Please do your own research. The information I share is only a catalyst to expanding ones confined consciousness. I have NO desire for anyone to blindly believe or agree with what I share. Seek the truth for yourself and put your own puzzle together that has been presented to you. I'm not here to teach, preach or lead, but rather assist in awakening the consciousness of the collective from its temporary dormancy.
Military documents state that EcoHealth Alliance approached DARPA in March 2018 seeking funding to conduct gain of function research of bat borne coronaviruses. The proposal, named “Project Defuse,” was rejected by DARPA over safety concerns and the notion that it violates the gain of function research moratorium.
Project Veritas has obtained startling never-before-seen documents regarding the origins of COVID-19, gain of function research, vaccines, potential treatments which have been suppressed, and the government’s effort to conceal all of this.
The documents in question stem from a report at the Defense Advanced Research Projects Agency, better known as DARPA, which were hidden in a top secret shared drive.
DARPA is an agency under the U.S. Department of Defense in charge of facilitating research in technology with potential military applications.
Project Veritas has obtained a separate report to the Inspector General of the Department of Defense written by U.S. Marine Corp Major, Joseph Murphy, a former DARPA Fellow.
The report states that EcoHealth Alliance approached DARPA in March 2018, seeking funding to conduct gain of function research of bat borne coronaviruses. The proposal, named Project Defuse, was rejected by DARPA over safety concerns and the notion that it violates the basis gain of function research moratorium.
According to the documents, NIAID, under the direction of Dr. Fauci, went ahead with the research in Wuhan, China and at several sites across the U.S.
Dr. Fauci has repeatedly maintained, under oath, that the NIH and NAIAD have not been involved in gain of function research with the EcoHealth Alliance program. But according to the documents obtained by Project Veritas which outline why EcoHealth Alliance’s proposal was rejected, DARPA certainly classified the research as gain of function.
“The proposal does not mention or assess potential risks of Gain of Function (GoF) research,” a direct quote from the DARPA rejection letter.
Major Murphy’s report goes on to detail great concern over the COVID-19 gain of function program, the concealment of documents, the suppression of potential curatives, like Ivermectin and Hydroxychloroquine, and the mRNA vaccines.
Project Veritas reached out to DARPA for comment regarding the hidden documents and spoke with the Chief of Communications, Jared Adams, who said:
“It doesn’t sound normal to me,” when asked about the way the documents were shrouded in secrecy.
“If something resides in a classified setting, then it should be appropriately marked,” Adams said. “I’m not at all familiar with unmarked documents that reside in a classified space, no.”
In a video breaking this story published on Monday night, Project Veritas CEO, James O’Keefe, asked a foundational question to DARPA:
“Who at DARPA made the decision to bury the original report? They could have raised red flags to the Pentagon, the White House, or Congress, which may have prevented this entire pandemic that has led to the deaths of 5.4 million people worldwide and caused much pain and suffering to many millions more.”
Facebook’s growing role in the ever-expanding surveillance and “pre-crime” apparatus of the national security state demands new scrutiny of the company’s origins and its products as they relate to a former, controversial DARPA-run surveillance program that was essentially analogous to what is currently the world’s largest social network.
Mark Zuckerberg walks among attendees at a VR conference in Barcelona, Spain in 2016
In mid-February, Daniel Baker, a US veteran described by the media as “anti-Trump, anti-government, anti-white supremacists, and anti-police,” was charged by a Florida grand jury with two counts of “transmitting a communication in interstate commerce containing a threat to kidnap or injure.”
The communication in question had been posted by Baker on Facebook, where he had created an event page to organize an armed counter-rally to one planned by Donald Trump supporters at the Florida capital of Tallahassee on January 6. “If you are afraid to die fighting the enemy, then stay in bed and live. Call all of your friends and Rise Up!,” Baker had written on his Facebook event page.
Baker’s case is notable as it is one of the first “precrime” arrests based entirely on social media posts—the logical conclusion of the Trump administration’s, and now Biden administration’s, push to normalize arresting individuals for online posts to prevent violent acts before they can happen. From the increasing sophistication of US intelligence/military contractor Palantir’s predictive policing programs to the formal announcement of the Justice Department’s Disruption and Early Engagement Program in 2019 to Biden’s first budget, which contains $111 million for pursuing and managing “increasing domestic terrorism caseloads,” the steady advance toward a precrime-centered “war on domestic terror” has been notable under every post-9/11 presidential administration.
This new so-called war on domestic terror has actually resulted in many of these types of posts on Facebook. And, while Facebook has long sought to portray itself as a “town square” that allows people from across the world to connect, a deeper look into its apparently military origins and continual military connections reveals that the world’s largest social network was always intended to act as a surveillance tool to identify and target domestic dissent.
Part 1 of this two-part series on Facebook and the US national-security state explores the social media network’s origins and the timing and nature of its rise as it relates to a controversial military program that was shut down the same day that Facebook launched. The program, known as LifeLog, was one of several controversial post-9/11 surveillance programs pursued by the Pentagon’s Defense Advanced Research Projects Agency (DARPA) that threatened to destroy privacy and civil liberties in the United States while also seeking to harvest data for producing “humanized” artificial intelligence (AI).
As this report will show, Facebook is not the only Silicon Valley giant whose origins coincide closely with this same series of DARPA initiatives and whose current activities are providing both the engine and the fuel for a hi-tech war on domestic dissent.
DARPA’s Data Mining for “National Security” and to “Humanize” AI
In the aftermath of the September 11 attacks, DARPA, in close collaboration with the US intelligence community (specifically the CIA), began developing a “precrime” approach to combatting terrorism known as Total Information Awareness or TIA. The purpose of TIA was to develop an “all-seeing” military-surveillance apparatus. The official logic behind TIA was that invasive surveillance of the entire US population was necessary to prevent terrorist attacks, bio-terrorism events, and even naturally occurring disease outbreaks.
The architect of TIA, and the man who led it during its relatively brief existence, was John Poindexter, best known for being Ronald Reagan’s National Security Advisor during the Iran-Contra affair and for being convicted of five felonies in relation to that scandal. A less well-known activity of Iran-Contra figures like Poindexter and Oliver North was their development of the Main Core database to be used in “continuity of government” protocols. Main Core was used to compile a list of US dissidents and “potential troublemakers” to be dealt with if the COG protocols were ever invoked. These protocols could be invoked for a variety of reasons, including widespread public opposition to a US military intervention abroad, widespread internal dissent, or a vaguely defined moment of “national crisis” or “time of panic.” Americans were not informed if their name was placed on the list, and a person could be added to the list for merely having attended a protest in the past, for failing to pay taxes, or for other, “often trivial,” behaviors deemed “unfriendly” by its architects in the Reagan administration.
In light of this, it was no exaggeration when New York Times columnist William Safire remarked that, with TIA, “Poindexter is now realizing his twenty-year dream: getting the ‘data-mining’ power to snoop on every public and private act of every American.”
The TIA program met with considerable citizen outrage after it was revealed to the public in early 2003. TIA’s critics included the American Civil Liberties Union, which claimed that the surveillance effort would “kill privacy in America” because “every aspect of our lives would be catalogued,” while several mainstream media outlets warned that TIA was “fighting terror by terrifying US citizens.” As a result of the pressure, DARPA changed the program’s name to Terrorist Information Awareness to make it sound less like a national-security panopticon and more like a program aiming specifically at terrorists in the post-9/11 era.
The logo for DARPA’s Information Awareness Office, which oversaw Total Information Awareness during its brief existence
The TIA projects were not actually closed down, however, with most moved to the classified portfolios of the Pentagon and US intelligence community. Some became intelligence funded and guided private-sector endeavors, such as Peter Thiel’s Palantir, while others resurfaced years later under the guise of combatting the COVID-19 crisis.
Soon after TIA was initiated, a similar DARPA program was taking shape under the direction of a close friend of Poindexter’s, DARPA program manager Douglas Gage. Gage’s project, LifeLog, sought to “build a database tracking a person’s entire existence” that included an individual’s relationships and communications (phone calls, mail, etc.), their media-consumption habits, their purchases, and much more in order to build a digital record of “everything an individual says, sees, or does.” LifeLog would then take this unstructured data and organize it into “discreet episodes” or snapshots while also “mapping out relationships, memories, events and experiences.”
LifeLog, per Gage and supporters of the program, would create a permanent and searchable electronic diary of a person’s entire life, which DARPA argued could be used to create next-generation “digital assistants” and offer users a “near-perfect digital memory.” Gage insisted, even after the program was shut down, that individuals would have had “complete control of their own data-collection efforts” as they could “decide when to turn the sensors on or off and decide who will share the data.” In the years since then, analogous promises of user control have been made by the tech giants of Silicon Valley, only to be broken repeatedly for profit and to feed the government’s domestic-surveillance apparatus.
The information that LifeLog gleaned from an individual’s every interaction with technology would be combined with information obtained from a GPS transmitter that tracked and documented the person’s location, audio-visual sensors that recorded what the person saw and said, as well as biomedical monitors that gauged the person’s health. Like TIA, LifeLog was promoted by DARPA as potentially supporting “medical research and the early detection of an emerging epidemic.”
Critics in mainstream media outlets and elsewhere were quick to point out that the program would inevitably be used to build profiles on dissidents as well as suspected terrorists. Combined with TIA’s surveillance of individuals at multiple levels, LifeLog went farther by “adding physical information (like how we feel) and media data (like what we read) to this transactional data.” One critic, Lee Tien of the Electronic Frontier Foundation, warned at the time that the programs that DARPA was pursuing, including LifeLog, “have obvious, easy paths to Homeland Security deployments.”
At the time, DARPA publicly insisted that LifeLog and TIA were not connected, despite their obvious parallels, and that LifeLog would not be used for “clandestine surveillance.” However, DARPA’s own documentation on LifeLog noted that the project “will be able . . . to infer the user’s routines, habits and relationships with other people, organizations, places and objects, and to exploit these patterns to ease its task,” which acknowledged its potential use as a tool of mass surveillance.
In addition to the ability to profile potential enemies of the state, LifeLog had another goal that was arguably more important to the national-security state and its academic partners—the “humanization” and advancement of artificial intelligence. In late 2002, just months prior to announcing the existence of LifeLog, DARPA released a strategy document detailing development of artificial intelligence by feeding it with massive floods of data from various sources.
The post-9/11 military-surveillance projects—LifeLog and TIA being only two of them—offered quantities of data that had previously been unthinkable to obtain and that could potentially hold the key to achieving the hypothesized “technological singularity.” The 2002 DARPA document even discusses DARPA’s effort to create a brain-machine interface that would feed human thoughts directly into machines to advance AI by keeping it constantly awash in freshly mined data.
One of the projects outlined by DARPA, the Cognitive Computing Initiative, sought to develop sophisticated artificial intelligence through the creation of an “enduring personalized cognitive assistant,” later termed the Perceptive Assistant that Learns, or PAL. PAL, from the very beginning was tied to LifeLog, which was originally intended to result in granting an AI “assistant” human-like decision-making and comprehension abilities by spinning masses of unstructured data into narrative format.
The would-be main researchers for the LifeLog project also reflect the program’s end goal of creating humanized AI. For instance, Howard Shrobe at the MIT Artificial Intelligence Laboratory and his team at the time were set to be intimately involved in LifeLog. Shrobe had previously worked for DARPA on the “evolutionary design of complex software” before becoming associate director of the AI Lab at MIT and has devoted his lengthy career to building “cognitive-style AI.” In the years after LifeLog was cancelled, he again worked for DARPA as well as on intelligence community–related AI research projects. In addition, the AI Lab at MIT was intimately connected with the 1980s corporation and DARPA contractor called Thinking Machines, which was founded by and/or employed many of the lab’s luminaries—including Danny Hillis, Marvin Minsky, and Eric Lander—and sought to build AI supercomputers capable of human-like thought. All three of these individuals were later revealed to be close associates of and/or sponsored by the intelligence-linked pedophile Jeffrey Epstein, who also generously donated to MIT as an institution and was a leading funder of and advocate for transhumanist-related scientific research.
Soon after the LifeLog program was shuttered, critics worried that, like TIA, it would continue under a different name. For example, Lee Tien of the Electronic Frontier Foundation told VICE at the time of LifeLog’s cancellation, “It would not surprise me to learn that the government continued to fund research that pushed this area forward without calling it LifeLog.”
Along with its critics, one of the would-be researchers working on LifeLog, MIT’s David Karger, was also certain that the DARPA project would continue in a repackaged form. He told Wired that “I am sure such research will continue to be funded under some other title . . . I can’t imagine DARPA ‘dropping out’ of a such a key research area.”
The answer to these speculations appears to lie with the company that launched the exact same day that LifeLog was shuttered by the Pentagon: Facebook.
Thiel Information Awareness
After considerable controversy and criticism, in late 2003, TIA was shut down and defunded by Congress, just months after it was launched. It was only later revealed that that TIA was never actually shut down, with its various programs having been covertly divided up among the web of military and intelligence agencies that make up the US national-security state. Some of it was privatized.
The same month that TIA was pressured to change its name after growing backlash, Peter Thiel incorporated Palantir, which was, incidentally, developing the core panopticon software that TIA had hoped to wield. Soon after Palantir’s incorporation in 2003, Richard Perle, a notorious neoconservative from the Reagan and Bush administrations and an architect of the Iraq War, called TIA’s Poindexter and said he wanted to introduce him to Thiel and his associate Alex Karp, now Palantir’s CEO. According to a report in New York magazine, Poindexter “was precisely the person” whom Thiel and Karp wanted to meet, mainly because “their new company was similar in ambition to what Poindexter had tried to create at the Pentagon,” that is, TIA. During that meeting, Thiel and Karp sought “to pick the brain of the man now widely viewed as the godfather of modern surveillance.”
Peter Thiel speaks at the World Economic Forum in 2013, Source: Mirko Ries Courtesy for the World Economic Forum
Soon after Palantir’s incorporation, though the exact timing and details of the investment remain hidden from the public, the CIA’s In-Q-Tel became the company’s first backer, aside from Thiel himself, giving it an estimated $2 million. In-Q-Tel’s stake in Palantir would not be publicly reported until mid-2006.
The money was certainly useful. In addition, Alex Karp told the New York Times in October 2020, “the real value of the In-Q-Tel investment was that it gave Palantir access to the CIA analysts who were its intended clients.” A key figure in the making of In-Q-Tel investments during this period, including the investment in Palantir, was the CIA’s chief information officer, Alan Wade, who had been the intelligence community’s point man for Total Information Awareness. Wade had previously cofounded the post-9/11 Homeland Security software contractor Chiliad alongside Christine Maxwell, sister of Ghislaine Maxwell and daughter of Iran-Contra figure, intelligence operative, and media baron Robert Maxwell.
After the In-Q-Tel investment, the CIA would be Palantir’s only client until 2008. During that period, Palantir’s two top engineers—Aki Jain and Stephen Cohen—traveled to CIA headquarters at Langley, Virginia, every two weeks. Jain recalls making at least two hundred trips to CIA headquarters between 2005 and 2009. During those regular visits, CIA analysts “would test [Palantir’s software] out and offer feedback, and then Cohen and Jain would fly back to California to tweak it.” As with In-Q-Tel’s decision to invest in Palantir, the CIA’s chief information officer during this time remained one of TIA’s architects. Alan Wade played a key role in many of these meetings and subsequently in the “tweaking” of Palantir’s products.
Today, Palantir’s products are used for mass surveillance, predictive policing, and other disconcerting policies of the US national-security state. A telling example is Palantir’s sizable involvement in the new Health and Human Services–run wastewater surveillance program that is quietly spreading across the United States. As noted in a previous Unlimited Hangout report, that system is the resurrection of a TIA program called Biosurveillance. It is feeding all its data into the Palantir-managed and secretive HHS Protect data platform. The decision to turn controversial DARPA-led programs into a private ventures, however, was not limited to Thiel’s Palantir.
The Rise of Facebook
The shuttering of TIA at DARPA had an impact on several related programs, which were also dismantled in the wake of public outrage over DARPA’s post-9/11 programs. One of these programs was LifeLog. As news of the program spread through the media, many of the same vocal critics who had attacked TIA went after LifeLog with similar zeal, with Steven Aftergood of the Federation of American Scientists telling Wired at the time that “LifeLog has the potential to become something like ‘TIA cubed.’” LifeLog being viewed as something that would prove even worse than the recently cancelled TIA had a clear effect on DARPA, which had just seen both TIA and another related program cancelled after considerable backlash from the public and the press.
The firestorm of criticism of LifeLog took its program manager, Doug Gage, by surprise, and Gage has continued to assert that the program’s critics “completely mischaracterized” the goals and ambitions of the project. Despite Gage’s protests and those of LifeLog’s would-be researchers and other supporters, the project was publicly nixed on February 4, 2004. DARPA never provided an explanation for its quiet move to shutter LifeLog, with a spokesperson stating only that it was related to “a change in priorities” for the agency. On DARPA director Tony Tether’s decision to kill LifeLog, Gage later told VICE, “I think he had been burnt so badly with TIA that he didn’t want to deal with any further controversy with LifeLog. The death of LifeLog was collateral damage tied to the death of TIA.”
Fortuitously for those supporting the goals and ambitions of LifeLog, a company that turned out to be its private-sector analogue was born on the same day that LifeLog’s cancellation was announced. On February 4, 2004, what is now the world’s largest social network, Facebook, launched its website and quickly rose to the top of the social media roost, leaving other social media companies of the era in the dust.
Sean Parker of Founders Fund speaks during the LeWeb conference in 2011, Source: @Kmeron for LeWeb11 @ Les Docks de Paris
A few months into Facebook’s launch, in June 2004, Facebook cofounders Mark Zuckerberg and Dustin Moskovitz brought Sean Parker onto Facebook’s executive team. Parker, previously known for cofounding Napster, later connected Facebook with its first outside investor, Peter Thiel. As discussed, Thiel, at that time, in coordination with the CIA, was actively trying to resurrect controversial DARPA programs that had been dismantled the previous year. Notably, Sean Parker, who became Facebook’s first president, also had a history with the CIA, which recruited him at the age of sixteen soon after he had been busted by the FBI for hacking corporate and military databases. Thanks to Parker, in September 2004, Thiel formally acquired $500,000 worth of Facebook shares and was added its board. Parker maintained close ties to Facebook as well as to Thiel, with Parker being hired as a managing partner of Thiel’s Founders Fund in 2006.
Thiel and Facebook cofounder Mosokvitz became involved outside of the social network long after Facebook’s rise to prominence, with Thiel’s Founder Fund becoming a significant investor in Moskovitz’s company Asana in 2012. Thiel’s longstanding symbiotic relationship with Facebook cofounders extends to his company Palantir, as the data that Facebook users make public invariably winds up in Palantir’s databases and helps drive the surveillance engine Palantir runs for a handful of US police departments, the military, and the intelligence community. In the case of the Facebook–Cambridge Analytica data scandal, Palantir was also involved in utilizing Facebook data to benefit the 2016 Donald Trump presidential campaign.
Today, as recent arrests such as that of Daniel Baker have indicated, Facebook data is slated to help power the coming “war on domestic terror,” given that information shared on the platform is being used in “precrime” capture of US citizens, domestically. In light of this, it is worth dwelling on the point that Thiel’s exertions to resurrect the main aspects of TIA as his own private company coincided with his becoming the first outside investor in what was essentially the analogue of another DARPA program deeply intertwined with TIA.
Facebook, a Front
Because of the coincidence that Facebook launched the same day that LifeLog was shut down, there has been recent speculation that Zuckerberg began and launched the project with Moskovitz, Saverin, and others through some sort of behind-the-scenes coordination with DARPA or another organ of the national-security state. While there is no direct evidence for this precise claim, the early involvement of Parker and Thiel in the project, particularly given the timing of Thiel’s other activities, reveals that the national-security state was involved in Facebook’s rise. It is debatable whether Facebook was intended from its inception to be a LifeLog analogue or if it happened to be the social media project that fit the bill after its launch. The latter seems more likely, especially considering that Thiel also invested in another early social media platform, Friendster.
An important point linking Facebook and LifeLog is the subsequent identification of Facebook with LifeLog by the latter’s DARPA architect himself. In 2015, Gage told VICE that “Facebook is the real face of pseudo-LifeLog at this point.” He tellingly added, “We have ended up providing the same kind of detailed personal information to advertisers and data brokers and without arousing the kind of opposition that LifeLog provoked.”
Users of Facebook and other large social media platforms have so far been content to allow these platforms to sell their private data so long as they publicly operate as private enterprises. Backlash only really emerged when such activities were publicly tied to the US government, and especially the US military, even though Facebook and other tech giants routinely share their users’ data with the national-security state. In practice, there is little difference between the public and private entities.
Edward Snowden, the NSA whistleblower, notably warned in 2019 that Facebook is just as untrustworthy as US intelligence, stating that “Facebook’s internal purpose, whether they state it publicly or not, is to compile perfect records of private lives to the maximum extent of their capability, and then exploit that for their own corporate enrichment. And damn the consequences.”
Snowden also stated in the same interview that “the more Google knows about you, the more Facebook knows about you, the more they are able . . . to create permanent records of private lives, the more influence and power they have over us.” This underscores how both Facebook and intelligence-linked Google have accomplished much of what LifeLog had aimed to do, but on a much larger scale than what DARPA had originally envisioned.
The reality is that most of the large Silicon Valley companies of today have been closely linked to the US national-security state establishment since their inception. Notable examples aside from Facebook and Palantir include Google and Oracle. Today these companies are more openly collaborating with the military-intelligence agencies that guided their development and/or provided early funding, as they are used to provide the data needed to fuel the newly announced war on domestic terror and its accompanying algorithms.
It is hardly a coincidence that someone like Peter Thiel, who built Palantir with the CIA and helped ensure Facebook’s rise, is also heavily involved in Big Data AI-driven “predictive policing” approaches to surveillance and law enforcement, both through Palantir and through his other investments. TIA, LifeLog, and related government and private programs and institutions launched after 9/11, were always intended to be used against the American public in a war against dissent. This was noted by their critics in 2003-4 and by those who have examined the origins of the “homeland security” pivot in the US and its connection to past CIA “counterterror” programs in Vietnam and Latin America.
Ultimately, the illusion of Facebook and related companies as being independent of the US national-security state has prevented a recognition of the reality of social media platforms and their long-intended, yet covert uses, which we are beginning to see move into the open following the events of January 6. Now, with billions of people conditioned to use Facebook and social media as part of their daily lives, the question becomes: If that illusion were to be irrevocably shattered today, would it make a difference to Facebook’s users? Or has the populace become so conditioned to surrendering their private data in exchange for dopamine-fueled social-validation loops that it no longer matters who ends up holding that data?
A group of Swiss scientists developed a wearable microchip which sits on the skin throughout the day and records hormone levels via sweat. The microchip measures levels of cortisol in the body and tells the wearer when they are experiencing too much stress, say the researchers.
“In people who suffer from stress-related diseases, this circadian rhythm is completely thrown off and if the body makes too much or not enough cortisol, that can seriously damage an individual’s health, potentially leading to obesity, cardiovascular disease, depression or burnout.” – Adrian lonescu, Swiss Federal Institute of Technology Lausanne (EPFL), lead Nanoelectronic Devices Laboratory researcher
While these devices may be helpful in a hospital setting, technology companies fully intent to integrate them into wearable tech like smart watches, pushing us closer to a world where everything we do is being tracked and recorded around the clock.
“The joint R&D team at EPFL and Xsensio reached an important R&D milestone in the detection of the cortisol hormone,” said Xsensio CEO Esmeralda Magally. “Xsensio will make the cortisol sensor a key part of its Lab-on-SkinTM platform to bring stress monitoring to next-gen wearables.”
These microchips are intended to eventually connect to the ‘internet of things,’ a comprehensive array of devices which track and record us at all times from our homes to our places of work.
Former US intelligence chief James Clapper admitted over five years ago that the government ‘might’ use the internet of things to spy on you.
“In the future, intelligence services might use the [internet of things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials,” he said.
The number of devices spying on you every day without your knowledge may come as a surprise. We have known since Edward Snowden spoke out about illegal surveillance at the National Security Agency (NSA) that the government collects a record of everything that we say and do via our smartphones and computers, including through the build-in microphones and cameras.
Amazon’s Alexa devices are a disturbing and Orwellian example of corporate and government spying because not only is the NSA recording all activity in your very home, but Amazon is also bundling that data as well, either to sell to data companies or marketing of Amazon products.
Smart Meters are recording all electrical activity in the home while Smart Cars are recording everywhere you travel.
“Modern cars roll out of factories packed with cellular connections, powerful processors and growing suite of sensors, including cameras, radar and microphones. That’s turning them into the next information goldmine, rivaling the data-creating capabilities of smartphones,” reports Bloomberg.
Some people even have “Smart Homes,” where Google is always present and can interact with the home in such ways as turning off and on lightbulbs, TV’s, and all other ‘internet of things’ products, which now even includes washers, dryers, dishwashers, and toasters.
For years, mainstream media and secretive government agencies like DARPA (the technology arm of the pentagon) have been pushing us closer to a world with no privacy, where every individual is microchipped and tracked like cattle.
The truth is that microchips are neither liberating nor far away. Several companies from around the world have already begun microchipping employees and advertising the process as more convenient and safe. Not only are we being slowly encouraged to microchip and track our children, but the chip also eliminates a need for cash, which is why some call it the “Mark of the Beast”.
We are truly entering into an Orwellian world in which no human being has privacy at any point in time, the government has total power over all of us because we can never escape their watchful eyes, and corporations know everything about us and can control our purchasing habits. The only way out is to resist these intrusions at every turn.
Officials say the health risks of 5G haven’t been properly evaluated. They also cite concerns about the increase in electromagnetic pollution and the dehumanization of society.
More than 70 mayors and elected officials from France this week called for a moratorium on 5G technology, as resistance to 5G in France grows. The mayors’ main concern, they said, is that “the health risks for living organisms have not been evaluated.”
Michèle Rivasi, a member of the European Parliament (MEP) who is leading the efforts, said she is ready to go to the European Court of Justice on this issue, according to a report in the French media.
In addition to health concerns, according to an article published in French, the mayors and elected officials raised other issues, including:
the increase in electromagnetic pollution
the environmental impact of the multiplication of digital flows and additional energy requirements in a period when there is an incentive to save energy
the significant increase in the need for rare raw materials for the manufacture of new antennas and new communicating objects
the reinforcement of desocialization linked to mobile screens and the risk of dehumanization of society
Rivasi is a strong opponent of 5G. In June 2020, she published a report, “ICNIRP: Conflicts of Interest, Corporate Capture and the Push for 5G.”
The International Commission for the Protection Against Non-Ionizing Radiation (ICNIRP) is a private organization whose recommendations for radio frequency guidelines — which deny any harms of wireless technology — have been followed by the World Health Organization and several countries despite the organization’s clear conflicts of interests and ties to the telecom industry.
Concerns about ICNIRP’s conflicts of interest were confirmed in a 2012 decision by the Italian Supreme Court. The court, which ruled that the plaintiff’s brain tumor was caused by a cell phone, also concluded that experts with ICNIRP affiliations “lacked credibility and authority, and as such, were essentially outside the scientific community.”
In 2020, an Italian Court of Appeals decision made even stronger findings regarding ICNIRP and its members.
Rivasi’s report on ICNIRP was written and published with Dr. Kalus Buchner, an MEP from Germany. Buchner is a scientist who also conducted studies on how radio frequency affects health. His study on the health effects of cell towers showed adverse effects on stress hormones, including on adrenaline and dopamine. Buchner’s study also observed dose response.
This latest action by the mayors is not surprising. The resistance to 5G in France has become a top agenda item for the French Green Party, Europe Écologie Les Verts. During the local June elections, the party gained more power, and its candidates won in major cities, including Paris, Lyon, Marseille, Montpellier, Bordeaux and Strasbourg.
The party resistance to 5G was based mainly on environmental considerations, as it is estimated that 5G would exponentially increase energy consumption.
The call for a moratorium on 5G, led by Rivasi, is focused on health concerns, though it also references the environmental impacts. The resistance to 5G in France also garnered headlines in September, after employees of Orange, one of the biggest cell phone providers in Europe, wrote a letter calling on the company to not deploy 5G.
For many years experts have issued serious warnings about privacy AND cybersecurity risks associated with Internet of Things (IoT) technology (see 1, 2, 3, 4, 5). Nevertheless, the U.S. Air Force plans to start using it to monitor hundreds of millions of devices.
Next Step in Government Data Tracking Is the Internet of Things
U.S. Air Force experiments with monitoring peripherals — from autos to fitness trackers.
WASHINGTON — U. S. government agencies from the military to law enforcement have been buying up mobile-phone data from the private sector to use in gathering intelligence, monitoring adversaries and apprehending criminals.
Now, the U.S. Air Force is experimenting with the next step.
The Air Force Research Laboratory is testing a commercial software platform that taps mobile phones as a window onto usage of hundreds of millions of computers, routers, fitness trackers, modern automobiles and other networked devices, known collectively as the “Internet of Things.” — Read full article
It no longer seems paranoid to worry about surveillance and facial recognition.
A protester covers surveillance cameras with paint in Hong Kong, July 1.
Hong Kong protesters have been tearing down surveillance cameras, and it’s easy to see why. Mainland China’s “social credit” system is the most extensive program of government surveillance the world has ever seen—one that should caution not only Hong Kong but also America and the West against further intrusions on privacy.
By one estimate 10% of East Germans were Stasi spies. Until now, that was likely the deepest network of government surveillance ever. It’s nothing compared with what’s happening in China. By next year there will be 600 million surveillance cameras in China, roughly one camera for every two citizens. The cameras feed government databases in real time and, with the assistance of sophisticated facial-recognition software, Beijing eventually expects to be able to identify everyone, everywhere within three seconds of anything happening.
That may deter crime, but it will also enable the government to monitor people it thinks undesirable. It will nip any democracy movement in the bud and permit the government to track Falun Gong members and dissident Christians. That’s where the social-credit system kicks in.
The system ranks Chinese citizens according to what the government regards as good and bad behavior. Bad behavior includes reckless driving, buying too many videogames, and putting your trash in the wrong bin. It also includes hanging out with the wrong people and criticizing the Communist Party.
The sanctions to discourage bad behavior show how deep the techniques of control can be in a modern totalitarian state. People with low social-credit scores are publicly shamed. Their internet speeds are reduced; they’re denied good jobs and banned from air or train travel. Their children are kept out of prestigious schools, and even their pets can be taken from them. The ultimate goal is to create a wholly docile and submissive citizenry.
French philosopher Michel Foucault thought that Western societies did the same thing, in their way. In “Discipline and Punish” (1975), he argued that through their schools, factories and the military, free-market societies turn their citizens into passive and unquestioning automatons and thereby build a metaphorical “panopticon.” The reference was to British philosopher Jeremy Bentham’s proposal for a circular prison in which each cell would face the guard at the very center, so that he could see every inmate at a glance. The prisoners would know they could be watched at any time—and so would the guard.
The metaphor of Western society as a panopticon caught on among radical leftists who needed an explanation for why Americans rejected socialism. As fanciful as that was, it did acknowledge that pervasive social control would be oppressive. But does the left still think so, now that it controls important institutions including higher education and much of the media and big business? It would appear not, given its recent tactics—setting internet mobs on high-school students, doxxing anonymous conservatives, publishing the names and addresses of donors to disfavored candidates and causes, harassing public officials in restaurants and at home.
When you see your opponents as evil, such practices begin to look like fair game. Progressives today seem to lack the instinct to question their own judgment and have shed any skepticism about ideology. Given the left’s vicious self-righteousness, on display daily in the media, the question becomes whether it will accept any limits in its quest to impose its views on everyone—especially if it gains control of the government’s coercive interests.
The left would have to contend with the self-corrective instincts of Americans and our love of liberty, as well as the Constitution and the courts. Still, the actions of the Obama-era Internal Revenue Service and Federal Bureau of Investigation bode ill. Thus it’s time to start thinking about the need to protect Americans’ privacy.
The District of Columbia has 540 surveillance cameras on its street corners to catch drivers who run red lights. The U.K. has at least four million such cameras, 500,000 in London alone. I used to think libertarians were paranoid to worry about this. Now I’m not so sure.
IT CAN HAPPEN HERE
Many Westerners are disturbed by what they read about China’s social credit system. But such systems, it turns out, are not unique to China. A parallel system is developing in the United States, in part as the result of Silicon Valley and technology-industry user policies, and in part by surveillance of social media activity by private companies.
Here are some of the elements of America’s growing social credit system.
INSURANCE COMPANIES
The New York State Department of Financial Services announced earlier this year that life insurance companies can base premiums on what they find in your social media posts. That Instagram pic showing you teasing a grizzly bear at Yellowstone with a martini in one hand, a bucket of cheese fries in the other, and a cigarette in your mouth, could cost you. On the other hand, a Facebook post showing you doing yoga might save you money. (Insurance companies have to demonstrate that social media evidence points to risk, and not be based on discrimination of any kind—they can’t use social posts to alter premiums based on race or disability, for example.)
The use of social media is an extension of the lifestyle questions typically asked when applying for life insurance, such as questions about whether you engage in rock climbing or other adventure sports. Saying “no,” but then posting pictures of yourself free-soloing El Capitan, could count as a “yes.”
PATRONSCAN
A company called PatronScan sells three products—kiosk, desktop, and handheld systems—designed to help bar and restaurant owners manage customers. PatronScan is a subsidiary of the Canadian software company Servall Biometrics, and its products are now on sale in the United States, Canada, Australia, and the United Kingdom.
PatronScan helps spot fake IDs—and troublemakers. When customers arrive at a PatronScan-using bar, their ID is scanned. The company maintains a list of objectionable customers designed to protect venues from people previously removed for “fighting, sexual assault, drugs, theft, and other bad behavior,” according to its website. A “public” list is shared among all PatronScan customers. So someone who’s banned by one bar in the U.S. is potentially banned by all the bars in the U.S., the U.K., and Canada that use the PatronScan system for up to a year. (PatronScan Australia keeps a separate system.)
Judgment about what kind of behavior qualifies for inclusion on a PatronScan list is up to the bar owners and managers. Individual bar owners can ignore the ban, if they like. Data on non-offending customers is deleted in 90 days or less. Also: PatronScan enables bars to keep a “private” list that is not shared with other bars, but on which bad customers can be kept for up to five years.
PatronScan does have an “appeals” process, but it’s up to the company to grant or deny those appeals.
UBER AND AIRBNB
Thanks to the sharing economy, the options for travel have been extended far beyond taxis and hotels. Uber and Airbnb are leaders in providing transportation and accommodation for travelers. But there are many similar ride-sharing and peer-to-peer accommodations companies providing similar services.
Airbnb—a major provider of travel accommodation and tourist activities—bragged in March that it now has more than 6 million listings in its system. That’s why a ban from Airbnb can limit travel options.
Airbnb can disable your account for life for any reason it chooses, and it reserves the right to not tell you the reason. The company’s canned message includes the assertion that “This decision is irreversible and will affect any duplicated or future accounts. Please understand that we are not obligated to provide an explanation for the action taken against your account.” The ban can be based on something the host privately tells Airbnb about something they believe you did while staying at their property. Airbnb’s competitors have similar policies.
It’s now easy to get banned by Uber, too. Whenever you get out of the car after an Uber ride, the app invites you to rate the driver. What many passengers don’t know is that the driver now also gets an invitation to rate you. Under a new policy announced in May: If your average rating is “significantly below average,” Uber will ban you from the service.
WHATSAPP
You can be banned from communications apps, too. For example, you can be banned on WhatsApp if too many other users block you. You can also get banned for sending spam, threatening messages, trying to hack or reverse-engineer the WhatsApp app, or using the service with an unauthorized app.
WhatsApp is small potatoes in the United States. But in much of the world, it’s the main form of electronic communication. Not being allowed to use WhatsApp in some countries is as punishing as not being allowed to use the telephone system in America.
WHAT’S WRONG WITH SOCIAL CREDIT, ANYWAY?
Nobody likes antisocial, violent, rude, unhealthy, reckless, selfish, or deadbeat behavior. What’s wrong with using new technology to encourage everyone to behave?
The most disturbing attribute of a social credit system is not that it’s invasive, but that it’s extralegal. Crimes are punished outside the legal system, which means no presumption of innocence, no legal representation, no judge, no jury, and often no appeal. In other words, it’s an alternative legal system where the accused have fewer rights.
Social credit systems are an end-run around the pesky complications of the legal system. Unlike China’s government policy, the social credit system emerging in the U.S. is enforced by private companies. If the public objects to how these laws are enforced, it can’t elect new rule-makers.
An increasing number of societal “privileges” related to transportation, accommodations, communications, and the rates we pay for services (like insurance) are either controlled by technology companies or affected by how we use technology services. And Silicon Valley’s rules for being allowed to use their services are getting stricter.
If current trends hold, it’s possible that in the future a majority of misdemeanors and even some felonies will be punished not by Washington, D.C., but by Silicon Valley. It’s a slippery slope away from democracy and toward corporatocracy.
In other words, in the future, law enforcement may be determined less by the Constitution and legal code, and more by end-user license agreements.
In the modern age of democracy and volunteer armies, a pretense for war is required to rally the nation around the flag and motivate the public to fight. That is why every major conflict is now accompanied by its own particular bodyguard of lies. From false flag attacks to dehumanization of the “enemy,” here are all the examples you’ll need to help debunk a century of war lies.
If, as the old adage has it, the first casualty of war is the truth, then it follows that the first battle of any war is won by lies.
Lies have always been used to sell war to a public that would otherwise be leery about sending their sons off to fight and die on foreign soil. In times long past, this was easy enough to accomplish. A proclamation by a king or queen was enough to set the machinery of war in motion. But in the modern age of democracy and volunteer armies, a pretense for war is required to rally the nation around the flag and motivate the public to fight.
That is why every major conflict is now accompanied by its own particular bodyguard of lies. From false flag attacks to dehumanization of the “enemy,” here are all the examples you’ll need to help debunk a century of war lies.
WWI
In 1915, the RMS Lusitania, a British ocean liner en route from New York to Liverpool, was sunk by a German U-boat 11 miles off the coast of Ireland. The ship’s sinking, which resulted in the death of 128 of the 139 Americans aboard, became a symbol of German evil and helped psychologically prepare the US public for their country’s eventual entry into WWI. But every facet of the story of the Lusitania as it has been presented to the public was a deliberate lie or a lie by omission.
The boat was not a purely civilian vessel carrying 3,813 40-pound (unrefrigerated) containers of “cheese” and 696 containers of “butter,” as the official manifest held, but guncotton, in keeping with the shipment’s stated destination: the Royal Navy’s Weapons Testing Establishment.
It was not the victim of a cowardly German surprise attack (the German Embassy placed a warning notice about the Lusitania in 50 American newspapers right next to Cunard’s own listings).
And the American ambassador to England at the time, Walter Hines Page, wrote to his son five days before the ship was sunk, asking: “If a British liner full of American passengers be blown up, what will Uncle Sam do? That’s what’s going to happen.”
So what did the official cover-up of the incident conclude? That the dastardly Germans had waged a perfidious sneak attack on an innocent peace boat, of course. And the rest, as they say, is history.
WWII
A little over two decades later, America’s entry into WWII came when the Japanese attacked Pearl Harbor in December 1941, killing over 2,400 American servicemen and civilians. But far from an unprovoked sneak attack, as the official government-approved history would have you believe, Pearl Harbor is best understood as a conspiracy to motivate the American public for war by first provoking and then allowing a Japanese strike on American targets.
This is not even a controversial idea; it was commonly understood and discussed by many in the Roosevelt administration at the time. Henry Stimson, the US Secretary of War, noted in his diary that just the week before the attack President Roosevelt had told him “we were likely to be attacked perhaps (as soon as) next Monday” and then solicited Stimson’s advice on “how we should maneuver them [the Japanese] into the position of firing the first shot without allowing too much danger to ourselves.” Around the same time, Roosevelt sent a message to all military commanders stating that “The United States desires that Japan commit the first overt act.”
So how did FDR and his administration provoke the Japanese into attacking?
In late 1940, Roosevelt ordered the United States Fleet to be relocated from San Pedro to Pearl Harbor. The order incensed Admiral James Richardson, Commander-in-Chief of the US Fleet, who complained bitterly to FDR about the nonsensical decision: It left the fleet open to attack from every direction, it created a 2,000-mile-long supply chain that was vulnerable to disruption, and it packed the ships in together at Pearl Harbor, where they would be sitting ducks in the event of a bombing or torpedo raid. FDR, unable to counter these objections, went ahead with the plan and relieved Richardson of his command.
Then in June 1941, Secretary of the Interior Harold Ickes wrote a memo advising FDR to embargo Japanese oil in order to goad them into war: “There might develop from the embargoing of oil to Japan such a situation as would make it, not only possible but easy, to get into this war in an effective way.” Roosevelt followed through weeks later with an order seizing Japanese assets in America and effectively preventing Japan from purchasing much-needed American oil, which at that time accounted for four-fifths of Japanese oil imports.
The provocations had their intended effect, and the Americans listened in on Japanese war preparations via radio. They received warnings of an imminent attack from diplomatic officials and military attachés. The attack was even predicted by the Honolulu Advertiser days before it happened. But all of these warnings were ignored. Even today, nearly 80 years after the events, new documents and memos continue to be found showing more warnings that Roosevelt and his administration deliberately ignored in the run-up to the attack.
FDR got his wish. The Japanese attack was successful: 2,400 Americans died, and the nation, outraged, responded by rallying around the flag and jumping enthusiastically into war.
But the Japanese themselves were no innocents when it came to lying their way into war. Ten years before Pearl Harbor, in 1931, Japan was looking for a pretext to invade Manchuria. On September 18th of that year, a lieutenant in the Imperial Japanese Army detonated a small amount of TNT along a Japanese-owned railway in the Manchurian city of Mukden. The act was blamed on Chinese dissidents and used to justify the invasion and occupation of Manchuria. When the lie was later exposed, Japan was diplomatically shunned and forced to withdraw from the League of Nations.
The Korean War
The League of Nations fell apart precisely for its inability to prevent World War II. Its successor organization, the United Nations, engaged in its own war lies shortly after its creation to ensure that it would not meet the same fate.
The Korean War, waged under the UN flag and sold to the public as a virtuous mission to save the South from the North’s communist aggression, was on its face a war that should never have happened. The division of Korea into North and South was not the organic decision of the Korean people, but a plan that originated in an article in 1944 in Foreign Affairs, the journal of the Council on Foreign Relations, which suggested dividing the country up and putting its administration in the hands of the Allies, including the Soviets. When the newly-founded UN put that plan into action in 1945, Korea was arbitrarily divided along the 38th parallel, with the US administering the South and the Soviet Union administering the North.
Neither was the war itself the organic result of decisions taken by the Korean people. In 1949, Owen Lattimore, a member of the Carnegie and Rockefeller-funded Institute for Pacific Relations and an advisor to the State Department on East Asian issues, wrote: “The thing to do is let South Korea fall, but not to let it look as if we pushed it.” In a speech at the National Press Club the following year, Secretary of State Dean Acheson placed Korea outside of the US’ “defensive perimeter of the Pacific,” stating that any attack that took place outside of that perimeter would have to be dealt with “under the Charter of the United Nations.” Taking this as a green light, the North Koreans, heavily fortified and equipped with Soviet military aid, invaded the South.
The war began on June 27, 1950, when the UN Security Council passed a resolution calling for members to provide military assistance “to restore international peace and security in the area.” The Soviet Union, being a veto-wielding member of the Council, could have vetoed the resolution and prevented the UN from engaging in the war, but they abstained from the vote altogether.
When General MacArthur, leading the UN forces, managed to repel the North right to the Chinese border, he was prevented from completing the mission by Truman, who would not authorize any operations north of the Soviet-held 38th parallel unless there was no chance of confrontation with either Chinese or Soviet forces. MacArthur, shocked by this development, wrote in a letter years later: “Such a limitation upon the utilization of available military force to repel an enemy attack has no precedent either in our own history or, so far as I know, in the history of the world. [. . .] To me it clearly foreshadowed the tragic situation which has since developed and left me with a sense of shock I had never before experienced in a long life crammed with explosive reactions and momentous hazards.”
In the end, the bloody Korean conflict ended not with a peace deal but a ceasefire. Not with the reunification of the Korean peninsula but with the establishment of a demilitarized zone to keep them separated. Nearly three million civilians died during the fighting, and the country was torn to pieces, all in the name of a military action under the UN flag that should never have escalated into war in the first place.
The Vietnam War
In August of 1964, President Johnson was preoccupied in finding an excuse to justify a formal escalation of American military involvement in Vietnam. That excuse came on August 2nd when the USSMaddox, a destroyer supposedly on a peaceful mission in international waters, reported a surprise attack from North Vietnamese torpedo boats in the Gulf of Tonkin. Just two days later it reported another attack. Johnson responded by launching retaliatory strikes and signing the Gulf of Tonkin Resolution, thus formally launching the Vietnam War.
Years later, it was revealed that the story of the Maddox, too, had been a tissue of lies. The Maddox was not peacefully drifting near Vietnamese waters, minding its own business; it was part of a covert electronic warfare campaign assisting the South Vietnamese in launching attacks on the North. It had not been attacked out of the blue on August 2nd, as originally reported, but in fact had fired first. And, as even the NSA’s own internal publication, made available to the public for the first time 40 years after the incident, concluded, the second attack on August 4th had never taken place at all.
But these were mere details, and, just like the facts about the Lusitania and Pearl Harbor, these details were suppressed long enough for the event to have its intended effect: rallying the public for war.
The Six-Day War
The Six-Day War in 1967 between Israel and Egypt, Syria and Jordan is yet another example of a war which was justified for reasons that were later exposed as lies.
When Israel launched an attack on Egypt’s airfields on the morning of June 5th, they initially claimed that it was a defensive strike and that Egypt had struck first. But this was an easily proven lie, and the claim was quickly dropped.
Next they claimed that the attack was “preemptive self defense” and that Egypt and its Arab allies had been preparing to strike Israel. But multiple Israeli officials, including Yitzhak Rabin, later admitted that Egypt had not been preparing a war, or even interested in one.
And then, in the most outrageous incident of all, Israel attempted to get America involved in the war by attacking the USS Liberty, a US technical research ship collecting electronic intelligence just outside Egypt’s territorial waters at the time of the war. The attack, carried out by Israeli fighter jets and torpedo boats, was relentless. The Liberty was strafed and torpedoed repeatedly, with the crew sending distress messages and even hoisting a large American flag so there could be no doubt as to their identity.
The Israeli attack was finally called off an hour and a half into the assault. Israel, caught in a blatant attempt to sink an American ship, offered an “apology” for “mistaking” the identity of the vessel. But it was no mistake. In 2007 the NSA declassified intercepts confirming that the Israelis knew they were attacking an American ship, not an Egyptian ship as their cover story has maintained.
Even mainstream historians now characterize Israel’s attack on the Liberty as “a daring ploy by Israel to fake an Egyptian attack on the American spy ship, and thereby provide America with a reason to officially enter the war against Egypt.” But the incident was soon memory-holed, and to this day the Six-Day War is portrayed as an act of “preemptive self defense” by the valiant Israelis against the dastardly Arab aggressors.
Gulf War 1
By the 1990s, the post-Vietnam public was growing increasingly wary of calls for war in far-flung corners of the world in countries many had never heard of. And so it was that in 1990, when the politicians and their deep state controllers required the American public to be motivated to wage war against Iraq for its invasion of Kuwait, they hired a literal PR firm to sell an even more brazen set of lies to Joe Sixpack and Jane Soccermom.
The most famous of these lies revolved around Nayirah, a “young Kuwaiti girl” who sparked international headlines for her shocking testimony before the Congressional Human Rights Caucus in October 1990. In a tear-stained speech she told a harrowing story of the horrors she witnessed being committed by Iraqi soldiers at a Kuwaiti hospital where she was volunteering.
NAYIRAH: I volunteered at the Aladein hospital with 12 other women who wanted to help as well. I was the youngest volunteer. The other women were from 20 to 30 years old. While I was there, I saw the Iraqi soldiers come into the hospital with guns. They took the babies out of the incubators . . . took the incubators and left the children to die on the cold floor!
It is difficult today to understand just how important this testimony was in setting the tone of the debate about whether America should commit military forces to defend Kuwait. It was reported breathlessly on the evening news, and it was repeated by President Bush on not one or two occasions, but six separate times in the lead up to war.
GEORGE H. W. BUSH: . . . babies pulled from incubators and scattered like firewood across the floor…
SOURCE: Nayirah Episode of 60 Minutes
GEORGE H. W. BUSH: . . . and they had kids in incubators, and they were thrown out of the incubators so that Kuwait could be systematically dismantled.
Then, when the Gulf War Resolution was making its way through the House, the incubator story was raised in Congress:
REP. HENRY HYDE: Now is the time to check the aggression of this ruthless dictator whose troops have bayoneted pregnant women and have ripped babies from their incubators in Kuwait.
And then again in the Senate. The vote passed and combat operations formally began in January 1991.
The only problem? “Nayirah” was not some anonymous Kuwaiti girl, but, as a subsequent CBC investigation discovered, she was Nayirah Al-Sabah, daughter of Saud Al-Sabah, the Kuwaiti Ambassador to the United States. Her testimony had been written for her by Hill & Knowlton, a PR agency hired by the Kuwaiti government-supported astroturf organization, the “Citizens For A Free Kuwait,” to help sell the Gulf War. And the “Congressional Human Rights Caucus” that held the hearing where Nayirah gave her testimony? It was later found to be a Hill & Knowlton front itself.
Gulf War II
As everyone knows by now, the second Gulf War, in 2003, was also built on lies. We all remember the lies about Saddam’s WMDs and the way that story was sold to the public by Colin Powell at the UN. But this time the media took the driver seat in the campaign to sell the war to the public.
The New York Times led the way with Judith Miller‘s now-infamous reporting on the Iraqi WMD story, now known to have been based on false information from untrustworthy sources, but the rest of the media quickly fell into line, with the NBC Nightly News asking “what precise threat Iraq and its weapons of mass destruction pose to America” and Time debating whether Hussein was “making a good-faith effort to disarm Iraq’s weapons of mass destruction.” Reports about chemical weapons stashes were reported on before they were confirmed, although headlines boldly asserted their existence as indisputable fact. And any media personality that showed skepticism about the claims being made—even wildly popular ones like Phil Donahue, host of MSNBC’s then highest-rated program—were summarily removed from the air.
PHIL DONOHUE: Scott Ritter is here and so is Ambassador . . .
BILL MOYERS: You had Scott Ritter, former weapons inspector, who was saying that if we invade, it will be a historic blunder.
DONOHUE: Yes. You didn’t have him alone. He had to be there with someone else who supported the war. In other words, you couldn’t have Scott Ritter alone. You could have Richard Perle alone.
MOYERS: You could have the conservative.
DONOHUE: You could have the supporters of the President alone. And they would say why this war is important. You couldn’t have a dissenter alone. Our producers were instructed to feature two conservatives for every liberal.
We now know that in fact the stockpiles did not exist and the administration premeditatedly lied the country into yet another war, but the most intense opposition the Bush administration ever received over this documented war crime was some polite correction on the Sunday political talk show circuit.
DONALD RUMSFELD: You and a few other critics are the only people I’ve heard use the phrase “immediate threat.” I didn’t. The president didn’t. And it’s become kind of folklore that that’s what’s happened. The president went—
BOB SCHIEFFER: You’re saying that nobody in the administration said that—
RUMSFELD: I can’t speak for nobody— . . . and everybody in the Administration and say nobody said that.
SCHIEFFER: The Vice-President didn’t say that?
RUMSFELD: If you have any citations I’d like to see them.
THOMAS FRIEDMAN: “Some have argued that the nu—” this is you speaking “some have argued that the nuclear threat from Iraq is not imminent, that Saddam is at least five to seven years away from having nuclear weapons. I would not be so certain.”
RUMSFELD: Mm-hmm.
FRIEDMAN: That’s close to “imminent.”
RUMSFELD: Well, I’ve tried to be precise and I’ve tried to be accurate. Sometimes—
FRIEDMAN: “No terror state poses a greater or more immediate threat to the security of our people and the stability of the world than the regime of Saddam Hussein in Iran.”
RUMSFELD: Mm-hmm.
The Libya Intervention
The WMD story blew up in the neocons’ face shortly after the war, but by that time they had already succeeded in their plan to reshape the Middle East. But for the would-be controllers of public opinion, a valuable lesson was learned: “Human rights” and “protecting the innocent” is a more effective lie to sell to the public to motivate them for war. So when it came time to sell the war on Libya to the public, the UN-backed, NATO-led aggressors once again donned the cloak of “human rights” by turning to none other than the UN’s Human Rights Council.
The process that launched the intervention was begun by a coalition of 70 non-governmental organizations, which issued a joint letter urging the UN to suspend Libya from the Human Rights Council and for the Security Council to invoke the so-called “responsibility to protect” principle in protecting the Libyan people from alleged atrocities being committed by the Libyan government.
In a special session on the issue on February 25th, 2011, the UN Human Rights Council adopted a resolution affirming the NGOs’ recommendations. The resolution was adopted without a vote.
The Security Council immediately passed resolutions 1970 and 1973, authorizing the establishment of a “no-fly zone on Libyan military aviation” for the “protection of civilians” and the “delivery of humanitarian assistance.” Three days later, using the resolution as its justification, the US, UK and France began bombing the population of Libya.
Meanwhile, the International Criminal Court’s Chief Prosecutor, Luis Moreno-Ocampo, began working on the legal basis for the invasion. He drafted the request for the Court’s judges to issue an arrest warrant for Gaddafi for crimes against humanity. Although NATO forces were already engaged in an invasion of the country on the basis of undocumented allegations by a group of NGOs, Moreno-Ocampo’s request was not issued until May 16th.
On June 28th, the day after the judges agreed to issue the warrant, Moreno-Ocampo participated in a press conference in which one reporter asked about the evidence that Gaddafi had ever engaged in the atrocities he was accused of.
LUIS MORENO-OCAMPO: I advise you to read the application of the prosecutor’s office. Many pages. I think it was 77 pages. We describe in detail the facts. Most of it is public and the judges also decided on the evidence. So of course we are prosecutors and judges, so we rely on facts, so we prove the crimes. That’s what we did.
Although the document that Moreno-Ocampo urges the public to read to understand the evidence of Gaddafi’s crimes is indeed public, and is 77 pages long, the version made available to the public has been heavily redacted. In fact, of the 77 pages, 54 of them have been redacted, comprising the entire section of the document dealing with the evidence for the charges themselves.
The most sickening part of this war lie is just how obvious it was. No one involved in this charade cared about the well-being of the Libyan people. Not the press, not the politicians, not the ICC prosecutors. And as a result, today, seven years after the destruction of Libya at the hands of the United Nations-sanctioned NATO “saviours,” open-air slave markets are running in the country that the human rights crusaders once pretended to care about.
Conclusion
False flags. Provocateur conflicts. Fake news and fake human rights crusades. Throughout the last century, a host of methods have been employed to keep the public playing the military-industrial complex’s game. And over that century, the blood of untold millions has flowed as a direct result of these war lies.
Truth is the first casualty of war, as they say. But if we desire peace, then we must confront the liars with our knowledge of these war lies. And armed with this truth, the public finally stands a chance of stopping the next war before the warmongers can conjure it into existence.
The global rollout of 5G is well underway, and we soon may see new small cell towers near all schools, on every residential street, dispersed throughout the natural environment, and pretty much everywhere.
The new cell network uses high band radio frequency millimeter waves to deliver high bandwidth data to any device within line of sight.
“Today’s cellular and Wi-Fi networks rely on microwaves – a type of electromagnetic radiation utilizing frequencies up to 6 gigahertz (GHz) in order to wirelessly transmit voice or data. However, 5G applications will require unlocking of new spectrum bands in higher frequency ranges above 6 GHz to 100 GHz and beyond, utilizing submillimeter and millimeter waves – to allow ultra-high rates of data to be transmitted in the same amount of time as compared with previous deployments of microwave radiation.” [Source]
“One of the ways 5G will enable this is by tapping into new, unused bands at the top of the radio spectrum. These high bands are known as millimeter waves (mmwaves), and have been recently been opened up by regulators for licensing. They’ve largely been untouched by the public, since the equipment required to use them effectively has typically been expensive and inaccessible.” [Source]
Among the many potential problems with exposure to 5G radio waves are issues with the skin, which is interesting when you consider that this technology is already being used in the military for crowd control purposes.
“This kind of technology, which is in many of our homes, actually interacts with human skin and eyes. The shocking finding was made public via Israeli research studies that were presented at an international conference on the subject last year.
“Below you can find a lecture from Dr. Ben-Ishai of the Department of Physics at Hebrew University. He goes through how human sweat ducts act like a number of helical antennas when exposed to these wavelengths that are put out by the devices that employ 5G technology.” [Source]
The U.S. military developed a non-lethal crowd control weapon system called the Active Denial System (ADS). It uses radio frequency millimeter waves in the 95GHz range to penetrate the top 1/64 of an inch layer of skin on the targeted individual, instantly producing an intolerable heating sensation that causes them to flee.
This technology is becoming ubiquitous in top world militaries, demonstrating how genuinely effective this radio frequency energy can be at causing harm to humans and anything else.
“U.S., Russian, and Chinese defense agencieshave been active in developing weapons that rely on the capability of this electromagnetic technology to create burning sensations on the skin, for crowd control. The waves are Millimetre waves, also used by the U.S. Army in crowd dispersal guns called Active Denial Systems.” [Source]
Final Thoughts
The fight over 5G is heating up at the community level, and awareness of this important issue is spreading fast. For more background on 5G, watch this video from Take Back Your Power, featuring Tom Wheeler, Former FCC Chairman and corporate lobbyist, who delivers a rather intimidating and presumptuous speech praising this new technology.
The fight over 5G is heating up at the community level, though, and now is the time to speak out against it.