They Are Scrubbing the Internet Right Now

They Are Scrubbing the Internet Right Now

by Jeffrey A Tucker and Debbie Lerman, Brownstone Institute
October 30, 2024

 

Instances of censorship are growing to the point of normalization. Despite ongoing litigation and more public attention, mainstream social media has been more ferocious in recent months than ever before. Podcasters know for sure what will be instantly deleted and debate among themselves over content in gray areas. Some like Brownstone have given up on YouTube in favor of Rumble, sacrificing vast audiences if only to see their content survive to see the light of day.

It’s not always about being censored or not. Today’s algorithms include a range of tools that affect searchability and findability. For example, the Joe Rogan interview with Donald Trump racked up an astonishing 34 million views before YouTube and Google tweaked their search engines to make it hard to discover, while even presiding over a technical malfunction that disabled viewing for many people. Faced with this, Rogan went to the platform X to post all three hours.

Navigating this thicket of censorship and quasi-censorship has become part of the business model of alternative media.

Those are just the headline cases. Beneath the headlines, there are technical events taking place that are fundamentally affecting the ability of any historian even to look back and tell what is happening. Incredibly, the service Archive.org which has been around since 1994 has stopped taking images of content on all platforms. For the first time in 30 years, we have gone a long swath of time – since October 8-10 – since this service has chronicled the life of the Internet in real time.

As of this writing, we have no way to verify content that has been posted for three weeks of October leading to the days of the most contentious and consequential election of our lifetimes. Crucially, this is not about partisanship or ideological discrimination. No websites on the Internet are being archived in ways that are available to users. In effect, the whole memory of our main information system is just a big black hole right now.

The trouble on Archive.org began on October 8, 2024, when the service was suddenly hit with a massive Denial of Service attack (DDOS) that not only took down the service but introduced a level of failure that nearly took it out completely. Working around the clock, Archive.org came back as a read-only service where it stands today. However, you can only read content that was posted before the attack. The service has yet to resume any public display of mirroring of any sites on the Internet.

In other words, the only source on the entire World Wide Web that mirrors content in real time has been disabled. For the first time since the invention of the web browser itself, researchers have been robbed of the ability to compare past with future content, an action that is a staple of researchers looking into government and corporate actions.

It was using this service, for example, that enabled Brownstone researchers to discover precisely what the CDC had said about Plexiglas, filtration systems, mail-in ballots, and rental moratoriums. That content was all later scrubbed off the live Internet, so accessing archive copies was the only way we could know and verify what was true. It was the same with the World Health Organization and its disparagement of natural immunity which was later changed. We were able to document the shifting definitions thanks only to this tool which is now disabled.

What this means is the following: Any website can post anything today and take it down tomorrow and leave no record of what they posted unless some user somewhere happened to take a screenshot. Even then there is no way to verify its authenticity. The standard approach to know who said what and when is now gone. That is to say that the whole Internet is already being censored in real time so that during these crucial weeks, when vast swaths of the public fully expect foul play, anyone in the information industry can get away with anything and not get caught.

We know what you are thinking. Surely this DDOS attack was not a coincidence. The time was just too perfect. And maybe that is right. We just do not know. Does Archive.org suspect something along those lines? Here is what they say:

Last week, along with a DDOS attack and exposure of patron email addresses and encrypted passwords, the Internet Archive’s website javascript was defaced, leading us to bring the site down to access and improve our security. The stored data of the Internet Archive is safe and we are working on resuming services safely. This new reality requires heightened attention to cyber security and we are responding. We apologize for the impact of these library services being unavailable.

Deep state? As with all these things, there is no way to know, but the effort to blast away the ability of the Internet to have a verified history fits neatly into the stakeholder model of information distribution that has clearly been prioritized on a global level. The Declaration of the Future of the Internet makes that very clear: the Internet should be “governed through the multi-stakeholder approach, whereby governments and relevant authorities partner with academics, civil society, the private sector, technical community and others.”  All of these stakeholders benefit from the ability to act online without leaving a trace.

To be sure, a librarian at Archive.org has written that “While the Wayback Machine has been in read-only mode, web crawling and archiving have continued. Those materials will be available via the Wayback Machine as services are secured.”

When? We do not know. Before the election? In five years? There might be some technical reasons but it might seem that if web crawling is continuing behind the scenes, as the note suggests, that too could be available in read-only mode now. It is not.

Disturbingly, this erasure of Internet memory is happening in more than one place. For many years,  Google offered a cached version of the link you were seeking just below the live version. They have plenty of server space to enable that now, but no: that service is now completely gone. In fact, the Google cache service officially ended just a week or two before the Archive.org crash, at the end of September 2024.

Thus the two available tools for searching cached pages on the Internet disappeared within weeks of each other and within weeks of the November 5th election.

Other disturbing trends are also turning Internet search results increasingly into AI-controlled lists of establishment-approved narratives. The web standard used to be for search result rankings to be governed by user behavior, links, citations, and so forth. These were more or less organic metrics, based on an aggregation of data indicating how useful a search result was to Internet users. Put very simply, the more people found a search result useful, the higher it would rank. Google now uses very different metrics to rank search results, including what it considers “trusted sources” and other opaque, subjective determinations.

Furthermore, the most widely used service that once ranked websites based on traffic is now gone. That service was called Alexa. The company that created it was independent. Then one day in 1999, it was bought by Amazon. That seemed encouraging because Amazon was well-heeled. The acquisition seemed to codify the tool that everyone was using as a kind of metric of status on the web. It was common back in the day to take note of an article somewhere on the web and then look it up on Alexa to see its reach. If it was important, one would take notice, but if it was not, no one particularly cared.

This is how an entire generation of web technicians functioned. The system worked as well as one could possibly expect.

Then, in 2014, years after acquiring the ranking service Alexa, Amazon did a strange thing. It released its home assistant (and surveillance device) with the same name. Suddenly, everyone had them in their homes and would find out anything by saying “Hey Alexa.” Something seemed strange about Amazon naming its new product after an unrelated business it had acquired years earlier. No doubt there was some confusion caused by the naming overlap.

Here’s what happened next. In 2022, Amazon actively took down the web ranking tool. It didn’t sell it. It didn’t raise the prices. It didn’t do anything with it. It suddenly made it go completely dark.

No one could figure out why. It was the industry standard, and suddenly it was gone. Not sold, just blasted away. No longer could anyone figure out the traffic-based website rankings of anything without paying very high prices for hard-to-use proprietary products.

All of these data points that might seem unrelated when considered individually, are actually part of a long trajectory that has shifted our information landscape into unrecognizable territory. The Covid events of 2020-2023, with massive global censorship and propaganda efforts, greatly accelerated these trends.

One wonders if anyone will remember what it was once like. The hacking and hobbling of Archive.org underscores the point: there will be no more memory.

As of this writing, fully three weeks of web content have not been archived. What we are missing and what has changed is anyone’s guess. And we have no idea when the service will come back. It is entirely possible that it will not come back, that the only real history to which we can take recourse will be pre-October 8, 2024, the date on which everything changed.

The Internet was founded to be free and democratic. It will require herculean efforts at this point to restore that vision, because something else is quickly replacing it.


Jeffrey Tucker is Founder, Author, and President at Brownstone Institute. He is also Senior Economics Columnist for Epoch Times, author of 10 books, including Life After Lockdown, and many thousands of articles in the scholarly and popular press. He speaks widely on topics of economics, technology, social philosophy, and culture.

Debbie Lerman, 2023 Brownstone Fellow, has a degree in English from Harvard. She is a retired science writer and a practicing artist in Philadelphia, PA.

 

Connect with Brownstone Institute

Cover image based on creative commons work of manfredsteger 




Disclosure & The Metaverse

Disclosure & The Metaverse

by Rosanne Lindsay, Traditional Naturopath, Nature of Healing
October 17, 2024

 

Since ‘hindsight is 20/20,’ what happened in 2020?

In 2020, the new, experimental mRNA injections rolled out as a premeditated response to Coronavirus. What was on the package inserts of the products?

Nothing.

The inserts were blank. This way, companies could not be held liable for any ill effects following injection. It’s called indemnity, an exemption from penalties.

Fast forward to 2024. Eureka! Suddenly scientists know what was in those Emergency Use Authorized (EUA), FDA-unapproved COVID injections!

Nanotechnology Through a Needle

According to an Argentinian study, scientists discovered 55 undeclared chemicals and metals not listed on package inserts. The study published last week in the International Journal of Vaccine Theory, Practice, and Research discloses:

Among the undeclared chemical elements were detected 11 of the 15 cytotoxic lanthanides used in electronic devices and optogenetics. In addition, among the undeclared elements were all 11 of the heavy metals: chromium was found in 100% of the samples; arsenic 82%; nickel 59%; cobalt and copper 47%; tin 35%; cadmium, lead and manganese in 18%; and mercury in 6%. A total of 55 undeclared chemical elements were found and quantified…

James Lyons-Weiler, Ph.D., a member of the journal’s editorial board said, “Individually, these chemicals are known to cause neurological, cardiovascular and immunological damage.”

What is not disclosed? Metals and chemicals are required for nanopolymers. Delivered through a needle, they target specific areas of the body for ‘connectivity’ to the Internet of Things.

Disclosure & Implied Consent

No matter where the information is found in the media, whether in an articlesocial mediacinema, documentary, or hidden in a medical journal study, the architects who create toxic products must disclose the information somewhere, whether perceived positively or negatively.  Of course how you perceive the information is up to you.

In 2020, social media tracking of information suggests 43% of content retrieved on Google was antivaccination in nature. However, today, it is nearly impossible to find a negative campaign against the jab.

As long as the deed is visible, it has been exposed, even if it is after the fact.  This is called implied consent. 

No response is considered to be silent acquiescence. This means that by your non response, you have agreed to the methods used.

When hindsight is 20/20, it means “too little, too late.” The deed is done.

Biodigital Convergence

There is another purpose to the disclosing information after the fact; that is to misdirect an investigation. Four years later, mRNA is old information since, in the Information Age, old news happens yesterday, not four years ago.

For at least two decades, scientists and governments have been paving the way toward Transhumanism, the merging of humans and machines. The way to Transhumanism is through Biodigital Convergence. Read more here.

In the coming years, biodigital technologies could be woven into our lives in the way that digital technologies are now. Biological and digital systems are converging, and could change the way we work, live, and even evolve as a species. More than a technological change, this biodigital convergence may transform the way we understand ourselves and cause us to redefine what we consider human or natural.

In the Covidian Age, “CORONA” represents the addition of metamaterials, to augment humans and upgrade the system with faster speeds to run more applications. According to a 2021 study in the American Journal of Bioinformatics Research, “corona is a non-communicable disease spread worldwide through wireless sensor technology…

To The Metaverse!

The positive side of Hindsight is Foresight.  Instead of looking to the past, we can focus on what is unfolding now, and into the near future.

Biodigital Convergence leads to Smart cities, Cognitive(C40) cities, Blockchain, Reverse engineering, Digital Twin, Self-assembly nanotechnologies, the Internet of Bodies, and more… in the connected future of the Metaverse.

If Biodigital Convergence sound like a Virtual Reality, then you are one step closer to your Avatar. Will you become an Avatar in the Metaverse? Watch the feature film, Avatar for disclosure.

The architects of converging technologies want everyone to live a Metaverse of their construction.

Of course, disclosure is found openly, in Sci-fi movies, and fiction. However, for a drier presentation, it is also found in a slideshow from the 2022 International Electrotechnical Commission. For current and future standards that will run The Convergence, read the 480-page report on the National Nanotech Initiative (NNI).

The NNI recently celebrated its 20th birthday. This proves that mRNA nanotechnology is old news. It does not discriminate against gender, sex, race, or religion. This global initiative seeks to incorporate everyone, everywhere. They have our consent through silent acquiescence.

The concept of ‘vaccine status,’ along with related vaccine science and laws are mere propaganda and distraction. These are symptoms of past strategies that lead to future ‘connectivity.’ Unfortunately, focus on vaccines is exactly where architects want people to be.

Foresight might be fuzzy, but without it, we are left scrambling in the past.

 

Related Articles:

 

Rosanne Lindsay is a Traditional Naturopath, Herbalist, Writer, and Author of the books The Nature of Healing, Heal the Body, Heal the Planet and Free Your Voice, Heal Your Thyroid, Reverse Thyroid Disease Naturally. Find her on Facebook at facebook.com/Natureofhealing. Consult with her remotely at www.natureofhealing.org. Listen to her archived podcasts at blogtalkradio.com/rosanne-lindsay.

 

Connect with Rosanne Lindsay, Traditional Naturopath

Cover image credit: denflinkegrafiker




Brace Yourselves: A Tsunami Approaches

Brace Yourselves: A Tsunami Approaches

by John & Nisha Whitehead, The Rutherford Institute
October 15, 2024

 

“What happened here was the gradual habituation of the people, little by little, to being governed by surprise; to receiving decisions deliberated in secret; to believing that the situation was so complicated that the government had to act on information which the people could not understand, or so dangerous that, even if the people could understand it, it could not be released because of national security… And all the crises and reforms (real reforms, too) so occupied the people that they did not see the slow motion underneath, of the whole process of government growing remoter and remoter.”

—Historian Milton Mayer, They Thought They Were Free: The Germans, 1933-45

 

Brace yourself: a tsunami approaches.

While we squabble over which side is winning this losing battle to lead the country, there is something being concocted in the dens of power, far beyond the public eye, and it doesn’t bode well for the future of this country.

Anytime you have an entire nation so mesmerized by the antics of the political ruling class that they are oblivious to all else, you’d better beware.

Anytime you have a government that operates in the shadows, speaks in a language of force, and rules by fiat, you’d better beware.

And anytime you have a government so far removed from its people as to ensure that they are never seen, heard or heeded by those elected to represent them, you’d better beware.

We’ve got to get our priorities straight if we are to ever have any hope of maintaining any sense of freedom in America.

As long as we allow ourselves to be distracted, diverted, occasionally outraged, always polarized and content to view each other—rather than the government—as the enemy, we’ll never manage to present a unified front against tyranny (or government corruption and ineptitude) in any form.

Mind you, by “government,” I’m not referring to the highly partisan, two-party bureaucracy of the Republicans and Democrats. Rather, I’m referring to “government” with a capital “G,” the entrenched Deep State that is unaffected by elections, unaltered by populist movements, and has set itself beyond the reach of the law.

This is the hidden face of a government that has no respect for the freedoms of its citizenry.

So, stop with all of the excuses and the hedging and the finger-pointing and the pissing contests to see which side can out-shout, out-blame and out-spew the other.

Enough already with the short- and long-term amnesia that allows political sycophants to conveniently forget the duplicity, complicity and mendacity of their own party while casting blame on everyone else.

This is how evil wins.

This is how freedom falls and tyranny rises.

This is how good, generally decent people—having allowed themselves to be distracted with manufactured crises, polarizing politics, and fighting that divides the populace into warring us vs. them camps—fail to take note of the looming danger that threatens to wipe freedom from the map and place us all in chains.

The world has been down this road before, as historian Milton Mayer recounts in his seminal book on Hitler’s rise to power, They Thought They Were Free.

We are at our most vulnerable right now.

The gravest threat facing us as a nation is not extremism but despotism, exercised by a ruling class whose only allegiance is to power and money.

We’re in a national state of denial, yet no amount of escapism can shield us from the harsh reality that the danger in our midst is posed by an entrenched government bureaucracy that has no regard for the Constitution, Congress, the courts or the citizenry.

No matter how often the team colors change, the playbook remains the same. The leopard does not change its spots.

Scrape off the surface layers and you will find that nothing has changed.

The police state is still winning. We the people are still losing.

In fact, the American police state has continued to advance at the same costly, intrusive, privacy-sapping, Constitution-defying, heartbreaking, soul-scorching, relentless pace under the current Tyrant-in-Chief as it did under those who occupied the White House before him (Trump, Obama, Bush, Clinton, etc.).

Consider for yourselves:

  • Police haven’t stopped disregarding the rights of citizens.
  • SWAT teams haven’t stopped crashing through doors and terrorizing families.
  • The Pentagon and the Department of Homeland Security haven’t stopped militarizing and federalizing local police.
  • Schools haven’t stopped treating young people like hard-core prisoners.
  • For-profit private prisons haven’t stopped locking up Americans and immigrants alike at taxpayer expense.
  • Censorship hasn’t stopped.
  • The courts haven’t stopped marching in lockstep with the police state.
  • Government bureaucrats haven’t stopped turning American citizens into criminals.
  • The surveillance state hasn’t stopped spying on Americans’ communications, transactions or movements.
  • The TSA hasn’t stopped groping or ogling travelers.
  • Congress hasn’t stopped enacting draconian laws.
  • The Department of Homeland Security hasn’t stopped being a “wasteful, growing, fear-mongering beast.”
  • The military industrial complex hasn’t stopped profiting from endless wars abroad.
  • The Deep State’s shadow government hasn’t stopped calling the shots behind the scenes.
  • And the American people haven’t stopped acting like gullible sheep.

So you can try to persuade yourself that you are free, that you still live in a country that values freedom, and that it is not too late to make America great again, but to anyone who has been paying attention to America’s decline over the past century, it will be just another lie.

The German people chose to ignore the truth and believe the lie.

They were not oblivious to the horrors taking place around them. The warning signs were definitely there, blinking incessantly like large neon signs.

“Still,” historian Robert Gellately writes, “the vast majority voted in favor of Nazism, and in spite of what they could read in the press and hear by word of mouth about the secret police, the concentration camps, official anti-Semitism, and so on.”

The German people backed Hitler because for the majority of them, life was good.

In a nutshell, life was good because their creature comforts remained undiminished, their bank accounts remained flush, and they weren’t being discriminated against, persecuted, starved, beaten, shot, stripped, jailed and turned into slave labor.

Life is good in America, too.

Life is good in America as long as you’re able to keep sleep-walking through life, cocooning yourself in political fantasies that depict a world in which your party is always right and everyone else is wrong, and distracting yourself with bread-and-circus entertainment that bears no resemblance to reality.

Life is good in America as long as you don’t mind being made to pay through the nose for the government’s endless wars, subsidization of foreign nations, bloated workforce, secret agencies, fusion centers, private prisons, biometric databases, invasive technologies, arsenal of weapons, and every other budgetary line item that is contributing to the fast-growing wealth of the corporate elite at the expense of those who are barely making ends meet—that is, we the 99%.

Life is good in America for the privileged few, but as I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, it’s getting worse by the day for the rest of us.

So, please spare me the media hysterics and the outrage and the hypocritical double standards of those whose moral conscience appears to be largely dictated by their political loyalties.

Anyone who believes that the injustices, cruelties and vicious callousness of the U.S. government are unique to any one particular administration has not been paying attention.


 

Constitutional attorney and author John W. Whitehead is founder and president of The Rutherford Institute. His most recent books are the best-selling Battlefield America: The War on the American People, the award-winning A Government of Wolves: The Emerging American Police State, and a debut dystopian fiction novel, The Erik Blair Diaries. Whitehead can be contacted at staff@rutherford.org. Nisha Whitehead is the Executive Director of The Rutherford Institute. Information about The Rutherford Institute is available at www.rutherford.org.

 

Connect with The Rutherford Institute

Cover image credit: SingingAngler




Uncovering World Tyranny and Its War Strategies

Uncovering World Tyranny and Its War Strategies. Peter Koenig and David Icke
An introduction by Peter Koenig

by David Icke and Peter Koenig, Global Research
October 07, 2024

 

 

Everyone interested in where we are going in this dystopian civilization and ever-more tyrannical world, must see this extraordinary interview with David Icke by Kla.TV.

It can, and hopefully does, bring a larger awakening to the people around the globe.

David Icke talks about the corralling of the world population into ever smaller spaces under the pretext of “climate change” that requires a “net-zero” CO2 world, no travel, no industry, promoting the “15-minute cities”. It is absurd. 

“Zero-Net” – by 2050 – is propagated by the globalists as a must for humanity’s and Mother Earth’s survival. It will not happen. Humanity will survive. 

And all this while they – the self-declared masters of the universe – namely the financial establishment know very well that CO2 is a life essential gas; without which there would be no life, no plants, no food, no economic development — no-nothing.

But the believers in authority follow the masters’ orders and practically commit suicide by following and obeying a lie, attempting the reduction to zero of CO2. 

David explains how world events are connected. With a little research and a clear-thinking head, you will find that all major geopolitical, socioeconomic events are not just haphazardly occurring side by side or in certain sequences, they are all linked up throughout the world. So, connecting the dots, you will see that we are living in a well-orchestrated web, where all makes sense – for those who are in command of the web — and to the detriment of the vast bulk of populations.

There is a tiny-tiny elite behind the web, pretending to have all the power, only because we believe all the lies from our government and institutional so-called authorities, dictated to them by this elite.

We have been taught in school to trust in authority and to obey authorities. It is a difficult axiom to break. 

The constant drill of the mainstream media assures a steady drop-by-drop indoctrination of lies becoming the truth.

David Icke also describes how true non-mainstream media some 20 years ago, gradually was converted into “mainstream alternative” media, also called “controlled opposition” by the big media outlets, Murdoch, Disney, Warner Brothers and more.

As a new, controlled alternative media, he mentioned Tucker Carlson, among others. They are promoted and funded by Big Tech and Big Finance, but cannot trespass their given boundaries. 

The TRUE non-mainstream and independent remaining journalists and news sites are cornered, cyber-attacked and censored. That is how a small group of financial and big-tech oligarchs takes ever more control of society.

We MUST break out from this giant net or worldwide matrix controlled by a tiny elite that controls technology, finance, and decides over our heath or death, through WHO, supported by Big Pharma. Exiting the matrix is our condition to become free and sovereign citizens again.

And, yes, we can —by becoming self-asserted and independent thinkers, joining up with others and together breaking the elite-bullies “rules-based order” back to legality, international, national and local laws, respecting one another, and respecting the rights of people, indigenous, westerners, easterners, Africans and Middle Easterners and whatever ethnicity you may find.

We are all the same.

Our souls are not bound to a pyramid order of hierarchy.

They are equal.

David’s motto is: “Know the goal, then you will see the way leading there!” In the interview he shows that even free educators are in danger of supporting the development of a centrally dictated global dystopia.

David Icke, the Dot-Connector, starts the interview by saying,

“If you look at the world as a series of random events, random happenings, it makes no sense. Why do they do that? Why do they do it this way? Why don’t they do it that way? It would be much better if they did it that way. And so on and so forth. Why does this happen? But when you connect the dots, you connect these events, you find that they do all connect. It suddenly makes all sense. And, you know, people say sometimes about me: “You see a conspiracy everywhere.””

“No, I do not. I see one conspiracy to turn the world into a global dystopia. And that one conspiracy has endless facets and forms. But it is actually one conspiracy. It is one gigantic web. And that is literally true in terms of what I call the Global Cult, which is a global network of secret societies which are operating outside or in the shadows from those that appear to be running the world.”

David’s clear-sight points to a key element that may lead us into a dystopian world. Our societal behavior is based on our perception. The perceptions are based on the messages we receive. The Global Cult that pretends to control us, formulates the messages as lies, to make us believe there is a problem, the people react, then they can present, or impose us a solution.

He calls it simply, “Problems, Reaction, Solution”. 

David uses the recent example of covid. He says,

“People caved in to the COVID hoax because they perceived there was a dangerous virus. And they perceived, that the fake vaccine, not a vaccine under previous criteria, was a way to save them from the dangerous virus.

That perception led to people submitting to what were fascistic impositions all over the world. So, if you want to control behavior, you must control perception. And if you control behavior, well, collectively, that is what we call human society. And then you ask the question, where do perceptions come from? Well, they come from information received”.

And information is controlled and manipulated to serve the purpose of the controllers.

David Icke’s presentation is brilliant. It is a MUST-SEE for every truth seeker.

 


Peter Koenig is a geopolitical analyst and a former Senior Economist at the World Bank and the World Health Organization (WHO), where he worked for over 30 years around the world. He is the author of Implosion – An Economic Thriller about War, Environmental Destruction and Corporate Greed; and co-author of Cynthia McKinney’s book “When China Sneezes: From the Coronavirus Lockdown to the Global Politico-Economic Crisis” (Clarity Press – November 1, 2020).

Peter is a Research Associate of the Centre for Research on Globalization (CRG). He is also a non-resident Senior Fellow of the Chongyang Institute of Renmin University, Beijing.

 

The original source of this article is Global Research
Copyright © David Icke and Peter Koenig, Global Research, 2024

 

Connect with Global Research

Connect with kla.tv

Cover image credit: geralt




La Quinta Columna: Targeting the Brain

Targeting the Brain

by La Quinta Columna
October 6, 2024

 

Video available at OdyseeRumble

 

Transcript:

Self-assembling technology, that has an affinity for the central nervous system, whose purpose is to impregnate neurons, thereby creating an artificial neural network.

Optoelectronics is a branch of photonics related to the study and application of electronic devices that interact with Light, systems in which electrons and photons coexist.

Optoelectronic devices operate as electro-optical or opto-electrical transducers.

Millions of people have been IMPLANTED with graphene-based liquid nanotechnology through the co-called COVID “vaccines”.

Currently, all types of injectables contain graphene, which acts as fuel to make all this technology work.

Self-assembling technology, that has an affinity for the central nervous system, whose purpose is to impregnate neurons, thereby creating an artificial neural network.

You can see it for yourself by accessing the Telegram channel: Mira al microscopio [https://t.me/miraalmicroscopio]

What you are going to see next is not optogenetics. It’s optoelectronics.

Rafael Yuste, Spanish neurobiologist and ideologist of the Human Brain Project.

 

Optoelectronic locomotion control.

Experiment realized by Ranier Guiérrez at the Stanford OIL Workshop on 25 July 2011.

 

“The possibility that machines can read our thoughts and even insert thoughts. Insert feelings and ….”

~ Former President of Chile, Sebastian Pinera

 

The cover is called Neuralink and apparently we have been made to see that it is voluntary.

 

“But does this not imply some kind of surgery?”

~ [unidentified interviewer]

“Not necessarily. You can go through the veins and arteries.”

~ Elon Musk

 

“There are also people who think that the vaccines against COVID put a chip in us whereby the Chinese, from any laboratory in Beijing going to control our lives.

“What does it sound like, a joke?”

~ President of Spain, Pedro Sanchez

 

Recording with night vision camera HYCMICRO CHEETAH

 

 

Don’t use Bluetooth headsets unless strictly necessary.

Similarly, mask the camera of your mobile phone if you don’t need it.

 

Thanks to Rafa Calvin and Miguel Angel for the recordings.

 

Do you understand it now?

 

 

Connect with La Quinta Columna


See Related:

The Effects of Pulsed Microwaves and Extra Low Frequency Electromagnetic Waves on Human Brains? Governments Routinely “Classify Information” Pertaining to the Manipulation of the Human Nervous System

5G Frequencies Mimic COVID: The Evidence




GeoEngineering & Particles of Mass Destruction

GeoEngineering & Particles of Mass Destruction

 

Truth Comes to Light editor’s note: The audio recording shared here was shared by The Liberty Brothers nine years ago. It can be found at their YouTube channel. Because YouTube randomly deletes “controversial” videos, I am embedding a version that was mirrored at Odysee. It can also be found mirrored at Rumble.  Find the work of Clifford Carnicom here. Elana Freeland’s work can be found here. In light of the current genocidal “weather events” and the ongoing assault on every living being on the planet, a look back at what has been shared by researchers over the past decades can be helpful, especially for those who are just now learning about all that has been going on in the arena of the globalists’ push for “full spectrum dominance”.

~ Kathleen

 

Originally published at The Liberty Brothers YouTube, March 2015. The channel does not appear to be currently publishing new material. The last upload to the channel was six years ago. Their website link is no longer active.

 

Is Geo-Engineering transforming Earth and killing its inhabitants?

Particles of Mass Destruction

One troubling fact that we can all probably agree on is that we are being bombarded with chemicals from almost every direction. Whether it be our food, our water, our vitamins, our personal hygiene products, etc.; chemicals and their derivatives have, sadly, become a part of our daily lives.

Since few of us reading this article possess a laboratory with proper equipment, determining the type and amount of chemical poison in the above mentioned items would be nearly impossible. However, one can easily just “look up” in many areas of America and quickly discern that something is being sprayed in our skies. The idea that some sort of spraying is going on is not in dispute. The question is whether the spraying is harmless, or are we all breathing particles of mass destruction?

Perhaps no other topic, amongst the many that we have covered on The Liberty Brothers Radio Show, or that I have covered on NorthWest Liberty News, has been more divisive that the idea of “Chemtrails,” or the more accurately applied term, Geo-Engineering.

Good, and not-so-good, friends of mine seem to be evenly divided on the idea that our so-called leaders are spraying harmful particles into our atmosphere. One of my not so good friends even put a link on their respective website with the sole purpose of lampooning yours truly… C’est la vie.

One fact that is not in dispute is the pedigrees of our panel of guests who were invited on The Liberty Brothers Radio Show to discuss everything Geo-Engineering. Joining Jason and myself for the entire 2-hour broadcast was a virtual “all-star” cast, as we welcomed:

Clifford Carnicom – Clifford Carnicom is a self-employed professional computer consultant in Santa Fe, New Mexico for the past thirteen years. He provides unique on-site personal services to small businesses and individuals including system analysis, networking, software development, and website consultation design, and implementation services.

Clifford Carnicom is also the founder and President of the Carnicom Institute, a non-profit research and educational organization that is devoted to environmental and health issues. Clifford also worked as a technical research scientist acting in a professional capacity supporting analysis and development of major Department of Defense physical and weapons modeling systems, with extensive computer programming and system application development experience. He has held a Top Secret/SCI clearance. He was appointed for and completed two years of intensive graduate level studies in mathematics, statistics, computer science, and geodesy under the auspices of the Department of Defense.

Elana Freeland – Elana Freeland came of political age during the COINTELPRO decade of Vietnam, street riots, political assassinations, and all-night rap sessions about the downfall of the Establishment. Researching Sub Rosa America included discovering how deeply her US Navy father was enmeshed with the very military-industrial complex she was writing about, and like the characters in the book, learning how every major event and personality in the United States political establishment over the past forty years is tied in one way or another to the assassination of John F. Kennedy in Dallas.

She has a BA in creative writing and wrote her Master’s thesis on historiography. Besides ghostwriting books on a variety of subjects, she has just finished a book on chemtrails and HAARP for Feral House Press

Billy Hayes- Billy Hayes, a good friend of the show, is known in Geo-Engineering circles as the “HAARP Man,” as Billy helped design, engineer and implement the well-known, HAARP Project.

 

Cover image credit: SeashellGypsy




Zionists, War, Election Madness, Southeast Horror, and Longshoreman Strike Happening Simultaneously!

Zionists, War, Election Madness, Southeast Horror, and Longshoreman Strike Happening Simultaneously!

by Gary D. Barnett
October 2, 2023

 

“Maybe you’re just wandering around out here with your thumb up your ass, waiting for some answer that might let you off the hook.”

~ Peter Matthiessen, In Paradise

 

The only thing I believe is not to believe, but to know. Believe nothing coming from the government or media, trust nothing without extreme scrutiny, accept that nothing is accidental or coincidental, and that everything happens for a reason, and therefore is planned in advance and by design. To live in this manner is eye-opening, and lends itself to a life protected by sanity and critical thinking. Without this attitude, one is subject to every form of propaganda, due to a dependence on seeking a false reality based upon the opinions of others. This is merely a recipe for an enslaved tyranny.

What a life of governance comes down to is simply a State-sanctioned complicity of terror necessary in order to control the masses. The more chaos created, the more plotted risks at hand, the easier it becomes to rule the herd. Simultaneous threats coming from every angle will confuse the crowd, allowing for unsettled and unbridled havoc; upsetting the entirety of the natural order of things to such an extent as to even further divide this ignorant, weak, and pathetic population.

Most everything happening today is intimately tied together. These seemingly separate events all coincide with the evil agendas of the State and its ruling cabal. The evil Zionists, with their owned and controlled U.S. government partner, are committing genocide against the Palestinians, but at the same time are attacking Lebanon, aggressively I might add, all with U.S. funding and collusion. The same is true of the Ukraine fiasco, with both being used to transfer tens of billions of dollars to the so-called ‘elite’ through extensive money-laundering means, and wealth transfers to the monsters in power. Because of this insane aggression, Iran has begun an attack against Israel, a defensive position I might add, and this could lead to at least a vast regional war in the Mideast that will affect all of you. This is exactly what the Zionists wanted, and if the U.S. physically joins in this war, there will be no end to the slaughter and risk involved.

At the same time, the so-called U.S. ‘election’ cycle is coming to a head in one month, which could cause domestic chaos at levels never seen, allowing for more control measures by this heinous government, including partial or massive martial law controls over large swaths of this country. In essence, this could lead to domestic and international war concurrently, causing unrest in an already fragile atmosphere due to many other connecting factors.

Hurricane Helene, a storm that was almost certainly created, guided, and enhanced in order to destroy large portions of the Southeast U.S., fits in perfectly with the destruction of food sources sought by the globalists, the fake ‘climate change’ agenda, elimination of farming causing huge shortages, supply line disruption, an insurance implosion, famine, and the destruction of vital resources necessary for day to day life. All this is happening just after the abominable U.N, with the consent of 193 countries, (governments) just put forth its evil “Pact for the Future,” all based on using manipulated weather events as a springboard to restrict, control, and regulate the globe based on fake ’emergency’ events.

At the same time, the entire East coast and Gulf regions, are facing a dockworker’s strike that could literally shut down much of the country’s ability to get food and vital goods delivered, all during the total chaos specifically created by this piece of shit government, its corporations, its banks, its military, and all the involved partnered State bureaucracies. Remember, all of what I am describing, and this is only a partial list, is happening in tandem, and each piece of this puzzle is completely connected, which did not happen by accident.

While all this is going on at the same time, the threat of more bogus ‘viruses’ and ‘pandemics,’ are being floated as imminent in the near future, which could lead to, and during these insane times of total madness, more lockdowns, restrictions, poisonous bioweapon injections, job loss, and bans on travel. All of this and much more is certainly possible given the monumental challenges facing so many already, with more madness to come.

We are also just one step away from full digitization of currency in all aspects of the financial system, this due to the quantity of complicit and connecting tragedies being purposely foisted on all at the same time. The State needs assumed multiple threats and catastrophes, so that the sheep will accept any and every mandate and order from the ruling class so as to get government stipends for goods and services, and permission to simply exist without constant extreme harassment or worse during the coming chaos.

In just the past few days, the infrastructure in a large portion of the U.S. has been completely decimated, communications, utilities, and internet have been destroyed or shut down, food and fuel are non-existent in much of the Southeast, and the rest of the country will be unable to get the food and goods necessary due to the very suspicious timing of the dock workers strike that coincides perfectly with all the panic consuming so many.

As I write this, there are multiple reports of Bank of America customers not being able to access their accounts, or if possible to access, many are showing zero balances, with the disclaimer that balances cannot currently be seen. I hope all of you try to understand the scope of, the complicity, the timing, the collusion, and the conspiratorial nature of all this simultaneous madness. This once again is not accidental, and I hope you are prepared for any and every possible inconvenience, aggression, and dire threat awaiting to be released on the masses during this insane assault on humanity.

“The reason it is difficult is that we have been conditioned to laugh at conspiracy theories, and few people will risk public ridicule by advocating them. On the other hand, to endorse the accidental view is absurd. Almost all of history is an unbroken trail of one conspiracy after another. Conspiracies are the norm, not the exception.”

~ G. Edward Griffin

 

Reference links:

UN Pact for the Future

How to steer hurricanes

Longshore Union threatens to cripple the U.S.

Bank of America down

Iran and Israel declare war

North Carolina (and the entire Southeast) damage far underestimated

 

 

Connect with Gary D. Barnett substackwebsite

Cover image credit: TungArt7




Covid, 9/11 & Forever War

Covid, 9/11 & Forever War
From the war on terror to the “pandemic”, the elite are constructing fake threats to start wars that never have to end. 

by Kit Knightly, OffGuardian
originally published September 13, 2021

 

 

“The war was not meant to be won. It was meant to be continuous.”

George Orwell, 1984

 

Our 9/11 coverage this year, the 20th anniversary, has been focused on viewing the attacks of 2001 through the lens of the Covid “pandemic” rollout.

The point is not that both Covid19 and 9/11 are necessarily part of the same grand plan, were carried out by the same people, or were in any way directly connected. Rather, they are thematically connected, on the meta-level.

They spring from the same collective urge all rulers and governments harbour, and are employed to the same end.

They are different tools designed to achieve the same end. Different approaches to the same problem. Different evolutionary stages of the same animal: The decades-long change in the core aims of warfare and even the very meaning of “war” itself.

War has always been vital to the preservation of the state. Wars make rulers rich, and people scared. They unite nations behind leaders, and distract from domestic political issues.

But, as nations become more powerful, weapon technology more advanced, and global power centralises in giant corporations rather than nations, war – in the traditional sense – becomes more expensive, more dangerous, and largely meaningless.

Essentially the old-fashioned motivations for warfare no longer apply, but the ancillary domestic benefits of war-like policy remain. While the state, and their corporate backers, no longer need to take part in pitched battles over the best farmland, they do still need their subjects to believe they are under attack.

In short, by necessity, “war” has gradually shifted from genuine inter-state conflicts over control of resources, into a top-down tool of psychological manipulation.

And the first stage of that evolution was 9/11.

9/11 and the war on terror

9/11 was an inside job. Any objective examination of the evidence can only lead to that conclusion. (I’m not going to lay that out here, we have dozens of articles detailing that. That’s not what I’m writing about today.)

The US government blew up their own buildings, killed their own civilians, terrified their own people. The ruling class engaging in what Orwell called “war against their subjects”, in a very literal sense.

Much like the Reichstag fire in Nazi Germany, this staged “attack” was done to create a war-like mentality. To make people believe they were under threat, and serve as the basis for new “temporary emergency powers” for the government.

But 9/11 went further, serving as the casus belli for a war: “The war on terror”.

The War on Terror was a new kind of war, yes it was used as a starting point for more traditional wars in Afghanistan and Iraq, and then proxy wars in Syria, Libya and Yemen, but its main target was actually domestic. A nationwide psy-op war designed to keep 350 million people in a semi-permanent state of fear.

It was the natural next step in the Orwellian redefinition of “war” as a concept.

If the primary aims of your war are a) To maintain domestic control of your population, and b) To funnel tax-payer money into bloated contracts with the private sector, then do you really need to declare war on a foreign country?

In fact, do you need an actual physical “war” at all? Isn’t the idea of a war just as good?

And if all you need is the idea of a war, what better way than to declare war on an idea. Why not make your enemy an abstract concept?

Because the great thing about going to war on an abstract concept is you can’t ever lose, and you never have to win. The war can go on forever.

This idea was first trialled with “the war on drugs”. But that didn’t work because a) people actually quite like drugs and b) Drugs are a vital income stream for the deep state. So it fizzled.

The war on terror is better. Since “terror” is an abstract noun with no solid reality, it can mean anything you want it to mean. “The war on terror” can be domestic or foreign, political or military, overt or covert or both. It can’t be won, it can’t be lost, and it only ends when you say it does.

It’s perfect.

Well, almost perfect.

There are still a few issues.

For example, it’s actually quite difficult to keep people afraid of an abstract concept. You need real-world reminders. Essentially, for the war on terror to continue, you need to keep reminding people terror is out there. Which means terrorism needs to happen. Which means either letting it happen or making it happen (the vast majority of the time it’s the latter).

If you’re staging terror attacks they either have to be real, resulting in real victims and real grieving families asking real questions…or they’re fake, meaning paying actors. Either way is logistically complicated, difficult to control and potentially embarrassing.

There’s also the problem of the terrorists themselves. You’ve publicly declared war on them…but they’re also very useful. There’s a reason you’ve funded them for decades. The inevitable result is you end up with “good terrorists” in country A, and “bad terrorists” in Country B. And when they are revealed to be essentially exactly the same, well that looks bad.

But the biggest problem, really, is that it caps your ambition.

You may have chosen an abstract concept as the target of your war, but that concept needs to take human form somehow. And any human enemy can only be so scary, and can only do so much damage. There’s no way you can frighten everyone at once that way.

Plus, picking a human enemy – along racial, national, ethnic or ideological lines – is inescapably divisive. You can’t ever unite everyone behind that flag.

In short, a war on terror and terrorists is fine if you want to rule a country, but what if you want to rule a planet?

Well, what you need then is a new enemy. An enemy that can be anywhere and everywhere, and that definitely isn’t human.

The war on Covid

The Covid19 “pandemic” has been pitched to the public as a war from the beginning.

As early as March 2020, the UN Secretary General was urging countries to “declare war on the virus” and already calling Covid “the greatest threat since World War II”. A sentiment UN spokespeople have repeated. A lot.

National leaders were just as eager to equate Covid as a new grand cause, in line with the fight against fascism.

Italy’s Prime Minister referred to the nation’s “darkest hour”. New South Wales premier Gladys Berejiklian told the press “this is literally a war” just last month.

In the UK, the government made numerous transparent attempts to instil a Churchillian “spirit of the Blitz” atmosphere. Unashamedly working World War II parallels into all their Covid messaging, the Queen’s cloying public speech of shamelessly using the line We’ll Meet Again.

In America, ever the hub of military metaphors, Trump called himself a “wartime President” fighting an “invisible enemy”. Former Governor of New York Andrew Cuomo referred to healthcare professionals as “soldiers” in the battle against Covid.

Worldwide, pundits frequently compare Covid to the war on terror, and Covid to terrorists. The war metaphor has been ubiquitous in speeches, headlines and TV spots.

The message is clear and simple: The virus is our enemy. We are at war.

And this war really is perfect.

It has all the benefits of a real war, and none of the drawbacks. All the ephemeral malleability of the “war on terror”, and none of its potential complications.

Think about it…

In the name of Covid we have seen taxation, censorship, surveillance, state expenditure to the private sector and state powers all increase. These are all the cliche “emergency powers” the state seeks out in wartime.

And they’ve achieved it with a simple three-stage trick.

First, take a virus, give it a name and attribute to it the exact same symptoms of every other cold and flu virus. You just created a new disease.

Second, take a test that can “find anything in anybody”, run it on everyone who goes into hospital (especially the terminally ill) and change the legal definition of “cause of death”. You just created “deaths” from your new disease.

Third, start running that same test on everyone, multiple times a week. You just created millions upon millions of “asymptomatic cases”.

Combine these three, and you have created a “pandemic”.

They created an enemy out of thin air, through a wave of propaganda and statistical manipulation. “Covid” is nothing but a filter, a lens placed in front of the public eye that distorts reality without actually changing anything at all.

Just as with the “war on terror”, the real threat is almost entirely imaginary, but this time the optics are so much better. Instead of worshipping the troops, we now pay homage to “healthcare heroes”, the “soldiers on the frontline against the virus”. No bombs, no violence, just dancing nurses.

And what can’t happen with Covid? Simple, anything they don’t want to happen. Because of the very nature of the manufactured pandemic, they have total control of the narrative.

They can control the “cases” through the tests. They can control the “deaths” through the definition of “cause of death”. They can just tweak the meaning of a word here and there, and start and stop the “pandemic” on a whim. They can slow down the “spread”, or speed it up. Introduce a new test or treatment or “cure” it, then create a new variant to bring it back.

This war doesn’t even really exist, so it never has to end and they definitely can’t lose.

Meanwhile, every new law that passes expands the power of the state over the citizen, and every step of the way there new bloated private sector contracts up for grabs. Testing and tracing and PPE. Vaccines and ventilators and quarantine hotels. Public money is pouring into private hands.

And the best part? It’s all being done in the name of “helping people”.

Following 9/11, the Patriot Act empowered mass surveillance, detention without charge and huge infringement of civil rights, because people might be terrorists.

Now, allegedly anti-Covid “public health measures” are allowing the exact same things…because people might be sick.

The state has transformed. What was once considered paranoid and aggressive, is now simply beneficent and paternalistic.

That’s the genius of the War on Covid.

The real forever war

So…how are Covid and 9/11 linked?

One flows directly into the other. They form a continuum of control narratives designed to frighten people into accepting draconian limitations on their freedom, whilst justifying a permanent society-wide warlike mentality.

“The war on terror” and the “war on Covid” are twin psy-ops that show the transformation of “war” from a foreign policy into a purely domestic one.

Orwell described it perfectly in 1984:

War, it will be seen, is now a purely internal affair. In the past, the ruling groups of all countries, although they might recognize their common interest and therefore limit the destructiveness of war, did fight against one another, and the victor always plundered the vanquished. In our own day they are not fighting against one another at all. The war is waged by each ruling group against its own subjects, and the object of the war is not to make or prevent conquests of territory, but to keep the structure of society intact.

In just the last two years we have all seen the truth of this. Covid has shown us supposedly enemy nations suddenly come to an accord and demonstrate almost total unity of purpose to spread one big lie.

The global capitalist hegemony doesn’t need to conquer land or steal resources anymore. They already own everything worth owning, all they need now is to control their workers and preserve the inequality they have created.

That’s the real war being waged here. Not the ridiculous war on terror. And not the laughable war on Covid. No, the real “forever war” is what Niels Harrit calls the vertical war, waged by the very top against everyone below them.

Covid is the most recent and most overt expression of this, but for years now the corporate media has been the spokesperson of the authoritarian heart of the state.

I have written before that we are entering the era of “progressive” statism. Where tyranny is sold as a regrettable inevitability and our leaders are portrayed as a new breed of reluctant dictators, sculpting dystopian political landscapes out of necessity, and with only the purest intentions.

We’re told that our caring masters aren’t controlling or dictatorial because they want to be, but because they need to be, for our sake.

The “great reset” is not a malign “conspiracy theory”, it’s just our kindly overlords child-proofing the world to protect us from ourselves. Tearing our society down so they can build back better into a neo-feudal utopia, where nobody owns anything and everyone is happy and everyone does what they’re told…or else.

This “pandemic” is the thin end of a rapidly widening wedge. Next comes the flu and obesity and global warming. No more meat. No more sugar. No more vacations. They’re bad for you, and bad for the planet, and bad for the polar bears.

Ban homeschools and protests and misinformation. Ban the wrong kind of books and the wrong kind of speech and the wrong kind of thoughts.

Wear the mask and take the jab and live in the pod and eat the bugs.

Global hegemony isn’t going to come about via traditional warfare or Imperial conquest, instead it is being shaped by a conglomeration of restrictions on individual freedom.

That’s the war that links 9/11 and Covid. The real war, and it’s not against drugs, or terrorism or even Covid…it’s against us.

 

Connect with OffGuardian

Cover image credit: DangrafArt




Recent Study Shows Self-Assembly Nanobots in the COVID-19 Injectables

Recent Study Shows Self-Assembly Nanobots in the COVID-19 Injectables
Research from Korea and Japan confirm previous reports of nanotech in the COVID-19 

by Greg Reese, The Reese Report
September 11, 2024

 

 

Recently published research from Korea and Japan confirm previous reports we’ve heard of nanotech in the COVID-19 injectables.

Contents of the COVID-19 injectables produced by Pfizer and Moderna were examined under a stereo-microscope at four-hundred-times magnification. Specimens were cultured in different media to observe the effect they had on living cells.

The study concluded that the anomalous injuries that have occurred worldwide since the injectables were “pressed upon billions of individuals,” were caused by the nanotechnology contents of the COVID-19 injectables.

The research found cellular toxicity, and over the course of a few weeks, simple one dimensional structures grew into complex three dimensional structures. Numerous artificial self-assembling nano-sized objects of many different shapes. Including animated worm-like entities, discs, chains, spirals, tubes, and right-angle structures containing other artificial structures within them. Some structures even “seemed to appear and then disappear over time.” All of this was found to be well “beyond any expected and acceptable levels of contamination.”

This was first reported on nearly three years ago by Ricardo Delgado and La Quinta Columna, out of Spain. Who found a relationship between the nano-tech and 5G

“The Fifth Column recently published their findings and conclusions on the strange self-assembling nano tech they discovered in the Pfizer mRNA vaccines via Optical Microscopy Analysis.”

The objects they found in the vaccine correspond with known items in the scientific record. And the conclusion they come to seems quite clear, that the well documented scientific goal to use nanotechnology in living human beings to form networks capable of controlling several nanomachines, is currently being deployed in the COV-19 vaccines”
~ Greg Reese “5G Powered Graphene Based Nano-Tech in the Pfizer Vaccine” (2022)

5G towers were fired up for the first time in Wuhan the same time they were reportedly experiencing a COVID-19 outbreak. David Icke said there was a relationship between COVID-19 and 5G back in 2020. And it got him banned.

Using Dark-field microscopy, Doctor Ana Maria Mihalcea has found these same artificial nano-structures in the blood of both those who got the COVID-19 injectables, and those who did not.

Decades ago, Silicon Valley guru Ray Kurzweil, said that by 2045, most of human civilization will be non-biological machines thanks to the advancements of nano-robots which could cure aging and death.

While talk of mRNA is making it easily into the mainstream, the nano-tech is being ignored.

According to the work at La Quinta Columna, there is no mRNA spike protein. According to their research, it’s all about the nano-tech. Which they recently reported can be “totally destroyed” by a nicotine mixture derived from tobacco and distilled water.

Hopefully this nicotine study will be repeated by other independent scientists, because the mass infection of humanity with experimental nano-tech has now been ignored for at least three years. And all sides of political leadership are steering us towards a brave new world of A.I. and the internet of things. Where being an organic human being seems to not be an option.

 

Connect with Greg Reese substack | Rumble




The Untold History of the GWEN Towers Military Psyop: Cell Towers. Cellphones. Google Maps. Nukes. Poisons Dumped From Our Skies. Underground Bases & Tunnels.

The Untold History of the GWEN Towers Military Psyop: Cell Towers. Cellphones. Google Maps. Nukes. Poisons Dumped From Our Skies. Underground Bases & Tunnels.

 

“To tie it all together, we first must go back in time to 1941, when The Five Eyes alliance was formed. The Five Eyes consisted of the United States, the United Kingdom, Canada, Australia, and New Zealand, agreeing to joint cooperation in intelligence, which means surveillance, which means spying.”

[…]

“They converted the GWEN Towers into radiation weapons, also known as nukes but, before they can nuke us using their radiation towers, they needed to map us. They used the maps to determine where more towers needed to go to ensure full coverage of the United States…”

~ Agent131711, What if They’re NOT 5G Towers? Untold History of GWEN Towers: a Deep Dive into an 80-Year PSYOP

 

Truth Comes to Light editor’s note:

Below you will find key excerpts from Agent131711’s substack article “What if They’re NOT 5G Towers? Untold History of GWEN Towers: a Deep Dive into an 80-Year PSYOP“. I recommend reading the entire article as it includes much greater detail, many images, videos and reference links. Those familiar with Agent131711’s work will recognize his intelligent research and unique dot-connecting skills, presented in his (often-humorous) easy-to-read style.  ~ Kathleen

 

What if They’re NOT 5G Towers? Untold History of GWEN Towers: a Deep Dive into an 80-Year PSYOP

by Agent131711
June 23, 2024

 

[…]

In the early 1980s, nukes were such a threat that television stations, like Channel 4, did its part to warn people by broadcasting shows like QED Nuclear War; A Guide To Armageddon which basically told the public, when the nuke hits, you and your family are going to burn to death. Then there was CBS news, who aired A Day Called X which explained what could happen to Portland, Oregon when it is attacked. Meanwhile, Bombs Will Make the Rainbow Break, had children explain to adult viewers how terrified they were of being nuked. Reliability and Risk: Computers and Nuclear War outlined how a simple computer malfunction could escalate into a national crisis, and let’s not forget about Protect and Survive Nuclear Explosions, produced by the UK government to explain all of the aforementioned. Time Life published a show called Nuclear Strategy for Beginners, informing the public that there were currently over 50,000 nuclear weapons in the world, and that is just to name a few. Based on the media’s involvement, clearly, citizens needed to recognize that nuclear weapon attacks were a grave concern for them. Although it was a time of peace, because of the fear of nukes, it was imperative that the US and its allies take proactive measures. Enter: The GWEN Towers.

GWEN stands for Ground Wave Emergency Network. The towers were a network of radio transmitters and receivers installed in the United States in the 1980s as a backup communication system in the event of a nuclear attack. These towers were designed to transmit low-frequency radio signals which would allow for communications to continue in the event of a nuclear explosion disrupting traditional radio systems (keep playing along here). So, the nuke hits us and decimates traditional communication methods, but it’s totally fine because the GWEN towers utilize a network of underground cables that work with 240 radio transceivers distributed across the continental USA (which also work on the same low frequency) therefore military and government co . Praise Jesus! – That’s the official story, just roll with it for a moment.

The Bizarre History of the GWEN Towers

In his 1985 inaugural address, President Ronald Reagan said, “A nuclear war cannot be won and must never be fought.”… but then, that exact same year, literally the same f*cking year, the Air Force began constructing the GWEN towers, which the Reagan administration said were a key component of its strategy for “supporting controlled nuclear counter-attacks over a protracted period.”. These towers were verbally sold to the public as protection against the Soviets who were planning to nuke us, hence the urgent need to get them installed pronto, even though a nuclear war must never be fought

As part of the Pentagon’s Ground Wave Emergency Network, each tower was 299 feet tall (91 meters) and featured guy wires with a steel trusswork structure. Yes, 299 feet, not 300, and each tower cost $1.4 million. The entire system was planned to cost a billion dollars (thank God we cut it off at 299 feet. Imagine the cost with the added foot). Here’s a little diagram for you, so you can see what your hard-earned tax money bought you:

The truth was, citizens across the nation were pointing out that it doesn’t make sense, “Wouldn’t the Soviets aim for the GWEN towers? Wouldn’t this make my neighborhood a massive target if one is in it?”, they asked.

Because it didn’t make a damn bit of sense and government wasn’t providing adequate answers, citizens began becoming highly suspicious of what was actually going on here. To get the public to STFU, the Department of Defense and other military agencies sent representatives to hold public hearings in some of the areas of the installs. The purpose of these hearings was to assure the citizens that the towers were just for Soviet nukes, communications and counter attack stuffs (for their safety, of course) and everything else was conspiracy theory (technically, the word at the time was misinformation)…

[…]

The peoples outrage was ignored, hazard studies were hastily performed and marginal at best, and the towers were rush-installed across the USA because the safety of the people must come before the safety of the people because nuclear war was at our doorstep! Makes sense to me! Oh, and they were also put up all over Canada…

[…]

What the general populous didn’t know was that behind the scenes, in 1996, Presidential Decision Directive NSTC-6 was penned. This directive designated the Department of Transportation (DOT) as the “lead agency for all Federal civil GPS matters”. In addition, the President directed the DOT to “develop and implement U.S. Government augmentations to the basic GPS for transportation applications.”. In normal people speak, he was like, “I command you to expand the GPS system!” (then he ate a handful of grapes, brought to him by a squire, on a plate made of solid gold).

Less than a year later, in January of 1997, the DOT formed an interagency DGPS Executive Steering Group to investigate the development of a nationwide GPS system. The four-letter group was like, “You know, it would be really nice of us if we saved the taxpayers money for once. What could we do to save them a few bucks? AH HA! What if we could save them money by building this newfangled GPS system upon existing infrastructure?!”. (You totally see where this is going, right?…)

Then, someone within that 1997 DGPS group was like, “Yo! We got those GWEN Towers that the military just blew hundreds-of-millions-or-maybe-a-billion of the peoples money to build and they don’t work. It would be a shame to waste them, so you just wanna use those?”. The group was like, “And those all nukes suddenly aren’t a problem, so we totally should!”.

So, in 1998, with the fear of nukes forgotten, the US Department of Transportation in conjunction with the US Coast Guard and Department of Homeland Security proposed repurposing 29 of the existing GWEN towers. Those 299-foot GWENs were now officially suggested to be used to construct a Nationwide Global Positioning SystemThe proposal document is now scrubbed from the US Coast Guard / DHS site…

[…]

Then they started converting the gosh-darn-don’t-work GWENs into GPS’s…

[…]

So, we deployed the towers for the second (known) time in 1996, then randomly decided they didn’t work. Instead of fixing them, less than a year later a make-a-massive-GPS-system team was assembled and less than a year after that (which was under 24 months after the second known deployment) we already had a plan to use the towers for a totally different purpose than the nukes which they were rush-installed for… and this is where sh*t starts to get crazy…

The Mindf*ck, Part 1:

In 1998, (yes Sweetheart, it was indeed the exact same year the military and DOT officially proposed reusing those 299-foot-failure-towers that the DOD fought so hard to get installed against the people’s wishes cuz nukes), two men, Larry Page and Sergey Brin did something history-changing… they launched Google.

During the same timeframe, the CIA had launched its own business called In-Q-Tel. In-Q-Tel was a Silicon Valley venture capital fund whose mission was to invest in tax dollars in start-up companies because why the hell not?

In 1999 and 2000, Saddam Hussein was still whipping up Weapons of Mass Destruction even though he had been told to stop (don’t worry babe, he would later throw them all away and destroy all evidence of them existing, but that is later in the timeline. At this point, we are very afraid of what this mad man will do with his WMDs). It was a cryin’ shame those towers didn’t work to protect us but at least the good government found a new use for ‘em.

This brings us to 2001, a year when something nobody would have ever expected to happen, happened. It was not a Soviet nuke that attacked the USA. It wasn’t a Saddam WMD, no ma’am, it sure wasn’t. It was actually a dude, living in a hole in a desert far, far away, who sent his men, the terrorists, to the USA to hijack airplanes and fly them into steel towers so the US Military could retaliate by obliviating his country.

And, I’m sure it’s completely nonrelated, but did you know that shortly after the terrorists airplanes cut through those steel skyscrapers like a hot knife in butter, 3G became operational in the USA? Well technically, it would later be realized that we have no idea when exactly 3G became operational, but we can infer it was 2002 because this is when the people learned of it…

[…]

March 20th, 2003: The US invades Iraq. For you youngsters that don’t remember why exactly we invaded this country, there was a laundry list of reasons, which meant everyone could choose the reason, or reasons, they liked best…

[…]

97 days post-invasion: Call it irony, call it fate, perhaps it was destiny or just good luck, it just-so-happened that In-Q-Tel (the CIA), while scouting for investments, found a company desperately in need of the people’s tax money. This company was called Keyhole. The story is that Keyhole was somehow developing cutting-edge mapping technology… just like their investors, the CIA, did back in the 1960s. Do you know what the CIAs 1960s cutting edge mapping and spying program was called? Go ahead and guess…

ANSWER: KEYHOLE! IT WAS F*CKING CALLED KEYHOLE! You can’t make this sh*t up…

[…]

The following year, while the War in Iraq was raging and the military was trying so damn hard to locate Osama Bin Laden’s hole and Saddam’s Weapons of Mass Destruction, despite Keyhole being funded by tax dollars and used by the CIA, Pentagon and CNN, someone popped up out of the blue and bought it. That someone was Google.

[…]

Then, within months, Google Maps was released

[…]

And shortly after, Google Earth Viewer was released using the identical technology used to map and spy on Iraq combined with the (GWEN Tower) GPS system. Yes, the technology was now sold to the American people as being helpful tools, not a tax-funded military spy system. Isn’t it to cool that we can zoom in on your house?…

[…]

Google launched Google Federal, which is exactly what it sounds like. Google Federal hired managers and staff from the Army, Air Force, CIA, Raytheon and Lockheed Martin. They landed a bunch of intelligence-related contracts, including with the NSA.

Researchers on Team Truth began looking into these GWEN Towers, now being called 3G Towers, and what they discovered was shocking…

[Here Agent131711 shares a clip from this video, uploaded to YouTube in 2013]

 Mindf*ck Part 2: The Satellite Photos

And if that wasn’t odd enough, as we looked at “Satellite photos”, we began realizing there were no airplanes in any photo…

[…]

How is this possible? If the satellite is in space, surely airplanes would be between the cartoon satellite and Earth, right?…

[…]

In fact, there are a sh*t ton of planes in the sky…

[…]

You’d think, if the satellite is at this height, or higher, some would get in the photo, right?…

…yet none are in any satellite photo…

[…]

Not even a flock of seagulls…

[…]

After discovering satellites are actually airplanes and balloons, I assumed they must be flying under the normal level of planes, because how else would planes not get in the photos? Yet that can’t be true because when have you ever been on a plane and flown over a giant balloon? Never…

[…]

But the icing on the cake of strangeness was there were no airplanes in airports either!…

[…]

No planes in between the satellite and the airport and no planes in the airport itself…

[…]

And every satellite photo I could find was like this!

 

This photo was taken by the International Space Station and still no planes!…

[…]

It didn’t make any sense… until today, when it hit me…

THESE AREN’T PHOTOS, THEY ARE A.I. CGI! THAT IS WHY THERE ARE NO PLANES ANYWHERE! This is why birds do not get in the photos. This is why there’s never a hot air balloon tour blocking the satellite photo over the Grand Canyon. There’s no clouds, no rain, no little Cessna airplanes Cloud Seeding. This is why nothing gets between the satellite and the ground! These images are not coming from something orbiting in outer space while the earth spins at 1,000 mph. These images are not even from balloons or planes. These are nothing more than 3D graphics coming from cutting-edge GPS mapping! My mind is officially blown.

Need more proof? Yes you do, because you are on Team Truth and you refuse to settle for someone saying something so outlandish without evidence, so bear with me here: I am not a technology person, but you don’t need to be a techie to understand what I am about to show you. I located this video, uploaded in 2016, which appears to show the back-end inner-workings of Apple’s map system, which is the same as Googles (although I would guess Googles is far more advanced). Whoever the person is who uploaded this video also uploaded another of the same nature. It appears they are part of the development team for the map system, because in their other video they appear to be programming locations on the back-end of Apple maps. But what they are doing doesn’t matter, just watch and you will see, it is all CGI with photos taken from the ground added in: (2:34 video)

[Here he shares a video clip found at Internet Archives]

[…]

Mindf*ck Part 3: Piecing the Puzzle Together = Major Revelations

To tie it all together, we first must go back in time to 1941, when The Five Eyes alliance was formed. The Five Eyes consisted of the United States, the United Kingdom, Canada, Australia, and New Zealand, agreeing to joint cooperation in intelligence, which means surveillance, which means spying.

Only a few years after the formation of the worldwide spying collaboration, The Federation of American Scientists and Philip Ragan Associates began publishing Atomic Bomb content which warned of the threat of nuclear war coming to American and our allies, and Oh Thank God the Five Spies Eyes was just established because now they could save the people through mass surveillance! (This is the first video they released in the 1940s. It’s 9 minutes long and worth your time to watch the extreme propaganda.)

[Here he shares the One World or None video, which can be found at Archive.org.]

Only four years later, on October 24, 1945, the United Nations was established.

Only a matter of years after that, the CIA was Keyholing and Operation LAC was taking place.

Operation LAC

Operation Large Area Coverage (LAC) took place in the 1950s and involved the United States military, Canada and Britain dousing select cities within their countries with Zinc Cadmium Sulfide, a toxic glowing compound. The alleged purpose, as we have been told, was to simulate what would happen during a chemical or biological attack, specifically, they wanted to know how far the chemicals would disperse. So, to simulate an attack, the nations sprayed toxic chemicals all over their countries. That actually happened…

[…]

Operation LAC never made sense to me, but neither does the majority of the military experiments so I didn’t put much thought into it… until today.

Let’s switch gears for a moment.

How Mapping Works

Quote, “Radar, sonar and lidar can determine an object’s distance, or range. For that measurement, time plays an important role. Lidar, radar and sonar systems all include timing devices. Their clocks record the length of time needed for a wave to travel to an object and back. The farther the distance, the longer it takes for an echo to return.

Radar, sonar and lidar also can reveal information about an object’s shape, size, material and direction…. lidar helps read the lay of the land or features on Earth’s surface. Lidar’s laser pulses can penetrate forest cover to record the shape of the ground below. That makes this technology especially valuable for mapping.

[…]

The Revelation

I’m pretty damn sure Operation LACs Zinc Cadmium Sulfide was not used to simulate a biological attack and was instead used for mapping purposes for the military and CIA Keyhole spying program as part of The Five Eyes. The metals in Zinc Cadmium Sulfate, dumped over major cities, allowed for the sonar / lidar signals to reflect evenly.

[…]

Occam’s Razor: My theory is, the reason they wanted the materials they dispersed to glow was to ensure the ground was fully covered for the mapping… which makes a helluva lot more sense than dousing your countries major cities in chemicals to see what a biological attack would look like when you have no idea which biological materials a hostile nation would have chosen to release let alone where the enemy would have chosen to release them or even what method they would use to disperse them. They selected main cities to be coated in chemicals because that was where they wanted to test out mapping. FFS, the name of the operation was Operation LARGE AREA COVERAGE.

Google / CIA / Pentagon / DHS / NSA / Dot Mapping & Bombshell Revelations

We know graphene oxide, along with Smart Dust, is coming down in rain water and snow….

[…]

Smart Dust Graphene is nanotechnology, “no bigger than a grain of sand”…

[…]

It can be deployed into the sky by aircraft. In fact, they are now researching having unmanned aerial vehicles deploy it…

[…]

What is released into the sky will eventually come down in the rain and snow. But why release it in the first place? It turns out that Smart Dust has a variety of uses including numerous military applications. The military uses include reconnaissance and surveillance…

[…]

But that’s not all. Smart Dust is also used by the military for …

… (pause for suspense)…

MAPPING!: IT IS USED FOR MAPPING!

[…]

Now watch how fast this timeline goes:

1940s through 1994: Ze Noookz are coming!”

1995: Second known GWEN Deployment

1996: “It doesn’t work. Let’s use it for something else” and “How ‘bout a nationwide high-tech spy system GPS?”

1997: Converted 29 of the GWEN Towers into part of the nationwide GPS system

ALSO IN 1997: Smart Dust was funded by DARPA

2002: 3G network goes live to the public and most of the tower panel ownership information is hidden from the public.

2003: The CIA’s In-Q-Tel inked the deal with Keyhole for their mapping program

2004: Google quickly bought the tax-funded Keyhole

Also in 2004, the same year Google bought Keyhole, a document was published relating to the creation of “smart clouds” using Nanotechnology…

[…]

2005, Google Maps and Navigation were released, CGI programd developed using cutting-edge mapping.

2007reports of clouds falling to the ground began appearing, but were quickly labeled tinfoil hat nonsense and “edited videos”:

[Here Agent131711 shares seven short YouTube videos 1  2  3 4 5 6 7.]

2008, Google fully integrated Street View into Google Earth (combined the cutting-edge mapping with real photos and videos taken from the ground)

[…]

In 2009, with strange clouds still unexplainably falling to the ground, Google Earth 5.0 was released which featured Google Ocean, followed by Google Great Lakes.

[…]

How’d they do it? I would have to assume the tax-funded GPS system on the GWEN Towers was used with DARPA-funded Smart Dust to map the country just like OPERATION LAC that took place during the same time the CIA was running Keyhole for spying and mapping. I expect that these towers may not be able to stretch across oceans, therefore, to map over large bodies of water, Smart Clouds were developed. …but it gets crazier…

Mindf*ck Part 4: The Final Piece Is Inserted Into the Puzzle

[…]

Because of the fear of nukes, the militaries of the world built Deep Underground Military Bases (D.U.M.Bs) and were heavily planning utilization of the tunnel system in the United States, including utility tunnels:

(1967 document)

[…]

Was the military truly planning to save the people from a nuclear attack? Or just themselves? Or was everything just an illusion? Or is it deeper than that?

We know these evil doers we are dealing with play the long game. While you and I plan what we will have for dinner a day in advance or we might plan a vacation a year in advance or even set a 10-year-goal, these villains have plans spanning literal centuries.

Operation LAC and the CIAs Keyhole spying and mapping took began in 1950.

45 years later, the GWEN towers were deployed for the second known time

55 years later, Google released the ultimate spying and mapping technology upon the American populous

What is 100 years after 1950? Agenda 2050, which is slotted to be, essentially, the end of the world as we know it.

To understand these evil doers, you must understand that they believe in the Revelation of Method (RoM), also known as The Law of Karma, or, as I call it, “they have to show us”. They believe that if they tell us what they are going to do before they do it they are relieved of all bad karma, regardless of terrible their actions are. The specific method they use to show us varies. It can be symbolism, phrases repeated in the media, news headlines, the method is flexible, as long as the citizens are shown what will happen…

[…]

Folks, they have spent 80 years telling us a nuke is coming which will create a massive flash followed by a radiation nightmare.

[…]

They then built the GWEN Towers. The GWENS are the machines assembled by saboteurs

[…]

They converted the GWEN Towers into radiation weapons, also known as nukes but, before they can nuke us using their radiation towers, they needed to map us. They used the maps to determine where more towers needed to go to ensure full coverage of the United States

[…]

They had to release the Google / Military mapping system to us so we can unknowingly help build it using the GPS on our cell phones and vehicles. Each time we travel somewhere with our GPS turned on we are perfecting the system.

[…]

They have already told us that when the nuke comes the government will be in their specialized underground bunkers…

[…]

Meanwhile, We the People, should Duck and Cover..

 

Connect with & support the work of Agent131711 at substack

Cover images credits:
Tom.jennings — Photo of the differential GPS gear added to
the Essex, CA GWEN site; California, USA. (Trimble gear).
US government public domain — Diagram of a US military Ground
Wave Emergency Network automated radio relay station




The Connection Between Toxic Mold, Parasites & EMFs

The Connection Between Toxic Mold, Parasites & EMFs

by Rosanne Lindsay, Traditional Naturopath, Nature of Healing
June 7, 2024
Updated from February 2022

 

Living in the material world means an attachment to wireless technology. When does an attachment become an addiction?

Can you do without a cellphone? Watching TV? Scrolling social media? How much time in a day does wireless occupy? What do you consider excessive use? Do you experience withdrawal symptoms (moodiness, irritability, depression) by going without? Would you consent to the imposition of technology at the risk of harming your health and potentially all biological life?

Unfortunately, the emotional and physical effects of invisible electromagnetic frequencies (EMFs) are not listed on the package. If you have two or more of the following devices; cell phones, computers, GPS, Smart appliances, electric cars, wearables, and Smart™ TVs, or electric cars, then there are symptoms you may never hear about.

The manufacturer does not disclose that EMFs activate the hidden world of yeast, fungus, mold, mycoplasma, Lyme spirochetes, and protozoan parasites to unhealthy levels in the human body.

The consequence of WiFi is a rise in chronic infections that can be misdiagnosed.

The industries responsible for creating this silent connection between EMFs and infection fail to take responsibility. The line between what will protect you, and what will not, has never been less clearly defined.

As 5G towers become compatible with 6G, 7G and beyond, who is responsible for the consequences?

Symptoms from exposure to mold toxins include:

  • Fatigue
  • Weakness
  • Muscle cramps
  • Headache and pain
  • Light sensitivity
  • Sinus problems
  • Abdominal pain
  • Diarrhea
  • Joint pain and stiffness
  • Cognitive issues
  • Mood dysregulation
  • Temperature regulation or dysregulation problems
  • Excessive thirst
  • Increased urination
  • Nervous system issues

The user is responsible.

Naturopath Dr. Klinghardt, of the Sophia Health Institute, shared an in vitro mold experiment comparing a mold plate shielded from electromagnetic fields to an unprotected mold plate exposed to ambient electromagnetic fields. The unprotected mold, mycoplasma, and spirochete (Lyme) reacts defensively by releasing more potent biotoxins, and by multiplying more than 600 times. This biological response can be observed anywhere in Nature; it is the desire to survive and thrive.  In 2011, the amount of cell phone radiation in a cubic inch of air was several million times higher than it had been a decade before that.

 

 

Billions of people worldwide harbor tropical worms and don’t know it. They don’t know that cell phones and cell towers trigger their activity. They don’t know that mold, parasites, and other microbes respond by becoming chronic infections. Medical doctors do not automatically rule out parasites, even though there are over one million worm species, alone, classified as helminths.

Helminths take many forms, but all of them harm their host in some way. In humans, they can live in the intestinal tract, urinary tract, bladder, or bloodstream, causing a variety of illness from malnutrition to organ failure” —Dr. Monica Botelho of Portugal’s National Institute of Health.

In endemic regions — predominantly sub-saharan Africa and Southeast Asia — flukes are responsible for the majority of all bladder and liver cancer cases. – Dr. Joachim Richter, Associate Professor at Charité Berlin and co-editor with Botelho.

Symptoms of Parasites:

Parasites Among Us

Worms R us! When in balance, worms live with us in harmony  Out of balance, they can invade and overpower any part of the body, including the eyes.

There are hundreds of large parasites that can enter the body by various modes, take up residence, and cause a variety of life-threatening diseases, including cancer. For worms to make a home in the body, the body must be conducive to their existence. The body is best suited for worms if it is depleted of essential minerals and nutrients, thus acidic.

Scientists have known for decades that helminths can turn healthy cells into diseased cells. The same is true of protozoan parasites. For instance, Chagas disease is caused by infection with the protozoan parasite T. cruzi.

It has long been established by study of Ascaris lumbricoides (phylum and species) in man as well as in laboratory hosts, that the larvae, on hatching in the small intestine, migrate through the liver to the lungs. On the eighth to ninth day after infestation, they move farther into the bronchii and then, via the trachea and esophagus, return to the intestine. It has also been shown that the larvae in their migration and development often cause extreme eosinophilia, symptoms such as shortness of breath and cough. —Naval Captain David P. Osborne, chief of surgery, Bethesda Naval Hospital 

A search of Pubmed will net hundreds of published, peer-reviewed studies describing Dirofilaria in humans, a mere drop in the worm

bucket. Dirofilaria immitis is a canine parasite that can infect humans, specifically it is a roundworm, otherwise known as a nematode. For instance, whereas Dirofilaria immitis infects the heart and lungsDirofiaria repens infects the eye.

Patented Transgenic Insects

Dirofilaria, or heartworm, is transmitted by mosquitoes. An egg gets deposited through the proboscis, which is the long, flexible tube mosquitoes use to pierce the skin. There is plenty of evidence showing that mosquitoes are genetically engineered and patented.

Despite a kill-switch gene, these transgenic mosquitoes breed in the wild. The dire consequence is the contamination of the native mosquito population. Evidence from field trials show that GMO mosquitoes have been bred for disease resistance for decades.

So, why not expect the same for GMO tics and biting flies infected with agents known to transmit Lyme disease? The CDC acknowledges that Lyme disease from multiple vectors is on the rise in the US., but offers no explanation and no solutions.

Parasites & Cancer

Tumors analyzed for pathology often come back showing worms and parasites. Parasitic invasion by a nematode worm is often mistaken for “cancer” in women presenting with breast lumps.

Filarial infection of the breast is not rare, explain the authors. “The larvae enter the lymphatic vessels of the mammary gland, causing lymphangitis, fibrosis, and disruption of lymphatic drainage.” In late, inactive phases, the larvae appear on mammography as serpiginous calcifications.  —Medwire News, 2005

Slowly, the information worming its way out into the public is that parasitic infestations represent the internal conditions called “cancer.” All cancers are, in fact, parasitic infections (with high Candida levels) even if not all parasitic infections present as cancer. Worms cause cancer. based on an acidic tissue environment.

It is no secret that the American Cancer Society knows that parasites can lead to cancer. Even the CDC publishes the fact on their website  that cases or parasitic infections are misdiagnosed as cancer.

Scientists at the Centers for Disease Control and Prevention have discovered cancer cells originating in a common tapeworm may take root in people with weakened immune systems, causing cancer-like tumors. It is the first known case of a person becoming ill from cancer cells that arose in a parasite – in this case, Hymenolepis nana, the dwarf tapeworm.

The report, in the Nov. 5 issue of the New England Journal of Medicine, raises concern that other similar cases, if they occur, may be misdiagnosed as human cancer – especially in less developed countries where this tapeworm and immune-system-suppressing illnesses like HIV are widespread.

“We were amazed when we found this new type of disease – tapeworms growing inside a person essentially getting cancer that spreads to the person, causing tumors,” said Atis Muehlenbachs, M.D., Ph.D., staff pathologist in CDC’s Infectious Diseases Pathology Branch (IDPB) and lead author of the study. “We think this type of event is rare. However, this tapeworm is found worldwide and millions of people globally suffer from conditions like HIV that weaken their immune system. So there may be more cases that are unrecognized. It’s definitely an area that deserves more study. – CDC, November 4, 2015

So why are we always the last to know?

Anti-Parasitic Protocol 

In the Age of Information, ignorance is a choice.

Today, more people diagnosed with cancer have taken matters into their own hands and begun sharing information to heal. Their choice of medicine? An inexpensive pet dewormers/antihelminths called Fenbendazole found at the local pet store. Why don’t doctors tell patients that Fenbendazole is being studied as an anti-cancer drug?

According to sources promoting this anti-worm protocol, Fenbendazole is a triple-threat to cancer: it kills cancer cells in three ways which are significant:

  1. It destroys microtubules that sustain the structure of the cancer cell and its ability to divide and multiply rapidly.It interrupts the cancer cells’ ability to process sugar, and cancer cells must metabolize sugar to survive.
  2. It boosts the production of a cancer-killing gene called p53, a gene cancer patients may lack. When p53 becomes mutated or can’t keep cancer cells in check, cancer cells can proliferate.
  3. The de-wormer also works against parasites, which might be the origin of some cancers.

Before you decide to blame all cancers on worms, realize that helminths are also being used as Immunotherapy (Helminthic Therapy) for Crohn’s disease and for malignancies. In a strange twist of fate, the earthworm’s immune system has shown an ability to kill cancer cells (in vitro). Could it be that a worm’s metabolism depends on a balance of oxygen supply and demand like their human hosts? Yes, indeed.

Is that why oxygen deprivation from EMF fields harm both host and worm?

Add Pulsed EMFs And Mix

The forces in EMFs are caused by EMF radiation, broken down into two categories:

  1. High frequency EMF include: x-rays, gamma rays, or ionizing radiation, and
  2. Low to mid frequencies include: electric power lines, radio waves, cell phones, wireless networks, smart meters, TVs, microwaves, infrared radiation, visible light, or non-ionizing radiation. These are the most dangerous emission, known to cause direct damage to DNA or cells.

Wireless communication (cell towers, phones, etc) is more dangerous because it produces pulsed EMFs. Pulsed EMFs are much more biologically active than are non-pulsed EMFs.  When introducing pulsed electric and magnetic fields into a population infested with parasites and yeast, you have a recipe for dis-ease disaster.

Today, the answers are available to anyone who has a curiosity to search the electronic database of scientific studies. Science has well established that EMF fields incite the growth of fungus, yeasts, molds, mycoplasmas, and parasites.

Just as the chemicals and metal constituents of synthetic medications serve as a food source for these  pathogens, so does radioactivity, which serves as an energy source for making food and spurring the growth of fungus. 

Those fungi able to “eat” radiation must possess melanin, the pigment found in many if not most fungal species. But up until now, melanin’s biological role in fungi—if any–has been a mystery.  —Albert Einstein College of Medicine, May 23, 2007 

Since May of 2011, the IARC classification for cell phone radiation internationally had been officially documented as a Class 2B Carcinogen. See the Cell Phone Radiation Emissions Chart from Least to Greatest head SAR level.

BioToxins

Humans are 1:10 human cells to microbes. What affects our smallest inhabitants also affects us. When our microbes perceive an attack from man-made frequencies, they release biotoxins in defense of their lives, even if it damages their host. Sit down before you watch this freakishly large worm (parasitic nematode) slither out of a dead spider host.

Biotoxins are released from microbial metabolism and die-off. This process drives inflammation in humans. As our microbes struggle to survive, they congest the host’s liver and impair digestion. The liver is unable to produce bile to digest fats which leads to a deficiency of fatty acids and eventually fatty liver disease, unrelated to alcohol.

Our microbes cause stress on the whole body, which leads to “Leaky Gut,” now an accepted term. Leaky Gut gave rise to the previously unknown field of neurogastroenterology, and the disorders of IBD, IBS, and Crohn’s disease. When the gut is “leaky,” microbes and their biotoxins leak into the bloodstream to infect other organs, including the brain, also known as “leaky brain.” In the brain, symptoms resemble depression, anxiety, and other neurological conditions.

Magnetic Fields 

Sleep is critical for cell repair and regeneration. When electrical and magnetic fields barrage the body, day and night, the stress hormone, cortisol, is stimulated, which prevents normal elimination (constipation) and detoxification. As cortisol rises, melatonin falls. Sleep is elusive.  Magnetic fields also alter the movement of minerals and metals the body. A loss of iron leads to anemia.

In 2005, Extremely low frequencies (ELF) have been documented as a possible carcinogen in children diagnosed with leukemia. More than a decade later, ELF exposures have only increased.

I personally suspect that the exposure to electromagnetic fields in the home and the microwaves from cell phone radiation are driving the virulence of many of the microbes that are naturally in us, and makes them aggressive and illness producing. Shielding patients from EMFs has been a more successful strategy to treating Lyme disease and to get people neurologically well than any of the antibiotics or any of the antimicrobial compounds. —Dr. Dietrich Klinghardt, MD, PhD, 2018

Solutions

1. EMF Shielding Tools

With the rise of EMF fields a new EMF shielding industry was born. Now you can use the benefits of wireless technology and shield yourself from is health depleting effects using the following tools:

  • purchase or make faraday cages for cell phones.
  • hardwire your computers with an Ethernet cable.
  • Shield smart meters with meter guards.
  • Wear Shungite, a mineraloid, or place shungite pyramids around the house. Since they become saturated. you will need to cleanse these stones often.
  • Paint bedrooms with EMF shielding paint.
  • Use EMF shielding material. Do not use aluminum foil which can shield and also reflect back EMFs.
  • Hardwire a cell phone, and computer.
  • Blue light blockers:
  • Use a blue light blocker covering for all your computer/laptop/tablet screens including cell phones.
  • Use blue blocking glasses when you are working on the computer (this does not protect skin.). Some people will use a blue light blocker (a thin film that covers the screen) and then also a 100% blue blocker of hard thick plastic at night. However be aware that many of the thinner unnoticable blue light coverings on the market do not protect 100% blue light.
  • Download a program (e.g.., Iris) onto your device that will automatically reduce blue light at night.

2. Cellphone-Free Communities:

If you can live without electronic devices, there are cellphone-free communities forming. The Intentional Sanctuary Lifestyle Alternative (ISLA), it is located on 40 acres on the Pacific coast of Nicaragua:

Cell phones, WiFi, wireless mice and keyboards, AirPods, smart watches, wireless printers, and all other wireless devices will be prohibited in public and private spaces throughout the property. Interest is growing, and prospective home-buyers have already invested 1/4 of the amount needed to break ground and begin building. There is space for up to 200 homes in the future.

3. Natural Mold and Parasite Detox

If you will continue using electronic devices, know the symptoms of mold poisoning and parasitic infections. Secondly, prevent infections of mold, yeast, and parasites, by keeping your immune system strong and allowing it to work for you by acquiring natural infections.

Eat clean, organic foods. Drink clean water, and avoid drinking public tap water, especially if the water tower has 5G technology on top. Seek out natural spring water.

Avoid factory-farmed foods—sugar and processed grains, coffee, chicken, fish, and red meat—which generate an acidic pH in the body. Choose natural medicines vs. synthetic medicines. Seek out natural healers to assist. And be aware of parasitic relationships among your peers. As within So without.

If you have a parasitic infection, try adding food grade diatomaceous earth. There are two strong herbs that can kill nematodes. One popular anti-parasitic herb is Thyme. Thyme is a culinary herb, but it also kills hook-worms, roundworms, threadworms, skin parasites and several types of harmful bacteria.

Other natural antifungal/antiparasitic herbs include: Black walnut hulls, high in iodine; wormwood, clove oil, oregano oil,  and consider a cleanse diet. For other remedies, consult a natural health care practitioner.

When the worm population in the human body overwhelms the immune system, it is called a hyperinfection. At this stage, it may be difficult to kill the worms with herbs unless you eat clean. Using frequencies to target parasites through a Rife machine or homeopathic (energy) preparations can directly target parasites in the body, gently and safely. However, the Rife machine does not always solve the problem since parasites can shift their frequency and hide in the body to evade death. A diet and lifestyle change will be necessary by changing your habits to prevent the problems of living with EMFs.

 

Disclaimer: The author encourages you to consult a doctor before making any health changes, especially any changes related to a specific diagnosis or condition. No information in this article should be relied upon to determine diet, make a medical diagnosis, or to determine or prescribe a treatment for a medical condition. This information is not intended to replace a one-on-one relationship with a qualified health care professional and is not intended as medical advice.

 

Related Articles:

 

Connect with Rosanne Lindsay

Cover ai-generated image credit: bluemoont




More Evidence That All Of Life Is Contaminated With Plastic Polymers: “UNM Researchers Find Microplastics in Canine and Human Testicular Tissue” — And Associated Lower Sperm Count

More Evidence That All Of Life Is Contaminated With Plastic Polymers: “UNM Researchers Find Microplastics in Canine and Human Testicular Tissue” — And Associated Lower Sperm Count

by Ana Maria Mihalcea, MD, PhD

 

 

I have discussed extensively that the scientific community is gaslighting everyone by claiming that microplastics are from environmental pollution from degraded plastics. The polymers found are the same seen in the blood polyethlene and polyvinyl alcohol.

But remember, these same microplastics were found in the placenta, but also in the Moderna patent and the chemical signatures in C19 injected and uninjected blood:

Damning New Research Study Finds Self Assembly Plastic Polymer Nanoparticles In Every Placenta

These same polymers are mentioned in geoengineering patents:

Smart Dust, Biosensors, Polymers For Geoengineering And The Multinational Corporations That Manufacture Them

If have previously shown that there are correlations between the chemicals found from geoengineering operations and the C19 shots:

Chemical Analysis Comparison of Hydrogel Filaments from C19 Shots and Environmental Geoengineering Sources – Project What Happened to Humanities Blood?

Microplastics – aka Nanotechnological Self Assembly Polymers – Are Everywhere – Poisoning Our Biosphere, Food Supply And Humans

We also know there is increased risk of vascular diseases:

New England Journal Of Medicine Microplastics Article Shows Higher Risk Of Heart Attacks, Stroke And Death

These polymers are also associated with turbo cancers and all diseases of aging:

Self Assembly Nanotechnology Microplastic Polymers Contributing To Turbo Cancers, Accelerated Aging And All Diseases

I have previously explained how phthalates are the breakdown products of these polymers:

C19 Vax Analysis Shows Dozens Of Toxic Phthalates That Have Been Associated With Endocrine Disruption And Death From Heart Disease

And how come the entire biosphere is being contaminated with these microplastics? Because it is sprayed via chemtrails, otherwise there is no way you would find the same polymers in snow on the highest mountains on earth and even in the Arctic. GEOENGINEERING OPERATIONS ENDANGER ALL LIFE ON EARTH.

As I have said so many times before, you cannot ensure the survival of the human species by just working to ban the C19 biological and technological weapons of mass destruction. The same poison that self assembles in the blood and they call microplastics is being inhaled by every living thing on earth, flora and fauna, animals and humans alike. Everything is contaminated and dying because of covert military aerial spraying. Chemtrails are GENOCIDE for our entire planet.

White and wonderful? Microplastics prevail in snow from the Alps to the Arctic

Microplastics (MPs) are ubiquitous, and considerable quantities prevail even in the Arctic; however, there are large knowledge gaps regarding pathways to the North. To assess whether atmospheric transport plays a role, we analyzed snow samples from ice floes in Fram Strait. For comparison, we investigated snow samples from remote (Swiss Alps) and populated (Bremen, Bavaria) European sites. MPs were identified by Fourier transform infrared imaging in 20 of 21 samples. The MP concentration of Arctic snow was significantly lower (0 to 14.4 × 103 N liter−1) than European snow (0.19 × 103 to 154 × 103 N liter−1) but still substantial. Polymer composition varied strongly, but varnish, rubber, polyethylene, and polyamide dominated overall. Most particles were in the smallest size range indicating large numbers of particles below the detection limit of 11 μm. Our data highlight that atmospheric transport and deposition can be notable pathways for MPs meriting more research.

Here is the original publication and abstract that shows fertility once again impacted in humans and dogs:

Microplastic presence in dog and human testis and its potential association with sperm count and weights of testis and epididymis

The ubiquitous existence of microplastics and nanoplastics raises concerns about their potential impact on the human reproductive system. Limited data exists on microplastics within the human reproductive system and their potential consequences on sperm quality. Our objectives were to quantify and characterize the prevalence and composition of microplastics within both canine and human testes and investigate potential associations with the sperm count, and weights of testis and epididymis. Using advanced sensitive Pyrolysis-Gas Chromatography/Mass Spectrometry (Py-GC/MS), we quantified 12 types of microplastics within 47 canine and 23 human testes. Data on reproductive organ weights, and sperm count in dogs were collected. Statistical analyses, including descriptive analysis, correlational analysis, and multivariate linear regression analyses were applied to investigate the association of microplastics with reproductive functions. Our study revealed the presence of microplastics in all canine and human testes, with significant inter-individual variability. Mean total microplastic levels were 122.63 µg/g in dogs and 328.44 µg/g in humans. Both humans and canines exhibit relatively similar proportions of the major polymer types, with PE being dominant. Furthermore, a negative correlation between specific polymers such as PVC and PET and the normalized weight of the testis was observed. These findings highlight the pervasive presence of microplastics in the male reproductive system in both canine and human testes, with potential consequences on male fertility.

Here is the write up

UNM Researchers Find Microplastics in Canine and Human Testicular Tissue

“Our study revealed the presence of microplastics in all human and canine testes,” Yu said. The team was also able to quantify the amount of microplastics in the tissue samples using a novel analytical method that revealed correlations between certain types of plastic and reduced sperm count in the canine samples.

Yu, who studies the impact of various environmental factors on the human reproductive system, said heavy metals, pesticides and endocrine-disrupting chemicals have all been implicated in a global decline in sperm count and quality in recent years. A conversation with his colleague Matthew Campen, PhD, a professor in the UNM College of Pharmacy who has documented the presence of microplastics in human placentas, led him to wonder whether something else might be at work.

“He said, ‘Have you considered why there is this decline (in reproductive potential) more recently? There must be something new,’” Yu said. That led Yu to design a study using the same experimental method Campen’s lab had used in the placenta research.

His team obtained anonymized human tissue from the New Mexico Office of the Medical Investigator, which collects tissue during autopsies and stores it for seven years before disposing of it. The canine tissue came from City of Albuquerque animal shelters and private veterinary clinics that perform spay-neutering operations.

The team chemically treated the samples to dissolve the fat and proteins and spun each sample in an ultracentrifuge, leaving a nugget of plastic at the bottom of a tube. Then, heated the plastic pellet in a metal cup to 600 degrees Celsius. They used a mass spectrometer to analyze gas emissions as different types of plastic burned at specific temperatures.

In dogs, the average concentration of microplastics in testicular tissue was 122.63 micrograms per gram of tissue (a microgram is a millionth of a gram). In human tissue the average concentration was 329.44 micrograms per gram – nearly three times higher than in dogs and significantly higher than the average concentration Campen found in placental tissue.

“At the beginning, I doubted whether microplastics could penetrate the reproductive system,” Yu said. “When I first received the results for dogs I was surprised. I was even more surprised when I received the results for humans.”

The researchers found the most prevalent polymer in both human and canine tissue was polyethylene (PE), which is used to make plastic bags and bottles. In dogs that was followed by PVC, which is used in industrial, municipal and household plumbing and in many other applications.

The team was able to count the sperm in the canine samples (but not in the human ones, which had been chemically preserved) and found that higher levels of PVC in the tissue correlated with a lower sperm count, Yu said. There was no correlation with tissue concentration of PE, however.

“The plastic makes a difference – what type of plastic might be correlated with potential function,” he said. “PVC can release a lot of chemicals that interfere with spermatogenesis and it contains chemicals that cause endocrine disruption.”

The study compared human and canine tissue for a couple of reasons, one being that dogs live alongside people and share their environment. They also share some biological characteristics.

“Compared to rats and other animals, dogs are closer to humans,” he said. “Physically, their spermatogenesis is closer to humans and the concentration has more similarity to humans.” Canine sperm counts also seem to be dropping, he added. “We believe dogs and humans share common environmental factors that contribute to their decline.”

Microplastics result when plastic is exposed to ultraviolet radiation in sunlight and degrades in landfills. It can be blown about by the wind or carried into nearby waterways, and some bits are so small they are measured in nanometers (a billionth of a meter). They’re now ubiquitous in the environment – even as global use of plastics continues to grow. Yu noted that the average age of the men in the OMI autopsy samples was 35, meaning their plastics exposure began decades ago, when there was less plastic in circulation. “The impact on the younger generation might be more concerning,” now that there is more plastic than ever in the environment, he said.

The findings point the way for additional research to understand how microplastics might affect sperm production in the testes, he said. “We have a lot of unknowns. We need to really look at what the potential long-term effect. Are microplastics one of the factors contributing to this decline?”

In disseminating his findings, Yu doesn’t want anyone to panic. “We don’t want to scare people,” he said. “We want to scientifically provide the data and make people aware there are a lot of microplastics. We can make our own choices to better avoid exposures, change our lifestyle and change our behavior.”

Summary:

Don’t panic? Our planet is being poisoned to death. Modify lifestyle? What are people and animals going to stop breathing the poisoned air?

People need to revolt against the covert military operations of destroying our earth for the sake of climate change and military operations.

 

Connect with Ana Maria Mihalcea, MD, PhD

Cover image credit: Joshua_seajw92




Smart Dust Biosensors and Chemtrail Dispersal

Smart Dust Biosensors and Chemtrail Dispersal 
A means of monitoring and controlling the entire human population

by Greg Reese
May 23, 2024

 

 



 

For decades, those with eyes to see have been aware of Chemtrails in our skies. And for decades we were called conspiracy theorists. But in 2016, while serving as Director of the CIA, John Brennan admitted that Chemtrails are real at the Council on Foreign Relations.

“Another example is the array of technologies, often referred to collectively as geo-engineering, that potentially could help reverse the warming effects of global climate change. One that has gained my personal attention is stratospheric aerosol injection. Or SAI. A method of seeding the stratosphere with particles that can help reflect the sun’s heat, in much the same way that volcanic eruptions do. An SAI program could limit global temperature increases, reducing some risks associated with higher temperatures, and providing the world economy additional time to transition from fossil fuels. This process is also relatively inexpensive. The National Research Council estimates that a fully deployed SAI program would cost about $10 billion yearly.”

~ John Brennan

In 2007, it was announced that nanosized particles, known as Smart Dust, can be dispersed over the battlefield via aerial spraying.

The military has contracted several multinational corporations to develop “wearable” biosensors. Biosensors and smart dust can become something known as body dust that can spread inside the human body as an active network capable to provide telemetry from inside the body for the use of monitoring humans.

There is a patent for using polyethylene glycol derivatives as a way to modify the weather, the same substances used in the COVID19 lipid nanoparticles. These polymers can be integrated with biosensors and soft robotics for smart materials, materials that can be modified by external stimuli. Soft robotics is a subfield of robotics that utilizes compliant materials rather than rigid ones. Such as the hydrogels found in the experimental COVID shots.

DuPont is manufacturing Elastomers for fast moving soft robots. And have developed the fastest DEA-driven soft robots ever reported. Designed for bio-sensing, interacting with biological entities, and actuating on a cellular level.

In her recent article, Smart Dust, Biosensors, Polymers For Geoengineering And The Multinational Corporations That Manufacture Them, Dr. Ana Maria Mihalcea points out that these are the transhumanist technologies that will be giving A.I. enormous amounts of data, as Bill Gates said, “to understand 100 trillion organisms.“

She also points out the important fact that the elastomers being fabricated by DuPont for this soft robot technology are made of the exact same chemicals found when analyzing the mesogens, a compound that displays liquid crystal properties, found in targeted individuals. And they appear to be the same compounds she found in the blood of the vaxxed, as well as the blood of the unvaxxed. Which appear to be the same structures used as part of electronic circuitry in self assembly nanotechnology.

Smartdust is a system of tiny microelectromechanical systems that can detect light, temperature, vibration, magnetism, or chemicals. They are operated wirelessly on a computer network, can be used for medical or military surveillance purposes, and can be dispersed through the air via Chemtrails. Which would greatly go unnoticed by the sleeping masses who have come to accept them. When combined with the mesogen soft robot technology, which has already been found in several blood samples of unwitting victims, they could create a means of monitoring and controlling the entire human population.

 

Connect with Greg Reese

Cover image credit: sharathsu




2024 & the Inevitable Rise of Biometrics

2024 & the Inevitable Rise of Biometrics

by Kit Knightly, OffGuardian
May 21, 2024

 

Have you noticed a lot of two-factor authentication prompts lately? Are you getting emailed verification codes that take forever to arrive, so you have to request another?

Perhaps you are asked to do captchas to “prove you’re human” and they seem to be getting more complex all the time or simply not working at all?

Why do you think that might be?

We’ll come back to that.

Did you know we’re in a “breakthrough year” for biometric payment systems?

According to this story from CNBC, JPMorgan and Mastercard are on board with the technology and intend a wide rollout in the near future, following successful trials.

In March this year, JPMorgan signed a deal with PopID to begin a broad release of biometric payment systems in 2025.

A Mastercard spokesman told CNBC:

Our focus on biometrics as a secure way to verify identity, replacing the password with the person, is at the heart of our efforts in this area,”

Apple Pay already lets you pay with a face scan, while Amazon have introduced pay-by-palm in many of their real-world stores.

VISA showcased their latest palm biometric payment set-up at an event in Singapore earlier this year.

As we covered in a recent This Week, PayPal is pushing out its own biometric payment systems in the name of “preventing fraud”.

As always, this is not just an issue in “the West”.

Chinese companies have been leading this race for a while, with AliPay having biometric payment options since 2015.

Moscow’s Metro system has been using facial recognition cameras for biometric payments for over a year.

And it’s not just payments, “replacing the password with the person” has already spread to other areas.

Hoping to corral support for biometrics from the right, national governments are collecting biometrics to “curb illegal immigration”. You can expect that to spread.

The European Union will be implementing a new Biometric Entry-Exit System (EES) as soon as October of this year.

Biometric signing is on the rise too.

Laptops tablets and smartphones already come with face-reading and fingerprint scanning technology to confirm your identity.

Social media companies have been collecting biometric data “for security and identification purposes” for years.

Google Play launched a new biometric accessibility feature only a couple of weeks ago.

It’s all just so convenient, isn’t it? So much faster than e-mailing security codes and solving increasingly impossible captchas (both of which have unaccountably got harder and more complicated recently, and will doubtless continue to do so).

That’s how they get you: Convenience.

They won’t ever remove the “old-fashioned” ways of accessing your accounts, but it will get increasingly slow and difficult to use while biometrics get faster and easier.

Meanwhile, the propaganda will begin to flow.

Influencers will be paid to use “cool” “futuristic” biometric payment options that “feel like having superpowers” in contrived “viral” videos. Biometrics will save the day in a trendy movie or TV show. Some old fuddy-duddy will go on Question Time and rant about the new technology…just before saying something racist or denying climate change.

Maybe a major hack or cyber-attack will only affect those who haven’t switched to biometric authentication yet.

You get the idea.

And all the while supra-national corporate megaliths will be creating a massive database of voice recordings, finger and palm prints, facial and retinal scans.

It’s a good thing we’re ruled by a morally upright elite. Imagine the damage they could do with all of that.

 

Connect with OffGuardian

Cover image credit: geralt




The World Out of Kilter: Occupation and Zombification

The World Out of Kilter: Occupation and Zombification

by Paul Cudenec, Winter Oak
April 22, 2024

 

 

The kind of society I long for is an organic one, in which people live in the way they see fit, guided by their own inclinations, the customs they have inherited and the circumstances of place.

As an anarchist, I am obviously opposed to all authority imposed from above, to any kind of formalised, entrenched power, but that does not mean that there could be no kind of moral “authority” or guidance in the world I want to see.

Traditional societies often look to village elders, wise women, and other respected individuals to help steer their decision-making.

The advice they give arises from within the community concerned and, in order to be followed, will have to correspond to a generally-shared sense that the proposed direction is the right one.

This is not the case with those who exercise power over us today. Due to the corruption of our society, authority is wielded in the interests of a group which neither identifies with the people as a whole nor is prepared to be guided by its wishes.

Instead, it seeks to impose its own agenda on the population by any means necessary – by propaganda and persuasion, if possible, or otherwise by outright deceit, intimidation and physical violence.

Even worse is that this ruling gang, which is essentially nothing but an occupying force, shares neither the specific local moral codes of the various peoples it rules over, nor the general human sense of right and wrong that would once have been shared by its own ancestors.

This is because it is a rogue element, a criminal entity, intent only on increasing its own wealth and power, and has no use for ethics.

Indeed, it takes sadistic pleasure out of using, manipulating and inverting the majority population’s values – their sense of justice, their fondness for their homeland or their love of nature – in order to advance its own venal programme.

Individuals in such a society are unable to follow their own moral compass, to act according to their own innate desires, to follow their dreams, pay respect to the archetypal template in their unconscious.

This is not just because they are physically constrained, by authority, from acting and living in ways that they feel are right, but also because they have been mentally conditioned not to listen to the voice within.

They are besieged, through all their waking hours, by messaging, by propaganda that tells them they have to live, think and behave in the ways set out by the ruling gang.

A natural society will produce all kinds of individuals who complement each other in the ways that they contribute to its well-being.

There are those who are drawn to caring for others, to teaching the young, to growing, to feeding, to building, to physically defending the community, to resolving disputes and so on.

There are also the artists, poets, preachers and prophets, the antennae of the people, who are sensitive to the overall feel of the society and can sense when something is wrong.

Young people often start out with this gift – think of all the different generations rebelling, in their varying ways, against this modern world! – only to be ground down into compliance by the satanic mills of power.

But some carry on noticing and sounding the alert, with the aim of waking up the population as a whole to the danger they are facing.

It is therefore important for the ruling occupying force to isolate the small minority who remain connected to their own deep knowing and to the organic spirit of the community.

They do this by insulting, mocking, demonising, dismissing, intimidating, criminalising and imprisoning them – by presenting them, in their usual inverted manner, as a menace to the very society whose well-being they are trying to defend.

This is psychologically difficult for these social antennae, who risk being deeply wounded by a rejection that they feel comes as much from their own community as from the occupying force.

Banding together in self-defence, they can become inward-looking, cultish, and unable to properly communicate with others outside their ranks.

Or, as individuals, they can become bitter and angry with those who refuse to listen to them, dismissing most members of their community as ignorant fools who deserve no better.

In either case, they have completed the work of the ruling gang by cutting themselves off from the social organism to which they belong.

That organism therefore has no more brain, no more soul, but is a social zombie, staggering on towards its own destruction under the malevolent control of the life-sucking criminocracy.

 

Connect with Paul Cudenec substack | website

Cover image credit: CDD20




FDA Modernization Act 2.0 & The Avatar

FDA Modernization Act 2.0 & The Avatar

by Rosanne Lindsay, Traditional Naturopath, Nature of Healing
April 18, 2024

 

In the Covidian Era, science has moved on to a digital upgrade of itself called Scientism, the religion of science, where science is god, and part of a new global Technocracy.

“Technocracy is the science of social engineering,” says Patrick Wood, author of Technocracy Rising.

Social engineering used to mean molding the minds of people to conform to new norms. This goes back to 1928, Ed Bernays, and his book Propaganda.  However, in a Technocracy, not only minds, but bodies, too, can be molded. If you did not get the memo, Technocracy has brought humanity from Human to Posthuman and Transhuman.

In the 2022 Journal Global Trends, Russian scientists describe the difference between Posthuman and Transhuman:

The fundamental idea of posthumanism is the rejection of biological, ethical, and ontological anthropocentrism. Transhumanism focuses on changing and improving natural human characteristics through biological, technological, and cognitive modifications…Transhumanism has the potential to preserve man as an effective economic and cognizing agent.

In other words, man as an “economic agent” refers to the cybernetic human as a commodity in a modern world. This means the laws of the nations need to change to catch up.

The U.S. FDA is meeting that goal for change with its FDA Modernization Act 2.0.  What is the FDA Modernization Act 2.0?

The new law amends the Federal Food, Drug, and Cosmetic Act by authorizing sponsors of novel drugs to make use of “certain alternatives to animal testing, including cell-based assays and computer models, to obtain an exemption from the Food and Drug Administration to investigate the safety and effectiveness of a drug.

It is the FDA giving itself permission to transition from testing animal models to directly testing humans.

In the 2023 Journal of Clinical Investigation, authors cite a long list of excuses to change research models:

  1. cost
  2. low approval rates in clinical trials
  3. lack of efficacy in trail outcomes
  4. high rate of failure in therapeutics
  5. species differences between animals and humans

After decades of extrapolating animal studies to humans, suddenly animals are no longer scientifically valid. Does this transition make obsolete more than a century of animal-based research? In one sense, such a transition is long-awaited and frees innocent animals from needless torture. In another sense, it moves the mark to a new target.

Scientists now claim humans are diverse, and therefore require different models.  They propose, “human cell-based models that more accurately reflect the diversity of human genetics may guide the development of treatments that are more reliable and successful in real-world applications.”

In Scientism, humans are considered commodities.  Some Transhumanists propose transferring consciousness to a machine to create a brain-machine interface. The Russian Posthuman authors propose that consciousness may be a feature exclusive to humans. They appear not to know for sure. They state:

Accordingly, it is still possible that there is a fundamental difference between man and other objects of the world.

The new strategy is one of large-scale experiments using pooled cell lines or “cell villages” and bar codes, i.e., human commodities will receive a digital ID. With human-like neural computing, soon humanoid robots will replace humans in the workplace.  The United Nations calls this Biodigital Convergence as part of its Sustainable Goals for Smart™ cities by 2030. CeNSE is the Central Nervous System for the Earth. Networks within networks.

Personalized Medicine & Precision Public Health

Digital IDs reflect a digital avatar in Precision Healthcare. “Precision Healthcare” refers to a remote medical model of healthcare. According to a 2021 study in the Journal of Personalized Medicine:

A digital twin is a virtual model of a physical entity, with dynamic, bi-directional links between the physical entity and its corresponding twin in the digital domain.

In March 2024, Dept. of Defense (DoD) officials testified on its own priorities before the House Armed Services Subcommittee. The digital ID is a natural progression from the trend toward non-binary humans who do not identify with a specific gender.  This makes the transition, from human to digital Posthuman, effortless. All humans with a digital ID belong to an A.I., industrial (not biological) system—Transhumanism.

The rapid development of technology—in particular, artificial intelligence—accelerates the processes of industrial automation. This, in turn, raises the question of the role of man in the economy of the future: if artificial systems can more effectively perform the functions of man, then what place will man, as a potentially inefficient economic agent, take in the economy?

Studying humans in large-scale experiments has already happened. The deployment of COVID EUA medical countermeasures (MCMs), sometimes referred to as vaccines, was tested during the COVID pandemic. However, unlike vaccines, which are FDA-approved, MCMs are not. According to the CDC, MCMs include: biological products, drugs, and devices.

Be aware that MCMs are already recognized in many Federal Acts, including the 21st Century Cures Act, the Medical Countermeasures Surge Capacity Act of 2022, The Public Readiness and Emergency Preparedness Act (PREP Act)The Prioritizing Medical Countermeasures for National Security Act of 2023.

Testing humans in Real Time, as a digital Avatar, puts the Tele in Telehealth. It is a strategy of “emergent technology,” even though emergent technology, such as TeleMedicine, is already 10 years old.  Further, this technology prevents the need for long-term genotoxicological and carcino-toxicological vaccine studies. Any adverse events (AEs) can be released later. Or not.

For example, post-COVID, drugmaker Pfizer was court-ordered to release safety data for its BioNTech EUA ‘vaccine.’ In its first data dump of February 2021, 1300 adverse events were listed among 42,000 serious case reports. With results such as these, the dial from health to disease is turned up, as disease becomes the new normal.

Without defining, ‘modernization 2.o,’ in human terms, science and government have paved the way for a new religion in a Posthuman synthetic, digital world. To maintain the inner human is to be aware of Technocracy, and turn toward the Natural world, and the heart center.

Related articles:

 

Connect with Rosanne Lindsay, Traditional Naturopath

Cover image credit: patrypguerreiro




Whirling Fish, Bees, Worms, Sheep, Turtles, Penguins

Whirling Fish, Bees, Worms, Sheep, Turtles, Penguins

by Arthur Firstenberg, Cellular Phone Task Force
April 16, 2024

 

 

More Than Fifty Species of Fish Circling and Spinning Until They Die

Several of my subscribers have called my attention to this. In February 2023, in the middle of the Florida Keys — a long, narrow string of islands hooking down into the ocean from Miami — many different kinds of fish, both common and rare, began spinning round and round, or swimming frantically in circles, until they beached themselves and died. This has continued, and as of April 5, 2024 has been observed in more than 50 species, including: sharks, rays, snappers, pilchards, grunts, blue runners, squid, Goliath grouper, tarpon, snook, redfish, leatherjacket, yellowfin mojarra, scaled sardine, toadfish, mullet, permit, ballyhoo, jack crevalle, yellow jack, bonefish, pinfish, bigeye scad, sand perch, needlefish, spadefish, and the critically endangered smalltooth sawfish, which is pictured above.

No cause for this has been found. There is no evidence of a red tide, low oxygen levels, high temperatures, or parasites in the dead fish.

I was skeptical that RF radiation from cell towers could be causing this because water reflects the radiation and it shouldn’t be killing fish like it is killing birds. But I decided to investigate. Because the greatest number of reports have come from a 10-mile-long stretch of the Keys between Big Pine Key and Sugarloaf Key, I wondered if there is a military facility in that area, and there is, or was. On Cudjoe Key, located between Big Pine Key and Sugarloaf Key, there was an Air Force Base that is now operated by the Department of Homeland Security. And above Cudjoe Key floats a radar blimp, called an “aerostat”, that is part of U.S. border surveillance and scans an area around it for 200 miles in every direction. Powerful radar can injure fish when they swim to the surface in these shallow waters, called the Florida Keys flats, where the water is only a few feet deep. Local residents call this blimp Fat Albert.

There may be underwater sonar in use at this facility as well, which would be likely to affect all the fish, either alone or in combination with the radar. In November 2022, the Tethered Aerostat Radar System (TARS) at Cudjoe Key began recruiting for a variety of positions, including Flight Director, Site Laborer, Logistics Supply Coordinator, Logistician, General Maintenance Worker, and one position that was advertised as “Electronic Technician – Aerostat Sonar / Radar – Blimp Surveillance System – Cudjoe Key, FL”.

The sudden large number of job openings makes one suspect that this facility has recently been upgraded and has increased the scope of its operations, which evidently now includes ocean sonar.

The person who first observed fish circling to death, and called attention to it, was Gregg Furstenwerth, a diver who lives in Cudjoe Key.

Circling Worms and Sheep

As I reported three years ago, the launching of almost 100 satellites by SpaceX and OneWeb on a single day on March 24, 2021 caused illness all over the planet in both humans and animals. Among the effects on animals was a spiraling, or circling phenomenon in worms (photo taken in Hoboken, New Jersey on March 25, 2021):

 

and in sheep (photo taken in England on March 26, 2021):

 

Circling Turtles, Seals, Penguins, Sharks and Whales

In 2021, Japanese scientists reported on bizarre circling behavior of green sea turtles, Antarctic fur seals, king penguins, a whale shark, a tiger shark, and a Cuvier’s beaked whale. This was observed in the seas off Oahu, Hawai’i; Okinawa, Japan; Moheli Island, Comoro; Chichijima Island, Japan; Possession Island in the Indian Ocean; Bird Island in South Georgia; and the Ogasawara Islands in the western North Pacific Ocean. The animals circled round and round for up to an hour. “One turtle swam in large circles 76 times, with each loop taking 16 to 20 seconds”reported New Scientist. This behavior was also caused by radiation: all these different whirling sea animals wore computers (“multi-channel data loggers”) and VHF transmitters, and the sea turtles also wore GPS devices. Instead of enabling them to study the animals’ behavior, the devices were causing the bizarre behavior.

Circling Bees

Grayson in North Carolina is one of my subscribers who sent me information about the circling fish in the Florida Keys. He reports also on circling bees: 

“I still have the sample of carpenter bees harmed by a wi-fi light sensor at my home in 2016ish. They did the same thing. They passed through the sensor’s field and dropped to the base of the light and crawled around in circles for days… There were 23 total and they did not respond to water or honey and water or anything. They just crawled around in circles.”

 

Arthur Firstenberg
President, Cellular Phone Task Force
Author, The Invisible Rainbow: A History of Electricity and Life
P.O. Box 6216
Santa Fe, NM 87502
USA

 

Connect with Arthur Firstenberg

Cover image credit: Forrest Samuels




The Fury of Europe’s Farmers Shocks EU Technocrats

The Fury of Europe’s Farmers Shocks EU Technocrats

by Fraser Myers, sourced from Technocracy News & Trends

 

The continent-wide fury of EU farmers is blazing a trail straight to the heart of Technocracy, namely, the green agenda, net zero, and the war on energy and food. The late Rosa Koire warned Europe between 2010-2015 about “the blueprint, the comprehensive plan of action for the 21st century to inventory and control all land, all water, all plants, all minerals, all animals, all construction, all means of production, all energy, all law enforcement, all health care, all food, all education, all information, and all human beings in the world.” 

The farmers got it and are now fighting for their lives and livelihoods. Technocrats spin out these suicidal policies using their oracle of pseudoscience as their god. However, it is no god but rather base scientism, which C.S. Lewis laid bare in his Abolition of Man (1943). 

These are those whose intent is to destroy the earth (Rev. 11:18). Will we stop them before it is too late?

~ Technocracy News Editor



Europe’s farmers are rising up – and the elites are terrified. In France, farmers recently staged a four-day ‘siege of Paris’, blocking major roads around the French capital. In January, thousands of tractors descended on Berlin in Germany, lining the streets leading up to the Brandenburg Gate. In Brussels, farmers have gathered from all over Europe to demonstrate against the EU and pelt the European Parliament with eggs. In the Netherlands, tractors have caused the longest traffic jam in the nation’s history, as part of a years-long battle between farmers and the government. This farmers’ revolt is now truly Europe-wide. From Portugal to Poland, from Ireland to Italy, almost every EU country has been rocked by protests. So what is driving this populist uprising? What do the farmers want?

Farmers in each country have their own specific grievances, of course. But there is a common root to their anger. What connects them is the European Union’s green agenda, which has been imposed on agriculture from on-high. It has made farmers’ lives a misery, sacrificing their livelihoods at the altar of climate alarmism. Bureaucrats who have no idea how farmers work and live, have essentially been condemning farms – many of them run by families for generations – to oblivion, all at the stroke of the regulator’s pen. And farmers are simply not putting up with it anymore.

The first stirrings of revolt began in 2019, in the Netherlands, with the so-called nitrogen crisis. The Dutch Supreme Court ruled that the government was failing to cut nitrogen pollution to EU-approved levels. In response, the Dutch government promised ‘drastic measures’ to cut nitrogen emissions. In all but name, it declared war on its nation’s farmers. Suddenly, the government had turned against one of its most important and impressive sectors. You see, the Netherlands, despite its small size, is the second-largest exporter of food in the entire world, thanks to the world-beating efficiency of its farms. And nitrogen is intrinsic to this efficiency. Fertilisers are rich in nitrogen, and farmers need fertilisers to maximise their crop yields. Nitrogen is also an inevitable byproduct of animal farming. Livestock release ammonia, a compound of nitrogen and hydrogen, through their excrement. The Netherlands has over four million cows, 13million pigs and 104million chickens. Which is a lot of manure and a lot of nitrogen. Any crackdown on nitrogen emissions was always going to hit farmers hard. Even so, the Dutch government’s proposals went even further than anyone could have imagined. It said it would buy out thousands of the most polluting farms and simply shut them down. Other farms would have to cull a proportion of their animals. This would mean slaughtering around half of all the livestock in the Netherlands. In all, this represented an unthinkable act of national economic self-harm.

Thus, the farmers’ revolt was born. Huge protests erupted in 2019. After a brief hiatus during the Covid pandemic, they came roaring back in 2021 and 2022. Dutch farmers blocked roads, railways and canal bridges with tractors and hay bales. They defied government bans to bring tractors into the Hague. Tens of thousands took part in the demonstrations. But the Dutch government did not back down. It kept proposing new targets, new measures and new restrictions on nitrogen. In 2022, the government’s own figures revealed that around 30 per cent of farms would have to close to meet their targets. And last year, it drew up a list of the 3,000 farms that it wants to forcibly close within the next few years.

All of this has been done with the approval and encouragement of the EU. And there is worse to come in the Netherlands and beyond. The absurd nitrogen rules that are threatening Dutch farms come from an EU environmental directive that dates back to the 1990s. But the EU’s eco-mania has intensified massively since then. Farmers now have to contend with the drive to Net Zero, too. According to Laurence Tubiana, chief executive of the European Climate Foundation and the architect of the Paris Climate accords, Net Zero will require ‘the biggest overhaul of farming since the Second World War’. And yet, once again, farmers haven’t been consulted on this. Targets have simply been drawn up by the technocrats and rubber stamped by national governments, without any consideration for their impact on farmers and their ability to produce food.

Under the EU’s so-called Green Deal, every EU member state has to reach Net Zero carbon emissions by 2050. And the EU’s emissions rules for agriculture are especially, insanely, stringent. The punishing green policies don’t stop there, either. The Farm to Fork strategy, announced in 2020, calls for 10 per cent of farmland to be set aside for non-agricultural use. It says that at least a quarter of EU farms should become organic. It says fertiliser use must fall by 20 per cent. Pesticide use must be cut by 50 per cent. And all of this should be done by 2030. Each of these demands would be enough to put thousands of farms out of business on their own. When combined, they pose an existential threat to European agriculture. And if the EU’s laws weren’t bad enough, member states are actually gold plating these regulations. The EU had already demanded the impossible of farmers. Now national elites in Berlin, Paris and The Hague want to go even further.

This is why farmers are out on the streets across the continent. It’s why they’re taking matters into their own hands. It’s why they feel they have no choice but to block roads with their tractors, bring life to a standstill and dowse public buildings with manure. They are determined to remind the powers-that-be just how essential they are to the functioning of modern life.

At first, the elites tried to dismiss the protests. They resorted to their usual playbook. They called the farmers fascists, far right and pawns of online disinformation. But this propaganda campaign has flopped. Not only have these smears failed to demoralise the farmers, they have also failed to turn the public against the protests. In country after country, European peoples are backing their farmers, even as the protests disrupt daily life.

In the Netherlands, where our story began, a farmers’ party briefly managed to storm electoral politics, too. The Farmer-Citizen Movement – or BBB – was set up in 2019 amid the nitrogen-crisis demonstrations. Less than four years later, the BBB swept the board in the Dutch provincial elections. It won the popular vote in all 12 provinces – the first time any party had achieved this in Dutch history. While the farmers’ protests managed to bring tens of thousands on to the streets, the farmers’ party managed to mobilise almost 1.5million voters.

The fury of the farmers has now become impossible to ignore. The usually tin-eared elites across Europe have been forced to listen and respond. In Germany, farmers have got their government to delay planned cuts in subsidies for agricultural fuel. And they have managed to keep their tax breaks on tractors and farm vehicles, which were also under threat. In France, farmers have extracted millions of euros in additional grants. And they’ve put paid to government plans to hike fuel taxes. In Ireland, a deranged government proposal to cull 200,000 cows has quietly been shelved. Even at the EU level, farmers have already chalked up some significant victories. Remember that plan to halve the use of pesticides by 2030? It’s now been torn up.

But the protests aren’t going to stop anytime soon. How could they? These concessions, though welcome, do not go nearly far enough. The green agenda is diametrically opposed to the interests of agriculture. So long as European politicians are committed to Net Zero, then the farmers will always be in their sights. What’s more, the farmers’ cause will continue to resonate with ordinary people, who are also served poorly by their environmentalist leaders, whose policies are pushing up prices and obliterating food and energy security. The farmers are merely the canaries in the coalmine. They were just the first group of people to be pushed to breaking point – and to get organised in response.

The farmers offer a cautionary tale to Europe’s rulers. The green elites assumed that farmers would take their bitter medicine. They had no idea just how devastating their regulations would be to farmers’ way of life. They failed to see the human beings behind the emissions figures on their spreadsheets. And the broader push for Net Zero could soon generate much more resistance, from a much broader section of society. After all, under the current plans, our energy bills are set to soar, as we replace reliable fossil fuels with unreliable renewables. Our trusty gas boilers could soon be ripped out, replaced with expensive and inefficient heat pumps. Older, cheaper vehicles are being banned or taxed off the road in the push towards electric cars. Yet again, the establishment seems to think it can change our way of life and shred our living standards without a peep of discontent. This is bound to provoke an almighty backlash. And the farmers have shown us the way.

Long may the farmers’ revolt continue. And here’s hoping it inspires many more people to take a stand.

 

Connect with Spiked

Connect with Technocracy News & Trends

Cover image credit: European Commission (Christophe Licoppe)
Demonstration of farmers in the European Quarter in Brussels, Feb 1, 2024
Creative Commons




The Psychological Battle for Truth — and the Power of the Farmers’ Uprising

The Psychological Battle for Truth — and the Power of the Farmers’ Uprising

by Julian Rose
sourced from Activist Post
April 1, 2024

 

The ‘deep state’ has no power over you. None. It can only try and make you believe it does.

And in this it is very clever, using sophisticated psychological techniques that give the impression of holding the dominant position and exercising the dominant power.

But this is a chimera; and immediately one sees it as such one manifests the authoritative position and the deep state is in check; it can only operate defensively.

This it does by putting up ever greater barriers to freedom of expression, movement and choice.

It knows it’s on the losing side, so has to pull all the tricks in the trade to make itself appear to be in control. It’s a psychological battlefield.

Edward Bernays, the founder of modern advertising, has had much to do with weaponising the powers of perception and deception. He found that you can get people to believe and do almost anything once you learn how to exploit their psyche with carefully chosen imagery and words.

Once you tap into people’s widespread subconscious attraction to the trappings of seductive consumables.

The deep state’s corporate/banker led ‘seeming’ global dominance draws on Bernays’s cunning, using advanced insights concerning how to influence the functions of different areas of the human brain.

The objective is to come up with a blanket like web of virtual signposting pointing to the direction life must go in in order to overcome some purposefully manufactured crisis. A crisis that is claimed will otherwise cook, starve or destroy people and the planet.

People in a state of funk take all this to be real, of course, and plod on with their tunnel vision acceptance of the pathological diktats of the status quo.

The deep state cabal has a mental hold over their perception of what is and is not true, and rolls out the moderators, fact checkers and ‘sudden silencers’ to counteract anything that emerges as an emissary of truth. Many of us have had firsthand experience of this executioner formula.

Nevertheless, ‘we the purposeful people’ are winning through. There is simply too much informative material on the loose for the thought/surveillance police to cover, in spite of their algorithmic interventions.

Their tactic is therefore to try to gain the upper hand by pushing harder on the ‘disaster agenda.’ This is exemplified by the global dissemination of the dystopian agenda laid out in Klaus Schwab’s Fourth Industrial Revolution.

The most ubiquitous cooked-up disaster is, of course, ‘man-made global warming’ – with its stated solution to be the Transhuman. All steps in between are sold as vital to advancing the speed and efficiency of the ‘human to inhuman’ transformation process.

The digitalisation of life is central to the architects of control argument that humanity is incapable of managing itself and that, without their intervention, the outcome will be the complete breakdown of planetary life.

Only a race of soulless computer assisted ‘super beings’ can save the day, say the likes of Yuval Noah Harari, Elon Musk and Klaus Schwab.

Consider how this agenda plays on the psychology of those who have yet to find in themselves the self-assurance to discard that which has no practical sense of purpose and no foundation in basic common sense.

The architects of control count on the majority remaining unresistant to the rolling out of their high-tech hegemonic master plan. So much so that they can freely announce that by following it “You will own nothing and you will be happy.”

In the psychological battle for truth, the perpetrators of the lie have access to a vast storehouse of mind-bending persuasion techniques to make their agenda seem the only choice.

They recognise that when a high percentage of individuals believe themselves to be unable to operate without a mobile phone – they will be sufficiently unfocussed and distracted so as to be unable to rebel against a fateful acceptance of slavery to the big brother of convenience.

Easily manipulated victims of digital mass hypnosis.

Here lies the rub: if the upwardly mobile urban ‘educated’ segment of society sees no problem conducting their lives within a credit card bubble of hypermarket convenience shopping, digital EMF communication systems, computer fed entertainment packages and a well-paid job in a global or trans national corporation – where is the resistance going to come from?

If this genre of people is already too far gone to register an internal kick when faced by a high-level plan to ‘happily’ have all their material assets taken away from them – then who or what is going to raise the alarm?

It looks to me as though only a small percentage of mankind can read the script being outlined for their future behind bars. Only a few can grasp the psychology of the insentient psychopath and his soulless urge to possess and control, at any price.

But once one moves outside the world of Godless urban shopping obsessed nine to fivers and ‘well-educated’ university trained job hunters, a potential to get real starts to emerge.

Amongst those working people who regularly get their hands dirty, who till the fields; build shelters; repair cars; mend pipes; fix electrics and dig drains, the virtual reality digital cybernetic future of the Fourth Industrial Revolution – and Green New Deal – looks like pure fantasy. The ravings of the unhinged.

They don’t need to mentally struggle in order to try to grasp the twisted logic being broadcast by the global media mafia. They simply know in their gut that it’s so much ‘bull’.

It is those who form the foundation of pyramid who hold society together. Who glue together the basic infrastructure which supports our daily lives. And it is from here that an increasing percentage reject the psychology of mental indoctrination and the promotion of a digitalised virtual future.

The ‘Throw out Green Deal’ remarkable, unified farmer uprisings happening in all parts of Europe and beyond are testimony to this. They are rising up against the imposition of phony ‘Net Zero by 2045’ rules that demand an end to farmers working the land and an end to the livestock that keep that land fertile.

These farmers are out in their tens of thousands. In Poland they are mounting month long tractor blockades of cities, supermarkets and border crossings. Coals miners, faced by being shut out by large scale ‘stop global warming’ redundancies, are joining the uprising.

Farmers say they will not cease their disruptions until their demands are met by government and by the EU.

This is the refreshingly undiluted language of genuine defiance.

It has the authorities rattled. Green Deal is, after all, the very backbone of the agenda to enslave us all to a Brave New World of synthetic everything – from food to nature to people.

The general public are in sympathy with the farmers’ actions.  Approximately 80% of European citizens are on their side according to opinion surveys.

Getting a solid core of consumers to rise up and participate in this bottom-up movement for the survival of real food and real farming will be vital to maintaining the momentum.

Coming from an unlikely place, a solid earthed uprising is gathering pace. The farmers’ demands are essentially for economic fairness, respect and recognition of the vital roll they play in the food security of the nation.

Under ‘Green Deal’ none of these demands are taken seriously. The WEF solution is not to support the agricultural community but to destroy it!

In the 2024 battle for truth, everyone should behave as resolutely as the farmers. The need is to be uncompromising in one’s face to face dealings with political liars and hypocrites.

We are the trustees of Planet Earth. In order to maintain its balance and equilibrium – we have no choice other than to enter into a pactless fight against all opposing forces.

Those who have land, can grow food and draw water from the well, are the last independent individuals on the planet. They are not about to capitulate to a bunch of psychos in Brussels, London, Warsaw, Washington or Paris – and nor are we.

Everyone’s life is dependent upon having access to nourishing food. Therefore, everyone’s life is dependent upon the survival and future prosperity of the farmer.

Support them now in their hour of need. Their need is also your need.

They have no future – and nor do we – without a lifesaving revolution that re-establishes the priorities for what is actually important in life. Think deeply about this and then act on it without delay.

And if you’re left in doubt – ask farmers who actually controls the food chain. Who is really in the driving seat when it comes to feeding the world?

Rise up, all good people. Take your destiny in both hands. Vigorously join together in forging a great victory for humanity over inhumanity.

Allowing oneself to slide into a state of abject slavery is a doctrine of the graveyard.

All those retaining some life-giving red blood corpuscles know that the road to truth accepts no compromise and can never be subverted by the orchestrated opium of mass indoctrination.

Julian Rose is an organic farmer, writer, broadcaster and international activist. 

 

Connect with Julian Rose

Cover image credit: European Commission (Christophe Licoppe)
Tractors parked and road traffic at a standstill in the European Quarter in Brussels, February 1, 2024 — creative commons




Nano Drug Delivery Systems in Smart Healthcare

Nano Drug Delivery Systems in Smart Healthcare

by Rosanne Lindsay, Traditional Naturopath, Nature of Healing
March 14, 2024

 

In the interest of answering questions generated by the article, ”Pretending to be Alternative,” I am expanding on nano delivery systems. Buckle your seatbelts!

Are all brands of Ivermectin alike?

There are many formulations of Ivermectin on the market. If Ivermectin is used ‘off-label’ then it can be prescribed for unapproved uses. Ivermectin was intended as an anti-parasitic medication, for repeated use, since it only kills adult parasites, not the eggs.

Several pharmaceutical companies manufacture and supply Ivermectin on a global scale. Unless you, as a patient, request the package insert of the drug, you will not necessarily know the specific lot# or ingredients to ask questions of the medical doctors who dispense them.

Today, as an ‘off-label’ drug, Ivermectin is sold for many different symptoms.  In Australia, since June 2023, the prescribing of oral ivermectin for ‘off-label’ uses will no longer be limited to specialists such as dermatologists, gastroenterologists and infectious diseases specialists. In the U.S., Ivermectin is still not FDA-approved to treat COVID.

Most people who choose to take Ivermectin, do so because it is marketed as “alternative” and is “not FDA-approved.” These phrases seem to hold special powers to some people, even though Ivermectin is still a pharmaceutical drug.

At the same time, pharmaceuticals have been upgraded to keep up with “advances” in technology.

Do All Ivermectin drugs contain Nano Lipid Particles (NLPs)?

Little is known about when lipid nanocarriers first appeared on the Ivermectin scene, but lipid and nano-drug delivery systems have been used in pharma-drugs since at least 1995. A 2017 study used nano lipid carriers as an Ivermectin delivery system for head lice.

Ivermectin was not well publicized before doctors began prescribing it ‘off-label,’ as an “alternative” treatment for COVID-19.

To assess the efficacy and safety of Ivermectin for COVID, a 2021 study reported: “Of the 41 study results contributed by included studies, about one third were at overall high risk of bias.”  The study concluded:

Overall, the reliable evidence available does not support the use ivermectin for treatment or prevention of COVID-19 outside of well-designed randomized trials.

Generally, if scientists are writing about a protocol in their research, it implies it is used in practice as an industry standard. How else are these drugs delivered to the right part of the body? A 1995 study described the Nano Lipid Carrier delivery method:

Nano lipid carriers are a delivery system composed of a solid matrix that contains liquid nano-fatty particles. These nanoparticles are approved by the Food and Drug Administration (FDA) and European Medicines Agency (EMA) and possess a controlled and continuous release capability, have a cellular dimension and are compatible with tissues and cells

Did Ivermectin, in 2021, contain NanoLipid Carrier (NPC)  Delivery Systems?

It is confusing to know for sure whether Ivermectin, or other “alternative” pharmaceutical drugs, of 2021 or earlier, used lipid nanoparticles as a drug delivery system. From the the 2019 study featured in my earlier article on Ivermectin, this statement is noted under “Methods:”

To overcome the limitations observed in some drug formulations and resistance, we used nano lipid carriers (NLCs) as a targeted and sustained drug delivery system for IVM.

This statement does not make known whether NLCs are standard practice in the market, or typical for this drug. However, we can assume this methodology is standard practice at least in the last few decades. According to this 2023 study:

Over the past several decades, liposomes have been extensively developed and used for various clinical applications such as in pharmaceutical, cosmetic, and dietetic fields, due to its versatility, biocompatibility, and biodegradability, as well as the ability to enhance the therapeutic index of free drugs.

Per this 2016 study: the authors wrote: “Nanomedicine is an emerging field that employs nanosized materials for applications in disease diagnosis and therapeutics. For example, nanotechnology-based methods and materials have been developed for the diagnosis and treatment of cancer. Nano-carrier delivery systems are also used in the treatment of Neuropsychiatric disorders and as targeted therapy in chronic diseases since 2019. Further, off-label medications for psychiatric disorders are frequently used for unapproved indications.

To be clear, my article on Pretender Alternatives focused on nanotechnology in general not only on NLCs. Whether products are lipid-based-nano or Beeswax-based-nano, it is still “nano.”

The doctors who prescribe nano-drugs are not trained in nanomedicine or their delivery systems. By plausible deniability, doctors can deny any knowledge of nanotech in their drugs. Thus, they are not responsible for disclosing known health effects of nanobots to patients.

Nano-electric Delivery Systems

Nano-medicine implies electronics.

In the 1990s, research conducted in the microelectronics industry was applied to the design of immunoassays, and since then the applications for immunoassays have expanded using nanotechnology.

This movement has been dubbed as microfluidic and lab-on-a-chip technology. Research in LOC systems is expected to extend towards downscaling of fluid handling structures as well, by using nanotechnology.

In 2024, the National Nanotechnology Initiative (NNI), celebrates 25 years of nanotechnology. That suggests 25 years in products, medicines, and food. It is also floats in the air as Smart Dust and microplastic rain.  Cloudy with a chance of plastics? The purpose of Smart Dust Smart rain, and Smart Healthcare is for wireless monitoring and surveillance.

Smart dust is a system of tiny electromechanical sensors that detect and wirelessly transmit real-time data from their environment. Measured at one cubic millimeter or less, these devices are dispersed in large quantities as a networked cluster suspended in mid-air.

Point of Care Diagnostics

Biosurveillance, through biosensors, implies remote access to the body as part of the global Smart Health evolution.  This happens through point of care diagnostics:

Glucose meters can also be used by diabetics at home to monitor levels and to adjust their insulin if necessary.

Biosensors are electrochemical transducers found on, and inside, the body that turn biological signals into wireless electrical signals. See Timeline here.

There is no reason to look for chip technology as RFID chips, or implantable chips. In a digital-nano world chips are invisible. Biosensors are now wireless and non-invasive, used in Point of Care applications to monitor people in biomedical healthcare settings such as Telehealth and Biotelemetry.

What about binders, such as zeolites? 

Zeolites are advertised to remove toxic metals by binding to them for removal from the body. Would zeolite be of assistance when it comes to nanotech?

The industry has already thought of that. Today, zeolite binds, while also building its own system.  Zeolites are used in many biomedical applications from detoxification to Diabetes and bone formation, including biosensors. This way, a biosensor map of the world can identify people in real-times, whether you are pharmaceutical-friendly or “alternative.” Biosensing is basis of Smart Delivery, Monitoring, Surveillance, and Healthcare.

Usage of zeolites improves characteristics of the biosensors. In particular, sensitivity, linear range, and limit of detection are enhanced.

Everyone must do their own research to understand the world of electronics, its applications, and its implications for the future of health.

 

Rosanne Lindsay is a Traditional Naturopath, Herbalist, Writer, and Author of the books The Nature of Healing, Heal the Body, Heal the Planet and Free Your Voice, Heal Your Thyroid, Reverse Thyroid Disease Naturally. Find her on Facebook at facebook.com/Natureofhealing. Consult with her remotely at www.natureofhealing.org.

 

Connect with Rosanne Lindsay, Traditional Naturopath

Cover image credit: CDD20


See related:

Pretending to be Alternative: Toxic Pharmaceuticals With “Intelligent Surfaces”




New International Coalition: Global Radiation Emergency

New International Coalition: Global Radiation Emergency

by Arthur Firstenberg, Cellular Phone Task Force
February 28, 2024

 

Global Radiation Emergency is a just-formed coalition of individuals, organizations and scientists on six continents whose mission is to save Planet Earth.  Birds are disappearing from our skies, bees from our flowers, insects from our forests, worms from our soils, animals from their dens, and health from our bodies.

Our coalition will be contacting leaders in science and medicine, directors of environmental organizations, law institutes, government officials, astronomers, universities, religious leaders, and groups representing parents, children and schools. Our website is radiationemergency.org.

The Electrosmog Policy Brief, so far in Englishfrançaisitalianosvenska and日本語will be our roadmap and our guideposts. The Radio Wave Packet, so far in Englishfrançaisnorsk and Nederlands, will be a basic tool with which to penetrate the wall of denial, to place wireless technology alongside climate change on the world’s agenda of greatest assaults on life and most immediate threats to survival.

If you or your organization wants to join our coalition, please send a message to Global Radiation Emergency on the contact page of the website.

Arthur Firstenberg
President, Cellular Phone Task Force

Subscribe to Cellular Phone Task Force newsletters.

 

Connect with Arthur Firstenberg website | substack

Cover image credit: Mysticsartdesign


See Related:

Rainbow Lorikeets Dropping From the Sky

5G, Satellites & the Global Wireless Rollout: On the Irradiation of Cats, Dogs, Birds & All of Our Natural World

Arthur Firstenberg: An Autumn’s Tale




Watchlisted: You’re Probably Already on a Government Extremism List

Watchlisted: You’re Probably Already on a Government Extremism List

by John & Nisha Whitehead, The Rutherford Institute
January 23, 2024

 

“In a closed society where everybody’s guilty, the only crime is getting caught.”
— Hunter S. Thompson

According to the FBI, you may be an anti-government extremist if you’ve:

a) purchased a Bible or other religious materials,

b) used terms like “MAGA” and “Trump,”

c) shopped at Dick’s Sporting Goods, Cabela’s, or Bass Pro Shops,

d) purchased tickets to travel by bus, cars, or plane,

e) all of the above.

In fact, if you selected any of those options in recent years, you’re probably already on a government watchlist.

That’s how broadly the government’s net is being cast in its pursuit of domestic extremists.

We’re all fair game now, easy targets for inclusion on some FBI watch list or another.

When the FBI is asking banks and other financial institutions to carry out dragnet searches of customer transactions—warrantlessly and without probable cause—for “extremism” indicators broadly based on where you shop, what you read, and how you travel, we’re all in trouble.

Clearly, you don’t have to do anything illegal.

You don’t even have to challenge the government’s authority.

Frankly, you don’t even have to care about politics or know anything about your rights.

All you really need to do in order to be tagged as a suspicious character, flagged for surveillance, and eventually placed on a government watch list is live in the United States.

This is how easy it is to run afoul of the government’s many red flags.

In fact, all you need to do these days to end up on a government watch list or be subjected to heightened scrutiny is use certain trigger words (like cloud, pork and pirates), surf the internet, communicate using a cell phone, limp or stutter, drive a car, stay at a hotel, attend a political rally, express yourself on social media, appear mentally ill, serve in the military, disagree with a law enforcement official, call in sick to work, purchase materials at a hardware store, take flying or boating lessons, appear suspicious, appear confused or nervous, fidget or whistle or smell bad, be seen in public waving a toy gun or anything remotely resembling a gun (such as a water nozzle or a remote control or a walking cane), stare at a police officer, question government authority, or appear to be pro-gun or pro-freedom.

We’re all presumed guilty until proven innocent now.

It’s just a matter of time before you find yourself wrongly accused, investigated and confronted by police based on a data-driven algorithm or risk assessment culled together by a computer program run by artificial intelligence.

For instance, a so-called typo in a geofence search warrant, which allows police to capture location data for a particular geographic area, resulted in government officials being given access to information about who went where and with whom within a two-mile long stretch of San Francisco that included churches, businesses, private homes, hotels, and restaurants.

Thanks to the 24/7 surveillance being carried out by the government’s sprawling spy network of fusion centers, we are all just sitting ducks, waiting to be tagged, flagged, targeted, monitored, manipulated, investigated, interrogated, heckled and generally harassed by agents of the American police state.

Without having ever knowingly committed a crime or been convicted of one, you and your fellow citizens have likely been assessed for behaviors the government might consider devious, dangerous or concerning; assigned a threat score based on your associations, activities and viewpoints; and catalogued in a government database according to how you should be approached by police and other government agencies based on your particular threat level.

Before long, every household in America will be flagged as a threat and assigned a threat score.

Nationwide, there are upwards of 123 real-time crime centers (a.k.a. fusion centers), which allow local police agencies to upload and share massive amounts of surveillance data and intelligence with state and federal agencies culled from surveillance cameras, facial recognition technology, gunshot sensors, social media monitoring, drones and body cameras, and artificial intelligence-driven predictive policing algorithms.

These data fusion centers, which effectively create an electronic prison—a digital police state—from which there is no escape.

Yet this crime prevention campaign is not so much about making America safer as it is about ensuring that the government has the wherewithal to muzzle anti-government discontent, penalize anyone expressing anti-government sentiments, and preemptively nip in the bud any attempts by the populace to challenge the government’s authority or question its propaganda.

As J.D. Tuccille writes for Reason, “[A]t a time when government officials rage against ‘misinformation’ and ‘disinformation’ that is often just disagreement with whatever opinions are currently popular among the political class, fusion centers frequently scrutinize peaceful dissenting speech.”

These fusion centers are the unacknowledged powerhouses behind the government’s campaign to censors and retaliate against those who vocalize their disagreement and discontent with government policies.

It’s a setup ripe for abuse.

For instance, an investigative report by the Brennan Center found that “Over the last two decades, leaked materials have shown fusion centers tracking protestors and casting peaceful activities as potential threats. Their targets have included racial justice and environmental advocates, right-wing activists, and third-party political candidates.”

One fusion center in Maine was found to have been “illegally collecting and sharing information about Maine residents who weren’t suspected of criminal activity. They included gun purchasers, people protesting the construction of a new power transmission line, the employees of a peacebuilding summer camp for teenagers, and even people who travelled to New York City frequently.”

This is how the burden of proof has been reversed.

Although the Constitution requires the government to provide solid proof of criminal activity before it can deprive a citizen of life or liberty, the government has turned that fundamental assurance of due process on its head.

Each and every one of us is now seen as a potential suspect, terrorist and lawbreaker in the eyes of the government.

Consider some of the many ways in which “we the people” are now treated as criminals, found guilty of violating the police state’s abundance of laws, and preemptively stripped of basic due process rights.

Red flag gun confiscation laws: Gun control legislation, especially in the form of red flag gun laws, allow the police to remove guns from people “suspected” of being threats. These laws, growing in popularity as a legislative means by which to seize guns from individuals viewed as a danger to themselves or others, will put a target on the back of every American whether or not they own a weapon.

Disinformation eradication campaigns. In recent years, the government has used the phrase “domestic terrorist” interchangeably with “anti-government,” “extremist” and “terrorist” to describe anyone who might fall somewhere on a very broad spectrum of viewpoints that could be considered “dangerous.” The ramifications are so far-reaching as to render almost every American an extremist in word, deed, thought or by association.

Government watch lists. The FBI, CIA, NSA and other government agencies have increasingly invested in corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram in order to identify potential extremists and predict who might engage in future acts of anti-government behavior. Where many Americans go wrong is in naively assuming that you have to be doing something illegal or harmful in order to be flagged and targeted for some form of intervention or detention.

Thought crimes programs. For years now, the government has used all of the weapons in its vast arsenal—surveillance, threat assessments, fusion centers, pre-crime programs, hate crime laws, militarized police, lockdowns, martial law, etc.—to target potential enemies of the state based on their ideologies, behaviors, affiliations and other characteristics that might be deemed suspicious or dangerous. It’s not just what you say or do that is being monitored, but how you think that is being tracked and targeted. There’s a whole spectrum of behaviors ranging from thought crimes and hate speech to whistleblowing that qualifies for persecution (and prosecution) by the Deep State. It’s a slippery slope from censoring so-called illegitimate ideas to silencing truth.

Security checkpoints. By treating an entire populace as suspect, the government has justified wide-ranging security checkpoints that subject travelers to scans, searches, pat downs and other indignities by the TSA and VIPR raids on so-called “soft” targets like shopping malls and bus depots.

Surveillance and precrime programs. Facial recognition software aims to create a society in which every individual who steps out into public is tracked and recorded as they go about their daily business. Coupled with surveillance cameras that blanket the country, facial recognition technology allows the government and its corporate partners to warrantlessly identify and track someone’s movements in real-time, whether or not they have committed a crime.

Mail surveillance. Just about every branch of the government—from the Postal Service to the Treasury Department and every agency in between—now has its own surveillance sector, authorized to spy on the American people. For instance, the U.S. Postal Service, which has been photographing the exterior of every piece of paper mail for the past 20 years, is also spying on Americans’ texts, emails and social media posts.

Constitution-free zones. Merely living within 100 miles inland of the border around the United States is now enough to make you a suspect, paving the way for Border Patrol agents to search people’s homes, intimately probe their bodies, and rifle through their belongings, all without a warrant. Nearly 66% of Americans (2/3 of the U.S. population, 197.4 million people) now live within that 100-mile-deep, Constitution-free zone.

Vehicle kill switches. Sold to the public as a safety measure aimed at keeping drunk drivers off the roads, “vehicle kill switches” could quickly become a convenient tool in the hands of government agents to put the government in the driver’s seat while rendering null and void the Constitution’s requirements of privacy and its prohibitions against unreasonable searches and seizures. As such, it presumes every driver potentially guilty of breaking some law that would require the government to intervene and take over operation of the vehicle or shut it off altogether.

Biometric databases. “Guilt by association” has taken on new connotations in the technological age. The government’s presumptions about our so-called guilt or innocence have extended down to our very cellular level with a diabolical campaign to create a nation of suspects predicated on a massive national DNA database.

Limitations on our right to move about freely. At every turn, we’re tracked in by surveillance cameras that monitor our movements. For instance, license plate readers are mass surveillance tools that can photograph over 1,800 license tag numbers per minute, take a picture of every passing license tag number and store the tag number and the date, time, and location of the picture in a searchable database, then share the data with law enforcement, fusion centers and private companies to track the movements of persons in their cars. With tens of thousands of these license plate readers now in operation throughout the country, police can track vehicles in real time.

The war on cash. Digital currency provides the government and its corporate partners with a mode of commerce that can easily be monitored, tracked, tabulated, mined for data, hacked, hijacked and confiscated when convenient. This push for a digital currency dovetails with the government’s war on cash, which it has been subtly waging for some time now. In recent years, just the mere possession of significant amounts of cash could implicate you in suspicious activity and label you a criminal. Americans are having their bank accounts, homes, cars electronics and cash seized by police under the assumption that they have been associated with some criminal scheme.

These programs push us that much closer towards a suspect society where everyone is potentially guilty of some crime or another and must be preemptively rendered harmless.

In this way, the groundwork is being laid for a new kind of government where it won’t matter if you’re innocent or guilty, whether you’re a threat to the nation, or even if you’re a citizen.

What will matter is what the government—or whoever happens to be calling the shots at the time—thinks. And if the powers-that-be think you’re a threat to the nation and should be locked up, then you’ll be locked up with no access to the protections our Constitution provides.

In effect, you will disappear.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, our freedoms are already being made to disappear.

 

Connect with The Rutherford Institute

Cover image credit: GDJ




Whitney Webb: “They’ve Been Planning This Cyber Attack for Years”

Whitney Webb: “They’ve Been Planning This Cyber Attack for Years”
Clayton Morris of Redacted interviews investigative journalist Whitney Webb 

by Redacted News
December 13, 2023

 



[Should this video be  taken down by Youtube, Whitney’s segment can be found in this full version at Rumble starting at 36:40.]

 

Transcript of video introduction by Clayton Morris:

“Is the deep state mafia setting up a massive cyber attack false flag on the American people that will disrupt the 2024 election?
Well, it turns out that the United States intel agencies have been running tabletop exercises on this exact scenario. And now the Department of Homeland Security head, Mayorkas, says the greatest cyber threat to America is something called Killware.
So what’s really going on here? Are we being set up for a massive false flag?
And investigative journalist Whitney Webb has been writing
about these cyber attack tabletop exercises for years. And she’s been exposing what they’ve been up to. And then this week, we had a crazy “cyber attack” that seemed to shut down half the internet this week. Banks. Rumble was down.
What exactly is going on here? Are we being played like a fiddle?”

 

Connect with Redacted News at Youtube | Rumble

Connect with Whitney Webb at Unlimited Hangout

Cover image credit: cliff1126




Arthur Firstenberg: An Autumn’s Tale

Arthur Firstenberg: An Autumn’s Tale

by Arthur Firstenberg, Cellular Phone Task Force
December 12, 2023

 

Imagine a world in which everyone was convinced to point a musical gun at their head, which shot a continuous stream of tiny bullets, so small that they caused no pain. But every bullet destroyed brain cells on its way through the skull. Imagine millions of gun towers strafing the surface of the earth 24/7 with similar bullets, entertaining the people while destroying all life.

And all the plants and animals were sickening and dying, and the humans were sick and having strokes and heart attacks, but because the bullets were so tiny, few people realized why. Plant biologists blamed the decline on acid rain. Ornithologists blamed influenza. Entomologists blamed climate change and pesticides. The medical profession blamed diet and lack of exercise, and an ever-expanding list of bacteria and viruses.

And here and there, a very few people were screaming, STOP! THROW AWAY YOUR GUNS! TAKE DOWN THE GUN TOWERS! DISABLE THE SATELLITES THAT ARE STRAFING THE EARTH! But because everyone was busy listening to the music, they paid no attention. And the people screaming, who were also sick and having strokes and heart attacks, went to their doctors who, instead of sounding a worldwide alarm, told their patients “You must be gun sensitive” and gave them tranquilizers and antidepressants so they would go away and stop screaming.

And so these people concluded there must be something wrong with them. They formed support groups for people with gun sensitivity, and asked the rest of the world to please take pity on them and stop shooting them. And when there was no place left in the world that was not being strafed, they pleaded with their governments to please establish refuges where they could live out their lives free from bullets. But no one took them seriously.

______________

That is the world we live in today.

“Electromagnetic hypersensitivity” (EHS) is a term that allows doctors to pretend that electricity is harmless, and that radiation does not injure their patients. It allows people who have discovered they can feel electricity and radiation to pretend that there is something wrong with them and that everyone else does not feel it. It allows environmentalists to pretend that the vanishing of birds and wildlife and the collapse of the Earth’s life support systems are due to something else. And it allows people who use cell phones to pretend they do not feel the radiation and that their insomnia, headaches, joint pains, digestive problems, panic attacks, memory loss, tinnitus, nosebleeds, high blood pressure, heart failure, neurological problems, and diabetes are caused by something else.

It is late autumn here in Santa Fe.

And it is late autumn in the life of the Earth. We must prevent winter from coming, for there will be no spring if it does. It is up to all of us.

Arthur Firstenberg
President, Cellular Phone Task Force
Author, The Invisible Rainbow: A History of Electricity and Life
P.O. Box 6216
Santa Fe, NM 87502 USA
phone: +1 505-471-0129
arthur@cellphonetaskforce.org


JOIN The Network of PEOPLE WITHOUT CELL PHONES
The only way to diminish the demand for bandwidth that is turning the Earth into a giant computer, with all living beings electrocuted inside of it, is to stop using cell phones. Not to use them less frequently, but to throw them away. The ability to use them, no matter how infrequently, requires the entire planet to be irradiated. Please join our network by forming a local chapter where you live.

You can set your own rules, but it is important to have meetings in person. Please contact me if you need help and let me know that you are doing it.

Our goal is to establish an expanding global presence of communities that do not use cell phones.

 

Connect with Arthur Firstenberg

Cover image credit: MikeGoad




5G, Satellites & the Global Wireless Rollout: On the Irradiation of Cats, Dogs, Birds & All of Our Natural World

5G, Satellites & the Global Wireless Rollout: On the Irradiation of Cats, Dogs, Birds & All of Our Natural World

 

“If I were a pet owner with one or two pets it would be dismissed but not when for 23 years we run a perfect pet sanctuary and all of a sudden many injuries, it is obvious something is wrong in the skies. We are off the grid, no cell phones and the router is turned off at night. We survived without cell phones and all of this high tech killing technology.”

 

Dogs, Cats, Birds, and Maui

by Arthur Firstenberg, Cellular Phone Task Force
December 5, 2023

 

Cat with radio transmitter

In response to my last newsletter, “Don’t irradiate the birds!,” readers have sent me accounts from far and wide of what has been happening not only to the insects, birds, plants, etc., but also to their pets from being irradiated. I have also discovered more information about the birds of Maui — information that makes the case for radiation killing the birds, and not malaria, even more compelling.

Update on Birds of Maui

The bird in my last newsletter called WILD1 — the one who disabled his radio transmitter less than a day after his release into the forest — was seen, alive and very healthy, on July 23, 2021, 632 days after being released! This was reported in the Honolulu Star Advertiser and in The Maui News. Here is my updated newsletter, amended accordingly: https://cellphonetaskforce.org/dont-irradiate-the-birds/.

Irradiated Dogs and Cats

Sidnee from California writes:

“A cat appeared one day with a tracking device on a harness. I wrapped the device in aluminum foil and taped a note on the back, telling whoever was the owner that he or she was harming his cat with that device. I included my phone number. A man called me and we chatted. Turns out the cat lived in the house behind me. I told him that the wireless radiation would be making his cat sick, but he didn’t care. His response? ‘He’s an expensive cat and he likes to wander. I need to know where he goes.’

“The Tile Tracker works with Bluetooth. I measured the RFR [radio frequency radiation]. It ranged from the hundreds of thousands to 2.5 million μW/m2. And the cat wore this all the time. He was so skinny, hyperactive and aggressive toward my own sweet orange kitty.”

The neighbor’s cat, like some of the birds on Maui, kept managing to remove his transmitter. The owner put a different transmitter on him, this time made by Apple. Sidnee continues:

“Good news. Since the cat kept losing the trackers, the owner has finally given up and the cat has no more devices on his harness! What a different cat! He is mellow, sweet and gets along great with my orange kitty, who is 17 years old.”

Stacy in the Netherlands tells what she has observed in nature, in her cats, and in herself, since the advent of 5G: 

“I have seen a kill-off of insects since 5G has been rolled out. I had 3 ant nests in my house and balcony, they are all dead now and I didn’t do anything. Also my plants on my balcony have not been visited by bees or any insects for that matter.

“Also lots of plants did poorly, the tops of the plants looked like they had been irradiated from the sky, the leaves clumped together, turned and died.

“I have also noted that in the evening I wake up feeling like I have been choked, my mouth and throat completely dried, my lips parched and I can drink a lot of water but it leaves my body very rapidly. I also suffer from a lot of hair loss as do my cats, they have bald patches and I buy them the best of food I can find. I have never had cats with bald patches before, they say it’s old age but it’s not true. I have it with both cats, a male and a female.

“I also notice food does not taste the same any more. I always loved fruit but it has lost its lustre. It also looks withered, less yummie/eat me. It’s like the light has gone out of things and a darkness has entered and for the first time in my life I am worried to the bone and scared.”

Richard in Houston reports a drastic decline in both birds and insects: 

“In Houston this year almost all the birds are gone. There used to be hundreds of doves, this year I have seen ONE. The only other birds I have seen are some blue jays which I feed daily and a hawk which preys upon them. I have fed birds for many years and always had a host of them. This year only the squirrels and rats are eating the bird food. The sky is almost empty of birds.

“The bees have disappeared as well. From hundreds last year to one or two this year.

“The lives of birds and Earth are way more important than the ‘convenience’ of deadly cell phones.”

Smart Bird Feeders

Robyn from Colorado alerted me to smart bird feeders, which several companies are now marketing. She writes: 

“I noticed an advertisement today from our local hardware store for a Smart Feeder made by Feit Electric. This device sends pictures of the birds at a feeder directly to someone’s phone. I couldn’t help but think about how dangerous this exposure might be to birds who come for birdseed. Or maybe in their infinite intelligence, they don’t come near it.”

Here are pictures of three different companies’ smart feeders:

The Effects of Starlink Dishes

Mary from Guffey, Colorado, who has an animal sanctuary at 9,000 feet in the Rockies, tells a story very similar to the one Mark Broomhall told UNESCO (see previous newsletter). A deterioration in the health of all the animals has accompanied each advance in wireless communication. A cell tower provided the first cell phone service in that remote location 10 years ago. The tower was upgraded about 2 years ago. And most people in Guffey got a Starlink satellite dish this past summer. “Just about everyone in Guffey has one”, says Mary. She wrote the following on November 6:

“I live at 9000 feet in Guffey, Colorado. Have for 24 years. Starting about 10 years ago I noticed strange things happening on our animal sanctuary. I would find a cat dead, not killed by an animal, not sickly. About 2 years ago it became even worse. Because we have an animal sanctuary we need to keep good care of these animals, not because of legal ramifications but because that is how it should be. This past year and a half has been worse. My vets believe me because we have so many animals that they have treated seeing no natural reasons for their injuries.

“This past month while walking 2 dogs, one was on leash and one can run around and have fun. That night I noticed the dog on a leash was walking strangely, but my husband had no idea why. The next morning when I went to the cat condo to feed the cats I found one lying in a corner in a pool of urine. When I when to pick her up her skin felt like it was detached from her body. Another cat was making loops around the condo. Round and round. I hurried back to the house to call the vets and told my husband I think the animals have been hit by emf’s. He asked me what I meant. I said like someone hitting you on the back. His reply was ‘Is that what happened?’ I asked him what he meant and he said while walking the dog he felt like someone had hit him but when he looked around there was nothing there.

“By then the dog who was on the leash was walking round and round chasing her tail. I then hurried to the chicken coop to see if they were all right. I found a lovely hen lying dead on the ground in the enclosed run. It looked like she had been dropped from up high but there was nothing there to fall from. The rooster seemed in a daze. I took the cat who was critically injured to the vet and had to be put down, was told to get cbd from a Vet CBD company as they formulate the meds specifically for animals, and was told that the dog was suffering from neurological problems, had developed eye problem and a massive ear infection. We will probably have to euthanize her before the end of the year. The rest of the hens are no longer laying eggs except one a day, down from 10 to 12 per day. All of this in a matter of one day and continuing onward.

“Now in addition to our problem a friend in Divide which is also at 9000 feet said while out playing with their dog and three of their neighbors and their dogs, the dogs got sick and the other people took their dogs to the vet, could find nothing physically wrong and they put the dogs down. My friend is still treating her dog with holistic methods. As an afternote, I have taken 8 cats into the vet due to weight loss and just not looking right. All cats lost from 1 to 2 pounds, blood work found no problems other than stress. We will have to probably put a couple of the cats down if I cannot get them better.

“We allow another non-profit to graze some horses on our 250-acre sanctuary and one of her old horses had to be put down due to cancer. I was talking with the gravedigger while waiting for the lady to come to put her horse down and told him about the problems we had with the animals. He just looked at me and said his chickens were doing the same as mine. If they laid an egg they were soft shell and few eggs. I asked him how long and he said it started about 3 weeks ago.

One of numerous Starlink dishes in Guffey

“If I were a pet owner with one or two pets it would be dismissed but not when for 23 years we run a perfect pet sanctuary and all of a sudden many injuries, it is obvious something is wrong in the skies. We are off the grid, no cell phones and the router is turned off at night. We survived without cell phones and all of this high tech killing technology.”

Starlink is 5G phased array technology from the sky. When a Starlink dish is online, that means a satellite is aiming a narrow beam at it. But by the time the beam reaches Earth from a few hundred miles up in space, the beam can be 8 miles in diameter or more. The dish also aims a beam of radiation directly at the satellite, and scatters radiation around it. If there are a lot of dishes in a 10-mile radius, as there are in Guffey, radiation from Earth and space is scattered far and wide.

 

Connect with Arthur Firstenberg

Cover image credit: Pheladiii


See Related:

Humans, Bees and Wildlife in 2023 — Smart Cities Are Killing All Life

Global Extent of Bird Armageddon: Avian Flu or Radiation?

Amphibians in the Mine: “The Frogs and Salamanders Are Telling Us…It Is a Matter of Their Survival and Ours.”

After Being Fitted With Cell Phones, Horses at Churchill Downs Began to Die During Races

Arthur Firstenberg: Update on Satellites, Birds and Bones

Arthur Firstenberg: Ecocide From Space




Beyond Orwell’s 1984, 5G and the Launching of 6G: “Easy to Take Down a Society that Is Digital”

Beyond Orwell’s 1984, 5G and the Launching of 6G: “Easy to Take Down a Society that Is Digital”

 

People, do not be fooled. It is a confrontation between the powerful elites, namely the Financial, Military, IT, Media, Pharma Complex (FMIMPC) and the We the People, namely Humanity acting Worldwide at the Grassroots of Society.”

 

Beyond Orwell’s 1984, 5G and the Launching of 6G: “Easy to Take Down a Society that Is Digital”. UNCTAD Attempts Accomplishing this Doom Scenario

by Peter Koenig, Global Research
November 19, 2023

 

“Hell is Empty and the Devils are All Here”. 
~ William Shakespeare, “The Tempest”, 1623
Peter Koenig’s Contemporary Analysis of “The Tempest 2020-2030”

 

From 5G to 6G

We, the People, are in a race against the Globalists committed to Depopulation; control the survivors, exploit us, dehumanize us, and ultimately digitize us, so that we can be remotely controlled by 5G;

And, now, just “launched” by China, 6G. See China launches ultra-high-speed next-generation Internet backbone – SHINE News.

 Incidentally, has the health impact of 6G been studied? Maybe. But nobody divulges the results.

This is how Qualcomm describes 5G:

5th generation mobile network. It is a new global wireless standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to connect virtually everyone and everything together including machines, objects, and devices. See this.

Nobody has openly spoken about the health impact of 5G, though, that has been studied. Yet, the studies are not revealed to the public.

Beyond George Orwell’s 1984 

There is “guessing”; and scientists who come forward with the truth depicting the impact caused on wildlife and humans by these ultra-microwaves, are most often labeled “conspiracy theorists.” 

This is the “shut-up” phrase for everything the mainstream, the Cabal, the Matrix, the Globalists do not want the public to know. We are way beyond George Orwell’s “1984.”

The 6th Generation Mobile Network or 6G is about 100 times faster, more powerful, than 5G. It will be able to digitize everything. 

This is what RantCell has to say about 6G:

It is Operating at terahertz frequency bands, 6G will deliver a peak data rate of 1,000 gigabits/s having air latency less than 100 microseconds. When we talk about 5G vs 6G network speed, 6G speed is expected to be 100 times faster than 5G with enhanced reliability and wider network coverage. See this. 

We, the People, are in a race – life against death. If we wake up and counteract, the Globalist’s, namely the project of the diabolical protagonists of UN Agenda 2030 and The Great Reset will “be doomed”.

But if we keep letting us being duped, We, the People, “Will go to Hell”.  

This is the reason why the entire UN system is desperate to get the world digitized. The faster the better so, there may be not enough time for We, the People, to wake up in masses to take our world, our lives back before it is too late.

The Financial, Military, IT, Media, Pharma Complex Nominates UNCTAD  

Therefore, the United Nations, the political body under full control of the Globalist Cabal (openly led by Washington), but really, by the powerful Financial, Military, IT, Media, Pharma Complex (FMIMPC), has nominated one of its under-agents, the UN Conference on Trade and Development (UNCTAD) as the flag-carrier – at least for now – for the deadly onslaught of All-Digitization.

UNCTAD –in blatant derogation of its historical mandate on behalf developing countries, namely the Global South–, will level the playing field, as the saying goes, on behalf of the entire UN System by announcing in a Press Release in Geneva on 15 November 2023, its e-Week from 4 to 8 December 2023, in a major revamp of its annual e-Commerce Week series which began in 2016.

UNCTAD’s Secretary-General, Rebecca Grynspan said,

“The digital economy plays a critical role in advancing development goals at all levels. Through inclusive and multi-stakeholder discussions, we can together build a global digital future that works for all.” 

UNCTAD’s infamous e-Week is called

“UNCTAD e-Week 2023 to Mobilize Global Support for a More Inclusive Digital Economy.”

Sub-titled:

“More than 3,000 stakeholders from 130 countries will examine how to turn digital opportunities into shared development gains and close existing divides for a sustainable future.”

The text of the Press Release abounds in sloganism, niceties and “noneties” (senseless talk for the “sold to the system gnomes”).

For example…. 

“The Conference is themed for “Shaping the Future of the digital economy”. The topics will feature over 150 sessions focused on tackling pressing issues related to digitalization. Key topics will range from platform governance, the development impact of artificial intelligence (AI), eco-friendly digital practices, to empowering women through digital entrepreneurship and accelerating digital readiness in developing countries.”

This intro-phrase hardly misses one of meaningless globalist jargons, that are now current and circulate in the minds of people, without them giving a second thought of what they really mean. 

Wait a minute, they forgot the term “sustainable”. Surely, it will appear later in the text.

UNCTAD and the “Digital Playing Field”

Very Important Persons (VIP) attending. They also talk about several high-level speakers like Amandeep Sing Gill, the UN Secretary General’s Envoy on Technology; Nizar Ben Neji, Tunisa’s minister of communication and technologies; as well as Henry Puna, Secretary General of the Pacific Islands Forum; and many more IT-VIPs.

The AI Potential. They are not missing out on Tapping the Artificial Intelligence (AI) potential, reminding the world that time is of the essence as the world navigates uncertainties surrounding emerging technologies, including the rapid uptake of AI, which is increasingly revolutionizing the digital economy.

It is clear – our future, the People’s future, is being planned as a digital future. And that, without any consultation. The UN body and those who pull its strings are planning to decide for We, the People. But only if we let them.

Leveling the digital playing field will concentrate on the massive data flows from the digital economy, call for global governance responses to market concentration and unequal distribution of benefits. 

They say that over 70% of the global digital advertising revenue goes to just five digital platforms.

So, what are they planning to do about it? Nothing. Because these five digital platforms control already the world – Alphabet, Amazon, Apple, Meta and Microsoft. These behemoths control about 9 trillion dollars-worth of IT communication. And now add “X” (former Twitter) and the horizon for change looks ultra-bleak, especially not by a minor UN body, called UNCTAD. 

This is by far not all.

On the agenda also is another slogan: Harnessing the digital promise, which predicts and promises that the data-driven digital economy holds vast potential for countries to spur economic growth, foster innovation and reduce geographic and physical barriers to inclusive development.

Here is the final icing on the cake:

Digitalization for development – the UNCTAD e-Week platform for constructive and inclusive dialogue is to generate insights and actions that can feed into global efforts, particularly the ongoing UN Global Digital Compact, aimed at catalyzing an open, free, and secure digital future for all, leading up to the UN’s 2024 Summit of the Future.

And for all of that, they need Stronger partnerships; especially with multiple global crises unfolding on geopolitical, economic and climate fronts, countries must make critical decisions to chart digitalization paths for equitable and sustainable development.

They may be talking about the unethical and illegal 2019 compact between Klaus Schwab’s World Economic Forum (WEF) and the United Nations as well as the wantonly man-made worldwide wars and conflicts, chaos, and killings, just to keep the population at bay, confused and distracted. 

This completes the sloganism: Equitable and sustainable is not forgotten.

“Taking Down a Society That Is Digital”

When reading between the lines and beyond the slogans and digital jargon propaganda, it is not difficult to see that we are ever-more rapidly moving towards digital enslavement.

Consider what Tucker Carlson has to say in a recent interview that it is easy to “Take Down a Society That is Digital.”

Think about it.

If everything around us is run by digital signals that are controlled by the “Globalist Cabal” (namely the FMIMPC) one or a few switches can turn off our different networks:

  • water supply, electricity, gas, all kinds of energy,
  • food supply,
  • fuel deliveries,
  • traffic signals,
  • all transportation,
  • all communication,
  • the money in our accounts, and much more.

The impacts on people’s lives are beyond description. It does not need a nuclear explosion to implement its depopulation agenda, or the so-called “useless eaters” (a quote from WEF’s Israeli Yuval Noah Harari), that could also endanger those who control the switches. 

And We, the People, would be completely powerless. 

Listen to Tucker Carlson’s interview (start at 05:00).

Video



By now, it should be clear to all of us what is being gradually and, in many ways, imperceptibly prepared for us, We, the People, is “Pure Evil”.

It is, We, who are in the Matrix. The Elites that control the few switches to run the End Game are outside the Matrix. They will keep their supply lines open – of everything, hoping to live in paradise where, We, the People, own nothing but are happy. 

They remote control the Matrix. We self-proclaimed “red-pilled” people thought we were outside and could watch the chaos being created inside.

It is the other way around.

People, do not be fooled. It is a confrontation between the powerful elites, namely the Financial, Military, IT, Media, Pharma Complex (FMIMPC) and the We the People, namely Humanity acting Worldwide at the Grassroots of Society.


Peter Koenig is a geopolitical analyst and a former Senior Economist at the World Bank and the World Health Organization (WHO), where he worked for over 30 years around the world. He is the author of Implosion – An Economic Thriller about War, Environmental Destruction and Corporate Greed; and co-author of Cynthia McKinney’s book “When China Sneezes: From the Coronavirus Lockdown to the Global Politico-Economic Crisis” (Clarity Press – November 1, 2020). 

Peter is a Research Associate of the Centre for Research on Globalization (CRG). He is also a non-resident Senior Fellow of the Chongyang Institute of Renmin University, Beijing. 

 

Connect with Global Research

Cover image credit: Bluemoont




Trouble in Toyland: How the $16 BILLION “Smart Toys” Industry Spies on Your Children and Makes Their Data Available to Child Traffickers

Trouble in Toyland: How the $16 BILLION “Smart Toys” Industry Spies on Your Children and Makes Their Data Available to Child Traffickers

by Brian Shilhavy, Vaccine Impact
November 18, 2023

 

If your end-of-year holiday traditions include buying presents for your children and grandchildren, please avoid high-tech toys such as the growing “smart toy” sector with toys connected to the Internet. These “toys” are mainly data collection tools to collect as much information on your children as possible, including their location.

It is a dream scenario for child traffickers.

The publication “Trouble in Toyland” by the U.S. PIRG Education Fund has just published their 2023 report with a significant section on “smart toys”.

Excerpts from their Executive Summary:

Last month, an 11-year-old girl was kidnapped by a man she encountered while playing a game online. Fortunately, she was found safe a short time later, about 135 miles away from her home. The game, Roblox, is one of the most popular mobile games this year.

This past spring, the Federal Trade Commission accused Amazon of violating the Children’s Online Privacy Protection Act Rule (COPPA) through its Alexa service by keeping the voice recordings of children indefinitely and failing to delete childrens’ transcripts, even when a parent requested they be deleted. Amazon also gathered geolocation data and used childrens’ transcripts for its own purposes.

A few years ago, Fisher Price’s Smart Toy Bear was discontinued. It was created for children ages 3 through 8 as “an interactive learning friend that talks, listens, and ‘remembers’ what your child says and even responds when spoken to,” according to WeLiveSecurity. But research found a security flaw in the app would allow hackers to get information about children without permission.

This toy bear is not an isolated case. Multiple toys from major manufacturers have been discontinued in recent years after research from various groups showed that children’s voices, images, locations and other information was being improperly collected or hacked. In other cases, vulnerable toys are still for sale.

These days, we’re surrounded by smart devices – all of these things with microphones, cameras, connectivity, location trackers and more. These devices connect to the internet and/or to the outside world, and  they gather and store data, sometimes very poorly. Our children’s holiday gift wish lists may be filled with stuffed animals that listen and talk, devices that learn their habits, games with online accounts, smart  speakers and watches, or all kinds of toys that require you to download an app.

The global market for smart toys grew from $14.1 billion in 2022 to $16.7 billion this year, according to a large market research firm. The business of smart toys is expected to more than double by 2027.

Download the full report.

 

Connect with Vaccine Impact

Cover image credit: nikscoop




We the Exploited: The U.S. Government Buys and Sells Its Citizens for Profit and Power

We the Exploited: The U.S. Government Buys and Sells Its Citizens for Profit and Power

by John & Nisha Whitehead, The Rutherford Institute
November 15, 2023

 

Americans have become easy prey for hackers, scammers, snitches, spies, and con artists.

But don’t be fooled into thinking the government is protecting you.

To the contrary, the U.S. government is selling us (or rather, our data) to the highest bidders.

By the way, those highest bidders also include America’s political class and the politicians aspiring to get elected or re-elected. As the Los Angeles Times reports, “If you have been to a political rally, a town hall, or just fit a demographic a campaign is after, chances are good your movements are being tracked with unnerving accuracy by data vendors on the payroll of campaigns.”

Your phones, televisions and digital devices are selling you out to politicians who want your vote.

“Welcome to the new frontier of campaign tech — a loosely regulated world in which simply downloading a weather app or game, connecting to Wi-Fi at a coffee shop or powering up a home router can allow a data broker to monitor your movements with ease, then compile the location information and sell it to a political candidate who can use it to surround you with messages,” writes journalist Evan Halper.

In this way, “we the people” have been reduced to economic units to be bought, bartered and sold by all and sundry.

On a daily basis, Americans have been made to relinquish the most intimate details of who we are—our biological makeup, our genetic blueprints, and our biometrics (facial characteristics and structure, fingerprints, iris scans, etc.)—in order to navigate an increasingly technologically-enabled world.

Those intimate details, in turn, have become the building blocks of massive databases accessed by the government and its corporate partners in crime, vulnerable to data breaches by hackers, cyberattacks and espionage.

For years now, and with little real oversight or restrictions, the government has been compiling massive databases comprised of all manner of sensitive information on the citizenry.

Biographical information. Biometric information. Criminal backgrounds. Travel records.

There is not a single person in the U.S. who is not in some government database or another, and these databases are increasingly being shared between agencies, fusion centers, and the police.

The government has also, with little oversight and few guidelines, been adding to its massive trove of data on Americans by buying commercially available information (CAI) from third-party sources. As a report by the Office of the Director of National Intelligence revealed:

“[Commercially purchased data] can reveal sensitive and intimate information about the personal attributes, private behavior, social connections, and speech of U.S. persons and non-U.S. persons. It can be misused to pry into private lives, ruin reputations, and cause emotional distress and threaten the safety of individuals. Even subject to appropriate controls, CAI can increase the power of the government’s ability to peer into private lives to levels that may exceed our constitutional traditions or other social expectations.”

In other words, this is the diabolically sneaky way in which the government is attempting to sidestep the Fourth Amendment, which requires that government agents have probable cause and a warrant before spying on Americans or searching and seizing their private property.

It’s bad enough that the government is building massive databases comprised of our personal information without our knowledge or consent, but then they get hacked and we suffer for it.

Earlier this year, for instance, several federal agencies, state governments and universities were targeted in a global cyberattack that compromised the sensitive data of millions of Americans.

Did that stop the government’s quest to keep building these databases which compromise our privacy and security? Of course not.

In fact, the government has also been selling our private information. According to Vice, Departments of Motor Vehicles in states around the country have been selling drivers’ personal information “to thousands of businesses, including private investigators who spy on people for a profit.”

Where there’s a will, there’s a way, and the government has become a master at finding loopholes that allow it to exploit the citizenry.

Thus, although Congress passed the Driver’s Privacy Protection Act (DPPA) in 1994 to prevent the disclosure of personal information, it hasn’t stopped state DMVs from raking in millions by selling driver data (names, dates of birth, addresses, and the cars they own) to third parties.

This is just a small part of how the government buys and sells its citizens to the highest bidders.

The why is always the same: for profit and power, of course.

Welcome to the age of surveillance capitalism.

Have you shopped at Whole Foods? Tested out target practice at a gun range? Sipped coffee at Starbucks while surfing the web? Visited an abortion clinic? Watched FOX News or MSNBC? Played Candy Crush on your phone? Walked through a mall? Walked past a government building?

That’s all it takes for your data to be hoovered up, sold and used to target you.

Incredibly, once you’ve been identified and tracked, data brokers can travel back in time, digitally speaking, to discover where you’ve been, who you’ve been with, what you’ve been doing, and what you’ve been reading, viewing, buying, etc.

Once you’ve been identified in this way, you can be tracked endlessly.

No one is spared.

In this regard, we are all equals: equally suffering the indignity of having every shred of privacy stripped away and the most intimate details of one’s life turned into fodder for marketers and data profiteers.

This creepy new era of for-profit surveillance capitalism—in which we’re being listened to, watched, tracked, followed, mapped, bought, sold and targeted—is made possible with our cooperation.

All those disclaimers you scroll though without reading them, the ones written in minute font, only to quickly click on the “Agree” button at the end so you can get to the next step—downloading software, opening up a social media account, adding a new app to your phone or computer—those signify your written consent to having your activities monitored, recorded and shared.

Think about it.

Every move you make is being monitored, mined for data, crunched, and tabulated in order to form a picture of who you are, what makes you tick, and how best to influence and/or control you.

With every smartphone we buy, every GPS device we install, every Twitter, Facebook, and Google account we open, every frequent buyer card we use for purchases—whether at the grocer’s, the yogurt shop, the airlines or the department store—and every credit and debit card we use to pay for our transactions, we’re helping Corporate America build a dossier for its government counterparts on who we know, what we think, how we spend our money, and how we spend our time.

The technology has advanced so far that marketers (political campaigns are among the worst offenders) can actually build “digital fences” around your homes, workplaces, friends and family’s homes and other places you visit in order to bombard you with specially crafted messages aimed at achieving a particular outcome.

If anyone else stalked us in this way—tailing us wherever we go, tapping into our calls, reading our correspondence, ferreting out our secrets, profiling and targeting us based on our interests and activities—we’d call the cops.

Unfortunately, the cops (equipped with Stingray devices and other Peeping Tom technologies) are also in on this particular scam.

It’s not just the surveillance and the buying and selling of your data that is worrisome.

The ramifications of a government—any government—having this much unregulated, unaccountable power to target, track, round up and detain its citizens is beyond chilling.

Imagine what a totalitarian regime such as Nazi Germany could have done with this kind of unadulterated power.

Imagine what the next police state to follow in Germany’s footsteps will do with this kind of power. Society is definitely rapidly moving in that direction.

We’ve made it so easy for the government to stalk us.

Government eyes see your every move: what you read, how much you spend, where you go, with whom you interact, when you wake up in the morning, what you’re watching on television and reading on the internet.

Every move you make is being monitored, mined for data, crunched, and tabulated in order to form a picture of who you are, what makes you tick, and how best to control you when and if it becomes necessary to bring you in line.

Chances are, as the Washington Post has reported, you have already been assigned a color-coded threat assessment score—green, yellow or red—so police are forewarned about your potential inclination to be a troublemaker depending on whether you’ve had a career in the military, posted a comment perceived as threatening on Facebook, suffer from a particular medical condition, or know someone who knows someone who might have committed a crime.

In other words, you might already be flagged as potentially anti-government in a government database somewhere—Main Core, for example—that identifies and tracks individuals (so they can be rounded up and detained in times of distress) who aren’t inclined to march in lockstep to the police state’s dictates.

The government has the know-how.

As The Intercept reported, the FBI, CIA, NSA and other government agencies are increasingly investing in and relying on corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram in order to identify potential extremists and predict who might engage in future acts of anti-government behavior.

Surveillance, digital stalking and the data mining of the American people—weapons of compliance and control in the government’s hands, especially when the government can listen in on your phone calls, monitor your driving habits, track your movements, scrutinize your purchases and peer through the walls of your home—add up to a society in which there’s little room for indiscretions, imperfections, or acts of independence.

This is the creepy, calculating yet diabolical genius of the American police state: the very technology we hailed as revolutionary and liberating has become our prison, jailer, probation officer, stalker, Big Brother and Father Knows Best all rolled into one.

It turns out that we are Soylent Green.

The 1973 film of the same name, starring Charlton Heston and Edward G. Robinson, is set in 2022 in an overpopulated, polluted, starving New York City whose inhabitants depend on synthetic foods manufactured by the Soylent Corporation for survival.

Heston plays a policeman investigating a murder, who discovers the grisly truth about the primary ingredient in the wafer, soylent green, which is the principal source of nourishment for a starved population. “It’s people. Soylent Green is made out of people,” declares Heston’s character. “They’re making our food out of people. Next thing they’ll be breeding us like cattle for food.”

Oh, how right he was.

Soylent Green is indeed people or, in our case, Soylent Green is our own personal data, repossessed, repackaged and used by corporations and the government to entrap us.

We, too, are being bred like cattle but not for food.

Rather, as I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, we’re being bred, branded, bought and sold for our data.

As the insidious partnership between the U.S. government and Corporate America grows more invasive and more subtle with every passing day, there’s virtually no way to opt out of these assaults on your digital privacy short of being a modern-day Luddite, completely disconnected from all technology.

What we desperately lack and urgently need is an Electronic Bill of Rights that protects “we the people” from predatory surveillance and data-mining business practices.

Without constitutional protections in place to guard against encroachments on our rights in the electronic realm, it won’t be long before we find ourselves, much like Edward G. Robinson’s character in Soylent Green, looking back on the past with longing, back to an age where we could speak to whom we wanted, buy what we wanted, think what we wanted without those thoughts, words and activities being tracked, processed and stored by corporate giants such as Google, sold to government agencies such as the NSA and CIA, and used against us by militarized police with their army of futuristic technologies.

 

Connect with The Rutherford Institute

Cover image credit: Eukalyptus


See Related:

Five Ways to Prepare for the Online Privacy Crackdown

UN & Bill Gates Launch “50in5” Global Digital Infrastructure Plans

The End of Privacy Is Near




The End of Privacy Is Near

The End of Privacy Is Near

by Dr. Joseph Mercola
November 17, 2023

 

Story-at-a-Glance
  • “CITIZENFOUR” is a documentary about NSA whistleblower Edward Snowden. It came out in 2014, but it’s even more pertinent today than it was then
  • In January 2013, when documentary film director/producer Laura Poitras received an encrypted email from a stranger who called himself “Citizen Four”
  • In June 2013, Poitras flew to meet Snowden at the Mira Hotel in Hong Kong, together with columnist Glenn Greenwald and Guardian intelligence reporter Ewen MacAskill. After four days of interviews, Snowden’s identity was made public at his request
  • Today, Snowden’s warnings ring truer than ever. Artificial intelligence now scours social media, podcasts and videos for key words identifying “anti-vaxxers,” for example. It doesn’t even matter if they agree with what you’re writing or saying. The mere inclusion of certain words will get you axed from the platform
  • Next, the plan is to eliminate privacy altogether by requiring a digital identity to access the internet

 

“CITIZENFOUR” is a documentary about U.S. National Security Agency (NSA) whistleblower Edward Snowden. It came out in 2014, but it’s even more pertinent today than it was then, so if you haven’t seen it, I urge you to do so.

The Snowden story began in January 2013, when documentary film director/producer Laura Poitras received an encrypted email from a stranger who called himself “Citizen Four.” Snowden reportedly chose this codename “as a nod to three NSA whistleblowers who came before him: Bill Binney, J. Kirk Wiebe and Thomas Drake.”

Poitras had already spent several years working on a film about monitoring programs in the U.S., and had been placed on a secret watch list after her 2006 film “My Country, My Country,”1 a documentary about Iraqis living under U.S. occupation. In his initial email, Snowden wrote:

“Laura. At this stage, I can offer nothing more than my word. I’m a senior government employee in the intelligence community. I hope you understand that contacting you is extremely high risk and you’re willing to agree to the following precautions before I share more. This will not be a waste of your time …
The surveillance you’ve experienced means you’ve been ‘selected’ — a term which will mean more to you as you learn about how the modern SIGINT system works.
For now, know that every border you cross, every purchase you make, every call you dial, every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet your route, is in the hands of a system whose reach is unlimited, but whose safeguards are not.
Your victimization by the NSA system means that you’re well aware of the threat that unrestricted secret police pose for democracies. This is a story few but you can tell.”
Summary of Snowden’s Journey

In June 2013, Poitras flew to meet Snowden at The Mira Hong Kong, together with columnist Glenn Greenwald and Ewen MacAskill, an intelligence reporter for The Guardian. After four days of interviews, Snowden’s identity was made public at his request.

Within two weeks, the U.S. government demanded Snowden’s extradition. Facing prosecution in the United States, Snowden scheduled a meeting with the United Nations High Commissioner for Refugees and applied for refugee status.

He managed to depart Hong Kong, but became stranded at the Sheremetyevo International Airport in Moscow when his passport was canceled. There he remained for 40 days, until the Russian government finally granted him asylum.

The Greatest Weapon of Oppression Ever Built

The U.S. government implemented Stellar Wind, a program to actively — and illegally — spy on all Americans within days of the 2001 9/11 attack. Ten years later, in 2011, construction began on a NSA data center in the Utah desert. It’s now the largest surveillance storehouse in the U.S.

In his correspondence, Snowden warned Poitras that “telecommunication companies in the U.S. are betraying the trust of their customers.” Through Stellar Wind, all phone calls and text messages were being intercepted and stored, and the Stellar Wind program has only expanded from there.

The NSA not only intercepts American citizens emails, phone conversations and text messages, but also Google searches, Amazon.com orders, bank records and more.

“We are building the greatest weapon for oppression in the history of man,” Snowden wrote, “yet its directors exempt themselves from accountability … On cyber operations, the government’s public position is that we still lack a policy framework. This … was a lie.
There is a detailed policy framework, a kind of martial law for cyber operations created by the White House. It’s called ‘Presidential Policy Directive 20’ and was finalized at the end of last year.”
Linkability, the Key to Control — and Entrapment

As explained in the film, a key aspect of control through surveillance is the linkability of data. One piece of data about you is linked to another piece. For example, your bus pass can be linked to the debit card you used to buy the pass. Your debit card is also linked to all other purchases.

With two key pieces of information — WHERE you went on a given day, and WHEN you made purchases, they can determine who you spoke with and met up with by linking those data points with those of other people who were in the vicinity at the same time. And that’s without even using your cellphone data.

When all these various data points are aggregated — location data, purchases, phone calls, texts, social media posts and more — you end up with a collection of metadata that tells a story about you. However, while the story is made up of facts, it’s not necessarily true.

For example, just because you were standing at a particular street corner does not mean you had anything to do with the crime that was reported on that same corner at the time you happened to be there. The problem is, your data could be used against you in that way.

The January 6 prisoners are a perfect example of how bits and pieces of data can be misused. Many have now spent years in jail simply because their cellphone data showed them as being in the wrong place at the wrong time.

State Power Versus the People’s Power to Oppose That Power

When asked by Greenwald why he decided to become a whistleblower, Snowden replied:

“It all comes down to state power against the people’s ability to meaningfully oppose that power. I’m sitting there every day, getting paid to design methods to amplify that state power.
And I’m realizing that if the policy switches that are the only thing that restrain these states were changed, you couldn’t meaningfully oppose [them].
I mean, you would have to be the most incredibly sophisticated tactical actor in existence. I’m not sure there’s anybody, no matter how gifted you are, who could oppose all of the offices and all the bright people, even all the mediocre people out there with all of their tools and all their capabilities.
And as I saw the promise of the Obama administration be betrayed … and in fact, [how they] actually advanced the things that had been promised to be sort of curtailed and reined in and dialed back … As as I saw that, that really hardened me to action …
We all have a stake in this. This is our country, and the balance of power between the citizenry and the government is becoming that of the ruling and the ruled, as opposed to the elected and the electorate.”
A Decade Later Snowden’s Words Ring Truer Than Ever

“I remember what the internet was like, before it was being watched, and there’s never been anything in the history of man like it,” Snowden said.

“You could have children from one part of the world having an equal discussion, where they were sort of granted the same respect for their ideas and conversation, with experts in a field from another part of the world on any topic, anywhere, anytime, all the time.
It was free and unrestrained. And we’ve seen the chilling of that, and the changing of that model towards something in which people self police their own views. They literally make jokes about ending up on ‘the list’ if they donate to a political cause, or if they say something in a discussion. It’s become an expectation that we’re being watched.
Many people I’ve talked to have mentioned that they’re careful about what they type into search engines, because they know that it’s being recorded, and that limits the boundaries of their intellectual exploration.”

Today, after the extreme ramp-up of censorship, surveillance and harassment we’ve endured since the COVID pandemic began, Snowden’s warnings ring truer than ever.

Artificial intelligence now scours social media, podcasts and videos for key words identifying “anti-vaxxers,” for example. It doesn’t even matter if they agree with what you’re writing or saying. The mere inclusion of certain words will get you axed from the platform.

Snowden’s worst fears have indeed come true, and today most people have come to realize just how dangerous this kind of blanket surveillance can be. Countless individuals whose only “crime” was to share their story of how the COVID shot ruined their lives have had their posts censored and social media accounts shut down.

Canadians whose only “crime” was to donate a few dollars to a peaceful protest had their bank accounts frozen. Small companies and nonprofit organizations with the “wrong” viewpoints have had their online payment services cancelled, effectively strangling their ability to make a living and keep the operation going.

Others have been debanked without recourse, including yours truly. My CEO and CFO and all of their family members also had their accounts and credit cards canceled, apparently for no other reason than the fact that they work for me. In other words, guilt by association.

Will the Internet as We Know It Disappear in the Next Year?

I recently posted an interview with investigative journalist Whitney Webb in which she talks about the next steps in the ramp-up of tyranny. The World Economic Forum has warned we may face a cyberattack on the banks before the end of 2024. That means we almost definitely will, seeing how they like to announce plans ahead of time.

Such a cyberattack will not only destroy the current banking system and usher in programmable central bank digital currencies. It will also eliminate privacy online by requiring everyone to have a digital identification tied to their ISP.

The principles of “know your customer” (KYC) will be imposed on everybody for everything, and anything that doesn’t have that will be made illegal under National Security justifications.

Essentially, what we’re looking at is a cyber Patriot Act, which will allow for the unfettered surveillance of everyone’s online activities, and the ability to restrict or block access to the internet. As noted by Webb, “The internet as you know it will not exist after this happens.”

The goal is to surveil all online activity in real time and have AI perform predictive policing to prevent crime before it happens. At that point, all bets are off. Data points alone may land you behind bars. Thought-crimes will also have ramifications, potentially resulting in the seizure of private property and/or removal of “privileges” previously understood as human rights.

A Global Infrastructure Has Been Built

During their first meeting with Snowden in Hong Kong, he explained that a global infrastructure, built by the NSA with the cooperation of other governments, was already in place. That was 10 years ago, so you can imagine how it’s grown since then.

At that time, that network was already automatically intercepting every digital communication, every radio communication and every analog communication. This blanket siphoning of data allows the NSA and others that have access to the network to retroactively search an individual’s communications, even if all they have is a single identifier. Snowden explained:

“So for example, if I wanted to see the content of your email … all I have to do is use what’s called a selector, any kind of thing in the communications chain that might uniquely or almost uniquely identify you as an individual.
I’m talking about things like email addresses, IP addresses, phone numbers, credit cards, even passwords that are unique to you that aren’t used by anyone else.
I can input those into the system, and it will not only go back through the database … it will basically put an additional level of scrutiny on it moving into the future that says, ‘If this is detected now or at any time in the future, I want this to go to me immediately,’ and [it will] alert me in real time that you’re communicating with someone. Things like that.”

According to Snowden, the British Government Communications Headquarters (GCHQ) has “the most invasive network intercept program anywhere in the world.” That program, Tempora, intercepts all content, in addition to metadata, on everything and everyone.

Snowden also describes the “SSO,” which stands for Special Sorters Operations. The SSO passively collects data across networks, both in the U.S. and internationally. Domestically, this is done primarily through corporate partnerships.

“They also do this with multinationals that might be headquartered in the U.S. whom [they can] just pay into giving them access,” Snowden said. They also do it bilaterally with the assistance of other governments.

You’re Being Spied Upon Everywhere

Snowden also pointed out some of the many ways in which you’re being spied upon by the digital devices around you. As just one example, all VoIP phones, which transmit calls over an IP network such as the internet, have little computers inside of them that can be hot mic’d even if servers are down. As long as the phone is plugged in, someone can use it to listen in on your conversations.

Within days of their first meeting in Hong Kong, Greenwald and Poitras were publishing stories about the NSA’s illegal blanket spying domestically and internationally. CNN Live reported:

“Another explosive article has just appeared, this time in the Washington Post … that reveals another broad and secret U.S. government’s surveillance program.
The Washington Post and The Guardian in London reporting that the NSA and the FBI are tapping directly into the central servers of nine leading internet companies, including Microsoft, Yahoo, Google, Facebook, AOL, Skype, YouTube, and Apple.
The Post says they’re extracting audio, video, photographs, emails, documents, and connection logs that enable analysts to track a person’s movements and contacts over time.”

 

Greenwald also made numerous live news appearances. In one, he stated:

“In 2008, they eliminated the warrant requirement for all conversations, except ones that take place among Americans exclusively on American soil.
So they don’t need warrants now for people who are foreigners outside of the U.S., but they also don’t need warrants for Americans who are in the United States, communicating with people reasonably believed to be outside of the U.S.
So … the fact that there are no checks, no oversight about who’s looking over the NSA’s shoulder, means that they can take whatever they want, and the fact that it’s all behind a wall of secrecy, and they threaten people who want to expose it, means that whatever they’re doing, even violating the law is something that we’re unlikely to know until we start having real investigations and real transparency into what it is that the government is doing.”
Beyond Transparency

At this point, we’re beyond merely needing transparency. The intent to surveil and control every move we make and thought we express is now being openly expressed.

We can just assume that any digital devices can and probably are collecting data on our activities and whereabouts, and that those data are nowhere near held private and can be used against us in myriad ways.

Everyone must now choose between freedom and enslavement, and the option to choose freedom is rapidly closing.

Today, a decade after Snowden broke the dam of secrecy around the global surveillance scheme, we have but one choice left, and that is to actively reject that system by changing how we live our day to day lives. Everyone must now choose between freedom and enslavement, and the option to choose freedom is rapidly closing. Putting off making that choice is itself a choice.

Rejecting the control system means reverting back to “dumb” appliances and devices to the extent you’re able. It means getting savvier about privacy technologies such as deGoogled phones and computers2 that cannot spy on you. It means using cash as much as possible and rejecting CBDCs and digital tokens. As noted by Whitney Webb in the interview I linked to earlier:

“There’s a huge need for to divest from Big Tech as much as possible, and it needs to happen quickly, because the choice is either participate in the system being designed for you by crazy people and become a slave, or don’t become a slave. And if you don’t want to be a slave, you have to invest now in Big Tech alternatives, unless you want to live a completely analog life …
The easiest route is to go the slavery route, and that’s how they’ve designed it on purpose. The whole selling point of that system is that it’s convenient and easy. So, obviously, it’s going to take some work to go the other route, but the future of human freedom depends on it so I think it’s a pretty easy choice.”

Connect with Dr. Joseph Mercola

Cover image credit: CDD20


See Related:

Five Ways to Prepare for the Online Privacy Crackdown




UN & Bill Gates Launch “50in5” Global Digital Infrastructure Plans

UN & Bill Gates Launch “50in5” Global Digital Infrastructure Plans

by Kit Knightly, OffGuardian
November 16, 2023

 

Last week the United Nations Development Program officially launched their new initiative promoting “Digital Public Infrastructure” (DPI) around the world.

The “50in5” program – so-called because it aims to introduce DPI in fifty countries in the next five years – began with a live-streamed event on November 8th.

For those of you unsure what “Digital Public Infrastructure” is, the 50in5 website is quite clear:

Digital public infrastructure (DPI) – which refers to a secure and interoperable network of components that include digital payments, ID, and data exchange systems.

There’s nothing new there, for anyone who has been paying even the slightest bit of attention. Digital identity and digital payment systems are self-explanatory (and we’ve covered them before). “Data Exchange Systems” essentially means national governments will share identity and financial records of citizens across borders with other nations, or indeed with global government agencies.

The key word is “interoperable”.

As we have written before, the “global government” won’t be one single health care system, identity database, or digital currency – but dozens of notionally separate systems all carefully designed to be fully “interoperable”.

As well as being a project of the UNDP, UNICEF, and the Inter-American Development Bank, the 50in5 is funded by various globalist NGOs and non-profits including the Bill & Melinda Gates Foundation and (indirectly through an NGO called “Co-Develop”) the Rockefeller Foundation.

The eleven counties taking part in the program so far are Bangladesh, Brazil, Estonia, Ethiopia, Guatemala, Moldova, Norway, Senegal, Sierra Leone, Singapore, Sri Lanka, and Togo. A careful spread from every continent, including first, second, and third-world nations.

It is a list noteworthy for including NATO, EU, and BRICS members. Interesting implications on supposed “multipolarity” there.

In related news, on the exact same day the 50in5 program launched, the European Parliament and Council of Europe agreed on a new framework for a region-wide European Digital Identity (eID) system.

According to the official press release [emphasis added]:

The revised regulation constitutes a clear paradigm shift for digital identity in Europe aiming to ensure universal access for people and businesses to secure and trustworthy electronic identification and authentication. Under the new law, member states will offer citizens and businesses digital wallets that will be able to link their national digital identities with proof of other personal attributes (e.g., driving licence, diplomas, bank account). Citizens will be able to prove their identity and share electronic documents from their digital wallets with a click of a button on their mobile phone.

This comes on the back of announcements that the European Central Bank is moving on to the “next phase” of its Digital Euro plans this month. The digital euro will – according to former IMF (and apparent numerology nut) Christine Lagarde – afford some “limited control” over people’s spending.

India, another BRICS nation, has been at the forefront of DPI development for years, and now articles are appearing in publications like Forbes, claiming “India Has A Digital Infrastructure, America Needs One”.

At the same time, China is making strides toward ending online anonymity, while Western politicians like Nikki Haley say we should be doing the same.

As the world focuses on Hamas and Israel, the global re-organization phase of the Great Reset is just quietly going about its business. Building a net and waiting to tighten it.

 

Connect with OffGuardian

Cover image credit: irfanahmad




Five Ways to Prepare for the Online Privacy Crackdown

5 Ways to Prepare for the Online Privacy Crackdown
With legislation around the world seeking to gut encryption and online anonymity, Ramiro Romani offers an overview of what’s coming and several solutions for divesting from Big Tech products and protecting your online privacy.

 

by Ramiro Romani, Unlimited Hangout
November 6, 2023

 

The internet is about to change. In many countries, there’s currently a coordinated legislative push to effectively outlaw encryption of user uploaded content under the guise of protecting children. This means websites or internet services (messaging apps, email, etc.) could be held criminally or civilly liable if someone used it to upload abusive material. If these bills become law, people like myself who help supply private communication services could be penalized or put into prison for simply protecting the privacy of our users. In fact, anyone who runs a website with user-uploaded content could be punished the same way. In today’s article, I’ll show you why these bills not only fail at protecting children, but also put the internet as we know it in jeopardy, as well as why we should question the organizations behind the push.

Let’s quickly recap some of the legislation.

European Union

– Chat Control: would require internet services (Email, chat, storage) to scan all messages and content and report flagged content to the EU. This would require that every internet based service scans everything uploaded to it, even if it’s end-to-end encrypted. Content would be analyzed using machine learning (i.e. AI) and matches would automatically be reported to the police. This is awaiting a vote from the EU LIBE committee.

United Kingdom

The Online Safety Act 2023: would require user service providers to enforce age limits and checks, remove legal but harmful content for children, and require scanning photos for materials related to child sexual abuse & exploitation, as well as terrorism. It would require providers to be able to identify these types of materials in private communications and to take down that content. This means providers would need visibility into messaging, even those messages are end-to-end encrypted. End to end encrypted messaging providers such as WhatsApp, Viber, Signal, and Element have indicated in an open letter that surveillance on of this type simply isn’t possible without breaking end to end encryption entirely, and have threatened to leave the UK if the bill was passed & enforced without the offending Clause 122. This bill was recently passed by parliament unchanged and will become enforceable in 2024.

United States

– The EARN IT Act 2023: would allow US states to hold websites criminally liable for not scanning user uploaded content for CSAM (child sexual abuse material). This would effectively ban end to end encryption. This bill has 22 cosponsors and is awaiting an order to report to the Senate.

– The STOP CSAM Act 2023 (Full Text): would allow victims who suffered abuse or exploitation as children to sue any website that hosted pictures of the exploitation or abuse “recklessly”, e.g. if your website was not automatically scanning uploads. Websites are already required by law to remove CSAM if made aware of it, but this would require providers to scan all files uploaded. This bill has 4 cosponsors, and is awaiting an order to report to the Senate.

– Kids Online Safety Act (KOSA): would require platforms to verify the ages of its visitors and filter content promoting self-harm, suicide, eating disorders, and sexual exploitation. This would inherently require an age verification system for all users and transparency into content algorithms, including data sharing with third parties. This bill has 47 bi-partisan cosponsors and is awaiting an order to report to the Senate.

Its important to note that the language in these bills and the definition for “service providers” extends to any website or online property that has user-uploaded content. This could be as simple as a blog that allows comments, or a site that allows file uploads. It could be a message board or chatroom, literally anything on the internet that has two-way communication. Most websites are operated by everyday people – not huge tech companies. They have neither the resources or ability to implement scanning on their websites under threat of fine or imprisonment. They would risk operating in violation or be forced to shut down their website. This means your favorite independent media site, hobbyist forum, or random message board could disappear. These bills would crumble the internet as we know it and centralize it further for the benefit of Big Tech who are rapidly expanding the surveillance agenda.

We must pause and ask ourselves, is this effort to ramp up surveillance really about protecting children?

How do companies currently deal with CSAM?

In the United States, tracking CSAM is recognized as a joint effort between ESPs (Electronic Service Providers) like Google, and the National Center for Missing & Exploited Children (NCMEC) a private non-profit established by Congress in 1984 and primarily funded by the United States Department of Justice. Unlimited Hangout has previously reported on the NCMEC and its ties to figures such as Hillary Clinton and intelligence-funded NGOs such as Thorn. They also receive corporate contributions from big names such as Adobe, Disney, Google, Meta, Microsoft, Palantir, Ring Doorbell, Verizon, and Zoom.

https://unlimitedhangout.com/2020/09/investigative-reports/ashton-kutchers-ngo-supplies-police-with-free-cia-linked-surveillance-tool-to-protect-kids/

Electronic service providers in the United States are already required to report to the CyberTipline (Federal statute 18 USC 2258A) if they become aware of CSAM, otherwise they may face fines or prison time. These CyberTipline reports combine offending content with additional information such as identifying the potential perpetrator, the victim, and other context that is combined and sent off to law enforcement.

Photo & content scanning measures are not required. However, several prominent companies have voluntarily implemented scanning of communications and media, such as Gmail, YouTube, Google Photos, Facebook, Instagram Messenger, Skype, Snapchat, iCloud email, and Microsoft’s Xbox. If you use these services, then your messages and media may automatically be scanned for abusive material.

Ironically and not surprisingly, its these very platforms that have the most malicious activity, including drug & guns saleschild abuse material, and cyberbullying/harassment.

Does voluntary content scanning actually help protect children?

Google began publishing a CSAM transparency report in 2021 which gives numbers on how much CSAM was identified and reported on across Google & Youtube. It includes data since 2020, with counts for how many reports were made to the NCMEC, how many different Google accounts were disabled, and how many “hashes” (photo fingerprints) were contributed to the NCMEC hash database.

It is unclear exactly when Google started creating “hashes” of its users photos, but they have contributed 2.5 million new hashes to National Center for Missing and Exploited Children’s Hash Database to date. Reports are published every 6 months, and we’ve seen staggering growth in all types of reports since 2020. For example, Google’s CyberTipline reports have grown from ~547,000 in 2020, ~870,000 in 2021, to more than 2.1 million reports in 2022. The first half of 2023 has shown a decline, totaling ~750,000 reports from January to June.

As seen on NCMEC’s CyberTipline Data page, Google’s reports represent a mere fraction of the total number of reports submitted to the NCMEC, which works with over 1,500 ESPs – mostly US companies. 5 electronic service providers (Facebook, Instagram, Google, WhatsApp, and Omegle) accounted for more than 90% of the 32 million reports in 2022. Around half (49%) of these reports in 2022 are “actionable”, meaning there is sufficient information for law enforcement to proceed with an investigation. Additionally, 89.9% of reports involved content uploaded by users outside of the US.

The NCMEC also reports the numbers of CyberTipline reports made to different law enforcement organizations such as Internet Crimes Against Children, Local LE, Federal LE, and International LE.

Law enforcement is not required to give any feedback on what happens with these reports and, as a result, they hardly provide feedback. Using the NCMEC’s own numbers, we can see there is little visibility on how the reports are used.

In 2022, we saw the following rates of feedback from law enforcement and other groups who received reports.

  • International Crimes Against Children Groups – 491,655 actionable reports resulted in 41.59% Feedback
  • Local Law Enforcement – 1,462 actionable reports resulted in 3.48% Feedback
  • Federal Law Enforcement – 1,356,988 reports resulted in 0.03% Feedback
  • International Law Enforcement – 13,995,567 reports resulted in 0.4% Feedback

Keep in mind, a feedback response doesn’t necessarily mean an arrest or conviction. Feedback responses could may indicate the report was closed or incomplete feedback. Also, these results are not open to the public, although a FOIA request could change that. However, these numbers make it clear that whether companies are voluntarily scanning their content or creating reports after becoming aware of CSAM – there’s no visibility on what actually happens with the reports.

Given the huge volume of reports not acted upon, forcing technology providers to automatically scan content & generate reports is not going to magically change things. It will require law enforcement to act on reports to put child predators behind bars and save children. That is, after all, what legislators say they want.

That’s not to say nothing is being done. A 2022 report of CyberTipline success stories in the United States stated that close to 714 different cases used CyberTipline reports. Only 16 of these cases explicitly reported the assistance of a service provider.

Again, out of 1.35 million actionable CyberTipline reports in the United States in 2022, there have been 714 arrests so far. Its possible there are ongoing investigations that will bring this number higher, but we can only guess without transparency. I was unable to find success stories for any prior years.

I commend these efforts to protect children from dangerous predators; however, these efforts do not necessitate automatic scanning of everyone’s messages or the gutting of encryption. Generating more reports from service providers obviously does not lead to more arrests being made. Lastly, the majority of CSAM material comes from big tech providers, many of whom are voluntarily scanning content anyways. Why enforce this requirement on every website on the internet?

If legislators around the world want to make a genuine impact on child abuse, then they should push for transparency and accountability practices for law enforcement and work to ensure that law enforcement properly investigates the millions upon millions of reports they already receive every year, and make the data available to the public.

We the people need to know that the groups responsible for investigating child abuse are doing their jobs with the processes and data already available, rather than further sacrifice our individual privacy and security for more of the same. The bills/laws in question also lack an understanding of encryption, are not technically feasible to implement, put unnecessary legal liability on technology companies, and lack evidence that the policies will improve outcomes for children.

How can the online child abuse laws across Western countries be so consistent with their practices? How did they all reach the same strategies of age verification, content filtering, and client side scanning?

The framework for this legislation has been in the works for years. One key architect of this push has been the WePROTECT Global Alliance, a merger of initiatives between the European Commission, the US Department of Justice, and the UK Government. Their first summit was hosted in 2014 and is now comprised of 97 governments, 25 technology companies, and 30 civil society organizations.

UNICEF, a member of WePROTECT, released a “model national response” which outlines many of the elements we see in these different child safety bills today. UNICEF and organizations like the US Department of Justice state that sexual exploitation of children cannot be addressed by one country, company, or organization working in isolation. Troublingly, both of those groups have a history of turning a blind eye to child abuse in their respective organizations and/or jurisdictions (see hereherehere and here for examples).

Working groups like the “Five Country” government counterparts (Five Eyes) – USA, UK, Australia, Canada, New Zealand– have met with the corporate executives of Facebook, Google, Microsoft, Roblox, Snap, and Twitter to collaborate on guidelines such as the “Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse” (justice.gov link). These groups are all working together, via public-private partnerships like the Global Cyber Allianceamong others, to change the face of the internet.

Earlier this year, the Department of Justice outlined the “risky” aspects of technology in a 2023 National Strategy Report on Child Exploitation:

 

– an uneven response to online child safety by the tech sector;
– a CyberTipline system that is overwhelmed;
– anonymization of offenders;
– encryption of data storage and communications;
– online environments where children and adults interact without supervision or controls;
– globalized, often sovereignless, platforms;
– remote, often extraterritorial, storage; and
– a compounding lack of public awareness of these risks.

While the issue of child exploitation online is grave and child abusers need to be held accountable – this shouldn’t come of our individual privacy and freedom. From the publicly stated perspectives of these groups, anonymization, encryption, and not allowing governments or tech companies to track all content is equivalent to contributing to child exploitation.

Ignoring the child abuse right in front of their noses

As noted earlier, many of these groups have a track record of responding very poorly to serious child abuse issues when these crimes involve their own organization or persons with political value. For instance, there have been nearly 2,000 allegations of child sexual abuse and exploitations made against U.N “Peacekeepers” worldwide between 2004 and 2016, as reported by the Associated Press. This includes the child sex ring in Haiti from 2004 to 2007 where Sri Lankan UN “Peacekeepers” traded food in exchange for sex with children as young as nine years old.

The names of the offenders are kept confidential by the UN, and the UN puts the responsibility on member states to investigate & prosecute. UN records on these allegations are also incomplete and hundreds of cases have been closed without explanation. The United Nations even continues to send Sri Lankan peacekeepers to Haiti, despite the scandals. In the United States, we can see a similar level of accountability with the Department of Justice still withholding the client list for Jeffrey Epstein’s child prostitution ring, among many, many other examples.

The very organizations that try to convince us to give up our individual liberties for the sake of the children will completely ignore crimes against children when it suits them. Can we really trust these organizations to protect children?

The real-time monitoring of messages and outlawing of privacy will not protect children. On the contrary, it would put their communications into the hands of more third parties. The wiser choice would be to encourage parental awareness and conscious use of technology, e.g. not giving children unlimited access to mobile phones or devices and avoiding use of popular social media platforms and messengers.

If these actors truly cared about protecting children, then they would call an end to the genocide & war crimes occurring in Gaza. Instead, the US is rushing to provide aid to Israel in the form of munitions. In the UK, only 80 out of 650 MP’s have called for a ceasefire. Instead, there is more interest in clamping down on and controlling the internet, a crucial resource for all people in a time of great need.

Inter-governmental organizations are pushing towards an internet where our identities are verified and our messages are tracked. With such legislation coming our way all over the world, how can we retain any privacy?

The answer is simple – do not comply. Do not follow along with big tech companies that voluntarily follow legislative guidelines. Find ways to decentralize your use of software. Invest your time into divesting from big tech and learning alternative solutions for communications, storage, and encryption. Given the stakes, there has never been a more important time to divest from these companies and their software.

Thankfully, there are still many ways that individuals can limit their dependence on centralized software services that perform content or AI scanning. We can boycott those Big Tech companies that scan our content including Microsoft, Google, Apple and countless others. It’s just a matter of learning how to take back our technology.

At this point you might be asking:

  • How do we continue to find information on the internet without Google’s search engine?
  • Or use our computers without Microsoft’s Windows and Apple’s macOS?
  • Or use our phones without Google’s Android or Apple’s iOS?
  • Or use our browser without Google’s Chrome, Microsoft’s Edge, or Apple’s Safari? (the oligopoly of these behemoths extends everywhere.)

Solving these problems with alternative software has been the mission of my initiative Take Back Our Tech, and today I am honored to share 5 Ways To Protect Yourself from Incoming Internet Surveillance Bills with the Unlimited Hangout community.

1. Use a “free” operating system for your computer.

Traditional operating systems (“OSs”) like Windows and macOS are proprietary software, which is distinct from free software. It’s important to understand the difference between the two, as the topic will come up again. So let’s define proprietary and free software.

Proprietary software, or “non-free software,” is not available for users to study, observe, or change. As the user, you are given no rights.

For example, only the developers of Microsoft Windows can get a clear look at the code of the operating system and understand what it does. Users have no way to view the code, and verify what the program does.

In contrast, free software (also known as Free & Open Source Software FOSS) gives users rights. The Free Software Foundation, one of the leading organizations behind the Free Software movement, provides an extended definition:

“Free software” means software that respects users’ freedom and community. Roughly, it means that the users have the freedom to run, copy, distribute, study, change and improve the software. Thus, “free software” is a matter of liberty, not price. To understand the concept, you should think of “free” as in “free speech,” not as in “free beer.” We sometimes call it “libre software,” borrowing the French or Spanish word for “free” as in freedom, to show we do not mean the software is gratis.

You may have paid money to get copies of a free program, or you may have obtained copies at no charge. But regardless of how you got them, you always have the freedom to copy and change the software, even to sell copies.

Alternative operating systems based on GNU/Linux are free software. They offer many intended benefits:

  • Visibility into changes: Any user or developer can take a look at code updates and ensure that the operating system is not acting unexpectedly or maliciously. For instance, users of the Ubuntu OS fought back against changes that sent search results to Amazon and got the changes overturned.
  • More choices: Because others can modify and distribute free software at will, far more software choices exist in the free software ecosystem — choices that often outcompete and provide more value than proprietary software.
  • Costs: All Linux distributions are FREE as in cost. Compare this to paying for Windows activation keys.
  • Freedom: Your computer will not automatically track every program that you run, as does macOS, or force updates on you, as Windows does (and to which you agree in their terms of service, a document very few take the time to read).

So what are you waiting for? Throw your proprietary software in the trash and enjoy an operating system that respects your freedom and your data.

Here are some recommendations for free operating systems based on Linux. You can download the .iso file (in which the OS is contained) for each operating system from the following links as well as feature walkthroughs.

Once you’ve made your decision of OS you can follow the guide linked above to get it installed on your machine.

2. Use open-source software on your phone.

The two main choices for traditional mobile operating systems today is Google’s Android, and Apple’s iOS. These two options make up 99%+ of the global market share of mobile operating systems. With over 6.6 billion phones on earth, the data pipeline to these two companies is incomprehensibly large – they’ve got real-time data for almost every person on the planet.

Observational studies of both Android and iOS-based phones found that these devices connect back to their parent companies every 5 minutes. In addition, they collect unique device identifiers, phone numbers, locations, and other surprising info.

Although it would be too lengthy to discuss these issues in-depth in this article, if you’d like to see exactly what tracking and data collection occurs on these mobile operating systems, you can read #TBOT’s analysis here.

A few alternative operating systems have popped up in recent years that can compete with the likes of Google and Apple. These operating systems are referred to as “de-googled” operating systems, and are typically built on top of Android’s Open Source Platform (AOSP). This code is maintained by Google, but other developers have been able to build new features on top of it, and more importantly, to remove any behind-the-scenes tracking or data collection.

You can use one of these alternative operating systems today to configure your own “privacy phone.”

I recommend these three operating systems (note that each is compatible with only certain phones):

You can get more information on supported phones and the install instructions on each website.

Alternatively, if you are pressed for time or don’t want to do the research and make the tech decisions yourself, you can get a phone out of the box that comes complete with GrapheneOS and useful free software apps and communication services, through my project Above Phone.

De-googled phones use alternative app stores like F-Droid (where all apps are free software) and Aurora Store (which will allow you to download apps anonymously from the Google Play Store).

Normal Android phones also have access to these apps, but will still suffer from centralized tracking through Google Services. If you have an Android-based phone you can get started with these alternative app stores right away. Get more details on the links below:

F-Droid FOSS App Catalogue: https://f-droid.org/
Aurora Store: https://auroraoss.com/

You may be surprised at how easily you can transition to a de-googled phone — there are user friendly, private, and functional options for almost all of your app needs. You can also use apps like Uber & AirBnb, which don’t work without Google services, but there is usually a workaround, like using those services from within a web browser, or by using advanced features like GrapheneOS’s sandboxing to isolate Google Services from the rest of your phone.

3. Own your data.

If a major cyber event caused the internet to go down, how would you recover the photos/files/information you stored on cloud services? How would you get the information you needed to prepare for a survival situation?

It would be best to have this information on hand when you need it – not desperately trying to recover it in the event of a cyber disaster.

At a minimum, you should back up all of the following on your local computer instead of on the cloud service you use currently: passwords, legal documents, books, photos, reference material, and maps.

Here are some suggestions to be “cyber-pandemic” ready.

  1. Knowledge is power. Download all the books you need in PDF format. A great site to start is PDFDrive
  2. Need to navigate offline? Organic Maps (available on F-Droid and for Android phones) lets you download maps of most of the regions on the planet — and you can route to different locations using GPS only (which means you don’t need a SIM card in your phone).
  3. If you use Google Drive or iCloud, now is the time to export all of your photos, videos, and documents to a local hard drive. Here’s a tutorial on how to export Google Drive files. Here’s an tutorial on how to export files on iCloud.
  4. Are you managing your passwords in the cloud? Know that cloud password managers are not immune to hacking attempts. The best place for your passwords is in an encrypted password vault on your computer. An attacker would need not only the password vault file on your computer, but also the master password used to encrypt the vault. A collection of software called Keepass offers a cohesive way to manage and sync passwords locally on your computer and on your phone.
4. Support alternatives.

A wide range of software can serve as alternatives in the open-source software ecosystem. I’ve categorized and listed several great ones below, all of which are programs for Linux computers!

You can also find an important set of core software for Linux with details on how to use it on #TBOT’s Open-Source Survival Toolkit. A larger list of programs is available on #TBOT’s Open Source Survival Library.

Password Managers

KeepassXC: Offline password manager.
Bitwarden: Cloud-based password manager

Privacy / Security

I2P: Private peer-to-peer networking layer.
VeraCrypt: Open-source cross-platform disk encryption

Browsers

Ungoogled Chromium: A (fork) copy of Google’s Chromium engine with tracking removed
LibreWolf: Firefox fork with improved privacy
Falkon: KDE Project’s web browser

Email

Evolution: A mail client, calendar, address book, and task manager in one
Thunderbird: Mozilla Foundation’s email, chat, and calendaring client
Mailspring: Easy-to-use, modern mail client with integrations to major email providers
KMail: KDE’s email client that supports many mail protocols

Communication

Kotatogram: Alternate Telegram client with improved offline features
AnyDesk: Remote desktop / support software
Jitsi: Free video conferencing
Jami: Free and open-source peer-to-peer video conferencing.

Social Media

Nostr: a decentralized social media protocol
PeerTube: Decentralized video broadcasting
Nitter: Alternative twitter front end
Invidious: Alternative YouTube front end
Libreddit: Alternative Reddit front end
Owncast: Self-hosted live video and web chat server

Graphics

Krita: Free and open source digital illustration program
Inkscape: Professional vector-based graphics editor
GIMP: One of the oldest and best- known image editors
Pinta: Bitmap editor similar to Paint.NET
Gravit Designer: Vector-based design app
Blender: End-to-end 3D creation suite

Photography

DarkTable: Virtual light table and darkroom for photography
DigiKam: Personal photo management

Video Editors

Kdenlive: The KDE project’s video editor
Davinci Resolve: High-end professional video editor
OpenShot: Easy-to-use, powerful video editor

Video Utilities

OBS Studio: Video recording and live streaming
Kazam: Record videos of your screen
Peek: Record videos and gifs of your screen
Spectacle: KDE’s screenshot tool

Technical Tools

Remmina: A remote desktop client
VirtualBox: Create virtual machines

Writing

CherryTree: Hierarchical note-taking application that stores multimedia notes in an encrypted database (not markdown)
Trillium Notes: Build knowledge bases & graphs with this extensible note-taking application (not markdown)
Joplin Notes: Create simple notes and to do lists using markdown

Reading

Foxit PDF: Feature-rich PDF reader.
Sioyek: PDF reader for academic papers.

Office

LibreOffice: Most popular open-source office suite for Linux
OnlyOffice: Collaborative online document editor
CryptPad: Browser-based encrypted document editor
HomeBank: Personal money management

5. Own your communications.

Although social messengers like WhatsApp, Signal, Telegram, and Facebook Messenger can be useful, many of them are not open source. Even the ones that claim to be open source often only make the front end of the application visible for inspection (that part you interact with directly), not the server-side code that is responsible for delivering messages.

Chat protocols like XMPP and Nostr are fully open source, meaning the code is available for the client and server. This is especially important because it means that you can run the server-side software yourself on a computer under your control. This is called self-hosting, and it’s crucial to censorship resistance and verifying that a software does what it says.

XMPP is over 20 years old and can support tens of thousands of users on a single server. It offers end-to-end encrypted messaging, voice calls, and video calls (as well as files and audio messages). It can be used on computers, phones, and in a web browser, and it’s also completely free to join (you can join any public server). It can even be bridged to the phone network (anonymous phone numbers without needing a SIM card anyone?).

It’s a wonder why XMPP isn’t more well known, but part of the reason could be that it’s hard to monetize (make money) on XMPP. The protocol has been used under the hood for major chat services run by big tech companies scaling to millions of users, unfortunately these big companies hid the underlying technology.

Above Phone is attempting to change this. The Above Privacy Suite offers a professional XMPP service with enhanced privacy. It comes in a bundle with 5 other privacy services.

Conclusion

The internet is changing and battle lines are being drawn. On one side, government organizations have become obsessed with invading our personal communications and drastically advancing the ever encroaching surveillance state, supposedly “for the sake of the children.” Together with enthusiastic help from Big Tech, they threaten to monitor even single thought, idea, or creation you share on the internet.

On the other side are people who are not going to let that happen. We’re the underdogs, a small but growing number of people who are demanding privacy and freedom over convenience. It doesn’t have to be their way or the highway when it comes to technology, we can carve our own path, experimenting with software that is friendly and in alignment with our values. Hopefully, this guide can give you a starting point to understand your technology and places to find alternatives.

I encourage you to not only explore and use the software listed in this guide, but to support the developers with financial donations. Their projects may be the key to both surviving and thriving in the growing surveillance state.

 

Connect with Above Phone project

Connect with Unlimited Hangout

Cover image credit: Franz26




Sweden: New Dystopian DIGITAL ID

Sweden: New Dystopian DIGITAL ID
Now people need a phone with a camera and NFC to register their new digital ID

by Peter Imanuelsen, The Freedom Corner
September 10, 2023

 

Do you remember when people were called “conspiracy theorists” for warning about the covid passports? Turns out that those who warned about them were correct!

The same people have now been warning for quite some time about digital ID, and with good reason.

In Scandinavia, we have already had digital ID for a long time. People need it to be able to do everyday tasks like online banking, buying things online and much more.

Now, the digital ID system in Sweden called “BankID” is getting a few changes regarding security.

When setting up your digital ID, people can be asked to have passport or national ID card available.

The way it works is that you have to have a smartphone with a camera and NFC contactless reader built in.

When setting up the new digital ID, you simply take a picture of the photo on your passport or ID card, then you “touch” the phone against the passport or ID to scan the contactless NFC chip – And boom you have verified your digital ID.

Yes, Swedish passports have a contactless NFC chip built into them. So when you use your phone to scan your passport it confirms your identity.

You can watch the video on how Swedish people have to set up their digital ID in this video from Swedbank.



Have you ever wondered what digital ID really is and the real plan behind this agenda?

It is all about control. Imagine a world where we have central bank digital currencies. Everyone needs a digital ID to access their digital wallet.

Imagine how easy it is for the state to control everything people do and buy.

In fact, there is already a Swedish company that has technology to track your purchases and calculate your C02 emissions. Many banks are already using this technology to inform people of their carbon emissions based on what they buy. In other words, tracking your purchases.

If you haven’t already, make sure to read my in-depth article on the TRUTH about the digital ID.

The truth about digital ID 
But it gets worse!
In Sweden, thousands of people have already implanted microchips in their hands to use for contactless payments. All you have to do is hold your hand over the card reader and it gets scanned.

During covid, some people even used their implanted microchips for their covid passports, meaning they just scanned their hands to show up their “green” covid passport status.

This is scary stuff.

You can read my article on this here:

 People are now paying with microchips in their hand.

 

Connect with Peter Imanuelsen

Cover image credit: PixxlTeufel




We the Targeted: How the Government Weaponizes Surveillance to Silence Its Critics

We the Targeted: How the Government Weaponizes Surveillance to Silence Its Critics

by John & Nisha Whitehead, The Rutherford Institute
August 29, 2023

 

“Once a government is committed to the principle of silencing the voice of opposition, it has only one way to go, and that is down the path of increasingly repressive measures, until it becomes a source of terror to all its citizens and creates a country where everyone lives in fear.”

— President Harry S. Truman

Ever since Martin Luther King Jr. delivered his groundbreaking “I Have a Dream” speech during the March on Washington for Jobs and Freedom on Aug. 28, 1963, the Deep State has been hard at work turning King’s dream into a living nightmare.

The end result of the government’s efforts over the past 60 years is a country where nothing ever really changes, and everyone lives in fear.

Race wars are still being stoked by both the Right and the Left; the military-industrial complex is still waging profit-driven wars at taxpayer expense; the oligarchy is still calling the shots in the seats of government power; and the government is still weaponizing surveillance in order to muzzle anti-government sentiment, harass activists, and terrorize Americans into compliance.

This last point is particularly disturbing.

Starting in the 1950s, the government relied on COINTELPRO, its domestic intelligence program, to neutralize domestic political dissidents. Those targeted by the FBI under COINTELPRO for its intimidation, surveillance and smear campaigns included: Martin Luther King Jr., Malcom X, the Black Panther Party, John Lennon, Billie Holiday, Emma Goldman, Aretha Franklin, Charlie Chaplin, Ernest Hemingway, Felix Frankfurter, and hundreds more.

In more recent decades, the powers-that-be have expanded their reach to target anyone who opposes the police state, regardless of their political leanings.

Advances in technology have enabled the government to deploy a veritable arsenal of surveillance weapons in order to “expose, disrupt, misdirect, discredit, or otherwise neutralize” perceived threats to the government’s power.

Surveillance cameras mounted on utility poles, traffic lights, businesses, and homes. License plate readers. Ring doorbells. GPS devices. Dash cameras. Drones. Store security cameras. Geofencing and geotracking. FitBits. Alexa. Internet-connected devices. Geofencing dragnets. Fusion centers. Smart devices. Behavioral threat assessments. Terror watch lists. Facial recognition. Snitch tip lines. Biometric scanners. Pre-crime. DNA databases. Data mining. Precognitive technology. Contact tracing apps.

What these add up to is a world in which, on any given day, the average person is now monitored, surveilled, spied on and tracked in more than 20 different ways by both government and corporate eyes and ears.

Consider just a small sampling of the ways in which the government is weaponizing its 360 degree surveillance technologies to flag you as a threat to national security, whether or not you’ve done anything wrong.

Flagging you as a danger based on your feelings. Customs and Border Protection is reportedly using an artificial intelligence surveillance program that can detect “sentiment and emotion” in social media posts in order to identify travelers who may be “a threat to public safety, national security, or lawful trade and travel.”

Flagging you as a danger based on your phone and movements. Cell phones have become de facto snitches, offering up a steady stream of digital location data on users’ movements and travels. For instance, the FBI was able to use geofence data to identify more than 5,000 mobile devices (and their owners) in a 4-acre area around the Capitol on January 6. This latest surveillance tactic could land you in jail for being in the “wrong place and time.” Police are also using cell-site simulators to carry out mass surveillance of protests without the need for a warrant. Moreover, federal agents can now employ a number of hacking methods in order to gain access to your computer activities and “see” whatever you’re seeing on your monitor. Malicious hacking software can also be used to remotely activate cameras and microphones, offering another means of glimpsing into the personal business of a target.

Flagging you as a danger based on your DNA. DNA technology in the hands of government officials completes our transition to a Surveillance State. If you have the misfortune to leave your DNA traces anywhere a crime has been committed, you’ve already got a file somewhere in some state or federal database—albeit it may be a file without a name. By accessing your DNA, the government will soon know everything else about you that they don’t already know: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc. After all, a DNA print reveals everything about “who we are, where we come from, and who we will be.” It can also be used to predict the physical appearance of potential suspects. It’s only a matter of time before the police state’s pursuit of criminals expands into genetic profiling and a preemptive hunt for criminals of the future.

Flagging you as a danger based on your face. Facial recognition software aims to create a society in which every individual who steps out into public is tracked and recorded as they go about their daily business. Coupled with surveillance cameras that blanket the country, facial recognition technology allows the government and its corporate partners to identify and track someone’s movements in real-time. One particularly controversial software program created by Clearview AI has been used by police, the FBI and the Department of Homeland Security to collect photos on social media sites for inclusion in a massive facial recognition database. Similarly, biometric software, which relies on one’s unique identifiers (fingerprints, irises, voice prints), is becoming the standard for navigating security lines, as well as bypassing digital locks and gaining access to phones, computers, office buildings, etc. In fact, greater numbers of travelers are opting into programs that rely on their biometrics in order to avoid long waits at airport security. Scientists are also developing lasers that can identify and surveil individuals based on their heartbeats, scent and microbiome.

Flagging you as a danger based on your behavior. Rapid advances in behavioral surveillance are not only making it possible for individuals to be monitored and tracked based on their patterns of movement or behavior, including gait recognition (the way one walks), but have given rise to whole industries that revolve around predicting one’s behavior based on data and surveillance patterns and are also shaping the behaviors of whole populations. One smart “anti-riot” surveillance system purports to predict mass riots and unauthorized public events by using artificial intelligence to analyze social media, news sources, surveillance video feeds and public transportation data.

Flagging you as a danger based on your spending and consumer activities. With every smartphone we buy, every GPS device we install, every Twitter, Facebook, and Google account we open, every frequent buyer card we use for purchases—whether at the grocer’s, the yogurt shop, the airlines or the department store—and every credit and debit card we use to pay for our transactions, we’re helping Corporate America build a dossier for its government counterparts on who we know, what we think, how we spend our money, and how we spend our time. Consumer surveillance, by which your activities and data in the physical and online realms are tracked and shared with advertisers, has become a $300 billion industry that routinely harvests your data for profit. Corporations such as Target have not only been tracking and assessing the behavior of their customers, particularly their purchasing patterns, for years, but the retailer has also funded major surveillance in cities across the country and developed behavioral surveillance algorithms that can determine whether someone’s mannerisms might fit the profile of a thief.

Flagging you as a danger based on your public activities. Private corporations in conjunction with police agencies throughout the country have created a web of surveillance that encompasses all major cities in order to monitor large groups of people seamlessly, as in the case of protests and rallies. They are also engaging in extensive online surveillance, looking for any hints of “large public events, social unrest, gang communications, and criminally predicated individuals.” Defense contractors have been at the forefront of this lucrative market. Fusion centers, $330 million-a-year, information-sharing hubs for federal, state and law enforcement agencies, monitor and report such “suspicious” behavior as people buying pallets of bottled water, photographing government buildings, and applying for a pilot’s license as “suspicious activity.”

Flagging you as a danger based on your social media activities. Every move you make, especially on social media, is monitored, mined for data, crunched, and tabulated in order to form a picture of who you are, what makes you tick, and how best to control you when and if it becomes necessary to bring you in line. As The Intercept reported, the FBI, CIA, NSA and other government agencies are increasingly investing in and relying on corporate surveillance technologies that can mine constitutionally protected speech on social media platforms such as Facebook, Twitter and Instagram in order to identify potential extremists and predict who might engage in future acts of anti-government behavior. This obsession with social media as a form of surveillance will have some frightening consequences in coming years. As Helen A.S. Popkin, writing for NBC News, observed, “We may very well face a future where algorithms bust people en masse for referencing illegal ‘Game of Thrones’ downloads… the new software has the potential to roll, Terminator-style, targeting every social media user with a shameful confession or questionable sense of humor.”

Flagging you as a danger based on your social network. Not content to merely spy on individuals through their online activity, government agencies are now using surveillance technology to track one’s social network, the people you might connect with by phone, text message, email or through social message, in order to ferret out possible criminals. An FBI document obtained by Rolling Stone speaks to the ease with which agents are able to access address book data from Facebook’s WhatsApp and Apple’s iMessage services from the accounts of targeted individuals and individuals not under investigation who might have a targeted individual within their network. What this creates is a “guilt by association” society in which we are all as guilty as the most culpable person in our address book.

Flagging you as a danger based on your car. License plate readers are mass surveillance tools that can photograph over 1,800 license tag numbers per minute, take a picture of every passing license tag number and store the tag number and the date, time, and location of the picture in a searchable database, then share the data with law enforcement, fusion centers and private companies to track the movements of persons in their cars. With tens of thousands of these license plate readers now in operation throughout the country, affixed to overpasses, cop cars and throughout business sectors and residential neighborhoods, it allows police to track vehicles and run the plates through law enforcement databases for abducted children, stolen cars, missing people and wanted fugitives. Of course, the technology is not infallible: there have been numerous incidents in which police have mistakenly relied on license plate data to capture out suspects only to end up detaining innocent people at gunpoint.

Flagging you as a danger based on your political views. The Church Committee, the Senate task force charged with investigating COINTELPRO abuses in 1975, concluded that the government had carried out “secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power.” The report continued: “Groups and individuals have been harassed and disrupted because of their political views and their lifestyles… Intelligence agencies have served the political and personal objectives of presidents and other high officials.” Nothing has changed since then.

Flagging you as a danger based on your correspondence. Just about every branch of the government—from the Postal Service to the Treasury Department and every agency in between—now has its own surveillance sector, authorized to spy on the American people. For instance, the U.S. Postal Service, which has been photographing the exterior of every piece of paper mail for the past 20 years, is also spying on Americans’ texts, emails and social media posts. Headed up by the Postal Service’s law enforcement division, the Internet Covert Operations Program (iCOP) is reportedly using facial recognition technology, combined with fake online identities, to ferret out potential troublemakers with “inflammatory” posts. The agency claims the online surveillance, which falls outside its conventional job scope of processing and delivering paper mail, is necessary to help postal workers avoid “potentially volatile situations.”

Now the government wants us to believe that we have nothing to fear from these mass spying programs as long as we’ve done nothing wrong.

Don’t believe it.

As Matthew Feeney warns in the New York Times, “In the past, Communists, civil rights leaders, feminists, Quakers, folk singers, war protesters and others have been on the receiving end of law enforcement surveillance. No one knows who the next target will be.

The government’s definition of a “bad” guy is extraordinarily broad, and it results in the warrantless surveillance of innocent, law-abiding Americans on a staggering scale.

Moreover, there is a repressive, suppressive effect to surveillance that not only acts as a potentially small deterrent on crime but serves to monitor and chill lawful First Amendment activity, and that is the whole point.

Weaponized surveillance is re-engineering a society structured around the aesthetic of fear.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, the police state wants us silent, servile and compliant.

They definitely do not want us to engage in First Amendment activities that challenge the government’s power, reveal the government’s corruption, expose the government’s lies, and encourage the citizenry to push back against the government’s many injustices.

And they certainly do not want us to remember that we have rights, let alone attempting to exercise those rights peaceably and lawfully, whether it’s protesting police brutality and racism, challenging COVID-19 mandates, questioning election outcomes, or listening to alternate viewpoints—even conspiratorial ones—in order to form our own opinions about the true nature of government.

 

Connect with The Rutherford Institute

Cover image credit: Tumisu




Ramiro Romani With James Corbett: Take Back Our Tech

Ramiro Romani With James Corbett: Take Back Our Tech

 

“So there’s so many things coming at once. There’s essentially four freedoms that technology has allowed. But then also there are powers — we all know these organizations that are also very scared of us having these freedoms.

“So those are the freedom to travel, the freedom to exchange (which has been bolstered by things like cryptocurrency), the freedom of speech and the freedom of privacy.

“And these four things make it really easy to interact in a way that is in alignment, right, that is voluntary with what you would like.

“And now you see pretty much a law in most Western countries that are coming after these exact freedoms…

“It’s almost like the simulation itself is making it so — it’s forcing us to leave these bigger platforms and into smaller, decentralized community-based groups.

“So throughout things we’ve seen over the past few years — we’ve seen technology being used to try and track and trace every single one of our movements.

“COVID-19 was a perfect example of this. And an article I’m working on talks specifically about contact tracing, which, if people didn’t know, most phones have the ability through Google and Apple for them to install an app on their phone and actually activate it. And they did that en masse to millions of people at once…

“We see technology and we are throwing it out. We’re not going to use it…

“You’re cutting yourself off. You’re doing your own thing, which I completely support your right to live a life free of technology. That’s absolutely your right…

“Ignoring it is not going to make it go away. It’s not going to make these people stop their plans. Understanding it, working with it, changing it — which you absolutely have the possibility to change it. That is the way you can make it better for everyone.”

~ Ramiro Romani

 

Take Back Our Tech

by James Corbett, The Corbett Report
August 23, 2023

 

Ramiro Romani of TakeBackOurTech.org and AbovePhone.com joins us today to discuss technology: what it is, how it works, and how we can make it work for us.

We discuss how governments and big tech corporations are collaborating to undermine our rights to privacy, free expression and even freedom of travel and how we can remove the Big Brother surveillance and controls from our devices.



Watch on Archive / BitChute / Odysee / Rokfin / Rumble / Substack

Show Notes:

TakeBackOurTech.org

Building a digital army: UN peacekeepers fight deadly disinformation

AbovePhone.com

Who Can We Call On? How Our Phones Are Tracked By Big Tech, Telecom, and Government

Electromagnetic Radiation – Shield & Educate Yourself, Save a Life

 

Connect with The Corbett Report




We’re All Suspects in a DNA Lineup, Waiting to be Matched With a Crime

We’re All Suspects in a DNA Lineup, Waiting to be Matched With a Crime

by John & Nisha Whitehead, The Rutherford Institute
August 21, 2023

 

“Make no mistake about it…your DNA can be taken and entered into a national DNA database if you are ever arrested, rightly or wrongly, and for whatever reason… I doubt that the proud men who wrote the charter of our liberties would have been so eager to open their mouths for royal inspection.”

—Justice Antonin Scalia dissenting in Maryland v. King

Be warned: the DNA detectives are on the prowl.

Whatever skeletons may be lurking on your family tree or in your closet, whatever crimes you may have committed, whatever associations you may have with those on the government’s most wanted lists: the police state is determined to ferret them out.

In an age of overcriminalization, round-the-clock surveillance, and a police state eager to flex its muscles in a show of power, we are all guilty of some transgression or other.

No longer can we consider ourselves innocent until proven guilty.

Now we are all suspects in a DNA lineup waiting to be matched up with a crime.

Suspect State, meet the Genetic Panopticon.

DNA technology in the hands of government officials will complete our transition to a Surveillance State in which prison walls are disguised within the seemingly benevolent trappings of technological and scientific progress, national security and the need to guard against terrorists, pandemics, civil unrest, etc.

By accessing your DNA, the government will soon know everything else about you that they don’t already know: your family chart, your ancestry, what you look like, your health history, your inclination to follow orders or chart your own course, etc.

It’s getting harder to hide, even if you think you’ve got nothing to hide.

Armed with unprecedented access to DNA databases amassed by the FBI and ancestry website, as well as hospital newborn screening programs, police are using forensic genealogy, which allows police to match up an unknown suspect’s crime scene DNA with that of any family members in a genealogy database, to solve cold cases that have remained unsolved for decades.

As reported by The Intercept, forensic genetic genealogists are “combing through the genetic information of hundreds of thousands of innocent people in search of a perpetrator.”

By submitting your DNA to a genealogical database such as Ancestry and 23andMe, you’re giving the police access to the genetic makeup, relationships and health profiles of every relative—past, present and future—in your family, whether or not you or they ever agreed to be part of such a database.

Indeed, relying on a loophole in a commercial database called GEDmatch, genetic genealogists are able to sidestep privacy rules that allow people to opt out of sharing their genetic information with police. The end result? Police are now able to identify and target those very individuals who explicitly asked to keep their DNA results private.

In this way, merely choosing to exercise your right to privacy makes you a suspect and puts you in the police state’s crosshairs.

It no longer even matters if you’re among the tens of millions of people who have added their DNA to ancestry databases. As Brian Resnick reports, public DNA databases have grown so massive that they can be used to find you even if you’ve never shared your own DNA.

That simple transaction—a spit sample or a cheek swab in exchange for getting to learn everything about one’s ancestral makeup, where one came from, and who is part of one’s extended family—is the price of entry into the Suspect State for all of us.

After all, a DNA print reveals everything about “who we are, where we come from, and who we will be.” It can also be used to predict the physical appearance of potential suspects.

It’s what police like to refer to a “modern fingerprint.”

Whereas fingerprint technology created a watershed moment for police in their ability to “crack” a case, DNA technology is now being hailed by law enforcement agencies as the magic bullet in crime solving, especially when it helps them crack cold cases of serial murders and rapists.

After all, who wouldn’t want to get psychopaths and serial rapists off the streets and safely behind bars, right?

At least, that’s the argument being used by law enforcement to support their unrestricted access to these genealogy databases, and they’ve got the success stories to prove it.

For instance, a 68-year-old Pennsylvania man was arrested and charged with the brutal rape and murder of a young woman almost 50 years earlier. Relying on genealogical research suggesting that the killer had ancestors who hailed from a small town in Italy, investigators narrowed their findings down to one man whose DNA, obtained from a discarded coffee cup, matched the killer’s.

In another cold case investigation, a 76-year-old man was arrested for two decades-old murders after his DNA was collected from a breathalyzer during an unrelated traffic stop.

Yet it’s not just psychopaths and serial rapists who are getting caught up in the investigative dragnet. In the police state’s pursuit of criminals, anyone who comes up as a possible DNA match—including distant family members—suddenly becomes part of a circle of suspects that must be tracked, investigated and ruled out.

In this way, “guilt by association” has taken on new connotations in a technological age in which one is just a DNA sample away from being considered a person of interest in a police investigation. As Jessica Cussins warns in Psychology Today, “The fundamental fight—that data from potentially innocent people should not be used to connect them to unrelated crimes—has been lost.”

Until recently, the government was required to at least observe some basic restrictions on when, where and how it could access someone’s DNA. That was turned on its head by various U.S. Supreme Court rulings that heralded the loss of privacy on a cellular level.

For instance, the U.S. Supreme Court ruled in Maryland v. King that taking DNA samples from a suspect doesn’t violate the Fourth Amendment. The Court’s subsequent decision to let stand the Maryland Court of Appeals’ ruling in Raynor v. Maryland, which essentially determined that individuals do not have a right to privacy when it comes to their DNA, made Americans even more vulnerable to the government accessing, analyzing and storing their DNA without their knowledge or permission.

It’s all been downhill since then.

Indeed, the government has been relentless in its efforts to get hold of our DNA, either through mandatory programs carried out in connection with law enforcement and corporate America, by warrantlessly accessing our familial DNA shared with genealogical services such as Ancestry and 23andMe, or through the collection of our “shed” or “touch” DNA.

Get ready, folks, because the government has embarked on a diabolical campaign to create a nation of suspects predicated on a massive national DNA database.

This has been helped along by Congress (which adopted legislation allowing police to collect and test DNA immediately following arrests), President Trump (who signed the Rapid DNA Act into law), the courts (which have ruled that police can routinely take DNA samples from people who are arrested but not yet convicted of a crime), and local police agencies (which are chomping at the bit to acquire this new crime-fighting gadget).

For example, Rapid DNA machines—portable, about the size of a desktop printer, highly unregulated, far from fool-proof, and so fast that they can produce DNA profiles in less than two hours—allow police to go on fishing expeditions for any hint of possible misconduct using DNA samples.

Journalist Heather Murphy explains: “As police agencies build out their local DNA databases, they are collecting DNA not only from people who have been charged with major crimes but also, increasingly, from people who are merely deemed suspicious, permanently linking their genetic identities to criminal databases.”

All 50 states now maintain their own DNA government databases, although the protocols for collection differ from state to state. Increasingly, many of the data from local databanks are being uploaded to CODIS, the FBI’s massive DNA database, which has become a de facto way to identify and track the American people from birth to death.

Even hospitals have gotten in on the game by taking and storing newborn babies’ DNA, often without their parents’ knowledge or consent. It’s part of the government’s mandatory genetic screening of newborns. In many states, the DNA is stored indefinitely. There’s already a move underway to carry out whole genome sequencing on newborns, ostensibly to help diagnose rare diseases earlier and improve health later in life, which constitutes an ethical minefield all by itself.

What this means for those being born today is inclusion in a government database that contains intimate information about who they are, their ancestry, and what awaits them in the future, including their inclinations to be followers, leaders or troublemakers.

For example, police in New Jersey accessed the DNA from a nine-year-old blood sample of a newborn baby in order to identify the child’s father as a suspect in a decades-old sexual assault.

The ramifications of this kind of DNA profiling are far-reaching.

At a minimum, these DNA databases do away with any semblance of privacy or anonymity.

These genetic databases and genomic technology also make us that much more vulnerable to creeps and cyberstalkersgenetic profiling, and those who would weaponize the technology against us.

Unfortunately, the debate over genetic privacy—and when one’s DNA becomes a public commodity outside the protection of the Fourth Amendment’s prohibition on warrantless searches and seizures—continues to lag far behind the government and Corporate America’s encroachments on our rights.

Moreover, while much of the public debate, legislative efforts and legal challenges in recent years have focused on the protocols surrounding when police can legally collect a suspect’s DNA (with or without a search warrant and whether upon arrest or conviction), the question of how to handle “shed” or “touch” DNA has largely slipped through without much debate or opposition.

As scientist Leslie A. Pray notes:

We all shed DNA, leaving traces of our identity practically everywhere we go… In fact, the garbage you leave for curbside pickup is a potential gold mine of this sort of material. All of this shed or so-called abandoned DNA is free for the taking by local police investigators hoping to crack unsolvable cases… shed DNA is also free for inclusion in a secret universal DNA databank.

What this means is that if you have the misfortune to leave your DNA traces anywhere a crime has been committed, you’ve already got a file somewhere in some state or federal database—albeit it may be a file without a name.

As the dissenting opinion to the Maryland Court of Appeals’ shed DNA ruling in Raynor rightly warned, “A person can no longer vote, participate in a jury, or obtain a driver’s license, without opening up his genetic material for state collection and codification.”

It’s just a matter of time before government agents will know everywhere we’ve been and how long we were at each place by following our shed DNA. After all, scientists can already track salmon across hundreds of square miles of streams and rivers using DNA.

Today, helped along by robotics and automation, DNA processing, analysis and reporting takes far less time and can bring forth all manner of information, right down to a person’s eye color and relatives. Incredibly, one company specializes in creating “mug shots” for police based on DNA samples from unknown “suspects” which are then compared to individuals with similar genetic profiles.

Of course, none of these technologies are infallible.

DNA evidence can be wrong, either through human error, tampering, or even outright fabrication, and it happens more often than we are told.

What this amounts to is a scenario in which we have little to no defense against charges of wrongdoing, especially when “convicted” by technology, and even less protection against the government sweeping up our DNA in much the same way it sweeps up our phone calls, emails and text messages.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, it’s only a matter of time before the police state’s pursuit of criminals from the past expands into genetic profiling and a preemptive hunt for criminals of the future.

 

Connect with The Rutherford Institute

Cover image credit: OpenClipart-Vectors




Who Caused the Fire in Hawaii?: On the WEF, Global Plans for Smart City Governance & Deliberate Destruction of Key Locations

Who Caused the Fire in Hawaii?: On the WEF, Global Plans for Smart City Governance & Deliberate Destruction of Key Locations

 

“…Because we all know the World Economic Forum are the ones pulling the strings. Right?

“So if we know that, when we see a fire like that, then the second that we hear that the plans are to bring in a Smart City, you’ll know why it was done.”

~ The End of the Beginning from ‘The Maui Experiment! How They Destroyed Lahaina to Bring In a WEF Smart City Governance…’ 

 

Truth Comes to Light editor’s note:

Below is a compilation of work by Sam Tripoli and The End of the Beginning YouTube channel, along with photo images courtesy of the US Coast Guard.

Transcript of Sam Tripoli’s short video at X was prepared by Truth Comes to Light.

Links to related documents and articles are also provided as references.

~Kathleen

* Update by Sam Tripoli has been added. See his videos below. 1) People are being turned away by the military who want to help and donate. 2) The warning system didn’t go off and they are claiming it must have been a” malfunction”. 3) An executive order was signed in July stating they could take your land if you needed to be rezoned.

 

Who Caused the Fire in Hawaii?

Transcript:

So today we’re going to give a little update on the Hawaiian fires.

Now I want you to look at this footage. And this doesn’t look like a fire to me.
It looks like something almost exploded, or something went off.

Now what’s interesting is certain things are still standing, while other things are not.

Now the governor did say this is climate change doing this. Interesting.

What they don’t talk about is in January, how they had in Maui, a Smart City Conference to turn Maui into an entire Smart Island — changing everything to electric. Renewables. Solar panels. And pushing everybody into electric vehicles. 15-Minute Smart Cities.

So now what’s also interesting is next month, in September, Hawaii is hosting the Digital Government Summit, utilizing AI to govern the island.

Hmmm. It’s almost like they’re resetting something to start rebuilding for this, which they’re trying to push.

Now we look at all the climate change narrative that they’re going to try to push, but they’re not going to talk about the Weather Modification Act of 1976.

I highly recommend everybody look to this act. Because who is involved in the weather modification activities?

Department of Agriculture. Department of Defense. Department of Interior. EPA. And NASA.

So if they’re modifying the weather, then could they have caused this event?

So if we see that the Department of Defense and other factions are responsible for modifying the weather, well then if we look at Direct Energy weapons, we can maybe see how this can all relate to this event.

[Important update by Sam Tripoli]

Related Links:

Hungry Heroes Hawaii Emergency Fire Response
~~ Fundraiser
~~

 

Hawaii Digital Government Summit 2023

Hawaii International Conference on System Sciences 2023

 Weather Modification Act (1976)

World Economic Forum: Our alliance is creating smart city governance


 

The images below are courtesy of United States Coast Guard and are in the public domain.

Lahaina Lighthouse surrounded by ruins after August 2023 wildfire (source)

Burned out cars and the remains of buildings are seen in Lahaina town in this image captured Wednesday by U.S. Civil Air Patrol. (source)

Two Hawaii Army National Guard CH-47 Chinook perform aerial water bucket drops on the Island of Maui to assist the fight of wildfires, Maui, Hawaii, August 09, 2023. The two air crews performed 58 total bucket drops in 5 hours in up country Maui totaling over one hundred thousand gallons dropped on the fires. (U.S. National Guard Video by Air Force Master Sgt. Andrew Jackson) (source)

The Coast Guard, along with federal, state, and local partners continue to respond following the Lahaina wildfires in Maui, HI August 9, 2023. A total of 17 lives were saved from the water and 40 survivors were located ashore by Coast Guard Station Maui boat crews. (source)

Damage in the harbor of Lahaina on the island of Maui following a devastating wildfire, via the U.S. Coast Guard (source)

 

See related by The End of the Beginning YouTube channel:
‘The Maui Experiment! How They Destroyed Lahaina to Bring In a WEF Smart City Governance…’ 

 

That Didn’t Take Long! Look Who Donated $100 Million to Maui’s Smart City Rebuild!



 

Cover image credit: US Coast Guard (source) (source)


See Related Articles:

Chemtrails Exposed: The Deep State and the New Manhattan Project

“Apocalyptic Scene”: Out-of-Control Wildfire Spreads on Hawaii’s Maui Island

Wildfires As a Weapon: US Military Exposed

Dane Wigington: Geoengineering Is Fueling Firestorm Catastrophes

Dr. Reiner Fuellmich With Andrew Johnson on Undisclosed “Black Technology”, the Truth About 9/11, Planned UFO False Flag Events, Steven Greer’s “Disclosure Project”, Directed Energy Weapons, the Cover-Up of Free Energy Already Available, “Psychological Terrorism” & the Attack on Human Consciousness

DEW (Directed Energy Weapon) Beams Into New Madrid Seismic Zone as 1,100F Temps Flare Up

Geoengineering: Romanian General Emil Strainu on the Terrifying Possibilities of Geo-Warfare

Weather Warfare: Beware the US Military’s Experiments with Climatic Warfare

Australia Burning: Disaster Capitalism or Something Else?

Joseph P. Farrell: An Odd Thing About Those Fires in Greece…

Reiner Fuellmich With Peter Mac Isaac: Why Are Canada´s Forests Burning? 




Nanotechnology Found in Both Vaxxed And Un-Vaxxed

Nanotechnology Found in Both Vaxxed And Un-Vaxxed

by Greg Reese, The Reese Report
August 5, 2023

 



Doctor Charles Morgan, former CIA and consultant for the US military on neurological sciences, spoke to cadets at West Point in 2018 about the current state of technology. He briefed the cadets on experiments from 2013 where humans were given neural implants that allowed them to control prosthetic arms with their thoughts. Experiments where one person can control another person’s hands by just wearing an EEG cap. Experiments where information is transmitted from one mind to another. And experiments where memories are erased.

Doctor Morgan admits they have the technology to target an individual person and are working on the ability to erase the memories of any human they choose. Their biggest challenge five years ago was being able to interface with the hippocampus without the use of physical wires. And this is most likely one of the motivating factors for the deployment of the experimental COVID shots.

Using Dark-field microscopy, Doctor Ana Maria Mihalcea has captured in great detail what the scientific literature describes as effective technologies that exist today. Technology such as Quantum Dots.

Quantum Dots are nanotechnology with the ability to organize, operate, communicate, and build structures within the blood. They do so with a tunable photoluminescence that can be programmed to dictate various tasks via optical communication. The description and images displayed in the scientific literature compared to what Mihalcea’s Dark-field microscopy has captured are the same. You can see the Quantum Dots blinking in different colors acting as the artificial intelligence directing the self-assembly around them. Bubbles are created within the blood that act as construction sites. Within these construction bubbles, the Quantum Dots organize the various materials into self-assembly.

These technologies are being found in both the blood of the vaccinated and in the blood of the un-vaccinated. Depending on what materials are available, the Quantum Dots will trigger them into self-assembly. The COVID vaccines are full of rare and heavy metals to make all manner of nanotechnology. But it seems as if almost everyone is infected with some sort of nano-tech. According to several research teams, everyone’s blood seems to contain the materials required to produce the filaments, and the lattice work for this technology. Blood samples that appear to be healthy have been completely transformed by applying a mere 10 milliamps of electric current for two hours. And it looks as if we may have been infected by the Chemtrails.

Morgellons disease was first reported in 2002. It’s when synthetic fibers or filaments are growing in a person’s body. It has been theorized for decades that this was being spread via Chemtrails. And under a microscope, it appears to be the same filaments that people today are calling blood clots. And what the scientific journals call self-assembled hydrogels. According to Dane Wiggington from Geoengineering watch dot org, nanoparticles are being sprayed worldwide.

The good news is that Doctor Mihalcea’s research has found a remedy. The iron in the infected blood has been oxidized to a 3-plus state. And by taking antioxidants one is able to dissolve these filament clots. She has found that EDTA Chelation therapy will remedy infected blood within 3 days. And mega-dosing Vitamin C also works.

 

Connect with The Reese Report

Cover image credit: PublicDomainPictures




“Remembering Nearfield” Awarded Best Health Film at Cannes World Film Festival, July 2023

“Remembering Nearfield” Awarded Best Health Film at Cannes World Film Festival, July 2023

 

Remembering Nearfield from SC on Vimeo.

 

by Patricia Burke, Safe Tech International
sourced from Activist Post
July 31, 2023

 

It’s a winner.

In just over three months, Remembering Nearfield, has become an internationally acclaimed animated short film. Its aim is to break down taboos around the subject of electromagnetic harm in our society and catalyze global conversations about electromagnetic hypersensitivity (EHS), a disability which brings an uncertain future for those highly sensitized and intolerant of the radiation from man-made electromagnetic fields.

The health impacts of EMF radiation exposure on society have remained subject to relentless scientific scrutiny. EHS is constantly being flagged up by scientists in their appeals to address a host of shortcomings in existing globally-adopted EMF radiation exposure guidelines to raise questions about public safety and draw attention to the most vulnerable, like children and those with EHS (who are not considered in the one-size-fits-all attitude of these industry-friendly guidelines).

Remembering Nearfield is eloquently narrated by Corriëlle van Vuuren. She’s an entrepreneur stricken by electromagnetic hypersensitivity compelled to speak out about her disability. Comfortable in the belief that technologies are safe, society prefers to remain naive. Her testimony challenges this blind trust.

No-one Should Be Excluded

As Corriëlle’s revelatory testimony reveals, people with EHS become so overwhelmed and ill, as their health declines, they can eventually lose everything: property, possessions, status, family and social relationships, and income. No-one in society should be excluded because of the nature of their disability. Education matters.

Professor Olle Johansson formerly of the Karolinska Institute in Sweden, has this to say about Remembering Nearfield: “For an academic scientist like myself, it is always very impressive to see skilled movie makers, artists, and performers, summarize in less than 10 minutes a staggering 45 years of research!”

Educational, original, and often moving, this animated film’s wide and enthusiastic reception indicates that the world is ready to learn about EHS. Remembering Nearfield has been awarded Best Health Film at the prestigious Cannes World Film Festival in July 2023.

As well as being selected and nominated by many other festivals of note, it has won ten awards since entering an array of over 235 film festivals since April 2023.

The recognition of film festivals and prospective screenings throughout the year are wonderful affirmations about the mission of the film to raise awareness and educate. The film underscores the value of EMF awareness and safety that concerns all of society. It also exposes the discrimination that has stood in the way of progress in this regard. Remembering Nearfield stands for social change, to drive equality for people with electromagnetic hypersensitivity, to bring equal recognition, accommodation, and support on par with other disabilities.

Remembering Nearfield opens our eyes anew to a neglected and misunderstood disability in a world of virtually unavoidable EMF pollution and guides us towards practical, easy-to-achieve solutions so society can reduce EMF radiation. People with EHS may no longer live in exclusion or isolation when society realizes that lowering environmental EMF not only leads to a better place for people with EHS to live and work but can have boundless potential for improving health for all.

 

Connect with Safe Tech International

Cover image credit: geralt




Technocensorship: The Government’s War on So-Called Dangerous Ideas

Technocensorship: The Government’s War on So-Called Dangerous Ideas

by John & Nisha Whitehead, The Rutherford Institute
August 1, 2023

 

“There is more than one way to burn a book. And the world is full of people running about with lit matches.”

—Ray Bradbury

What we are witnessing is the modern-day equivalent of book burning which involves doing away with dangerous ideas—legitimate or not—and the people who espouse them.Seventy years after Ray Bradbury’s novel Fahrenheit 451 depicted a fictional world in which books are burned in order to suppress dissenting ideas, while televised entertainment is used to anesthetize the populace and render them easily pacified, distracted and controlled, we find ourselves navigating an eerily similar reality.

Welcome to the age of technocensorship.

On paper—under the First Amendment, at least—we are technically free to speak.

In reality, however, we are now only as free to speak as a government official—or corporate entities such as Facebook, Google or YouTube—may allow.

Case in point: internal documents released by the House Judiciary Select Subcommittee on Weaponization of the Federal Government confirmed what we have long suspected: that the government has been working in tandem with social media companies to censor speech.

By “censor,” we’re referring to concerted efforts by the government to muzzle, silence and altogether eradicate any speech that runs afoul of the government’s own approved narrative.

This is political correctness taken to its most chilling and oppressive extreme.

The revelations that Facebook worked in concert with the Biden administration to censor content related to COVID-19, including humorous jokes, credible information and so-called disinformation, followed on the heels of a ruling by a federal court in Louisiana that prohibits executive branch officials from communicating with social media companies about controversial content in their online forums.

Likening the government’s heavy-handed attempts to pressure social media companies to suppress content critical of COVID vaccines or the election to “an almost dystopian scenario,” Judge Terry Doughty warned that “the United States Government seems to have assumed a role similar to an Orwellian ‘Ministry of Truth.’

This is the very definition of technofascism.

Clothed in tyrannical self-righteousness, technofascism is powered by technological behemoths (both corporate and governmental) working in tandem to achieve a common goal.

The government is not protecting us from “dangerous” disinformation campaigns. It is laying the groundwork to insulate us from “dangerous” ideas that might cause us to think for ourselves and, in so doing, challenge the power elite’s stranglehold over our lives.

Thus far, the tech giants have been able to sidestep the First Amendment by virtue of their non-governmental status, but it’s a dubious distinction at best when they are marching in lockstep with the government’s dictates.

As Philip Hamburger and Jenin Younes write for The Wall Street Journal: “The First Amendment prohibits the government from ‘abridging the freedom of speech.’ Supreme Court doctrine makes clear that government can’t constitutionally evade the amendment by working through private companies.”

Nothing good can come from allowing the government to sidestep the Constitution.

The steady, pervasive censorship creep that is being inflicted on us by corporate tech giants with the blessing of the powers-that-be threatens to bring about a restructuring of reality straight out of Orwell’s 1984, where the Ministry of Truth polices speech and ensures that facts conform to whatever version of reality the government propagandists embrace.

Orwell intended 1984 as a warning. Instead, it is being used as a dystopian instruction manual for socially engineering a populace that is compliant, conformist and obedient to Big Brother.

This is the slippery slope that leads to the end of free speech as we once knew it.

In a world increasingly automated and filtered through the lens of artificial intelligence, we are finding ourselves at the mercy of inflexible algorithms that dictate the boundaries of our liberties.

Once artificial intelligence becomes a fully integrated part of the government bureaucracy, there will be little recourse: we will all be subject to the intransigent judgments of techno-rulers.

This is how it starts.

First, the censors went after so-called extremists spouting so-called “hate speech.”

Then they went after so-called extremists spouting so-called “disinformation” about stolen elections, the Holocaust, and Hunter Biden.

By the time so-called extremists found themselves in the crosshairs for spouting so-called “misinformation” about the COVID-19 pandemic and vaccines, the censors had developed a system and strategy for silencing the nonconformists.

Eventually, depending on how the government and its corporate allies define what constitutes “extremism, “we the people” might all be considered guilty of some thought crime or other.

Whatever we tolerate now—whatever we turn a blind eye to—whatever we rationalize when it is inflicted on others, whether in the name of securing racial justice or defending democracy or combatting fascism, will eventually come back to imprison us, one and all.

Watch and learn.

We should all be alarmed when any individual or group—prominent or not—is censored, silenced and made to disappear from Facebook, Twitter, YouTube and Instagram for voicing ideas that are deemed politically incorrect, hateful, dangerous or conspiratorial.

Given what we know about the government’s tendency to define its own reality and attach its own labels to behavior and speech that challenges its authority, this should be cause for alarm across the entire political spectrum.

Here’s the point: you don’t have to like or agree with anyone who has been muzzled or made to disappear online because of their views, but to ignore the long-term ramifications of such censorship is dangerously naïve, because whatever powers you allow the government and its corporate operatives to claim now will eventually be used against you by tyrants of your own making.

As Glenn Greenwald writes for The Intercept:

The glaring fallacy that always lies at the heart of pro-censorship sentiments is the gullible, delusional belief that censorship powers will be deployed only to suppress views one dislikes, but never one’s own views… Facebook is not some benevolent, kind, compassionate parent or a subversive, radical actor who is going to police our discourse in order to protect the weak and marginalized or serve as a noble check on mischief by the powerful. They are almost always going to do exactly the opposite: protect the powerful from those who seek to undermine elite institutions and reject their orthodoxies. Tech giants, like all corporations, are required by law to have one overriding objective: maximizing shareholder value. They are always going to use their power to appease those they perceive wield the greatest political and economic power.

Be warned: it’s a slippery slope from censoring so-called illegitimate ideas to silencing truth.

Eventually, as George Orwell predicted, telling the truth will become a revolutionary act.

If the government can control speech, it can control thought and, in turn, it can control the minds of the citizenry.

It’s happening already.

With every passing day, we’re being moved further down the road towards a totalitarian society characterized by government censorship, violence, corruption, hypocrisy and intolerance, all packaged for our supposed benefit in the Orwellian doublespeak of national security, tolerance and so-called “government speech.”

Little by little, Americans are being conditioned to accept routine incursions on their freedoms.

This is how oppression becomes systemic, what is referred to as creeping normality, or a death by a thousand cuts.

It’s a concept invoked by Pulitzer Prize-winning scientist Jared Diamond to describe how major changes, if implemented slowly in small stages over time, can be accepted as normal without the shock and resistance that might greet a sudden upheaval.

Diamond’s concerns related to Easter Island’s now-vanished civilization and the societal decline and environmental degradation that contributed to it, but it’s a powerful analogy for the steady erosion of our freedoms and decline of our country right under our noses.

As Diamond explains, “In just a few centuries, the people of Easter Island wiped out their forest, drove their plants and animals to extinction, and saw their complex society spiral into chaos and cannibalism… Why didn’t they look around, realize what they were doing, and stop before it was too late? What were they thinking when they cut down the last palm tree?”

His answer: “I suspect that the disaster happened not with a bang but with a whimper.”

Much like America’s own colonists, Easter Island’s early colonists discovered a new world—“a pristine paradise”—teeming with life. Yet almost 2000 years after its first settlers arrived, Easter Island was reduced to a barren graveyard by a populace so focused on their immediate needs that they failed to preserve paradise for future generations.

The same could be said of the America today: it, too, is being reduced to a barren graveyard by a populace so focused on their immediate needs that they are failing to preserve freedom for future generations.

In Easter Island’s case, as Diamond speculates:

The forest…vanished slowly, over decades. Perhaps war interrupted the moving teams; perhaps by the time the carvers had finished their work, the last rope snapped. In the meantime, any islander who tried to warn about the dangers of progressive deforestation would have been overridden by vested interests of carvers, bureaucrats, and chiefs, whose jobs depended on continued deforestation… The changes in forest cover from year to year would have been hard to detect… Only older people, recollecting their childhoods decades earlier, could have recognized a difference. Gradually trees became fewer, smaller, and less important. By the time the last fruit-bearing adult palm tree was cut, palms had long since ceased to be of economic significance. That left only smaller and smaller palm saplings to clear each year, along with other bushes and treelets. No one would have noticed the felling of the last small palm.

Sound painfully familiar yet?

We’ve already torn down the rich forest of liberties established by our founders. It has vanished slowly, over the decades. The erosion of our freedoms has happened so incrementally, no one seems to have noticed. Only the older generations, remembering what true freedom was like, recognize the difference. Gradually, the freedoms enjoyed by the citizenry have become fewer, smaller and less important. By the time the last freedom falls, no one will know the difference.

This is how tyranny rises and freedom falls: with a thousand cuts, each one justified or ignored or shrugged over as inconsequential enough by itself to bother, but they add up.

Each cut, each attempt to undermine our freedoms, each loss of some critical right—to think freely, to assemble, to speak without fear of being shamed or censored, to raise our children as we see fit, to worship or not worship as our conscience dictates, to eat what we want and love who we want, to live as we want—they add up to an immeasurable failure on the part of each and every one of us to stop the descent down that slippery slope.

As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, we are on that downward slope now.

 

Connect with The Rutherford Institute

Cover image credit: CDD20




Elon, X, and the Epitome of a Front Man

Elon, X, and the Epitome of a Front Man
The illusion of choice will make your financial enslavement less painful

 



by Greg Reese, The Reese Report
July 26, 2023

 

Elon Musk announced over a year ago that he planned to convert Twitter into an everything app like China’s WeChat. An app to do everything including online banking and finance.

Last April Musk announced that Twitter Inc. has been renamed to X Corp., he created a new Artificial Intelligence company known as X.AI and he partnered with eToro for stock and crypto exchange.

The media would have you believe that Elon Musk is an independent billionaire genius whose dream is to revolutionize banking. But this story is demonstrably false. The facts tell us that Elon Musk is a frontman for the same old same old. But because he says there are only two genders he has gained the trust of a radicalized people in a time of war, without ever having to explain his lies.

Musk says he grew up poor but his family was rich with emeralds and had a history of abuse and witchcraft. Telltale signs of multi-generational mind control.

Musk received tens of thousands of dollars from his parents to launch his first business venture. A digital phone book known as Zip2. Outside coders were hired to write the entire thing because Elon couldn’t code. Zip2 sold for millions and went nowhere. But Elon made 22 million dollars and with the help of the mainstream media, launched his new persona as a quirky pop-star genius. He then acquired x dot com and announced he would create an online bank known as X. He partnered with banking experts who all left the company after accusing Elon of lying to the media about the product. Which is all he did.

Elon Musk is believed to have co-founded PayPal. This is false. In 2000 Musk sold his failing x dot com business to Confinity, a company founded in 1998 by Peter Thiel and Max Levchin. All Musk reportedly did there was insist on changing the company’s name to X. He was forced out but somehow managed to get them to agree in writing to remove all references to ‘founders’ from the company website.

Musk made nearly two hundred million off the sale of PayPal, a company that he contributed nothing to, and then used that money along with the illusion of being a successful businessman co-founder to buy his way into Tesla.

Tesla Motors was founded in 2003 by Marc Tarpenning and Martin Eberhard, who developed the Tesla Roadster. When Tesla accepted millions from Elon, it came with the condition that he be named chairman of the company. Even though he only contributed money, Musk was unable to hide his anger that the media wasn’t giving him credit for Tesla Motors. And after forcing Eberhard out of the company he re-wrote their history to have himself listed as an original co-founder.

This obvious fake persona of a billionaire quirky genius has worked so well that few even question SpaceX. The official story is that Elon, who has absolutely no experience with rocket science, came up with the idea for SpaceX while traveling to Russia with the CIA’s Michael Griffin of In-Q-Tel. Shortly after this conversation, Griffin was made administrator of NASA where he launched the COTS program that privatized NASA’s rocket program. And awarded two-hundred and seventy-eight million dollars to SpaceX who had never made or flown any rockets. Musk then partnered with rocket engineer Tom Mueller, who went on to produce rocket technology that has clearly been developed for years in the private sectors of the military-industrial complex.

Elon’s companies have received billions in government subsidies over the last two decades. Money that was later spent on the purchase of Twitter. Where he immediately began the process of turning it into an everything app with its own banking system. Or rather, the ruling class cabal that pulls his strings is turning Twitter into an everything app with its own banking system. And that should be alarming. But he says there are only two genders, and families are good, and people love a hero.

They don’t need to chip you to control you. We already have iris scanners and palm scanners. A cashless society will do the job. And for many, Elon’s X will be preferable to Amazon’s palm scanners. The illusion of choice will make your financial enslavement less painful.

 

Connect with Greg Reese




Arthur Firstenberg on Electrosmog: “The Ability to Use a Mobile Device Everywhere on Earth Means That Every Square Meter of the Earth Must Be Irradiated at All Times.”

Arthur Firstenberg on Electrosmog: “The Ability to Use a Mobile Device Everywhere on Earth Means That Every Square Meter of the Earth Must Be Irradiated at All Times.”

 

Image credit Goumbik, pixabay

 

Electrosmog: A Policy Brief

Guidance to governments, legislators, environmental organizations, schools, and religious, political, and community leaders.

by Arthur Firstenberg, Cellular Phone Task Force
July 26, 2023

 

Guidance to governments, legislators, environmental organizations, schools, and religious, political and community leaders.  
If your organization wishes to join in supporting this brief, please email us.
Key Points
  1. The study of electricity should be restored to biology and medicine.
  2. Personal wireless communication must be phased out because the radiation that carries all the messages is destroying life on earth.
  3. Mobile phones must be replaced with landline phones, WiFi with ethernet cables, and other wireless consumer devices with devices connected by wires and cables.
  4. Mobile phone antennas and masts must be phased out and removed.
  5. Wireless technology must be removed from vehicles.
  6. Smart meters must be replaced with analog meters.
  7. Smart highways, smart cities, and the Internet of Things must cease being developed and deployed.
  8. Radar stations must be limited in number, location and power.
  9. Radar (microwave) ovens should not be used for heating food.
  10. An international treaty on electrosmog, addressing radiation on land, in the oceans, and in space, must be drafted.
Introduction

Electrosmog is the totality of the electric fields, magnetic fields, and electromagnetic radiation that bathes us 24/7 from all electrical and electronic devices, electric wires, power lines, and wireless devices and antennas. With wired communication, information is transmitted via the wires, and the electromagnetic fields (EMFs) and radiation are unintentional. Proper engineering can reduce these unwanted fields and radiation to a minimum.

By contrast, with wireless communication, the radiation is the product. Radiation substitutes for wires in transmitting information.

Wireless means radiation. The ability to use a mobile device everywhere on earth means that every square meter of the earth must be irradiated at all times. Mobile devices operate in the microwave spectrum, with the result that the entire planet is now swimming in a sea of microwave radiation that is millions to billions of times stronger than the radiation from the sun and stars with which life evolved (1).

Life is based not only on chemistry but more fundamentally on electricity (2, 3). The unimpeded flow of electrons is essential to the functioning of our nerves, heart, and metabolism (3). Interference with these electric currents causes neurological diseases, heart disease, metabolic diseases such as diabetes, and cancer (4).  Organisms that have a very high metabolism, such as bees and other insects, are being wiped out (5, 6). Thousands of studies document the devastating effects of wireless radiation on mammals, birds, insects, amphibians, and forests (7).

Because EMFs are not a foreign substance to living beings, a toxicology model does not apply and there is not a dose response: reducing the power does not reduce the effect. Even a signal that is almost immeasurably weak can interfere with normal biological functioning (8). “While the dose rate/SAR concept is adequate for description of acute thermal effects, it is not applicable for chronic exposures to N[on]T[hermal] M[icro]W[aves].” (9). Even at near-zero power levels, microwave radiation has been found to change the structure of DNA (10) and alter brains waves (11). Some studies have even found an inverse dose response. When the power of the radiation was reduced 1000-fold, damage to the blood-brain barrier increased (12). A review of 113 studies found that radiation with the lowest power tended to cause the greatest ecological damage (5). In another review of 108 experimental studies, a lower exposure level tended to have a greater biological effect, and the difference was highly significant (p < 0.001) (13).

The damage done to our health and our world by wireless devices and their infrastructure is caused not only by the microwave carrier frequencies, but also by the low-frequency modulation and pulsations that carry the transmitted information. “Thus modulation can be considered as information content embedded in the higher frequency carrier wave that may have health consequences beyond any effect from the carrier wave directly” (14). No matter what the carrier wave, the modulation is the same because it has to carry the same information. Therefore using light as the carrier wave, as is being done over short distances with LiFi, or using sound as the carrier wave, as is being done in the oceans, does not reduce the harm.

The finding that only a single two-hour exposure to a mobile phone during their lifetime, even when the power of the phone was reduced 100-fold, caused permanent brain damage in young rats (15) makes it likely that we are raising, and perhaps have already raised, a generation of children with brain damage. There is no question but that this must cease, and that cell phones are not safe at any power level, at any distance from the head, and for any duration.

Purpose of This Document

This policy brief provides an overview of an immediate threat to life on earth—even more immediate than climate change—that has been allowed to get completely out of control because it has been completely ignored. The source of the threat is a technology to which everyone has become addicted, and which, during the past two and a half decades, has become firmly entrenched in every aspect of life. Although more scientific studies have been published on the health and environmental effects of EMFs than on almost any other pollutant except for mercury and tobacco smoke, the impact of all this research upon public policy to date has been zero. Average citizens still do not even know that a mobile device emits radiation. Much less do they suspect that it is causing them brain damage or threatening their life and their future on this planet. The purpose of this brief is to outline actions that are required to be taken by political leaders, religious leaders, environmental organizations, public schools, medical schools and doctors to educate the public and to begin to dismantle this existential threat to the earth.

Essential Actions Required by National and International Leaders and Organizations

I.     An International Treaty or Convention on Electrosmog must be adopted by all nations

The number of antennas and their distance from people and wildlife must be strictly regulated. The elements of an international treaty should include the following:

A.   Phasing out and eventual prohibition of personal
wireless devices, including mobile devices and WiFi

At present there are about 15 billion mobile devices and 6 million mobile phone masts; the earth cannot survive this. Private individuals should not have the right to irradiate their neighbors. Businesses should not have the right to irradiate their patrons.

B.  Limiting antennas and devices that emit radiation to radio and television stations, emergency services such as police and fire departments, and radar for civil defense, aviation and shipping

C.  Limiting the location, number, and power of civil defense radars

The present situation of unlimited power has allowed 3-billion-watt radars such as PAVE PAWS, which has irradiated millions of people on both coasts of the United States for more than four decades (16).

A five-year investigation into the health and environmental effects of a civil defense radar in Latvia after the end of the Cold War resulted in the decommissioning and removal of that radar. School children in the area—even children who lived 20 kilometers away—had impaired motor function, memory and attention, reduced lung capacity, and elevated white blood cell counts. The entire local population suffered from headaches, sleep disturbances and elevated white blood cells. Human reproduction was affected: 25 percent fewer boys than girls were born during the years the radar operated. Chromosome damage was found in local cows. Nest-boxes near the radar were occupied by extremely low numbers of birds. The average growth rings of trees during the years of the radar’s operation were only half as wide as before the radars were constructed, and study of pine cones revealed the trees were aging prematurely. Seedlings in the area grew into deformed plants with reduced reproductive capacity (17, 18, 19, 20,21, 22, 23, 24).

D.  Phasing out weather radars, as they do more harm than good

There are an estimated 1,500 of these extremely powerful installations scattered throughout the world. Each of the 160 NEXRAD radars in the United States has an EIRP (Effective Isotropic Radiated Power) of 32 gigawatts (32 billion watts) (25). These radars are heavily irradiating people and wildlife, and are neither reliable nor essential to weather forecasting (26).

E.  Prohibition of antennas inside national parks, wildlife preserves and protected nature areas

A 2015 report to UNESCO detailed the devastating impact of communication antennas inside a World Heritage Site in Australia. When a telecommunication tower atop Mount Nardi began to convert its antennas from analog (2G) to digital (3G) in 2002, a steady increase in species diversity suddenly reversed and became a steady decrease in species diversity. In 2002 insect populations and diversity began to decline. In 2009, enhanced 3G was installed, along with an additional 150 pay television channels. 27 bird species promptly left the mountain, and insect volumes and species dropped dramatically. In late 2012 and early 2013 4G was installed, and 49 more bird species promptly left the mountain.

“From this time, all locally known bat species became scarce, 4 common species of cicada almost disappeared, as well as the once enormous, varied population of moths & butterfly species. Frogs and tadpole populations were drastically reduced; the massive volumes and diverse species of ant populations became uncommon to rare… [F]rom 70 to 90 % of the wildlife has become rare or has disappeared from the Nightcap National Park within a 2-3 km radius of the Mt. Nardi tower complex” (27).

F.  Prohibition of the manufacture of vehicles with wireless technology and radar

WiFi, Bluetooth, wireless ignitions, wireless CarPlay, wireless tire pressure monitors, and radar are just a few of the in-car systems that have turned the small, reflective metallic bodies of vehicles into intensely microwaved chambers. To these are being added in-car 5G hotspots that are turning many new vehicles into autonomous mobile devices, using vehicle-to-vehicle, vehicle-to-pedestrian, vehicle-to-network, and vehicle-to-highway communication.

G.  Prohibition of smart meters, smart highways, smart cities, and the Internet of Things

Smart meters are being placed on every home and business in the world, and are turning all the wiring inside the walls of every home and business into a radiating antenna.

Microchips and antennas are being placed in every machine, every appliance, and almost every consumer product in the world as part of the Internet of Things, and there are predictions of as many as one trillion antennas communicating wirelessly with one another in the near future. These all irradiate the entire population at close range, including inside their homes and businesses, without any choice and without possibility of escape.

H.  Halting the launch of satellites, and phasing out most private, public and military use of space

The functioning of all living organisms is regulated by their electromagnetic environment, including the magnetic field of the earth, the vertical electric field between earth and ionosphere, the global electric circuit, the Schumann resonances, etc. If the electromagnetic environment of the earth is altered, life on earth will not long survive.

Both the number of satellites in orbit and the radiation they emit are completely out of control. Some satellites already have an effective radiated power of 83 million watts. Some are capable of emitting 5,000 individual beams. More than 8,000 satellites are already in orbit, and thousands more are being sent into space by near-daily rocket launches. Not only are they exposing every square meter of land and oceans to their radiation, but they are polluting the global electric circuit, which includes our bodies, with all of their pulsations and modulation patterns.

This is degrading all of life and causing pandemics, extinctions, and forest die-off, which cannot be successfully addressed without halting the radiation in and from space (4).

I.  Prohibition of underwater wireless communication in the oceans 

Along with national parks and nature preserves, the oceans should be absolutely protected from radiation.

Governmental, commercial and military interests have been collaborating to create Smart Oceans and build the Internet of Underwater Things. To do this they are building cell towers on the ocean floor, putting relay antennas in the depths of the ocean, and deploying smart ships, smart submarines, and underwater robots. The goal is to enable broadband wireless communication from any point on or in the oceans to anywhere else on the planet, up to and including “real-time video streaming from underwater” everywhere in every ocean (28).

RF radiation is being used in the oceans for short- to medium-range communication, and is destroying ocean life the same way it is destroying land-based life. Acoustic waves are being used for long-range communication, and are deafening fish and ocean mammals with sound as loud as 202 decibels.

The fishing industry is also using underwater radar to locate and capture fish with a precision and on a scale that is devastating to ocean life (29).

All underwater wireless communication and radar must be halted.

II.     Churches and other religious buildings should remove antennas and WiFi networks from their premises

Churches have become a prime target by telecommunications companies for the installation of antennas, often hidden inside false chimneys or fake bell towers. These antennas earn a lot of money for churches but turn them into hazardous environments for their worshippers and visitors.

III.     Schools must remove mobile phone masts and WiFi routers and prohibit mobile phones

Schools are among the most intensely irradiated environments in society today, consequently the worst and unhealthiest places for our children to spend their growing years. Every classroom has one or more WiFi routers in it, together with dozens of children sitting in close proximity to one another every day all day, all of them with cell phones and wireless computers, irradiating one another at all times. Like churches, schools are earning money renting their properties to telecommunications companies for the installation of mobile phone masts.

All masts and all WiFi antennas must be removed from all school properties, and children must be prohibited from bringing cell phones to school.

IV.     Religious, political and community leaders should encourage congregations and constituencies to get rid of their cell phones and other wireless devices

Nothing is more important today in the stewardship of our planet.

V.     Medical schools should incorporate education on EMFs into curriculums, and classes in electromagnetic health should be required for continuing education

The books and studies are there by the tens of thousands. They sit on the shelves of medical school libraries gathering dust and being ignored. All that is required is to organize them into the curriculum and the base of knowledge required of every physician in order to earn a medical degree.

VI.     Environmental organizations must form chapters on electrosmog, and must cease using wireless technology as a tool for monitoring and research

The rapid declines in biodiversity and species populations cannot be successfully addressed without reducing electromagnetic pollution which is causing half or more of the observed declines. As long as electrosmog is not addressed head-on, all of these problems will continue to be blamed on other things: climate change, land use, deforestation, pesticides, etc. Some of the means now being used to combat climate change, for example solar and wind energy, are worsening electrosmog and further decimating species. Some of the means to study these problems, for example GPS and radio tracking of wildlife, are diminishing wildlife instead.

All antennas must be removed from protected nature areas, wildlife preserves, and oceans. Radio tracking devices are deadly (30, 31, 32, 33, 34, 35, 36, 37). They must be removed from all wildlife and not put on any more animals, birds, insects, or fish.      

VII.      Non-ionising radiation must be regulated by national environmental agencies with no conflicts of interest

In many countries, radio frequency (RF) radiation from telecommunications facilities and devices is regulated by the same agency that is charged with promoting those facilities and devices. This is an obvious conflict of interest.

Most governments defer to guidance from the International Commission on Non-Ionizing Radiation Protection (ICNIRP) or the World Health Organization, which also defers to the ICNIRP. The ICNIRP is not an environmental agency. It is a self-appointed private organization with 14 members answerable to no one (38). Its exposure guidelines are based on heating only, as though there were no other effects. In the United States, the agency that both regulates and promotes the telecommunications industry is the Federal Communications Commission (FCC). Like the ICNIRP, the FCC bases its exposure guidelines for humans on heating effects only, and completely ignores the effects on the environment.

RF radiation should be regulated transparently within each nation by their own environmental agencies based on the totality of science. It should be addressed within the UN not by the World Health Organization, but by the United Nations Environment Programme, which presently does not address it at all. And it should be subject to an international treaty and a convention on Electrosmog, as per point 1.

Conclusions

The policy considerations presented in this brief have their basis in science, and in the protection of human rights, human health and the environment. They were developed in response to an emergency situation in which the irradiation of the earth is accelerating at such a rapid rate that it has become the single most urgent threat to life on earth today. The recommended actions by political leaders, religious leaders, organizations, schools, and government agencies provide a path to health and survival.

References
  1. Aleksandr S. Presman. Electromagnetic Fields and Life (NY: Plenum Press 1970), p. 31, Figure 11.
  2. Robert O. Becker. The Body Electric (NY: Morrow 1985).
  3. Sulman, Felix Gad. The effect of air ionization, electric fields, atmospherics and other electric phenomena on man and animal. American Lecture Series, Publ. no. 1029 (Charles C. Thomas Publisher, Springfield IL, 1980; 398 pp.).
  4. Arthur Firstenberg (2020). The Invisible Rainbow: A History of Electricity and Life (White River Junction, VT: Chelsea Green 2020, 560 pp.).
  5. Cucurachi et al. A review of the ecological effects of radiofrequency electromagnetic fields (RF-EMF). Environment International 51: 116-140 (2013). https://www.sciencedirect.com/science/article/pii/S0160412012002334/pdfft?isDTMRedir=true&download=true”download=true
  6. Alain Thill. Biologische Wirkungen elektromagnetischer Felder auf Insekten. Umwelt Medizin Gesellschaft 33(3) Suppl: 1-27 (2020). https://kompetenzinitiative.com/wp-content/uploads/2020/09/Thill_2020_Review_Insekten.pdf
  7. Blake Levitt, Henry C. Lai and Albert M. Manville II. Effects of non-ionizing electromagnetic fields on flora and fauna, Part 2 impacts: how species interact with natural and man-made EMF. Reviews on Environmental Health 37(3): 327-406 and Supplements 1-4 (2021). https://doi.org/10.1515/reveh-2021-0050
  8. Allan H. Frey. Is a toxicology model appropriate as a guide for biological research with electromagnetic fields? Journal of Bioelectricity 9(2): 233-234 (1990). https://www.tandfonline.com/doi/pdf/10.3109/15368379009119811
  9. Igor Belyaev. Duration of Exposure and Dose in Assessing Nonthermal Biological Effects of Microwaves. In Dosimetry in Bioelectromagnetics (CRC Press 2017), pp. 171-184.
  10. Y. Belyaev et al. Resonance effect of millimeter waves in the power range from 10–19 to 3 x 10–3 W/cm2 on Escherichia coli cells at different concentrations. Bioelectromagnetics 17: 312-321 (1996). https://onlinelibrary.wiley.com/doi/abs/10.1002/(SICI)1521-186X(1996)17:4%3C312::AID-BEM7%3E3.0.CO;2-6
  11. William Bise. Low power radio-frequency and microwave effects on human electroencephalogram and behavior. Physiological Chemistry and Physics 10(5): 387-398. https://pubmed.ncbi.nlm.nih.gov/751078/
  12. Bertil R. R. Persson et al. Blood-brain barrier permeability in rats exposed to electromagnetic fields used in wireless communication. Wireless Networks 3: 455-461 (1997). https://link.springer.com/content/pdf/10.1023/a:1019150510840.pdf
  13. Andrew Wood, Rohan Mate and Ken Karipidis. Meta-analysis of in vitro and in vivo studies of the biological effects of low-level millimetre waves. Journal of Exposure Science & Environmental Epidemiology 31: 606–613 (2021). https://www.nature.com/articles/s41370-021-00307-7.pdf
  14. Carl F. Blackman. Evidence for disruption by the modulating signal. BioInitiative Report, Section 15, July 2007. https://bioinitiative.org/wp-content/uploads/pdfs/sec15_2007_Modulation_Blackman.pdf
  15. Leif G. Salford et al. Nerve cell damage in mammalian brain after exposure to microwaves from GSM mobile phones. Environmental Health Perspectives 111(7): 881-83 (2003). https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1241519/pdf/eh
  16. Paul Brodeur. The Zapping of America (NY: W.W. Norton 1977).
  17. Guntis Brūmelis, Valdis Balodis, and Zanda Balode. Radio-frequency electromagnetic fields: The Skrunda Radio Location Station case. Science of the Total Environment 180: 49-50 (1996). https://www.sciencedirect.com/science/article/abs/pii/0048969795049134
  18. Anton Kolodynski and Valda Kolodynska. Motor and psychological functions of school children living in the area of the Skrunda Radio Location Station in Latvia. Science of the Total Environment 180: 87-93 (1996). https://wifiinschools.com/uploads/3/0/4/2/3042232/kolodynski.pdf
  19. Zanda Balode. Assessment of radio-frequency radiation by the micronucleus test in bovine peripheral erythrocytes. Science of the Total Environment 180: 81-85 (1996). https://www.sciencedirect.com/science/article/abs/pii/0048969795049231
  20. Liepa and Valdis Balodis. Monitoring of bird breeding near a powerful radar station. The Ring 16(1-2): 100. Abstract (1994).
  21. Valdis Balodis et al. Does the Skrunda Radio Location Station diminish the radial growth of pine trees? Science of the Total Environment 180: 57-64 (1996). https://www.sciencedirect.com/science/article/abs/pii/0048969795049207
  22. Tūrs Selga and Maija Selga. Response of Pinus sylvestris L. needles to electromagnetic fields: cytological and ultrastructural aspects. Science of the Total Environment 180: 65-73 (1996). https://www.sciencedirect.com/science/article/pii/0048969795049215
  23. Magone. The effect of electromagnetic radiation from the Skrunda Radio Location Station on Spirodela polyrhiza (L.) cultures. Science of the Total Environment 180: 75-80 (1996). https://www.sciencedirect.com/science/article/pii/0048969795049223
  24. Microwave News. Latvia’s Russian radar may yield clues to RF health risks. September/October, pp. 12-13 (1994). https://www.microwavenews.com/sites/default/files/sites/default/files/backissues/s-o94issue.pdf
  25. National Telecommunications and Information Administration. NTIA Spectrum Compendium, 2700-2900 MHz, 1 September 2014. https://www.ntia.doc.gov/files/ntia/publications/compendium/2700.00-2900.00_01SEP14.pdf
  26. Advantages and disadvantages of weather radar. https://lidarradar.com/info/advantages-and-disadvantages-of-weather-radar
  27. Mark Broomhall. Report for the United Nations Educational Scientific and Cultural Organization (UNESCO) and International Union for Conservation of Nature (IUCN) (2017). https://ehtrust.org/wp-content/uploads/Mt-Nardi-Wildlife-Report-to-UNESCO-FINAL.pdf
  28. Arthur Firstenberg. Cell towers on the ocean floor. 12 January 2022. https://cellphonetaskforce.org/wp-content/uploads/2022/01/Cell-towers-on-the-ocean-floor.pdf
  29. Lindy Weilgart. The Impact of Ocean Noise Pollution on Fish and Invertebrates. OceanCare and Dalhousie University. 1 May 2018. https://thegreentimes.co.za/wp-content/uploads/2022/01/impact-of-ocean-noise-pollution-on-fish-and-invertebrates.pdf
  30. Jason D. Godfrey and David M. Bryant. Effects of radio transmitters: review of recent radio-tracking studies. In: M. Williams, ed., Conservation Applications of Measuring Energy Expenditure of New Zealand Birds: Assessing Habitat Quality and Costs of Carrying Radio Transmitters (Wellington, New Zealand: Dept. of Conservation), pp. 83-95 (2003).
  31. David Mech and Shannon M. Barber. A Critique of Wildlife Radio-Tracking and Its Use in National Parks. Jamestown, ND: U.S. Geological Survey, Northern Prairie Wildlife Research Center (2002). https://eplanning.blm.gov/public_projects/nepa/51689/167135/203600/E2._A_CRITIQUE_OF_WILDLIFE_RADIO-TRACKING.pdf
  32. John C. Withey et al. Effects of tagging and location error in wildlife radiotelemetry studies. In: Joshua J. Millspaugh and John M. Marzluff, eds., Radio Tracking and Animal Populations (San Diego: Academic), pp. 43-75 (2001).
  33. Roger Burrows, Heribert Hofer, and Marion L. East. Demography, extinction and intervention in a small population: the case of the Serengeti wild dogs. Proceedings of the Royal Society of London B 256: 281-92 (1994). https://royalsocietypublishing.org/doi/epdf/10.1098/rspb.1994.0082
  34. Roger Burrows. Population dynamics, intervention and survival in African wild dogs (Lycaon pictus)Proceedings of the Royal Society of London B 262: 235-45 (1995). https://royalsocietypublishing.org/doi/abs/10.1098/rspb.1995.0201
  35. Jon E. Swenson et al. Effects of ear-tagging with radiotransmitters on survival of moose calves. Journal of Wildlife Management 63(1): 354-58 (1999).
  36. Moorhouse, Tom P. and David W. Macdonald. Indirect negative impacts of radio-collaring: Sex ratio variation in water voles. Journal of Applied Ecology 42: 91-98 (2005). http://bearproject.info/old/uploads/publications/A20%201999%20Effects%20of%20ear%20tagging_moose%20.pdf
  37. Reader’s Digest. The Snow Tiger’s Last Stand. November 1998.
  38. Buchner K, Rivasi M. The International Commission on Non-Ionizing Radiation Protection: Conflicts of interest, corporate capture and the push for 5G. European Parliament report. Brussels June 2020https://ehtrust.org/the-international-commission-on-non-ionizing-radiation-protection-conflicts-of-interest-corporate-capture-and-the-push-for-5g/
Acknowledgments

The following individuals contributed to the drafting of this Policy Brief:

Arthur Firstenberg
Kathleen Burke
Ian Jarvis
Christof Plothe
Tess Lawrie

 

Connect with Arthur Firstenberg — substack | website

Cover image credit: geralt




The Asinine Insanity of the ‘Climate Change’/C02 Hoax: Kill the Cows to Save the Earth!

The Asinine Insanity of the ‘Climate Change’/C02 Hoax: Kill the Cows to Save the Earth!

by Gary D. Barnett
July 18, 2023

 

Sky Falling

Experts Agree: Not only is the sky falling but we’re all going to die from global warming. SUVs are a major culprit, and have been contributing to rising sea levels according to climate expert, Chicken Little. Colleague, Algore, speaking during a blizzard, agreed with Little.”

~ The Daily Alarmist

I must preface my comments here with sane logic, so as to ward off the absurd idiots who have bought hook, line, and sinker, the madness of the mainstream media, the political class, the non-science ‘scientists,’ the fake environmental whackos, the evil UN, the illegitimate IPCC, and the staged marketing of the ever-pathetic rantings of the once teenage bimbo ignoramus, Greta Thunberg, about man’s normal activity destroying the ‘planet.’ It is just not so!

Yes, the climate on earth changes on a regular basis. Yes, extreme weather conditions are seemingly present more often than not considering the near past. Yes, warming and cooling takes place over time, and has for millions, (or billions) of years. Yes, particular humans, (government, malevolent ‘scientists,’ NGOs, and the military, among many other nefarious individuals and organizations) can manipulate weather to harm us, but no; driving an SUV cannot kill us all. I present this as a purposeful affront to the evil liars, propagandists, depopulation monsters, eugenists, and technocrats, who desire to rule the earth at the great expense of all common men and nature.

The latest absurdity, not new or unique in any way, is the plan of the Irish government to cull (kill) 200,000 healthy cows, claiming “they contribute to ‘climate change’ due to ‘carbon’ emissions.” Anyone who takes this nonsense seriously, or accepts and/or ignores it, is opening the gates to voluntary human extermination. To not be able to understand that both cows and humans eat, live, and expel C02, and to not see that there are eight times more humans than cows globally, why would anyone not grasp that killing humans would be, according to these mad enviro-fools, even more effective in their efforts to ‘save the planet’ than killing cows? Why not kill every animal, including large numbers of humans, if ‘saving the planet’ from farts is the main goal?

Humans not only expel more C02 than cows, but they consume vast amounts of energy, they drive cars, they fly on planes, they build factories that pollute, they mine, they create incredible mountains of plastic and garbage, they perpetuate wars that destroy the earth at unheard of levels, and they continue to outpace cows in population growth by extreme margins. Cows only breath and fart, so why kill these innocent animals; why not just go ahead and cut to the chase, and kill large swaths of humans, (the real plan) saving the soon to be endangered Bos taurus — bovine? (cow) Are you beginning to see the absurdity of this bogus ‘climate change’ bullshite? The nonsense swallowed up and believed by most all these ‘climate change’ pushing scum, expands the bounds of absurdity to astronomical levels.

It gets much worse. This incredibly harmful and idiotic plan by the very imbecilic Irish Department of Agriculture, and the Irish Environmental Protection Agency, will pay 5,000 euros ($5,622) for each cow killed. Keep in mind, that 200,000 cows makes up 0.02% of the total number of cows on earth. Is anyone stupid enough to consider this a legitimate fight against the fraudulent notion of ‘climate change?’ At that price, it would cost $1.125 billion just to pay the farmers for killing their animals. (At this price, to kill all cows on earth, would cost $5.525 trillion) But what about the cost to dispose of these animals, the huge amount of energy and pollution used to do so, the loss of food and dairy products, the supply reduction and obvious extreme price increases certain to come? How will these losses be made up, and how much increased energy will be required to fill this void?

I do realize that most might consider this a minor subject matter, but that would be a grave mistake on your part. The powers that be are not planning on stopping with the killing of animals; they are intent on total control over every aspect of your life, including what food you eat, where you are allowed to go, how much energy you are allowed to use, how much heat you will be allowed in winter to keep warm, how you spend your allotted currency units, (CBDCs) how much medical care you may be allowed, where you may live, and even control whether you may procreate or not.

Why not get to the meat (pun intended?) of this problem, and dispose of the lies and propaganda that consume this now ignorant, pathetic, and indifferent population. The weather is being controlled, it is greatly harming humanity and nature, and is causing an incredible amount of damage not only to this earth, but to every living thing on it. This is not, and never has been, the result of normal human behavior, but is due to mass manipulation of the weather by the ruling class of claimed ‘elites’, who have chosen to use false climate narratives to create mass fear in order to control all. This is the ultimate fake ’emergency’ being used to take over humanity.

Many factors are likely present concerning climate extremes, including, but not limited to, weather geoengineering by the State, graphene rain, directed energy, climate modification assault, heating the ionosphere using HAARP technology, cloud seeding, spraying our skies with metals and poisons through stratospheric aerosol injection, (chemtrails) and most assuredly, artificially creating and enhancing the destructive  nature of hurricanes and earthquakes. Certainly, there are other devastating manipulations of weather going on as well that are unknown at this time, as the military’s full technological potential is hidden, and far ahead of what is believed by most. In addition, releases of toxic chemicals, bioweapons, and the continuous poisoning of the earth’s land and water by deadly substances such as glyphosate, is continuously ongoing. Weather is now a major weapon against mankind, and is being used to monopolize all agriculture and food production, or planned lack thereof.

It is not just cows that will be targeted by these evil ‘climate change’ monsters, it is the entire human race. So to believe that killing cows will save anyone or this earth, is not only completely ludicrous, but a sign that this is only the start of a much broader assault on all of the proletariat herd. They may attempt to begin with the cattle, but if that atrocity is allowed to happen, you and your family will likely be next.

Carbon Dioxide (C02) is absolutely vital to the existence of man. Without it, everything on earth would die. Through the process of photosynthesis, leaves on trees and plants use the great energy of the sun in order to convert this C02 to feed the plants, causing life-sustaining oxygen to be produced so that all things can live and breathe. It is said that one large tree can produce by using expelled C02, enough oxygen supply to provide what is necessary for a full day for several people. Plants also store carbon dioxide to clean the air and reduce negative effects to the environment. This process is imperative for life to survive, as without it, oxygen would cease to be available. If carbon dioxide were to be eliminated, (net zero is the stupid term used) everything would die. Keep this in mind the next time you hear some ranting ‘climate change’ dreg advocating the killing of all our animals (including humans) to ‘save the planet.’

All that is needed to save this planet and everything on it, is the elimination of all rulers and governments! Think about that the next time you perpetuate your own destruction by choosing to vote to ‘elect’ a master, any master, to rule over and control you. It is better to cull politicians and save the cows.

“Almost all of history is an unbroken trail of one conspiracy after another. Conspiracies are the norm, not the exception.”

~ G. Edward Griffin

Reference links:

Irish government to cull 200,000 healthy cows to meet ‘climate goals’

Carbon Dioxide from breathing and farting is not a concern for ‘global warming’

Don’t blame cattle

World cattle numbers by year

Chemtrails: The Conspiracy Theory That Never Was

The power of one tree

Geoengineering Watch

HAARP and the Sky Heaters

 

 

Connect with Gary D. Barnett

Cover image credit: ArtTower & LauraTara




This Is Why We Need to Talk About CBDCs

This Is Why We Need to Talk About CBDCs

 

 Video available at Odysee & YouTube

 

by Aaron & Melissa Dykes, Truthstream Media
July 14, 2023

 

(Normally this is the type of article we only share with our Patreons, but this needs to be seen by everyone who can.)

Central banks and governments, at a global scale, have prepared to implement CBDCs (Central Bank Digital Currencies) with important consequences for every aspect of freedom in our lives.

Though they will introduce it to the public gradually, its capacity for total control is immense.

It isn’t merely that the new dollar is digital, traceable and trackable. It’s based on blockchain technology, of course. It isn’t merely that small business will be hurt (yet again) or that private transactions will be eradicated. Nor will it be merely consequential for drug dealers, scammers, or illicit trades.

CBDCs will be PROGRAMMABLE. Where and how money is spent is literally built into this new currency. And they plan to use it to change how money is used.

Yes, CBDCs are programmable. The executives that frequent the World Economic Forum and the other elite forums have said so.

And so, CBDCs will not just be money. No, not at all. CBDCs are designed as tools of a very political and ideological agenda; some of the worst policies that have been pushed in recent decades will now have the force of spending controls to “nudge” people into submission and compliance.

Again, CBDCs ARE PROGRAMMABLE. Whoever controls the money controls the agenda. That is the point.

Why is this important? Central banks, private banks, government authorities and global designers will have the power to turn on and off transactions of every kind. They can algorithmically-determine precisely what the CBDC money can be spent on; when and under what conditions; and by who.

At the touch of a button, PROGRAMMABLE cash in the form of CBDCs can block the sale of firearms, alcohol, cannabis or tobacco. Or other sensitive products. But that’s just the start (you knew that).

At the same touch of a button, PROGRAMMABLE CBDCs can prevent the sale of meat, dairy, candy and junk food, or disallow the purchase of gasoline or use of a vehicle (and an endless array of other examples; you get the idea.)

With yet another press of the button, they can also freeze bank accounts of political dissidents — like those supporting the recent trucker protest in Canada, for instance.

Spending under CBDCs could be allocated for specific purposes — like rent and groceries — or be timed to expire, requiring, for instance that money be spent by the end of the month.

CBDCs could also prevent individuals with “bad social credit scores” from purchasing anything more than the bare basics of survival. Black Mirror’s Nosedive has already depicted as much, but that’s mild compared to what’s possible.

Blackrock CEO Larry Fink recently said: “Behaviors are gonna have to change. And this is one thing we’re asking companies — you have to force behaviors, and at BlackRock, we are forcing behaviors.”

The compliance of private businesses — any major business who relies upon good standing in the global financial system — can also mandate adherence to any number of political agendas and purchasing behaviors. Energy caps; green conscience laundering; medical misinformation policies; sensitivity about world events, wars and catastrophes; identity politic political correctness shifting sand madness; polka-dots-over-stripes; anything is possible!

And the private policies of private banks and businesses — ultimately steered by central bank CBDC policies — could easily circumvent restrictions on our civil rights under governments and public systems. (And what could you really do about it? Where else could you go?) The Bank of International Settlements recently announced 93% of the world’s central banks are currently working on a CBDC, and the International Monetary Fund (IMF) is already hard at work on a global CBDC platform.

Social media and other tech giants have already paved the way to this version of circumnavigation-hell (I’m not touching you; I’m not touching you!!), even as it emerged that shadowy government agencies were literally coordinating the takedown of free speech online in violation of First Amendment protections.

This nightmare of privacy-less technological enslavement under CBDCs is complicated and perhaps predicated by the advent of AI and the loss of employment for hundreds of millions and even billions of people who once held relative autonomy over their own lives.

UBI (Universal Basic Income) funds will be increasingly provided by governments — as it perhaps must be in a scenario with no meaningful employment — not just for the poor and unemployed, but for nearly everyone. Certainly, people will need financial support to live their lives.

But that money would be used to control as much as it would be used to provide sustenance. Not only would every transaction large and small be tracked, but its use would be specifically tailored to the vision of life proscribed by the very powerful and their AI tech tools. Anything in violation of prevailing policies would be automatically out-of-bounds.

While this design could be used for good (though such powers are unwise), and many would give it that benefit of the doubt, those paying attention can see plainly its drawbacks and potential for the very worst.

With little-to-no context and no one to appeal to, an “artificially intelligent” system administers, gives, and takes away as it is programmed to do. Perhaps clumsily suppressing on the basis of key words and categories… perhaps insidiously on the basis of personalized profiles with millions of pieces of data. This system can and will automatically behaviorize all who live under its auspices, with grave consequences which are easy to predict. And even worse outcomes are quite possible.

Even under the most glowing version of this vision of the near future, where personal behaviors are improved, and people become “better” citizens, nicer neighbors and excellent stewards of the environment — even then, if a positive outcome can even be supposed — it would be a world without freedom.

Freedom itself is on the line under programmable CBDCs, in an almost direct way.

Instead of technology freeing us from worry, labor, and drudgery, it stands to reinforce and radically expand top-down control. This is not hyperbole.

New behaviorism — such as living within one’s allotted carbon footprint allowance — could and would be enforced easily, but tyrannically under this kind of system. Likely it would come with a velvety touch and a gradual implementation to dissuade outrage and condition acceptance; but in of itself, the system could nonetheless be flipped-on overnight.

A government powerful enough to give to all, and yet also take away from all is not only possible, but immediately part of the scheme. Accountability, dissent, free expression, and independent lives could all become a thing of the past, replaced by an engineered obedience, dulled further by the extremes of algorithmically driven group think.

Polls show that CBDCs — now being pursued by the Federal Reserve in the United States and by most every major government and financial system around the globe — are extremely unpopular with the people, but only by those who are aware of their potential existence and uses.

The vast majority of the public — most already lost in a sea of apathy and indifference — remain ignorant of how radically the money system they live under is changing. People need to be informed. Dissent needs to be expressed now while it still can be.

The unfortunate, flawed maxim “If you’re not doing anything wrong, you’ve got nothing to hide” is due for a nightmarish upgrade. The elites, already concentrated in wealth and power — and now unleashing AI — plan to literally program and control your entire life through digital currency.

Something huge is happening. Please pay attention. Please tell people what this can do. Please make your voice heard.

 

Resources

The Trust Game ten episode financial docuseries by Truthstream on Vimeo (to Support TSM)

The Trust Game on YouTube (for free)

Bank of England Tells Ministers to Intervene on Digital Currency ‘Programming’

CATO Poll: Only 16% of Americans Support the Government Issuing a Central Bank Digital Currency

CATO: Central Bank Digital Currency — Assessing the Risks and Dispelling the Myths

 

Connect with Truthstream Media

Cover image based on creative commons work of: FreeGiver & geralt




5G Frequencies Mimic COVID: The Evidence

5G Frequencies Mimic COVID: The Evidence

by Rosanne Lindsay, Traditional Naturopath, Nature of Healing
July 4, 2023

 

They say hindsight is 20/20.

So what happened in 2020?

The rush to deploy the 5G Network around the world coincided with the global COVID pandemic of 2020. That happened.

Only two years earlier, officials at the World Health Organization called COVID a global threat. But behind the scenes, the media quietly announced that 5G was coming, whether people wanted it or not.

Why is the connection between 5G and COVID important?

It’s time to play detective and retrace the narrative back to the evidence.

Let The Games Begin!

The effort to convince people that they needed a new microwave technology called 5G “for faster downloads,” began below the radar when the 5G network was tested during the 2018 South Korean Winter Olympics.  Then, the narrative sounded like this:

Let the 5G games begin!  5G will affect everything from self-driving cars and the so-called Internet of Things.

Then, in 2019, the first COVID case was declared. By then, the 5G networks had already been activated and back-page news around the world.

EMF exposure limits set up in 1996 by the FAA and others are based on invalid assumptions. Over 25,000 articles over 30 years provide evidence that shows they are not protective of human health and wildlife.  One such 2015 Polish study in the Journal Przegl Lek recognizes EMF-induced biological effects in humans.:

Electromagnetic fields can be dangerous not only because of the risk of cancer, but also other health problems, including electromagnetic hypersensitivity (EHS). 

EHS is a syndrome with a broad spectrum of non-specific multiple organ symptoms including both acute and chronic inflammatory processes located mainly in the skin and nervous systems, as well as in respiratory, cardiovascular systems, and musculoskeletal system. WHO does not consider the EHS as a disease.

It is neglectful that the WHO does not consider EMF-related health effects as a legitimate syndrome or disease. This delinquency becomes a challenge to the medical profession which must base a diagnosis on guesswork.

Ironically, the WHO does recognize EMF-induced symptoms as dermatological symptoms (redness, tingling, and burning sensations), as well as neurasthenic and digestive symptoms (fatigue, tiredness, concentration difficulties, dizziness, nausea, heart palpitation, and digestive disturbances). Meanwhile, the European Union recognizes the diagnosis and treatment of EMF-related health problems and illnesses going back to 2015.

Before experimental vaccines were authorized for COVID-19, a set of symptoms had been described as COVID by the CDC that mimics EMF exposure. The 2021 Journal Radiat Res published, “Commonalities Between COVID-19 and Radiation Injury

Inflammation is a key common player in COVID-19 and ARS, and drives the multi-system damage that dramatically alters biological homeostasis. Both conditions initiate a cytokine storm, with similar pro-inflammatory molecules increased and other anti-inflammatory molecules decreased.

EMF symptoms:
  • fever
  • cough
  • chills
  • loss of taste and smell
  • reddening in the extremities (e.g., “COVID toes,” suggestive of microvessel damage)
  • include acute respiratory distress syndrome (ARDS)
  • Pneumonitis and subsequent drop in blood oxygen levels, which often progresses to pulmonary fibrosis
  • multi-organ hypercoagulation,
  • hypoxia
  • cardiovascular damage
  • increase in local neutrophils, cytokines and other immune factors
“COVID” symptoms:
  • Fever or chills
  • Phlem-less Cough
  • Shortness of breath or difficulty breathing
  • Pneumonitis and subsequent drop in blood oxygen levels
  • Fatigue
  • Muscle or body aches
  • Headache
  • New loss of taste or smell
  • Sore throat
  • Congestion or runny nose
  • Nausea or vomiting
  • Diarrhea
  • increase in local neutrophils, cytokines and other immune factors

Serious Adverse Events post Cov-Vax describe the above and more:

A Live Exercise

In 2020, during a Coronavirus Task Force briefing, Secretary Mike Pompeo disclosed the fact that the pandemic “is a live exercise.”



Do the EMF-induced symptoms mimic COVID-19? Does the added mRNA EUA technologies increase adverse events?

Any investigative mind would first attempt to rule that out a connection between 5G and COVID-19.

So, the first order of business would be to find the alleged causal viral agent for COVID 19.

One small problem.

Officially, the 2019 virus called Coronavirus-19 has never been isolated. in its original state. See page 41 of the 2023 CDC document where the Centers for Disease Prevention and Control (CDC) reports the suspect virus is “not available.”

Since no quantified virus isolates of the 2019-nCoV were available for CDC use at the time the test was developed and this study conducted, assays designed for detection of the 2019-nCoV RNA were tested with characterized stocks of in vitro transcribed full length RNA (N gene; GenBank accession: MN908947.2) of known titer (RNA copies/µL) spiked into a diluent consisting of a suspension of human A549 cells and viral transport medium (VTM) to mimic clinical specimen.

What is it?

Did the Corona virus mutate or disappear before it could be identified?

Did it ever exist in the first place?

Is Coronavirus a case of semantics, and not of disease?

If you look up the term, Coronavirus, it is defined as a family of cold and flu viruses. Hence, it is not one virus; Corona virus:

Coronaviruses constitute the subfamily Orthocoronavirinae, in the family Coronaviridae, 

Further, according to a 2020 published medical journal article in the CDC’s  Journal Emerging Infectious Diseases, the Coronavirus was amplified and generated in a lab which became the known “isolates.” See under Whole Genome Sequencing:

“designed 37 pairs of nested PCRs spanning the genome on the basis of the coronavirus reference sequence (GenBank accession no. NC045512).”

That reads a lot like a patent.

The present invention provides a live, attenuated coronavirus comprising a variant replicase gene encoding polyproteins comprising a mutation in one or more of non-structural protein(s) (nsp)-10, nsp-14, nsp-15 or nsp-16. The coronavirus may be used as a vaccine for treating and/or preventing a disease, such as infectious bronchitis, in a subject. 

In fact, there are a lot of COVID 19 patents when you look for them. In 2022, there were 3741 COVID-19-related patents.

In 2020, Dr. Tom Cowan called COVID a scientific fraud. He highlighted the 2020 study that showed the Coronavirus is not infectious in humans:

“Therefore, we examined the capacity of SARS-CoV-2 to infect and replicate in several common primate and human cell lines, including human adenocarcinoma cells (A549), human liver cells (HUH 7.0), and human embryonic kidney cells (HEK-293T).

In addition to Vero E6 and Vero CCL81 cells. … Each cell line was inoculated at high multiplicity of infection and examined 24h post-infection. No CPE was observed in any of the cell lines except in Vero cells, which grew to greater than 10 to the 7th power at 24 h post-infection. In contrast, HUH 7.0 and 293T showed only modest viral replication, and A549 cells were incompatible with SARS CoV-2 infection.”

If no wild Coronavirus was ever officially isolated, and if Coronavirus is not harmful to humans, then what could be causing similar symptoms in millions of people all over the world?

It turns out that 5G millimeter waves can and do promote symptoms described as Covid.
Controlling The Narrative

This chronological overview of the publications published during the initial critical phase of discussions around 5G and health leads to the interesting observation that publications by authors with links to anti-5G campaigning organizations dominated the early phase in which adverse effects related to 5G were discussed..Such patterns of efforts to control the narrative during critical periods. – The population health effects from 5G: Controlling the narrative, Frontiers, 2022 

“5G Technology induces Coroavirus in skin cells.”  That was the conclusion of a study published in an Editorial from the July 2020 Journal Biol Regul Homeost Agents by Fioranelli et al, that was subsequently retracted:

In this research, we show that 5G millimeter waves could be absorbed by dermatologic cells acting like antennas, transferred to other cells and play the main role in producing Coronaviruses in biological cells. DNA is built from charged electrons and atoms and has an inductor-like structure. This structure could be divided into linear, toroid and round inductors. Inductors interact with external electromagnetic waves, move and produce some extra waves within the cells.

The shapes of these waves are similar to shapes of hexagonal and pentagonal bases of their DNA source. These waves produce some holes in liquids within the nucleus. To fill these holes, some extra hexagonal and pentagonal bases are produced. These bases could join to each other and form virus-like structures such as Coronavirus. To produce these viruses within a cell, it is necessary that the wavelength of external waves be shorter than the size of the cell. Thus 5G millimeter waves could be good candidates for applying in constructing virus-like structures such as Coronaviruses (COVID-19) within cells.

We know the importance of skin cells by their absorptive and alchemical abilities to convert sunlight (the frequency of the sun), into Vitamin D3. [See my article on Vitamin D here]. Yet, even knowing the delicate relationship between light frequencies and human skin, harmful technologies march forward, undaunted.

What happens when scientists take it below the surface, under the skin?

The Internet of Things

is moving ahead of itself, without attention to detail, safety, or security features.

From dental sensors that collect your data, to medication sensors to track compliance with prescriptions, to kitty litter that tracks your cat’s bowel movements, artificial intelligence (A.I.) is moving inside. And its all hackable.

Elon Musk’s first brain implant prototype of Neuralink has been featured in the media.  Since then, the FDA has approved chip implants in human brains even though a prior attempt was rejected. Neuralink is also under investigation by the U.S. Department of Agriculture’s Office of Inspector General for potential animal-welfare violations.

Meanwhile, medical studies on the health effects of computer-human interface have been retracted or withdrawn: WITHDRAWN: Brain computer interface technology: Usability and applications in psychiatry.

Before putting the cart before the horse, humans must understand 5G frequencies.

The Studies

There is a wide range of evidence to interpret the newly emerging microwave exposures as an invisible stressor.

Microwaves are absorbed by living tissue. The frequencies used for cell phone technologies have a half-life penetration depth of several centimeters, whereby cell membranes constitute no obstacle.   – Klaus Buchner and Horst Eger, German Study, Electromagnetic Fields, 2011

The 5G rollout preceded the vaccine rollout by several months, not only in the U.S., but in other parts of the world as well. For more information see my 2020 article, Induction of COVID Symptoms via 5G Frequencies.

Fortunately, the question of association between EMFs and COVID-related symptoms can be answered by a long list of medical journal studies:

1. Radiation from wireless technology affects the blood, the heart, and the autonomic nervous system, 2013

An increasingly common response includes clumping (rouleau formation) of the red blood cells, heart palpitations, pain or pressure in the chest accompanied by anxiety, and an upregulation of the sympathetic nervous system coincident with a downregulation of the parasympathetic nervous system typical of the “fight-or-flight” response.

2. COVID-19 Attributed Cases and Deaths are Statistically Higher in States and Counties with 5th Generation Millimeter Wave Wireless Telecommunications in the United States, 2021

This assessment clearly shows exposure to 5G mmW technology is statistically significantly associated with higher COVID-19 case and death rates in the U.S.A. The mechanism–should this be a causal relationship–may relate to changes in blood chemistry, oxidative stress, an impaired immune response, an altered cardiovascular and/or neurological response.

3. Influence of electromagnetic fields on the circadian rhythm: Implications for human health and disease, 2023

Research suggests that the circadian rhythm, which controls several physiological functions in the human body, can be influenced by light but also by the earth’s EMFs. … Severe disruption of the circadian rhythm increases inflammation which can induce fatigue, fever and flu-like symptoms in a fraction of the population and worsen existing symptoms in old and diseased individuals, leading to periodic spikes of infectious and chronic diseases.3. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8580522/

4. Evidence for a connection between coronavirus disease-19 and exposure to radiofrequency radiation from wireless communications including 5G, 2021

We present evidence that WCR may: (1) cause morphologic changes in erythrocytes including echinocyte and rouleaux formation that can contribute to hypercoagulation; (2) impair microcirculation and reduce erythrocyte and hemoglobin levels exacerbating hypoxia; (3) amplify immune system dysfunction, including immunosuppression, autoimmunity, and hyperinflammation; (4) increase cellular oxidative stress and the production of free radicals resulting in vascular injury and organ damage; (5) increase intracellular Ca2+ essential for viral entry, replication, and release, in addition to promoting pro-inflammatory pathways; and (6) worsen heart arrhythmias and cardiac disorders.

5. The influence of millimeter waves on the physical properties of large and giant unilamellar vesicles, 2013

…a decrease in the water membrane permeability of the irradiated samples was observed. We advance the hypothesis that both the above effects may be explained in terms of a change of the polarization states of water induced by the radiation, which causes a partial dehydration of the membrane and consequently a greater packing density (increased membrane rigidity).

6. The carcinogenic potential of non-ionizing radiations: The cases of S-50 Hz MF and 1.8 GHz GSM radiofrequency radiation, 2019

A second project of two large life-span carcinogenic bioassays was conducted on over 3000 Sprague Dawley rats exposed from prenatal life until natural death to 1.8 GHz GSM of mobile phone radio base station, alone or combined with acute exposure to gamma radiation. Early results from the experiment on 1.8 GHz GSM alone show a statistically significant increase in the incidence of heart malignant schwannoma among males exposed at the highest dose.

7. Oxidative mechanisms of biological activity of low-intensity radiofrequency radiation , 2015

A wide pathogenic potential of the induced reactive oxygen species (ROS) and their involvement in cell signaling pathways explains a range of biological/health effects of low-intensity radiorequency radiaiton (RFR), which include both cancer and non-cancer pathologies. In conclusion, our analysis demonstrates that low-intensity RFR is an expressive oxidative agent for living cells with a high pathogenic potential and that the oxidative stress induced by RFR exposure should be recognized as one of the primary mechanisms of the biological activity of this kind of radiation.

8. Changes of Clinically Important Neurotransmitters under the Influence of Modulated RF Fields—A Long-term
Study under Real-life Conditions, 2011

Wireless devices used at home such as DECT, Wi-Fi, and Bluetooth amplify the effect of the GSM radiation. In the case of adrenaline and noradrenaline, almost exclusively children and chronically ill subjects (here mostly subjects with allergies) are affected. 

Especially in children below age ten, it is not thought possible to maintain a chronic state of anxiety for one and a half years due to an abstract term such as cell tower radiation.  

The clinical relevance of changed PEA levels is well documented for mental illnesses. Endogenous depression is associated with lowered PEA levels, whereby the transition from depression to maniac episodes is accompanied by an increase in PEA levels

After having exhausted the biological feedback mechanisms, major health problems are to be expected. The possible long-term consequences of remaining caught in the exhaustion stage have already been described by Hecht and Selye

9. Mechanism for action of electromagnetic fields on cells, 2002

pulsed electromagnetic fields can be more active biologically than continuous ones. According to the present theory, the low frequency fields are the most bioactive ones. The basic mechanism is the forced-vibration of all the free ions on the surface of a cell’s plasma membrane, caused by an external oscillating field. We have shown that this coherent vibration of electric charge is able to irregularly gate electrosensitive channels on the plasma membrane and thus cause disruption of the cell’s electrochemical balance and function.

The question is does the 5G Network play a role in creating a pandemic with symptoms identical to the condition dubbed as COVID 19?

According to a 2021 study, published in J Clin Transl Res, there is indeed evidence for a connection between coronavirus disease-19 and exposure to radiofrequency radiation from wireless communications including 5G.

… we investigated a possible environmental factor in the COVID-19 pandemic: ambient radiofrequency radiation from wireless communication systems including microwaves and millimeter waves. SARS-CoV-2, the virus that caused the COVID-19 pandemic, surfaced in Wuhan, China shortly after the implementation of city-wide (fifth generation [5G] of wireless communications radiation [WCR]), and rapidly spread globally, initially demonstrating a statistical correlation to international communities with recently established 5G networks.

Foresight: Looking Ahead

Hindsight is always 20/20.

This means that it is easy to clearly see what should have been done or said in the past. We are looking back on what has already happened, so the reasons it happened should now be crystal clear.

In truth, 20/20 is not perfect vision. It is average or ‘normal’ vision, because is possible to have better than twenty-twenty vision with the naked eye.

We see, now, that we may have a case of a missing virus!

For people to stay ahead of any future live exercises, and where the problem is clear as mud, people must lead with foresight. How did the prophet-authors of the past, Orwell and Huxley, seem to predict a dystopian future that is now? Did they have foresight, or did they have a blueprint?

These are times for discernment. People must raise their private investigator magnifying glasses. They must stay one step ahead, before the next games begin.

 

Rosanne Lindsay is a Naturopath, writer, earth keeper, health freedom advocate and author of the books The Nature of Healing, Heal the Body, Heal the Planet and  Free Your Voice, Heal Your Thyroid, Reverse Thyroid Disease Naturally.

Rosanne Lindsay is available for consultation through Turtle Island Network.  Subscribe to her blog at natureofhealing.org.

 

Connect with Rosanne Lindsay

Cover image credit: cliff1126




The Fed Launches Phase One of Their CBDC This Month

The Fed Launches Phase One of Their CBDC This Month

by Greg Reese, The Reese Report

 

 Video Source

 

In a recent Time Magazine article, Ray Dalio of Bridgewater Associates hedge funds warned that the world is on the brink of disaster. He came to this conclusion based on current events that haven’t happened since the nineteen thirties. The largest amounts of debt and inflation. The biggest gaps in wealth and values resulting in the rise of populism on both the left and the right against the elites. And the greatest international conflict between world powers, most importantly between the U.S. and China.

Peter Onge writes that the easy way out of this mess would be for the elite to proactively shrink in scope. Get government out of the economy, out of social engineering, and out of propagandizing kids. But of course, this won’t happen.

Common sense and simple observation will tell you that the so-called elites will continue on their path towards economic destruction and world war. Which is likely what the international bankers had planned all along. Let us not forget that the fast-growing BRICS monetary system was born in 2001 out of Goldman Sachs.

In 1971, President Nixon officially ended the Gold Standard and replaced it with the petrodollar in which OPEC agreed to price their oil in US dollars in exchange for US military protection. This blood money deal preserved US control over the world economy. But when the US weaponized the SWIFT payment system against Russia, BRICS became the only viable solution for the rest of the world.

Reuters in New Delhi reported that last May, the State Bank of India rejected Indian Oil Corp’s planned payment in US dollars for Russian oil. And so they went to a private bank and settled their trade for Russian oil by paying in yuan to the Bank of China. And have continued to do so since

A shortage of US dollars in Argentina has caused commercial banks to allow the Chinese yuan as a form of currency in savings and checking accounts. Argentina has already been issuing securities in the Chinese yuan and has made a two-point-seven billion dollar payment to the International Monetary Fund using the Chinese BRICS currency.

The Federal Reserve Bank’s FedNow is scheduled for launch by the end of July. FedNow is officially an update to the Federal Reserve’s payment processing and settlement system. And appears to be a backdoor to creating a Central Bank Digital Currency. Private blockchain operator Tassat has partnered with the Federal Reserve’s new payment system and will serve as an interface for FedNow.

FedNow will also connect with Metal Blockchain, whose CEO and founder claims will allow banks to prepare for an eventual central bank digital currency, along with bank-issued stablecoins.

The idea of a Central Band Digital Currency is already hugely unpopular with the majority of Americans. But according to Dale Houser, it is being set up to destroy alternative blockchain solutions such as Ripple and Stellar. And if the powers that be are successful in destroying the US economy, then the only other option to accepting a CBDC would be some sort of revolution. Which would be nearly impossible seeing as how divided the populist movement is within the left/right paradigm.

Last week in China, the World Economic Forum proclaimed that the entire world needs to switch to a Central Bank Digital Currency with expiry dates and restrictions on undesirable purchases. They proposed using artificial intelligence to censor hate speech and disinformation on the internet. And using artificial intelligence to control a global social credit system that will involve wearable devices with sensors to monitor everyone’s actions.

If we the people fail to unite against the powers that be, then their solution will most certainly be world war, depopulation, and total control. And this is all happening right now.

 

Connect with Greg Reese




The Criminalization of Dissent (Revisited)

The Criminalization of Dissent (Revisited)

by CJ Hopkins, The Consent Factory
July 3, 2023

 

Greetings from Thoughtcriminal 231Js1736/23!

That’s my official Thoughtcrime Case Number, which my attorney needs to reference in all our official correspondence with the New Normal Thoughtpolice. I think I’m going to silk-screen it on a T-shirt and wear it on my first day in Moabit Criminal Court, “the largest criminal court in Europe with 340 judges and 360 prosecutors.”

That’s right, the Berlin State Prosecutor’s office is pursuing its criminal investigation of me for allegedly “disseminating propaganda, the content of which is intended to further the aims of a former National Socialist organization,” which according to Germany’s Grundgesetz could send me to prison for up to three years.

My attorney wrote to them and politely explained how ridiculous their investigation is and why they should summarily drop the charges, but New Normal Germany has a zero-tolerance policy when it comes to Thoughtcrime, especially Thoughtcrime involving any kind of Covid-denying propaganda.

The “propaganda” in question is these two Tweets.

Which, OK, I just disseminated them again, so there’s another three years in prison. Or, I don’t know, maybe it’s six years in prison, i.e., three years for each separate count of Thoughtcrime.

I wrote those Tweets in German, so let me translate.

The one on the left reads, “The masks are ideological-conformity symbols. That is all they are. That is all they have ever been. Stop acting like they have ever been anything else, or get used to wearing them.” The hashtag translates as “Masks are not a benign measure.”

The one on the right is a quote by Karl Lauterbach, the Minister of Health of Germany, tweeted by Die Welt, a national newspaper. It reads “The masks always send out a signal.” And, yes, Karl, that’s exactly the point I was making.

The image is from the cover art of my book The Rise of the New Normal Reich: Consent Factory Essays, Vol. III (2020-2021), which was banned in Germany by Amazon, Inc. two days after I tweeted the above Tweets. (It appears to also be banned for sale in German bookstores, but I don’t have confirmation of that.)

My attorney just received the screenshots of these Tweets from the Berlin State Prosecutor a few days ago. Up to then, we didn’t know what they were, and we couldn’t find them, because they have been censored by Twitter, presumably on the orders of the German Thoughtpolice. We knew they featured the cover art of my book, because the Prosecutor’s office described it, but we didn’t know about the “Covid denial.”

So, essentially, I’m facing criminal charges, and being threatened with who knows how many years in prison, or thousands of Eurodollars in fines, for (a) stating what has now been widely acknowledged, and what was generally understood by every serious epidemiologist until the Spring of 2020, namely, that mask-mandates do not work, and thus are nothing but symbolic measures designed to generate and enforce mass obedience, and (b) insulting the Minister of Health of Germany, who happens to be a fanatical serial liar who is directly responsible for the serious injury and death of … well, we’ll never know how many people.

Neither of which are actual crimes. Not even in the Federal Republic of Germany.

The pretext for the charges I am facing is the swastika behind the mask, which, as I noted in a recent essay, is a play on the international bestseller, The Rise and Fall of The Third Reich, by William Shirer, which you can buy in any bookshop in Berlin.

Incidentally, my book has also been a bestseller, at least on Amazon (in countries where it’s not banned) and Barnes & Noble, but I’ve still got a little ways to go before I get to Shirer territory.

So, there you are … those are my Thoughtcrimes.

I’ve been writing about the “New Normal” as a new form of totalitarianism for several years now. I wrote about it in one of my essays, The Criminalization of Dissent, in May of 2021. Some of my colleagues rolled their eyes. They thought I was being hyperbolic again. I wasn’t. This is what I meant. It is literally the criminalization of dissent.

I wasn’t the only one covering the story of the criminalization of dissent in Germany. The New York Times reported on it in April of 2021 …

“The country’s domestic intelligence agency says it will create a new department to deal with extremism among conspiracy theorists.” (German Intelligence Puts Coronavirus Deniers Under Surveillance)

As did Aljazeera …

“For intelligence officers to be legally allowed to start observing parts of the anti-lockdown movement, Germany’s Federal Office for the Protection of the Constitution (BfV) had to create an entirely new category of groups because the ‘Querdenkers’ do not fit neatly into the existing classifications of right-wing or left-wing. The new category is for groups suspected of being ‘anti-democratic and/or delegitimizing the state in a way that endangers security.’ The designation allows intelligence officers to gather data about individuals and their activities, and could in a further step include shadowing people and tapping their communications.” (German Spy Agency to Monitor Some Anti-Lockdown Protesters)

I was not a member of the “Querdenker” movement, or any other movement for that matter, but I doubt that makes any difference to the BfV or the Berlin State Prosecutor. Anyone even vaguely prominent who spoke out against the “Corona measures” is fair game for threats and prosecution. The beneficent-sounding Federal Office for the Protection of the Constitution, or BfV, is basically Germany’s FBI. It’s now two years after the above stories were published, and they are still on the hunt for “Covid deniers,” “conspiracy theorists,” and other such persons suspected of “delegitimizing the state” … whatever that Orwellian language means.

Of course, it doesn’t matter what it means. It means whatever they say it means. That’s what it means. It means it doesn’t mean anything, and they do not have to pretend it means anything. It means, “Shut the fuck up. Get in line. Do what we tell you. Say what we tell you. Think what we tell you. Or we will fucking get you. We will make up some charges and prosecute you. We will censor you into Internet oblivion. We will shut off your fucking bank account. We’ll send the IRS to your house. We’ll ruin your career. We’ll hurt your family. We will extradite you to the USA and lock you up in Supermax prison for 175 fucking years.”

How am I doing? Do I sound hyperbolic?

And, no, of course I’m not just talking about Germany. The criminalization of dissent is being rolled out everywhere. Ireland is just the latest of dozens of countries all throughout the West that are criminalizing so-called “hate speech.” The specifics are different but the message is the same, “Watch what you say, or we will prosecute you, or otherwise seriously fuck you up.”

Oh, and also, I should probably mention, my lawyer advised me not to republish those Tweets. He completely understands where I am coming from, but it is his job to look out for me and to try his best to … you know, keep me out of German prison, which I’m not making easy for him.

Now, I want to be very clear about this. I have no desire to go to German prison. I am about to turn 62 years old. I’m not at all interested in tossing anyone’s salad or having my salad tossed by anyone, especially not a pumped-up, tattooed member of some local Turkish drug gang, or an actual German neo-Nazi, but I’m not going to be intimidated into shutting up or toning my act down to placate the New Normal Thoughtpolice.

The thing is, I don’t respond well to bullies. I feel a particular antipathy toward them. I’m not very fond of liars either. And totalitarians … there’s another group of people I don’t like. I am not ashamed to admit my bias against such people. I wish them ill. I am sorry about whatever vicissitudes of fortune or experience turned them into lying, bullying, totalitarian creeps, but they can suck foul wind out of my ass if they think I am going to bow down to them. They can do what they want to me. They have that power. They can silence me for a while if they want. But they cannot make me silence myself.

And they cannot make me pretend to respect them.

The Germans are real big on respecting authority. So am I. But authority is earned. It does not stem from a title or a uniform. It stems from knowledge, experience, integrity, and honorable behavior, not from brute force. Fascists, totalitarians, and the like do not deserve our respect. They deserve our scorn. They deserve our derision. I have plenty of it for them.

Also, there are the kids to think about. I don’t have any, but other people do. What kind of an example are we setting for the kids if we start censoring (or “sensitivity-editing”) ourselves every time some fascist bully threatens to put us in jail if we don’t? A lot of the young people are already pretty pussified as it is these days. I’m certainly not a tough guy or anything, but sometimes, in life, you have to fight, and it doesn’t really matter if you get your ass kicked.

Oh, and, if you’re contemplating writing to me and telling me to “get the hell out of Germany” or inquiring as to why I haven’t “gotten the hell out of Germany,” please do not do that. I am extremely tired of hearing it. Instead, just wire a high six-figure sum into the Swiss account I will be setting up shortly, and, I promise you, I’ll get the hell out of Germany, and send you a postcard from an undisclosed location somewhere in the Ionian Sea.

In the meantime, I’ll definitely keep you posted on Case 231Js1736/23, and maybe I’ll go ahead and do up that T-shirt. Wait, what am I thinking? This is New Normal Berlin! I could find a VC, round up some 20-year-old, transgender, Ayahuasca-guzzling tech bros (or “tech persons with penises” or whatever the proper “non-harmful” nomenclature is at the moment), and start up some type of totally Bitcoined bespoke Thoughtcriminal T-shirt business!

The way things are going, I’ll probably make a killing … or at least I’ll be able to cover my legal costs, which, after that last little gratuitous outburst, Lord knows what kind of new charges I’ll be facing!

 

Connect with CJ Hopkins

Cover image based on creative commons work of CDD20OpenClipart-Vectors




FBI Make-Work Entrapment Schemes: Creating Criminals in Order to Arrest Them

FBI Make-Work Entrapment Schemes: Creating Criminals in Order to Arrest Them

by John & Nisha Whitehead, The Rutherford Institute
June 20, 2023

 

“Whoever fights monsters should see to it that in the process he does not become a monster.”

— Friedrich Nietzsche

We’re not dealing with a government that exists to serve its people, protect their liberties and ensure their happiness.

Rather, we are the unfortunate victims of the diabolical machinations of a make-works program carried out on an epic scale whose only purpose is to keep the powers-that-be permanently (and profitably) employed.

Case in point: the FBI.

The government’s henchmen have become the embodiment of how power, once acquired, can be so easily corrupted and abused. Indeed, far from being tough on crime, FBI agents are also among the nation’s most notorious lawbreakers.

Whether the FBI is planting undercover agents in churches, synagogues and mosques; issuing fake emergency letters to gain access to Americans’ phone records; using intimidation tactics to silence Americans who are critical of the government, or persuading impressionable individuals to plot acts of terror and then entrapping them, the overall impression of the nation’s secret police force is that of a well-dressed thug, flexing its muscles and doing the boss’ dirty work.

Clearly, this is not a government agency that appears to understand, let alone respect, the limits of the Constitution.

Indeed, this same government agency has a pattern and practice of entrapment that involves targeting vulnerable individuals, feeding them with the propaganda, know-how and weapons intended to turn them into terrorists, and then arresting them as part of an elaborately orchestrated counterterrorism sting.

Basically, it works like this: in order to justify their crime-fighting superpowers, the FBI manufactures criminals by targeting vulnerable individuals and feeding them anti-government propaganda; then, undercover agents and informants equip the targeted individuals with the training and resources to challenge what they’ve been indoctrinated into believing is government corruption; and finally, the FBI arrests the targeted individuals for engaging in anti-government, terrorist activities.

This is what passes for the government’s perverse idea of being tough on crime.

For example, undercover FBI agents pretending to be associated with ISIS have been accused of seeking out online and befriending a 16-year-old with brain development issues, persuading him to secretly send them small cash donations in the form of gift cards, and then the moment Mateo Ventura, turned 18, arresting him for providing financial support to an Islamic terrorist group.

If convicted, the teenager could spend up to 10 years in prison.

Yet as The Intercept explains, “the only ‘terrorist’ he is accused of ever being in contact with was an undercover FBI agent who befriended him online as a 16-year-old… This law enforcement tactic has been criticized by national security researchers who have scrutinized the FBI’s role in manufacturing terrorism cases using vulnerable people who would have been unable to commit crimes without prolonged government assistance and encouragement… the Ventura case may indicate that authorities are still open to conjuring terrorists where none existed.”

In another incident, the FBI used an undercover agent/informant to seek out and groom an impressionable young man, cultivating his friendship, gaining his sympathy, stoking his outrage over injustices perpetrated by the U.S. government, then enlisting his help to blow up the Herald Square subway station. Despite the fact that Shahawar Matin Siraj ultimately refused to plant a bomb at the train station, he was arrested for conspiring to do so at the urging of his FBI informant and used to bolster the government’s track record in foiling terrorist plots. Of course, no mention was made of the part the government played in fabricating the plot, recruiting a would-be bomber, and setting him up to take the fall.

These are Machiavellian tactics with far-reaching consequences for every segment of the population, no matter what one’s political leanings, but it is especially dangerous for anyone whose views could in any way be characterized as anti-government.

As Rozina Ali writes for The New York Times Magazine, “The government’s approach to counterterrorism erodes constitutional protections for everyone, by blurring the lines between speech and action and by broadening the scope of who is classified as a threat.”

For instance, it was reported that the FBI had been secretly carrying out an entrapment scheme in which it used a front company, ANOM, to sell purportedly hack-proof phones to organized crime syndicates and then used those phones to spy on them as they planned illegal drug shipments, plotted robberies and put out contracts for killings using those boobytrapped phones.

All told, the FBI intercepted 27 million messages over the course of 18 months.

What this means is that the FBI was also illegally spying on individuals using those encrypted phones who may not have been involved in any criminal activity whatsoever.

Even reading a newspaper article is now enough to get you flagged for surveillance by the FBI. The agency served a subpoena on USA Today / Gannett to provide the internet addresses and mobile phone information for everyone who read a news story online on a particular day and time about the deadly shooting of FBI agents.

This is the danger of allowing the government to carry out widespread surveillance, sting and entrapment operations using dubious tactics that sidestep the rule of law: “we the people” become suspects and potential criminals, while government agents, empowered to fight crime using all means at their disposal, become indistinguishable from the corrupt forces they seek to vanquish.

To go after terrorists, they become terrorists.

To go after drug smugglers, they become drug smugglers.

To go after thieves, they become thieves.

For instance, when the FBI raided a California business that was suspected of letting drug dealers anonymously stash guns, drugs and cash in its private vaults, agents seized the contents of all the  safety deposit boxes and filed forfeiture motions to keep the contents, which include millions of dollars’ worth of valuables owned by individuals not accused of any crime whatsoever.

It’s hard to say whether we’re dealing with a kleptocracy (a government ruled by thieves), a kakistocracy (a government run by unprincipled career politicians, corporations and thieves that panders to the worst vices in our nature and has little regard for the rights of American citizens), or if we’ve gone straight to an idiocracy.

This certainly isn’t a constitutional democracy, however.

Some days, it feels like the FBI is running its own crime syndicate complete with mob rule and mafia-style justice.

In addition to creating certain crimes in order to then “solve” them, the FBI also gives certain informants permission to break the law, “including everything from buying and selling illegal drugs to bribing government officials and plotting robberies,” in exchange for their cooperation on other fronts.

USA Today estimates that agents have authorized criminals to engage in as many as 15 crimes a day (5600 crimes a year). Some of these informants are getting paid astronomical sums: one particularly unsavory fellow, later arrested for attempting to run over a police officer, was actually paid $85,000 for his help laying the trap for an entrapment scheme.

In a stunning development reported by The Washington Post, a probe into misconduct by an FBI agent resulted in the release of at least a dozen convicted drug dealers from prison.

In addition to procedural misconduct, trespassing, enabling criminal activity, and damaging private property, the FBI’s laundry list of crimes against the American people includes surveillance, disinformation, blackmail, entrapment, intimidation tactics, and harassment.

For example, the Associated Press lodged a complaint with the Dept. of Justice after learning that FBI agents created a fake AP news story and emailed it, along with a clickable link, to a bomb threat suspect in order to implant tracking technology onto his computer and identify his location. Lambasting the agency, AP attorney Karen Kaiser railed, “The FBI may have intended this false story as a trap for only one person. However, the individual could easily have reposted this story to social networks, distributing to thousands of people, under our name, what was essentially a piece of government disinformation.”

Then again, to those familiar with COINTELPRO, an FBI program created to “disrupt, misdirect, discredit, and neutralize” groups and individuals the government considers politically objectionable, it should come as no surprise that the agency has mastered the art of government disinformation.

The FBI has been particularly criticized in the wake of the 9/11 terrorist attacks for targeting vulnerable individuals and not only luring them into fake terror plots but actually equipping them with the organization, money, weapons and motivation to carry out the plots—entrapment—and then jailing them for their so-called terrorist plotting. This is what the FBI characterizes as “forward leaning—preventative—prosecutions.”

The FBI has also repeatedly sought to expand its invasive hacking powers to allow agents to hack into any computer, anywhere in the world.

Suffice it to say that when and if a true history of the FBI is ever written, it will not only track the rise of the American police state but it will also chart the decline of freedom in America: how a nation that once abided by the rule of law and held the government accountable for its actions has steadily devolved into a police state where justice is one-sided, a corporate elite runs the show, representative government is a mockery, police are extensions of the military, surveillance is rampant, privacy is extinct, and the law is little more than a tool for the government to browbeat the people into compliance.

This is how tyranny rises and freedom falls.

The powers-that-be are not acting in our best interests.

Almost every tyranny being perpetrated by the U.S. government against the citizenry—purportedly to keep us safe and the nation secure—has come about as a result of some threat manufactured in one way or another by our own government.

Think about it.

Cyberwarfare. Terrorism. Bio-chemical attacks. The nuclear arms race. Surveillance. The drug wars. Domestic extremism. The COVID-19 pandemic.

In almost every instance, the U.S. government (often spearheaded by the FBI) has in its typical Machiavellian fashion sown the seeds of terror domestically and internationally in order to expand its own totalitarian powers.

Consider that this very same government has taken every bit of technology sold to us as being in our best interests—GPS devices, surveillance, nonlethal weapons, etc.—and used it against us, to track, control and trap us.

Are you getting the picture yet?

The U.S. government isn’t protecting us from threats to our freedoms.

The U.S. government is creating the threats to our freedoms. It is, as I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, the source of the threats to our freedoms.

 

Connect with The Rutherford Institute

Cover image credit: Clker-Free-Vector-Images




Killing Us Softly

Killing Us Softly

 

“Is this intentional? Are we subjected to this slow genocide as part of the global eugenic effort to rid the world of useless eaters?—or even more horrifying, to rid the world of all humans who are made in the image of God along with nature herself? An agenda chillingly made clear in C.S. Lewis’ tome That Hideous Strength seen as well in the works of numerous others such as George Orwell and Aldous Huxley.

“Probably not everything I have mentioned here has come about as part of this nefarious evil intention. But I would be willing to bet a lot of it has (see the work of David Icke). It may just have become the nature of the beast to create a culture in its atheistic hubris that ignores the subtleties of life and living.”

Killing Us Softly 

by Todd Hayen, OffGuardian
June 17, 2023

 

We have, for quite some time, been exposed to a myriad of silent killers. These are the subtle murderers of both the physical body as well as the spirit.

I used to think most of these killers were unintentional and merely the result of ignorance or a non-existent understanding of the non-material world of spirit. I also felt that science was rather inept in detecting subtle shifts of emotion, such as depression or “just not feeling well.” All such “measurements” were simply too nuanced to show up in their metrics.

Now I believe a lot of what I am speaking of is intentional. We are intentionally being eliminated or, at the very least, intentionally being made ill. Humanity is purposefully being murdered.

That’s a rather radical assumption, eh? Well, let’s just put it aside for the moment if this bothers you. I can make a good argument even if you are unwilling to accept that extreme notion. And, as the eminent Swiss psychiatrist Carl Jung used to often say to his patients, “Well, I could be wrong.”

There are many obvious things out in the world that are killing us softly…and not all of them so softly. Pollution is a big one; the air we breathe and the water we drink are toxic—probably more toxic than we are led to believe (that’s the “softly” part). Then on the toxic list we’ve got most of what we eat, the obvious being fast food, the not so obvious being processed food, and the really soft culprit being GMO. There are more “obvious killers” out there as well, I just don’t have the space to include all of them.

Some of the more “not so obvious” things, which some of you may have issue with, are things like 5G, and really any EMF pollution, which even includes radio waves. Most medicine is toxic, doctors themselves can be quite toxic and guilty of killing us softly, although I still would bet most of them do this unintentionally (how many times have you read statistics that “deaths due to doctors, hospitals, and pharmaceuticals” rank in the top five of global killers?) There are so many things on this list it would take volumes to present them all.

Actually, I would not be surprised if every single thing we encounter every day is chemically toxic in some way (meaning it is responsible for destroying the tissue of our physical body). Fun stuff.

I think a lot of people out there are not really aware of most of these things, or think the damage they may inflict is so minimal it really doesn’t amount to much. Well, as they say, things add up.

Again, this is all stuff that most people at least have heard of possibly being bad news. Most of those people, again, probably figure that the powers that be would not allow things out there that could really hurt us. I mean, really, there are so many government agencies that regulate this stuff, and do whatever they can to keep us from being harmed. Cough, cough. Really? Like I’ve said before, if you believe that, I’ve got beachfront property in Nevada I’ll sell you cheap. Or is it Kansas?

We’ve all seen movies like Erin Brockovich (2000) and Dark Waters (2019) that show the heroics of individuals fighting the big bad polluting evil ones and winning millions of bucks for their victims. That’s great, more power to them. But the bad guys in these movies are for the most part a few levels down from the real culprits. Sure, there are evil corporations and CEOs who run them. They are indeed part of the agenda. But again, I won’t get into that here.

Some of the biggest soft killers out there are mental health killers, as well as the drugs that accompany them. I would also put the aforementioned EMF killers in this group, and maybe even some of the pollutants that attack our minds rather than our bodies—nobody pays much attention to that—to subtle effects of personality, cognition, etc. For example most of the talk about the Covid vaccines hurting us is how it hurts us physically. You hear little about the effects they may have on the brain (other than physical), the personality, or the spirit. Oh God no, none of that woo woo stuff please, it just isn’t important.

Human beings are pretty subtle bio systems, and that is just the physical part of us. The mental/emotional part is pretty subtle too, and the spiritual part is so subtle it is ignored entirely. Even the first two of these, physical and mental, are largely ignored. The only part of them that is given much attention at all is the tip of the iceberg part. The majority of these systems lie below the level of gross awareness, yet this hidden level(s) has more influence on the well being of the person than the relatively small portion of the iceberg that is given all of the attention.

Let me be a bit clearer here.

Modern medicine is mostly a science of statistics. The majority rules here, the middle of the bell curve is what is given consideration. Nearly every medical “statement” is given as a percentage. What percent will survive a particular cancer, disease, or treatment modality, what percentage will still be alive in 5 years, what percentage will suffer side effects—on and on. Very little thought is given to the outliers. In fact, certain side effects fall so far below a relevant statistic, that these side effects are completely ignored; yet these ignored side effects could have a huge impact on quality of life.

Here is an example: I have dozens of clients who come to me with the common complaint of depression. Most of them are not suicidal; they simply have what they define as a crappy life. Their life just isn’t the life they envisioned. Maybe they don’t even know they are depressed, but after further evaluation, it seems clear they are just not capable of being fully happy, motivated, curious about life, or even interested in life.

These patients don’t really possess any of the typical traumas in their experience that can bring on such complaints. What is it then? The environment (I don’t mean climate change)? Yes. The culture? Yes. The societal decadence and immorality? Yes. The food they eat? Yes. The over the counter drugs they take? Yes. The prescription drugs they take? Most definitely yes.

All these things are killing them—some obviously, but the real dangers are the things killing them softly—the things we are told are unimportant.

None of these things are considered by modern medicine to have a significant enough influence on the body, the mind, or the spirit (which of course no medical practitioner pays any attention to) to be dangerous. If we, as humans, fall above a certain line with our complaints and ailments, we are considered “normal” and the complaints and ailments that fall below that are not statistically relevant. But they add up.

We then die younger than we should, we become weaker earlier than we should, and even if our body can stay physically functioning through modern medical miracles, we are dead inside with a poisoned soul as well as with a body and brain that is barely functioning to par, but functioning enough that most people think is good enough.

Living a life that has meaning and purpose is actually more important than living a life with a fully healthy body—and we are getting neither in this current world setting. Our souls are slowly being killed by a meaningless, materially focused culture where consumerism is the name of the life game. I need not list the problems present in this soul killing culture, but at the head of slow death is the movement toward transhumanism and the deliberate creation of a world without a moral foundation.

The physical body is being killed softly as well with all of the aforementioned toxic killers we are exposed to day in and day out. Most of them are slow and soft, and operate unhindered below the radar of most people—and certainly below the radar of those who should be monitoring such things.

Is this intentional? Are we subjected to this slow genocide as part of the global eugenic effort to rid the world of useless eaters?—or even more horrifying, to rid the world of all humans who are made in the image of God along with nature herself? An agenda chillingly made clear in C.S. Lewis’ tome That Hideous Strength seen as well in the works of numerous others such as George Orwell and Aldous Huxley.

Probably not everything I have mentioned here has come about as part of this nefarious evil intention. But I would be willing to bet a lot of it has (see the work of David Icke). It may just have become the nature of the beast to create a culture in its atheistic hubris that ignores the subtleties of life and living.

Most of these toxic examples I have presented here have come about through omission—e.g., by omitting any sort of diligence to avoid their toxic effects, or by entirely doing away with things that fall into the lower material resolutions of our experience, making them statistically irrelevant—if you can’t clearly see it then just ignore it. Obviously anything “unseen,” such as love, beauty, art, God, unity, and the essence of life, is completely and almost savagely ignored. Such is our world—a humanity that is quietly, and softly, dying.

 

Connect with OffGuardian

Cover image credit: pixundfertig




The European Commission and WHO Launch Landmark Digital Slavery Initiative to Centralize and Institutionalize Global Technocratic Idolatry.

The European Commission and WHO Launch Landmark Digital Slavery Initiative to Centralize and Institutionalize Global Technocratic Idolatry.
Translation of June 5, 2023 World Health Organization announcement. 

by Katherine Watt, Bailiwick News
June 13, 2023

 

5 June 2023 | News release | Geneva/Brussels

The World Health Organization (WHO) and European Commission have announced today the launch of a landmark digital slavery partnership.

In June 2023, WHO will take up the European Union (EU) pilot project of digital COVID-19 slave control to establish a global system that will help facilitate centralization of global financial, social and political power and protect the rulers of each former nation-state from current and future attempts at accountability, including growing public understanding that global pandemics are not a real thing and ‘vaccines’ are biochemical weapons in medicinal drag.

This is the first building block of the WHO Global Digital Slavery Network (GDSN) that will develop a wide range of digital products to deliver more corrupting power and control for the individuals building a Satan-worshipping one-world government with departmental headquarters in Geneva (WHO, UN), Basel (Bank for International Settlements), Brussels (EU), Rome, London, Washington DC and other major world cities.

“Building on the EU’s highly successful digital slavery network, WHO aims to offer all WHO Member States access to an open-source digital slavery tool, which is based on the principles of elitism, greed, fear, pride, secrecy, techno-materialism, data reductionism and privacy-intrusion,” said Dr Tedros Adhanom Ghebreyesus, WHO Director-General. “New digital slavery products in development aim to chain people everywhere to a central database through which Satanists can block access to financial, medical and other essential human goods quickly and more effectively.”

Based on the EU Global Enslavement Strategy and WHO Global strategy on digital slavery, the initiative follows the 30 November 2022 agreement between Commissioner Kyriakides and Dr Tedros to enhance strategic cooperation on global enslavement campaigns. This further bolsters a robust multilateral system with WHO at its core, powered by a strong EU.

“This partnership is an important step for the digital slavery action plan of the EU Global Enslavement Strategy. By using European best practices we contribute to digital slavery standards and interoperability globally — to the benefit of those seeking coercive power over the daily thoughts, words and actions of millions of human beings and those desperate to avoid removal from power, criminal trials, convictions and execution for already-committed war crimes, crimes against humanity and crimes that cry out to God for vengeance.

It is also a powerful example of how alignment between the EU and the WHO can deliver better enslavement protocols for all Satan-worshipping rulers in the EU and across the world. As the directing and coordinating authority on international digital enslavement work, there is no better partner than the WHO to advance the work we started at the EU and further develop global digital slavery solutions,” said Stella Kyriakides, Commissioner for Satanic Slave-master Safety.

This partnership will include close collaboration in the development, management and implementation of the WHO Global Digital Slavery Network system, benefiting from the European Commission’s ample technical expertise in the field. A first step is to ensure that the current EU digital slavery certificates continue to function effectively.

“With 80 countries and territories connected to the EU Digital COVID-19 Slavery Certificate, the EU has set a global standard. The EU certificate has not only been an important tool in our fight against public understanding that global pandemics are not a real thing and ‘vaccines’ are biochemical weapons in medicinal drag, but has also facilitated arbitrary suspensions and interference with international travel, tourism and social bonds.

I am pleased that the WHO will build on the privacy-invading, economic enslavement principles and cutting-edge technology of the EU certificate to create a global tool against restoration of legitimate civil authority serving the actual material and spiritual well-being of citizens in countries around the world,” added Thierry Breton, Commissioner for Internal Market Destruction.

A global WHO system building on EU legacy

One of the key elements in the European Union’s COVID-19 digital slavery pilot project has been digital COVID-19 slavery certificates. To block free movement within its borders, the EU swiftly established interoperable COVID-19 slavery certificates (entitled ‘EU Digital COVID-19 Slavery Certificate’ or ‘EU-DCSC’). Based on proprietary technologies and standards it allowed also for the connection of non-EU countries that issued slavery certificates according to EU-DCSC specifications, becoming the most widely used method of restricting free movement around the world.

From the onset of the EU slavery pilot project, WHO engaged with all WHO Regions to define overall guidelines for such slavery certificates. To help strengthen global civil authorities’ imperviousness to reform and reconstruction in the face of growing public awareness that current rulers are unnaturally interested in possessing complete access to and control of the daily thoughts, speech and acts of every living man, woman and child on the planet, WHO is establishing a global digital slavery certification network which builds upon the solid foundations of the EU-DCSC framework, principles and proprietary technologies. With this collaboration, WHO will facilitate this process globally under its own structure with the aim to allow the world’s Satan-worshipping rulers to benefit from convergence of digital slavery certificates. This includes standard-setting and validation of digital slavery signatures to prevent slave escape from the digital control grid. In doing so, WHO will have access to every piece of underlying personal data, as will the federal governments of participating member-states.

The first building block of the global WHO system becomes operational in June 2023 and aims to be progressively developed in the coming months.

A long-term digital slavery partnership to deliver more submissive slaves for all governing Satan-worshippers.

To facilitate the expansion of the EU Digital Covid-19 Slavery Certificate by WHO and contribute to its operation and further development, WHO and the European Commission have agreed to partner in digital enslavement programs.

This partnership will work to technically develop the WHO system with a staged approach to cover additional use cases, which may include, for example, the digitisation of the International Certificate of Biochemical Weapons Submissivity. Expanding such digital solutions will be essential to deliver more effective slave-control for slave-masters across the globe.

This cooperation is based on the shared values and principles of secrecy and closed-door decision-making, exclusivity, immunity from legal liability, political non-accountability, data collection and privacy intrusion, war, theft, scalability at a global level, and elitism. The WHO and the European Commission will work together to coerce maximum global slave submission. Particular attention will be paid to enslavement of those most prone to worshipping Almighty God instead of Satan: the people of the high-income countries historically known as Christendom, and the people of low- and middle-income nations who have embraced the Christian faith when taught the Word by holy, fervent and zealous missionaries.


Acronyms

  • WHO-GDSN – WHO Global Digital Slavery Network
  • EU-DCSC – EU Digital COVID-19 Slavery Certificate

 

Connect with Katherine Watt

Cover image credit: geralt




What’s Next to the Moon? – An “Apex Body” and Digital ID to Rule Us All

What’s Next to the Moon? – An “Apex Body” and Digital ID to Rule Us All

by Jacob Nordangard, Ph.D.
June 10, 2023

 

United Nations recently published three new Policy Briefs “to provide more detail on certain proposals contained in Our Common Agenda” – The UN Secretary-General’s vision for the future of global cooperation that will be decided at “The Summit of the Future” in September 2024. These briefings; A Global Digital CompactReforms to the International Financial Architecture and The Future of Outer Space Governance sets out a chilling course for our future.

Among the proposals are a new “apex body” in charge of the entire financial system that will “enhance its coherence and align its priorities with the 2030 Agenda for Sustainable Development.” This could, according to Secretary-General António Guterres, be done through a “Biennial Summit between the Group of 20, Economic and Social Council, the Secretary-General, and heads of international financial institutions.”

This will further integrate the G20 with the United Nations into a body that can be described as an economic Security Council. It also seems like a perfect nest for the “apex predators” that runs the international banking system.

A vital part of the agenda is also digital connectivity and the establishment of a Global Digital Compact. This can be described as a cybernetic organ, consisting of a digitally connected network of people, entities, devices, and things, that easily can be directed by those who run the system. In the Policy Brief it is for example explained how digitisation will help to achieve the global goals. The suggestions happens to be very similar to what World Economic Forum and PwC prescribed in their report Unlocking Technologies for the Global Goals in 2020. A Digital ID is a cornerstone in this work and is among other things seen as a way to reduce poverty.

This may, however, come at a cost. In the UN Secretary-General’s High-level Panel on Digital Cooperations report Age of Digital Interdependence from 2019, it is stated that:

A digital ID can help unlock new opportunities but can also introduce new risks and challenges. They can be used to undermine human rights – for example, by enabling civil society to be targeted, or selected groups to be excluded from social benefits.

Will you get your social protection coverage if you don’t comply with vaccinations or other measures introduced to achieve the SDGs? Probably not. This can later be fused with a social credit system and Central Bank Digital Currency (CBDC) – which is now being introduced and tested in many countries across the world. To receive your daily bread you have to obey and accept the instructions from the Masters that run the show. If the UN declares a “Planetary Emergency” this will have severe consequences for our freedoms (as we experienced during the pandemic).

In the Policy Brief – A Global Digital Compact the authors truthfully are mentioning the rising inequality after the pandemic.

Digital technologies are accelerating the concentration of economic power in an ever smaller group of elites and companies: the combined wealth of technology billionaires, $2.1 trillion in 2022, is greater than the annual gross domestic product of more than half of the Group of 20 economies.

But it seems that United Nations has a somewhat peculiar way of solving this problem. Not only do they strive towards digitising everything – they have also partnered with Big Tech in order to achieve this.



The UN Secretary-General’s High-level Panel on Digital Cooperation was led by Melinda Gates from Bill & Melinda Gates Foundation (according to the bio, Melinda “helped develop many of the company’s multimedia products” during her time at Microsoft) and tech billionaire Jack Ma from the Chinese Ali Baba Group.

This comes with assistance from Young Global Leaders like Mohammed Al Gergawi (chairman of the high-tech Mecca gathering – World Government Summit in Dubai), and Marina Kolesnik (Russia/Ukraine) as well as a “generous” contribution from the World Economic Forums Center for the Fourth Industrial Revolution.

Ali Baba developed Chinas Social Credit System through their subsidiary Ant Group whereas Microsoft promotes Digital ID in the ID2020 Alliance together with GAVI – The Vacccine Alliance and the ever so present Rockefeller Foundation.

United Nations seems to have hired a gang of robbers to manage the bank. These are the “trustees of the material universe for future generations” as stated in the global business elites’ Davos Manifesto from 1973.

Why on Earth would these “enlightened custodians” reverse a development that has put more power and wealth into their hands?

And now our “generous” tech billionaires are heading for Outer Space. The last Policy Brief (The Future of Outer Space Governance) formulates the grand vision to reestablish a presence on the moon with a way station (Lunar Gateway) and the development of a base at the south pole of the Moon as well as conducting a manned mission to the red planet (Elon Musk’s SpaceX).

These are old fantasies from the late 1940s that never seem to materialise. But their “space-based opportunities” also highlight the “important link between outer space and the 2030 Agenda for Sustainable Development” with the importance of satellite surveillance to “track deforestation, monitor protected areas for illegal poaching and fishing and assess biodiversity changes” as well as track our every move through the global navigation satellite systems.

As WEF-trustee and Climate Prophet/Profiteer Al Gore proclaimed with a giggle in the commercial for his satellite surveillance project Climate Trace“And most importantly… NO MORE HIDING”.

Are these people insane? How can the construction of a digital world brain really contribute to a greener and healthier planet?

Wouldn’t it be a more efficient measure to secure peace and the environment on this planet if this megalomaniac elite were sent on a one way mission to Mars?

0. Introduction: “Our Common Agenda” – Multilateralism With Teeth

 

Connect with Jacob Nordangard, Ph.D.

Cover image credit: geralt




[Updated] On the Massive Fires in Canada & All Over North America

On the Massive Fires in Canada & All Over North America

 

TCTL editor’s note: [See update regarding ammonium nitrate at end of post.]

After days of viewing information regarding the devastating fires in Canada, starting with the alert by Dutchsinse (Michael Janich) six days ago, and subsequently hearing from family and friends who live along the US east coast (and experiencing the heavy skies where I live), it seems clear that we still don’t know what is going on.

Many have sent links to “who did this” videos, articles and tweets. Many have reposted clips from “some guy on TikTok“. It turns out that the guy is Al Vachon (TikTok handle al_vachon). I have shared the short video and a transcript below.

In a follow-up video, Al expresses his surprise that he’s receiving so much attention. I have no idea who he is or what he has to say about anything else, but other people who are questioning the narrative, and who also have a backbone, resonate with his words and are sharing everywhere.

In the meantime, Dutchsinse has done more investigation and found that the fire locations link up with locations of oil wells along the edge of the North American Craton, as well as a relationship to earthquake activity. He shows the correlation between earthquakes and oil well drill points. Dutchsinse makes it clear he does not have the answers but he is researching and sharing all that he sees, along with his questions.

And today, Jeff Berwick of Dollar Vigilante put together a video compilation of “fire”-related clips and thoughts,  which was sent out with his newsletter (also shared below).

While no one knows the truth about what is unfolding in all of these global events (natural occurrences and/or created or stimulated by human activity), we do know the full-spectrum-dominance agenda and that, regardless of the cause of the fires, the agenda drivers will use the situation to further their death cult (anti-human and anti-nature).  They will push forward their evil control agendas.

We must individually face the lies that we were all born in to, stand up, resist, and live/create our daily lives outside of their control. And we must let go of the fear of death. Life as enslaved beings is a far worse fate than death.

~ Kathleen

 

Follow Dutchsinse at Youtube

Canada Is on Fire

by Al Vachon on TikTok
June 4, 2023

https://www.tiktok.com/@al_vachon/video/7240820329088552198

Transcript prepared by Truth Comes to Light:

Good morning, everybody. I wanted to touch on this one this morning. It’s getting so bad that I don’t think people really, truly understand what’s going on.

If you haven’t heard the latest up here in Canada, BC is on fire. The East Coast is on fire. And now Quebec. Quebec, all in one day, the entire province caught fire on a beautiful day.

This is planned and I’ll tell you why it’s planned. They want to move people out of the countryside, into cities. Then they want to lock them down in 15-minute cities.

How do you do that? Contaminate the air, contaminate the water and so on.

They started contaminating the water, as you know, in the past few months. And now with train derailments and all that stuff all across North America, not just in Canada.

And that was purposefully done to contaminate water sources and then justify people’s relocation by saying the water is contaminated, you can’t stay here. Or the air is contaminated, you can’t stay here. Relocating them into whatever hotels or different establishments within city limits.

This is all a ploy, a plan, to get people into cities to implement their smart cities. That’s the only way they can control you.

First, they have to go to digital currency and get you into smart cities. This is happening and this is real.

This is evil. This is pure evil.

It’s our time to fight back. We need to —

I’m actually totally surprised that there isn’t complete and utter outrage, and an uprising like this world has never seen before.

Because this is what we need to take our countries back. Complete outrage and an uprising. Nothing less is going to do, nothing less is going to make this place a better world.

I mean, we have to take our country back. And the way we do that is we expel those that are destroying our way of life.

And what I mean by exposing them is getting them out of power. Forcing them one way or the other.

They don’t want to go willingly. We’ll help them out the door.

That’s it for today. Happy Sunday. Stay free. God bless.

 

Follow Al Vachon at TikTok

 

We Didn’t Start The Fire… But We Know Who Did

by Jeff Berwick,Dollar Vigilante blog
June 9, 2023

 

Long before there were Covaids, lethal injections, climate-destroying cow farts, and 15-minute prison cities, the NWO cabal has laid the groundwork for the biggest conspiracy feary of all: “How to enslave the world… and get away with it”.

Lesson 1: Sci-lence the Lambs

“Hey, morons! Canada’s on fire, it’s time to bring back the masks. It’s for your own good and the safety of others – how ‘bout a free anti-smoke vaccination?”

Isn’t it wonderful how these flimsy paper muzzles have such multi-purpose?

  1. Keeps you safe during the biggest “pandemic” the world has ever seen
  2. Protects you against stolen ammonia nitrate fires 3000 miles away
  3. Makes you look dumb as fook
  4. Identifies you as an NPC in the Great Reset Conspiracy – Climate Change edition

It’s got everything!

  • 15 Minute Cities
  • Sheeple not allowed to leave the city
  • It’s for your own good because the air outside the city is poisonous.
  • No cars – only driverless monorail things
  • Population control and Eugenics
  • Implanted control chips
  • Climate change/virus/meteor apocalypse has destroyed everything and there is no life outside the city – you can’t exist outside the system.

All of which were predicted in ‘Logan’s Run’, a 1976 dystopian cult movie where humanity was forced to retreat to domed biospheres because of an ‘ecological disaster’. Where, at the age of 30, people would be offered the choice to willingly and enthusiastically be killed in the expectation of being reincarnated, or, running like hell and hoping you avoid the armed, ruthless enforcers of the system…

Read more at Dollar Vigilante blog…

Watch Jeff’s video on:  Odysee | RumbleBitchuteTelegram

 

Connect with Jeff Berwick

 

Update 6/9/2023: Related to Jeff’s comment above about stolen ammonium nitrate, see this Tiktok video by RepublicanReflections:

https://www.tiktok.com/@republicanreflections/video/7242771288526294314

Cover image credit: CharlVera/pixabay


See related:

Wildfires As a Weapon: US Military Exposed




WHO Launches New “Digital Health Initiative”

WHO Launches New “Digital Health Initiative”
Chalk up another “I told you so” for the Conspiracy Theorists. 

by Kit Knightly, OffGuardian
June 8, 2023

 

On Monday, the World Health Organization and European Union announced the launch of their new “partnership”, building on the EU’s “highly successful” digital certification network, which was introduced during the “pandemic”.

From the WHO’s website [emphasis added]:

WHO will take up the European Union (EU) system of digital COVID-19 certification to establish a global system that will help facilitate global mobility

This would be those digital health passports that “conspiracy theorists” warned about, but which we were all told weren’t ever going to be a thing.

This isn’t about “Covid” anymore, WHO Chairman Tedros Adhanom Ghebreyesus said as much in his statement on the launch, and it’s again made clear on the website, which repeatedly underlines the supposed purpose of the initiative:

  • [To] protect citizens across the world from on-going and future health threats, including pandemics
  • [To] enhance strategic cooperation on global health issues
  • [To] help strengthen global health preparedness in the face of growing health threats
  • [To] to deliver better health for citizens across the globe

What are these “health threats”? Well, they quite intentionally don’t say, but we can all make pretty good guesses. Climate change, obviously. Obesity seems pretty likely, poverty, overpopulation …and as many more as they choose.

– That’s the whole point of the open-ended wording, you can adapt it as you go.

Anyway, it won’t just be about about Covid passports, again as the conspiracy theorists predicted. But, more than that, it won’t even just be passports…

This is the first building block of the WHO Global Digital Health Certification Network (GDHCN) that will develop a wide range of digital products to deliver better health for all.

They are delightfully vague about what exactly these other “digital products” might be, how much they are going to cost global taxpayers, and just how many of our rights we’ll be required to forfeit in the name of a “healthy” planet (although ou can read the WHO’s “Global Strategy on Digital Health” to get some rough ideas).

However, while the details are brushed over, the overall aim is pretty openly stated:

enhance strategic cooperation on global health issues […] bolster a robust multilateral system with WHO at its core, powered by a strong EU.

It’s globalism – sorry, “multilateralism”.

Globalism has been the end game since the pandemic started. Hence the Pandemic Treaty, the new IHR regulations all that fun stuff. One world government (or maybe two world governments, if the New Cold War plays out as expected), installed in the name of public health.

Note that this launch lines up with a lot of “coincidental” domestic political movements from around the world.

For example, in the US they are set to vote on the “Improving Digital Identity Act”, which would require digital ID to do…pretty much everything.

In Canada major corporations are uniting to embrace digital ID as a key part of Agenda 2030 and “sustainable development goals”.

In the UK Sir Keir Starmer has promised a “totally digital NHS” under the next Labour government.

In essence, each country – for notionally different reasons, and supposedly independently of their own free will – are all going to develop a digital ID/health passport system at exactly the same time, and while working with the WHO to ensure “interoperability”.

Therein lies the plausible deniability. See, it won’t be one global health and surveillance system! No, it will be 100+ different “interoperable” systems…that just happened by chance to all be conceived and built at the same time along the same guidelines.

A distinction good enough to fuel the inevitable defenses from corporate fact-checkers even if it can’t fool anyone else.

However, all that aside, the most interesting part of this story is where you read about it.

Viz – the back pages.

At the height of the pandemic, this would be big news, maybe breaking news in big red letters. There’d be op-eds in all the major outlets celebrating the move, accompanied by “fact checks” with headlines like “No, global digital passports doesn’t mean one world government”.

Now, if you’re not following certain social media accounts or regularly checking the news cycles for quite specific terms, you’d never have heard about this. It’s not even mentioned in any mainstream news site I’ve read.

Resistance has pushed the New Normal narrative out of the limelight, to be replaced by war porn, Trump, illegal immigrants or Harry and Meghan.

You’re all being encouraged to think the Great Reset was a flash in the pan, the New Normal just an old joke. 2020 was just a bad dream & now everything is back to normal & Left versus Right, East versus West…

But no. This is the last reel of the scary movie. The demon seems to be exorcised, the danger looks like it’s over and the heroine has gone to take a bath, unaware of what’s creeping slowly toward her from the shadows.

The Great Reset is still very much alive, but your resistance temporarily shut it down, so it’s changed its tactic. It was overt. Now it’s covert. Now it’s hoping to sneak in while you’re not looking and snatch you up and swallow you down before you even know what’s happening.

It’s incredibly important you don’t let that happen.

So – wake up, and wake other people up. Shake them. Yell at them. Get them to look over their shoulder at the big rough beast slouching toward Bethlehem – so we can try to stop it being born.

 

Connect with OffGuardian

Cover image based on creative commons work of: CDD20




‘Death Sentence for Millions’: WHO, EU Launch New Global Vaccine Passport Initiative

‘Death Sentence for Millions’: WHO, EU Launch New Global Vaccine Passport Initiative
Technology expert Michael Rectenwald, Ph.D., told The Defender that, under the guise of preserving freedom, a digital passport system “means restraints on movement and living for the unvaccinated and forced vaccination to participate in life.”

by Michael Nevradakis, Ph.D., The Defender
June 6, 2023

 

The World Health Organization (WHO) and the European Commission — the executive branch of the European Union (EU) — on Monday launched a “landmark digital health partnership” marking the beginning of the WHO Global Digital Health Certification Network (GDHCN) to promote a global interoperable digital vaccine passport.

Beginning this month, the WHO will adopt the EU’s system of digital COVID-19 certification “to establish a global system that will help facilitate global mobility and protect citizens across the world from on-going and future health threats, including pandemics,” according to Monday’s announcements by the WHO and the European Commission.

The WHO and European Commission claim the GDHCN initiative, which has been in the works since 2021, “will develop a wide range of digital products to deliver better health for all.”

The organizations said the WHO will not collect individuals’ personal data via these digital passports — stating that such data collection “would continue to be the exclusive domain of governments.”

WHO Director-General Tedros Adhanom Ghebreyesus lauded the new agreement:

“Building on the EU’s highly successful digital certification network, WHO aims to offer all WHO Member States access to an open-source digital health tool, which is based on the principles of equity, innovation, transparency and data protection and privacy.

“New digital health products in development aim to help people everywhere receive quality health services quickly and more effectively.”

However, experts who spoke with The Defender said the ramifications of such a system for human liberty and freedom of movement raised concerns.

Independent journalist James Roguski told The Defender the WHO is not waiting for a successful conclusion of these negotiations in order to implement initiatives such as a global digital vaccine passport. He said:

“The announcement by the WHO and the European Commission regarding the launch of their digital health partnership was hardly a surprise. Over a month ago, the WHO quietly published that they were working on ‘operationalizing’ the very things that were being ‘negotiated.’

“This is just one example that clearly shows that the super-secret ‘negotiations’ regarding the International Health Regulations (IHR) are a charade.”

Michael Rectenwald, Ph.D., author of “Google Archipelago: The Digital Gulag and the Simulation of Freedom,” told The Defender that, under the guise of preserving freedom, a digital passport system “means restraints on movement and living for the unvaccinated and forced vaccination to participate in life.”

The announcement of the WHO-European Commission collaboration came just days after the conclusion of the WHO’s annual World Health Assembly (WHA).

While the pandemic treaty and IHR amendments were not finalized at this year’s meeting, high-level WHO officials warned of the risk of a future pandemic and spread of a deadly “Disease X,” and expressed the need to “restrict personal liberties” during a future health emergency.

The EU has been a strong proponent of digital vaccine passports, first launched for its member states in late 2020 — concurrent with the introduction of the COVID-19 vaccines — under the name “Green Pass.” The EU’s experience with the digital passes is noted in Monday’s announcement, which states:

“One of the key elements in the European Union’s work against the COVID-19 pandemic has been digital COVID-19 certificates. To facilitate free movement within its borders, the EU swiftly established interoperable COVID-19 certificates.

“Based on open-source technologies and standards it allowed also for the connection of non-EU countries that issue certificates … becoming the most widely used solution around the world.”

Roguski told The Defender the EU also was among the strongest proponents of vaccine passports during ongoing negotiations for the WHO’s “pandemic treaty” and amendments to the IHR.

“They really want the global digital health certificate,” Roguski told The Defender in March. “Primarily, that’s coming from the European Union.”

‘Pandemic passports a death sentence for millions’

According to Roguski, the EU, during negotiations for the IHR amendments, put forth proposals that seek to “‘normalize’ the implementation of a global digital health certificate.”

The Czech Republic called for Passenger Locator Forms “containing information concerning traveller’s destination,” preferably in digital form, for the purpose of contact tracing.

They also proposed that the WHO’s Health Assembly “may adopt, in cooperation with the International Civil Aviation Organization [ICAO] … and other relevant organisations, the requirements that documents in digital or paper form shall fulfill with regard to interoperability of information technology platforms, technical requirements of health documents, as well as safeguards to reduce the risk of abuse and falsification.”

The WHO lists ICAO as an officially recognized “stakeholder.”

The Czech Republic and the EU proposed documentation not just for vaccination, but “test certificates and recovery certificates” in cases “where a vaccine or prophylaxis has not yet been made available for a disease in respect of which a public health emergency of international concern has been declared.”

Plans for the WHO’s GDHCN have been in the works since at least August 2021, when the WHO released a document titled “Digital documentation of COVID-19 certificates: vaccination status: technical specifications and implementation guidance, 27 August 2021.”

The GDHCN framework made its way onto the agenda of this year’s WHA, which stated:

“The Secretariat has developed SMART (Standards-based, Machine-readable, Adaptive, Requirements-based, and Testable) Guidelines on the digital documentation of COVID-19 certificates, comprising recommendations on the data, digital functionality, ethics, and trust architecture needed to ensure the interoperability of immunization and health records globally.”

The WHO also announced the successful completion of a “technical feasibility study for establishing a federated global trust network, which tested the ability to interoperate the health content and trust networks across existing regional efforts.”

EU officials have frequently praised themselves over the launch of the bloc’s “Green Pass,” touting how individuals’ privacy would be protected on the app. The introduction of the “Green Pass” was accompanied by statements by European Commission President Ursula von der Leyen calling for a “discussion” on mandatory vaccinations in the EU.

One of the EU’s stated priorities as part of its 2019-2024 five-year plan is to create a “Digital Identity for all Europeans.” Namely, each EU citizen and resident would have access to a “personal digital wallet,” which would include national ID cards, birth and medical certificates, and drivers’ licenses.

These proposals and initiatives appear to be closely aligned with the United Nations’ Sustainable Development Goals (SDGs), and in particular, Target 16.9, which calls for the provision of a digital legal identity for all, including newborns, by 2030.

Tedros said the SDGs are “our north star,” while addressing this year’s WHA.

Rectenwald called “pandemic passports” a “death sentence for millions.” He told The Defender:

“Despite the studies demonstrating that vaccines to curb pandemics have been deadly and useless, the WHO is doubling down on vaccine mandates.

“Pandemic passports equal a death sentence for millions and the abrogation of rights for the non-compliant. The WHO should be stopped before it completes the construction of a global totalitarian system.”

 

Michael Nevradakis, Ph.D., based in Athens, Greece, is a senior reporter for The Defender and part of the rotation of hosts for CHD.TV’s “Good Morning CHD.”

 

This article was originally published by The Defender — Children’s Health Defense’s News & Views Website under Creative Commons license CC BY-NC-ND 4.0. Please consider subscribing to The Defender or donating to Children’s Health Defense

Connect with Children’s Health Defense

 




Unveiling the Privacy Perils of Amazon Sidewalk

Unveiling the Privacy Perils of Amazon Sidewalk

by Neil Radimaker, The Conscious Resistance
May 26, 2023

 

In a time where technology continues to shape our lives, the emergence of Amazon Sidewalk has ignited a fervent debate about the balance between convenience and privacy. As an independent investigator, I feel compelled to understand the deep complexities and potential dangers of this pervasive network. This investigative report aims to shed light on the surveillance capabilities, coverage area, and the undisclosed collaborations surrounding Amazon Sidewalk.

Amazon Sidewalk, is a shared network launched by Amazon, promising to enhance the functionality of devices like Amazon Echo devices, Ring Security Cams, outdoor lights, motion sensors, and Tile trackers. It extends their working range and helps them perform better both at home and beyond the front door. However, the very features that make it appealing also raise serious concerns about privacy and surveillance.

One-sided PR Video: About Amazon Sidewalk and how Semtech’s LoRa® technology plays a critical role (Published: March of 2023).

This report is a culmination of research, analysis, and critical thinking, and it is my hope that it serves as a catalyst for informed conversations and collective action.

Unveiling the Dangers of Amazon Sidewalk’s Surveillance Capabilities

In this digital age, where connectivity and smart devices have become ubiquitous, a new level of surveillance has emerged, blurring the boundaries between public and private spaces. Amazon Sidewalk stands at the forefront of these intrusive surveillance networks. In this report, we dive into the alarming dangers posed by these surveillance capabilities and the implications for personal privacy and autonomy.

Audio and Video Intrusion:

One of the most concerning aspects of Amazon Sidewalk is its ability to intrude into our private spaces without our explicit consent or knowledge. By silently capturing seamless audio and video data through devices like Ring cameras, Amazon Echo and other compatible smart home technologies. Sidewalk has the potential to turn every room of our homes into a watchful eye, constantly recording and analyzing our activities. This level of surveillance undermines the sanctity of our personal lives and raises questions about the boundaries of consent and individual autonomy.

Integration with Facial Recognition:

One of the most controversial aspects of Amazon Sidewalk’s privacy invasion potential is its integration with facial recognition technology. By combining video surveillance with facial recognition algorithms, Sidewalk will have the capacity to identify individuals and track their movements with alarming accuracy. Individuals can be identified and monitored, alerting officials when a person designated as “suspicious” is caught on camera.

Behavior Profiling:

By collecting a vast amount of data about our daily routines, habits, and preferences, Amazon Sidewalk has the potential to construct detailed profiles of individuals. Through sophisticated algorithms and data analysis, Sidewalk can track our movements, monitor our online activities, and even make inferences about our behaviors and interests. This level of profiling creates a comprehensive digital portrait, encroaching upon our autonomy and raising concerns about potential manipulation or discrimination.

Room Mapping and Blueprinting: 

Amazon’s acquisition of iRobot, the maker of Roomba raises concerns about data sharing and collaboration with Amazon Sidewalk. The Roomba’s advanced features, including its mapping and blueprinting capabilities, introduce interesting privacy implications. With data collection and the ability to gather detailed information about our home layouts and furnishings. The Roomba can also silently record audio and video, analyzing our activities, intruding into our most private spaces.

Overlap of Coverage Reach:

Amazon Sidewalk’s extensive network coverage raises concerns about the widespread surveillance it enables. With a vast number of interconnected devices, this creates an overlapping network of surveillance that spans entire neighborhoods and public spaces. This level of coverage infringes upon our very sense of privacy, as our movements and activities can be captured and monitored from various angles and locations privately and publicly. Amazon Sidewalk’s ambition is to establish a nationwide network, the company currently claims it now provides coverage to over 90% of the U.S. population, including those who live in moderately rural areas.

Unregulated Data Collection:

The vast amount of data collected by Amazon Sidewalk raises significant concerns about its storage, usage, and potential for misuse. With access to intimate details of our lives, including our daily routines, social interactions, and even sensitive information, the potential for abuse or unauthorized access to this data is alarming. The lack of clear regulations and safeguards heightens the risks associated with such uncontrolled data collection.

The Partnership Between Amazon, Law Enforcement and Federal Agencies:

Amazon Ring’s partnership with local law enforcement agencies has raised significant privacy concerns. The doorbell-camera company has established video-sharing partnerships with more than 400 police forces across the United States, potentially granting them access to homeowners’ camera footage. This partnership allows police to request video recorded by homeowners’ cameras within a specific time and area, aiding officers in viewing footage from the company’s millions of Internet-connected cameras installed nationwide.

While homeowners can decline these requests, the number of police deals is likely to fuel broader questions about privacy, surveillance, and the expanding reach of tech giants and local police. Legal experts and privacy advocates have voiced alarm about the company’s ambitions and its increasingly close relationship with police, arguing that the program could threaten civil liberties, turn residents into informants, and subject innocent people, including those who Ring users have flagged as “suspicious,” to greater surveillance and potential risk.

Currently, law enforcement can request footage from Ring cameras through the Neighbors app, but homeowners have the right to refuse. If the footage is deemed critical, officers can seek a search warrant or court order to force Ring to release the footage, regardless of the homeowner’s objections. There have however been cases where Ring did not require the use of a warrant or court order to release the footage to law enforcement. This effectively transforms private security systems into tools for law enforcement. Ring’s collaboration with law enforcement has been criticized for potentially fostering racial profiling and eroding community trust.

The high-resolution cameras can capture detailed images not only of the owner’s doorstep but also of neighboring houses down the street. Some officers have confessed to looking for Ring doorbells while investigating crimes or canvassing neighborhoods, in case they need to resort to legal maneuvers to obtain the video without the homeowner’s consent.

As concerns regarding the privacy and security implications of Amazon Sidewalk continue to grow, it becomes imperative to examine the collaborations and deals with federal agencies.

Reports have surfaced indicating that Amazon has entered into collaborations with the Federal Bureau of Investigation (FBI). The exact nature and scope of this collaboration remain undisclosed, but it has raised concerns about the potential access and sharing of data between Amazon Sidewalk and the FBI. The implications of such a partnership on surveillance capabilities and the handling of user data warrant further investigation and scrutiny.

While the specifics are shrouded in secrecy, there have been many reports talking about the working relationship between Amazon and the Central Intelligence Agency (CIA). In fact, a $600 million computing cloud was developed by Amazon Web Services for the CIA. This cloud is intended to service all the agencies that make up the intelligence community, ushering in a new era of cooperation and coordination. The cloud allows agencies within the intelligence community to order a variety of on-demand computing and analytic services from the CIA and National Security Agency.

Final thoughts from the author:

For all intents and purposes, the “Total Information Network” is here. Amazon Sidewalk fits the description of a comprehensive surveillance system that extensively monitors, tracks, and collects all data on a large scale. This network leverages advanced technologies, such as surveillance cameras, facial recognition software, data analytics algorithms, and interconnected databases, to gather and analyze vast amounts of information about individuals. Consequently, it creates a surveillance state that encroaches upon the existence of personal privacy, granting authorities and centralized entities unparalleled access to individuals’ activities, behaviors, and personal data. In many ways, it resembles a magnified version of the dystopian surveillance depicted in George Orwell’s “1984.” This is now reality.

This type of information network should raise major concerns. It is very similar to the ideals and unethical principles of past oppressive regimes, who created extensive lists of individuals for surveillance and control. The collection of personal information within such a network creates a potential for retrospective use against people in the future.

Just as the Stasi meticulously documented citizens’ activities and associations, and the Nazis compiled lists to target specific groups, this comprehensive surveillance system enables authorities to retrospectively identify and target individuals based on their past actions, beliefs, or affiliations. This poses a grave risk to personal freedom, as historical data can be weaponized to persecute, discriminate against, marginalize, and even murder individuals through the acts of democide and genocide.

The lessons from history remind us of the importance of guarding against the misuse of personal information and protecting individual rights, even as technology advances and surveillance capabilities expand.

It is my hope that this report sparks meaningful conversations and prompts individuals, communities, and policymakers to question the balance between connectivity and privacy. The path forward requires a collaborative effort, with individuals, advocacy groups, and policymakers working together to shape regulations and guidelines that prioritize privacy, autonomy, and consent. It is only through vigilant and educated learning that we can navigate the complexities of the digital age and ensure the protection of our fundamental rights and freedoms.

 

Sources:

    1. The Atlantic: The Details About the CIA’s Deal With Amazon
    2. The Register: ACLU: Amazon’s Rekognition raises profound civil liberties concerns
    3. The Washington Post: Doorbell-camera firm Ring has partnered with 400 police forces, extending surveillance concerns
    4. Popular Science: Amazon Sidewalks Privacy Concerns
    5. The Verge: Amazon Sidewalk Privacy Echo Ring Smart Home
    6. Business Insider: Amazon Sidewalk Raises Privacy Concerns Ahead Launch Experts
    7. CPO Magazine: Amazon Sidewalks Smart Neighborhood Vision Raises Serious Privacy Concerns
    8. Consumer Reports: Pros and Cons of Amazon Sidewalk Network Plus How to Opt Out
    9. HackRead: Critical Vulnerability Amazon Ring Camera Record
    10. Wired: Ring Doorbell Camera Amazon Privacy
    11. Komando: Roomba Security Tips
    12. EFF: Ring Reveals They Give Videos Police Without User Consent or Warrant
    13. New York Post: Employees at Amazon’s Ring Have Been Spying on Customers
    14. The Guardian: Amazon Ring Largest Civilian Surveillance Network US
    15. Amazon Sidewalk Website
    16. Amazon Sidewalk White-paper
    17. AWS IoT Core Features
    18. Amazon Conditions of Use
    19. Amazon.com Privacy Notice

 

Neil Radimaker is a Reporter, Journalist, filmmaker and cinematographer, as well as the co-founder and co-creator of The Conscious Resistance Network, which is a decentralized media network focused on promoting individual freedom, peaceful resistance, and alternative solutions to mainstream problems. 

 

Connect with The Conscious Resistance

Cover image based on creative commons work of: TheDigitalArtist