The Military Origins of Facebook

Facebook’s growing role in the ever-expanding surveillance and “pre-crime” apparatus of the national security state demands new scrutiny of the company’s origins and its products as they relate to a former, controversial DARPA-run surveillance program that was essentially analogous to what is currently the world’s largest social network.

Mark Zuckerberg walks among attendees at a VR conference in Barcelona, Spain in 2016

In mid-February, Daniel Baker, a US veteran described by the media as “anti-Trump, anti-government, anti-white supremacists, and anti-police,” was charged by a Florida grand jury with two counts of “transmitting a communication in interstate commerce containing a threat to kidnap or injure.”

The communication in question had been posted by Baker on Facebook, where he had created an event page to organize an armed counter-rally to one planned by Donald Trump supporters at the Florida capital of Tallahassee on January 6. “If you are afraid to die fighting the enemy, then stay in bed and live. Call all of your friends and Rise Up!,” Baker had written on his Facebook event page.

Baker’s case is notable as it is one of the first “precrime” arrests based entirely on social media posts—the logical conclusion of the Trump administration’s, and now Biden administration’s, push to normalize arresting individuals for online posts to prevent violent acts before they can happen. From the increasing sophistication of US intelligence/military contractor Palantir’s predictive policing programs to the formal announcement of the Justice Department’s Disruption and Early Engagement Program in 2019 to Biden’s first budget, which contains $111 million for pursuing and managing “increasing domestic terrorism caseloads,” the steady advance toward a precrime-centered “war on domestic terror” has been notable under every post-9/11 presidential administration.

This new so-called war on domestic terror has actually resulted in many of these types of posts on Facebook. And, while Facebook has long sought to portray itself as a “town square” that allows people from across the world to connect, a deeper look into its apparently military origins and continual military connections reveals that the world’s largest social network was always intended to act as a surveillance tool to identify and target domestic dissent.

Part 1 of this two-part series on Facebook and the US national-security state explores the social media network’s origins and the timing and nature of its rise as it relates to a controversial military program that was shut down the same day that Facebook launched. The program, known as LifeLog, was one of several controversial post-9/11 surveillance programs pursued by the Pentagon’s Defense Advanced Research Projects Agency (DARPA) that threatened to destroy privacy and civil liberties in the United States while also seeking to harvest data for producing “humanized” artificial intelligence (AI). 

As this report will show, Facebook is not the only Silicon Valley giant whose origins coincide closely with this same series of DARPA initiatives and whose current activities are providing both the engine and the fuel for a hi-tech war on domestic dissent.

DARPA’s Data Mining for “National Security” and to “Humanize” AI

In the aftermath of the September 11 attacks, DARPA, in close collaboration with the US intelligence community (specifically the CIA), began developing a “precrime” approach to combatting terrorism known as Total Information Awareness or TIA. The purpose of TIA was to develop an “all-seeing” military-surveillance apparatus. The official logic behind TIA was that invasive surveillance of the entire US population was necessary to prevent terrorist attacks, bio-terrorism events, and even naturally occurring disease outbreaks. 

The architect of TIA, and the man who led it during its relatively brief existence, was John Poindexter, best known for being Ronald Reagan’s National Security Advisor during the Iran-Contra affair and for being convicted of five felonies in relation to that scandal. A less well-known activity of Iran-Contra figures like Poindexter and Oliver North was their development of the Main Core database to be used in “continuity of government” protocols. Main Core was used to compile a list of US dissidents and “potential troublemakers” to be dealt with if the COG protocols were ever invoked. These protocols could be invoked for a variety of reasons, including widespread public opposition to a US military intervention abroad, widespread internal dissent, or a vaguely defined moment of “national crisis” or “time of panic.” Americans were not informed if their name was placed on the list, and a person could be added to the list for merely having attended a protest in the past, for failing to pay taxes, or for other, “often trivial,” behaviors deemed “unfriendly” by its architects in the Reagan administration. 

In light of this, it was no exaggeration when New York Times columnist William Safire remarked that, with TIA, “Poindexter is now realizing his twenty-year dream: getting the ‘data-mining’ power to snoop on every public and private act of every American.”

The TIA program met with considerable citizen outrage after it was revealed to the public in early 2003. TIA’s critics included the American Civil Liberties Union, which claimed that the surveillance effort would “kill privacy in America” because “every aspect of our lives would be catalogued,” while several mainstream media outlets warned that TIA was “fighting terror by terrifying US citizens.” As a result of the pressure, DARPA changed the program’s name to Terrorist Information Awareness to make it sound less like a national-security panopticon and more like a program aiming specifically at terrorists in the post-9/11 era. 

The logo for DARPA’s Information Awareness Office, which oversaw Total Information Awareness during its brief existence

The TIA projects were not actually closed down, however, with most moved to the classified portfolios of the Pentagon and US intelligence community. Some became intelligence funded and guided private-sector endeavors, such as Peter Thiel’s Palantir, while others resurfaced years later under the guise of combatting the COVID-19 crisis. 

Soon after TIA was initiated, a similar DARPA program was taking shape under the direction of a close friend of Poindexter’s, DARPA program manager Douglas Gage. Gage’s project, LifeLog, sought to “build a database tracking a person’s entire existence” that included an individual’s relationships and communications (phone calls, mail, etc.), their media-consumption habits, their purchases, and much more in order to build a digital record of “everything an individual says, sees, or does.” LifeLog would then take this unstructured data and organize it into “discreet episodes” or snapshots while also “mapping out relationships, memories, events and experiences.”

LifeLog, per Gage and supporters of the program, would create a permanent and searchable electronic diary of a person’s entire life, which DARPA argued could be used to create next-generation “digital assistants” and offer users a “near-perfect digital memory.” Gage insisted, even after the program was shut down, that individuals would have had “complete control of their own data-collection efforts” as they could “decide when to turn the sensors on or off and decide who will share the data.” In the years since then, analogous promises of user control have been made by the tech giants of Silicon Valley, only to be broken repeatedly for profit and to feed the government’s domestic-surveillance apparatus.

The information that LifeLog gleaned from an individual’s every interaction with technology would be combined with information obtained from a GPS transmitter that tracked and documented the person’s location, audio-visual sensors that recorded what the person saw and said, as well as biomedical monitors that gauged the person’s health. Like TIA, LifeLog was promoted by DARPA as potentially supporting “medical research and the early detection of an emerging epidemic.”

Critics in mainstream media outlets and elsewhere were quick to point out that the program would inevitably be used to build profiles on dissidents as well as suspected terrorists. Combined with TIA’s surveillance of individuals at multiple levels, LifeLog went farther by “adding physical information (like how we feel) and media data (like what we read) to this transactional data.” One critic, Lee Tien of the Electronic Frontier Foundation, warned at the time that the programs that DARPA was pursuing, including LifeLog, “have obvious, easy paths to Homeland Security deployments.” 

At the time, DARPA publicly insisted that LifeLog and TIA were not connected, despite their obvious parallels, and that LifeLog would not be used for “clandestine surveillance.” However, DARPA’s own documentation on LifeLog noted that the project “will be able . . . to infer the user’s routines, habits and relationships with other people, organizations, places and objects, and to exploit these patterns to ease its task,” which acknowledged its potential use as a tool of mass surveillance.

In addition to the ability to profile potential enemies of the state, LifeLog had another goal that was arguably more important to the national-security state and its academic partners—the “humanization” and advancement of artificial intelligence. In late 2002, just months prior to announcing the existence of LifeLog, DARPA released a strategy document detailing development of artificial intelligence by feeding it with massive floods of data from various sources. 

The post-9/11 military-surveillance projects—LifeLog and TIA being only two of them—offered quantities of data that had previously been unthinkable to obtain and that could potentially hold the key to achieving the hypothesized “technological singularity.” The 2002 DARPA document even discusses DARPA’s effort to create a brain-machine interface that would feed human thoughts directly into machines to advance AI by keeping it constantly awash in freshly mined data. 

One of the projects outlined by DARPA, the Cognitive Computing Initiative, sought to develop sophisticated artificial intelligence through the creation of an “enduring personalized cognitive assistant,” later termed the Perceptive Assistant that Learns, or PAL. PAL, from the very beginning was tied to LifeLog, which was originally intended to result in granting an AI “assistant” human-like decision-making and comprehension abilities by spinning masses of unstructured data into narrative format. 

The would-be main researchers for the LifeLog project also reflect the program’s end goal of creating humanized AI. For instance, Howard Shrobe at the MIT Artificial Intelligence Laboratory and his team at the time were set to be intimately involved in LifeLog. Shrobe had previously worked for DARPA on the “evolutionary design of complex software” before becoming associate director of the AI Lab at MIT and has devoted his lengthy career to building “cognitive-style AI.” In the years after LifeLog was cancelled, he again worked for DARPA as well as on intelligence community–related AI research projects. In addition, the AI Lab at MIT was intimately connected with the 1980s corporation and DARPA contractor called Thinking Machines, which was founded by and/or employed many of the lab’s luminaries—including Danny Hillis, Marvin Minsky, and Eric Lander—and sought to build AI supercomputers capable of human-like thought. All three of these individuals were later revealed to be close associates of and/or sponsored by the intelligence-linked pedophile Jeffrey Epstein, who also generously donated to MIT as an institution and was a leading funder of and advocate for transhumanist-related scientific research.

Soon after the LifeLog program was shuttered, critics worried that, like TIA, it would continue under a different name. For example, Lee Tien of the Electronic Frontier Foundation told VICE at the time of LifeLog’s cancellation, “It would not surprise me to learn that the government continued to fund research that pushed this area forward without calling it LifeLog.”

Along with its critics, one of the would-be researchers working on LifeLog, MIT’s David Karger, was also certain that the DARPA project would continue in a repackaged form. He told Wired that “I am sure such research will continue to be funded under some other title . . . I can’t imagine DARPA ‘dropping out’ of a such a key research area.” 

The answer to these speculations appears to lie with the company that launched the exact same day that LifeLog was shuttered by the Pentagon: Facebook.

Thiel Information Awareness

After considerable controversy and criticism, in late 2003, TIA was shut down and defunded by Congress, just months after it was launched. It was only later revealed that that TIA was never actually shut down, with its various programs having been covertly divided up among the web of military and intelligence agencies that make up the US national-security state. Some of it was privatized.

The same month that TIA was pressured to change its name after growing backlash, Peter Thiel incorporated Palantir, which was, incidentally, developing the core panopticon software that TIA had hoped to wield. Soon after Palantir’s incorporation in 2003, Richard Perle, a notorious neoconservative from the Reagan and Bush administrations and an architect of the Iraq War, called TIA’s Poindexter and said he wanted to introduce him to Thiel and his associate Alex Karp, now Palantir’s CEO. According to a report in New York magazine, Poindexter “was precisely the person” whom Thiel and Karp wanted to meet, mainly because “their new company was similar in ambition to what Poindexter had tried to create at the Pentagon,” that is, TIA. During that meeting, Thiel and Karp sought “to pick the brain of the man now widely viewed as the godfather of modern surveillance.”

Peter Thiel speaks at the World Economic Forum in 2013, Source: Mirko Ries Courtesy for the World Economic Forum

Soon after Palantir’s incorporation, though the exact timing and details of the investment remain hidden from the public, the CIA’s In-Q-Tel became the company’s first backer, aside from Thiel himself, giving it an estimated $2 million. In-Q-Tel’s stake in Palantir would not be publicly reported until mid-2006

The money was certainly useful. In addition, Alex Karp told the New York Times in October 2020, “the real value of the In-Q-Tel investment was that it gave Palantir access to the CIA analysts who were its intended clients.” A key figure in the making of In-Q-Tel investments during this period, including the investment in Palantir, was the CIA’s chief information officer, Alan Wade, who had been the intelligence community’s point man for Total Information Awareness. Wade had previously cofounded the post-9/11 Homeland Security software contractor Chiliad alongside Christine Maxwell, sister of Ghislaine Maxwell and daughter of Iran-Contra figure, intelligence operative, and media baron Robert Maxwell. 

After the In-Q-Tel investment, the CIA would be Palantir’s only client until 2008. During that period, Palantir’s two top engineers—Aki Jain and Stephen Cohen—traveled to CIA headquarters at Langley, Virginia, every two weeks. Jain recalls making at least two hundred trips to CIA headquarters between 2005 and 2009. During those regular visits, CIA analysts “would test [Palantir’s software] out and offer feedback, and then Cohen and Jain would fly back to California to tweak it.” As with In-Q-Tel’s decision to invest in Palantir, the CIA’s chief information officer during this time remained one of TIA’s architects. Alan Wade played a key role in many of these meetings and subsequently in the “tweaking” of Palantir’s products.

Today, Palantir’s products are used for mass surveillance, predictive policing, and other disconcerting policies of the US national-security state. A telling example is Palantir’s sizable involvement in the new Health and Human Services–run wastewater surveillance program that is quietly spreading across the United States. As noted in a previous Unlimited Hangout report, that system is the resurrection of a TIA program called Biosurveillance. It is feeding all its data into the Palantir-managed and secretive HHS Protect data platform. The decision to turn controversial DARPA-led programs into a private ventures, however, was not limited to Thiel’s Palantir.

darpa shut down same day facebook launch date

The Rise of Facebook

The shuttering of TIA at DARPA had an impact on several related programs, which were also dismantled in the wake of public outrage over DARPA’s post-9/11 programs. One of these programs was LifeLog. As news of the program spread through the media, many of the same vocal critics who had attacked TIA went after LifeLog with similar zeal, with Steven Aftergood of the Federation of American Scientists telling Wired at the time that “LifeLog has the potential to become something like ‘TIA cubed.’” LifeLog being viewed as something that would prove even worse than the recently cancelled TIA had a clear effect on DARPA, which had just seen both TIA and another related program cancelled after considerable backlash from the public and the press. 

The firestorm of criticism of LifeLog took its program manager, Doug Gage, by surprise, and Gage has continued to assert that the program’s critics “completely mischaracterized” the goals and ambitions of the project. Despite Gage’s protests and those of LifeLog’s would-be researchers and other supporters, the project was publicly nixed on February 4, 2004. DARPA never provided an explanation for its quiet move to shutter LifeLog, with a spokesperson stating only that it was related to “a change in priorities” for the agency. On DARPA director Tony Tether’s decision to kill LifeLog, Gage later told VICE, “I think he had been burnt so badly with TIA that he didn’t want to deal with any further controversy with LifeLog. The death of LifeLog was collateral damage tied to the death of TIA.”

Fortuitously for those supporting the goals and ambitions of LifeLog, a company that turned out to be its private-sector analogue was born on the same day that LifeLog’s cancellation was announced. On February 4, 2004, what is now the world’s largest social network, Facebook, launched its website and quickly rose to the top of the social media roost, leaving other social media companies of the era in the dust. 

Sean Parker of Founders Fund speaks during the LeWeb conference in 2011, Source: @Kmeron for LeWeb11 @ Les Docks de Paris

A few months into Facebook’s launch, in June 2004, Facebook cofounders Mark Zuckerberg and Dustin Moskovitz brought Sean Parker onto Facebook’s executive team. Parker, previously known for cofounding Napster, later connected Facebook with its first outside investor, Peter Thiel. As discussed, Thiel, at that time, in coordination with the CIA, was actively trying to resurrect controversial DARPA programs that had been dismantled the previous year. Notably, Sean Parker, who became Facebook’s first president, also had a history with the CIA, which recruited him at the age of sixteen soon after he had been busted by the FBI for hacking corporate and military databases. Thanks to Parker, in September 2004, Thiel formally acquired $500,000 worth of Facebook shares and was added its board. Parker maintained close ties to Facebook as well as to Thiel, with Parker being hired as a managing partner of Thiel’s Founders Fund in 2006.

Thiel and Facebook cofounder Mosokvitz became involved outside of the social network long after Facebook’s rise to prominence, with Thiel’s Founder Fund becoming a significant investor in Moskovitz’s company Asana in 2012. Thiel’s longstanding symbiotic relationship with Facebook cofounders extends to his company Palantir, as the data that Facebook users make public invariably winds up in Palantir’s databases and helps drive the surveillance engine Palantir runs for a handful of US police departments, the military, and the intelligence community. In the case of the Facebook–Cambridge Analytica data scandal, Palantir was also involved in utilizing Facebook data to benefit the 2016 Donald Trump presidential campaign. 

Today, as recent arrests such as that of Daniel Baker have indicated, Facebook data is slated to help power the coming “war on domestic terror,” given that information shared on the platform is being used in “precrime” capture of US citizens, domestically. In light of this, it is worth dwelling on the point that Thiel’s exertions to resurrect the main aspects of TIA as his own private company coincided with his becoming the first outside investor in what was essentially the analogue of another DARPA program deeply intertwined with TIA. 

Facebook, a Front

Because of the coincidence that Facebook launched the same day that LifeLog was shut down, there has been recent speculation that Zuckerberg began and launched the project with Moskovitz, Saverin, and others through some sort of behind-the-scenes coordination with DARPA or another organ of the national-security state. While there is no direct evidence for this precise claim, the early involvement of Parker and Thiel in the project, particularly given the timing of Thiel’s other activities, reveals that the national-security state was involved in Facebook’s rise. It is debatable whether Facebook was intended from its inception to be a LifeLog analogue or if it happened to be the social media project that fit the bill after its launch. The latter seems more likely, especially considering that Thiel also invested in another early social media platform, Friendster

An important point linking Facebook and LifeLog is the subsequent identification of Facebook with LifeLog by the latter’s DARPA architect himself. In 2015, Gage told VICE that “Facebook is the real face of pseudo-LifeLog at this point.” He tellingly added, “We have ended up providing the same kind of detailed personal information to advertisers and data brokers and without arousing the kind of opposition that LifeLog provoked.” 

Users of Facebook and other large social media platforms have so far been content to allow these platforms to sell their private data so long as they publicly operate as private enterprises. Backlash only really emerged when such activities were publicly tied to the US government, and especially the US military, even though Facebook and other tech giants routinely share their users’ data with the national-security state. In practice, there is little difference between the public and private entities.

Edward Snowden, the NSA whistleblower, notably warned in 2019 that Facebook is just as untrustworthy as US intelligence, stating that “Facebook’s internal purpose, whether they state it publicly or not, is to compile perfect records of private lives to the maximum extent of their capability, and then exploit that for their own corporate enrichment. And damn the consequences.”

Snowden also stated in the same interview that “the more Google knows about you, the more Facebook knows about you, the more they are able . . . to create permanent records of private lives, the more influence and power they have over us.” This underscores how both Facebook and intelligence-linked Google have accomplished much of what LifeLog had aimed to do, but on a much larger scale than what DARPA had originally envisioned.

The reality is that most of the large Silicon Valley companies of today have been closely linked to the US national-security state establishment since their inception. Notable examples aside from Facebook and Palantir include Google and Oracle. Today these companies are more openly collaborating with the military-intelligence agencies that guided their development and/or provided early funding, as they are used to provide the data needed to fuel the newly announced war on domestic terror and its accompanying algorithms. 

It is hardly a coincidence that someone like Peter Thiel, who built Palantir with the CIA and helped ensure Facebook’s rise, is also heavily involved in Big Data AI-driven “predictive policing” approaches to surveillance and law enforcement, both through Palantir and through his other investments. TIA, LifeLog, and related government and private programs and institutions launched after 9/11, were always intended to be used against the American public in a war against dissent. This was noted by their critics in 2003-4 and by those who have examined the origins of the “homeland security” pivot in the US and its connection to past CIA “counterterror” programs in Vietnam and Latin America. 

Ultimately, the illusion of Facebook and related companies as being independent of the US national-security state has prevented a recognition of the reality of social media platforms and their long-intended, yet covert uses, which we are beginning to see move into the open following the events of January 6. Now, with billions of people conditioned to use Facebook and social media as part of their daily lives, the question becomes: If that illusion were to be irrevocably shattered today, would it make a difference to Facebook’s users? Or has the populace become so conditioned to surrendering their private data in exchange for dopamine-fueled social-validation loops that it no longer matters who ends up holding that data?


Conspiracies Are Real: How All Conspiracies Work

Expert: The best way to fight a conspiracy theory isn't with facts | Tulane  News

Conspiracies have been around since the world began. How else are wars, murders, thefts, and other types of crimes initiated except that people conspired to commit them?

One dictionary definition of a conspiracy is, “an evil, unlawful, treacherous, or surreptitious plan formulated in secret by two or more persons; plot.”

Another definition reads, “an agreement by two or more persons to commit a crime, fraud, or other wrongful act.”

Some synonyms for conspiracy include plot, scheme, treason, connivance, and treachery.

Based on these definitions, it shouldn’t take much convincing to realize that conspiracies are taking place every day, in every part of the globe, by people of all walks of life. However, one of the greatest tools in the arsenal of those involved in a conspiracy is convincing people that it doesn’t exist (think Keyser Söze in the film The Usual Suspects).

The purpose of this article is to illustrate how major, even global conspiracies can exist without most people knowing. It will provide the ingredients typically included in every conspiratorial recipe to help people recognize them more easily both before and as they occur in real time.

Before Conspiracies Occur

Here are the steps involved in the initial phases of a conspiracy:

Benefit/Motive

Every conspiracy begins with a motive and something to be gained by the conspirators. The Latin phrase “cui bono,” meaning “who benefits,” should always be asked when investigating a conspiracy. Power and money are usually the main reasons, with revenge or spite also closely linked.

Goals/Outcome

Everyone involved in a conspiracy must agree to a set of goals and desired outcomes. Where unity is fragile, conspiracies rarely succeed. But when there is agreement amongst the schemers, and all are satisfied with the proposed outcome, the devious plots have a great chance to flourish.

Planning

All conspiracies, no matter how small or large, involve planning to achieve the stated goals. On a national or global level, these plans are often documented well ahead of time. Sometimes they remain hidden and other times they are available for public viewing. The reason the exposed plans go unnoticed is because most people don’t bother to read them, don’t comprehend what’s being stated, or dismiss them because they can’t believe people would do such things.

Secretive

Conspirators must be careful not to disclose their plans in order to have any chance of succeeding. Meetings are often held at clandestine locations, and participants may be encouraged or required to take oaths and be sworn to secrecy. Oftentimes those leading the conspiracy do not divulge the entirety of their plot to everyone involved. People furthest from the inner circle frequently carry out orders without being fully aware of all the details. They may be outright deceived about the true intent of the plot and march on as foot soldiers believing they are doing something good for humanity.

Data Gathering

An important step in any conspiracy involves gathering data on those being plotted against. This can cover many ways of spying including hacking, cyber-attacks, surveillance, planting informants, social media monitoring, and other extreme types of espionage.

Behavioral Analysis

Once enough data is gathered, it can then be utilized to predict behavior. These predictions may be made for individuals, ethnic groups, and sometimes entire populations. If correct, behavioral predictions can help fortify conspiratorial plans to ensure success.

Simulations

Depending on the complexity of the scheme, the conspirators may conduct simulations or “dry runs” of the key steps required to pull off their plot. The simulation gives them advanced knowledge and helps them perfect their plan before fully executing it. Simulations often play out in real life almost exactly as they were gamed ahead of time.

As Conspiracies Unfold

Once the plot begins to unfold, look for the following activities to take place:

Lies, Propaganda and Mind Control

Deception is a favorite tool of conspirators, and no plot could ever be accomplished without telling lies and promoting propaganda. Attempts at outright mind control are also often established by controlling the narrative so that people never hear or see alternative points of view. Many conspiracies are hidden in plain sight in various forms of entertainment. Conspirators also use “trusted voices” to get the unaware to believe propaganda, misinformation, and disinformation. Mainstream media sources are often the primary means by which people are deceived.

Distractions

Daily living provides a plethora of distractions for the average person. They occur at almost every level through one form or another. As conspiratorial plans are being executed, a major distraction that focuses attention on a specific event may take place. This “wag the dog” trick serves to keep people in the dark about a more serious event taking place simultaneously behind the scenes.

Hegelian Dialectic

After behavioral predictions are formulated, conspirators often employ the Hegelian Dialectic. In its simplest form, the Hegelian Dialectic is most often known as Problem-Reaction-Solution, where a problem is manufactured to garner a certain reaction leading to a pre-planned solution. Conspirators use this mind control method to hide their involvement in events that take place seemingly out of nowhere. Schemers can then get the public to demand a solution that they have already planned to implement to increase their power.

False Flags

Conspirators love to execute a plan and then blame it on others. False flag charades quickly serve up a “guilty” party to deceive the public while enabling the true subversives to go unnoticed. These events are well-coordinated efforts that may be very hard to detect by the general public.

Once Conspiracies are Exposed

These are the signs to watch for once a conspiracy starts to unravel:

Plausible Deniability

When awareness of a conspiracy begins to gather steam, those involved in the plot will almost always deny it exists. This “plausible deniability” allows the guilty to pretend they had no awareness of a secret plot or that any malfeasance was taking place. Conspiracies are usually layered so that those on the outer layers do most of the dirty work. This enables those on the inner layers to deny they knew anything about it and easily dismiss accusations.

Marginalize, Silence and/or Remove Opponents

The most frequently used method to silence people who attempt to expose conspiracies is to label them as conspiracy theorists. This negative characterization causes most people to doubt the information and question the reputation of those providing an alternative to the controlled narrative. As challenges continue to arise, more severe methods of quelling opposition are used such as libel and slander, ostracizing, harassment, spying, physical intimidation, bribes, loss of employment, criminal accusations and charges, murder, and faked suicide.

Coverups and Destruction of Evidence

As proof of any conspiracy takes root, always expect the schemers to cover their tracks by any means necessary. They will resort to destroying evidence, intimidating witnesses, redacting documents, hiding behind “need to know” security policies, coopting investigative commissions, corrupting legal trials, and other unscrupulous tactics to help the plotters evade prosecution and accountability for their crimes.

Open Admission

When the truth about a conspiracy becomes too weighty to deny, there will often be an open admission of guilt typically outing those on the lower rungs of the plot. Oftentimes the tricks work as those demanding accountability get their sacrificial lamb(s) while the insiders behind the plot go unrecognized and unpunished.

Setting Up the Next Conspiracy

The players involved in many of the greatest conspiracies are often intertwined through familial ties, business and political relationships, and ideological agreements. Therefore, the conspiracies they concoct can be carried out over a long period of time and aren’t dependent on one or a small group of individuals. Here are the two most powerful ways conspiracies are perpetuated:

Enacting and Amending Laws

The most powerful tool governments, corporations, and other major entities employ is the passage and changing of laws to make their conspiratorial crimes legal. When the power to legally spy on, detain, and imprison those they deem “enemy combatants” or traitors is embedded in our laws, it gives immense power to the perpetrators of conspiracies against the people.

The Two-Party System Sham

Warning: this section may offend if you believe in two-party systems of government.

Whether governed by a Republican or Democratic president, the march to globalization has continued pretty much unabated in the U.S. The current COVID-19 conspiracy arrived in this country under President Trump, and the new normal has been in place since March 16. Democracy has been overrun by oligarchs. Fortune 500 corporations in the technology, pharmaceutical, and banking industries now rule the U.S. Every four years, the powers that be love to put on a show to keep the people thinking they have a say in government by voting for their representatives. But elections are nothing more than “selections.” In other words, the new boss is the same as the old boss; they just have different personalities to cater to different types of people. The truth is that most elected officials are co-opted to do the bidding of those who really pull the strings. The two-party political façade helps propel the next conspiracy to consolidate more power and control in the march to a new global order!

Share This Article and Help Awaken Others

Conspiracies are often successful because people remain ignorant of how they are conceived and executed. However, once an understanding of all of these elements has been grasped, it makes recognizing true conspiracies relatively easy. My hope is that many more will be awakened to the fact that a global conspiracy is in play to reengineer society as a whole and shift more power to the 1% who desire nothing but total control over humanity. Whether you call it the Great Reset, New World Order, Agenda 2030, or Illuminati Conspiracy doesn’t matter. The ingredients are the same as those listed above. The more we expose and resist them, the better the chances it does not succeed!

Lost Generation? America’s War Against Parents and the Destruction of Childhood

Left: Highschool band practice in Wenatchee, WA. Right: Biden Administration pick for HHS Secretary Transgender Rachel Levine.

Dr. Rachel Levine, born as Richard Levine, the name his parents gave to him, is a transgender doctor who has been nominated by the Biden administration to serve as the Assistant Secretary of Health.

Levine has two children, David and Dayna, through his ex-wife Martha Peaslee Levine. They allegedly divorced in 2013, after Richard Levine transitioned into a woman and became Rachel Levine.

Rachel Levine is a pediatrician who served as Secretary of the Pennsylvania Department of Health from 2017 to 2021, and is also a professor of pediatrics and psychiatry at the Penn State College of Medicine.

In Dr. Levine’s confirmation hearing before the U.S. Senate today, Senator Rand Paul questioned Levine on the topic of genital mutilation of minors, which is universally condemned by organizations such as the World Health Organizaion, the United Nations Children Fund, and the United Nations Population Fund, where genital mutilation is recognized as a violation of human rights.

Senator Paul also addressed the issue of forcing minors to take hormone blocking drugs against the advice of their parents, and specifically asked if Dr. Levine would condemn these practices.

Dr. Levine refused to answer the questions.

While transitioning children’s gender and the market growth for hormone blocking drugs has been increasing in recent years, this assault on children and the transgender political agenda has gone into overdrive now since COVID last year, as the Globalists use medical tyranny to fast-track their agenda, which includes destroying parenthood by removing parental rights, and giving the task of raising children to the State.

In Washington D.C., for example, a bill was introduced in October that would allow children as young as 11 years old to consent to receive a COVID vaccine without their parents’ approval or even knowledge. See:

Washington D.C. Bill Allows Children 11 Years and Older to be Vaccinated Without Parental Knowledge

And while children have a near ZERO percent chance of dying from COVID, social distancing and isolation measures with roots in CIA torture have been implemented for almost a year now, causing far more harm to children than any “virus” could. See:

Children Have 0.00% Chance of Dying from COVID but are Harmed for Life by Social Distancing, Which has its Roots in CIA Torture Techniques

And yet, teacher unions around the nation have fought against reopening schools for in-classroom teaching, and for those locations where children are allowed back in school, we are seeing reports like this one out of Wenatchee, WA showing what these children must endure just to participate in a group activity like a band practice.

Peachy Keenan, writing for The American Mind, recently published an article titled: The Doctor Is In(sane), where she relates a recent visit to their pediatrician with her teenage son. Some excerpts:

Your Pediatrician Wants a Word—Alone—with Your Teen. A Warning!

Hard to believe, but I have a kid approaching driving age. He’s a wonderful boy, in every way.

Devout, intelligent, and obsessed with basketball and video games, says his prayers every night before bed. Always reminds me to do penance on Fridays if I forget what day it is and eat meat (what day is this?).

Anyway, the Catholic formation we attempted, albeit imperfectly, to impose on him took. It blossomed.

Our son is always dressed for sports practice. He asked for a new weight bench and plates for Christmas.

He spent all of lockdown working out, just to make himself into a better basketball player. He measures himself every day and prays for more height. He is obviously, and very apparently, comfortable with all aspects of boyhood.

When it comes to his gender identity, the science is not only settled, but set in stone. You would have to be an imbecile not to see this instantly.

Or a pediatrician.

The Doctor Will Seize You Now

It started out as a normal annual checkup, until the pediatrician asked me to leave the room.

I didn’t understand at first. “Why?” I asked.

“There are some questions I need to ask him without you here.”

“Like what?”

“Oh, you know, about drugs and smoking.”

I stared at her, my mind racing. I realized that if I refused, other issues would be raised. Red flags would be added to the chart.

Why wouldn’t I want him to talk to a doctor? Was I hiding something? Did he have secrets I wanted kept secret?

“Do I have to leave?” I asked, still stunned.

“Yes, I need to ask him these things.” She stared at me not smiling.

My longtime doctor who had always been attentive and kind, was suddenly swinging iron keys to my gulag cell while punching the number to Child Protective Services on her phone.

Reader, I left. I lingered outside the door for a minute until a nurse ushered me into an empty storage room to wait, where I couldn’t eavesdrop.

A few minutes later, the doctor slinked out and waved goodbye without a word.

On the way to the car, the boy told me what happened.

“She talked to me about drugs and alcohol. And she told me when I have sex to use a condom.”

And finally, the kicker: “Then she asked me if I was comfortable with my gender.”

Beware the Pedo-atrician

He thought the gender question was absurd and funny. But he was outraged about the condom question.

“Mom, she told me to use birth control. Until I’m twenty-five! I’d be committing a mortal sin.”

He’s so good. I don’t deserve him. I got angrier and angrier as we drove home.

Here was this doctor my son had seen in person a total of five times in his life probing his most intimate secrets.

Does the white coat magically melt away kids’ stranger danger and cause them to open up to middle-aged harridans holding clipboards?

Guys, they really do want to separate you from your children and dictate their own agenda to them!

It’s not just theoretical anymore. This time it’s personal.

(Full article.)

It’s Just…

It’s just two weeks…

It’s just six feet…

It’s just a mask…

It’s just non-essential business…

It’s just six months…

It’s just church…

It’s just easter…

It’s just school…

It’s just non-essential travel…

It’s just Thanksgiving…

It’s just Christmas…

It’s just a vaccine…

It’s just two masks…

It’s just two vaccines…

It’s just till 2022…

It’s just three masks…

it’s just three vaccines…

It’s just an Anal Swab…

It’s just a vaccine passport…

It’s just a checkpoint…

It’s just an isolation camp…

It’s just till there’s no more viruses…

It’s just a Reset…

ITS JUST ABOUT THEM CONTROLING US…

10 Simple Ways to Live a Less Stressful Life

Stress is a major problem for many people — a hectic, stressful job, a chaotic home life, bills to worry about and bad habits such as unhealthy eating, drinking and smoking can lead to a mountain of stress.

If your life is full of stress, there are some simple things you can do to get to a more manageable level.

Now, your life will probably never be stress-free. That’s not desirable (even if it was possible) because stress is something that challenges you and helps you grow—when it’s at a reasonable level. But when stress gets too high, it causes you to be unhappy and unhealthy.

One of the keys to success is taking a realistic, gradual approach to change. How do you do it? One change at a time. Change one habit a month and gradually, over the course of a year or two, you will find you have made long-lasting changes to many things in your life.

Not all of these tips may work for you. Each person is different. Pick and choose the ones that you feel will be effective for you, and give them a try. One at a time.

  1. One thing at a time. This is the simplest and best way to start reducing your stress, and you can start today. Right now. Focus as much as possible on doing one thing at a time. Clear your desk of distractions. Pick something to work on. Need to write a report? Do only that. Remove distractions such as phones and email notifications while you’re working on that report. If you’re going to review email, do only that. This takes practice, and you’ll get urges to do other things. Just keep practicing and you’ll get better at it.
  2. Simplify your schedule. A hectic schedule is a major cause of high stress. Simplify by reducing the number of commitments in your life to the essentials. Learn to say no to the rest — and slowly get out of commitments that aren’t beneficial to you. Schedule only a few important things each day, and put space between them. Leave room for down time and fun.
  3. Get moving. Do something each day to be active — walk, hike, play a sport, go for a run, do yoga. It doesn’t have to be grueling to reduce stress. Just move. Have fun doing it.
  4. Develop one healthy habit this month. Other than getting active, improving your health overall will help with the stress. But do it one habit at a time. Eat fruits and veggies for snacks. Floss every day. Quit smoking. Cook a healthy dinner. Drink water instead of soda. One habit at a time.
  5. Do something calming. What do you enjoy that calms you down? For many people, it can be the “get moving” activity discussed above. But it could also be taking a nap, or a bath, or reading. Other people are calmed by housework or yard work. Some people like to meditate, or take a nature walk. Find your calming activity and try to do it each day.
  6. Simplify your finances. Finances can be a drain on your energy and a major stressor. If that’s true with you, find ways to simplify things. Automate savings and bill payments and debt payments. Spend less by shopping (at malls or online) much less. Find ways to have fun that don’t involve spending money.
  7. Have a blast! Have fun each day, even if it’s just for a few minutes. Play with your kids — that can take your mind off everything and can be really hilarious. Play sports (with or without your kids). Board games are fun. Whatever you choose, be sure to laugh.
  8. Get creative. Throwing yourself into a creative activity is another great way to de-stress and to prevent stress. Consider writing, painting, woodworking, playing music, sketching, cooking or making pottery, interior design or building things.
  9. Declutter. Take 20 to 30 minutes and just go through a room, getting rid of stuff you don’t use or need anymore or find a better place for it. When you are done, you will have a nice, peaceful environment for work, play, and living. Do this a little at a time — make it one of your “fun activities.”
  10. Be early. Being late can be very stressful. Try to leave earlier by getting ready earlier, or by scheduling more space between events. Things always take longer than normal, so schedule some buffer time: extra time to get ready, to commute, to do errands before you need to be somewhere, to attend a meeting before another scheduled appointment. If you get somewhere early, it’s good to have some reading material. 

ACCORDING TO THE FATHER OF PROPAGANDA AN INVISIBLE GOVERNMENT CONTROLS OUR MINDS WITH A THOUGHT PRISON

“Who are the men who without our realizing it, give us our ideas, tell us whom to admire and whom to despise, what to believe about the ownership of public utilities, about the tariff, about the price of rubber, about the Dawes Plan, about immigration; who tell us how our houses should be designed, what furniture we should put in them, what menus we should serve on our table, what kind of shirts we must wear, what sports we should indulge in, what plays we should see, what charities we should support, what pictures we should admire, what slang we should affect, what jokes we should laugh at?” ~ Edward Bernays, Propaganda

Authored by Edward Bernays and published in 1928, the book Propaganda still holds its position as the gold standard for influencing and manipulating public behavior. Drawing on his expertise in psychology while using the language of manipulation, Bernays pioneered social engineering via mass media, and his work lives on in the distorted, statist, consumer world we have today.

But who are the ones behind the curtain telling us what to think by directing our attention onto the things which serve interests?

Interestingly, chapter III of Propaganda is titled, ‘The New Propagandists, and is devoted to explaining why the controls for mass manipulation are so closely guarded by a relatively tiny elite who sit in the shadows, out of the public eye, choosing what we are to see and to think, even controlling the politicians we elect to represent us.

If we set out to make a list of the men and women who, because of their position in public life, might fairly be called the molders of public opinion we could quickly arrive at an extended list of persons mentioned in “Who’s Who…”

Such a list would comprise several thousand persons. But it is well known that many of these leaders are themselves led, sometimes by persons whose names are known to few.

Such persons typify in the public mind the type of ruler associated with the phrase invisible government.

An invisible government of corporate titans and behind the scenes influencers who’s mark on culture cannot be understated today. Bernays continues:

The invisible government tends to be concentrated in the hands of the few because of the expense of manipulating the social machinery which controls the opinions and habits of the masses.

The public relations counsel, then, is the agent who, working with modern media communication and the group formation of society, brings an idea to the consciousness of the public. But he is a great deal more than that. He is concerned with courses of action, doctrines, systems and opinions, and the securing of public support for them.

Ultimately, the goal of this type of mass-produced, pop-culture propaganda is to weaken the individual’s ability to think critically, thereby creating an environment where many people look to one another for approval, always second-guessing their own faculties. When this happens, the strength of the collective group begins to take form and multiply, and ideas can be implanted into the popular culture, taking root in the form of widespread conformist behavior.

Thinking critically means making reasoned judgments that are logical and well thought out. It is a way of thinking in which one doesn’t simply accept all arguments and conclusions to which one is exposed without questioning the arguments and conclusions. It requires curiosity, skepticism and humility. People who use critical thinking are the ones who say things such as, “How do you know that?” “Is this conclusion based on evidence or gut feelings?” and “Are there alternative possibilities when given new pieces of information?””  [Source]

Final Thoughts

The takeaway here is that not much has changed in 100 years of corporate/statist American culture, other than the technical capacity to scale this ever upward. Our lives are still heavily influenced by the likes of the described by Bernays. There is one advantage we do have now, however, as technology has given us greater access to the truth and we are now free to split from the matrix psychologically by understanding what it is and how it influences our lives. If we choose to do so, that is, if we choose to take the red pill.

In order to understand your life and your mission here on earth in the short time you have, it is imperative to learn to see the thought prison that has been built around you, and to actively circumnavigate it. Free-thinking is being stamped out by the propagandists, but our human tendency is to crave freedom, and with the aid of truth, we are more powerful than the control matrix and the invisible government.

Age Of Aquarius: 21 New Rules For 2021Enjoy, People, And Keep The Vibration High!


1.) Above all else, be direct and be honest. Be the one that says what has for too long gone unsaid.

2.) Love insanely. Let it all out into the open. You don’t have time to hold back any longer.

3.) Make yourself strong. Physically strong, emotionally strong, spiritually strong.

4.) Practice radical detachment and letting go. We need to create space for the new paradigm to emerge.

5.) Learn to enjoy being patient in allowing things to unfold naturally without forcing anything.

6.) Express yourself like you never have before. Be more real. Be more raw. Be more open. Be more bad ass. Be more you.

7.) Let death be all the motivation you need to do anything you want to do. The clock is ticking faster than ever.

8.) Don’t be surprised when things work out far better than you could have imagined.

9.) Give away as much freedom to others as you can stand, then give them more. Let them have their stupid differing opinions, or whatever, and just keep on loving them with everything you’ve got.

10.) Do not allow your mind to take the wheel. Steer with your heart.

11.) Make personal evolution your prime directive and watch how quickly your life changes for the better.

12.) Be the person in the room that laughs and smiles the most, showing others how to brush off the madness of the world.

13.) Conserve your energy until it is time to move, then do so with maximum potency.

14.) Stay close to the things you can control and distance yourself from those things which you cannot.

15.) Teach everything you’ve learned so far. Participate fully in our the growth of others.

16.) Create relationships, fix relationships, find common ground, build bridges, and be there for others.

17.) Learn to fiercely observe the world and the people around you.

18.) Rewrite the rules as needed for maximum ease and minimum stress.

19.) Let yourself cry, scream or whatever as needed in order make sure you are a conduit for negative emotions, not a reservoir.

20.) Practice, practice, practice. Engage in your daily practice every single day. Cultivate your inner peace and strength through the continuity of your intentions.

21.) Maintain the highest possible vibration you can and make a point of being infectious to others.

Another Vatican Insider: COVID-19 Is Being Used By ‘Certain Forces’ To Advance Their ‘Evil Agenda’

Former Apostolic Nuncio to the United States of America, Carlo Maria Viganò, has recently been joined by another Vatican ‘insider.’ His name is Cardinal Raymond Leo Burke.

Burke is the founder of The Shrine of Our Lady of Guadalupe, former head of the Vatican Supreme Court and patron of the Sovereign Military Order of Malta.

According to Burke as he said during a Saturday homily:

“Then there is the mysterious Wuhan virus about whose nature and prevention the mass media daily give us conflicting information. What is clear, however, is that it has been used by certain forces, inimical to families and to the freedom of nations, to advance their evil agenda.

“These forces tell us that we are now the subjects of the so-called ‘Great Reset,’ the ‘new normal,’ which is dictated to us by their manipulation of citizens and nations through ignorance and fear.”

He is referring to the manipulation of human consciousness, something we here at CE talk about quite a bit.

Burke has come under sharp criticism for his views many times, and if someone popular speaks up against “The Great Reset” or paints a picture of COVID that doesn’t match the narrative we constantly receive from mainstream media, their words usually remain unacknowledged and, if they get big enough and achieve some sort of virality, they’re usually labelled as a conspiracy theory or “fake news.”

Americans Said No To Coronavirus Contact Tracing Spy Apps

When the NHS, Britain’s socialized medicine system, debuted its contact tracing app, six million eagerly rushed to download it. After a few days, 10 million had downloaded and installed the app, and after a month, around 40% of smartphone users had put a monitoring device on their phones that would trace their social interactions and could tell them to isolate at any moment.

In October, Governor Cuomo (Sollozzo The Turk) launched a New York contact tracing app based on technology from Google and Apple, and some assistance from Bloomberg’s organization.

“It’s going to not only bring contact tracing to a new level,” Cuomo boasted, while claiming that it wouldn’t violate anyone’s privacy.

Few New Yorkers seemed to believe him. Despite being available in Spanish, Chinese, Bengali, Korean, Russian, Haitian Creole, and, even more unexpectedly, English, the app hasn’t taken off and Cuomo’s regime has refused to reveal the data that would actually show if it’s tracking positive cases.

The lack of data transparency has been the second biggest story about Cuomo’s mismanagement of the pandemic, after the deaths of 11,000 nursing home residents when his administration forced nursing homes to accept infected patients. The numbers are likely higher, but the Cuomo administration, in its typical fashion, is refusing to release the data.

After a month, only 5% of New Yorkers have downloaded Cuomo’s spy app. That’s far short of the 60% that’s needed for contact tracing to work.

Even Europeans haven’t hit that 60% target. Few outside Communist China have.

Apple and Google claimed that they needed at least 15%. Only a few states in America hit that bar and they tend to have small populations that lean leftward. Most Americans have opted out.

Governor Murphy launched his state’s contact tracing app to great fanfare, urging a, “shared sense of personal responsibility to support our contact tracing efforts”. Only 4% of New Jersey residents decided to take up the former Goldman Sachs tycoon on his modest proposal.

Murphy, like Cuomo, had forced nursing homes to accept infected coronavirus patients. Some of the state’s deadliest outbreaks had also taken place in state hospitals for veterans.

Pennsylvania’s Governor Wolf and Secretary of Health Richard Levine, debuted their contact tracing app in September.

“We won’t know who has downloaded the app, who has received notifications and who used symptom check,” Richard (Rachel) Levine, who had taken his mother out of a nursing home and into a hotel, while forcing nursing homes to take in infected patients, assured Pennsylvanians.

Only 4% of Pennsylavanians were convinced. Richard Levine has begun pleading with 13-year-olds to download the app. If there’s anything that’s bound to reassure state residents, it’s a strange man in a blonde wig urging their children to download an app to monitor them.

Contact tracing app adoption in America isn’t likely to get much better even with more time.

Governor Northam rolled out a contact tracing app in Virginia back in August. After half a year, the state has passed Google’s 15% bar with an estimated 19% of smartphone owners having installed the app.

But few people are actually using it.

Only 553 people submitted their positive results out of 100,000 positive tests in the state.

While Democrat governors and their European counterparts have brandished download figures, many people download apps and then uninstall them. Or leave them on and then pay no further attention to them. The actual utilization of contact tracing apps is laughably miniscule.

Virginia’s 800,000 plus downloads figure still only comes out to 553 people submitting results.

That’s why Governor Cuomo in New York and the NHS in the UK refuse to release their impact numbers. Considering the performance of contact tracing apps in Europe, it’s not hard to guess what they’re hiding.

Italy’s Immuni app was downloaded by 14% of the population, but only had 155 positive results submitted in three months. In France, after 2.3 million downloads, only 72 risk contacts were flagged.

A lot of people can be badgered into passively downloading an app, but when it comes time to upload their results and have the system notify everyone they’ve been around, they just as passively choose not to do it and the system fails.

After a year of touting contact tracing as the answer, the assault on privacy has stalled.

Contact tracing apps have failed miserably in New York, New Jersey, and Pennsylvania. California only got around to launching its contact tracing app now. The numbers are worse in much of the rest of the country with only 8 million Americans actually using contact tracing apps.

Trust is the biggest factor in the adoption of contact tracing apps. And very few Americans trust Big Tech, the government and its public health experts with tracking their lives and the lives of those around them.

The NHS app intends to start asking users about their personal lives to “score” their lifestyles for coronavirus risk. It’s easy enough to see this sort of thing as not only a privacy violation, but as an echo of China’s public surveillance and social credit system.

In a socialized medicine system where people are already penalized for their risk factors by being denied access to medical care, leaving them with few options except emigration or death where age or obesity can mean a denial of medical care, and where babies can be killed because saving them is not deemed to be the best use of resources, a “score” isn’t just a score.

Few people want to be denied medical treatment because they failed the social credit system.

Conservatives are the most likely to see the downside of such calculations and the more conservative parts of the United States have the lowest utilization rates of contract tracing apps.

Nevada’s contact tracing app was only downloaded 70,000 times, as of last month, and zero exposures were registered in September. In Wyoming, its app only managed 5,000 downloads.

South Carolina’s legislature banned the use of contact tracing apps by government agencies.

But all of that may be about to change if the Democrats succeed in their plan to place Biden in the White House.

Biden’s team is filled with Big Tech lobbyists and strongly favors a national contact tracing app infrastructure.

While the Trump administration allowed states to define their own policy, the Democrat plan has been to nationalize the crisis and control the response.

Key to their plans is the creation of a national server that would store information across state lines, and allow national authorities to monitor everyone’s movements even if they leave a state.

Ten states have already moved their codes to Microsoft’s National Key Server maintained for the Association of Public Health Laboratories. Another five are following suit.

As of now, virtually every state and area, such as D.C., with a contact tracing app, is on the National Key Server. That includes heavily populated states such as California, New York, and Michigan.

The hodgepodge of apps and approaches will be replaced by one system to rule them all.

Scott Becker, the CEO of the Association of Public Health Laboratories, has also been touting Biden’s plans for app contact tracing.

A national server will make a national contact tracing app much easier to implement. Google, which is also involved in the national server using its own cloud system, has, along with Apple, rebranded “contact tracing” as “exposure notification”.

Big Tech decided that people were leery of “contact tracing” so they gave it a new name.

Meanwhile, Biden’s people have been coordinating with the Rockefeller Foundation on testing plans.

“Policy makers,” the Rockefeller Foundation had urged, must “allow the infection status of most Americans to be accessed and validated in a few required settings and many voluntary ones.”

Supreme Court Justice Samuel Alito recently warned that the “pandemic has resulted in previously unimaginable restrictions on individual liberty”.

Despite that, under President Trump, Americans have still enjoyed an oasis of human rights compared to the brutal restrictions and measures in the rest of the world.

Red states were able to choose less restrictive and abusive routes for tackling the pandemic, even while blue states relentlessly violated civil rights under the guise of a public health emergency.

All of that may be coming to an end.

The near future may be a mandatory national app based either on the existing Apple or Google architecture embedded into virtually every smartphone, or, worse, GPS tracking like Norway’s app which was withdrawn after being panned by Amnesty International, linked to the National Key Server, which will serve as a key element of a national pandemic social credit system.

Americans rejected contact tracing, but a Biden administration won’t take no for an answer.

70+ Mayors, Elected Officials In France Call For Moratorium On 5G

Officials say the health risks of 5G haven’t been properly evaluated. They also cite concerns about the increase in electromagnetic pollution and the dehumanization of society.

by Dafna Tachover, Esq

More than 70 mayors and elected officials from France this week called for a moratorium on 5G technology, as resistance to 5G in France grows. The mayors’ main concern, they said, is that “the health risks for living organisms have not been evaluated.”

70+ Mayors, Elected Officials In France Call For Moratorium On 5g

Michèle Rivasi, a member of the European Parliament (MEP) who is leading the efforts, said she is ready to go to the European Court of Justice on this issue, according to a report in the French media.

In addition to health concerns, according to an article published in French, the mayors and elected officials raised other issues, including:

  • the increase in electromagnetic pollution
  • the environmental impact of the multiplication of digital flows and additional energy requirements in a period when there is an incentive to save energy
  • the significant increase in the need for rare raw materials for the manufacture of new antennas and new communicating objects
  • the reinforcement of desocialization linked to mobile screens and the risk of dehumanization of society

Rivasi is a strong opponent of 5G. In June 2020, she published a report, “ICNIRP: Conflicts of Interest, Corporate Capture and the Push for 5G.”

The International Commission for the Protection Against Non-Ionizing Radiation (ICNIRP) is a private organization whose recommendations for radio frequency guidelines — which deny any harms of wireless technology — have been followed by the World Health Organization and several countries despite the organization’s clear conflicts of interests and ties to the telecom industry.

Concerns about ICNIRP’s conflicts of interest were confirmed in a 2012 decision by the Italian Supreme Court. The court, which ruled that the plaintiff’s brain tumor was caused by a cell phone, also concluded that experts with ICNIRP affiliations “lacked credibility and authority, and as such, were essentially outside the scientific community.”

In 2020, an Italian Court of Appeals decision made even stronger findings regarding ICNIRP and its members.

Rivasi’s report on ICNIRP was written and published with Dr. Kalus Buchner, an MEP  from Germany. Buchner is a scientist who also conducted studies on how radio frequency affects health. His study on the health effects of cell towers showed adverse effects on stress hormones, including on adrenaline and dopamine. Buchner’s study also observed dose response.

This latest action by the mayors is not surprising. The resistance to 5G in France has become a top agenda item for the French Green Party, Europe Écologie Les Verts. During the local June elections, the party gained more power, and its candidates won in major cities, including Paris, Lyon, Marseille, Montpellier, Bordeaux and Strasbourg.

The party resistance to 5G was based mainly on environmental considerations, as it is estimated that 5G would exponentially increase energy consumption.

The call for a moratorium on 5G, led by Rivasi, is focused on health concerns, though it also references the environmental impacts. The resistance to 5G in France also garnered headlines in September, after employees of Orange, one of the biggest cell phone providers in Europe, wrote a letter calling on the company to not deploy 5G.