually be used against you by tyrants of your own making.

As Glenn Greenwald writes for The Intercept:

The glaring fallacy that always lies at the heart of pro-censorship sentiments is the gullible, delusional belief that censorship powers will be deployed only to suppress views one dislikes, but never one’s own views… Facebook is not some benevolent, kind, compassionate parent or a subversive, radical actor who is going to police our discourse in order to protect the weak and marginalized or serve as a noble check on mischief by the powerful. They are almost always going to do exactly the opposite: protect the powerful from those who seek to undermine elite institutions and reject their orthodoxies. Tech giants, like all corporations, are required by law to have one overriding objective: maximizing shareholder value. They are always going to use their power to appease those they perceive wield the greatest political and economic power.

Be warned: it’s a slippery slope from censoring so-called illegitimate ideas to silencing truth.

Eventually, as George Orwell predicted, telling the truth will become a revolutionary act.

If the government can control speech, it can control thought and, in turn, it can control the minds of the citizenry.

It’s happening already.

With every passing day, we’re being moved further down the road towards a totalitarian society characterized by government censorship, violence, corruption, hypocrisy and intolerance, all packaged for our supposed benefit in the Orwellian doublespeak of national security, tolerance and so-called “government speech.”

Little by little, Americans are being conditioned to accept routine incursions on their freedoms.

This is how oppression becomes systemic, what is referred to as creeping normality, or a death by a thousand cuts.

It’s a concept invoked by Pulitzer Prize-winning scientist Jared Diamond to describe how major changes, if implemented slowly in small stages over time, can be accepted as normal without the shock and resistance that might greet a sudden upheaval.

Diamond’s concerns related to Easter Island’s now-vanished civilization and the societal decline and environmental degradation that contributed to it, but it’s a powerful analogy for the steady erosion of our freedoms and decline of our country right under our noses.

As Diamond explains, “In just a few centuries, the people of Easter Island wiped out their forest, drove their plants and animals to extinction, and saw their complex society spiral into chaos and cannibalism… Why didn’t they look around, realize what they were doing, and stop before it was too late? What were they thinking when they cut down the last palm tree?”

His answer: “I suspect that the disaster happened not with a bang but with a whimper.”

Much like America’s own colonists, Easter Island’s early colonists discovered a new world—“a pristine paradise”—teeming with life. Yet almost 2000 years after its first settlers arrived, Easter Island was reduced to a barren graveyard by a populace so focused on their immediate needs that they failed to preserve paradise for future generations.

The same could be said of the America today: it, too, is being reduced to a barren graveyard by a populace so focused on their immediate needs that they are failing to preserve freedom for future generations.

In Easter Island’s case, as Diamond speculates:

The forest…vanished slowly, over decades. Perhaps war interrupted the moving teams; perhaps by the time the carvers had finished their work, the last rope snapped. In the meantime, any islander who tried to warn about the dangers of progressive deforestation would have been overridden by vested interests of carvers, bureaucrats, and chiefs, whose jobs depended on continued deforestation… The changes in forest cover from year to year would have been hard to detect… Only older people, recollecting their childhoods decades earlier, could have recognized a difference. Gradually trees became fewer, smaller, and less important. By the time the last fruit-bearing adult palm tree was cut, palms had long since ceased to be of economic significance. That left only smaller and smaller palm saplings to clear each year, along with other bushes and treelets. No one would have noticed the felling of the last small palm.

Sound painfully familiar yet?

We’ve already torn down the rich forest of liberties established by our founders. It has vanished slowly, over the decades. The erosion of our freedoms has happened so incrementally, no one seems to have noticed. Only the older generations, remembering what true freedom was like, recognize the difference. Gradually, the freedoms enjoyed by the citizenry have become fewer, smaller and less important. By the time the last freedom falls, no one will know the difference.

This is how tyranny rises and freedom falls: with a thousand cuts, each one justified or ignored or shrugged over as inconsequential enough by itself to bother, but they add up.

Each cut, each attempt to undermine our freedoms, each loss of some critical right—to think freely, to assemble, to speak without fear of being shamed or censored, to raise our children as we see fit, to worship or not worship as our conscience dictates, to eat what we want and love who we want, to live as we want—they add up to an immeasurable failure on the part of each and every one of us to stop the descent down that slippery slope.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, we are on that downward slope now.

 

Connect with The Rutherford Institute

Cover image credit: CDD20




Elon, X, and the Epitome of a Front Man

Elon, X, and the Epitome of a Front Man
The illusion of choice will make your financial enslavement less painful

 



by Greg Reese, The Reese Report
July 26, 2023

 

Elon Musk announced over a year ago that he planned to convert Twitter into an everything app like China’s WeChat. An app to do everything including online banking and finance.

Last April Musk announced that Twitter Inc. has been renamed to X Corp., he created a new Artificial Intelligence company known as X.AI and he partnered with eToro for stock and crypto exchange.

The media would have you believe that Elon Musk is an independent billionaire genius whose dream is to revolutionize banking. But this story is demonstrably false. The facts tell us that Elon Musk is a frontman for the same old same old. But because he says there are only two genders he has gained the trust of a radicalized people in a time of war, without ever having to explain his lies.

Musk says he grew up poor but his family was rich with emeralds and had a history of abuse and witchcraft. Telltale signs of multi-generational mind control.

Musk received tens of thousands of dollars from his parents to launch his first business venture. A digital phone book known as Zip2. Outside coders were hired to write the entire thing because Elon couldn’t code. Zip2 sold for millions and went nowhere. But Elon made 22 million dollars and with the help of the mainstream media, launched his new persona as a quirky pop-star genius. He then acquired x dot com and announced he would create an online bank known as X. He partnered with banking experts who all left the company after accusing Elon of lying to the media about the product. Which is all he did.

Elon Musk is believed to have co-founded PayPal. This is false. In 2000 Musk sold his failing x dot com business to Confinity, a company founded in 1998 by Peter Thiel and Max Levchin. All Musk reportedly did there was insist on changing the company’s name to X. He was forced out but somehow managed to get them to agree in writing to remove all references to ‘founders’ from the company website.

Musk made nearly two hundred million off the sale of PayPal, a company that he contributed nothing to, and then used that money along with the illusion of being a successful businessman co-founder to buy his way into Tesla.

Tesla Motors was founded in 2003 by Marc Tarpenning and Martin Eberhard, who developed the Tesla Roadster. When Tesla accepted millions from Elon, it came with the condition that he be named chairman of the company. Even though he only contributed money, Musk was unable to hide his anger that the media wasn’t giving him credit for Tesla Motors. And after forcing Eberhard out of the company he re-wrote their history to have himself listed as an original co-founder.

This obvious fake persona of a billionaire quirky genius has worked so well that few even question SpaceX. The official story is that Elon, who has absolutely no experience with rocket science, came up with the idea for SpaceX while traveling to Russia with the CIA’s Michael Griffin of In-Q-Tel. Shortly after this conversation, Griffin was made administrator of NASA where he launched the COTS program that privatized NASA’s rocket program. And awarded two-hundred and seventy-eight million dollars to SpaceX who had never made or flown any rockets. Musk then partnered with rocket engineer Tom Mueller, who went on to produce rocket technology that has clearly been developed for years in the private sectors of the military-industrial complex.

Elon’s companies have received billions in government subsidies over the last two decades. Money that was later spent on the purchase of Twitter. Where he immediately began the process of turning it into an everything app with its own banking system. Or rather, the ruling class cabal that pulls his strings is turning Twitter into an everything app with its own banking system. And that should be alarming. But he says there are only two genders, and families are good, and people love a hero.

They don’t need to chip you to control you. We already have iris scanners and palm scanners. A cashless society will do the job. And for many, Elon’s X will be preferable to Amazon’s palm scanners. The illusion of choice will make your financial enslavement less painful.

 

Connect with Greg Reese




Arthur Firstenberg on Electrosmog: “The Ability to Use a Mobile Device Everywhere on Earth Means That Every Square Meter of the Earth Must Be Irradiated at All Times.”

Arthur Firstenberg on Electrosmog: “The Ability to Use a Mobile Device Everywhere on Earth Means That Every Square Meter of the Earth Must Be Irradiated at All Times.”

 

Image credit Goumbik, pixabay

 

Electrosmog: A Policy Brief

Guidance to governments, legislators, environmental organizations, schools, and religious, political, and community leaders.

by Arthur Firstenberg, Cellular Phone Task Force
July 26, 2023

 

Guidance to governments, legislators, environmental organizations, schools, and religious, political and community leaders.  
If your organization wishes to join in supporting this brief, please email us.
Key Points
  1. The study of electricity should be restored to biology and medicine.
  2. Personal wireless communication must be phased out because the radiation that carries all the messages is destroying life on earth.
  3. Mobile phones must be replaced with landline phones, WiFi with ethernet cables, and other wireless consumer devices with devices connected by wires and cables.
  4. Mobile phone antennas and masts must be phased out and removed.
  5. Wireless technology must be removed from vehicles.
  6. Smart meters must be replaced with analog meters.
  7. Smart highways, smart cities, and the Internet of Things must cease being developed and deployed.
  8. Radar stations must be limited in number, location and power.
  9. Radar (microwave) ovens should not be used for heating food.
  10. An international treaty on electrosmog, addressing radiation on land, in the oceans, and in space, must be drafted.
Introduction

Electrosmog is the totality of the electric fields, magnetic fields, and electromagnetic radiation that bathes us 24/7 from all electrical and electronic devices, electric wires, power lines, and wireless devices and antennas. With wired communication, information is transmitted via the wires, and the electromagnetic fields (EMFs) and radiation are unintentional. Proper engineering can reduce these unwanted fields and radiation to a minimum.

By contrast, with wireless communication, the radiation is the product. Radiation substitutes for wires in transmitting information.

Wireless means radiation. The ability to use a mobile device everywhere on earth means that every square meter of the earth must be irradiated at all times. Mobile devices operate in the microwave spectrum, with the result that the entire planet is now swimming in a sea of microwave radiation that is millions to billions of times stronger than the radiation from the sun and stars with which life evolved (1).

Life is based not only on chemistry but more fundamentally on electricity (2, 3). The unimpeded flow of electrons is essential to the functioning of our nerves, heart, and metabolism (3). Interference with these electric currents causes neurological diseases, heart disease, metabolic diseases such as diabetes, and cancer (4).  Organisms that have a very high metabolism, such as bees and other insects, are being wiped out (5, 6). Thousands of studies document the devastating effects of wireless radiation on mammals, birds, insects, amphibians, and forests (7).

Because EMFs are not a foreign substance to living beings, a toxicology model does not apply and there is not a dose response: reducing the power does not reduce the effect. Even a signal that is almost immeasurably weak can interfere with normal biological functioning (8). “While the dose rate/SAR concept is adequate for description of acute thermal effects, it is not applicable for chronic exposures to N[on]T[hermal] M[icro]W[aves].” (9). Even at near-zero power levels, microwave radiation has been found to change the structure of DNA (10) and alter brains waves (11). Some studies have even found an inverse dose response. When the power of the radiation was reduced 1000-fold, damage to the blood-brain barrier increased (12). A review of 113 studies found that radiation with the lowest power tended to cause the greatest ecological damage (5). In another review of 108 experimental studies, a lower exposure level tended to have a greater biological effect, and the difference was highly significant (p < 0.001) (13).

The damage done to our health and our world by wireless devices and their infrastructure is caused not only by the microwave carrier frequencies, but also by the low-frequency modulation and pulsations that carry the transmitted information. “Thus modulation can be considered as information content embedded in the higher frequency carrier wave that may have health consequences beyond any effect from the carrier wave directly” (14). No matter what the carrier wave, the modulation is the same because it has to carry the same information. Therefore using light as the carrier wave, as is being done over short distances with LiFi, or using sound as the carrier wave, as is being done in the oceans, does not reduce the harm.

The finding that only a single two-hour exposure to a mobile phone during their lifetime, even when the power of the phone was reduced 100-fold, caused permanent brain damage in young rats (15) makes it likely that we are raising, and perhaps have already raised, a generation of children with brain damage. There is no question but that this must cease, and that cell phones are not safe at any power level, at any distance from the head, and for any duration.

Purpose of This Document

This policy brief provides an overview of an immediate threat to life on earth—even more immediate than climate change—that has been allowed to get completely out of control because it has been completely ignored. The source of the threat is a technology to which everyone has become addicted, and which, during the past two and a half decades, has become firmly entrenched in every aspect of life. Although more scientific studies have been published on the health and environmental effects of EMFs than on almost any other pollutant except for mercury and tobacco smoke, the impact of all this research upon public policy to date has been zero. Average citizens still do not even know that a mobile device emits radiation. Much less do they suspect that it is causing them brain damage or threatening their life and their future on this planet. The purpose of this brief is to outline actions that are required to be taken by political leaders, religious leaders, environmental organizations, public schools, medical schools and doctors to educate the public and to begin to dismantle this existential threat to the earth.

Essential Actions Required by National and International Leaders and Organizations

I.     An International Treaty or Convention on Electrosmog must be adopted by all nations

The number of antennas and their distance from people and wildlife must be strictly regulated. The elements of an international treaty should include the following:

A.   Phasing out and eventual prohibition of personal
wireless devices, including mobile devices and WiFi

At present there are about 15 billion mobile devices and 6 million mobile phone masts; the earth cannot survive this. Private individuals should not have the right to irradiate their neighbors. Businesses should not have the right to irradiate their patrons.

B.  Limiting antennas and devices that emit radiation to radio and television stations, emergency services such as police and fire departments, and radar for civil defense, aviation and shipping

C.  Limiting the location, number, and power of civil defense radars

The present situation of unlimited power has allowed 3-billion-watt radars such as PAVE PAWS, which has irradiated millions of people on both coasts of the United States for more than four decades (16).

A five-year investigation into the health and environmental effects of a civil defense radar in Latvia after the end of the Cold War resulted in the decommissioning and removal of that radar. School children in the area—even children who lived 20 kilometers away—had impaired motor function, memory and attention, reduced lung capacity, and elevated white blood cell counts. The entire local population suffered from headaches, sleep disturbances and elevated white blood cells. Human reproduction was affected: 25 percent fewer boys than girls were born during the years the radar operated. Chromosome damage was found in local cows. Nest-boxes near the radar were occupied by extremely low numbers of birds. The average growth rings of trees during the years of the radar’s operation were only half as wide as before the radars were constructed, and study of pine cones revealed the trees were aging prematurely. Seedlings in the area grew into deformed plants with reduced reproductive capacity (17, 18, 19, 20,21, 22, 23, 24).

D.  Phasing out weather radars, as they do more harm than good

There are an estimated 1,500 of these extremely powerful installations scattered throughout the world. Each of the 160 NEXRAD radars in the United States has an EIRP (Effective Isotropic Radiated Power) of 32 gigawatts (32 billion watts) (25). These radars are heavily irradiating people and wildlife, and are neither reliable nor essential to weather forecasting (26).

E.  Prohibition of antennas inside national parks, wildlife preserves and protected nature areas

A 2015 report to UNESCO detailed the devastating impact of communication antennas inside a World Heritage Site in Australia. When a telecommunication tower atop Mount Nardi began to convert its antennas from analog (2G) to digital (3G) in 2002, a steady increase in species diversity suddenly reversed and became a steady decrease in species diversity. In 2002 insect populations and diversity began to decline. In 2009, enhanced 3G was installed, along with an additional 150 pay television channels. 27 bird species promptly left the mountain, and insect volumes and species dropped dramatically. In late 2012 and early 2013 4G was installed, and 49 more bird species promptly left the mountain.

“From this time, all locally known bat species became scarce, 4 common species of cicada almost disappeared, as well as the once enormous, varied population of moths & butterfly species. Frogs and tadpole populations were drastically reduced; the massive volumes and diverse species of ant populations became uncommon to rare… [F]rom 70 to 90 % of the wildlife has become rare or has disappeared from the Nightcap National Park within a 2-3 km radius of the Mt. Nardi tower complex” (27).

F.  Prohibition of the manufacture of vehicles with wireless technology and radar

WiFi, Bluetooth, wireless ignitions, wireless CarPlay, wireless tire pressure monitors, and radar are just a few of the in-car systems that have turned the small, reflective metallic bodies of vehicles into intensely microwaved chambers. To these are being added in-car 5G hotspots that are turning many new vehicles into autonomous mobile devices, using vehicle-to-vehicle, vehicle-to-pedestrian, vehicle-to-network, and vehicle-to-highway communication.

G.  Prohibition of smart meters, smart highways, smart cities, and the Internet of Things

Smart meters are being placed on every home and business in the world, and are turning all the wiring inside the walls of every home and business into a radiating antenna.

Microchips and antennas are being placed in every machine, every appliance, and almost every consumer product in the world as part of the Internet of Things, and there are predictions of as many as one trillion antennas communicating wirelessly with one another in the near future. These all irradiate the entire population at close range, including inside their homes and businesses, without any choice and without possibility of escape.

H.  Halting the launch of satellites, and phasing out most private, public and military use of space

The functioning of all living organisms is regulated by their electromagnetic environment, including the magnetic field of the earth, the vertical electric field between earth and ionosphere, the global electric circuit, the Schumann resonances, etc. If the electromagnetic environment of the earth is altered, life on earth will not long survive.

Both the number of satellites in orbit and the radiation they emit are completely out of control. Some satellites already have an effective radiated power of 83 million watts. Some are capable of emitting 5,000 individual beams. More than 8,000 satellites are already in orbit, and thousands more are being sent into space by near-daily rocket launches. Not only are they exposing every square meter of land and oceans to their radiation, but they are polluting the global electric circuit, which includes our bodies, with all of their pulsations and modulation patterns.

This is degrading all of life and causing pandemics, extinctions, and forest die-off, which cannot be successfully addressed without halting the radiation in and from space (4).

I.  Prohibition of underwater wireless communication in the oceans 

Along with national parks and nature preserves, the oceans should be absolutely protected from radiation.

Governmental, commercial and military interests have been collaborating to create Smart Oceans and build the Internet of Underwater Things. To do this they are building cell towers on the ocean floor, putting relay antennas in the depths of the ocean, and deploying smart ships, smart submarines, and underwater robots. The goal is to enable broadband wireless communication from any point on or in the oceans to anywhere else on the planet, up to and including “real-time video streaming from underwater” everywhere in every ocean (28).

RF radiation is being used in the oceans for short- to medium-range communication, and is destroying ocean life the same way it is destroying land-based life. Acoustic waves are being used for long-range communication, and are deafening fish and ocean mammals with sound as loud as 202 decibels.

The fishing industry is also using underwater radar to locate and capture fish with a precision and on a scale that is devastating to ocean life (29).

All underwater wireless communication and radar must be halted.

II.     Churches and other religious buildings should remove antennas and WiFi networks from their premises

Churches have become a prime target by telecommunications companies for the installation of antennas, often hidden inside false chimneys or fake bell towers. These antennas earn a lot of money for churches but turn them into hazardous environments for their worshippers and visitors.

III.     Schools must remove mobile phone masts and WiFi routers and prohibit mobile phones

Schools are among the most intensely irradiated environments in society today, consequently the worst and unhealthiest places for our children to spend their growing years. Every classroom has one or more WiFi routers in it, together with dozens of children sitting in close proximity to one another every day all day, all of them with cell phones and wireless computers, irradiating one another at all times. Like churches, schools are earning money renting their properties to telecommunications companies for the installation of mobile phone masts.

All masts and all WiFi antennas must be removed from all school properties, and children must be prohibited from bringing cell phones to school.

IV.     Religious, political and community leaders should encourage congregations and constituencies to get rid of their cell phones and other wireless devices

Nothing is more important today in the stewardship of our planet.

V.     Medical schools should incorporate education on EMFs into curriculums, and classes in electromagnetic health should be required for continuing education

The books and studies are there by the tens of thousands. They sit on the shelves of medical school libraries gathering dust and being ignored. All that is required is to organize them into the curriculum and the base of knowledge required of every physician in order to earn a medical degree.

VI.     Environmental organizations must form chapters on electrosmog, and must cease using wireless technology as a tool for monitoring and research

The rapid declines in biodiversity and species populations cannot be successfully addressed without reducing electromagnetic pollution which is causing half or more of the observed declines. As long as electrosmog is not addressed head-on, all of these problems will continue to be blamed on other things: climate change, land use, deforestation, pesticides, etc. Some of the means now being used to combat climate change, for example solar and wind energy, are worsening electrosmog and further decimating species. Some of the means to study these problems, for example GPS and radio tracking of wildlife, are diminishing wildlife instead.

All antennas must be removed from protected nature areas, wildlife preserves, and oceans. Radio tracking devices are deadly (30, 31, 32, 33, 34, 35, 36, 37). They must be removed from all wildlife and not put on any more animals, birds, insects, or fish.      

VII.      Non-ionising radiation must be regulated by national environmental agencies with no conflicts of interest

In many countries, radio frequency (RF) radiation from telecommunications facilities and devices is regulated by the same agency that is charged with promoting those facilities and devices. This is an obvious conflict of interest.

Most governments defer to guidance from the International Commission on Non-Ionizing Radiation Protection (ICNIRP) or the World Health Organization, which also defers to the ICNIRP. The ICNIRP is not an environmental agency. It is a self-appointed private organization with 14 members answerable to no one (38). Its exposure guidelines are based on heating only, as though there were no other effects. In the United States, the agency that both regulates and promotes the telecommunications industry is the Federal Communications Commission (FCC). Like the ICNIRP, the FCC bases its exposure guidelines for humans on heating effects only, and completely ignores the effects on the environment.

RF radiation should be regulated transparently within each nation by their own environmental agencies based on the totality of science. It should be addressed within the UN not by the World Health Organization, but by the United Nations Environment Programme, which presently does not address it at all. And it should be subject to an international treaty and a convention on Electrosmog, as per point 1.

Conclusions

The policy considerations presented in this brief have their basis in science, and in the protection of human rights, human health and the environment. They were developed in response to an emergency situation in which the irradiation of the earth is accelerating at such a rapid rate that it has become the single most urgent threat to life on earth today. The recommended actions by political leaders, religious leaders, organizations, schools, and government agencies provide a path to health and survival.

References
  1. Aleksandr S. Presman. Electromagnetic Fields and Life (NY: Plenum Press 1970), p. 31, Figure 11.
  2. Robert O. Becker. The Body Electric (NY: Morrow 1985).
  3. Sulman, Felix Gad. The effect of air ionization, electric fields, atmospherics and other electric phenomena on man and animal. American Lecture Series, Publ. no. 1029 (Charles C. Thomas Publisher, Springfield IL, 1980; 398 pp.).
  4. Arthur Firstenberg (2020). The Invisible Rainbow: A History of Electricity and Life (White River Junction, VT: Chelsea Green 2020, 560 pp.).
  5. Cucurachi et al. A review of the ecological effects of radiofrequency electromagnetic fields (RF-EMF). Environment International 51: 116-140 (2013). https://www.sciencedirect.com/science/article/pii/S0160412012002334/pdfft?isDTMRedir=true&download=true”download=true
  6. Alain Thill. Biologische Wirkungen elektromagnetischer Felder auf Insekten. Umwelt Medizin Gesellschaft 33(3) Suppl: 1-27 (2020). https://kompetenzinitiative.com/wp-content/uploads/2020/09/Thill_2020_Review_Insekten.pdf
  7. Blake Levitt, Henry C. Lai and Albert M. Manville II. Effects of non-ionizing electromagnetic fields on flora and fauna, Part 2 impacts: how species interact with natural and man-made EMF. Reviews on Environmental Health 37(3): 327-406 and Supplements 1-4 (2021). https://doi.org/10.1515/reveh-2021-0050
  8. Allan H. Frey. Is a toxicology model appropriate as a guide for biological research with electromagnetic fields? Journal of Bioelectricity 9(2): 233-234 (1990). https://www.tandfonline.com/doi/pdf/10.3109/15368379009119811
  9. Igor Belyaev. Duration of Exposure and Dose in Assessing Nonthermal Biological Effects of Microwaves. In Dosimetry in Bioelectromagnetics (CRC Press 2017), pp. 171-184.
  10. Y. Belyaev et al. Resonance effect of millimeter waves in the power range from 10–19 to 3 x 10–3 W/cm2 on Escherichia coli cells at different concentrations. Bioelectromagnetics 17: 312-321 (1996). https://onlinelibrary.wiley.com/doi/abs/10.1002/(SICI)1521-186X(1996)17:4%3C312::AID-BEM7%3E3.0.CO;2-6
  11. William Bise. Low power radio-frequency and microwave effects on human electroencephalogram and behavior. Physiological Chemistry and Physics 10(5): 387-398. https://pubmed.ncbi.nlm.nih.gov/751078/
  12. Bertil R. R. Persson et al. Blood-brain barrier permeability in rats exposed to electromagnetic fields used in wireless communication. Wireless Networks 3: 455-461 (1997). https://link.springer.com/content/pdf/10.1023/a:1019150510840.pdf
  13. Andrew Wood, Rohan Mate and Ken Karipidis. Meta-analysis of in vitro and in vivo studies of the biological effects of low-level millimetre waves. Journal of Exposure Science & Environmental Epidemiology 31: 606–613 (2021). https://www.nature.com/articles/s41370-021-00307-7.pdf
  14. Carl F. Blackman. Evidence for disruption by the modulating signal. BioInitiative Report, Section 15, July 2007. https://bioinitiative.org/wp-content/uploads/pdfs/sec15_2007_Modulation_Blackman.pdf
  15. Leif G. Salford et al. Nerve cell damage in mammalian brain after exposure to microwaves from GSM mobile phones. Environmental Health Perspectives 111(7): 881-83 (2003). https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1241519/pdf/eh
  16. Paul Brodeur. The Zapping of America (NY: W.W. Norton 1977).
  17. Guntis Brūmelis, Valdis Balodis, and Zanda Balode. Radio-frequency electromagnetic fields: The Skrunda Radio Location Station case. Science of the Total Environment 180: 49-50 (1996). https://www.sciencedirect.com/science/article/abs/pii/0048969795049134
  18. Anton Kolodynski and Valda Kolodynska. Motor and psychological functions of school children living in the area of the Skrunda Radio Location Station in Latvia. Science of the Total Environment 180: 87-93 (1996). https://wifiinschools.com/uploads/3/0/4/2/3042232/kolodynski.pdf
  19. Zanda Balode. Assessment of radio-frequency radiation by the micronucleus test in bovine peripheral erythrocytes. Science of the Total Environment 180: 81-85 (1996). https://www.sciencedirect.com/science/article/abs/pii/0048969795049231
  20. Liepa and Valdis Balodis. Monitoring of bird breeding near a powerful radar station. The Ring 16(1-2): 100. Abstract (1994).
  21. Valdis Balodis et al. Does the Skrunda Radio Location Station diminish the radial growth of pine trees? Science of the Total Environment 180: 57-64 (1996). https://www.sciencedirect.com/science/article/abs/pii/0048969795049207
  22. Tūrs Selga and Maija Selga. Response of Pinus sylvestris L. needles to electromagnetic fields: cytological and ultrastructural aspects. Science of the Total Environment 180: 65-73 (1996). https://www.sciencedirect.com/science/article/pii/0048969795049215
  23. Magone. The effect of electromagnetic radiation from the Skrunda Radio Location Station on Spirodela polyrhiza (L.) cultures. Science of the Total Environment 180: 75-80 (1996). https://www.sciencedirect.com/science/article/pii/0048969795049223
  24. Microwave News. Latvia’s Russian radar may yield clues to RF health risks. September/October, pp. 12-13 (1994). https://www.microwavenews.com/sites/default/files/sites/default/files/backissues/s-o94issue.pdf
  25. National Telecommunications and Information Administration. NTIA Spectrum Compendium, 2700-2900 MHz, 1 September 2014. https://www.ntia.doc.gov/files/ntia/publications/compendium/2700.00-2900.00_01SEP14.pdf
  26. Advantages and disadvantages of weather radar. https://lidarradar.com/info/advantages-and-disadvantages-of-weather-radar
  27. Mark Broomhall. Report for the United Nations Educational Scientific and Cultural Organization (UNESCO) and International Union for Conservation of Nature (IUCN) (2017). https://ehtrust.org/wp-content/uploads/Mt-Nardi-Wildlife-Report-to-UNESCO-FINAL.pdf
  28. Arthur Firstenberg. Cell towers on the ocean floor. 12 January 2022. https://cellphonetaskforce.org/wp-content/uploads/2022/01/Cell-towers-on-the-ocean-floor.pdf
  29. Lindy Weilgart. The Impact of Ocean Noise Pollution on Fish and Invertebrates. OceanCare and Dalhousie University. 1 May 2018. https://thegreentimes.co.za/wp-content/uploads/2022/01/impact-of-ocean-noise-pollution-on-fish-and-invertebrates.pdf
  30. Jason D. Godfrey and David M. Bryant. Effects of radio transmitters: review of recent radio-tracking studies. In: M. Williams, ed., Conservation Applications of Measuring Energy Expenditure of New Zealand Birds: Assessing Habitat Quality and Costs of Carrying Radio Transmitters (Wellington, New Zealand: Dept. of Conservation), pp. 83-95 (2003).
  31. David Mech and Shannon M. Barber. A Critique of Wildlife Radio-Tracking and Its Use in National Parks. Jamestown, ND: U.S. Geological Survey, Northern Prairie Wildlife Research Center (2002). https://eplanning.blm.gov/public_projects/nepa/51689/167135/203600/E2._A_CRITIQUE_OF_WILDLIFE_RADIO-TRACKING.pdf
  32. John C. Withey et al. Effects of tagging and location error in wildlife radiotelemetry studies. In: Joshua J. Millspaugh and John M. Marzluff, eds., Radio Tracking and Animal Populations (San Diego: Academic), pp. 43-75 (2001).
  33. Roger Burrows, Heribert Hofer, and Marion L. East. Demography, extinction and intervention in a small population: the case of the Serengeti wild dogs. Proceedings of the Royal Society of London B 256: 281-92 (1994). https://royalsocietypublishing.org/doi/epdf/10.1098/rspb.1994.0082
  34. Roger Burrows. Population dynamics, intervention and survival in African wild dogs (Lycaon pictus)Proceedings of the Royal Society of London B 262: 235-45 (1995). https://royalsocietypublishing.org/doi/abs/10.1098/rspb.1995.0201
  35. Jon E. Swenson et al. Effects of ear-tagging with radiotransmitters on survival of moose calves. Journal of Wildlife Management 63(1): 354-58 (1999).
  36. Moorhouse, Tom P. and David W. Macdonald. Indirect negative impacts of radio-collaring: Sex ratio variation in water voles. Journal of Applied Ecology 42: 91-98 (2005). http://bearproject.info/old/uploads/publications/A20%201999%20Effects%20of%20ear%20tagging_moose%20.pdf
  37. Reader’s Digest. The Snow Tiger’s Last Stand. November 1998.
  38. Buchner K, Rivasi M. The International Commission on Non-Ionizing Radiation Protection: Conflicts of interest, corporate capture and the push for 5G. European Parliament report. Brussels June 2020https://ehtrust.org/the-international-commission-on-non-ionizing-radiation-protection-conflicts-of-interest-corporate-capture-and-the-push-for-5g/
Acknowledgments

The following individuals contributed to the drafting of this Policy Brief:

Arthur Firstenberg
Kathleen Burke
Ian Jarvis
Christof Plothe
Tess Lawrie

 

Connect with Arthur Firstenberg — substack | website

Cover image credit: geralt




The Asinine Insanity of the ‘Climate Change’/C02 Hoax: Kill the Cows to Save the Earth!

The Asinine Insanity of the ‘Climate Change’/C02 Hoax: Kill the Cows to Save the Earth!

by Gary D. Barnett
July 18, 2023

 

Sky Falling

Experts Agree: Not only is the sky falling but we’re all going to die from global warming. SUVs are a major culprit, and have been contributing to rising sea levels according to climate expert, Chicken Little. Colleague, Algore, speaking during a blizzard, agreed with Little.”

~ The Daily Alarmist

I must preface my comments here with sane logic, so as to ward off the absurd idiots who have bought hook, line, and sinker, the madness of the mainstream media, the political class, the non-science ‘scientists,’ the fake environmental whackos, the evil UN, the illegitimate IPCC, and the staged marketing of the ever-pathetic rantings of the once teenage bimbo ignoramus, Greta Thunberg, about man’s normal activity destroying the ‘planet.’ It is just not so!

Yes, the climate on earth changes on a regular basis. Yes, extreme weather conditions are seemingly present more often than not considering the near past. Yes, warming and cooling takes place over time, and has for millions, (or billions) of years. Yes, particular humans, (government, malevolent ‘scientists,’ NGOs, and the military, among many other nefarious individuals and organizations) can manipulate weather to harm us, but no; driving an SUV cannot kill us all. I present this as a purposeful affront to the evil liars, propagandists, depopulation monsters, eugenists, and technocrats, who desire to rule the earth at the great expense of all common men and nature.

The latest absurdity, not new or unique in any way, is the plan of the Irish government to cull (kill) 200,000 healthy cows, claiming “they contribute to ‘climate change’ due to ‘carbon’ emissions.” Anyone who takes this nonsense seriously, or accepts and/or ignores it, is opening the gates to voluntary human extermination. To not be able to understand that both cows and humans eat, live, and expel C02, and to not see that there are eight times more humans than cows globally, why would anyone not grasp that killing humans would be, according to these mad enviro-fools, even more effective in their efforts to ‘save the planet’ than killing cows? Why not kill every animal, including large numbers of humans, if ‘saving the planet’ from farts is the main goal?

Humans not only expel more C02 than cows, but they consume vast amounts of energy, they drive cars, they fly on planes, they build factories that pollute, they mine, they create incredible mountains of plastic and garbage, they perpetuate wars that destroy the earth at unheard of levels, and they continue to outpace cows in population growth by extreme margins. Cows only breath and fart, so why kill these innocent animals; why not just go ahead and cut to the chase, and kill large swaths of humans, (the real plan) saving the soon to be endangered Bos taurus — bovine? (cow) Are you beginning to see the absurdity of this bogus ‘climate change’ bullshite? The nonsense swallowed up and believed by most all these ‘climate change’ pushing scum, expands the bounds of absurdity to astronomical levels.

It gets much worse. This incredibly harmful and idiotic plan by the very imbecilic Irish Department of Agriculture, and the Irish Environmental Protection Agency, will pay 5,000 euros ($5,622) for each cow killed. Keep in mind, that 200,000 cows makes up 0.02% of the total number of cows on earth. Is anyone stupid enough to consider this a legitimate fight against the fraudulent notion of ‘climate change?’ At that price, it would cost $1.125 billion just to pay the farmers for killing their animals. (At this price, to kill all cows on earth, would cost $5.525 trillion) But what about the cost to dispose of these animals, the huge amount of energy and pollution used to do so, the loss of food and dairy products, the supply reduction and obvious extreme price increases certain to come? How will these losses be made up, and how much increased energy will be required to fill this void?

I do realize that most might consider this a minor subject matter, but that would be a grave mistake on your part. The powers that be are not planning on stopping with the killing of animals; they are intent on total control over every aspect of your life, including what food you eat, where you are allowed to go, how much energy you are allowed to use, how much heat you will be allowed in winter to keep warm, how you spend your allotted currency units, (CBDCs) how much medical care you may be allowed, where you may live, and even control whether you may procreate or not.

Why not get to the meat (pun intended?) of this problem, and dispose of the lies and propaganda that consume this now ignorant, pathetic, and indifferent population. The weather is being controlled, it is greatly harming humanity and nature, and is causing an incredible amount of damage not only to this earth, but to every living thing on it. This is not, and never has been, the result of normal human behavior, but is due to mass manipulation of the weather by the ruling class of claimed ‘elites’, who have chosen to use false climate narratives to create mass fear in order to control all. This is the ultimate fake ’emergency’ being used to take over humanity.

Many factors are likely present concerning climate extremes, including, but not limited to, weather geoengineering by the State, graphene rain, directed energy, climate modification assault, heating the ionosphere using HAARP technology, cloud seeding, spraying our skies with metals and poisons through stratospheric aerosol injection, (chemtrails) and most assuredly, artificially creating and enhancing the destructive  nature of hurricanes and earthquakes. Certainly, there are other devastating manipulations of weather going on as well that are unknown at this time, as the military’s full technological potential is hidden, and far ahead of what is believed by most. In addition, releases of toxic chemicals, bioweapons, and the continuous poisoning of the earth’s land and water by deadly substances such as glyphosate, is continuously ongoing. Weather is now a major weapon against mankind, and is being used to monopolize all agriculture and food production, or planned lack thereof.

It is not just cows that will be targeted by these evil ‘climate change’ monsters, it is the entire human race. So to believe that killing cows will save anyone or this earth, is not only completely ludicrous, but a sign that this is only the start of a much broader assault on all of the proletariat herd. They may attempt to begin with the cattle, but if that atrocity is allowed to happen, you and your family will likely be next.

Carbon Dioxide (C02) is absolutely vital to the existence of man. Without it, everything on earth would die. Through the process of photosynthesis, leaves on trees and plants use the great energy of the sun in order to convert this C02 to feed the plants, causing life-sustaining oxygen to be produced so that all things can live and breathe. It is said that one large tree can produce by using expelled C02, enough oxygen supply to provide what is necessary for a full day for several people. Plants also store carbon dioxide to clean the air and reduce negative effects to the environment. This process is imperative for life to survive, as without it, oxygen would cease to be available. If carbon dioxide were to be eliminated, (net zero is the stupid term used) everything would die. Keep this in mind the next time you hear some ranting ‘climate change’ dreg advocating the killing of all our animals (including humans) to ‘save the planet.’

All that is needed to save this planet and everything on it, is the elimination of all rulers and governments! Think about that the next time you perpetuate your own destruction by choosing to vote to ‘elect’ a master, any master, to rule over and control you. It is better to cull politicians and save the cows.

“Almost all of history is an unbroken trail of one conspiracy after another. Conspiracies are the norm, not the exception.”

~ G. Edward Griffin

Reference links:

Irish government to cull 200,000 healthy cows to meet ‘climate goals’

Carbon Dioxide from breathing and farting is not a concern for ‘global warming’

Don’t blame cattle

World cattle numbers by year

Chemtrails: The Conspiracy Theory That Never Was

The power of one tree

Geoengineering Watch

HAARP and the Sky Heaters

 

 

Connect with Gary D. Barnett

Cover image credit: ArtTower & LauraTara




This Is Why We Need to Talk About CBDCs

This Is Why We Need to Talk About CBDCs

 

 Video available at Odysee & YouTube

 

by Aaron & Melissa Dykes, Truthstream Media
July 14, 2023

 

(Normally this is the type of article we only share with our Patreons, but this needs to be seen by everyone who can.)

Central banks and governments, at a global scale, have prepared to implement CBDCs (Central Bank Digital Currencies) with important consequences for every aspect of freedom in our lives.

Though they will introduce it to the public gradually, its capacity for total control is immense.

It isn’t merely that the new dollar is digital, traceable and trackable. It’s based on blockchain technology, of course. It isn’t merely that small business will be hurt (yet again) or that private transactions will be eradicated. Nor will it be merely consequential for drug dealers, scammers, or illicit trades.

CBDCs will be PROGRAMMABLE. Where and how money is spent is literally built into this new currency. And they plan to use it to change how money is used.

Yes, CBDCs are programmable. The executives that frequent the World Economic Forum and the other elite forums have said so.

And so, CBDCs will not just be money. No, not at all. CBDCs are designed as tools of a very political and ideological agenda; some of the worst policies that have been pushed in recent decades will now have the force of spending controls to “nudge” people into submission and compliance.

Again, CBDCs ARE PROGRAMMABLE. Whoever controls the money controls the agenda. That is the point.

Why is this important? Central banks, private banks, government authorities and global designers will have the power to turn on and off transactions of every kind. They can algorithmically-determine precisely what the CBDC money can be spent on; when and under what conditions; and by who.

At the touch of a button, PROGRAMMABLE cash in the form of CBDCs can block the sale of firearms, alcohol, cannabis or tobacco. Or other sensitive products. But that’s just the start (you knew that).

At the same touch of a button, PROGRAMMABLE CBDCs can prevent the sale of meat, dairy, candy and junk food, or disallow the purchase of gasoline or use of a vehicle (and an endless array of other examples; you get the idea.)

With yet another press of the button, they can also freeze bank accounts of political dissidents — like those supporting the recent trucker protest in Canada, for instance.

Spending under CBDCs could be allocated for specific purposes — like rent and groceries — or be timed to expire, requiring, for instance that money be spent by the end of the month.

CBDCs could also prevent individuals with “bad social credit scores” from purchasing anything more than the bare basics of survival. Black Mirror’s Nosedive has already depicted as much, but that’s mild compared to what’s possible.

Blackrock CEO Larry Fink recently said: “Behaviors are gonna have to change. And this is one thing we’re asking companies — you have to force behaviors, and at BlackRock, we are forcing behaviors.”

The compliance of private businesses — any major business who relies upon good standing in the global financial system — can also mandate adherence to any number of political agendas and purchasing behaviors. Energy caps; green conscience laundering; medical misinformation policies; sensitivity about world events, wars and catastrophes; identity politic political correctness shifting sand madness; polka-dots-over-stripes; anything is possible!

And the private policies of private banks and businesses — ultimately steered by central bank CBDC policies — could easily circumvent restrictions on our civil rights under governments and public systems. (And what could you really do about it? Where else could you go?) The Bank of International Settlements recently announced 93% of the world’s central banks are currently working on a CBDC, and the International Monetary Fund (IMF) is already hard at work on a global CBDC platform.

Social media and other tech giants have already paved the way to this version of circumnavigation-hell (I’m not touching you; I’m not touching you!!), even as it emerged that shadowy government agencies were literally coordinating the takedown of free speech online in violation of First Amendment protections.

This nightmare of privacy-less technological enslavement under CBDCs is complicated and perhaps predicated by the advent of AI and the loss of employment for hundreds of millions and even billions of people who once held relative autonomy over their own lives.

UBI (Universal Basic Income) funds will be increasingly provided by governments — as it perhaps must be in a scenario with no meaningful employment — not just for the poor and unemployed, but for nearly everyone. Certainly, people will need financial support to live their lives.

But that money would be used to control as much as it would be used to provide sustenance. Not only would every transaction large and small be tracked, but its use would be specifically tailored to the vision of life proscribed by the very powerful and their AI tech tools. Anything in violation of prevailing policies would be automatically out-of-bounds.

While this design could be used for good (though such powers are unwise), and many would give it that benefit of the doubt, those paying attention can see plainly its drawbacks and potential for the very worst.

With little-to-no context and no one to appeal to, an “artificially intelligent” system administers, gives, and takes away as it is programmed to do. Perhaps clumsily suppressing on the basis of key words and categories… perhaps insidiously on the basis of personalized profiles with millions of pieces of data. This system can and will automatically behaviorize all who live under its auspices, with grave consequences which are easy to predict. And even worse outcomes are quite possible.

Even under the most glowing version of this vision of the near future, where personal behaviors are improved, and people become “better” citizens, nicer neighbors and excellent stewards of the environment — even then, if a positive outcome can even be supposed — it would be a world without freedom.

Freedom itself is on the line under programmable CBDCs, in an almost direct way.

Instead of technology freeing us from worry, labor, and drudgery, it stands to reinforce and radically expand top-down control. This is not hyperbole.

New behaviorism — such as living within one’s allotted carbon footprint allowance — could and would be enforced easily, but tyrannically under this kind of system. Likely it would come with a velvety touch and a gradual implementation to dissuade outrage and condition acceptance; but in of itself, the system could nonetheless be flipped-on overnight.

A government powerful enough to give to all, and yet also take away from all is not only possible, but immediately part of the scheme. Accountability, dissent, free expression, and independent lives could all become a thing of the past, replaced by an engineered obedience, dulled further by the extremes of algorithmically driven group think.

Polls show that CBDCs — now being pursued by the Federal Reserve in the United States and by most every major government and financial system around the globe — are extremely unpopular with the people, but only by those who are aware of their potential existence and uses.

The vast majority of the public — most already lost in a sea of apathy and indifference — remain ignorant of how radically the money system they live under is changing. People need to be informed. Dissent needs to be expressed now while it still can be.

The unfortunate, flawed maxim “If you’re not doing anything wrong, you’ve got nothing to hide” is due for a nightmarish upgrade. The elites, already concentrated in wealth and power — and now unleashing AI — plan to literally program and control your entire life through digital currency.

Something huge is happening. Please pay attention. Please tell people what this can do. Please make your voice heard.

 

Resources

The Trust Game ten episode financial docuseries by Truthstream on Vimeo (to Support TSM)

The Trust Game on YouTube (for free)

Bank of England Tells Ministers to Intervene on Digital Currency ‘Programming’

CATO Poll: Only 16% of Americans Support the Government Issuing a Central Bank Digital Currency

CATO: Central Bank Digital Currency — Assessing the Risks and Dispelling the Myths

 

Connect with Truthstream Media

Cover image based on creative commons work of: FreeGiver & geralt




5G Frequencies Mimic COVID: The Evidence

5G Frequencies Mimic COVID: The Evidence

by Rosanne Lindsay, Traditional Naturopath, Nature of Healing
July 4, 2023

 

They say hindsight is 20/20.

So what happened in 2020?

The rush to deploy the 5G Network around the world coincided with the global COVID pandemic of 2020. That happened.

Only two years earlier, officials at the World Health Organization called COVID a global threat. But behind the scenes, the media quietly announced that 5G was coming, whether people wanted it or not.

Why is the connection between 5G and COVID important?

It’s time to play detective and retrace the narrative back to the evidence.

Let The Games Begin!

The effort to convince people that they needed a new microwave technology called 5G “for faster downloads,” began below the radar when the 5G network was tested during the 2018 South Korean Winter Olympics.  Then, the narrative sounded like this:

Let the 5G games begin!  5G will affect everything from self-driving cars and the so-called Internet of Things.

Then, in 2019, the first COVID case was declared. By then, the 5G networks had already been activated and back-page news around the world.

EMF exposure limits set up in 1996 by the FAA and others are based on invalid assumptions. Over 25,000 articles over 30 years provide evidence that shows they are not protective of human health and wildlife.  One such 2015 Polish study in the Journal Przegl Lek recognizes EMF-induced biological effects in humans.:

Electromagnetic fields can be dangerous not only because of the risk of cancer, but also other health problems, including electromagnetic hypersensitivity (EHS). 

EHS is a syndrome with a broad spectrum of non-specific multiple organ symptoms including both acute and chronic inflammatory processes located mainly in the skin and nervous systems, as well as in respiratory, cardiovascular systems, and musculoskeletal system. WHO does not consider the EHS as a disease.

It is neglectful that the WHO does not consider EMF-related health effects as a legitimate syndrome or disease. This delinquency becomes a challenge to the medical profession which must base a diagnosis on guesswork.

Ironically, the WHO does recognize EMF-induced symptoms as dermatological symptoms (redness, tingling, and burning sensations), as well as neurasthenic and digestive symptoms (fatigue, tiredness, concentration difficulties, dizziness, nausea, heart palpitation, and digestive disturbances). Meanwhile, the European Union recognizes the diagnosis and treatment of EMF-related health problems and illnesses going back to 2015.

Before experimental vaccines were authorized for COVID-19, a set of symptoms had been described as COVID by the CDC that mimics EMF exposure. The 2021 Journal Radiat Res published, “Commonalities Between COVID-19 and Radiation Injury

Inflammation is a key common player in COVID-19 and ARS, and drives the multi-system damage that dramatically alters biological homeostasis. Both conditions initiate a cytokine storm, with similar pro-inflammatory molecules increased and other anti-inflammatory molecules decreased.

EMF symptoms:

  • fever
  • cough
  • chills
  • loss of taste and smell
  • reddening in the extremities (e.g., “COVID toes,” suggestive of microvessel damage)
  • include acute respiratory distress syndrome (ARDS)
  • Pneumonitis and subsequent drop in blood oxygen levels, which often progresses to pulmonary fibrosis
  • multi-organ hypercoagulation,
  • hypoxia
  • cardiovascular damage
  • increase in local neutrophils, cytokines and other immune factors

“COVID” symptoms:

  • Fever or chills
  • Phlem-less Cough
  • Shortness of breath or difficulty breathing
  • Pneumonitis and subsequent drop in blood oxygen levels
  • Fatigue
  • Muscle or body aches
  • Headache
  • New loss of taste or smell
  • Sore throat
  • Congestion or runny nose
  • Nausea or vomiting
  • Diarrhea
  • increase in local neutrophils, cytokines and other immune factors

Serious Adverse Events post Cov-Vax describe the above and more:

A Live Exercise

In 2020, during a Coronavirus Task Force briefing, Secretary Mike Pompeo disclosed the fact that the pandemic “is a live exercise.”



Do the EMF-induced symptoms mimic COVID-19? Does the added mRNA EUA technologies increase adverse events?

Any investigative mind would first attempt to rule that out a connection between 5G and COVID-19.

So, the first order of business would be to find the alleged causal viral agent for COVID 19.

One small problem.

Officially, the 2019 virus called Coronavirus-19 has never been isolated. in its original state. See page 41 of the 2023 CDC document where the Centers for Disease Prevention and Control (CDC) reports the suspect virus is “not available.”

Since no quantified virus isolates of the 2019-nCoV were available for CDC use at the time the test was developed and this study conducted, assays designed for detection of the 2019-nCoV RNA were tested with characterized stocks of in vitro transcribed full length RNA (N gene; GenBank accession: MN908947.2) of known titer (RNA copies/µL) spiked into a diluent consisting of a suspension of human A549 cells and viral transport medium (VTM) to mimic clinical specimen.

What is it?

Did the Corona virus mutate or disappear before it could be identified?

Did it ever exist in the first place?

Is Coronavirus a case of semantics, and not of disease?

If you look up the term, Coronavirus, it is defined as a family of cold and flu viruses. Hence, it is not one virus; Corona virus:

Coronaviruses constitute the subfamily Orthocoronavirinae, in the family Coronaviridae, 

Further, according to a 2020 published medical journal article in the CDC’s  Journal Emerging Infectious Diseases, the Coronavirus was amplified and generated in a lab which became the known “isolates.” See under Whole Genome Sequencing:

“designed 37 pairs of nested PCRs spanning the genome on the basis of the coronavirus reference sequence (GenBank accession no. NC045512).”

That reads a lot like a patent.

The present invention provides a live, attenuated coronavirus comprising a variant replicase gene encoding polyproteins comprising a mutation in one or more of non-structural protein(s) (nsp)-10, nsp-14, nsp-15 or nsp-16. The coronavirus may be used as a vaccine for treating and/or preventing a disease, such as infectious bronchitis, in a subject. 

In fact, there are a lot of COVID 19 patents when you look for them. In 2022, there were 3741 COVID-19-related patents.

In 2020, Dr. Tom Cowan called COVID a scientific fraud. He highlighted the 2020 study that showed the Coronavirus is not infectious in humans:

“Therefore, we examined the capacity of SARS-CoV-2 to infect and replicate in several common primate and human cell lines, including human adenocarcinoma cells (A549), human liver cells (HUH 7.0), and human embryonic kidney cells (HEK-293T).

In addition to Vero E6 and Vero CCL81 cells. … Each cell line was inoculated at high multiplicity of infection and examined 24h post-infection. No CPE was observed in any of the cell lines except in Vero cells, which grew to greater than 10 to the 7th power at 24 h post-infection. In contrast, HUH 7.0 and 293T showed only modest viral replication, and A549 cells were incompatible with SARS CoV-2 infection.”

If no wild Coronavirus was ever officially isolated, and if Coronavirus is not harmful to humans, then what could be causing similar symptoms in millions of people all over the world?

It turns out that 5G millimeter waves can and do promote symptoms described as Covid.
Controlling The Narrative

This chronological overview of the publications published during the initial critical phase of discussions around 5G and health leads to the interesting observation that publications by authors with links to anti-5G campaigning organizations dominated the early phase in which adverse effects related to 5G were discussed..Such patterns of efforts to control the narrative during critical periods. – The population health effects from 5G: Controlling the narrative, Frontiers, 2022 

“5G Technology induces Coroavirus in skin cells.”  That was the conclusion of a study published in an Editorial from the July 2020 Journal Biol Regul Homeost Agents by Fioranelli et al, that was subsequently retracted:

In this research, we show that 5G millimeter waves could be absorbed by dermatologic cells acting like antennas, transferred to other cells and play the main role in producing Coronaviruses in biological cells. DNA is built from charged electrons and atoms and has an inductor-like structure. This structure could be divided into linear, toroid and round inductors. Inductors interact with external electromagnetic waves, move and produce some extra waves within the cells.

The shapes of these waves are similar to shapes of hexagonal and pentagonal bases of their DNA source. These waves produce some holes in liquids within the nucleus. To fill these holes, some extra hexagonal and pentagonal bases are produced. These bases could join to each other and form virus-like structures such as Coronavirus. To produce these viruses within a cell, it is necessary that the wavelength of external waves be shorter than the size of the cell. Thus 5G millimeter waves could be good candidates for applying in constructing virus-like structures such as Coronaviruses (COVID-19) within cells.

We know the importance of skin cells by their absorptive and alchemical abilities to convert sunlight (the frequency of the sun), into Vitamin D3. [See my article on Vitamin D here]. Yet, even knowing the delicate relationship between light frequencies and human skin, harmful technologies march forward, undaunted.

What happens when scientists take it below the surface, under the skin?

The Internet of Things

is moving ahead of itself, without attention to detail, safety, or security features.

From dental sensors that collect your data, to medication sensors to track compliance with prescriptions, to kitty litter that tracks your cat’s bowel movements, artificial intelligence (A.I.) is moving inside. And its all hackable.

Elon Musk’s first brain implant prototype of Neuralink has been featured in the media.  Since then, the FDA has approved chip implants in human brains even though a prior attempt was rejected. Neuralink is also under investigation by the U.S. Department of Agriculture’s Office of Inspector General for potential animal-welfare violations.

Meanwhile, medical studies on the health effects of computer-human interface have been retracted or withdrawn: WITHDRAWN: Brain computer interface technology: Usability and applications in psychiatry.

Before putting the cart before the horse, humans must understand 5G frequencies.

The Studies

There is a wide range of evidence to interpret the newly emerging microwave exposures as an invisible stressor.
Microwaves are absorbed by living tissue. The frequencies used for cell phone technologies have a half-life penetration depth of several centimeters, whereby cell membranes constitute no obstacle.   – Klaus Buchner and Horst Eger, German Study, Electromagnetic Fields, 2011

The 5G rollout preceded the vaccine rollout by several months, not only in the U.S., but in other parts of the world as well. For more information see my 2020 article, Induction of COVID Symptoms via 5G Frequencies.

Fortunately, the question of association between EMFs and COVID-related symptoms can be answered by a long list of medical journal studies:

1. Radiation from wireless technology affects the blood, the heart, and the autonomic nervous system, 2013

An increasingly common response includes clumping (rouleau formation) of the red blood cells, heart palpitations, pain or pressure in the chest accompanied by anxiety, and an upregulation of the sympathetic nervous system coincident with a downregulation of the parasympathetic nervous system typical of the “fight-or-flight” response.

2. COVID-19 Attributed Cases and Deaths are Statistically Higher in States and Counties with 5th Generation Millimeter Wave Wireless Telecommunications in the United States, 2021

This assessment clearly shows exposure to 5G mmW technology is statistically significantly associated with higher COVID-19 case and death rates in the U.S.A. The mechanism–should this be a causal relationship–may relate to changes in blood chemistry, oxidative stress, an impaired immune response, an altered cardiovascular and/or neurological response.

3. Influence of electromagnetic fields on the circadian rhythm: Implications for human health and disease, 2023

Research suggests that the circadian rhythm, which controls several physiological functions in the human body, can be influenced by light but also by the earth’s EMFs. … Severe disruption of the circadian rhythm increases inflammation which can induce fatigue, fever and flu-like symptoms in a fraction of the population and worsen existing symptoms in old and diseased individuals, leading to periodic spikes of infectious and chronic diseases.3. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8580522/

4. Evidence for a connection between coronavirus disease-19 and exposure to radiofrequency radiation from wireless communications including 5G, 2021

We present evidence that WCR may: (1) cause morphologic changes in erythrocytes including echinocyte and rouleaux formation that can contribute to hypercoagulation; (2) impair microcirculation and reduce erythrocyte and hemoglobin levels exacerbating hypoxia; (3) amplify immune system dysfunction, including immunosuppression, autoimmunity, and hyperinflammation; (4) increase cellular oxidative stress and the production of free radicals resulting in vascular injury and organ damage; (5) increase intracellular Ca2+ essential for viral entry, replication, and release, in addition to promoting pro-inflammatory pathways; and (6) worsen heart arrhythmias and cardiac disorders.

5. The influence of millimeter waves on the physical properties of large and giant unilamellar vesicles, 2013

…a decrease in the water membrane permeability of the irradiated samples was observed. We advance the hypothesis that both the above effects may be explained in terms of a change of the polarization states of water induced by the radiation, which causes a partial dehydration of the membrane and consequently a greater packing density (increased membrane rigidity).

6. The carcinogenic potential of non-ionizing radiations: The cases of S-50 Hz MF and 1.8 GHz GSM radiofrequency radiation, 2019

A second project of two large life-span carcinogenic bioassays was conducted on over 3000 Sprague Dawley rats exposed from prenatal life until natural death to 1.8 GHz GSM of mobile phone radio base station, alone or combined with acute exposure to gamma radiation. Early results from the experiment on 1.8 GHz GSM alone show a statistically significant increase in the incidence of heart malignant schwannoma among males exposed at the highest dose.

7. Oxidative mechanisms of biological activity of low-intensity radiofrequency radiation , 2015

A wide pathogenic potential of the induced reactive oxygen species (ROS) and their involvement in cell signaling pathways explains a range of biological/health effects of low-intensity radiorequency radiaiton (RFR), which include both cancer and non-cancer pathologies. In conclusion, our analysis demonstrates that low-intensity RFR is an expressive oxidative agent for living cells with a high pathogenic potential and that the oxidative stress induced by RFR exposure should be recognized as one of the primary mechanisms of the biological activity of this kind of radiation.

8. Changes of Clinically Important Neurotransmitters under the Influence of Modulated RF Fields—A Long-term
Study under Real-life Conditions, 2011

Wireless devices used at home such as DECT, Wi-Fi, and Bluetooth amplify the effect of the GSM radiation. In the case of adrenaline and noradrenaline, almost exclusively children and chronically ill subjects (here mostly subjects with allergies) are affected. 

Especially in children below age ten, it is not thought possible to maintain a chronic state of anxiety for one and a half years due to an abstract term such as cell tower radiation.  

The clinical relevance of changed PEA levels is well documented for mental illnesses. Endogenous depression is associated with lowered PEA levels, whereby the transition from depression to maniac episodes is accompanied by an increase in PEA levels

After having exhausted the biological feedback mechanisms, major health problems are to be expected. The possible long-term consequences of remaining caught in the exhaustion stage have already been described by Hecht and Selye

9. Mechanism for action of electromagnetic fields on cells, 2002

pulsed electromagnetic fields can be more active biologically than continuous ones. According to the present theory, the low frequency fields are the most bioactive ones. The basic mechanism is the forced-vibration of all the free ions on the surface of a cell’s plasma membrane, caused by an external oscillating field. We have shown that this coherent vibration of electric charge is able to irregularly gate electrosensitive channels on the plasma membrane and thus cause disruption of the cell’s electrochemical balance and function.

The question is does the 5G Network play a role in creating a pandemic with symptoms identical to the condition dubbed as COVID 19?

According to a 2021 study, published in J Clin Transl Res, there is indeed evidence for a connection between coronavirus disease-19 and exposure to radiofrequency radiation from wireless communications including 5G.

… we investigated a possible environmental factor in the COVID-19 pandemic: ambient radiofrequency radiation from wireless communication systems including microwaves and millimeter waves. SARS-CoV-2, the virus that caused the COVID-19 pandemic, surfaced in Wuhan, China shortly after the implementation of city-wide (fifth generation [5G] of wireless communications radiation [WCR]), and rapidly spread globally, initially demonstrating a statistical correlation to international communities with recently established 5G networks.

Foresight: Looking Ahead

Hindsight is always 20/20.

This means that it is easy to clearly see what should have been done or said in the past. We are looking back on what has already happened, so the reasons it happened should now be crystal clear.

In truth, 20/20 is not perfect vision. It is average or ‘normal’ vision, because is possible to have better than twenty-twenty vision with the naked eye.

We see, now, that we may have a case of a missing virus!

For people to stay ahead of any future live exercises, and where the problem is clear as mud, people must lead with foresight. How did the prophet-authors of the past, Orwell and Huxley, seem to predict a dystopian future that is now? Did they have foresight, or did they have a blueprint?

These are times for discernment. People must raise their private investigator magnifying glasses. They must stay one step ahead, before the next games begin.

 

Rosanne Lindsay is a Naturopath, writer, earth keeper, health freedom advocate and author of the books The Nature of Healing, Heal the Body, Heal the Planet and  Free Your Voice, Heal Your Thyroid, Reverse Thyroid Disease Naturally.

Rosanne Lindsay is available for consultation through Turtle Island Network.  Subscribe to her blog at natureofhealing.org.

 

Connect with Rosanne Lindsay

Cover image credit: cliff1126




The Fed Launches Phase One of Their CBDC This Month

The Fed Launches Phase One of Their CBDC This Month

by Greg Reese, The Reese Report

 

 Video Source

 

In a recent Time Magazine article, Ray Dalio of Bridgewater Associates hedge funds warned that the world is on the brink of disaster. He came to this conclusion based on current events that haven’t happened since the nineteen thirties. The largest amounts of debt and inflation. The biggest gaps in wealth and values resulting in the rise of populism on both the left and the right against the elites. And the greatest international conflict between world powers, most importantly between the U.S. and China.

Peter Onge writes that the easy way out of this mess would be for the elite to proactively shrink in scope. Get government out of the economy, out of social engineering, and out of propagandizing kids. But of course, this won’t happen.

Common sense and simple observation will tell you that the so-called elites will continue on their path towards economic destruction and world war. Which is likely what the international bankers had planned all along. Let us not forget that the fast-growing BRICS monetary system was born in 2001 out of Goldman Sachs.

In 1971, President Nixon officially ended the Gold Standard and replaced it with the petrodollar in which OPEC agreed to price their oil in US dollars in exchange for US military protection. This blood money deal preserved US control over the world economy. But when the US weaponized the SWIFT payment system against Russia, BRICS became the only viable solution for the rest of the world.

Reuters in New Delhi reported that last May, the State Bank of India rejected Indian Oil Corp’s planned payment in US dollars for Russian oil. And so they went to a private bank and settled their trade for Russian oil by paying in yuan to the Bank of China. And have continued to do so since

A shortage of US dollars in Argentina has caused commercial banks to allow the Chinese yuan as a form of currency in savings and checking accounts. Argentina has already been issuing securities in the Chinese yuan and has made a two-point-seven billion dollar payment to the International Monetary Fund using the Chinese BRICS currency.

The Federal Reserve Bank’s FedNow is scheduled for launch by the end of July. FedNow is officially an update to the Federal Reserve’s payment processing and settlement system. And appears to be a backdoor to creating a Central Bank Digital Currency. Private blockchain operator Tassat has partnered with the Federal Reserve’s new payment system and will serve as an interface for FedNow.

FedNow will also connect with Metal Blockchain, whose CEO and founder claims will allow banks to prepare for an eventual central bank digital currency, along with bank-issued stablecoins.

The idea of a Central Band Digital Currency is already hugely unpopular with the majority of Americans. But according to Dale Houser, it is being set up to destroy alternative blockchain solutions such as Ripple and Stellar. And if the powers that be are successful in destroying the US economy, then the only other option to accepting a CBDC would be some sort of revolution. Which would be nearly impossible seeing as how divided the populist movement is within the left/right paradigm.

Last week in China, the World Economic Forum proclaimed that the entire world needs to switch to a Central Bank Digital Currency with expiry dates and restrictions on undesirable purchases. They proposed using artificial intelligence to censor hate speech and disinformation on the internet. And using artificial intelligence to control a global social credit system that will involve wearable devices with sensors to monitor everyone’s actions.

If we the people fail to unite against the powers that be, then their solution will most certainly be world war, depopulation, and total control. And this is all happening right now.

 

Connect with Greg Reese




The Criminalization of Dissent (Revisited)

The Criminalization of Dissent (Revisited)

by CJ Hopkins, The Consent Factory
July 3, 2023

 

Greetings from Thoughtcriminal 231Js1736/23!

That’s my official Thoughtcrime Case Number, which my attorney needs to reference in all our official correspondence with the New Normal Thoughtpolice. I think I’m going to silk-screen it on a T-shirt and wear it on my first day in Moabit Criminal Court, “the largest criminal court in Europe with 340 judges and 360 prosecutors.”

That’s right, the Berlin State Prosecutor’s office is pursuing its criminal investigation of me for allegedly “disseminating propaganda, the content of which is intended to further the aims of a former National Socialist organization,” which according to Germany’s Grundgesetz could send me to prison for up to three years.

My attorney wrote to them and politely explained how ridiculous their investigation is and why they should summarily drop the charges, but New Normal Germany has a zero-tolerance policy when it comes to Thoughtcrime, especially Thoughtcrime involving any kind of Covid-denying propaganda.

The “propaganda” in question is these two Tweets.

Which, OK, I just disseminated them again, so there’s another three years in prison. Or, I don’t know, maybe it’s six years in prison, i.e., three years for each separate count of Thoughtcrime.

I wrote those Tweets in German, so let me translate.

The one on the left reads, “The masks are ideological-conformity symbols. That is all they are. That is all they have ever been. Stop acting like they have ever been anything else, or get used to wearing them.” The hashtag translates as “Masks are not a benign measure.”

The one on the right is a quote by Karl Lauterbach, the Minister of Health of Germany, tweeted by Die Welt, a national newspaper. It reads “The masks always send out a signal.” And, yes, Karl, that’s exactly the point I was making.

The image is from the cover art of my book The Rise of the New Normal Reich: Consent Factory Essays, Vol. III (2020-2021), which was banned in Germany by Amazon, Inc. two days after I tweeted the above Tweets. (It appears to also be banned for sale in German bookstores, but I don’t have confirmation of that.)

My attorney just received the screenshots of these Tweets from the Berlin State Prosecutor a few days ago. Up to then, we didn’t know what they were, and we couldn’t find them, because they have been censored by Twitter, presumably on the orders of the German Thoughtpolice. We knew they featured the cover art of my book, because the Prosecutor’s office described it, but we didn’t know about the “Covid denial.”

So, essentially, I’m facing criminal charges, and being threatened with who knows how many years in prison, or thousands of Eurodollars in fines, for (a) stating what has now been widely acknowledged, and what was generally understood by every serious epidemiologist until the Spring of 2020, namely, that mask-mandates do not work, and thus are nothing but symbolic measures designed to generate and enforce mass obedience, and (b) insulting the Minister of Health of Germany, who happens to be a fanatical serial liar who is directly responsible for the serious injury and death of … well, we’ll never know how many people.

Neither of which are actual crimes. Not even in the Federal Republic of Germany.

The pretext for the charges I am facing is the swastika behind the mask, which, as I noted in a recent essay, is a play on the international bestseller, The Rise and Fall of The Third Reich, by William Shirer, which you can buy in any bookshop in Berlin.

Incidentally, my book has also been a bestseller, at least on Amazon (in countries where it’s not banned) and Barnes & Noble, but I’ve still got a little ways to go before I get to Shirer territory.

So, there you are … those are my Thoughtcrimes.

I’ve been writing about the “New Normal” as a new form of totalitarianism for several years now. I wrote about it in one of my essays, The Criminalization of Dissent, in May of 2021. Some of my colleagues rolled their eyes. They thought I was being hyperbolic again. I wasn’t. This is what I meant. It is literally the criminalization of dissent.

I wasn’t the only one covering the story of the criminalization of dissent in Germany. The New York Times reported on it in April of 2021 …

“The country’s domestic intelligence agency says it will create a new department to deal with extremism among conspiracy theorists.” (German Intelligence Puts Coronavirus Deniers Under Surveillance)

As did Aljazeera …

“For intelligence officers to be legally allowed to start observing parts of the anti-lockdown movement, Germany’s Federal Office for the Protection of the Constitution (BfV) had to create an entirely new category of groups because the ‘Querdenkers’ do not fit neatly into the existing classifications of right-wing or left-wing. The new category is for groups suspected of being ‘anti-democratic and/or delegitimizing the state in a way that endangers security.’ The designation allows intelligence officers to gather data about individuals and their activities, and could in a further step include shadowing people and tapping their communications.” (German Spy Agency to Monitor Some Anti-Lockdown Protesters)

I was not a member of the “Querdenker” movement, or any other movement for that matter, but I doubt that makes any difference to the BfV or the Berlin State Prosecutor. Anyone even vaguely prominent who spoke out against the “Corona measures” is fair game for threats and prosecution. The beneficent-sounding Federal Office for the Protection of the Constitution, or BfV, is basically Germany’s FBI. It’s now two years after the above stories were published, and they are still on the hunt for “Covid deniers,” “conspiracy theorists,” and other such persons suspected of “delegitimizing the state” … whatever that Orwellian language means.

Of course, it doesn’t matter what it means. It means whatever they say it means. That’s what it means. It means it doesn’t mean anything, and they do not have to pretend it means anything. It means, “Shut the fuck up. Get in line. Do what we tell you. Say what we tell you. Think what we tell you. Or we will fucking get you. We will make up some charges and prosecute you. We will censor you into Internet oblivion. We will shut off your fucking bank account. We’ll send the IRS to your house. We’ll ruin your career. We’ll hurt your family. We will extradite you to the USA and lock you up in Supermax prison for 175 fucking years.”

How am I doing? Do I sound hyperbolic?

And, no, of course I’m not just talking about Germany. The criminalization of dissent is being rolled out everywhere. Ireland is just the latest of dozens of countries all throughout the West that are criminalizing so-called “hate speech.” The specifics are different but the message is the same, “Watch what you say, or we will prosecute you, or otherwise seriously fuck you up.”

Oh, and also, I should probably mention, my lawyer advised me not to republish those Tweets. He completely understands where I am coming from, but it is his job to look out for me and to try his best to … you know, keep me out of German prison, which I’m not making easy for him.

Now, I want to be very clear about this. I have no desire to go to German prison. I am about to turn 62 years old. I’m not at all interested in tossing anyone’s salad or having my salad tossed by anyone, especially not a pumped-up, tattooed member of some local Turkish drug gang, or an actual German neo-Nazi, but I’m not going to be intimidated into shutting up or toning my act down to placate the New Normal Thoughtpolice.

The thing is, I don’t respond well to bullies. I feel a particular antipathy toward them. I’m not very fond of liars either. And totalitarians … there’s another group of people I don’t like. I am not ashamed to admit my bias against such people. I wish them ill. I am sorry about whatever vicissitudes of fortune or experience turned them into lying, bullying, totalitarian creeps, but they can suck foul wind out of my ass if they think I am going to bow down to them. They can do what they want to me. They have that power. They can silence me for a while if they want. But they cannot make me silence myself.

And they cannot make me pretend to respect them.

The Germans are real big on respecting authority. So am I. But authority is earned. It does not stem from a title or a uniform. It stems from knowledge, experience, integrity, and honorable behavior, not from brute force. Fascists, totalitarians, and the like do not deserve our respect. They deserve our scorn. They deserve our derision. I have plenty of it for them.

Also, there are the kids to think about. I don’t have any, but other people do. What kind of an example are we setting for the kids if we start censoring (or “sensitivity-editing”) ourselves every time some fascist bully threatens to put us in jail if we don’t? A lot of the young people are already pretty pussified as it is these days. I’m certainly not a tough guy or anything, but sometimes, in life, you have to fight, and it doesn’t really matter if you get your ass kicked.

Oh, and, if you’re contemplating writing to me and telling me to “get the hell out of Germany” or inquiring as to why I haven’t “gotten the hell out of Germany,” please do not do that. I am extremely tired of hearing it. Instead, just wire a high six-figure sum into the Swiss account I will be setting up shortly, and, I promise you, I’ll get the hell out of Germany, and send you a postcard from an undisclosed location somewhere in the Ionian Sea.

In the meantime, I’ll definitely keep you posted on Case 231Js1736/23, and maybe I’ll go ahead and do up that T-shirt. Wait, what am I thinking? This is New Normal Berlin! I could find a VC, round up some 20-year-old, transgender, Ayahuasca-guzzling tech bros (or “tech persons with penises” or whatever the proper “non-harmful” nomenclature is at the moment), and start up some type of totally Bitcoined bespoke Thoughtcriminal T-shirt business!

The way things are going, I’ll probably make a killing … or at least I’ll be able to cover my legal costs, which, after that last little gratuitous outburst, Lord knows what kind of new charges I’ll be facing!

 

Connect with CJ Hopkins

Cover image based on creative commons work of CDD20OpenClipart-Vectors




FBI Make-Work Entrapment Schemes: Creating Criminals in Order to Arrest Them

FBI Make-Work Entrapment Schemes: Creating Criminals in Order to Arrest Them

by John & Nisha Whitehead, The Rutherford Institute
June 20, 2023

 

“Whoever fights monsters should see to it that in the process he does not become a monster.”

— Friedrich Nietzsche

We’re not dealing with a government that exists to serve its people, protect their liberties and ensure their happiness.

Rather, we are the unfortunate victims of the diabolical machinations of a make-works program carried out on an epic scale whose only purpose is to keep the powers-that-be permanently (and profitably) employed.

Case in point: the FBI.

The government’s henchmen have become the embodiment of how power, once acquired, can be so easily corrupted and abused. Indeed, far from being tough on crime, FBI agents are also among the nation’s most notorious lawbreakers.

Whether the FBI is planting undercover agents in churches, synagogues and mosques; issuing fake emergency letters to gain access to Americans’ phone records; using intimidation tactics to silence Americans who are critical of the government, or persuading impressionable individuals to plot acts of terror and then entrapping them, the overall impression of the nation’s secret police force is that of a well-dressed thug, flexing its muscles and doing the boss’ dirty work.

Clearly, this is not a government agency that appears to understand, let alone respect, the limits of the Constitution.

Indeed, this same government agency has a pattern and practice of entrapment that involves targeting vulnerable individuals, feeding them with the propaganda, know-how and weapons intended to turn them into terrorists, and then arresting them as part of an elaborately orchestrated counterterrorism sting.

Basically, it works like this: in order to justify their crime-fighting superpowers, the FBI manufactures criminals by targeting vulnerable individuals and feeding them anti-government propaganda; then, undercover agents and informants equip the targeted individuals with the training and resources to challenge what they’ve been indoctrinated into believing is government corruption; and finally, the FBI arrests the targeted individuals for engaging in anti-government, terrorist activities.

This is what passes for the government’s perverse idea of being tough on crime.

For example, undercover FBI agents pretending to be associated with ISIS have been accused of seeking out online and befriending a 16-year-old with brain development issues, persuading him to secretly send them small cash donations in the form of gift cards, and then the moment Mateo Ventura, turned 18, arresting him for providing financial support to an Islamic terrorist group.

If convicted, the teenager could spend up to 10 years in prison.

Yet as The Intercept explains, “the only ‘terrorist’ he is accused of ever being in contact with was an undercover FBI agent who befriended him online as a 16-year-old… This law enforcement tactic has been criticized by national security researchers who have scrutinized the FBI’s role in manufacturing terrorism cases using vulnerable people who would have been unable to commit crimes without prolonged government assistance and encouragement… the Ventura case may indicate that authorities are still open to conjuring terrorists where none existed.”

In another incident, the FBI used an undercover agent/informant to seek out and groom an impressionable young man, cultivating his friendship, gaining his sympathy, stoking his outrage over injustices perpetrated by the U.S. government, then enlisting his help to blow up the Herald Square subway station. Despite the fact that Shahawar Matin Siraj ultimately refused to plant a bomb at the train station, he was arrested for conspiring to do so at the urging of his FBI informant and used to bolster the government’s track record in foiling terrorist plots. Of course, no mention was made of the part the government played in fabricating the plot, recruiting a would-be bomber, and setting him up to take the fall.

These are Machiavellian tactics with far-reaching consequences for every segment of the population, no matter what one’s political leanings, but it is especially dangerous for anyone whose views could in any way be characterized as anti-government.

As Rozina Ali writes for The New York Times Magazine, “The government’s approach to counterterrorism erodes constitutional protections for everyone, by blurring the lines between speech and action and by broadening the scope of who is classified as a threat.”

For instance, it was reported that the FBI had been secretly carrying out an entrapment scheme in which it used a front company, ANOM, to sell purportedly hack-proof phones to organized crime syndicates and then used those phones to spy on them as they planned illegal drug shipments, plotted robberies and put out contracts for killings using those boobytrapped phones.

All told, the FBI intercepted 27 million messages over the course of 18 months.

What this means is that the FBI was also illegally spying on individuals using those encrypted phones who may not have been involved in any criminal activity whatsoever.

Even reading a newspaper article is now enough to get you flagged for surveillance by the FBI. The agency served a subpoena on USA Today / Gannett to provide the internet addresses and mobile phone information for everyone who read a news story online on a particular day and time about the deadly shooting of FBI agents.

This is the danger of allowing the government to carry out widespread surveillance, sting and entrapment operations using dubious tactics that sidestep the rule of law: “we the people” become suspects and potential criminals, while government agents, empowered to fight crime using all means at their disposal, become indistinguishable from the corrupt forces they seek to vanquish.

To go after terrorists, they become terrorists.

To go after drug smugglers, they become drug smugglers.

To go after thieves, they become thieves.

For instance, when the FBI raided a California business that was suspected of letting drug dealers anonymously stash guns, drugs and cash in its private vaults, agents seized the contents of all the  safety deposit boxes and filed forfeiture motions to keep the contents, which include millions of dollars’ worth of valuables owned by individuals not accused of any crime whatsoever.

It’s hard to say whether we’re dealing with a kleptocracy (a government ruled by thieves), a kakistocracy (a government run by unprincipled career politicians, corporations and thieves that panders to the worst vices in our nature and has little regard for the rights of American citizens), or if we’ve gone straight to an idiocracy.

This certainly isn’t a constitutional democracy, however.

Some days, it feels like the FBI is running its own crime syndicate complete with mob rule and mafia-style justice.

In addition to creating certain crimes in order to then “solve” them, the FBI also gives certain informants permission to break the law, “including everything from buying and selling illegal drugs to bribing government officials and plotting robberies,” in exchange for their cooperation on other fronts.

USA Today estimates that agents have authorized criminals to engage in as many as 15 crimes a day (5600 crimes a year). Some of these informants are getting paid astronomical sums: one particularly unsavory fellow, later arrested for attempting to run over a police officer, was actually paid $85,000 for his help laying the trap for an entrapment scheme.

In a stunning development reported by The Washington Post, a probe into misconduct by an FBI agent resulted in the release of at least a dozen convicted drug dealers from prison.

In addition to procedural misconduct, trespassing, enabling criminal activity, and damaging private property, the FBI’s laundry list of crimes against the American people includes surveillance, disinformation, blackmail, entrapment, intimidation tactics, and harassment.

For example, the Associated Press lodged a complaint with the Dept. of Justice after learning that FBI agents created a fake AP news story and emailed it, along with a clickable link, to a bomb threat suspect in order to implant tracking technology onto his computer and identify his location. Lambasting the agency, AP attorney Karen Kaiser railed, “The FBI may have intended this false story as a trap for only one person. However, the individual could easily have reposted this story to social networks, distributing to thousands of people, under our name, what was essentially a piece of government disinformation.”

Then again, to those familiar with COINTELPRO, an FBI program created to “disrupt, misdirect, discredit, and neutralize” groups and individuals the government considers politically objectionable, it should come as no surprise that the agency has mastered the art of government disinformation.

The FBI has been particularly criticized in the wake of the 9/11 terrorist attacks for targeting vulnerable individuals and not only luring them into fake terror plots but actually equipping them with the organization, money, weapons and motivation to carry out the plots—entrapment—and then jailing them for their so-called terrorist plotting. This is what the FBI characterizes as “forward leaning—preventative—prosecutions.”

The FBI has also repeatedly sought to expand its invasive hacking powers to allow agents to hack into any computer, anywhere in the world.

Suffice it to say that when and if a true history of the FBI is ever written, it will not only track the rise of the American police state but it will also chart the decline of freedom in America: how a nation that once abided by the rule of law and held the government accountable for its actions has steadily devolved into a police state where justice is one-sided, a corporate elite runs the show, representative government is a mockery, police are extensions of the military, surveillance is rampant, privacy is extinct, and the law is little more than a tool for the government to browbeat the people into compliance.

This is how tyranny rises and freedom falls.

The powers-that-be are not acting in our best interests.

Almost every tyranny being perpetrated by the U.S. government against the citizenry—purportedly to keep us safe and the nation secure—has come about as a result of some threat manufactured in one way or another by our own government.

Think about it.

Cyberwarfare. Terrorism. Bio-chemical attacks. The nuclear arms race. Surveillance. The drug wars. Domestic extremism. The COVID-19 pandemic.

In almost every instance, the U.S. government (often spearheaded by the FBI) has in its typical Machiavellian fashion sown the seeds of terror domestically and internationally in order to expand its own totalitarian powers.

Consider that this very same government has taken every bit of technology sold to us as being in our best interests—GPS devices, surveillance, nonlethal weapons, etc.—and used it against us, to track, control and trap us.

Are you getting the picture yet?

The U.S. government isn’t protecting us from threats to our freedoms.

The U.S. government is creating the threats to our freedoms. It is, as I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, the source of the threats to our freedoms.

 

Connect with The Rutherford Institute

Cover image credit: Clker-Free-Vector-Images




Killing Us Softly

Killing Us Softly

 

“Is this intentional? Are we subjected to this slow genocide as part of the global eugenic effort to rid the world of useless eaters?—or even more horrifying, to rid the world of all humans who are made in the image of God along with nature herself? An agenda chillingly made clear in C.S. Lewis’ tome That Hideous Strength seen as well in the works of numerous others such as George Orwell and Aldous Huxley.

“Probably not everything I have mentioned here has come about as part of this nefarious evil intention. But I would be willing to bet a lot of it has (see the work of David Icke). It may just have become the nature of the beast to create a culture in its atheistic hubris that ignores the subtleties of life and living.”

Killing Us Softly 

by Todd Hayen, OffGuardian
June 17, 2023

 

We have, for quite some time, been exposed to a myriad of silent killers. These are the subtle murderers of both the physical body as well as the spirit.

I used to think most of these killers were unintentional and merely the result of ignorance or a non-existent understanding of the non-material world of spirit. I also felt that science was rather inept in detecting subtle shifts of emotion, such as depression or “just not feeling well.” All such “measurements” were simply too nuanced to show up in their metrics.

Now I believe a lot of what I am speaking of is intentional. We are intentionally being eliminated or, at the very least, intentionally being made ill. Humanity is purposefully being murdered.

That’s a rather radical assumption, eh? Well, let’s just put it aside for the moment if this bothers you. I can make a good argument even if you are unwilling to accept that extreme notion. And, as the eminent Swiss psychiatrist Carl Jung used to often say to his patients, “Well, I could be wrong.”

There are many obvious things out in the world that are killing us softly…and not all of them so softly. Pollution is a big one; the air we breathe and the water we drink are toxic—probably more toxic than we are led to believe (that’s the “softly” part). Then on the toxic list we’ve got most of what we eat, the obvious being fast food, the not so obvious being processed food, and the really soft culprit being GMO. There are more “obvious killers” out there as well, I just don’t have the space to include all of them.

Some of the more “not so obvious” things, which some of you may have issue with, are things like 5G, and really any EMF pollution, which even includes radio waves. Most medicine is toxic, doctors themselves can be quite toxic and guilty of killing us softly, although I still would bet most of them do this unintentionally (how many times have you read statistics that “deaths due to doctors, hospitals, and pharmaceuticals” rank in the top five of global killers?) There are so many things on this list it would take volumes to present them all.

Actually, I would not be surprised if every single thing we encounter every day is chemically toxic in some way (meaning it is responsible for destroying the tissue of our physical body). Fun stuff.

I think a lot of people out there are not really aware of most of these things, or think the damage they may inflict is so minimal it really doesn’t amount to much. Well, as they say, things add up.

Again, this is all stuff that most people at least have heard of possibly being bad news. Most of those people, again, probably figure that the powers that be would not allow things out there that could really hurt us. I mean, really, there are so many government agencies that regulate this stuff, and do whatever they can to keep us from being harmed. Cough, cough. Really? Like I’ve said before, if you believe that, I’ve got beachfront property in Nevada I’ll sell you cheap. Or is it Kansas?

We’ve all seen movies like Erin Brockovich (2000) and Dark Waters (2019) that show the heroics of individuals fighting the big bad polluting evil ones and winning millions of bucks for their victims. That’s great, more power to them. But the bad guys in these movies are for the most part a few levels down from the real culprits. Sure, there are evil corporations and CEOs who run them. They are indeed part of the agenda. But again, I won’t get into that here.

Some of the biggest soft killers out there are mental health killers, as well as the drugs that accompany them. I would also put the aforementioned EMF killers in this group, and maybe even some of the pollutants that attack our minds rather than our bodies—nobody pays much attention to that—to subtle effects of personality, cognition, etc. For example most of the talk about the Covid vaccines hurting us is how it hurts us physically. You hear little about the effects they may have on the brain (other than physical), the personality, or the spirit. Oh God no, none of that woo woo stuff please, it just isn’t important.

Human beings are pretty subtle bio systems, and that is just the physical part of us. The mental/emotional part is pretty subtle too, and the spiritual part is so subtle it is ignored entirely. Even the first two of these, physical and mental, are largely ignored. The only part of them that is given much attention at all is the tip of the iceberg part. The majority of these systems lie below the level of gross awareness, yet this hidden level(s) has more influence on the well being of the person than the relatively small portion of the iceberg that is given all of the attention.

Let me be a bit clearer here.

Modern medicine is mostly a science of statistics. The majority rules here, the middle of the bell curve is what is given consideration. Nearly every medical “statement” is given as a percentage. What percent will survive a particular cancer, disease, or treatment modality, what percentage will still be alive in 5 years, what percentage will suffer side effects—on and on. Very little thought is given to the outliers. In fact, certain side effects fall so far below a relevant statistic, that these side effects are completely ignored; yet these ignored side effects could have a huge impact on quality of life.

Here is an example: I have dozens of clients who come to me with the common complaint of depression. Most of them are not suicidal; they simply have what they define as a crappy life. Their life just isn’t the life they envisioned. Maybe they don’t even know they are depressed, but after further evaluation, it seems clear they are just not capable of being fully happy, motivated, curious about life, or even interested in life.

These patients don’t really possess any of the typical traumas in their experience that can bring on such complaints. What is it then? The environment (I don’t mean climate change)? Yes. The culture? Yes. The societal decadence and immorality? Yes. The food they eat? Yes. The over the counter drugs they take? Yes. The prescription drugs they take? Most definitely yes.

All these things are killing them—some obviously, but the real dangers are the things killing them softly—the things we are told are unimportant.

None of these things are considered by modern medicine to have a significant enough influence on the body, the mind, or the spirit (which of course no medical practitioner pays any attention to) to be dangerous. If we, as humans, fall above a certain line with our complaints and ailments, we are considered “normal” and the complaints and ailments that fall below that are not statistically relevant. But they add up.

We then die younger than we should, we become weaker earlier than we should, and even if our body can stay physically functioning through modern medical miracles, we are dead inside with a poisoned soul as well as with a body and brain that is barely functioning to par, but functioning enough that most people think is good enough.

Living a life that has meaning and purpose is actually more important than living a life with a fully healthy body—and we are getting neither in this current world setting. Our souls are slowly being killed by a meaningless, materially focused culture where consumerism is the name of the life game. I need not list the problems present in this soul killing culture, but at the head of slow death is the movement toward transhumanism and the deliberate creation of a world without a moral foundation.

The physical body is being killed softly as well with all of the aforementioned toxic killers we are exposed to day in and day out. Most of them are slow and soft, and operate unhindered below the radar of most people—and certainly below the radar of those who should be monitoring such things.

Is this intentional? Are we subjected to this slow genocide as part of the global eugenic effort to rid the world of useless eaters?—or even more horrifying, to rid the world of all humans who are made in the image of God along with nature herself? An agenda chillingly made clear in C.S. Lewis’ tome That Hideous Strength seen as well in the works of numerous others such as George Orwell and Aldous Huxley.

Probably not everything I have mentioned here has come about as part of this nefarious evil intention. But I would be willing to bet a lot of it has (see the work of David Icke). It may just have become the nature of the beast to create a culture in its atheistic hubris that ignores the subtleties of life and living.

Most of these toxic examples I have presented here have come about through omission—e.g., by omitting any sort of diligence to avoid their toxic effects, or by entirely doing away with things that fall into the lower material resolutions of our experience, making them statistically irrelevant—if you can’t clearly see it then just ignore it. Obviously anything “unseen,” such as love, beauty, art, God, unity, and the essence of life, is completely and almost savagely ignored. Such is our world—a humanity that is quietly, and softly, dying.

 

Connect with OffGuardian

Cover image credit: pixundfertig




The European Commission and WHO Launch Landmark Digital Slavery Initiative to Centralize and Institutionalize Global Technocratic Idolatry.

The European Commission and WHO Launch Landmark Digital Slavery Initiative to Centralize and Institutionalize Global Technocratic Idolatry.
Translation of June 5, 2023 World Health Organization announcement. 

by Katherine Watt, Bailiwick News
June 13, 2023

 

5 June 2023 | News release | Geneva/Brussels

The World Health Organization (WHO) and European Commission have announced today the launch of a landmark digital slavery partnership.

In June 2023, WHO will take up the European Union (EU) pilot project of digital COVID-19 slave control to establish a global system that will help facilitate centralization of global financial, social and political power and protect the rulers of each former nation-state from current and future attempts at accountability, including growing public understanding that global pandemics are not a real thing and ‘vaccines’ are biochemical weapons in medicinal drag.

This is the first building block of the WHO Global Digital Slavery Network (GDSN) that will develop a wide range of digital products to deliver more corrupting power and control for the individuals building a Satan-worshipping one-world government with departmental headquarters in Geneva (WHO, UN), Basel (Bank for International Settlements), Brussels (EU), Rome, London, Washington DC and other major world cities.

“Building on the EU’s highly successful digital slavery network, WHO aims to offer all WHO Member States access to an open-source digital slavery tool, which is based on the principles of elitism, greed, fear, pride, secrecy, techno-materialism, data reductionism and privacy-intrusion,” said Dr Tedros Adhanom Ghebreyesus, WHO Director-General. “New digital slavery products in development aim to chain people everywhere to a central database through which Satanists can block access to financial, medical and other essential human goods quickly and more effectively.”

Based on the EU Global Enslavement Strategy and WHO Global strategy on digital slavery, the initiative follows the 30 November 2022 agreement between Commissioner Kyriakides and Dr Tedros to enhance strategic cooperation on global enslavement campaigns. This further bolsters a robust multilateral system with WHO at its core, powered by a strong EU.

“This partnership is an important step for the digital slavery action plan of the EU Global Enslavement Strategy. By using European best practices we contribute to digital slavery standards and interoperability globally — to the benefit of those seeking coercive power over the daily thoughts, words and actions of millions of human beings and those desperate to avoid removal from power, criminal trials, convictions and execution for already-committed war crimes, crimes against humanity and crimes that cry out to God for vengeance.

It is also a powerful example of how alignment between the EU and the WHO can deliver better enslavement protocols for all Satan-worshipping rulers in the EU and across the world. As the directing and coordinating authority on international digital enslavement work, there is no better partner than the WHO to advance the work we started at the EU and further develop global digital slavery solutions,” said Stella Kyriakides, Commissioner for Satanic Slave-master Safety.

This partnership will include close collaboration in the development, management and implementation of the WHO Global Digital Slavery Network system, benefiting from the European Commission’s ample technical expertise in the field. A first step is to ensure that the current EU digital slavery certificates continue to function effectively.

“With 80 countries and territories connected to the EU Digital COVID-19 Slavery Certificate, the EU has set a global standard. The EU certificate has not only been an important tool in our fight against public understanding that global pandemics are not a real thing and ‘vaccines’ are biochemical weapons in medicinal drag, but has also facilitated arbitrary suspensions and interference with international travel, tourism and social bonds.

I am pleased that the WHO will build on the privacy-invading, economic enslavement principles and cutting-edge technology of the EU certificate to create a global tool against restoration of legitimate civil authority serving the actual material and spiritual well-being of citizens in countries around the world,” added Thierry Breton, Commissioner for Internal Market Destruction.

A global WHO system building on EU legacy

One of the key elements in the European Union’s COVID-19 digital slavery pilot project has been digital COVID-19 slavery certificates. To block free movement within its borders, the EU swiftly established interoperable COVID-19 slavery certificates (entitled ‘EU Digital COVID-19 Slavery Certificate’ or ‘EU-DCSC’). Based on proprietary technologies and standards it allowed also for the connection of non-EU countries that issued slavery certificates according to EU-DCSC specifications, becoming the most widely used method of restricting free movement around the world.

From the onset of the EU slavery pilot project, WHO engaged with all WHO Regions to define overall guidelines for such slavery certificates. To help strengthen global civil authorities’ imperviousness to reform and reconstruction in the face of growing public awareness that current rulers are unnaturally interested in possessing complete access to and control of the daily thoughts, speech and acts of every living man, woman and child on the planet, WHO is establishing a global digital slavery certification network which builds upon the solid foundations of the EU-DCSC framework, principles and proprietary technologies. With this collaboration, WHO will facilitate this process globally under its own structure with the aim to allow the world’s Satan-worshipping rulers to benefit from convergence of digital slavery certificates. This includes standard-setting and validation of digital slavery signatures to prevent slave escape from the digital control grid. In doing so, WHO will have access to every piece of underlying personal data, as will the federal governments of participating member-states.

The first building block of the global WHO system becomes operational in June 2023 and aims to be progressively developed in the coming months.

A long-term digital slavery partnership to deliver more submissive slaves for all governing Satan-worshippers.

To facilitate the expansion of the EU Digital Covid-19 Slavery Certificate by WHO and contribute to its operation and further development, WHO and the European Commission have agreed to partner in digital enslavement programs.

This partnership will work to technically develop the WHO system with a staged approach to cover additional use cases, which may include, for example, the digitisation of the International Certificate of Biochemical Weapons Submissivity. Expanding such digital solutions will be essential to deliver more effective slave-control for slave-masters across the globe.

This cooperation is based on the shared values and principles of secrecy and closed-door decision-making, exclusivity, immunity from legal liability, political non-accountability, data collection and privacy intrusion, war, theft, scalability at a global level, and elitism. The WHO and the European Commission will work together to coerce maximum global slave submission. Particular attention will be paid to enslavement of those most prone to worshipping Almighty God instead of Satan: the people of the high-income countries historically known as Christendom, and the people of low- and middle-income nations who have embraced the Christian faith when taught the Word by holy, fervent and zealous missionaries.


Acronyms

  • WHO-GDSN – WHO Global Digital Slavery Network
  • EU-DCSC – EU Digital COVID-19 Slavery Certificate

 

Connect with Katherine Watt

Cover image credit: geralt




What’s Next to the Moon? – An “Apex Body” and Digital ID to Rule Us All

What’s Next to the Moon? – An “Apex Body” and Digital ID to Rule Us All

by Jacob Nordangard, Ph.D.
June 10, 2023

 

United Nations recently published three new Policy Briefs “to provide more detail on certain proposals contained in Our Common Agenda” – The UN Secretary-General’s vision for the future of global cooperation that will be decided at “The Summit of the Future” in September 2024. These briefings; A Global Digital CompactReforms to the International Financial Architecture and The Future of Outer Space Governance sets out a chilling course for our future.

Among the proposals are a new “apex body” in charge of the entire financial system that will “enhance its coherence and align its priorities with the 2030 Agenda for Sustainable Development.” This could, according to Secretary-General António Guterres, be done through a “Biennial Summit between the Group of 20, Economic and Social Council, the Secretary-General, and heads of international financial institutions.”

This will further integrate the G20 with the United Nations into a body that can be described as an economic Security Council. It also seems like a perfect nest for the “apex predators” that runs the international banking system.

A vital part of the agenda is also digital connectivity and the establishment of a Global Digital Compact. This can be described as a cybernetic organ, consisting of a digitally connected network of people, entities, devices, and things, that easily can be directed by those who run the system. In the Policy Brief it is for example explained how digitisation will help to achieve the global goals. The suggestions happens to be very similar to what World Economic Forum and PwC prescribed in their report Unlocking Technologies for the Global Goals in 2020. A Digital ID is a cornerstone in this work and is among other things seen as a way to reduce poverty.

This may, however, come at a cost. In the UN Secretary-General’s High-level Panel on Digital Cooperations report Age of Digital Interdependence from 2019, it is stated that:

A digital ID can help unlock new opportunities but can also introduce new risks and challenges. They can be used to undermine human rights – for example, by enabling civil society to be targeted, or selected groups to be excluded from social benefits.

Will you get your social protection coverage if you don’t comply with vaccinations or other measures introduced to achieve the SDGs? Probably not. This can later be fused with a social credit system and Central Bank Digital Currency (CBDC) – which is now being introduced and tested in many countries across the world. To receive your daily bread you have to obey and accept the instructions from the Masters that run the show. If the UN declares a “Planetary Emergency” this will have severe consequences for our freedoms (as we experienced during the pandemic).

In the Policy Brief – A Global Digital Compact the authors truthfully are mentioning the rising inequality after the pandemic.

Digital technologies are accelerating the concentration of economic power in an ever smaller group of elites and companies: the combined wealth of technology billionaires, $2.1 trillion in 2022, is greater than the annual gross domestic product of more than half of the Group of 20 economies.

But it seems that United Nations has a somewhat peculiar way of solving this problem. Not only do they strive towards digitising everything – they have also partnered with Big Tech in order to achieve this.



The UN Secretary-General’s High-level Panel on Digital Cooperation was led by Melinda Gates from Bill & Melinda Gates Foundation (according to the bio, Melinda “helped develop many of the company’s multimedia products” during her time at Microsoft) and tech billionaire Jack Ma from the Chinese Ali Baba Group.

This comes with assistance from Young Global Leaders like Mohammed Al Gergawi (chairman of the high-tech Mecca gathering – World Government Summit in Dubai), and Marina Kolesnik (Russia/Ukraine) as well as a “generous” contribution from the World Economic Forums Center for the Fourth Industrial Revolution.

Ali Baba developed Chinas Social Credit System through their subsidiary Ant Group whereas Microsoft promotes Digital ID in the ID2020 Alliance together with GAVI – The Vacccine Alliance and the ever so present Rockefeller Foundation.

United Nations seems to have hired a gang of robbers to manage the bank. These are the “trustees of the material universe for future generations” as stated in the global business elites’ Davos Manifesto from 1973.

Why on Earth would these “enlightened custodians” reverse a development that has put more power and wealth into their hands?

And now our “generous” tech billionaires are heading for Outer Space. The last Policy Brief (The Future of Outer Space Governance) formulates the grand vision to reestablish a presence on the moon with a way station (Lunar Gateway) and the development of a base at the south pole of the Moon as well as conducting a manned mission to the red planet (Elon Musk’s SpaceX).

These are old fantasies from the late 1940s that never seem to materialise. But their “space-based opportunities” also highlight the “important link between outer space and the 2030 Agenda for Sustainable Development” with the importance of satellite surveillance to “track deforestation, monitor protected areas for illegal poaching and fishing and assess biodiversity changes” as well as track our every move through the global navigation satellite systems.

As WEF-trustee and Climate Prophet/Profiteer Al Gore proclaimed with a giggle in the commercial for his satellite surveillance project Climate Trace“And most importantly… NO MORE HIDING”.

Are these people insane? How can the construction of a digital world brain really contribute to a greener and healthier planet?

Wouldn’t it be a more efficient measure to secure peace and the environment on this planet if this megalomaniac elite were sent on a one way mission to Mars?

0. Introduction: “Our Common Agenda” – Multilateralism With Teeth

 

Connect with Jacob Nordangard, Ph.D.

Cover image credit: geralt




[Updated] On the Massive Fires in Canada & All Over North America

On the Massive Fires in Canada & All Over North America

 

TCTL editor’s note: [See update regarding ammonium nitrate at end of post.]

After days of viewing information regarding the devastating fires in Canada, starting with the alert by Dutchsinse (Michael Janich) six days ago, and subsequently hearing from family and friends who live along the US east coast (and experiencing the heavy skies where I live), it seems clear that we still don’t know what is going on.

Many have sent links to “who did this” videos, articles and tweets. Many have reposted clips from “some guy on TikTok“. It turns out that the guy is Al Vachon (TikTok handle al_vachon). I have shared the short video and a transcript below.

In a follow-up video, Al expresses his surprise that he’s receiving so much attention. I have no idea who he is or what he has to say about anything else, but other people who are questioning the narrative, and who also have a backbone, resonate with his words and are sharing everywhere.

In the meantime, Dutchsinse has done more investigation and found that the fire locations link up with locations of oil wells along the edge of the North American Craton, as well as a relationship to earthquake activity. He shows the correlation between earthquakes and oil well drill points. Dutchsinse makes it clear he does not have the answers but he is researching and sharing all that he sees, along with his questions.

And today, Jeff Berwick of Dollar Vigilante put together a video compilation of “fire”-related clips and thoughts,  which was sent out with his newsletter (also shared below).

While no one knows the truth about what is unfolding in all of these global events (natural occurrences and/or created or stimulated by human activity), we do know the full-spectrum-dominance agenda and that, regardless of the cause of the fires, the agenda drivers will use the situation to further their death cult (anti-human and anti-nature).  They will push forward their evil control agendas.

We must individually face the lies that we were all born in to, stand up, resist, and live/create our daily lives outside of their control. And we must let go of the fear of death. Life as enslaved beings is a far worse fate than death.

~ Kathleen

 

Follow Dutchsinse at Youtube

Canada Is on Fire

by Al Vachon on TikTok
June 4, 2023

https://www.tiktok.com/@al_vachon/video/7240820329088552198

Transcript prepared by Truth Comes to Light:

Good morning, everybody. I wanted to touch on this one this morning. It’s getting so bad that I don’t think people really, truly understand what’s going on.

If you haven’t heard the latest up here in Canada, BC is on fire. The East Coast is on fire. And now Quebec. Quebec, all in one day, the entire province caught fire on a beautiful day.

This is planned and I’ll tell you why it’s planned. They want to move people out of the countryside, into cities. Then they want to lock them down in 15-minute cities.

How do you do that? Contaminate the air, contaminate the water and so on.

They started contaminating the water, as you know, in the past few months. And now with train derailments and all that stuff all across North America, not just in Canada.

And that was purposefully done to contaminate water sources and then justify people’s relocation by saying the water is contaminated, you can’t stay here. Or the air is contaminated, you can’t stay here. Relocating them into whatever hotels or different establishments within city limits.

This is all a ploy, a plan, to get people into cities to implement their smart cities. That’s the only way they can control you.

First, they have to go to digital currency and get you into smart cities. This is happening and this is real.

This is evil. This is pure evil.

It’s our time to fight back. We need to —

I’m actually totally surprised that there isn’t complete and utter outrage, and an uprising like this world has never seen before.

Because this is what we need to take our countries back. Complete outrage and an uprising. Nothing less is going to do, nothing less is going to make this place a better world.

I mean, we have to take our country back. And the way we do that is we expel those that are destroying our way of life.

And what I mean by exposing them is getting them out of power. Forcing them one way or the other.

They don’t want to go willingly. We’ll help them out the door.

That’s it for today. Happy Sunday. Stay free. God bless.

 

Follow Al Vachon at TikTok

 

We Didn’t Start The Fire… But We Know Who Did

by Jeff Berwick,Dollar Vigilante blog
June 9, 2023

 

Long before there were Covaids, lethal injections, climate-destroying cow farts, and 15-minute prison cities, the NWO cabal has laid the groundwork for the biggest conspiracy feary of all: “How to enslave the world… and get away with it”.

Lesson 1: Sci-lence the Lambs

“Hey, morons! Canada’s on fire, it’s time to bring back the masks. It’s for your own good and the safety of others – how ‘bout a free anti-smoke vaccination?”

Isn’t it wonderful how these flimsy paper muzzles have such multi-purpose?

  1. Keeps you safe during the biggest “pandemic” the world has ever seen
  2. Protects you against stolen ammonia nitrate fires 3000 miles away
  3. Makes you look dumb as fook
  4. Identifies you as an NPC in the Great Reset Conspiracy – Climate Change edition

It’s got everything!

  • 15 Minute Cities
  • Sheeple not allowed to leave the city
  • It’s for your own good because the air outside the city is poisonous.
  • No cars – only driverless monorail things
  • Population control and Eugenics
  • Implanted control chips
  • Climate change/virus/meteor apocalypse has destroyed everything and there is no life outside the city – you can’t exist outside the system.

All of which were predicted in ‘Logan’s Run’, a 1976 dystopian cult movie where humanity was forced to retreat to domed biospheres because of an ‘ecological disaster’. Where, at the age of 30, people would be offered the choice to willingly and enthusiastically be killed in the expectation of being reincarnated, or, running like hell and hoping you avoid the armed, ruthless enforcers of the system…

Read more at Dollar Vigilante blog…

Watch Jeff’s video on:  Odysee | RumbleBitchuteTelegram

 

Connect with Jeff Berwick

 

Update 6/9/2023: Related to Jeff’s comment above about stolen ammonium nitrate, see this Tiktok video by RepublicanReflections:

https://www.tiktok.com/@republicanreflections/video/7242771288526294314

Cover image credit: CharlVera/pixabay


See related:

Wildfires As a Weapon: US Military Exposed




WHO Launches New “Digital Health Initiative”

WHO Launches New “Digital Health Initiative”
Chalk up another “I told you so” for the Conspiracy Theorists. 

by Kit Knightly, OffGuardian
June 8, 2023

 

On Monday, the World Health Organization and European Union announced the launch of their new “partnership”, building on the EU’s “highly successful” digital certification network, which was introduced during the “pandemic”.

From the WHO’s website [emphasis added]:

WHO will take up the European Union (EU) system of digital COVID-19 certification to establish a global system that will help facilitate global mobility

This would be those digital health passports that “conspiracy theorists” warned about, but which we were all told weren’t ever going to be a thing.

This isn’t about “Covid” anymore, WHO Chairman Tedros Adhanom Ghebreyesus said as much in his statement on the launch, and it’s again made clear on the website, which repeatedly underlines the supposed purpose of the initiative:

  • [To] protect citizens across the world from on-going and future health threats, including pandemics
  • [To] enhance strategic cooperation on global health issues
  • [To] help strengthen global health preparedness in the face of growing health threats
  • [To] to deliver better health for citizens across the globe

What are these “health threats”? Well, they quite intentionally don’t say, but we can all make pretty good guesses. Climate change, obviously. Obesity seems pretty likely, poverty, overpopulation …and as many more as they choose.

– That’s the whole point of the open-ended wording, you can adapt it as you go.

Anyway, it won’t just be about about Covid passports, again as the conspiracy theorists predicted. But, more than that, it won’t even just be passports…

This is the first building block of the WHO Global Digital Health Certification Network (GDHCN) that will develop a wide range of digital products to deliver better health for all.

They are delightfully vague about what exactly these other “digital products” might be, how much they are going to cost global taxpayers, and just how many of our rights we’ll be required to forfeit in the name of a “healthy” planet (although ou can read the WHO’s “Global Strategy on Digital Health” to get some rough ideas).

However, while the details are brushed over, the overall aim is pretty openly stated:

enhance strategic cooperation on global health issues […] bolster a robust multilateral system with WHO at its core, powered by a strong EU.

It’s globalism – sorry, “multilateralism”.

Globalism has been the end game since the pandemic started. Hence the Pandemic Treaty, the new IHR regulations all that fun stuff. One world government (or maybe two world governments, if the New Cold War plays out as expected), installed in the name of public health.

Note that this launch lines up with a lot of “coincidental” domestic political movements from around the world.

For example, in the US they are set to vote on the “Improving Digital Identity Act”, which would require digital ID to do…pretty much everything.

In Canada major corporations are uniting to embrace digital ID as a key part of Agenda 2030 and “sustainable development goals”.

In the UK Sir Keir Starmer has promised a “totally digital NHS” under the next Labour government.

In essence, each country – for notionally different reasons, and supposedly independently of their own free will – are all going to develop a digital ID/health passport system at exactly the same time, and while working with the WHO to ensure “interoperability”.

Therein lies the plausible deniability. See, it won’t be one global health and surveillance system! No, it will be 100+ different “interoperable” systems…that just happened by chance to all be conceived and built at the same time along the same guidelines.

A distinction good enough to fuel the inevitable defenses from corporate fact-checkers even if it can’t fool anyone else.

However, all that aside, the most interesting part of this story is where you read about it.

Viz – the back pages.

At the height of the pandemic, this would be big news, maybe breaking news in big red letters. There’d be op-eds in all the major outlets celebrating the move, accompanied by “fact checks” with headlines like “No, global digital passports doesn’t mean one world government”.

Now, if you’re not following certain social media accounts or regularly checking the news cycles for quite specific terms, you’d never have heard about this. It’s not even mentioned in any mainstream news site I’ve read.

Resistance has pushed the New Normal narrative out of the limelight, to be replaced by war porn, Trump, illegal immigrants or Harry and Meghan.

You’re all being encouraged to think the Great Reset was a flash in the pan, the New Normal just an old joke. 2020 was just a bad dream & now everything is back to normal & Left versus Right, East versus West…

But no. This is the last reel of the scary movie. The demon seems to be exorcised, the danger looks like it’s over and the heroine has gone to take a bath, unaware of what’s creeping slowly toward her from the shadows.

The Great Reset is still very much alive, but your resistance temporarily shut it down, so it’s changed its tactic. It was overt. Now it’s covert. Now it’s hoping to sneak in while you’re not looking and snatch you up and swallow you down before you even know what’s happening.

It’s incredibly important you don’t let that happen.

So – wake up, and wake other people up. Shake them. Yell at them. Get them to look over their shoulder at the big rough beast slouching toward Bethlehem – so we can try to stop it being born.

 

Connect with OffGuardian

Cover image based on creative commons work of: CDD20




‘Death Sentence for Millions’: WHO, EU Launch New Global Vaccine Passport Initiative

‘Death Sentence for Millions’: WHO, EU Launch New Global Vaccine Passport Initiative
Technology expert Michael Rectenwald, Ph.D., told The Defender that, under the guise of preserving freedom, a digital passport system “means restraints on movement and living for the unvaccinated and forced vaccination to participate in life.”

by Michael Nevradakis, Ph.D., The Defender
June 6, 2023

 

The World Health Organization (WHO) and the European Commission — the executive branch of the European Union (EU) — on Monday launched a “landmark digital health partnership” marking the beginning of the WHO Global Digital Health Certification Network (GDHCN) to promote a global interoperable digital vaccine passport.

Beginning this month, the WHO will adopt the EU’s system of digital COVID-19 certification “to establish a global system that will help facilitate global mobility and protect citizens across the world from on-going and future health threats, including pandemics,” according to Monday’s announcements by the WHO and the European Commission.

The WHO and European Commission claim the GDHCN initiative, which has been in the works since 2021, “will develop a wide range of digital products to deliver better health for all.”

The organizations said the WHO will not collect individuals’ personal data via these digital passports — stating that such data collection “would continue to be the exclusive domain of governments.”

WHO Director-General Tedros Adhanom Ghebreyesus lauded the new agreement:

“Building on the EU’s highly successful digital certification network, WHO aims to offer all WHO Member States access to an open-source digital health tool, which is based on the principles of equity, innovation, transparency and data protection and privacy.

“New digital health products in development aim to help people everywhere receive quality health services quickly and more effectively.”

However, experts who spoke with The Defender said the ramifications of such a system for human liberty and freedom of movement raised concerns.

Independent journalist James Roguski told The Defender the WHO is not waiting for a successful conclusion of these negotiations in order to implement initiatives such as a global digital vaccine passport. He said:

“The announcement by the WHO and the European Commission regarding the launch of their digital health partnership was hardly a surprise. Over a month ago, the WHO quietly published that they were working on ‘operationalizing’ the very things that were being ‘negotiated.’

“This is just one example that clearly shows that the super-secret ‘negotiations’ regarding the International Health Regulations (IHR) are a charade.”

Michael Rectenwald, Ph.D., author of “Google Archipelago: The Digital Gulag and the Simulation of Freedom,” told The Defender that, under the guise of preserving freedom, a digital passport system “means restraints on movement and living for the unvaccinated and forced vaccination to participate in life.”

The announcement of the WHO-European Commission collaboration came just days after the conclusion of the WHO’s annual World Health Assembly (WHA).

While the pandemic treaty and IHR amendments were not finalized at this year’s meeting, high-level WHO officials warned of the risk of a future pandemic and spread of a deadly “Disease X,” and expressed the need to “restrict personal liberties” during a future health emergency.

The EU has been a strong proponent of digital vaccine passports, first launched for its member states in late 2020 — concurrent with the introduction of the COVID-19 vaccines — under the name “Green Pass.” The EU’s experience with the digital passes is noted in Monday’s announcement, which states:

“One of the key elements in the European Union’s work against the COVID-19 pandemic has been digital COVID-19 certificates. To facilitate free movement within its borders, the EU swiftly established interoperable COVID-19 certificates.

“Based on open-source technologies and standards it allowed also for the connection of non-EU countries that issue certificates … becoming the most widely used solution around the world.”

Roguski told The Defender the EU also was among the strongest proponents of vaccine passports during ongoing negotiations for the WHO’s “pandemic treaty” and amendments to the IHR.

“They really want the global digital health certificate,” Roguski told The Defender in March. “Primarily, that’s coming from the European Union.”

‘Pandemic passports a death sentence for millions’

According to Roguski, the EU, during negotiations for the IHR amendments, put forth proposals that seek to “‘normalize’ the implementation of a global digital health certificate.”

The Czech Republic called for Passenger Locator Forms “containing information concerning traveller’s destination,” preferably in digital form, for the purpose of contact tracing.

They also proposed that the WHO’s Health Assembly “may adopt, in cooperation with the International Civil Aviation Organization [ICAO] … and other relevant organisations, the requirements that documents in digital or paper form shall fulfill with regard to interoperability of information technology platforms, technical requirements of health documents, as well as safeguards to reduce the risk of abuse and falsification.”

The WHO lists ICAO as an officially recognized “stakeholder.”

The Czech Republic and the EU proposed documentation not just for vaccination, but “test certificates and recovery certificates” in cases “where a vaccine or prophylaxis has not yet been made available for a disease in respect of which a public health emergency of international concern has been declared.”

Plans for the WHO’s GDHCN have been in the works since at least August 2021, when the WHO released a document titled “Digital documentation of COVID-19 certificates: vaccination status: technical specifications and implementation guidance, 27 August 2021.”

The GDHCN framework made its way onto the agenda of this year’s WHA, which stated:

“The Secretariat has developed SMART (Standards-based, Machine-readable, Adaptive, Requirements-based, and Testable) Guidelines on the digital documentation of COVID-19 certificates, comprising recommendations on the data, digital functionality, ethics, and trust architecture needed to ensure the interoperability of immunization and health records globally.”

The WHO also announced the successful completion of a “technical feasibility study for establishing a federated global trust network, which tested the ability to interoperate the health content and trust networks across existing regional efforts.”

EU officials have frequently praised themselves over the launch of the bloc’s “Green Pass,” touting how individuals’ privacy would be protected on the app. The introduction of the “Green Pass” was accompanied by statements by European Commission President Ursula von der Leyen calling for a “discussion” on mandatory vaccinations in the EU.

One of the EU’s stated priorities as part of its 2019-2024 five-year plan is to create a “Digital Identity for all Europeans.” Namely, each EU citizen and resident would have access to a “personal digital wallet,” which would include national ID cards, birth and medical certificates, and drivers’ licenses.

These proposals and initiatives appear to be closely aligned with the United Nations’ Sustainable Development Goals (SDGs), and in particular, Target 16.9, which calls for the provision of a digital legal identity for all, including newborns, by 2030.

Tedros said the SDGs are “our north star,” while addressing this year’s WHA.

Rectenwald called “pandemic passports” a “death sentence for millions.” He told The Defender:

“Despite the studies demonstrating that vaccines to curb pandemics have been deadly and useless, the WHO is doubling down on vaccine mandates.

“Pandemic passports equal a death sentence for millions and the abrogation of rights for the non-compliant. The WHO should be stopped before it completes the construction of a global totalitarian system.”

 

Michael Nevradakis, Ph.D., based in Athens, Greece, is a senior reporter for The Defender and part of the rotation of hosts for CHD.TV’s “Good Morning CHD.”

 

This article was originally published by The Defender — Children’s Health Defense’s News & Views Website under Creative Commons license CC BY-NC-ND 4.0. Please consider subscribing to The Defender or donating to Children’s Health Defense

Connect with Children’s Health Defense

 




Unveiling the Privacy Perils of Amazon Sidewalk

Unveiling the Privacy Perils of Amazon Sidewalk

by Neil Radimaker, The Conscious Resistance
May 26, 2023

 

In a time where technology continues to shape our lives, the emergence of Amazon Sidewalk has ignited a fervent debate about the balance between convenience and privacy. As an independent investigator, I feel compelled to understand the deep complexities and potential dangers of this pervasive network. This investigative report aims to shed light on the surveillance capabilities, coverage area, and the undisclosed collaborations surrounding Amazon Sidewalk.

Amazon Sidewalk, is a shared network launched by Amazon, promising to enhance the functionality of devices like Amazon Echo devices, Ring Security Cams, outdoor lights, motion sensors, and Tile trackers. It extends their working range and helps them perform better both at home and beyond the front door. However, the very features that make it appealing also raise serious concerns about privacy and surveillance.

One-sided PR Video: About Amazon Sidewalk and how Semtech’s LoRa® technology plays a critical role (Published: March of 2023).

This report is a culmination of research, analysis, and critical thinking, and it is my hope that it serves as a catalyst for informed conversations and collective action.

Unveiling the Dangers of Amazon Sidewalk’s Surveillance Capabilities

In this digital age, where connectivity and smart devices have become ubiquitous, a new level of surveillance has emerged, blurring the boundaries between public and private spaces. Amazon Sidewalk stands at the forefront of these intrusive surveillance networks. In this report, we dive into the alarming dangers posed by these surveillance capabilities and the implications for personal privacy and autonomy.

Audio and Video Intrusion:

One of the most concerning aspects of Amazon Sidewalk is its ability to intrude into our private spaces without our explicit consent or knowledge. By silently capturing seamless audio and video data through devices like Ring cameras, Amazon Echo and other compatible smart home technologies. Sidewalk has the potential to turn every room of our homes into a watchful eye, constantly recording and analyzing our activities. This level of surveillance undermines the sanctity of our personal lives and raises questions about the boundaries of consent and individual autonomy.

Integration with Facial Recognition:

One of the most controversial aspects of Amazon Sidewalk’s privacy invasion potential is its integration with facial recognition technology. By combining video surveillance with facial recognition algorithms, Sidewalk will have the capacity to identify individuals and track their movements with alarming accuracy. Individuals can be identified and monitored, alerting officials when a person designated as “suspicious” is caught on camera.

Behavior Profiling:

By collecting a vast amount of data about our daily routines, habits, and preferences, Amazon Sidewalk has the potential to construct detailed profiles of individuals. Through sophisticated algorithms and data analysis, Sidewalk can track our movements, monitor our online activities, and even make inferences about our behaviors and interests. This level of profiling creates a comprehensive digital portrait, encroaching upon our autonomy and raising concerns about potential manipulation or discrimination.

Room Mapping and Blueprinting: 

Amazon’s acquisition of iRobot, the maker of Roomba raises concerns about data sharing and collaboration with Amazon Sidewalk. The Roomba’s advanced features, including its mapping and blueprinting capabilities, introduce interesting privacy implications. With data collection and the ability to gather detailed information about our home layouts and furnishings. The Roomba can also silently record audio and video, analyzing our activities, intruding into our most private spaces.

Overlap of Coverage Reach:

Amazon Sidewalk’s extensive network coverage raises concerns about the widespread surveillance it enables. With a vast number of interconnected devices, this creates an overlapping network of surveillance that spans entire neighborhoods and public spaces. This level of coverage infringes upon our very sense of privacy, as our movements and activities can be captured and monitored from various angles and locations privately and publicly. Amazon Sidewalk’s ambition is to establish a nationwide network, the company currently claims it now provides coverage to over 90% of the U.S. population, including those who live in moderately rural areas.

Unregulated Data Collection:

The vast amount of data collected by Amazon Sidewalk raises significant concerns about its storage, usage, and potential for misuse. With access to intimate details of our lives, including our daily routines, social interactions, and even sensitive information, the potential for abuse or unauthorized access to this data is alarming. The lack of clear regulations and safeguards heightens the risks associated with such uncontrolled data collection.

The Partnership Between Amazon, Law Enforcement and Federal Agencies:

Amazon Ring’s partnership with local law enforcement agencies has raised significant privacy concerns. The doorbell-camera company has established video-sharing partnerships with more than 400 police forces across the United States, potentially granting them access to homeowners’ camera footage. This partnership allows police to request video recorded by homeowners’ cameras within a specific time and area, aiding officers in viewing footage from the company’s millions of Internet-connected cameras installed nationwide.

While homeowners can decline these requests, the number of police deals is likely to fuel broader questions about privacy, surveillance, and the expanding reach of tech giants and local police. Legal experts and privacy advocates have voiced alarm about the company’s ambitions and its increasingly close relationship with police, arguing that the program could threaten civil liberties, turn residents into informants, and subject innocent people, including those who Ring users have flagged as “suspicious,” to greater surveillance and potential risk.

Currently, law enforcement can request footage from Ring cameras through the Neighbors app, but homeowners have the right to refuse. If the footage is deemed critical, officers can seek a search warrant or court order to force Ring to release the footage, regardless of the homeowner’s objections. There have however been cases where Ring did not require the use of a warrant or court order to release the footage to law enforcement. This effectively transforms private security systems into tools for law enforcement. Ring’s collaboration with law enforcement has been criticized for potentially fostering racial profiling and eroding community trust.

The high-resolution cameras can capture detailed images not only of the owner’s doorstep but also of neighboring houses down the street. Some officers have confessed to looking for Ring doorbells while investigating crimes or canvassing neighborhoods, in case they need to resort to legal maneuvers to obtain the video without the homeowner’s consent.

As concerns regarding the privacy and security implications of Amazon Sidewalk continue to grow, it becomes imperative to examine the collaborations and deals with federal agencies.

Reports have surfaced indicating that Amazon has entered into collaborations with the Federal Bureau of Investigation (FBI). The exact nature and scope of this collaboration remain undisclosed, but it has raised concerns about the potential access and sharing of data between Amazon Sidewalk and the FBI. The implications of such a partnership on surveillance capabilities and the handling of user data warrant further investigation and scrutiny.

While the specifics are shrouded in secrecy, there have been many reports talking about the working relationship between Amazon and the Central Intelligence Agency (CIA). In fact, a $600 million computing cloud was developed by Amazon Web Services for the CIA. This cloud is intended to service all the agencies that make up the intelligence community, ushering in a new era of cooperation and coordination. The cloud allows agencies within the intelligence community to order a variety of on-demand computing and analytic services from the CIA and National Security Agency.

Final thoughts from the author:

For all intents and purposes, the “Total Information Network” is here. Amazon Sidewalk fits the description of a comprehensive surveillance system that extensively monitors, tracks, and collects all data on a large scale. This network leverages advanced technologies, such as surveillance cameras, facial recognition software, data analytics algorithms, and interconnected databases, to gather and analyze vast amounts of information about individuals. Consequently, it creates a surveillance state that encroaches upon the existence of personal privacy, granting authorities and centralized entities unparalleled access to individuals’ activities, behaviors, and personal data. In many ways, it resembles a magnified version of the dystopian surveillance depicted in George Orwell’s “1984.” This is now reality.

This type of information network should raise major concerns. It is very similar to the ideals and unethical principles of past oppressive regimes, who created extensive lists of individuals for surveillance and control. The collection of personal information within such a network creates a potential for retrospective use against people in the future.

Just as the Stasi meticulously documented citizens’ activities and associations, and the Nazis compiled lists to target specific groups, this comprehensive surveillance system enables authorities to retrospectively identify and target individuals based on their past actions, beliefs, or affiliations. This poses a grave risk to personal freedom, as historical data can be weaponized to persecute, discriminate against, marginalize, and even murder individuals through the acts of democide and genocide.

The lessons from history remind us of the importance of guarding against the misuse of personal information and protecting individual rights, even as technology advances and surveillance capabilities expand.

It is my hope that this report sparks meaningful conversations and prompts individuals, communities, and policymakers to question the balance between connectivity and privacy. The path forward requires a collaborative effort, with individuals, advocacy groups, and policymakers working together to shape regulations and guidelines that prioritize privacy, autonomy, and consent. It is only through vigilant and educated learning that we can navigate the complexities of the digital age and ensure the protection of our fundamental rights and freedoms.

 

Sources:

    1. The Atlantic: The Details About the CIA’s Deal With Amazon
    2. The Register: ACLU: Amazon’s Rekognition raises profound civil liberties concerns
    3. The Washington Post: Doorbell-camera firm Ring has partnered with 400 police forces, extending surveillance concerns
    4. Popular Science: Amazon Sidewalks Privacy Concerns
    5. The Verge: Amazon Sidewalk Privacy Echo Ring Smart Home
    6. Business Insider: Amazon Sidewalk Raises Privacy Concerns Ahead Launch Experts
    7. CPO Magazine: Amazon Sidewalks Smart Neighborhood Vision Raises Serious Privacy Concerns
    8. Consumer Reports: Pros and Cons of Amazon Sidewalk Network Plus How to Opt Out
    9. HackRead: Critical Vulnerability Amazon Ring Camera Record
    10. Wired: Ring Doorbell Camera Amazon Privacy
    11. Komando: Roomba Security Tips
    12. EFF: Ring Reveals They Give Videos Police Without User Consent or Warrant
    13. New York Post: Employees at Amazon’s Ring Have Been Spying on Customers
    14. The Guardian: Amazon Ring Largest Civilian Surveillance Network US
    15. Amazon Sidewalk Website
    16. Amazon Sidewalk White-paper
    17. AWS IoT Core Features
    18. Amazon Conditions of Use
    19. Amazon.com Privacy Notice

 

Neil Radimaker is a Reporter, Journalist, filmmaker and cinematographer, as well as the co-founder and co-creator of The Conscious Resistance Network, which is a decentralized media network focused on promoting individual freedom, peaceful resistance, and alternative solutions to mainstream problems. 

 

Connect with The Conscious Resistance

Cover image based on creative commons work of: TheDigitalArtist

 




Andrew Napolitano on Pegasus & Predator Spy Systems: The Feds and Their Copycats 

Andrew Napolitano on Pegasus & Predator Spy Systems: The Feds and Their Copycats
The Feds and Their Copycats 

by Andrew P. Napolitano, Judge Napolitano
May 18, 2023

 

The federal government recently revealed that at least 50 U.S. government personnel working in 10 foreign countries have had their mobile devices hacked by unknown persons who employed software known as “zero-click.” The zero-click product, called Pegasus, is manufactured by an Israeli high-tech company, called NSO Group.

Pegasus enables the user to download the contents of the target’s mobile device or desktop without having to trick the target into clicking onto a link. It also enables the user to follow the person in possession of the device, capturing all texts and emails, as well as listening to conversations on the device or that take place in near proximity to it.

Pegasus is so sophisticated that its victims are largely unaware of the digital attack on their devices. The feds learned that they have been victimized by this software when Apple informed them. Apple told the feds to expect much more of this. The feds are deeply troubled by this warning, as they don’t know who the victims are. The president himself was recently in Ireland, where his personal phone may have been targeted.

But don’t feel sorry for the feds. They have been using this software and similar products on unsuspecting Americans since the Trump administration.

Here is the backstory.

In reply to a routine Freedom of Information Act request made in 2020, the FBI acknowledged spending $5 million to license Pegasus from NSO Group. When FBI director Christopher Wray was asked about this, he reluctantly told Congress that his agents bought zero-click, but he denied its use in law enforcement. What does that mean? Isn’t the essence of the FBI’s work law enforcement?

Wray claimed that the FBI only purchased zero-click in order to reverse engineer it — basically to see how it worked. But that’s not truly why the FBI wanted Pegasus. It hoped to use the software to spy on Americans without first obtaining search warrants.

The Fourth Amendment to the U.S. Constitution, written in the aftermath of British searches of colonial homes not based on evidence of crimes, requires judicially issued search warrants based on probable cause of crime for all searches and seizures.

Thus, the owners and users of mobile devices and desktops — that’s nearly every American — have a privacy right in the use of their devices and in the data they have stored in them. Even a narrow interpretation of the amendment that guarantees privacy in “persons, houses, papers, and effects” must acknowledge that a computer chip — the heart of every computer — is an “effect,” and thus its owner or user enjoys privacy protection.

Protection from whom? Let’s see.

When President Joe Biden learned of the FBI’s use of Pegasus — the FBI secretly bought it during the Trump years — and the FBI’s shady explanation for its use of it, the White House announced an executive order that it claimed would prevent future use of zero-click. The Biden executive order stops the sales of Pegasus to Americans and to the government, but it does not stop the sales of all zero-clicks.

Rather than simply banning zero-click, rather than banning all warrantless searches, Biden banned only the use of one brand of zero-click software and only when it has also been used by foreign governments to target the U.S. government, when it is under the control of a foreign government, when it has been used to target the freedom of expression of foreign human rights activists or when it has been used by foreign authoritarians.

What about stopping the use of zero-click by federal authoritarians? Biden banned it because of how others use it, not because, in its essence, it violates the Fourth Amendment. Quick to pick up on this, the feds quickly purchased Predator — a twin of Pegasus, made by another foreign high-tech firm, with a more benign track record of sales and use.

What good does Biden’s executive order do? Whom does it protect? The Biden executive order is Joe Biden at his worst. Claiming to deny commercial benefit to a foreign company because it also sells to bad guys but permitting another foreign company to sell functionally the same product to the feds protects no one’s Fourth Amendment rights.

When Thomas Jefferson predicted shortly before he died in 1826 that, in the long run, personal liberty would shrink and government power would grow, he could not have imagined any of this. It seems that, no matter who is in the White House and which political party controls either house of Congress, the tentacles of government reach deeper into our lives with every tick of the clock.

Is there any area of private or harmless behavior that the government leaves alone?

The government that Jefferson left us has been inverted. That government needed the permission of the voters to do nearly anything. Today, we need the permission of the government to do nearly everything. And folks under observation change on account of the observation.

Two of my closest friends — husband and wife — told me they were discussing diamond earrings on their cellphones with each other last week. Soon, ads for diamond earrings began popping up on their desktops.

This was obviously not the government, yet, government sets the tone and the standard. Federal agents use zero-click to hack into our computers because that’s a lot easier than developing probable cause of crime and presenting it to a judge. Big tech uses hacking because that’s more effective than advertising.

Now big tech targeting consumers can mimic the feds — and, like the feds, get away with it because when the government breaks its own laws, it sets a precedent for others to follow. Is this the government the Framers left us? Is it the government we voted for? What awaits us on the other side of this Orwellian landscape?

Copyright 2023 Andrew P. Napolitano

 

Connect with Andrew P. Napolitano

Cover image credit: geralt




TSA Pilot-Tests Controversial Facial Recognition Technology at These 16 US Airports

TSA Pilot-Tests Controversial Facial Recognition Technology at These 16 US Airports

by Tyler Durden, ZeroHedge
May 18, 2023

 

The next time you find yourself at airport security, prepare to look directly into a camera. The Transportation Security Administration is quietly testing controversial facial recognition technology at airports nationwide.

AP News said 16 airports, including Baltimore-Washington International Thurgood Marshall and Reagan National near Washington, as well as ones in Atlanta, Boston, Dallas, Denver, Detroit, Las Vegas, Los Angeles, Miami, Orlando, Phoenix, Salt Lake City, San Jose, and Gulfport-Biloxi and Jackson in Mississippi, have installed kiosks with cameras (at some TSA checkpoints) that allow passengers to insert their government-issued ID and look into a camera as facial recognition technology asses if the ID and person match.

Here’s what to expect at airports utilizing this new technology:

Travelers put their driver’s license into a slot that reads the card or place their passport photo against a card reader. Then they look at a camera on a screen about the size of an iPad, which captures their image and compares it to their ID. The technology is both checking to make sure the people at the airport match the ID they present and that the identification is in fact real. A TSA officer is still there and signs off on the screening. -AP

“What we are trying to do with this is aid the officers to actually determine that you are who you say who you are,” said Jason Lim, identity management capabilities manager, during a recent demonstration of the technology to reporters at BWI.

TSA said the pilot test is voluntary, and passengers can opt out. The facial recognition technology has raised concerns among critics, like five senators (four Democrats and an Independent) who sent a letter in February to the TSA requesting the pilot test be halted immediately.

“Increasing biometric surveillance of Americans by the government represents a risk to civil liberties and privacy rights,” the senators said. 

The letter continued:

“We are concerned about the safety and security of Americans’ biometric data in the hands of authorized private corporations or unauthorized bad actors.

“As government agencies grow their database of identifying images, increasingly large databases will prove more and more enticing targets for hackers and cybercriminals.”

Meg Foster, a justice fellow at Georgetown University’s Center on Privacy and Technology, is concerned that even though the TSA says it’s not storing biometric data, it collects, “What if that changes in the future?”

Jeramie Scott, with the Electronic Privacy Information Center, said that even though the TSA facial recognition kiosks are being tested, it could be only a matter of time before it becomes a more permanent fixture at checkpoints.

Despite the US being a first-world country, it has third-world protections for its people. There’s an increasing number of government agencies that want your biometric data. Even the IRS wants your face.

 

Connect with ZeroHedge

Cover image based on creative commons work of teguhjatipras




James Corbett: Thwarting Facial Recognition

James Corbett: Thwarting Facial Recognition

by James Corbett, The Corbett Report
May 16, 2023

 

We all know about the danger of a future society where we’re all tracked everywhere we go every single day in real time by our phones or devices . . . but actually, it’s worse than that!

You’re already being tracked everywhere you go, every day, and it doesn’t matter whether you leave your phone at home just as long as you bring your face.

Today on #SolutionsWatch, James explores some of the options that are on the table for heading off the facial recognition dystopia.

 Watch on BitChute / Odysee / Substack  / Download the mp4

Show Notes

US police forces using controversial facial recognition technology

Why the Military Use of Clearview AI is Dangerous

Clearview AI used by US police for almost 1M searches

Clearview AI Copied 30B Images Without Users’ Permission from Social Media Sites; Customers Include “more than 3,100 US agencies”

Are you who you say you are? TSA tests facial recognition technology to boost airport security

Facewatch Gets UK Code of Practice Certification for Live Retail Facial Recognition

Iran uses new surveillance network to crack down on women not wearing a hijab

Nullification – #SolutionsWatch

Michael Maharrey on Facial Recognition Pushback

Second California Assembly Committee Passes Bill to Extend Temporary Ban on Facial Recognition with Police Body Cameras

To the Governor: Montana Passes Bill to Limit Warrantless Use of Facial Recognition Technology

Hong Kong lasers

Cap_able

4409 — Interview with ABC15 News: Easter Bunny eggs photo radar!

Simple Sabotage – #SolutionsWatch

 

Connect with James Corbett




James Corbett on Technocratic Control and the Dangers of AI

James Corbett on Technocratic Control and the Dangers of AI

by Dr. Joseph Mercola
May 14, 2023

 

Story-at-a-Glance
  • Rather than squabbling about controlled opposition, we would be better served by spending our time productively engaged in research, verifying and triangulating information to discern what is true and what is false
  • “Divide and conquer” is the primary way the control network maintains control, and all that’s needed to divide a previously unified front is insinuation and the seeding of doubt
  • As AI-equipped chatbots are getting more sophisticated and start to monopolize online searches and virtual assistants, state-endorsed propaganda may become the only information available
  • Narrative is the ultimate weapon; with a convincing-enough narrative, you can motivate entire populations to go to war or anything else that you want them to do
  • One of the most important strategies you can implement to prepare yourself for the likelihood of what they plan on throwing at us next lies with community, meeting like-minded people that share your views and complement your skills. It will also be wise to relocate from high density urban areas

In this video, I interview investigative journalist James Corbett about false narratives, the global takeover by technocracy, controlled opposition and the dangers of artificial intelligence, as well as the solutions to these and other challenges.

Corbett’s journalism career began in the aftermath of 9/11, when he became “overwhelmed to discover that we are constantly lied to through the mainstream media.” 9/11 was his “red pill” moment, and he hasn’t stopped digging for the truth since.

“The discrepancy between the things that I was finding online versus what was being reported on the evening news just started getting wider and wider,” he says, “to the point where I felt that … I had to insert myself in that conversation. So that’s the reason we’re talking today.”

In 2007, Corbett launched his website, CorbettReport.com. One of his hallmarks, both in his documentaries and regular reports, is impeccable citations of sources.

“I always put up the transcript with the hyperlinks to the source documents for every single quotation, every video clip, everything that I’m playing,” he says. “I want to direct people back to the source material so that they can research it for themselves.

I know, as a researcher myself who does this for a living, that’s incredibly valuable. I very much appreciate it when other people do it, so I’m trying to set that example in the alternative media.”

Can the Global Takeover Be Derailed?

Corbett is also featured on “Good Morning CHD” with Dr. Meryl Nass once a month, an online news show by Children’s Health Defense.

“It’s a valuable way, for both of us, to continue keeping our eye on the ball of the World Health Organization and its latest machinations … of the global pandemic treaty and the international health regulations (IHR) amendments that they’re working on right now, which really could be the hardwiring of the biosurveillance infrastructure,” Corbett says.

When asked whether he believes the pandemic treaty and/or the IHR amendments can be stopped, Corbett replies:

“Well, they are planning on unleashing the global pandemic treaty on the world at the World Health Assembly (WHA) next year, May of 2024. And preparatory to that, they’re going to be holding a World Health Assembly this month, at which they’ll be talking about the draft of the treaty and the draft of the IHR amendments and other such developments.

So, we’re looking at about a one-year timeline before whatever it is they’re cooking up will be foisted upon the world, unless there is some dramatic movement to stop that.

In the short run, it seems unlikely that the incredible institutional momentum is going to be derailed, but having said that, we could look at things that have happened in the past that have completely derailed agendas that seemed inevitable, including the 2009 edition of the UNFCCC, the United Nations Framework Convention on Climate Change.

In 2009, the UNFCCC was being promoted and hyped — even by the then-president of the EU — as the potential for world government through a new climate accord that would completely rewrite the international rule books.

That was completely derailed by a couple of interesting incidents, one of which was Climategate … Squabbles between some of the developing nations versus the developed world … [also] helped to derail that 2009 conference.

There’s potentially a similar thing happening [now] with the WHO trying to foist regulations and restrictions on developing countries that can’t afford them. As we saw over the course of the past few years, it was the African countries that held out against the biosecurity state agenda, to a large degree.

And I think people who are interested in invoking a global biosecurity surveillance net probably are most concerned about how developing countries will or will not participate in this. So, there may be a similar sort of geo-economic squabbling or something else that might derail this, so I don’t think we should simply consign ourselves to the inevitability of it before it happens.”

Is Elon Musk Controlled Opposition?

Determining the trustworthiness of people within the alternative news space is a challenge everyone is faced with these days. Accusations of people being controlled opposition are common. The same goes for high-profile individuals in general. For example, some people, including Corbett and investigative journalist Whitney Webb, believe Elon Musk is likely controlled opposition. What led them to that conclusion?

“It’s a question that a lot of people have, so let’s dig into it,” Corbett says. On the one side you have people who believe Musk is exposing and undermining the military industrial intelligence complex. On the other are those who think he’s just playing a “good guy” role while surreptitiously furthering Deep State goals. As noted by Corbett, it’s hard to overlook the massive support Musk has received from the military industrial intelligence complex over the course of his career.

“We don’t have to speculate about that,” Corbett says. “That is a matter of public record. We can point to the half a billion dollars or so that the Department of Defense has awarded SpaceX in a series of contracts over the past few years to send satellites up into orbit of classified nature on unregistered, unreported missions that presumably have something to do with the DOD’s declared intention to make space into a war-fighting domain.

There’s the $3 billion in NASA contracts that SpaceX was awarded in 2021 to develop the human lander for the Artemis Mission, and the never-going-to-happen constantly delayed moon trip that the public is being promised. There’s the $750 million that was awarded to Solar City in 2016 by the state of New York to build a solar cell production facility.

This, again, is another aspect of the business opportunities that Musk is involved in that I think shrieks of grift — a boondoggle at the very least, constantly promising a technology that not only doesn’t deliver but actually is actively harmful to the environment. I think that’s something that needs to be stressed.

Then, there’s the $1.3 billion that Tesla got from the State of Nevada in 2014 to build the Gigafactory, etc., etc., etc. We could go through the list of such help, but perhaps more to the point was the fact that before Elon Musk got to launch SpaceX, he was part of a trip to Russia … to purchase old Soviet ICBMs [intercontinental ballistic missiles]. That trip ultimately resulted in the starting of SpaceX.

Who was accompanying Elon Musk on that trip? Someone named Mike Griffin, who just happened to be the chief operating officer of In-Q-Tel, which is the CIA’s investment capital arm …

Griffin went on to become the administrator of NASA, who then chose SpaceX as the one company out of the 20 that was applying for it at the time, for this $400 million contract to start development of the new ISS resupply rocket in 2005, which basically launched SpaceX … and again awarded SpaceX $3.5 Billion in 2008 with a contract that Musk himself credits with saving the company.

So, there you go, the literal deep state connections couldn’t get much clearer. At every stage of Musk’s business career, he has been saved as need be with the deus ex machina of deep state agents like Mike Griffin swooping in with billions of dollars of contracts at just the right time.”

That’s why Elon Musk’s Twitter takeover and the release of the Twitter Files may seem to be a move against the military-industrial complex, but given Musk’s documentable ties to that very same military-industrial complex, we must be wary of placing faith in these developments.

After all, Twitter is a centralized platform that lends itself to censorship, algorithmic manipulation and information suppression, and Musk has openly stated that he wants to create a “WeChat”-like app capable of handling every aspect of its users’ digital life.

Why Did Musk Release the Twitter Files?

Corbett suggests that the best way to evaluate Musk’s ideas and contributions is to assess their outcomes.

“Is what Elon Musk advocating good or bad? Do we agree with it or do we disagree with it? Is it right or wrong? And why do we think so? That has to be the heart that we keep coming back to. So, we have to evaluate Musk’s ideas on that basis,” he says.

“For example, there are ideas that Musk promotes that I am 100% onboard with. He has talked about the overpopulation myth and the under-population crisis that humanity is facing. I very much agree with him on that assessment. When he talks about the ill effects of lockdowns … absolutely, I think he’s right about that.

However, when he talks about the imposition of a carbon tax in line with Bill Gates and Mark Carney and the like, I think he’s pushing a bad idea that is part of a plan for centralization of control in globalist hands.

When he gets on the stage of the World Government Summit and argues for universal basic income, again in line with any number of globalist operatives, I think he is promoting an idea that will be used for centralization of economic control in fewer hands.

When he talks about the … Neuralink brain chip … [he’s] exactly in line with what [World Economic Forum founder] Klaus Schwab has been arguing … I think that is a bad idea that is going to be used for control of the masses by a technocratic elite.”

As for Musk’s acquisition of Twitter and subsequent release of the Twitter Files, Corbett doesn’t think it’s a great surprise to find that the military industrial intelligence complex has been using it to monitor and manipulate people. He believes Musk’s job may well be to make the platform trustworthy again so that government agencies can continue using it for surveillance and control.

There’s other evidence pointing in this direction as well. Musk has said he wants Twitter to become the WeChat app of America. And what is WeChat? It’s a Chinese government-controlled app that monitors every aspect citizens’ lives, including their financial transactions, social transactions, communications, whereabouts and more.

It’s basically the foundation for the communist social credit system. So, while Musk claims to be a defender of free speech, he’s also talking about turning Twitter into THE central hub for the technocratic surveillance and control network.

Stop Looking for a Savior

As noted by Corbett, what we need to do is “take responsibility for our own lives rather than looking for saviors like Elon Musk to swoop in and save the day.” We can’t lay that burden on any given individual or group of individuals. We must all do our part.

“I think the conversation can get stuck on stupid because even though I tend to believe that Musk is some form of collaborator with the deep state that he pretends to oppose, I don’t have proof of that and I do not know that for a fact, in the same way that his defenders do not know for a fact that he is not part of that controlled opposition,” Corbett says.

“We can spend all our time and energy talking about this person and what we think their part is in all of this, or we could spend that time productively engaged in research, actually verifying, triangulating information, discerning what is true and what is not true.

When we take information down to that level, then it does not matter who is the person out there conveying that information to us. The important part is the information.”

It’s also important to understand that “divide and conquer” is the primary way the control network maintains control, and all that’s needed to divide a previously unified front is insinuation and the seeding of doubt. In the short-term, the globalist takeover seems to have an unstoppable momentum behind it, but seemingly inevitable moves toward tyranny have been derailed at the last minute in the past and we must not give up hope or stop resisting. As explained by Corbett:

“The term cognitive infiltration goes back to Cass Sunstein, the person who became Obama’s information czar … He co-wrote a paper about cognitive infiltration in which he openly stated:

‘The government maybe should send people into conspiracy spaces, conspiracy groups, with cognitive infiltrators who will go in there and conceal their identity as being affiliated with the government, but will try to insert facts that will break the narrative of the conspiracy theorists.’

And what was the result of that paper? Rather than anyone having been exposed as being that cognitive infiltrator on the payroll of the U.S. government, what it effectively did was give people ammunition to speculate endlessly.

‘This person is a cognitive infiltrator, that person is a cognitive infiltrator,’ to the point where, ultimately, I think Sunstein wins without even necessarily having to implement that system at all, because … the group fractures once the idea of pointing fingers at everyone becomes the norm …

That is, in fact, precisely how the FBI’s COINTELPRO program worked back in the 1950s and ’60s … One of the tactics they used was to put people into meetings in various spaces, the Black Panthers and others, in order to start spreading rumors and calling other people government agents.

The government agents were generally the ones that we’re calling other people government agents in order to disrupt the groups, so I think we have to keep that in mind and keep our eye on the real prize here, which is discerning fact from fiction, truth from falsity, productive ways forward from unproductive ways forward.”

ChatGPT and the Future of Propaganda



I’ve often marveled at the effectiveness of modern propaganda. Part of what makes it so effective is the availability of technology, from social media and search engines to large language model artificial intelligence. OpenAI’s ChatGPT has taken the world by storm and companies across a range of industries are already talking about replacing large numbers of white collar workers with AI.

This, even though there are serious problems with this technology. For example, we’re finding chatbots have a tendency to lie and fantasize. Researchers are calling these instances “hallucinations.” Basically, the AI is concocting a fantasy based on the information available and reciting it as fact. And that’s in addition to the bias that can be built in by programmers. So, while it’s an incredibly exciting technology, we cannot be naïve about its risks.

One obvious risk is that state-endorsed propaganda can become the only information available to people, as this technology starts monopolizing online searches and virtual assistants.

There won’t be a multitude of answers anymore. There will only be one, and he who controls the AI will have the power to control the beliefs of the entire world. Of course, yet another risk is that no one will be able to control it and the AI will control itself. I don’t know which might be worse. Corbett comments:

“You introduced this topic with the concept of propaganda and potential uses of large language models for propagandistic purposes. We should go back to the man who wrote the book on propaganda called ‘Propaganda,’ Edward Bernays, who [said]:

‘The conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government, which is the true ruling power of our country.’

That was Edward Bernays in 1928. His words are as true today as they were then, perhaps even more so. And the true ruling power of the country, of the world at this point perhaps, are those who can most effectively, consciously and intelligently manipulate the organized habits and opinions of the masses.

And I don’t think enough people have really stopped to cogitate on the fact that these large language models already starting to produce material that really cannot be distinguished from human-written material …

You don’t have to be a crystal ball prognosticator to see how this will extend out in the foreseeable future … [to] the point where you can have entire conversations, entire fields of interest and study that will be completely populated by artificial-created conversation …

A large language model that is able to accurately and without much prompting be able to populate botnets to flood social media and other places will essentially be able to dominate that conversation, [and] will consciously and intelligently manipulate the habits and opinions of the masses. At that point, you are talking about the ultimate weapon.

The ultimate weapon is narrative, because with a convincing-enough narrative, you can get entire populations motivated to war or to anything else that you seek to get them to do, like say lock down the entire productive global economy on the back of a scare that was absolutely not warranted.

So, I think once we start getting these completely synthetically-generated narratives, that will start creating these entire events that are not happening in the real world. [These events] will be deep-faked through video and audio and everything else, to convince you of an entire reality that doesn’t exist.

We are really moving into some truly world historical changing times and I don’t know if enough people are really cognizant of … how this technology could be used for good or for ill …

I think there is a real threat, and it is probably underappreciated by a large section of the public that are not keeping abreast of the daily torrent of information on this subject … Some of the testing notes for ChatGPT-4 that were released showed there was a team that was tasking the chatbot with a certain task that would require it to do things that it was not programmed to do, or even authorized to do, including solving a CAPTCHA …

[The chatbot] actually went on Fiverr or one of those types of platforms and recruited a human being to do it for it, to the point where the human said, ‘Why are you recruiting me to do a CAPTCHA? How do I know you’re not a bot? Ha-ha-ha.’ To which it responded, ‘I’m blind, I’m visually impaired, I can’t do it myself.’ Ultimately, it ended up getting that CAPTCHA solved.

It does not take a great degree of imagination to see where that can go. I don’t know what kind of safeguards you can program into a technology like that, other than to completely keep it firewalled off from the internet and from any other computer system that it may be able to commandeer.”

Solutions Watch

On his website, Corbett has a section called The Solutions Watch, where he proposes action steps that you can take to address a given problem, both big and small. For example, on the smaller scale, he’s discussed the importance of filtering your water, and testing your water to ensure it’s being filtered properly.

“One thing that I think is sort of the foundation upon which we will have to build any thoroughgoing answer to the problems we’re facing is creating conscious community with others,” Corbett says.

“Of course, that can take the form of online and virtual community. I’m not going to pooh-pooh or disdain that. I think it is important to know like-minded people online. But increasingly, how can we trust what we are reading, seeing or interacting with online?

I think the real point is to try to build real community with real people in the real world. That could take the form of intentional communities that are created from the ground up as a physical location that people will relocate to … but I think it is extremely difficult to do that.

But at the very least, people can and should be finding like-minded people within their geographical proximity that they can meet up with, who will be there in emergencies, hopefully. But also that they can start forming small groups, that they can start teaching each other about various things that they may know and bringing solutions to the table.

I think that can be the core basis upon which we start erecting other things, because one thing that I’ve looked at over the years are some of these big, huge issues that seem utterly overwhelming and completely impenetrable to the average person, like the fundamental fraud that underlies the economy itself is the monetary system, which for people who haven’t looked into it, the money supply itself is very much controlled, and the creation of money is a tool that is used for enslavement.

It could be used for human flourishing, but is not in our current economy. How do we possibly combat a problem as thoroughgoing as that? [Many people] I encounter online have ideas about the perfect alternative currency … but [they] haven’t convinced anyone to use it. To me, that speaks to the fundamental problem.”

Build Community and Get Out of Metropolitan Areas

At the top of Corbett’s solutions list is building parallel communities. That’s really a foundational strategy because without it, many other solutions can’t work. To that, I would add the recommendation to move out of crime-ridden urban and metropolitan areas and into areas where this kind of community-building is more likely to succeed. As noted by Corbett:

“Until you have a community of people who are going to be working together on projects like an alternative or supplemental currency system, how are you going to launch something like that in a thoroughgoing manner?

I think the core of the solutions that we’re looking for lies with community, meeting like-minded people … I’m not into this Pollyanna thinking that it’s all going to be easy. It’s an incredibly, incredibly difficult task to start creating an alternate currency, an alternate power grid and the alternate society that we need to protect ourselves, to buffer ourselves from this encroaching biosecurity, technocratic enslavement grid.

That’s a pretty tall order, and I can’t offer any assurances that it’s going to turn out all right. But I do know that if we just lay down and continue on the course that we’re on, we are hurtling towards a brick wall of extinction, essentially. I really see this as a fundamental existential question that we are facing not just on the artificial intelligence front, but also on the genomic manipulation front, on the manipulation of the food supply.

If you are what you eat, then what does it mean that they’re going to start feeding us insects and other such unpalatable items?

It is absolutely a war that is taking place on every front, all at once, and we’re not going to get through this by ourselves. Unless you are the type of person that can go out in the woods and live by yourself for decades … I don’t think you’re going to escape this all by yourself, so I think creating community is sort of the core of all solutions.”

More Information

Corbett’s reports, Solution Watch and documentaries can all be found on his website, CorbettReport.com. He also does a weekly news update series with James Evan Pilato of mediamonarchy.com, in which they examine three news stories that are either trending or have slipped beneath the radar. “We try to draw attention to them and put them in the right context,” Corbett says.

 

Connect with James Corbett

Connect with Dr. Joseph Mercola

Cover image credit: geralt




Government and Rule: The Bane of Humanity

Government and Rule: The Bane of Humanity

by Gary D. Barnett
May 12, 2023

 

“To be GOVERNED is to be watched, inspected, spied upon, directed, law-driven, numbered, regulated, enrolled, indoctrinated, preached at, controlled, checked, estimated, valued, censured, commanded, by creatures who have neither the right nor the wisdom nor the virtue to do so. To be GOVERNED is to be at every operation, at every transaction noted, registered, counted, taxed, stamped, measured, numbered, assessed, licensed, authorized, admonished, prevented, forbidden, reformed, corrected, punished. It is, under pretext of public utility, and in the name of the general interest, to be placed under contribution, drilled, fleeced, exploited, monopolized, extorted from, squeezed, hoaxed, robbed; then, at the slightest resistance, the first word of complaint, to be repressed, fined, vilified, harassed, hunted down, abused, clubbed, disarmed, bound, choked, imprisoned, judged, condemned, shot, deported, sacrificed, sold, betrayed; and to crown all, mocked, ridiculed, derided, outraged, dishonored. That is government; that is its justice; that is its morality.”

Pierre-Joseph Proudhon, General Idea of the Revolution in the Nineteenth Century

 

Properly summing up government and rule of any kind, is to accept that all government, all State force, and all authority of one over another, is an atrocious abomination against humanity. Government is the scourge of mankind, it can only exist due to force, and if any government or any rule is administered by any politician or ruler, or any of their ilk, freedom has already vanished. As Orson Scott Card so clearly explained what he had learned: “My father always said that government is like watching another man piss in your boot. Someone feels better but it certainly isn’t you.” This image is accurate, but if the free man sticks his boot up the arse of the government, he will not only feel better, he will be free.

The bottom line as I see it, is that there is no such thing as good government, benevolent government, necessary government, or protective government; there is only evil government. This is easy to understand when one simply discovers what governments cause, what they do, what they steal, who they murder, and how they hold power over all. Considering America, without government and rule, there would have been few if any wars, no government taxation, (theft) no confiscation of much of the land in this country by rule of ‘law’ and force, few if any monopolies, no mass regulation of any kind, no government prisons filled with those incarcerated for victimless crimes, no drug laws, no gun laws, and no murderous federal or state police and military. There would be no politicians, no elections, no voting for masters, no congress, no president, (king) no massive bureaucracies, no government indoctrination systems, (‘public’ schools) no republicans, no democrats, and therefore a great reduction of lies.

Without a government, the false flag inside job of September 11, 2001, would never have happened. There would never have been any Patriot Act, no war of terror by the United States, no torture program, and probably no recessions or depressions, unless they were isolated, natural, localized, and very short-lived. The housing and economic crisis beginning in 2008 would not have occurred. Stock and bond manipulation would be nearly impossible, and mass spending, currency expansion, and monetary inflation would be unheard of in an environment devoid of government.

There would be no national emergencies declared by government, so the fake ‘covid’ pandemic would never have taken place. There would never have been business closings ordered, no mask mandates, no forced home imprisonment, no curfews, no lockdowns, no ‘social distancing,’ no testing, and absolutely no required deadly poisonous bio-weapon injections purposely and unjustly called ‘vaccines.’.

There would never have been any travel restrictions, no bailouts, no mass welfare scams called ‘stimulus checks, no hyper-inflation, no poisoning of food sources, no destruction of farms and ranches, no slaughter of animals, no toxic chemical poison spraying of the atmosphere, no geo-engineering of weather and unnatural disasters, and no Trump or Biden.

There would be no debt ceiling, because there would likely be no federal or state debt. There would be no national deficit, and no unfunded liabilities. There would be little if any division among the people because most all division is caused and stoked by government. There would be no immigration problem, no fences at the borders, no ‘war on drugs,’ no drug cartels supported fully by the U.S. government and the CIA and other ‘intelligence’ services. There would be no antagonistic foreign policy, and therefore, no real risk of nuclear war with China or Russia, and no food and energy shortages caused by state thugs.

No one has any legitimate right to give authority, or assign any power of one over another, by calling it government. The very idea that one can vote to allow by proxy, the rule of the many by the few; those chosen liars and cheats called politicians, is in and of itself absurd. How can any illegitimately selected political class, the most immoral group of criminals on earth, legislate morality to others? All that government consists of, are those dregs of society seeking rule, who are given power to do things that no normal citizen has a right to do. Any who are allowed to make ‘laws’ controlling others, are automatically assuming a position above their own heinous ‘laws.’ They are only able to do this by using the resources they steal from all, to buy violent enforcers called police and military, to punish, harm, or murder, any who question or refuse their false ‘authority.’

As I have said in the past: “All those who continue to support the notion that government is necessary, all those who continue to advocate government as the only answer to societal cohesion, all those who demand that others accept government for the benefit of all, and all those dependent on rule who expect government to be their master and protector, are in essence the destroyers of liberty, and therefore they are advocates for mass slavery. There is no legitimate reasoning for such asinine behavior.”

Government can only exist when people accept that they are slaves, and allow a master to rule over them. Without this voluntary acceptance of rule, no government could ever stand. No individual or group of individuals, has any right whatsoever to rule another, and this has only been possible due to the insane mindset that is collectivism of the masses. This so-called ‘philosophy’ that is ‘collectivism,’ sets the stage for where we are today; living as slaves in a society of fools, dependent on a master’s permission to live and breathe. No freedom will ever be present, so long as any government (State) exists. This is a reality that cannot be questioned.

 

“Free election of masters does not abolish the masters or the slaves.”

~ Herbert Marcuse

 

Copyright © 2023 GaryDBarnett.com

Connect with Gary D. Barnett

Cover image credit: GDJ




REAL ID in the US: 15 Years On and Still Not in Full Effect 

REAL ID in the US: 15 Years On and Still Not in Full Effect 

 

“But even as of December 2022, only 17 percent of IDs in Kentucky were REAL ID compliant. The fact that the department has extended the deadline for another two years indicates a high level of non-compliance. The federal government does not want the political fallout it would face by effectively banning millions of people from domestic air travel…

The federal government’s struggle to implement REAL ID for what will be at least 17 years reveals a dirty little secret – the feds can’t do much of anything when states refuse to cooperate. This was the blueprint James Madison gave in Federalist #46 to resist “unwarrantable” or even unpopular federal acts. He said that a “refusal to cooperate with officers of the union” would create impediments and obstructions that would stymie federal actions…”

 

REAL ID: 15 Years On and Still Not in Full Effect 

by Mike Maharrey, Tenth Amendment Center
May 11, 2023

 

On this date in 2008, the REAL ID Act was supposed to go into effect.

It didn’t.

And it still isn’t in full effect to this day.

Last December, the Department of Homeland Security (DHS) extended the enforcement deadline yet again for two more years, announcing it would not begin enforcing REAL ID requirements until May 2025.

In fact, the DHS has delayed the full implementation of REAL ID multiple times since Congress passed the act in 2005 with an original implementation date of May 11, 2008. Even with the federal government badgering states and using the threat of turning them into virtual no-fly zones to compel the adoption of REAL ID, the feds have found it incredibly difficult to coerce states into compliance.

The bottom line is due to intense opposition and foot-dragging by the states, REAL ID won’t be in full effect until at least 17 years after the initial implementation date – and that’s assuming the DHS doesn’t extend the deadline again.

This proves that “the Father of the Constitution” was right. Nullification works.

James Madison told us that a “refusal to cooperate with officers of the Union” would create “very serious impediments” for federal enforcement – in just a single state. If a number of states did the same, he said it “would present obstructions which the federal government would hardly be willing to encounter.”

This is exactly what has happened with REAL ID.

Background

President George W. Bush signed the REAL ID Act into law in 2005, essentially mandating a national ID system and putting the onus of implementation on each state.

But things didn’t go smoothly from the beginning, and by any conceivable measure, the implementation of REAL ID has been an abject failure because of widespread state resistance and refusal to cooperate with the scheme.

Most states simply ignored the law, and many rebelled outright for several reasons, including privacy concerns, along with the fact that Congress didn’t provide any funding for the mandates it expects states to implement. A large number of states simply chose not to act. New Hampshire, Missouri, Maine, Oklahoma and others took things a step further, passing laws expressly prohibiting compliance with the national ID standards.

Instead of forcing the issue, the feds issued waiver after waiver.

The DHS started extending deadlines almost immediately. On January 29, 2008, the agency issued REAL ID regulations that created a gradual implementation schedule. States would have until the mandated implementation date of May 11, 2008, to become “materially” compliant with the act but could ask for an extension valid until the end of 2009. It also set a date of May 10, 2011,  for full compliance.

In December 2009, the DHS extended the date for “material compliance” because “a large majority of states and territories—46 of 56—have informed DHS that they will not be able to meet the Dec. 31 REAL ID material compliance deadline.” At the time, it left the full compliance date in place.

That date came and went. In December 2012, the DHS announced that only 13 states had met the law’s requirements and that beginning the following month, all the other states would get a deferment.

“Beginning January 15, 2013, those states not found to meet the standards will receive a temporary deferment that will allow Federal agencies to continue to accept their licenses and identification cards for boarding commercial aircraft and other official purposes.”

On and on it went, with new extensions and deferments year after year.

Ten years after its passage, more than half the states in the Union still had not complied with REAL ID. Of the 28 not in compliance, 21 had “extension waivers” until October 2016.

“There is an impasse,” Edward Hasbrouck a privacy advocate with the Identity Project told the New York Times in December 2015. “There has been a standoff for more than a decade now. The feds have limited powers to coerce the states in this case.”

In 2016, the feds ratcheted up their bullying tactics, specifically threatening to stop accepting noncompliant licenses at TSA security checkpoints. This would effectively ground travelers from states that refuse to comply with the unconstitutional national ID scheme. On Oct. 13, 2016, the Department of Homeland Security (DHS) sent letters to five states denying their request for time extensions to bring their driver’s licenses in compliance with REAL ID. At the time, the DHS set a 2018 deadline but still allowed for individual state extensions.

Instead of standing their ground, politicians began to cave. Idaho reversed its ban on Real ID implementation in 2016. Oklahoma followed suit the next year. At least six other states reversed course during this time period. Missouri lifted its ban on Real ID in 2018.

With states clamoring to get compliant, the enforcement deadline was ultimately extended to October 2020 and then again to October 2021.

After almost yearly implementation delays since 2008, it appeared DHS was seriously going to start enforcing the act in 2021. But in yet another about-face in April of that year, the Department extended the October 2021 deadline to May 2023. At the time, DHS said only 43 percent of American driver’s licenses were REAL ID compliant. That percentage has likely increased in the last two years, but the DHS did not provide any compliance data in its latest extension notice.

But even as of December 2022, only 17 percent of IDs in Kentucky were REAL ID compliant. The fact that the department has extended the deadline for another two years indicates a high level of non-compliance. The federal government does not want the political fallout it would face by effectively banning millions of people from domestic air travel.

And now the deadline stands May 2025.

We’ll see how that works out.

The federal government’s struggle to implement REAL ID for what will be at least 17 years reveals a dirty little secret – the feds can’t do much of anything when states refuse to cooperate. This was the blueprint James Madison gave in Federalist #46 to resist “unwarrantable” or even unpopular federal acts. He said that a “refusal to cooperate with officers of the union” would create impediments and obstructions that would stymie federal actions.

This has certainly proved true when it comes to REAL ID.

But we also see another less pleasant reality in this saga. We can’t trust politicians to hold the line. State legislators and governors held the feds at bay for over a decade. It wasn’t until they started to cave that REAL ID gained any momentum toward implementation. And even then, the federal government has still faced a rocky road.

Ultimately, it takes public action to stop government overreach. We can’t just turn our heads and hope elected officials will do their job. That only happens when we keep the pressure on.

 

Connect with Tenth Amendment Center

Cover image credit: geralt




They’re Coming to Take You Away

They’re Coming to Take You Away

 

…When the monolithic narrative that is all they have been taught lies in ruins, they will replace it not with a rational, informed alternative – for they will know of none – but with whatever satisfies the rage of a population that realizes, too late, that it has been hoodwinked.

Woe to the freedom-haters when the lion they think they have tamed turns its fury on the liberal society that soothsayers like Zelikow and Lipstadt still imagine they are defending!”

 

by Michael Lesher, Brownstone Institute
May 9, 2023

 

Suppose I tell you in advance that the essay you are reading is meant to startle you. And suppose I suggest, by way of demonstration, that two people as loosely connected as the leader of the “COVID Crisis Group” and Joe Biden’s “Special Envoy To Monitor and Combat Antisemitism” – both of whom have recently offered recommendations for improving political life in the United States – are in fact determined to unravel American freedoms.

Would you be surprised?

Well, if so, that is exactly the startling fact I am trying to bring to your attention. True, you may not have heard that the 34 COVID-19 “experts” headed by one Philip Zelikow (last seen justifying the concealment of information about the 9/11 attacks) and anti-Semitism “ambassador” Deborah Lipstadt – perhaps best known for slandering scads of Jewish survivors of the Nazis as “soft-core” Holocaust deniers because they objected to the massacre of 1,462 of Gaza’s civilians nine years ago – are both out to dismantle the Bill of Rights. But if you haven’t, it isn’t because they’ve been coy about their objectives.

Take the Zelikow panel. Its new book on “the lessons learned from COVID-19” openly conflates the federal government’s management of a respiratory virus with “wartime” – thus rationalizing the executive branch’s preemption of democratic government. Not only that, Zelikow and his band of “experts” explicitly call for the consolidation of power in the hands of an unelected “health security enterprise” that would control, among other things, a “systematic biomedical surveillance network.” And in case you can’t guess who is likely to benefit from the snooping, the panel goes on to praise the coercive experimental drug program that gave us the COVID-19 “vaccines” – “a bargain at $30 billion,” according to the editors of the Washington Post – signaling at one stroke the experts’ contempt for the Nuremberg Code and their subservience to Big Pharma.

As for Lipstadt, she has launched her attack on the First Amendment by redefining “anti-Semitism” so as to include an extraordinary range of political speech. Her first step in that transformation is the familiar trick of confusing criticism of the Israeli government with anti-Jewish bigotry. But her second step is newer and, arguably, even more disturbing: she tars all denigration of Jews with the hot-button label “conspiracy theory.”

Let’s be clear: however noble the pretext of opposing Jew-hatred, it should be obvious that once you characterize anti-Semitism as a “conspiracy theory” you have made a case for censorship. As Lipstadt herself explained to Jane Eisner of Columbia University’s Graduate School of Journalism (in an interview printed in the latest AARP Magazine but not available online): “[I]t’s a conspiracy theory that Jews control the media, the banks, the election process, etc. If you believe that there is a group controlling these things, then essentially you’re saying that you don’t believe in democracy.

And there’s the trouble. After all, an overt attack on democracy isn’t a viewpoint; it isn’t even an expression of run-of-the-mill bigotry. It’s a threat to the state. And it follows, if you accept Lipstadt’s formulation, that anyone the government can label an “anti-Semite” may now be punished in the same way the Biden administration is already punishing people who protested the presidential election results of November 2020. Note, too, the selective parameters of the offense: blaming Donald Trump’s election on the Russians is presumably “legitimate” speech; but accusing a “group” of controlling “the election process” can land you in jail – that is, when the “group” is not an official enemy but a favored minority, and when that “process” has reached results endorsed by those in power.

So the Zelikow panel and Ambassador Lipstadt can’t be accused of hiding their illiberal goals. Like the Democratic lynch mob that denounced Matt Taibbi and Michael Shellenberger on the floor of Congress last March for revealing the extent of government censorship of Twitter, these propagandists quite openly assert that surveillance is good for us, while free speech is entirely too dangerous to be entrusted to mere citizens.

“Ordinary folks and national security agencies responsible for our security,” Congressman Colin Allred lectured Taibbi, “are trying their best to find a way to make sure that our online discourse doesn’t get people hurt, or see our democracy undermined.” It’s pretty breathtaking to watch an African-American liberal solemnly declare that the CIA and the FBI are the true guardians of democracy – not to mention his defense of the security state’s behind-the-scenes censorship of political speech. But what’s even more ominous is that not a single prominent Democratic politician nor a single pundit in mainstream liberal media has repudiated anything the congressman said.

Is it any wonder, then, that no one in mainstream media has mentioned the totalitarian tendencies implicit in the COVID Crisis Group’s recommendations for “pandemic” regulation via dismantling democracy, or in Ambassador Lipstadt’s appeals to the public to “discredit” anti-Semitism by recasting it as a criminal conspiracy?

Of course it isn’t. And that is my point. That is my motive in writing in tandem about these two apparently disparate subjects, connected only by the facts that both of them involve recent public declarations and that both of them represent attacks on fundamental liberties.

Because the truth is that condemning freedom is now so entirely respectable that it’s happening practically everywhere – under every possible pretext, almost any day, from just about any left-liberal institution that claims to care about the public good. Close your eyes, and you can hardly tell whether what you’re hearing is coming from a Democratic Party stalwart or from an old-line Soviet apologist explaining why Andrei Sakharov or Aleksandr Solzhenitsyn or Yuri Orlov is really, notwithstanding the accuracy of what he’s been saying, a threat to the state who deserves to be muzzled or jailed.

And the media’s silence about it all is as ominous as the Orwellian nattering of the freedom-haters themselves.

Take another look at the Zelikow panel’s assessment of the US government’s performance during the “COVID crisis.” Writing about what the “experts” praise or blame in their report, the Washington Post never once mentions the crippling of the US working-class economy due to arbitrary confinements and business shutdowns, the educational damage done to a whole generation of children through needless school closures, the reckless suspension of representative democracy in four-fifths of our states, the medically unjustifiable trauma caused by “mask mandates,” or the undermining of the national healthcare system through an obsessive focus on one respiratory virus while more serious issues were sidelined for over a year. As far as the Post is concerned, the real outrages of the COVID coup never happened at all.

Even when the experts and the editors do manage to notice something sinister, they go out of their way to miss the point. The Zelikow panel specifically notes the “four pandemic planning exercises” staged by the US government barely a year before the announcement of the COVID-19 outbreak. And it offers a few technical criticisms of the proceedings.

But neither the panel nor the Post editors’ congratulatory summary of its conclusions addresses the fact that the exercises – which omitted any suggestion for using repurposed drugs as early treatment for a novel virus, as in all previous influenza-like outbreaks – made a point of discussing the importance of thought-policing social media. That prescription for censorship became a grim reality after March 2020. But you’d never know it from reading the Zelikow panel’s assessment of the government’s mistakes in addressing the “pandemic.”

And Lipstadt? She claims to be a passionate defender of free speech. But that didn’t stop her from smearing Senator Ron Johnson as a “white nationalist sympathizer” because of his politically incorrect comments about Black Lives Matter. And when that issue made it to the op-ed page of the New York Times, it was only to further demonize Johnson; Lipstadt’s slander got a pass.

Why do I worry so much about this? Well, first of all because an attack on freedom is an attack on all of us.

But I think there is a special reason for alarm. It’s not just that our ruling elites believe that we, the people, need to be stripped of our right to free expression. I’m afraid that the freedom-haters clustered around our figurehead President are not even aware just how thin the ice is onto which they’re propelling us. Their position (taking the most charitable possible view of it) runs something like this: if the public isn’t exposed to views of which the censors disapprove, hoi polloi will meekly accept whatever policies are imposed on them (for their own good, of course).

But the censors are wrong. The fabric of American political life has been strained to such tautness that a single acute crisis might rupture it altogether. And if that happens, people who have been deprived of reasonable dissent will not shrink from violent opposition; on the contrary, they will embrace it. When the monolithic narrative that is all they have been taught lies in ruins, they will replace it not with a rational, informed alternative – for they will know of none – but with whatever satisfies the rage of a population that realizes, too late, that it has been hoodwinked.

Woe to the freedom-haters when the lion they think they have tamed turns its fury on the liberal society that soothsayers like Zelikow and Lipstadt still imagine they are defending!

 

Michael Lesher is an author, poet and lawyer whose legal work is mostly dedicated to issues connected with domestic abuse and child sexual abuse. A memoir of his discovery of Orthodox Judaism as an adult – Turning Back: The Personal Journey of a “Born-Again” Jew – was published in September 2020 by Lincoln Square Books. He has also published op-ed pieces in such varied venues as Forward, ZNet, the New York Post and Off-Guardian.

 

Connect with Brownstone Institute

Cover image credit: InspiredImages




Florida Passes Bill to Ban use of a CBDC as Money in the State: Bill Now Goes to Governor to Sign

Florida Passes Bill to Ban use of a CBDC as Money in the State: Bill Now Goes to Governor to Sign

by Mike Maharrey, Tenth Amendment Center
May 2, 2023

 

TALLAHASSEE, Fla. (May 2, 2023) – Today, the Florida House overwhelmingly gave final approval to a bill that would ban the use of a central bank digital currency (CBDC) as money in the state.

Senate Bill 7054 (S7054) was approved for introduction in the Banking and Insurance Committee on April 11. The bill would explicitly exclude a CBDC from the definition of money in Florida, effectively banning its use as such in the state.

The bill defines central bank digital currency as a “digital medium of exchange, or digital monetary unit of account issued by the United States Federal Reserve System, a federal agency, a foreign government, a foreign central bank, or a foreign reserve system that is made directly available to a consumer by such entities” and that is “processed or validated directly by such entities.”

Under the Florida Uniform Commercial Code (UCC), “money” means a medium of exchange that is currently authorized or adopted by a domestic or foreign government. The term includes a monetary unit of account established by an intergovernmental organization or by agreement between two or more countries.”

S7054 would add “the term does not include a central bank digital currency” to that definition.

The UCC is a set of uniformly adopted state laws governing commercial transactions in the U.S. According to the Uniform Law Commission, “Because the UCC has been universally adopted, businesses can enter into contracts with confidence that the terms will be enforced in the same way by the courts of every American jurisdiction. The resulting certainty of business relationships allows businesses to grow and the American economy to thrive. For this reason, the UCC has been called ‘the backbone of American commerce.’”

If Florida enacts S7054, the UCC will no longer be uniform.

Today, the House passed S7054 by a vote of 116-1. The bill previously passed the Senate by a 34-5 vote. The legislation now goes to Gov. Ron DeSantis’s desk for his consideration. He is expected to quickly sign the bill into law.

The legislation is a companion to House Bill 7049 (H7049), sponsored by Rep. Wyman Duggan, who introduced the bill after Gov. DeSantis called for a ban on CBDC as money in the state.

“Today’s announcement will protect Florida consumers and businesses from the reckless adoption of a ‘centralized digital dollar’ which will stifle innovation and promote government-sanctioned surveillance. Florida will not side with economic central planners; we will not adopt policies that threaten personal economic freedom and security,” DeSantis said in an official statement.

Central Bank Digital Currencies (CBDC)

Digital currencies exist as virtual banknotes or coins held in a digital wallet on your computer or smartphone. The difference between a central bank (government) digital currency and peer-to-peer electronic cash such as bitcoin is that the value of the digital currency is backed and controlled by the government, just like traditional fiat currency.

Government-issued digital currencies are sold on the promise of providing a safe, convenient, and more secure alternative to physical cash. We’re also told it will help stop dangerous criminals who like the intractability of cash. But there is a darker side – the promise of control.

At the root of the move toward government digital currency is “the war on cash.” The elimination of cash creates the potential for the government to track and even control consumer spending.

Imagine if there was no cash. It would be impossible to hide even the smallest transaction from the government’s eyes. Something as simple as your morning trip to Starbucks wouldn’t be a secret from government officials. As Bloomberg put it in an article published when China launched a digital yuan pilot program in 2020, digital currency “offers China’s authorities a degree of control never possible with physical money.”

The government could even “turn off” an individual’s ability to make purchases. Bloomberg described just how much control a digital currency could give Chinese officials.

The PBOC has also indicated that it could put limits on the sizes of some transactions, or even require an appointment to make large ones. Some observers wonder whether payments could be linked to the emerging social-credit system, wherein citizens with exemplary behavior are ‘whitelisted’ for privileges, while those with criminal and other infractions find themselves left out. ‘China’s goal is not to make payments more convenient but to replace cash, so it can keep closer tabs on people than it already does,’ argues Aaron Brown, a crypto investor who writes for Bloomberg Opinion.”

Economist Thorsten Polleit outlined the potential for Big Brother-like government control with the advent of a digital euro in an article published by the Mises Wire. As he put it, “the path to becoming a surveillance state regime will accelerate considerably” if and when a digital currency is issued.

In 2022, the Federal Reserve released a “discussion paper” examining the pros and cons of a potential US central bank digital dollar. According to the central bank’s website, there has been no decision on implementing a digital currency, but this pilot program reveals the idea is further along than most people realized.

What’s Next

Gov. DeSantis will have 15 days from the date S7054 is sent to his desk to sign or veto the bill.

 

Connect with Tenth Amendment Center

Cover image credit: geralt




The Global Pandemic Treaty Is a Threat to Us All

The Global Pandemic Treaty Is a Threat to Us All

by James Corbett, The Corbett Report
April 28, 2023

 

Today, James delivers a statement for the National Citizens Inquiry in Canada on the WHO, the global pandemic treaty, the amendments to the International Health Regulations, and the formation of the coming technocratic biosecurity control grid.

 Watch on Archive / BitChute / Odysee / Rokfin / Substack / Download the mp4

Transcript

Hello. I’m James Corbett of The Corbett Report.

For those who don’t know, I’m a Canadian who’s been living and working in Japan for 19 years and founded The Corbett Report in 2007 as a source for news and information about politics, economics, science, philosophy and society, and in that regard I’ve been covering the corruption of the World Health Organization and warning about the dawning biosecurity state for over 15 years now.

So I would like to thank the inquiry for giving me the time to address the extremely important topic of the pending global pandemic treaty, but I know my time is limited today so I’d like to get straight into detailing the relevant background and context for understanding this story.

Firstly, the World Health Organization was established in 1948 to promote “the attainment by all peoples of the highest possible level of health.” It proposes to achieve this by acting as “the directing and co-ordinating authority on international health work.”

Accordingly, the WHO’s governing body, the World Health Assembly, adopted the International Sanitary Regulations in 1951 to consolidate the multiple, overlapping international agreements then governing quarantine procedures and other international health controls into a single convention.

In 1969, this was superseded by the International Health Regulations, which, as amended in 1973 and 1981, covered six diseases but focused on three: cholera, yellow fever and plague.

Worries about the “emergence, re-emergence and international spread of disease and other threats” concurrent with the surge in international travel in the 1990s gave rise to calls for a substantial revision of the treaty, and, in the wake of the 2003 SARS event and the 2004 avian influenza A epidemic (if you remember that one), a renewed sense of urgency led to the 2005 revision of the IHR.

This revision included the creation of a new category of declaration by the World Health Organization: the Public Health Emergency of International Concern, which is appropriately enough abbreviated as PHEIC.

A PHEIC declaration grants the WHO the power to obtain and share information about any declared health crisis anywhere within the IHR territories with or without the consent of the individual governments involved. And, according to Stephen Morrison—the director of the Global Health Policy Center at the Center for Strategic and International Studies—this potentially allows for “boots-on-the-ground” intervention by the US military or other NATO member countries to operate in these environments in terms of ground transport, supply chain, and distribution of commodities.

The PHEIC was declared for the first time in 2009 during the so-called Swine Flu pandemic, which, as was later shown, was based on severely overestimated case numbers. In fact, the swine flu “pandemic” did not meet the WHO website’s own definition of “an enormous number of deaths and cases of the disease” and, when that was pointed out by a CNN reporter on May 4, 2009, that language was promptly removed.

At the time, Richard Schabas—the former chief medical officer for Canada’s Ontario Province—was quoted as saying: “Sometimes some of us think that WHO stands for World Hysteria Organization.”

Indeed, in 2010, a British Medical Journal investigation and an investigation by the Council of Europe both concluded that the key scientists who advised then-WHO Director Margaret Chan to declare the PHEIC for the swine flu scare “had done paid work for pharmaceutical firms that stood to gain from the guidance they were preparing” and excoriated the WHO for its complete lack of transparency about the process.

PHEICs were subsequently declared for the 2014 polio declaration, the 2013 outbreak of Ebola in Western Africa, the 2015 Zika virus “epidemic,” the 2018–2020 Kivu Ebola epidemic, and, of course, in 2020 for the so-called novel coronavirus pandemic and in 2022 for the monkeypox “pandemic”(?).

Each of these cases similarly resulted in massive paydays for pharmaceutical manufacturers and other beneficiaries of the growing biosecurity complex and massive increases in power for “health authorities” in each country and for the WHO in particular. In fact, we are told that the current WHO Director even ignored the decision of his “expert advisory council” to unilaterally declare last year’s Monkeypox outbreak as a Public Health Emergency of International Concern.

Incredibly, the WHO is not satisfied with the remarkable power that it already enjoys. It is currently engaged in a deliberately confusing process to simultaneously do two things:

  • Firstly, to once again amend the International Health Regulations to give the WHO even more powers of surveillance and control during any arbitrarily declared health crisis.
  • And secondly, to create a global pandemic treaty that would supersede the sovereignty of individual nation-states and cede even more authority to the WHO to monitor and control public health agencies in the name of preventing the next pandemic.

The process for these two separate negotiations are happening simultaneously, and although there is the fig leaf of public input in these processes, in reality only accredited organizations are given time to voice their opinion about the need for such a treaty and even then the WHO is under no obligation to even consider such input.

Instead, actual negotiations are taking place behind closed doors in off-camera sessions, and draft documents and meeting minutes are only occasionally dribbled out for public consumption.

Worse, as the WHO has already demonstrated, their procedure for adoption of these proposed amendments is at best a formality, and, at worst, pure theatrics.

That a completely unelected, unaccountable body that wields so much power over international affairs is meeting behind closed doors to decide the future of humanity under the pretense of the next declared emergency should be worrying enough. But the few details that have leaked out about these negotiations are even more frightening.

These include:

While these ideas may seem benign or even noble to those who do not know the history of the WHO or the erection of the biosecurity grid, to those of us who have lived through three years of unprecedented medical tyranny—from forced quarantines and lockdowns to the attempt to illegally mandate experimental medical interventions—stopping the WHO’s unprecedented power grab must be our greatest priority.

The World Health Organization currently consists of 194 member states, including Canada. In order to become a member of the WHO, a state must ratify the WHO Constitution, which grants the WHO’s governing body, the World Health Assembly (WHA), the power to “adopt conventions or agreements with respect to any matter within the competence of the Organization,” which, when ratified, obliges each member state to adopt those conventions or to notify the WHO’s Director-General of rejection or reservations to that adoption within 18 months.

As a WHO member state, Canada is obligated to abide by World Health Assembly decisions or to provide specific reasons for partial or incomplete compliance with WHA rules and agreements. Accordingly, the Public Health Agency of Canada provides regular “self-assessment reports” regarding its own International Health Regulations compliance.

At an absolute minimum, Canadians must exert whatever power they have in whatever way they are able to reassert Canada’s sovereignty over its public health by registering its reservations about the IHR and the pandemic treaty. That would of course not be a solution to the problem posed by the WHO, but it would be a start. A more thoroughgoing solution would be the withdrawal of Canada from the WHO altogether.

But, as someone who is not just deeply cynical about the ability of the public to influence such affairs, but actually believes the political process itself—with its inherent abrogation of individual sovereignty and thus, by extension, bodily autonomy—to be invalid and immoral, I would suggest that a more radical approach might be appropriate. That is, active and coordinated widescale civil disobedience of medical decrees and mandates, whether federal or provincial, that are not in the interest of individual health, including, if possible, the foundation of private medical organizations with doctors and others of like mind who are willing to disregard the dictates of the WHO, Public Health Canada, and any other self-declared health authority to provide health care regardless of vaccination status or any other unreasonable dictate.

I know that such a movement will not take place without a sea change in public perception, and such a change would have to be predicated on a sea change in public awareness and understanding. That is why I participate in inquiries like this and do the work that I do to help raise awareness of these issues.

I hope you can appreciate that there is much, much more to be said about this problem and its solution than can possibly be done justice in a short presentation like this. If you’re interested in hearing more about this topic, I suggest you follow the hyperlinked transcript of this statement that is available at corbettreport.com/pandemictreaty, as well as check The Corbett Report archives for my previous work on the WHO and the biosecurity state and follow my monthly conversations with Dr. Meryl Nass on Children’s Health Defense as we document the progress of the IHR amendments and the pandemic treaty toward their proposed ratification at the 77th World Health Assembly in May of next year.

But in closing, let me just say this: The WHO was established in 1948 to coordinate international efforts to promote public health. But what is health?

That may seem like a trivial question, but as we’ve seen over the last few years, the answer to that question can effect every aspect of our lives, from what medical interventions we are obligated to take to whether or not we are permitted to leave our house.

We cannot afford to let government appointees and unelected technocrats at the WHO answer this incredibly important question for us. It is up to us to answer that question for ourselves and to decide what health precautions we are willing to take and under what circumstances we are willing to take them.

Any treaty, health regulation or other document that would seek to undermine our bodily autonomy is null and void and should be treated as if it never existed.

Thank you for your time.

 

Connect with James Corbett




Disinformation and the State: The Aptly Named RESTRICT Act

Disinformation and the State: The Aptly Named RESTRICT Act

by ,
April 21, 2023

 

The RESTRICT Act (Restricting the Emergence of Security Threats that Risk Information and Communications Technology Act) has recently been making the rounds in the media, and rightfully so. The act is truly terrifying, but more than the open tyranny that it would further, the act illustrates a very clear problem from the perspective of the state.

In previous eras, either formally or informally, the state exercised a great deal of control over the information available to the wider population. This is no longer the case in the present day. With the advent of the internet and the resulting decentralization of media and other channels of information, the state has had increasingly fewer options at its disposal to control information. It is very obviously afraid of losing its position as the controller of information, and the RESTRICT Act is a desperate attempt to reassert itself as such.

What’s in the Act?

At this point, most people who have been paying attention should recoil upon seeing a large acronym under the consideration of Congress. After the USA PATRIOT Act, normal people recognized that these bills of massive overreach were, to put it lightly, misnamed. But in a move of honesty, the RESTRICT Act does exactly what it says it will do should it be enacted and enforced. The Senate’s website is remarkably up-front, saying:

Vendors from the U.S. and allied countries have supplied the world’s information communications and technology (ICT) for decades. In recent years, the global ICT supply chain has changed dramatically; a number of prominent foreign vendors—many subject to the control of autocratic and illiberal governments—have gained significant market share in a variety of internet infrastructure, online communications, and networked software markets. . . . The RESTRICT Act comprehensively addresses the ongoing threat posed by technology from foreign adversaries by better empowering the Department of Commerce to review, prevent, and mitigate ICT transactions that pose undue risk, protecting the US supply chain now and into the future.

Thankfully, the state is going to defend us from information and communications technology from “autocratic and illiberal governments,” as if our own states, which locked us in our own homes, were democratic and liberal. What specifically is being targeted in the broad category of information and communications technology?

As the act has been publicly marketed, this is a move against the popular social media platform TikTok. The US government’s reasoning is simple: TikTok, and similar platforms, are owned by foreign states, and these foreign states can distribute or facilitate information that is contrary to the narratives pushed by our state.

This is an existential threat to the US government. Seeing as the goal of a state is to maintain control, as articulated by Marray Rothbard in his book Anatomy of the State, having rival states present alternative narratives to the population harms your legitimacy. This legitimacy is necessary for the state to exist. As Rothbard says of people supporting the state:

This support, it must be noted, need not be active enthusiasm; it may well be passive resignation as if to an inevitable law of nature. But support in the sense of acceptance of some sort it must be; else the minority of state rulers would eventually be outweighed by the active resistance of the majority of the public.

The state, therefore, must maintain its legitimacy to survive, and the US government is attempting just that by trying to retake control over the country’s media. As mentioned earlier, the internet rendered most of the state’s old methods of control obsolete, which is why for the last few years the US government has been on the defensive, using covert means to influence channels of information (as can be seen with the Twitter Files).

The fact that the state has had to openly announce its direct censorship and control signals the state’s weakness. If it were stronger and bolder, as it was in most of the last century, it would have just acted already and passed the action off as a mundane matter of governance. If it were on surer footing, it would have just continued its policy of covert influence. The state is threatened. It’s afraid!

In the media and wider US society, a false debate has arisen. One side is in support, and the other side rejects the RESTRICT Act as terrifyingly evil because it is consolidating power in parts of the executive branch. According to the act, the executive branch will now have the authority to

address any risk arising from any covered transaction arising from any covered transaction by any person, or with respect to any property, subject to the jurisdiction of the United States that the Secretary determines . . . poses an undue or unacceptable risk to the national security of the United States.

The popular opposition is claiming that this is tyrannical because the secretary of commerce is appointed only by the president and reports only to the president, making the secretary unelected and subject to no congressional oversight. This objection is approaching the truth, but it’s not quite there. This act is not bad because the person who gets to determine what is an “undue or unacceptable risk” is unaccountable and undemocratic.

The act is far worse because the state should not be deciding what is an “undue or unacceptable risk.” Should this go through, the United States will have its own censor under whom no ray of light, from wherever it may come, shall in future go unnoticed and unrecognized by the state or be divested of its possible useful effect, and it will be called the secretary of commerce.

Implications of the Act

As with everything pushed by the state, what will actually happen goes far beyond the written intentions. Just as the act nominally passed to defend our freedoms from terrorism is used to spy on millions of normal Americans, this act will control and censor far more than TikTok (which is obviously not the only foreign-owned media in this country). And this is written into the act itself, which provides, “The Secretary may undertake any other action as necessary to carry out the responsibilities under this Act that is not otherwise prohibited by law.”

Worse than just the focus on “foreign adversaries,” how long until this is applied to any media deemed adversarial? How long until this act, after being passed, is amended to crack down on “domestic adversaries” like conspiracy theorists and spreaders of “disinformation,” all of which, of course, will be determined by the state? We have every reason to believe the state will grab this power, being as these categories, deemed so by the state, threaten its legitimacy. As Rothbard wrote, “A ‘conspiracy theory’ can unsettle the system by causing the public to doubt the state’s ideological propaganda.”

Even though the advances of tyranny are now commonplace, and the continual infringement of our liberties is the norm, this blatant aggression in the form of the RESTRICT Act should not go unnoticed. Moreover, this fight should not happen on the state’s terms. The rhetoric surrounding the act focuses on TikTok and “foreign adversaries,” two subjects that are unpopular and, frankly, difficult to defend. However, defending them, or focusing on them at all, is missing the point. The state was not content with merely spying on you, restricting your commerce and production, drafting you, and forcing your children into state schools and subjecting them to who knows what.

No, the state also needs to control your information, for if the information is free, and people can research and discuss freely, the state’s legitimacy, and therefore its very existence, is threatened. As it has shown us by so openly and disgustingly lashing out, anyone who engages in the spreading of ideas outside the purview of the state, especially of ideas that correctly dismantle the legitimacy of the state, is contributing to the state’s peril. As the US government has just proven by its ugly reaction, the spreading of ideas is how we are to proceed ever more boldly against this evil.

 

Ryan Turnipseed is an undergraduate in economics and entrepreneurship at Oklahoma State University.

 

Connect with Mises Institute

Cover image credit: TheDigitalArtist




“Moderna Teams Up With IBM to Put A.I., Quantum Computing to Work on mRNA Technology Used in Vaccines”

“Moderna Teams Up With IBM to Put A.I., Quantum Computing to Work on mRNA Technology Used in Vaccines”
Human Product Launch 2.0 is in the works, and it sure is tempting to take a negative view on all new technology when the first product launch in humans fails to a large degree. Isn’t it?

by Sage Hana, Sage’s Newsletter
April 19, 2023

 


Moderna teams up with IBM to put A.I., quantum computing to work on mRNA technology used in vaccines

Key Points

  • Moderna and IBM are teaming up to use generative artificial intelligence and quantum computing to advance mRNA technology, the development at the core of the company’s Covid vaccine.
  • The companies said they signed an agreement that would allow Moderna to access IBM’s quantum computing systems and generative AI model.
  • The agreement comes as Moderna navigates its post-pandemic boom driven by its mRNA Covid vaccine.

Moderna and IBM are teaming up to use generative artificial intelligence and quantum computing to advance mRNA technology, the development at the core of the company’s blockbuster Covid vaccine, the companies announced Thursday.

“We are excited to partner with IBM to develop novel AI models to advance mRNA science, prepare ourselves for the era of quantum computing, and ready our business for these game-changing technologies,” Moderna CEO Stephane Bancel said in a statement.

Moderna shares dipped slightly Thursday, while IBM’s stock was about flat.

The companies said they signed an agreement for Moderna to access IBM’s quantum computing systems. Those systems could help accelerate Moderna’s discovery and creation of new messenger RNA vaccines and therapies, according to Dr. Dario Gil, director of IBM research.

IBM will also provide experts who can help Moderna scientists explore the use of quantum technologies, the companies added. Unlike traditional computers, which store information as either zeroes or ones, quantum computing hinges on quantum physics. That allows those systems to solve problems too complex for today’s computers.

Under the deal, Moderna’s scientists will also have access to IBM’s generative AI model known as MoLFormer. Generative AI describes algorithms that can be used to create new content based on the data they have been trained on.

The companies said Moderna will use IBM’s model to understand “the characteristics of potential mRNA medicines” and design a new class of vaccines and therapies.

The agreement comes as Moderna navigates its post-pandemic boom driven by its mRNA Covid vaccine.

The Cambridge, Massachusetts-based company became a household name for its messenger RNA technology, which teaches human cells to produce a protein that initiates an immune response against a certain disease.

Moderna is trying to harness that technology to target other diseases as the world emerges from the pandemic and demand for blockbuster Covid vaccines and treatments slows.

The company is already working to develop a vaccine targeting respiratory syncytial virus and a shot that can target different types of cancer when combined with Merck’s immunotherapy Keytruda.

The new agreement also comes as IBM ramps up its investment in AI with new partnerships. Earlier this year, the Armonk, New York-based company announced a deal with NASA to help build AI foundation models to advance climate science.

Those efforts fall in line with a recent boom in AI, largely driven by the release of OpenAI’s ChatGPT. The AI-powered chatbot answers questions in clear, concise prose, and immediately caused a sensation after its launch.

ChatGPT kicked off an AI arms race and prompted questions about the full extent of artificial intelligence’s capabilities and risks.


Because this means that the Monster needs Good and Naive people to trust, and in order for this to happen they select photogenic and talented communicators that you inherently LIKE and trust and trot them out as a middle manager layer of sorts.

This middle manager layer of people might be called Heroes in the Comic Book storybook play that has been foisted upon us.

The concept of Hero Ball is that you will find it excruciating to accept that Heroes are still performing tasks at the behest of the Monster. With lots of plausible deniability baked into the Evil Layer Cake.

 

Connect with Sage Hanna

Cover image credit: TheDigitalArtist




Battling the Hydra of Gender Ideology

Battling the Hydra of Gender Ideology

by Jennifer Bilek, The 11th Hour
originally published April 9, 2023

 

Many people have complicated feelings about being human in sexed human bodies. These feelings do not collapse the reality of the sex binary. There are only males and females.

As a species, we are part of, and in relationship with, a complex biological system that is a continuous process of death and regeneration via sexual reproduction. We don’t live in isolated bubbles in space where we can individually opt out of this reality but inside an entire biological community. Our sex is our tether to this natural world. This is true even if we are not having sex. It is true even if some individuals don’t or can’t reproduce. It is true even if some people’s sex characteristics are not biologically ordered as usual for our species. We are still, as a species, sexually dimorphic mammals and are rooted in the material world by this fact. We must hold fast to this root when battling the hydra of gender ideology.

Gender ideology was corporately constructed to break this bond, to introduce us to new ways of reproducing our species. The ideology was seeded everywhere before it was dropped on our societies, promoting a human rights movement. It is deeply entrenched in all our institutions, corporations, media, and the market. More problematic is its solidification in our minds. Even those attempting to resist this anti-human agenda want to hold fast to the concept of beings outside our species’ boundaries.

We are moving out of the digital age and into new realms of technology and biotechnology. Experts in these fields have been reimagining our species’ boundaries toward a complete fusion with AI. This is not something that has been hidden from us. More and more articles, videos, conferences, courses, laws, & politics are focused on this vision, one of transhumanism. Still, this is not generally discussed regarding gender ideology, one crucial area where we are being groomed to accept this fusion and a fundamental impossibility.

When we discuss gender ideology and the myriad ways it plays out in our lives and societies, most of us attempt to argue within the premise of a human rights frame, which has been established for us and is constantly repeated. We must divorce ourselves from this premise because it is wrong. The fundamental premise is not rights but reality vs. anti-reality. I could say virtual reality instead of anti-reality, but “virtual reality” does nothing to reveal the rupture of our social cohesion and sense of ourselves this vision is causing humanity. It does not even hint at the chaos being sowed in society.

Gender ideology is homophobic and misogynistic because it is anti-human. It seeks to take us beyond our human borders, creating a bridge to a technological vision of our species’ formation and existence that goes beyond the boundary of our sex. It does so with deep, fervent, and tyrannical religiosity, as some people are rapidly becoming aware of. The frame of human rights obscures all this and has us boxing ghosts because we argue our case within this framework: Women’s “rights” vs. “tran$” rights; children have a “right” to be free from medical attacks on their sex, but adults have a “right” to choose what they want; everyone has the “right” to express themselves. The deconstruction of sex is not a human right. It is deeply anti-human.

Adapting our societies to this rupture of reality in the material world means solidifying the virtual reality being constructed for us and overlaid on the real world. This is what the gender industry does. This is its objective, above and beyond anything else it does, beyond the fallout from its mission. This is where our arguments must be framed and reframed.

Reality versus anti-reality.

Society is organized around our species’ sex binary because it abides by the order of the physical world where we live. When some adults choose to obscure the sex binary via medical-tech adjustments and demand the rest of the world validate this anti-reality performance, calling for legal rights to maintain this lie, we must return to boundaries. The integrity of our sex binds us to the rest of the natural world. It keeps us whole and tethered to the earth. Without it, we would be lost in space. We are being groomed away from biological reality in favor of virtual reality. This process has been well underway for some time. With the advent of the internet and cell phones, and more recently, lockdown, the process has been accelerated. The kids growing up on tech and being the most removed from the real world are the most susceptible to the prolific indoctrination on their platforms.

If this sounds like tin-foil-hat territory, ask yourself what “men can be women if they say they are” sounds like and why you see so many politicians terrified to say that women are adult human females when the inquiry is made. This terror matters. The financial, political, and institutional pressure to conform to this virtual reality where we can choose our sex is intense.

Gender ideology demands that we order our societies to conform to a lie, and governments worldwide are ceding this ground. What could be more important to address and resist when this lie attempts to sever us from reality?

This is also not the only boundary being deconstructed for profit and human engineering. The boundary between public and private is also being eroded simultaneously. We are being thrust, as adults, into a realm of publicly paraded and corporately sanctioned fetishism promoted as healthy. Children are being inundated with lies about the reality of sex and forced sexual intrusions in the name of their health and sexual education. Teaching children that there is nothing wrong with nakedness is a far cry from dismantling the private sphere and compelling them into private adult human experiences. We can’t opt out of this if we want to participate in society because it is now everywhere. It is traumatizing and is grooming us into further violations of our boundaries. We have no way to evaluate and assess our world and relationships when everything is in public, there is no private realm, and we are forced to adapt. It is like living in a mass sexual psychodrama, a panopticon from which there is no escape.

Discussions of biological boundaries are the way forward in confronting the hydra of gender ideology and the lies it is attempting to solidify in society and our minds. We must hone our message. We can’t get lost in the quagmire of “rights” discussion. This is not an issue of rights for the marginalized versus others’ rights. This is an issue of reality versus anti-reality. We don’t rearrange societies, laws, language & reality to accommodate other people’s subjective identities. Feeling like a cat – whatever that would mean to someone who isn’t a cat – doesn’t dictate that litter boxes are installed in public toilets. We arrange laws & society based on material reality because it respects the integrity of life & people’s boundaries based on real life.

 

Connect with Jennifer Bilek

Cover image credit: Vizetelly




James Corbett: Your Guide to 5th-Generation Warfare

James Corbett: Your Guide to 5th-Generation Warfare

 


“A war that is taking place everywhere on the globe, even as I speak, and that involves virtually everyone on the planet, young and old, male and female, military and civilian. It is the war of every government against its own population and every international institution against free humanity.”

~~~

“Neurological Warfare…

“These include (in Giordano’s well-rehearsed patter) the ‘drugs, bugs, toxins and devices’ that can either enhance or disrupt the cognitive functions of their target, like the ‘high CNS aggregation’ nanoparticulates that, according to Giordano, ‘clump in the brain or in the vasculature‘ and ‘create essentially what looks like a hemorrhagic diathesis.'”

~~~

“It is a war for full-spectrum dominance of every battlefield and every terrain, from the farthest reaches of the globe (and beyond) to the inner spaces of your body and even to your innermost thoughts. And it is a war on you.”

~~~

“We must stop playing their game. We must stop fighting their war. We must stop ceding our power, our authority, our time, our attention, our energy and our resources to engaging the enemy in their terms in their battlefield.

“We must create our own parallel society on our own terms.

“And so we rediscover an old piece of wisdom. To paraphrase: ‘Fifth-generation warfare is a strange game. The only winning move is not to play.’

“War is over . . . if we want it.”


 

by James Corbett, The Corbett Report
April 18, 2023

 

We are in the middle of a world-changing war. This is no ordinary war, however. Most of the victims of this warfare aren’t even able to identify it as war, nor do they understand that they are combatants in it. It’s called fifth-generation warfare, and I’m here to tell you all about it.

Watch on Archive / BitChute / Odysee / Substack / Download the mp4

Transcript & Sources

We are in the middle of a world-changing war right now.

Oh, I don’t mean the war in Ukraine, the one that all the media are asking you to focus your attention on. Yes, that conflict continues to escalate, and every day there are new stories about provocations and threats that could lead to a nuclear exchange . . . but that’s not the war I’m referring to.

No, the war I’m talking about is an even broader war. A war that is taking place everywhere on the globe, even as I speak, and that involves virtually everyone on the planet, young and old, male and female, military and civilian. It is the war of every government against its own population and every international institution against free humanity.

This is no ordinary war, however. Most of the victims of this warfare aren’t even able to identify it as war, nor do they understand that they are combatants in it.

It’s called fifth-generation warfare, and I’m here to tell you all about it.

I am James Corbett of The Corbett Report and this is Your Guide to Fifth-Generation Warfare

What Is Fifth-Generation Warfare?

What is fifth-generation warfare, anyway? And, come to think of it, what were the first four generations of warfare?

Good questions. For an in-depth answer to the latter question, you’ll want to read “The Changing Face of War: Into the Fourth Generation“—a 1989 article from the Marine Corps Gazette co-authored by William S. Lind—and you’ll want to watch “William S. Lind & Philip Giraldi – Fourth Generation Warfare & The Deep State.”

WILLIAM S. LIND: This city and every capital in the world is completely oblivious to the fact that it is caught up in a change in warfare so great that it not only makes our current defense and foreign policies obsolete, it essentially makes obsolete the whole framework within which we think about defense and foreign policy.

[. . .]

The change is what I call the rise of fourth generation war and this is specifically the fourth generation of modern war. [. . .] We now think of foreign affairs and defense within the framework of the nation-state. Armed forces are designed to fight other state armed forces. But that reality is changing.

[. . .]

What’s happening around the world today in more and more places is that state armed forces find them find themselves fighting not other state armed forces, but fourth-generation forces. Non-state forces.

SOURCE: The State and Modern War

In a nutshell, Lind et al.’s thesis is that the “modern age” of warfare began with the Treaty of Westphalia in 1648, which, Lind opines, “gave the state a monopoly on war.” From that point on, modern warfare went through three generations, namely:

  • First-generation warfare: the tactics of line and column, developed in the era of the smoothbore musket;
  • Second-generation warfare: the tactics of indirect fire and mass movement, developed in the era of the rifled musket, breechloaders, barbed wire and the machine gun; and
  • Third-generation warfare: the tactics of nonlinear movement, including maneuver and infiltration, developed in response to the increase in battlefield firepower in WWI.

This, according to Lind and his co-authors, brought us to the late-20th century, when the nation-state began to lose its monopoly on war and military combat returned to a decentralized form. In this era—the era of fourth-generation warfare—the line between “civilian” and “military” become blurred, armies tend to engage in counter-insurgency operations rather than military battles, and enemies are often motivated by ideology and religion, making psychological operations more important than ever.

But, some argue, we have now entered a new era of warfare, namely fifth-generation warfare.

There is still much debate about what defines fifth-generation warfare, how we know we’re engaged in it, or even if it exists at all (Lind, for one, rejects the concept). Various scholars have made their own attempts at defining fifth-generation warfare (5GW), like Dr. Waseem Ahmad Qureshi, who identifies it as “the battle of perceptions and information,” or Qiao Liang and Wang Xiangsui of the People’s Liberation Army, who write of the era of “Unrestricted Warfare” in which “a relative reduction in military violence” has led to “an increase in political, economic, and technological violence.”

If academic debates about the changing nature of warfare are your thing, then there’s plenty of reading for you to do on the subject, from The Handbook of 5GW: A Fifth Generation of War? to a slew of academic articles.

But for the purposes of this editorial, I’m not interested in that debate. In fact, we’re going to use a decidedly non-academic definition of fifth-generation warfare from an Al Jazeera article as our starting point: “The basic idea behind this term [5GW] is that in the modern era, wars are not fought by armies or guerrillas, but in the minds of common citizens.”

There are two important things to note about this definition. The first is that fifth-generation warfare is not waged against either standing armies of nation-states or guerrilla insurgents but against everyday citizens. The second is that this war is not being fought in a battlefield somewhere, but in the mind.

I will expand the definition somewhat to include the fact that this war is being waged at all levels, not just the mental. The gist of it is this: Fifth-generation warfare is an all-out war that is being waged against all of us by our governments and the international organizations to which they belong. It is being waged against each and every one of us right now, and it is a battle for full-spectrum dominance over every single aspect of your life: your movements and interactions, your transactions, even your innermost thoughts and feelings and desires. Governments the world over are working with corporations to leverage technology to control you down to the genomic level, and they will not stop until each and every person who resists them is subdued or eliminated.

The most incredible part of all of this is that so few know that the war is even taking place, let alone that they are a combatant in it.

The best way to understand this war is to look at some of the ways that it is being waged against us.

Part 2: Information Warfare

Stop me if you’ve heard this before, but this is an infowar and the powers-that-shouldn’t-be are engaged in “a war for your mind.”

Of course, you have heard of “Infowars” if you’ve been in the alternative media space for any length of time. And for good reason: information warfare is an absolutely essential part of the war on everyone that defines fifth-generation warfare.

The most obvious way to understand this is to look at the actual military forces that are engaging in psychological operations against their own citizens.

DAN DICKS: It says here:

“A letter from the Nova Scotia government sent out to residents to warn about a pack of wolves on the loose in the province was forged by Canadian military personnel as part of a propaganda training mission that went off the rails.

“The letter told residents to be wary of wolves that had been reintroduced into the area by the provincial and federal governments and warned the animals were now roaming the Annapolis Valley. The letter, which later became public, sparked concern and questions among residents but was later branded as ‘fake’ by the Nova Scotia government which didn’t know the military was behind the deception.

“The training also involved using a loudspeaker to generate wolf sounds, the Canadian Forces confirmed to this newspaper.”

Guys, let let that sink in for a second. They created a fake letter from the government, put it out there saying that there’s dangerous wolves, and they set up loud speakers in the area projecting out wolf noises!

This isn’t just research, you know. This isn’t just a training exercise. They’re actively engaging in this psychological operation to scare people using loudspeakers.

This is unbelievable

SOURCE: Canadian Military Fake Wolves Fear Campaign Exposed! but You Won’T Believe What They Are Doing Next!

But it’s not just out-and-out military operations by soldiers dressed up in camo fatigues that are part of this fifth-generation infowar. In the war on everyone, the establishment uses every means at its disposal to manipulate the public’s perception.

Thus, Richard Stengel—the former editor of Time who bestowed Time‘s person of the year (dis)honour on You! back in 2006—is happy to chair a Council on Foreign Relations conversation in which he defends the US government’s use of propaganda against its own citizens.

RICHARD STENGEL: Basically, every country creates their own narrative story. And, you know, my old job at the state department was what people used to joke as the chief propagandist job.

We haven’t talked about propaganda. I’m not against propaganda. Every country does it and they have to do it to their own population and I don’t necessarily think it’s that awful.

SOURCE: Political Disruptions: Combating Disinformation and Fake News

Or take Hill & Knowlton—the PR firm hired by the Kuwaiti government to create the Nayirah deception in the First Gulf War . . .

“NAYIRAH”: They took the babies out of incubators  . . . They took the incubators and left the children to die on the cold floor.

SOURCE: Human Rights Violations in Kuwait

. . . who were retained by the WHO in 2020 to identify celebrity “influencers” who could be used to amplify the scamdemic messaging.

ANNOUNCER: The One World Together At Home event showcased a who’s who of top music stars and celebrities, who came together over the weekend for a special broadcast of music, comedy and personal messages, all in gratitude to those around the world on the front lines of the coronavirus pandemic.

MATTHEW MCCONAUGHEY: So what can we do? We’ve got to take care of our healthworkers and we’ve got to buy them time by taking care of ourselves.

ANNOUNCER: The event was led by the World Health Organization and the non-profit group, Global Citizen.

SOURCE: Celebrities Perform Virtual ‘One World’ Concert: ‘A Love Letter to the World’

Or take the UK government’s Scientific Pandemic Influenza Group on Behaviours, which outright admits that they use psychological techniques to manipulate the public into fearing the scamdemic, a move that some of the panel members called “totalitarian” . . . and no one bats an eyelid.

Perhaps the most insidious part of the fifth-generation infowar is that it has become so normalized that everyone knows it is happening, but no one thinks of it as warfare. Of course everything is “advertising” and “propaganda.” And of course it’s being used to manipulate our behaviour. That’s just how the world works, isn’t it?

But we ignore the real nature of the infowar at our own peril. After all, I have often observed that this is a war for your mind and that the most contested battlespace in the world is the space between your ears. You might have thought I meant that metaphorically, but actually I mean it quite literally. Which brings us to . . .

Neurological Warfare

If you listen to Dr. James Giordano speak without listening to what he’s saying, you get the impression he is merely an articulate, well-informed scientist who is passionate about his research. When you do listen to what he’s saying, however—or even just look at his PowerPoint slides, like the “NeuroS/T for NSID” slide—you realize that he is Dr. Strangelove. Or, if not Dr. Strangelove himself, then at least Dr. Strangelove’s spokesman.

But it’s not nuclear armageddon that motivates Giordano, it’s what he calls “weapons of mass disruption”—the various technologies for neurological intervention that the US military and militaries around the world are developing.

These include (in Giordano’s well-rehearsed patter) the “drugs, bugs, toxins and devices” that can either enhance or disrupt the cognitive functions of their target, like the “high CNS aggregation” nanoparticulates that, according to Giordano, “clump in the brain or in the vasculature” and “create essentially what looks like a hemorrhagic diathesis.” As sci-fi as this sounds, he insists these nanoparticulates (and many, many other horrific neurological weapons) are already being worked on:

JAMES GIORDANO: The idea here is that I can get with something called high CNS aggregation material that is essentially invisible to the naked eye and even to most scanners because it is so small that it selectively goes through most levels of filter porosity. These are then inhaled—either through the nasal mucosa or absorbed through the oral mucosa. They have high CNS affinity. They clump in the brain or in the vasculature and they create essentially what looks like a hemorrhagic diathesis; in other words, a hemorrhage predisposition or a clot predisposition in the brain. What I’ve done is I’ve created a stroking agent and it’s very, very difficult to gain attribution to do that.

I can use that on a variety of levels, from the individual to the group. Highly disruptive. And, in fact, this is one of the things that has been entertained and examined to some extent by my colleagues in NATO and to those who are working on the worst use of neurobiological sciences to create populational disruption. Very, very worried about the potential for these nano particular ages to be CNS aggregating agents to cause neural disruption.

SOURCE: Brain Science from Bench to Battlefield: The Realities – and Risks – of Neuroweapons | CGSR Seminar

And just in case you didn’t get the point, you’ll notice he illustrates his slide with an image of a human brain in the crosshairs of one of these neurological weapons. There’s nothing hard to understand about the picture that is being painted here: we are at war with an enemy who is literally targeting our brains.

And just in case you didn’t get the point, you’ll notice he illustrates his slide with an image of a human brain in the crosshairs of one of these neurological weapons. There’s nothing hard to understand about the picture that is being painted here: we are at war with an enemy who is literally targeting our brains.

But yet again, it isn’t just the literal use of neurological weapons by conventional militaries in conventional warfare settings that we—the largely unwitting combatants of the fifth-generation war on everyone—have to worry about. As my listeners already know, avowed technocrat Elon Musk is trying to sell his Neuralink brain chip technology to the hipster crowd as a cool and sexy way to upgrade your cognition . . . or so that the coming AI godhead will have mercy on us. Or something like that. Anyway, you should totally stick the Neuralink in your head at your earliest opportunity! And definitely don’t ask any questions about why so many of the macaque monkeys and other test animals that Neuralink was using as test animals in their “brain-machine interface” experiment have dropped dead.

To anyone not yet a victim of the information warfare operation designed to prepare humanity for the coming transhuman dystopia, all of this sounds insane. But for those who have fallen for the infowars psyop of the enemy, these types of mind-altering technologies are exactly as advertised: exciting opportunities to “upgrade” the feeble biological wetware we call our brain.

But if you think you can avoid the biological aspect of the fifth-generation war by simply avoiding the brain chip, you’re out of luck. You’re also going to have to deal with . . .

Biological Warfare

The biowarfare narrative is, understandably, back at the forefront of the public consciousness in recent years, not just because of the scamdemic but also because of the questions being raised about the US-backed Ukrainian biolabs and whatever work they may or may not be doing on Russia’s doorstep.

This picture, for example, comes straight from Army.mil, which was only too happy to brag as recently as last July that US soldiers were conducting “hands-on training and field training exercises with Ukrainian troops in laboratory and field environments” that included ensuring the readiness of “deployable mobile laboratories.” Nothing to see here, folks. (Perhaps the only surprising thing about the article is that they haven’t scrubbed it from their website . . . yet.)

Yet, once again, if we are only thinking of biowarfare in conventional military terms, we neglect the much, much wider operation to manipulate, control and weaponize all aspects of our environment, our food supply and even our genome itself for the purposes of the ruling oligarchs. This fifth-generation biological warfare being waged against us includes:

  • The mRNA and DNA and genetically-modified adenovirus vector “vaccines” that have been “normalized” over the past two years and which, as the miraculously “lucky” companies that bet it all on this technology like to brag, is re-programming the “software of life.”
  • The genetically-modified organisms—both gmo crops and gmo animals—that are now being unleashed upon the world in an uncontrolled experiment that puts our health and the very future of the biosphere in jeopardy.
  • The push toward synthetic, lab-based “food” that is being funded by the usual eugenicist billionaires and which threatens to sever humanity from the natural abundance of the earth, make us dependent on an increasingly shrinking number of companies for our food supply, and, ultimately, to drive us toward a Soylent Green-style future.

I’m sure you can fill in the blanks with myriad other examples of the attacks upon the world’s air, water and biome that constitute this unconstrained fifth-generation biological war being waged against us.

When and if you do put the pieces of this puzzle together and seek to warn people en masse that they are under attack, your ability to resist this agenda will be predicated on your ability to use your accumulated resources (your wealth) to foster communities of resistance. Don’t worry, though; the enemy has that domain covered, too. . . .

Economic Warfare

Given the events of recent weeks, even the sleepiest of the sleepy now realize that we are in a period of economic warfare.

This war, too, has its conventional aspects. On the 2D board, we’ve seen the NATO empire launch its Weapons of Financial Destruction at Russia in recent weeks, and, exactly as predicted, it has resulted in the consolidation of a convenient geopolitical bogeyman bloc and a gigantic loss of faith in the international monetary system itself. And, also as predicted, it has supplied the “Problem” and “Reaction” needed for the technocrats to present their pre-determined “Solution” of Central Bank Digital Currencies (CBDCs). Just ask Larry Fink, CEO of BlackRock:

The war will prompt countries to re-evaluate their currency dependencies. Even before the war, several governments were looking to play a more active role in digital currencies and define the regulatory frameworks under which they operate.”

This is not merely a battle between nation-states or even competing power blocs. This is a battle being waged by every authoritarian power structure and every government (but I repeat myself) against their own citizens for control of the most important resource of all: their wallets.

Yes, we are seeing the beginning of a truly world-historic moment: the collapse of Pax Americana, the death of the dollar reserve system, and the beginning of an entirely new monetary paradigm, the “Central Bank Digital Currency” system of programmable money that will be able to algorithmically control when, how and if you are allowed to transact in the economy at all. We only have to look to recent events in Canada to understand what this will look like.

This perfect control of humanity down to the level of being able to witness and, ultimately, to allow or disallow any transaction between any individuals at any time, represents the apotheosis of technocracy and one of the key objectives of the fifth-generation war itself. As this nightmare comes closer and closer to reality, all seems hopeless.

But then again, that’s exactly the point. . . .

The Real War

I could go on. And on and on and on. But hopefully you get the point by now: There is a world war happening right now. It is a fifth-generation war (or whatever you want to call it). It is being waged across every domain simultaneously. It is a war for full-spectrum dominance of every battlefield and every terrain, from the farthest reaches of the globe (and beyond) to the inner spaces of your body and even to your innermost thoughts. And it is a war on you.

Recognizing this, the task we face seems nearly insurmountable. How are we to fight back in a war that the majority of people don’t even recognize is taking place? How do we fight back against an enemy that has spent decades refining its weapons of economic and military and technological and biological control? How do we fight back in a war that is not taking place on two fronts or even three fronts, but in every domain and battlespace simultaneously?

Framed like this, our prospects do indeed appear hopeless. But therein lies the key: our perception that it is our duty to “fight back” against the enemy in their war on their battlefield on their terms of engagement is itself a narrative frame. And that narrative itself is a weapon that is being wielded against us in the battle for our minds.

You’ll allow me space here to quote myself at length because this is a point I have made many times before, perhaps most notably in my conversation on “The Anatomy of the New World Order” that I had with Julian Charles on The Mind Renewed podcast ten years ago:

I’m intrigued by the idea that we’ve been given false templates to follow in terms of solving our problems—one being to “fight our enemies”—templates provided for us through so much social conditioning and the media. Here, the idea is that we must find the heart or the head of the organization and somehow kill that person or that group, or whatever it is; eliminate that, and everything will magically turn to the better!

Thinking in broad terms, that false template appears in virtually every science fiction dystopia you’ve ever seen: if it turns out well in the end, it’s only because they have managed to decapitate the Head of the Beast, whether it be The Lord of the Rings or Tron, or any such movie. I think that’s fundamentally and completely the wrong way to look at it, because at the end of the day the particular individuals who may or may not be holding the ‘Ring of Power’ are replaceable. Indeed, there are very many people who would be chomping at the bit to get into that position of power should that old guard be swept away for whatever reason.

I think what’s needed is a more fundamental revolution: not of overthrowing a specific instantiation of this idea, but of overthrowing the idea altogether. And that can only come, I think, from building up an alternative system to which people actually want to apply themselves. I think we have to detach ourselves from this system that we’ve been woven into. Unfortunately that’s probably as difficult to do as that analogy would make it sound, because we are so woven into the fabric of society that it’s difficult to imagine extricating ourselves from all these processes.

We rely for so many of our daily needs on this vast, unwieldy corporate system that ties into these very organizations that pull the strings of governmental institutions, that it can seem quite overwhelming. How can a single individual affect this? But I think we have to look for any and every possible point at which we can start to detach ourselves from those systems of control, and to start to reassert some kind of independence. That can be an extremely small thing like, just for example: instead of buying groceries at the grocery store, perhaps buy them at a farmers’ market, or at least some of your groceries. Or perhaps you could grow them yourself in a vegetable garden. Something of that sort is a tiny thing on the individual level, but I think it’s the only thing in the long run that can lead to the type of society we want to bring to fruition. Again, I think it’s small things like that, if we start to apply ourselves with diligence and perseverance, that will eventually be able to overthrow this. But, unfortunately, as I say, we are on the cusp of this scientific revolution which makes scientific dictatorship possible, so unfortunately we don’t necessarily have generations of time. That gives a time perspective to all this—I won’t say it’s a time bomb—but you get the idea. We don’t have a lot of time to waste.

We have a choice. Either we continue going into this technological, corporate matrix—which involves even things like buying the next generation of iPhone, which they’re already saying is going to have its own fingerprint scanning technology, and all of these corporate, military, Big Brother elements to it that we’re willingly signing up to every day of our lives, and actually paying money for—or we start to create alternative structures which don’t rely on that system. It’s a choice that we have to make in our lives, I would say more quickly than has been apparent at any other time in human history.

My regular viewers will understand what I am proposing here: the creation of a parallel society. We will not achieve this by asking for more scraps from the masters table, or by gently complying as we are herded into ever more constrictive technological pens, or by thinking that we can win this war by engaging the enemy in their controlled domain. We can only achieve this by creating our own table, our own economy and our own communities of interest. This will require the long and difficult task of increasing our independence from the authoritarian systems in every domain: the information domain, the food domain, the health domain, the monetary domain, the mental domain and every other contested battlespace in this all-out, fifth-generation war.

Easier said than done, of course. But there is no alternative.

Some will say “But won’t they come after that parallel society?” as if that is a rebuttal to what I have laid out here. The point is that you are already the target of the enemy in a war that most people but dimly understand is happening. Yes, the enemy will come after you. But they are already dominating you in more ways than any one person can fully understand. That does not stop just because you comply with their demands or take part in their system.

We must stop playing their game. We must stop fighting their war. We must stop ceding our power, our authority, our time, our attention, our energy and our resources to engaging the enemy in their terms in their battlefield.

We must create our own parallel society on our own terms.

And so we rediscover an old piece of wisdom. To paraphrase: “Fifth-generation warfare is a strange game. The only winning move is not to play.”

War is over . . . if we want it.

 

Connect with James Corbett




Hacking Humanity: Transhumanism

Hacking Humanity: Transhumanism

 


“Harari’s pronouncements may amount to intentional hyperbole to make a point, but his statements are remarkable for the cynicism and disdain for humanity they betray. They are revelatory of the unmitigated gall of believers in the transhuman future. Coupled with the neo-Malthusian impulses of the elite, centered around the UN and the WEF, a picture emerges of an elite whose objective is to reduce the population of “useless eaters,” while keeping the remainder in their thrall.”


by , Mises Wire
April 14, 2023

 

[This piece is an excerpt from The Great Reset and the Struggle for Liberty.]

The notion that the world can be replicated and replaced by a simulated reality says a great deal about the beliefs of those who promote the metaverse [treated in the previous chapter]. The conception is materialist and mechanistic at base, the hallmarks of social engineering. It represents the world as consisting of nothing but manipulable matter, or rather, of digital media mimicking matter. It suggests that human beings can be reduced to a material substratum and can be induced to accept a technological reproduction in lieu of reality. Further, it assumes that those who inhabit this simulacrum can be controlled by technocratic means. Such a materialist, mechanistic, techno-determinist, and reductionist worldview is consistent with the transhumanist belief that humans themselves will soon be succeeded by a new transhuman species, or humanity-plus (h+)—perhaps a genetically and AI-enhanced cyborg that will outstrip ordinary humans and make the latter virtually obsolete.

The term transhumanism was coined by Julian Huxley, the brother of the novelist Aldous Huxley and the first director-general of the United Nations Educational, Scientific and Cultural Organization (UNESCO). In an essay entitled “Transhumanism,” published in the book New Bottles for New Wine (1957), Huxley defined transhumanism as the self-transcendence of humanity:

The human species can, if it wishes, transcend itself—not just sporadically, an individual here in one way, an individual there in another way, but in its entirety, as humanity. We need a name for this new belief. Perhaps transhumanism will serve: man remaining man, but transcending himself, by realizing new possibilities of and for his human nature.1

One question for transhumanism is indeed whether this transcendence will apply to the whole human species or rather for only a select part of it. But Huxley gave some indication of how this human self-transcendence might occur: humanity would become “managing director of the biggest business of all, the business of evolution . . .”2 As the first epigraph to this Part makes clear, Julian Huxley was a proponent of eugenics. And he was the President of the British Eugenics Society.3 It was in his introduction of UNESCO, as the director-general that he suggested that eugenics, after the Nazi regime had given it such a bad name, should be rescued from opprobrium, “so that much that now is unthinkable may at least become thinkable.”4 As John Klyczek has noted, “In the wake of vehement public backlash against the atrocities of the Nazi eugenic Holocaust, Huxley’s eugenics proper was forced to go under-ground, repackaging itself in various crypto-eugenic disguises, one of which is ‘transhumanism.’” Transhumanism, Klyczek suggests, is “the scientific postulate that human evolution through biological-genetic selection has been largely superseded by a symbiotic evolution that cybernetically merges the human species with its own technological handiwork.”5

Contemporary transhumanist enthusiasts, such as Simon Young, believe that humanity can take over where evolution has left us to create a new and improved species—either ourselves, or a successor to ourselves:

We stand at a turning point in human evolution. We have cracked the genetic code; translated the Book of Life. We will soon possess the ability to become designers of our own evolution.6

In “A History of Transhumanist Thought,” Nick Bostrom details the lineage of transhumanist thought from its prehistory to the present and shows how transhumanism became wedded to the fields of genomics, nanotechnology, and robotics (GNR), where robotics is inclusive of Artificial Intelligence (AI).7 It is the last of these fields that primarily concerns us here. The transhumanist project has since envisioned the transcendence of humanity via technological means. In the past thirty years, this technological transcendence has been figured as “the singularity.”

Vernor Vinge, the mathematician, computer scientist, and science fiction author introduced the notion of the technological singularity in 1993.8 The singularity, Vinge suggested, is the near-future point at which machine intelligence will presumably supersede human intelligence. Vinge boldly declared: “Within thirty years, we will have the technological means to create superhuman intelligence. Shortly after, the human era will be ended.”9 Vinge predicted that the singularity would be reached no later than, you guessed it, 2030. The question Vinge addressed was whether, and if so, how, the human species might survive the coming singularity.

The inventor, futurist, and now Google Engineering Director Raymond Kurzweil has since welcomed the technological singularity as a boon to humanity. Kurzweil, whose books include The Age of Spiritual Machines (1999), The Singularity Is Near (2005), and How to Create a Mind (2012), suggests that by 2029, technologists will have successfully reverse-engineered the brain and replicated human intelligence in (strong) AI while vastly increasing processing speeds of thought. Having mapped the neuronal components of a human brain, or discovered the algorithms for thought, or a combination thereof, technologists will convert the same to a computer program, personality and all, and upload it to a computer host, thus grasping the holy grail of immortality. Finally, as the intelligence explosion expands from the singularity, all matter will be permeated with data, with intelligence; the entire universe will “wake up” and become alive, and “about as close to God as I can imagine,” writes Kurzweil.10

Thus, in a complete reversal of the Biblical creation narrative, Kurzweil posits a dumb universe that begins with a cosmic singularity (the Big Bang) and becomes God by a technological singularity. This second singularity, Kurzweil suggests, involves the universe becoming self-aware, vis-à-vis the informational, technological agent, humanity. Thus, in the technological singularity, the technological and the cosmic converge, as Kurzweil resembles a techno-cosmic Hegelian. (Hegel figured collective human self-consciousness progressing in self-actualization and self-realization, finally becoming and recognizing itself as God, “through the State [as] the march of God in the world.”11) Incidentally, according to Kurzweil, our post-human successors will bear the marks of their human provenance. Thus, the future intelligence will remain “human” in some sense. Human beings are the carriers of universal intelligence and human technology is the substratum by which intelligence will be infinitely expanded and universalized.

More recently, Yuval Noah Harari—the Israeli historian, WEF-affiliated futurist, and advisor to Klaus Schwab—has also hailed this singularity, although with dire predictions for the vast majority. According to Harari, the 4-IR will have two main consequences: human bodies and minds will be replaced by robots and AI, while human brains become hackable with nanorobotic brain-cloud interfaces (B/CIs), AI, and biometric surveillance technologies. Just as humans are functionally replaced, that is, they will be subject to the total control of powerful corporations or the state (or, what’s more likely, a hybrid thereof, a neo-fascist state). Rather than a decentralized, open-access infosphere of exploding intelligence available to all, Singularitarian technologies will become part of the arsenal for domination. The supersession of human intelligence by machine intelligence will involve the use of such data and data processing capabilities to further predict and control social behavioral patterns of the global population. In addition, the biotechnical enhancement of the few will serve to exacerbate an already wide gulf between the elite and the majority, while the “superiority” of the enhanced functions ideologically to rationalize differences permitted by such a division. That is, Harari suggests that if developments proceed as Vinge and Kurzweil predict, this vastly accelerated information-collecting and processing sphere will not constitute real knowledge for the enlightenment of the vast majority. Rather, it will be instrumentalist and reductionist in the extreme, facilitating the domination of human beings on a global scale, while rendering opposition impossible.

In an article in Frontiers in Neuroscience, Nuno R. B. Martins et al. explain just how such control could be implemented through B/CIs, which the authors claim will be feasible within the next 20 to 30 years:

Neuralnanorobotics may also enable a B/CI with controlled connectivity between neural activity and external data storage and processing, via the direct monitoring of the brain’s ~86 x 109 neurons and ~2 x 1014 synapses. . .

They would then wirelessly transmit up to ~6 x 1016 bits per second of synaptically processed and encoded human–brain electrical information via auxiliary nanorobotic fiber optics (30 cm3) with the capacity to handle up to 1018 bits/sec and provide rapid data transfer to a cloud-based supercomputer for real-time brain-state monitoring and data extraction. A neuralnanorobotically enabled human B/CI might serve as a personalized conduit, allowing persons to obtain direct, instantaneous access to virtually any facet of cumulative human knowledge (emphasis mine).12

Such interfaces have already reached the commercialization stage with Elon Musk’s Neuralink,13 Kernel,14 and through DARPA,15 among others.

When neuralnanorobotic technologies that conduct information and algorithms that make decisions interface with the brain, the possibilities for eliminating particular kinds of experiences, behaviors, and thoughts becomes possible. Such control of the mind through implants was already prototyped by Jose Delgado as early as 1969.15 Now, two- way transmission of data between the brain and the cloud effectively means the possibility of reading the thoughts of subjects, interrupting such thoughts, and replacing them with other, machine-cloud-originating information. The desideratum to record, label, “informationalize,” rather than to understand, let alone critically engage or theorize experience will take exclusive priority for subjects, given the possibilities for controlling neuronal switching patterns. Given the instrumentalism of the Singularitarians— or, as Yuval Harari has called them, the “Dataists”— decisive, action-oriented algorithms will dominate these brain-cloud interfaces, precluding faculties for the critical evaluation of activity, and obliterating free will.17 Given enough data, algorithms will be better able to make decisions for us. Nevertheless, they will have been based on intelligence defined in a particular way and put to particular ends, placing considerable emphasis on the speed and volume of data processing and decision-making based on data construed as “knowledge.” Naturally, Aldous Huxley’s Brave New World comes to mind. Yet, unlike Huxley’s mind-numbing soma, brain-cloud interfaces will have an ideological appeal to the masses; they are touted as enhancements, as vast improvements over standard human intelligence.

Harari peels back the curtain masking transhumanism’s Wizard of Oz promises, suggesting that even before the singularity, robotics and machine intelligence will make the masses into a new “useless class.”18 Given the exorbitant cost of entry, only the elite will be able to afford actual enhancements, making them a new, superior species—notwithstanding the claim that Moore’s Law closes the technological breach by exponentially increasing the price-performance of computing and thus halving its cost per unit of measurement every two years or less. How the elite will maintain exclusive control over enhancements and yet subject the masses to control technologies is never addressed. But perhaps a kill switch could be implemented such that the elite will not be subjected to brain-data mining—unless one runs afoul of the agenda, in which case brain-data mining could be (re)enabled.

In a 2018 WEF statement, Harari spoke as the self-proclaimed prophet of a new transhumanist age, saying:

We are probably among the last generations of homo sapiens. Within a century or two, Earth will be dominated by entities that are more different from us, than we are different from Neanderthals or from chimpanzees. Because in the coming generations, we will learn how to engineer bodies and brains and minds. These will be the main products of the 21st century economy (emphasis mine).19

No longer capable of mounting a challenge to the elite as in the nineteenth and twentieth centuries, and having no function, the feckless masses will have no recourse or purpose. Exploitation is one thing; irrelevance is quite another, says Harari. And thus, as Harari sees it, the remaining majority will be condemned to spend their time in the metaverse, or worse. If they are lucky, they will collect universal basic income (UBI) and will best occupy themselves by taking drugs and playing video games. Of course, Harari exempts himself from this fate.

As for the elite, according to Harari, their supposed superiority to the masses will soon become a matter of biotechnological fact, rather than merely an ideological pretension, as in the past. The elite will not only continue to control the lion’s share of the world’s material resources; they will also become godlike and enjoy effective remote control over their subordinates. Further, via biotechnological means, they will acquire eternal life on Earth, while the majority, formerly consoled by the fact that at least everybody dies, will now lose the great equalizer. As the supernatural is outmoded, or sacrificed on the altar of transhumanism, the majority will inevitably forfeit their belief in a spiritual afterlife. The theistic religions that originated in the Middle East will disappear, to be replaced by new cyber-based religions originating in Silicon Valley. Spirituality, that is, will be nothing but the expression of reverence for newly created silicon gods, whether they be game characters, game designers, or the elites themselves.

Harari’s pronouncements may amount to intentional hyperbole to make a point, but his statements are remarkable for the cynicism and disdain for humanity they betray. They are revelatory of the unmitigated gall of believers in the transhuman future. Coupled with the neo-Malthusian impulses of the elite, centered around the UN and the WEF, a picture emerges of an elite whose objective is to reduce the population of “useless eaters,” while keeping the remainder in their thrall.

[This piece is an excerpt from The Great Reset and the Struggle for Liberty.]

 

Michael Rectenwald is the author of twelve books, including The Great Reset and the Struggle for Liberty: Unraveling the Global AgendaThought CriminalBeyond WokeGoogle Archipelago, and Springtime for Snowflakes. He is a distinguished fellow at Hillsdale College.

 

Connect with Mises Institute

Contact Michael Rectenwald

Cover image credit: fszalai