Yet another manifestation of the Military BioTech Complex I was telling you about, bridging Silicon Valley, Davos and China.
Their words, my research:

Immunization: an entry point for digital identity

ID2020

ID2020 Mar 28, 2018

With World Health Day around the corner on April 7th, we’d like to bring attention to the intersection of global health and digital identity, and specifically the opportunity for immunization rates to scale digital identity amongst the most hard-to-reach children.

Globally, an estimated 95% of children receive at least one dose of some vaccine. This number is staggering — no other public health intervention reaches more children and impacts more families.

Yet, despite this high initial contact rate, only 37% of children in the world’s poorest countries are fully immunized, meaning that they receive their full course of recommended vaccines. Ultimately, many children are left without comprehensive protection and vulnerable to many vaccine-preventable diseases.

Percentage of children reached with the last dose of seven vaccines recommended across all Gavi-supported countries and of three vaccines specific to certain regions (Source: Gavi 2016 Annual Progress Report http://www.gavi.org/progress-report/)

There are several reasons for low coverage rates, including the low quality of population data and reliance on outdated systems to track immunizations, but one critical challenge is the continued use of paper-based systems to record the doses that have been administered and indicate when a child needs to return for boosters. Unfortunately, the paper records kept within a clinic are often difficult to analyze and the immunization cards given to families are prone to loss and inaccuracies. Without a persistent, portable record that can be uniquely linked to the child, it’s often difficult to ascertain the care a child needs.

In November, Dr. Seth Berkley, CEO of Gavi, the Vaccine Alliance, wrote a piece for Nature that emphasized the pressing need to move to digital systems — specifically those to identify and track those currently missing out — to achieve 100% immunization coverage.

One of the biggest needs is for affordable, secure digital identification systems that can store a child’s medical history, and that can be accessed even in places without reliable electricity. That might seem a tall order, but it is both achievable and necessary.

This message was reinforced at this year’s World Economic Forum meeting in Davos, Switzerland, where Gavi announced digital identity as the focus for its 2018 INFUSE program. INFUSE — Innovation for Uptake, Scale and Equity in Immunization — aims to identify and support innovative solutions that have the potential to modernize global health and immunization delivery. This year, Gavi is focusing its efforts on identifying opportunities for digital identity technologies to help facilitate better targeting, follow-up, and immunization service delivery for the world’s most vulnerable children.

Immunization poses a huge opportunity to scale digital identity — in many developing countries, immunization coverage greatly exceeds birth registration rates. According to best available estimates, upwards of 95% of children globally receive at least one dose of one vaccine (with 86% of children globally receiving the full three doses recommended of the diphtheria-tetanus-pertussis vaccine, which is commonly used to measure immunization coverage).

When a child receives her first vaccine, she receives a paper child health card. In many developing countries, the most common form of identification is not a birth certificate, but this card. The near ubiquity of these documents presents an enormous opportunity.

Moving from easily lost or damaged paper health cards to an accessible digital form would reduce the burden associated with tracking a child’s vaccines and eliminate redundant or unnecessary paperwork. Digital child health cards can improve coverage rates and vaccine compliance by prompting parents to bring their children in for necessary subsequent doses. For health workers, digital identity technology validates a child’s past vaccines and may streamline analytics and outreach, without adding significant complexity to a health worker’s workflow. And for Gavi and its international partners, digital ID technology provides a basis for a system of verifiable proofs and accurate aggregate data that interoperates with other identity management systems, negating the need for each organization to independently identify beneficiaries.

And because immunization is conducted in infancy, providing children with a digital child health card would give them a unique, portable digital identity early in life. And as children grow, their digital child health card can be used to access secondary services, such as primary school, or ease the process of obtaining alternative credentials. Effectively the child health card becomes the first step in establishing a legal, broadly recognized identity.

In turn, having a persistent and portable health record uniquely tied to the child will help to increase full immunization coverage rates by prompting follow-up and better targeting the most hard to reach children.

In order to enable digital identity at scale, we will need to identify and leverage many entry points. Immunization service delivery presents a tremendous opportunity to provide children with a durable, portable and secure digital identity early in life, enabling access to a wider range of social services, while also improving access to the health interventions all children need and deserve.

We’re proud to partner with Gavi and excited to see the innovations proposed as part of the INFUSE Challenge. To all innovators: the deadline to apply for the program is April 10th, so please get those applications in!

INFUSE 2018 is calling for proven digital technology innovations — adapted to low-resource environments in developing countries — to help identify and register children, especially girls, who are at risk of missing out on life-saving vaccines. 

Launched at Davos in 2016, Innovation for Uptake, Scale and Equity in Immunisation (INFUSE) helps improve vaccine delivery systems by connecting high-impact, proven innovations with the countries that need them most.
It then “infuses” them with capital and expertise to help take them to scale.

GAVI

“Since 2016, ID2020 has advocated for ethical, privacy-protecting approaches to digital ID.

For the one in seven people globally who lacks a means to prove their identity, digital ID offers access to vital social services and enables them to exercise their rights as citizens and voters and participate in the modern economy. But doing digital ID right means protecting civil liberties and putting control over personal data back where it belongs…in the hands of the individual.

Every day, we rely on a variety of forms of identification to go about our lives: our driver’s license, passport, work badge and building access cards, debit and credit cards, transit passes, and more.

But technology is evolving at a blinding pace and many of the transactions that require identification are today being conducted digitally. From e-passports to digital wallets, online banking to social media accounts, these new forms of digital ID allow us to travel, conduct business, access financial and health records, stay connected, and much more.

While the move to digital ID has had many positive effects, it has been accompanied by countless challenges and setbacks, including large-scale data breaches affecting millions of people. Most of the current tools are archaic, insecure, lack appropriate privacy protections and commoditize our data. But that’s about to change and ID2020 is leading the charge.

We are businesses, nonprofits, governments and individuals…working in collaboration to ensure that the future of digital identity is, indeed, #goodID.” – ID2020.org

Gavi and Zenysis Technologies to bring data and artificial intelligence to immunisation programmes

The partnership supported by Asia’s largest internet services company Tencent will help developing countries reach more children with life-saving vaccines

Geneva, 12 March 2019 – Gavi, the Vaccine Alliance and Zenysis Technologies, a Silicon Valley startup, have established a new strategic partnership that will help low-income countries harness the power of big data and artificial intelligence to improve childhood vaccination programs around the world.

Zenysis Technologies was identified by Gavi, through the INFUSE (Innovation for Uptake, Scale and Equity in Immunisation) yearly call for innovation. INFUSE aims to identify proven solutions which, when brought to scale, have the greatest potential to modernise global health and immunisation delivery.

What the team at Zenysis has built and accomplished to date is in a class of its own. 

David Wallerstein, Tencent’s Chief Exploration Officer

A two-year partnership will provide countries with the Zenysis’ software platform, analytical training and IT skills development. Countries will use the platform’s capabilities to integrate data from their fragmented information systems and help decision-makers see where children are not receiving vaccines. Advanced analytics will then help countries decide how to target their limited resources for maximum impact.

“Weak immunisation data leads to poor planning, often meaning that children, whether they live in urban slums or remote rural outposts, miss out on lifesaving vaccines. Digital transformation of immunisation data and analytics is key to making sure that all children are protected from vaccine-preventable diseases,” said Gavi CEO Dr Seth Berkley. “Our partnership with Zenysis has the potential to increase efficiency and reduce costs for developing countries but, most importantly, it could save lives.”

Since its inception three years ago, Zenysis has expanded into ten countries that now use its software to improve health programs serving over one billion people. The company’s software has been used to optimise nationwide vaccination campaigns allowing for reinvestment in other lifesaving health programs.

“Gavi, the Vaccine Alliance has helped over 70 countries vaccinate more than 700 million children in low income countries,” said Zenysis CEO, Jonathan Stambolis. “However, weak and fragmented information systems at the country level mean that millions of the world’s most vulnerable children have been left behind. We have assembled one of the strongest software engineering teams in Silicon Valley to build the software countries need to address this urgent global health challenge and our partnership with Gavi and Tencent will ensure that technology benefits the countries that need it most.”

We have assembled one of the strongest software engineering teams in Silicon Valley to build the software countries need to address this urgent global health challenge… 

Jonathan Stambolis, Zenysis CEO

The company expects to reach at least fifteen more countries in 2019. This will include Pakistan, where Zenysis will be working with government authorities and Gavi to improve vaccination coverage and equity as well as to accelerate the country’s progress towards a polio-free future. The project has the backing of one of Zenysis’ investors, internet services giant Tencent Holdings, Asia’s largest company. Tencent investment of US$ 4.5 million will be matched by the Gavi Matching Fund.

“We are very excited about the potential for artificial intelligence to transform child health on a global scale”, said David Wallerstein, Tencent’s Chief Exploration Officer.  “I look at hundreds of the fastest-growing startups every year. What the team at Zenysis has built and accomplished to date is in a class of its own. The company’s software will help governments become more effective and targeted at every step of the vaccination challenge, and move with the urgency and speed required to realise Gavi’s vision of a world free of vaccine-preventable illnesses”.

The official Memorandum of Understanding establishing this landmark partnership between Gavi and Zenysis Technologies was signed by Gavi’s CEO Dr Seth Berkley and the Zenysis CEO Jonathan Stambolis in Abu Dhabi during the Gavi Mid-Term Review high-level conference.

I think we’re done here.
But I’ll update this if anything worth noting comes along.

UPDATE DECEMBER 5, 2021

RT

CNN

UPDATE:

CLICK HERE TO SEE THE JANUARY 2022 FOLLOW-UP STORY

2008: Klaus Schwab presents his vision of a ” Global Corporate Citizenship”

To be continued?
Our work and existence, as media and people, is funded solely by our most generous readers and we want to keep this way.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

ORDER

Remember: “The war abroad always comes home”.
And this one “starts with hyper-connectivity”.

“Cognitive warfare, when practiced effectively has strength, an insidious nature and disrupts our ordinary understandings and reactions to events. The term, cognitive warfare, requires some dissection and interpretation in the context of national security; broadly defined it is a disinformation process to psychologically wear down the receivers of the information. It is strategically spread through information resources like social media, networking, Internet resources, videos, photos taken out of context, simplistic resources like political cartoons and even well-planned websites that encourage the making of disinformation.”

Diana Mackiewicz
University of Massachusetts Lowell – Cognitive Warfare – Conference: INSS-Summer Institute 2018, Tel Aviv, Israel

Canada – NATO Innovation Challenge Fall 2021: Cognitive Warfare – 2021

Informational webinar on October 5th as Canada hosts the Fall 2021 NATO Innovation Challenge organized by Canadian Special Operations Forces Command (CANSOFCOM), Innovation for Defence Excellence and Security (IDEaS) and the NATO Allied Command Transformation (ACT) iHub. Innovators will have the opportunity to familiarize themselves with the concept of Cognitive Warfare as well as the Innovation Challenge’s eligibility requirements, application process and timeline.

Commenting on the video above, The Gray Zone notes:

The other institution that is managing the Fall 2021 NATO Innovation Challenge on behalf of Canada’s Department of National Defense is the Special Operations Forces Command (CANSOFCOM).

A Canadian military officer who works with CANSOFCOM, Shekhar Gothi, was the final panelist in the October 5 NATO Association of Canada event. Gothi serves as CANSOFCOM’s “innovation officer” for Southern Ontario.

He concluded the event appealing for corporate investment in NATO’s cognitive warfare research.

The bi-annual Innovation Challenge is “part of the NATO battle rhythm,” Gothi declared enthusiastically.

He noted that, in the spring of 2021, Portugal held a NATO Innovation Challenge focused on warfare in outer space.

In spring 2020, the Netherlands hosted a NATO Innovation Challenge focused on Covid-19.

Gothi reassured corporate investors that NATO will bend over backward to defend their bottom lines: “I can assure everyone that the NATO innovation challenge indicates that all innovators will maintain complete control of their intellectual property. So NATO won’t take control of that. Neither will Canada. Innovators will maintain their control over their IP.”

The comment was a fitting conclusion to the panel, affirming that NATO and its allies in the military-industrial complex not only seek to dominate the world and the humans that inhabit it with unsettling cognitive warfare techniques, but to also ensure that corporations and their shareholders continue to profit from these imperial endeavors.

thegrayzone.com

SOURCE

Considerations on resilience

Since the early days of the Alliance, NATO has played an essential role in promoting and enhancing civil preparedness among its member states. Article 3 of the NATO founding treaty establishes the principle of resilience, which requires all Alliance member states to “maintain and develop their individual and collective capacity to resist armed attack.” This includes supporting the continuity of government, and the provision of essential services, including resilient civil communications systems.

NATO
SOURCE

A Taipei think tank and observers in Taiwan say China is trying to influence residents with “cognitive warfare,” hoping to reverse opposition to Beijing’s desired takeover of Taiwan so it can be accomplished without having to go to war.

Taiwanese attitudes have been drifting away from the mainland, especially among the younger generation, whose members see themselves “born independent” with no ties to China.

China’s effort, these analysts say, includes tactics ranging from military intimidation and propaganda to misinformation spread by its army of online trolls in a bid to manipulate public opinion. They say the complexity and frequency of the effort puts Taiwan on a constant defensive.

“Its ultimate goal is to control what’s between the ears. That is, your brain or how you think, which [Beijing] hopes leads to a change of behavior,” Tzeng Yi-suo, director of the cybersecurity division at the government-funded Institute of National Defense and Security Research in Taipei, told VOA.

Campaign intensifies amid COVID

Cognitive warfare is a fairly new term, but the concept has been around for decades. China has never stopped trying to deter the island’s separatists, according to Tzeng, who wrote about the Chinese efforts last month in the institute’s annual report on China’s political and military development.

Liberal democracies such as Taiwan, that ensure the free flow of information, are vulnerable to cognitive attacks by China, while China’s tightly controlled media and internet environment makes it difficult for democracies to counterattack, according to Tzeng.

China’s campaign has intensified since the outbreak of COVID-19, using official means such as flying military jets over Taiwan, and unofficial channels such as news outlets, social media and hackers to spread misinformation. The effort is aimed at dissuading Taiwan from pursuing actions contrary to Beijing’s interests, the report said.

China has used these tactics to attack Taiwan President Tsai Ing-wen’s administration, undermine support for democracy and fuel Taiwan’s social tensions and political divide, it said.

NATO Releases Disturbing Stance on Cognitive Warfare

By Malcolm Harris – October 14, 2021  – Verity Weekly

Cyber and economic warfare are often seen as the future of war. There is, however, a new type of warfare being discussed. It is called “cognitive warfare.”

Cognitive warfare, similar to information warfare, involves the the swaying of public opinion as a means of war. What differentiates the two, is that information warfare is simply defined as the manipulation of public opinion via propaganda. Cognitive warfare, on the other hand, involves the literal manipulation of the human brain. Seems far fetched? Well according to a NATO-sponsored study, it is now being classified as a “sixth domain” of warfare. While even acknowledging the horrific dangers of this type of warfare, the report goes on to claim NATO should develop the means to use cognitive warfare to get ahead of China and Russia. There is far from any proof that either countries are developing cognitive warfare capabilities, with reports of information warfare being falsely labelled as “cognitive warfare.” The NATO Association of Canada has even admitted that cognitive warfare is “one of the hottest topics” for the military alliance.

The fact that NATO is lying about the ambitions of its enemies when it comes to developmental warfare is not surprising. Since the collapse of the Soviet Union, NATO has repeatedly exaggerated the threat of Russia in order to expand its influence eastward. Could the US government use these false pretexts in order to convince the public that cognitive control over our minds is necessary to defend ourselves? If you think that’s far fetched, then just look at how successful the government was in pushing for vaccines on children. Despite the overwhelming evidence that vaccines for children are unnecessary (studies have shown children are more likely to die from the vaccine than COVID-19 itself), the government has successfully manipulated a large portion of the public into believing they are indeed necessary. In the future, will some people be convinced to willingly volunteer to have chips placed in their heads, in order to protect themselves from “Russian cognitive attacks”?

SOURCE

Speaking to the South China Morning Post, Lu Li-shih, a former teacher at the Republic of China Naval Academy, said: “This staged photograph is definitely ‘cognitive warfare’ to show the US doesn’t regard the PLA [People’s Liberation Army] as an immediate threat.
“In the photo, Commander Briggs looks very relaxed with his feet up watching the Liaoning ship just a few thousand yards away, while his deputy is also sitting beside him, showing they take their PLA counterparts lightly.”
One Hong Kong newspaper reported that the photo sent one clear message to China: “We’re watching you.”
The image comes as the US and the Philippines begin two weeks of military drills in a show of force against China after hundreds of ships anchored off Whitsun reef last month.

Naval officers watch the Liaoning

COGNITIVE WARFARE

By Emily Bienvenue, Zac Rogers & Sian Troath May 14, 2019  THE COVE (Australian Defense publication)


The term cognitive warfare has entered the lexicon over the last couple of years. General David L. Goldfein (United States Air Force) remarked last year we are “transitioning from wars of attrition to wars of cognition”. Neuroscientist James Giordano has described the human brain as the battlefield of the 21st Century. Cognitive warfare represents the convergence of all that elements that have lived restlessly under the catch-all moniker of Information Warfare (IW) since the term’s emergence in the 1990s. However, military and intelligence organisations now grappling with this contentious new concept are finding cognitive warfare to be something greater than, or as Gestalt intended, different than, the sum of these parts. Cognitive warfare is IW with something added. As we begin to understand more about what has been added, awareness is growing that western military and intelligence organisations may have been caught playing the wrong game.

As Martin Libicki explained, IW burst onto the scene in the early 1990s in line with the shift from attrition-based to effects-based operations and the increasingly digitised and networked infrastructure underpinning contemporary warfare. It overarched lines of effort in intelligence, surveillance and reconnaissance (ISR), electronic warfare (EW), psychological operations (PSYOPS), and cyber operations that in general raised the need to contend for and take advantage of control of information flows. These elements overlapped but remained disparate and lacked a unified concept and unity of effort. Despite the desire for integration being an ever-present agenda item, such unity did not eventuate and the individual streams continued to evolve, driven by more-or-less separate military and intelligence communities of interest.

The various elements under the IW construct were largely pursued throughout the ensuing period as adjuncts in support of objectives defined by the traditional remit of military organisations – namely, to deliver lethal kinetic effects on the battlefield. The War on Terror provided an unconventional sandbox for the refining of IW elements; but again, little impetus emerged for their drawing together under a unified concept. Influence operations across both cyber and human terrains remained episodic and an adjunct to a kinetic main effort – even while the separation between victory on the battlefield and the capacity for enduring political successes became starker. The disconnect should have been more unnerving for Western military organisations. The capacity for an adversary to contend for battlefield victory below the threshold of conventional conflict is only one aspect of asymmetry. The disconnect raises the more fundamental question of why, if battlefield superiority was demonstrably not resulting in political success, would a conventionally inferior opponent pursue such a pathway at all? What if strategic success – the causing of a preferable behaviour change in those with which we contend – could bypass the traditional battlefield altogether?

For the nation-state adversaries of the US and its allies, the disconnect provided an opportunity to observe and to learn. While the ‘winning without fighting’ ethos is a well understood heuristic of Chinese strategic culture, as Wirtz has suggested also, Russian strategic culture has consistently excelled at imagining some of the non-intuitive and strategic level implications of technological change. Much more than mere opportunism, Russia’s unfavourable geo-strategic circumstances, combined with its deep distrust of US intentions, forced it to render strategic level gains from a weakening hand. Here-in lies the temporary advantage it gained in finding and filling the gap between IW and cognitive warfare. As Clint Watts has surmised, where IW described a war of information, the cognitive battlespace is a war for information as it is transformed into knowledge via the processes of cognition. The technologies of the networked digital age, conceived by the US and its allies as an accumulation of advantages on the conventional battlefield, and unleashed by the clamour for profit of the commercial sector, were transformed into a strategic gift for an imaginative adversary and thus presents us with the current dilemma. The convergence of IW into cognitive warfare has been forced upon us.

This gift emerged in the mid-2000s with the advent of hyper-connectivity, largely a product of the social media phenomenon and its attendant business model based on accessing the constant attention of the human brain. This phenomenon created the bridge between IW and cognitive war which has been exploited by an unscrupulous adversary. Hyper-connectivity created the opportunity to transform IW from a set of episodic activities, largely associated with operational lines-of-effort by military and intelligence practitioners in support of lethal and kinetic effects on the battlefield, into a single continuous effort to disrupt and deny the cognitive conditions in which whole societies are situated. Cognitive warfare gathers together the instruments of IW and takes us into the realm of ‘neuro-weapons’ – defined by Giordano as “anything that accesses the brain to contend against others”. When coordinated and directed at open liberal democratic societies, cognitive warfare has paid off in spades. The capacity of open societies to function – to sustain and renew the narratives upon which their superior material strength relies – gets quickly scrambled when certain cognitive processes are exposed to manipulation.

It remains an item of curiosity how American and allied military and strategic culture, imbued as it is with the insights of John Boyd and many others, has been slow to recognise the shift in orientation. Boyd’s OODA loop may be one of the most bastardised concepts in modern military strategy, but its central insights are absolutely prescient for the age of cognitive warfare. The loop’s second “O” – Orientation – subsumes each of its other points. Getting orientation wrong, no matter how well an actor can Observe, how quickly they can Decide, and how concisely they can Act, can nonetheless mean the actor is caught playing the wrong game. It centrality is made patently clear for anyone who actually reads Boyd, or any of a number of good biographies of his work. It is imperative that this strategic culture understands the way in which its own orientation has been turned against it.

As digitised and networked warfare has matured and evolved over the last 25 years into its contemporary iteration of Multi-Domain Battle (MDB), it has pursued better observation through superior ISR, better decision-making through big data and machine learning, and better action through the constant advance of military-technical capabilities. Its orientation, however, has remained the same. As Albert Palazzo has iterated, MDB remains oriented toward a military problem solvable by lethal kinetic means in which political success is considered as a follow-on phase and to which influence operations across cyber and human terrain remain adjunct lines of effort. What is becoming clearer is that the age of cognitive warfare is highlighting the joints and fissures in this basic construct to an unprecedented extent. General Michael Hayden has made this point in his 2018 book, The Assault on Intelligence.

Cognitive warfare presents us with an orientation problem. Adversary actors have strategised to avoid a confrontation with US and allied forces at their strongest point – namely, in high intensity conventional warfare. They have pursued gains in various domains that remain under the threshold of inducing a conventional military response. While US and allied forces have mused over ways to bolster below-the-threshold capabilities, the adversary has been busy changing the rules of the meta-contest. By denying, disrupting, and countering the narratives that underpin US and allied legitimacy, and by stifling our capacity to regenerate the preferred narrative via sophisticated and targeted disinformation operations, the adversary has changed the context within which force and the threat of force is situated. In other words, the diplomatic power of the traditional force-in-being of allied militaries to influence the behaviour of others is being diminished. Furthermore, the actual deployment of lethal kinetic capabilities will be subject to a similar reorientation where and when they occur. Simply put, lethal kinetic capability, as the traditional remit of military organisations, has undergone a reorientation at the hands of an adversary enabled by the hyper-connected digital age to manipulate its context to an unprecedented extent.

Cognitive war is not the fight most professional military practitioners wanted. A little discussed aspect is the extent to which our military and strategic culture perceives it as a deeply dishonourable fight. A cultural bias – if not a genuine cognitive blind spot – is at work and has slowed our response. But national security, before it is about winning kinetic battles and before it is centred on the profession of arms, is at its core about ensuring that people are safe to live their lives: it is about keeping the peace and protecting the population from harmful interference. This includes the harm that disrupts our capacity to conduct our collective social, economic, and political lives on our own terms.


About the Authors:

Emily Bienvenue, Zac Rogers & Sian Troath

Dr Emily Bienvenue is a Senior Analyst in the Defence Science and Technology Group’s, Joint and Operations Analysis Division. Her research interests include trust as a strategic resource, the changing nature of warfare, and competition below the threshold of conflict.

The views expressed here are her own and do not represent the official view of the Australian Defence Department.

Zac Rogers is a senior researcher at the Centre for United States and Asia Policy Studies and PhD candidate at the College of Business, Government, and Law, Flinders University of South Australia.

Sian Troath is a PhD candidate at Flinders University, and a combined Flinders University-DST Group research associate working on Modelling Complex Warfighting (MCW) Strategic Response (SR) 4 – Modelling Complex Human Systems. Her areas of expertise are international relations theory, trust theory, Australian foreign policy, Australia-Indonesia relations, and Anglo-American relations.

The views expressed in this article are those of the authors and do not necessarily reflect the position of the Australian Army, the Department of Defence or the Australian Government.

THE PERSPECTIVE FROM THE OTHER SIDE

Media, Cognitive Warfare and One World Government Social Engineering

Walt Peretto 13 October 2021  / IRANIAN COUCIL FOR DEFENDING THE TRUTH

Ownership of mainstream media and popular social media is imperative to control desired narrative during psychological and military operations. In the last 30 years, it has been the accessibility and freedom of the internet which has been invaluable for the communication of independent and objective analysis which is often evidence-based rather than information used in cognitive warfare for perception manipulation.

We now live in a time where the powers that shouldn’t be are scrambling to find methods to disrupt these free lines of communication without appearing to be an all-out assault on freedom-of-speech; so the current methodology is slow implementation of concepts like “community standards” violations to shut down people who are often disseminating information that government does not want communicated. When a new forum is formed that allows freedom of speech—that forum quickly attracts attention and efforts are quickly made to either buy out the forum and disparage it publicly — sometimes labeling it as politically “right-wing” which automatically loses most users who may identify as politically “left-wing.”

With the popular accessibility of the internet starting in the 1990s, the exchanges of information and ideas have been facilitated throughout the globe. Before internet popularity, channels of information were mainly held by mainstream media corporations. In the last twenty-five years, billions of people worldwide have been exchanging information instantly outside of official government and corporate filters. These developments have fractured the monopoly on information once held by government and corporations on behalf of elite interests worldwide. 

A significant percentage of the global population still blindly trusts corporate mainstream media and prestigious academic sources of news and information without verification. These same people instinctively avoid ‘alternative’ sources of news and information. However, a growing number of people have awoken to the realization that mainstream media sources of information are agenda-driven and often purposely deceiving while engaging in systemic censorship. These are the people more inclined to seek alternative sources of information and communicate using channels free from corporate and academic monopolies. The current battle to disturb and eventually shut down these channels are extremely important to one-world-government social-engineers. This is a major battleground in today’s cognitive warfare.

As we enter the mid-2020s, it will likely be increasingly difficult to freely exchange evidence-based and independent research and analysis on the internet. There is a cognitive war against freedom of information in the emerging totalitarian global scheme. Unlike conventional warfare, cognitive warfare is everywhere a communication device is used. Independent researchers, analysts, and journalists are being disrupted and banned from forums like YouTube and Facebook.

To counteract cognitive warfare and ultimately avoid a one-world-government dystopia—engage your neighbors and build local and personal relationships of information exchange and commerce as opposed to relying on long-distance electronic communications. Get off the grid as much as possible and reverse the psyop of ‘social-distancing’ that the Covid-19 operation has promoted for the last year and a half. 

OTHER ANGLES

Cognitive Electronic Warfare: Conceptual Design and Architecture – 2020

Qinghan XiaoPages – 48 – 65     |    Revised – 30-11-2020     |    Published – 31-12-2020 Published in International Journal of Artificial Intelligence and Expert Systems (IJAE) Volume – 9   Issue – 3    |    Publication Date – December 2020 

ABSTRACT

Computing revolution is heralding the transition from digital to cognitive that is the third significant era in the history of computer technology: the cognitive era. It is about the use of computers to mimic human thought processes, such as perception, memory, learning and decision-making in highly dynamic environments. In recent years, there is a growing research interest in the development of cognitive capabilities in radio frequency technologies. Using cognition-based techniques, a radar system would be able to perceive its operational environment, fine-tune and accordingly adjust its emission parameters, such as the pulse width, pulse repetition interval, and transmitter power, to perform its assigned task optimally. It is certain that traditional electronic warfare (EW) methods, which rely on pre-programmed attack strategies, will not be able to efficiently engage with such a radar threat. Therefore, the next generation of EW systems needs to be enhanced with cognitive abilities so that they can make autonomous decisions in response to changing situations, and cope with new, unknown radar signals. Because the system architecture is a blueprint, this paper presents a conceptual cognitive EW architecture that carries out both electronic support and electronic attack operations to synthesize close-to-optimal countermeasures subject to performance goals.

The cognitive warfare: Aspects of new strategic thinking

March 5, 2018 By Gagliano Giuseppe / Modern Diplomacy

Combining the strategic observations on revolutionary war – those made by Colonel Trinquier during the war in Algeria, in   particular–with US strategy regarding information warfare, the authors Harbulot and Lucas, leading experts  at the French École de guerre économique, and Moinet, Director of the DESS (Intelligence économique et développement des Entreprises) – place their emphasis on the profoundly innovative and strategic role played by information warfare and on its implications for companies. Naturally enough, it emerges with clarity that the authors’ intention is to utilize cognitive warfare in defense of the interests of French companies against their US competitors.

It is undeniable – in the opinion of the authors – that the date of September 11, 2001, represented a change in strategic thinking  of fundamental importance. Undoubtedly, the war in the Persian Gulf, the US military intervention  in Somalia, and the conflicts in former Yugoslavia had already presaged – even if in terms not yet precisely defined – an evolution of military strategy in the direction of newer strategic scenarios. It is enough to consider – the authors observe – that   at the time of the invasion of Kuwait, US public opinion was mobilized following a disinformation process planned at military level or more exactly, at psychological warfare level. In this regard, it is sufficient to recall how the televised landing of US troops on the beaches of Mogadishu, the televised lynching of a US Army soldier enabled the marginalization of the politico-military dimension of the civil war in progress. Yet the importance ascribed to the manipulation of information was determined by the  conviction  –  which  proved  to be correct – that the absolute mastery of the production of knowledge both upstream (the educational system) and downstream (Internet, media audio-visual means) can ensure – the authors emphasize – the long-lasting legitimacy of the control of world  affairs.

Yet  in  light  of the American political-military choices and reflections on the revolutionary war in Algeria, French strategy felt the need to define in strict terms exactly what information warfare is. First of all, the expression used in the context of French strategy is the one of cognitive warfare defined as the capacity to use knowledge for the purpose of conflict. In this regard, it is by no mere chance that Rand Corporation information warfare specialists John Arquilla and David Rundfeldt assert the domination  of  information  to  be  fundamental  to American strategy. Secondly, the ample and systematic use of information warfare by the US creates the need – in geographical-strategic  terms–for the European Union to do some serious thinking on cognitive warfare. On the other hand, the absence of legal regulation of manipulation of knowledge in the architecture of security inherited at the end of the Cold War can only lead to serious concern above all for economic security of European companies and must consequently bring about the formulation of a strategy of dissuasion and the use of subversive techniques that must be capable of creating barriers against attempts at destabilization.

later updates:

TRUTH COPS

THE INTERCEPT: Leaked Documents Outline DHS’s Plans to Police Disinformation

October 31 2022

Read here

Key Takeaways

  • The work is primarily done by CISA, a DHS sub-agency tasked with protecting critical national infrastructure.
  • DHS, the FBI, and several media entities are having biweekly meetings as recently as August.
  • DHS considered countering disinformation relating to content that undermines trust in financial systems and courts.
  • The FBI agent who primed social media platforms to take down the Hunter Biden laptop story continued to have a role in DHS policy discussions.

Jen Easterly, Biden’s appointed director of CISA, swiftly made it clear that she would continue to shift resources in the agency to combat the spread of dangerous forms of information on social media. “One could argue we’re in the business of critical infrastructure, and the most critical infrastructure is our cognitive infrastructure, so building that resilience to misinformation and disinformation, I think, is incredibly important,” said Easterly, speaking at a conference in November 2021.

The Intercept

MORE REFERENCES

A. Gliozzo, C. Ackerson, R. Bhattacharya, A. Goering, A. Jumba, S. Y. Kim, L. Krishnamurthy, T. Lam, A. Littera, I. McIntosh, S. Murthy and M. Ribas. (2017, Jun.). Building Cognitive Applications with IBM Watson Services: Volume 1 Getting Started. [On-line]. IBM Redbooks. Available: http://www.redbooks.ibm.com/redbooks/pdfs/sg248387.pdf [Dec. 10, 2020].
A. J. Butt, N. A. Butt, A. Mazhar, Z. Khattak and J. A. Sheikh. “The soar of cognitive architectures”. In Proc. 2013 International Conference on Current Trends in Information Technology, 2013, pp. 135-142.
A. K. Noor. (2015). “Potential of cognitive computing and cognitive systems”. Open Engineering. [On-line]. 5(1), pp. 75-88. Available: https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1018&context=msve_fac_pubs [Dec. 10, 2020].
A. M. Jones. “Performance Prediction of Constrained Waveform Design for Adaptive Radar”. Ph.D. thesis, Wright State University, United States, 2016.
A. Ranadive. “Cognitive Systems And Artificial Intelligence, According to IBM”. Internet:https://medium.com/@ameet/cognitive-systems-and-artificial-intelligence-according-to-ibm-eb03f4d663b6, Jan. 7, 2017 [Dec. 10, 2020].
B. Merritt. The Digital Revolution. Morgan & Claypool Publishers, 2016.
C. Adams. “Cognitive Electronic Warfare: Radio Frequency Spectrum Meets Machine Learning”, Internet: http://interactive.aviationtoday.com/avionicsmagazine/august-september-2018/cognitive-electronic-warfare-radio-frequency-spectrum-meets-machine-learning/, Aug./Sep. 2018 [Dec. 10, 2020].
C. D. Wickens and J. G. Hollands. Engineering Psychology and Human Performance, 3rd ed. New Jersey: Prentice-Hall, Upper Saddle River, 2000.
C. F. Beckmann and S. M. Smith. “Probabilistic independent component analysis for functional magnetic resonance imaging”. IEEE Transactions on Medical Imaging, vol. 23, pp. 137-152, Feb. 2004.
C. Horne, M. Ritchie and H. Griffiths. “Proposed ontology for cognitive radar systems”, IET Radar, Sonar and Navigation, vol.12, pp. 1363-1370, Dec. 2018.
C. Tromp. “The diffusion and implementation of innovation”, Innovative Studies: International Journal, vol. 2, pp. 18-30, Dec. 2012.
D. A. Norman. “Cognitive engineering and education”, in Problem Solving and Education: Issues in Teaching and Research. D. T. Tuma, and F. Reif, Eds. New Jersey: Erlbaum Associates, Hillsdale, 1980, pp. 81–95.
D. D. Woods and E. Roth. “Cognitive engineering: Human problem solving with tools”, Human Factors, vol. 30, pp. 415–430, Apr. 1988.
D. M. Zasada, J. J. Santapietro and L. D. Tromp. “Implementation of a cognitive radar perception/action cycle”. In Proc. 2014 IEEE Radar Conference, 2014, pp. 544-547.
D. Norman. The Design of Everyday Things, Revised and Expanded Edition. New York: Basic Books, 2013.
E. Kania. “The AI Titans’ Security Dilemmas”. Internet: https://www.hoover.org/research/ai-titans, Oct. 29 2018 [Dec. 10, 2020].
Electronic Warfare Fundamentals. Internet: https://docplayer.net/26585533-Electronic-warfare-fundamentals.html, Nov.2000 [Dec. 10, 2020].
euCognition. “Definitions of Cognition & Cognitive Systems”. Internet: http://www.vernon.eu/euCognition/definitions.htm [Dec. 10, 2020].
G. E. Smith, Z. Cammenga, A. Mitchell, K. L. Bell, J. Johnson, M. Rangaswamy and C. Baker. “Experiments with cognitive radar”. IEEE Aerospace and Electronic Systems Magazine, vol. 31, pp. 34-46, Dec. 2016.
G. I. Seffers. “Smarter AI for Electronic Warfare”. Internet: https://www.afcea.org/content/smarter-ai-electronic-warfare, Nov. 1 2017 [Dec. 10, 2020].
G. Pettersson. “An Illustrated Overview of ESM and ECM Systems”. MSc. thesis, Naval Postgraduate School, Monterey, California, United States, 1993.
G. Zhang, H. Rong and W. Jin. “Intra-pulse modulation recognition of unknown radar emitter signals using support vector clustering”, in Proc. 3rd International Conference on Fuzzy Systems and Knowledge Discovery, 2006, pp. 420-429.
Intelligence and Electronic Warfare Operations. Internet: http://www.bits.de/NRANEU/others/amd-us-archive/FM34-1%281987%29.pdf, Jul. 1987 [Oct. 18, 2020].
J. Barron. The Imperfect State: An American Odyssey. Indianapolis, IN: Dog Ear Publishing, 2011.
J. Browne. “Cognitive EW Provides Computer-Powered Protection”, Internet: http://www.mwrf.com/defense/cognitive-ew-provides-computer-powered-protection, May 10, 2017 [Dec. 10, 2020].
J. E. Kelly III and S. Hamm. Smart Machines: IBM’s Watson and the Era of Cognitive Computing. New York: Columbia University Press, 2013.
J. Friedenberg and G. Silverman. Cognitive Science: An Introduction to the Study of Mind. Sage Publications, 2006.
J. Guerci, R. M. Guerci, M. Rangaswamy, J. Bergin and M. Wicks. “CoFAR: Cognitive fully adaptive radar”. in Proc. IEEE Radar Conference, 2014, pp. 984-989.
J. Guerci. Cognitive Radar: The Knowledge-Aided Fully Adaptive Approach. Norwood, MA: Artech House, 2010.
J. Konwles. “Regaining the advantage – Cognitive electronic warfare”. The Journal of Electronic Defense, vol. 39, pp. 56-62, Dec. 2016.
J. M. Fuster. Cortex and Mind: Unifying Cognition. Oxford, U.K.: Oxford University Press, 2003.
J. Mitola III and G. Q. Maguire, Jr. “Cognitive radio: Making software radios more personal”, IEEE Personal Communications Magazine, vol. 6, pp. 13-18, Apr. 1999.
J. Pang, Y. Lin and X. Xu. “An improved feature extraction algorithm of radiation source based on multiple fractal theory”. International Journal of Signal Processing, Image Processing and Pattern Recognition, vol.7 pp. 237-242, Jan. 2014.
J. R. Anderson. “Is human cognition adaptive?”, Behavioral and Brain Sciences, vol. 14, pp. 471–485, Mar. 1991.
J. Wang. Associative Memory Cells: Basic Units of Memory Trace. Springer, 2019.
K. Krishnan, T. Schwering and S. Sarraf. (2016, May). “Cognitive dynamic systems: A technical review of cognitive radar”, arXiv:1605.08150. [On-line]. Available: https://arxiv.org/abs/1605.08150 [Dec. 10, 2020].
K. L. Bell, C. J. Baker, G. E. Smith, J. T. Johnson and M. Rangaswamy. “Cognitive radar framework for target detection and tracking”, IEEE Journal of Selected Topics in Signal Processing, vol. 9, pp. 1427-1439, Aug. 2015.
L. E. Brennan and I. S. Reed. “Theory of adaptive radar”. IEEE Transactions on Aerospace and Electronic Systems, vol. AES-9, pp. 237-252, Feb. 1973.
M. A. Brandimonte, N. Bruno and S. Collina. “Cognition”. in Psychological Concepts: An International Historical Perspective. K. Pawlik and G. d’Ydewalle, Eds. Hove, UK: Psychology Press, 2006, pp. 11-26.
M. E. Khan, S. G. M. Shadab and F. Khan. “Empirical study of software development life cycle and its various models”, International Journal of Software Engineering, vol. 8, pp. 16-26, Jun. 2020.
M. S. Greco, F. Gini, P. Stinco and K. Bell. “Cognitive radar: A reality?”, arXiv:1803.01000. [On-line]. Available: https://arxiv.org/abs/1803.01000 [Dec. 10, 2020].
N. S. Lanjewar and D. Rane. “Cognitive computing applications”, in Proc. 2nd National Conference of Recent Trends in Computer Science and Information Technology, vol. 5, 2019, pp. 54-59.
P. Gärdenfors and A. Wallin. A Smorgasbord of Cognitive Science, Bokförlaget, Nora: Nya Doxa, 2008.
Q. Wei, Q. Xu, Y. Pan and G. Zhange. “A novel method for sorting unknown radar emitter”. In Proc. 2009 IEEE International Workshop on Intelligent Systems and Applications, 2009, 4 pages.
R. Adams. “Cognitive science meets computing science: The future of cognitive systems and cognitive engineering”, in Proc. of 31st International Conference on Information Technology Interfaces, 2009, pp. 1-12.
R. J. Anderson. Security Engineering — Guide to Building Dependable Distributed Systems. Indianapolis, IN: Wiley Pub, 2008.
S. Andrews and M. Sheppard. “Software architecture erosion: Impacts, causes, and management”. International Journal of Computer Science and Security, vol. 14, pp. 82-93, Jun. 2020.
S. Banerjee, J. Santos, M. Hempel and H. Sharif. “A new railyard safety approach for detection and tracking of personnel and dynamic objects using software-defined radar”. in Proc. 2018 Joint Rail Conference, 2018, pp.1-10.
S. Cole. “Cognitive Electronic Warfare: Countering Threats Posed by Adaptive Radars”. Internet: http://mil-embedded.com/articles/cognitive-electronic-warfare-countering-threats-posed-by-adaptive-radars/, Jan. 31, 2017 [Dec. 10, 2020].
S. Feng, P. Setoodeh and S. Haykin. “Smart home: Cognitive interactive people-centric Internet of things”. IEEE Communications Magazine, vol. 55, pp. 34-39, Feb. 2017.
S. Haykin, Cognitive Dynamic Systems: Perception–Action Cycle, Radar, and Radio. Cambridge, U.K.: Cambridge Press, 2012.
S. Haykin, Y. Xue and P. Setoodeh. “Cognitive radar: Step toward bridging the gap between neuroscience and engineering”, in Proc. of the IEEE, vol. 100, pp. 3102–3130, Nov. 2012.
S. Haykin. “Cognition is the key to the next generation of radar systems,” in Proc. 13th IEEE Digital Signal Processing Workshop and 5th IEEE Signal Processing Education Workshop, 2009, pp. 463–467.
S. Haykin. “Cognitive radar: A way of the future”, IEEE Signal Processing Magazine, vol. 23, pp. 30-40, Jan. 2006.
S. Haykin. “Cognitive radar” in Knowledge Based Radar Detection, Tracking and Classification. F. Gini and M. Rangaswamy, Eds. Hoboken, New Jersey: John Wiley & Sons, pp. 9-30. 2008.
S. Holtel. “Artificial intelligence creates a wicked problem for the enterprise”. Procedia Computer Science, vol. 99, pp. 171-180, 2016.
S. Kuzdeba, A. Radlbeck and M. Anderson. “Performance Metrics for Cognitive Electronic Warfare – Electronic Support Measures,” in Proc. 2018 IEEE Military Communications Conference (MILCOM), 2018, pp. 151-156.
S. Nirenburg. “Cognitive systems as explanatory artificial intelligence” in Language Production, Cognition, and the Lexicon. N. Gala, R. Rapp and G. Bel-Enguix, Eds. Springer, 2015, pp. 37-49.
T. Broderick. “EW Defense Moves Closer to Reality”. Internet: https://defensesystems.com/articles/2016/11/03/ew.aspx, Nov. 3, 2016 [Dec. 10, 2020].
T. Broderick. “The U.S. Military Fears Russia’s Electronic Warfare Capabilities. DARPA Might Have a Solution”. Internet: https://nationalinterest.org/blog/the-buzz/the-us-military-fears-russias-electronic-warfare-18285, Nov. 3, 2016 [Dec. 10, 2020].
V. N. Gudivada, “Data analytics: Fundamentals”. in Data Analytics for Intelligent Transportation Systems. M. Chowdhury, A. Apon and K. Dey, Eds. Amsterdam: Elsevier Inc., 2017, pp. 31 – 67.
W. L. Melvin and M. C. Wicks. “Improving practical space-time adaptive radar”. in Proc. 1997 IEEE National Radar Conference, 1997, pp. 48–53.
Y. Zhang, G. Si and Y. Wang. “Modelling and simulation of cognitive electronic attack under the condition of system-of-systems combat”, Defense Science Journal, vol. 70, pp. 183-189, Mar. 2020,
Z. W. Pylyshyn. “Computing in cognitive science”, in Foundations of Cognitive Science. M. I. Posner, Ed. Cambridge MA: MIT Press, 1989, pp. 49-92.

To be continued?
Our work and existence, as media and people, is funded solely by our most generous readers and we want to keep this way.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

WTH ever happened to “verify from three independent sources”? All we have is a letter salad uploaded on a server by CCP and “isolation in cultures”.

Back to the normal programming for the normally-abled:

These guys:

… said this:

This is a video presentation, if YouTube Takes it down again, please look it up on Odysee, Brighteon or Bitchute

MANAGED TO UPDATE THE VIDEO TOO AS OF JULY 2021

Amazing list of investors for Illumina, btw!

HOLLY MACARONI: CDC confirmed piecing together the code for the virus from scraps and apparently different places use different codes, which better explains some incidents. See from minute 5 here

ADDENDUM 1: MODERNA AND PFIZER CONFIRM

MODERNA: WE CREATED OUR JAB IN 2 DAYS!
PFIZER: LOL N00BS!

Pfizer
Moderna

ADDENDUM 2: FACT-CHECKERS CONFIRM

ADDENDUM 3 (SEPT 1ST 20201): FOUND A GEM! PROF. DAVID RASNICK LITERALLY AND INDEPENDENTALY SAID SAME THING: “THIS VIRUS EXISTS ONLY ON COMPUTERS”. AND GOES ON CONFIRMING ALL MY THESIS AND MORE

Prof. David Rasnick PhD is a reputed researcher, a friend of Kari Mullis’ and one of the first to whistleblow on the AIDS hoax. A bit of a hero to me, which makes it all more exciting.

ADDENDUM 4 (FEB 2022): LOUD AND CLEAR

UPDATE JULY 10, 2021

And yet another loud and clear confirmation that no one notices because…

“A bipartisan pair of lawmakers want information from the National Institutes of Health (NIH) about the deletion of data on the genetic sequence of the SARS-CoV-2 virus that could provide answers as to the virus’s origin.

In a letter sent Friday and shared first with The Hill, Reps. Raja Krishnamoorthi (D-Ill.) and Mark Green (R-Tenn.) ask for answers about the missing genetic sequences, and press NIH Director Francis Collins to ensure there are safeguards in place to protect scientific data.

The letter comes after a scientist last month said he found some of the genetic sequences of the virus that had previously been uploaded to an NIH server in March 2020 were subsequently deleted at the request of the Chinese researchers from Wuhan who initially uploaded them.

Jesse Bloom, a principal researcher at the Fred Hutchinson Cancer Research Center, wrote in a preprint paper that he recovered 13 missing sequences that purportedly show the virus was circulating in the Chinese city of Wuhan before a December outbreak of COVID-19 that was linked to a “wet market” selling live animals.

The NIH said the requestor wanted the data removed from the agency’s Sequence Read Archive and indicated it was being submitted to another database. Submitting investigators hold the rights to their data and can request withdrawal of the data, the agency said.

Top U.S. public health officials and experts are increasingly lending credibility to the need for a deeper investigation into the origins of the coronavirus.

Scientists haven’t discovered definitive proof the virus leaked from a lab. But they also have not found hard evidence that shows the virus started in animals before naturally infecting humans, which is why some now argue an investigation is needed.” – The (S)Hill

ALL THEY EVER TALK ABOUT IS DATA, A STREAM OF CHARACHTERS.
I mean it’s hard to feel sorry for the human race when it’s this dumb, eugenicists are not totally wrong, just not in position to decide who dies, because no one is.

UPDATE #4: JUNE 4, 2021

BREAKING! 2ND BATCH OF FAUCI E-MAILS

UPDATE #1 : WE’VE JUST BEEN CONFIRMED BY THE UNFORTUNATE AMATEUR PROPAGANDISTS DISGUISED AS FRANCE PRESSE FACT-CHECKERS

SOURCE

ALL THEY HAVE IS A “POST IT” FROM CHINA!

Ah, and a “Nature publication”, I loled. o_O
What kind of people use “there is no question” as scientific argument/evidence? Pseudo-scientists, snake-oil salesmen and con artists of all kinds.

The sub-zeroes from the CBS-affiliate WUSA9 try to lend a helping hand to their owners, but they double down for us:

They link, as evidence, to this NIH page which ONLY MENTIONS GENBANK, which is the same fridge on which China stuck that “post it” note.
THAT IS ALL THEY HAVE.

WTH ever happened to “verify from three independent sources”?
It used to be Rule #0 in journalism, back when I studied it in college.

Here are a bit over three sources to support something:

SOURCE

FOIs reveal that health/science institutions around the world have no record of SARS-COV-2 isolation/purification, anywhere, ever

SOURCE

“Would a sane person mix a patient sample (containing various sources of genetic material and never proven to contain any particular virus) with transfected monkey kidney cells, fetal bovine serum and toxic drugs, then claim that the resulting concoction is “SARS-COV-2 isolate” and ship it off internationally for use in critical research (including vaccine and test development)?

Because that’s the sort of fraudulent monkey business that’s being passed off as “virus isolation” by research teams around the world.

Just 1 of many examples is shown below – this is from a study cited by the Australian Department of Health as a paper “which led to the isolation of SARS-CoV-2 in culture“. (Can you spot the oxymoron in that quote?)” – Fluoride Free Peel

If you are new to the topic of “virus isolation/purification”, I strongly recommend that you begin by reading the Statement On Virus Isolation by Dr. Andrew Kaufman, Dr. Thomas Cowan and
Sally Fallon Morell, MAhttps://andrewkaufmanmd.com/sovi/
or watch this 5 minute video from Dr. Cowan.

Here are 5 compilation pdfs containing FOI responses from 79 institutions in 22 countries/jurisdictions, re the isolation/purification/existence of “SARS-COV-2”, as well as emails from authors of studies that claimed to have “isolated the virus” and an email from the Head of the Consultant Laboratory for Diagnostic Electron Microscopy of Infectious Pathogens at Germany’s Robert Koch Institut, last updated July 13, 2021 (note: many of these responses were obtained by FOI-submitters other than Michael S. and myself, as indicated further down this page):
Part 1: https://www.fluoridefreepeel.ca/wp-content/uploads/2021/02/FOI-replies-SARS-COV-2-isolation-existence-causation-47-institutions-Feb-12-2021-chrono-part-1.pdf
Part 2: https://www.fluoridefreepeel.ca/wp-content/uploads/2021/02/FOI-replies-SARS-COV-2-isolation-existence-causation-47-institutions-Feb-12-2021-chrono-part-2.pdf
Part 3: https://www.fluoridefreepeel.ca/wp-content/uploads/2021/04/FOI-replies-SARS-COV-2-isolation-purification-existence-part-3-April-3.pdf
Part 4: https://www.fluoridefreepeel.ca/wp-content/uploads/2021/06/FOI-replies-re-SARS-COV-2-purification-existence-June-3-2021-part-4.pdf
Part 5: https://www.fluoridefreepeel.ca/wp-content/uploads/2021/07/FOI-replies-re-SARS-COV-2-purification-existence-July-13-2021-part-5.pdf

UPDATE2:
I discovered this when the video was already up…

Source

“Most of our readers are interested in consumer DNA testing for genealogy and ancestry research. Illumina played a massive role in making these services affordable. All the big DNA testing companies use Illumina’s chip technology.
But some companies are even more closely intertwined with Illumina. I mention briefly in an article on who owns 23andMe that the chip company was an investor in the 2015 funding found of its customer.”

https://www.dataminingdna.com/

“If you’ve ever used 23andMeAncestry.com, or any other genetics-testing service, chances are that your genes were sequenced on machines made by the $25 billion biotech behemoth. Now the undisputed leader in the emerging field of DNA sequencing in the U.S., Illumina has outstripped its rivals by selling its sequencing hardware to medical researchers around the world.”

https://www.fastcompany.com/

As we’ve shown in previous reports, 23andMe is owned by Richard Branson and a former wife and current partner of Google’s founder Sergey Brin. She also happens to be the sister of YouTube CEO.

“23andMe is owned by a sizeable number of large investors spearheaded by Anne Wojcicki (YouTube CEO sister and former Google owner wife – S.m) and Richard Branson. The list of investors with recent ownership stakes in the company includes Altimeter Capital, Fidelity, Casdin Capital, and Foresite Capital.
Since the company was founded in 2006, it has been involved in multiple funding rounds. There were at least 60 investors in 2020 before the merger, including GlaxoSmithKline and Sequoia Capital. Early investors include Alphabet (Google’s parent company) and WuXi Healthcare Ventures (a Chinese company).
When 23andMe merged with Richard Branson’s acquisition company, the existing stakeholders retained ownership of 81% of the merged company.”

dataminingdna.com

According to Wikipedia:

“In 2005, co-founder and former Chief Scientific Officer Anthony Czarnik sued Illumina; see Czarnik v. Illumina Inc.

In 2010, Cornell University and Life Technologies filed a lawsuit against Illumina, alleging that its microarray products infringed on eight patents held by the university and exclusively licensed to the start-up. The case was settled in April 2017 without any finding of fault. In September 2017 both parties asked to have the settlement reviewed, with Cornell accusing both Illumina and Life Technologies of misrepresentation and fraud.[44]

In February 2020, Illumina filed a patent infringement suit against BGI relating to its “CoolMPS” sequencing products.[48] In return BGI has filed patent infringement lawsuits for violation of federal antitrust and California unfair competition laws, claiming use of “fraudulent behavior” to obtain or enforce sequencing patents that it has asserted against BGI, preventing the firm from entering the US market.[49]

“BGI” as in…

BILL GATES’ & BIG TECH’S CHINESE DARLINGS: WORLD’S TOP DNA HARVESTERS, CLONERS, UIGHUR PERSECUTERS (BIOHACKING P.4)

Ah, also…

source

UPDATE 3:

Sharryl Atkinson investigates the source of the virus, finds out no one in US got samples in their lab, moves on trying to find the source of a virus that no one can provide samples / isolation / purification.

UPDATE 4 (hopefully final)

I think we’re done here.

To be continued?
Our work and existence, as media and people, is funded solely by our most generous readers and we want to keep this way.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

ORDER

And we’re still just scratching surfaces…

Of course YouTube took it down…

UPDATE JULY 10TH, 2021:

BGI harvested DNA from millions of women around the world – Reuters

UPDATE FEB 17 2022:

ALSO READ:

REMEMBER WHEN GOOGLE’S AI LAB IN CHINA WAS A THREAT TO US’ SECURITY?

PFIZER / BIONTECH AND BILL GATES / CHINA ARE LIKE TWO COUPLES OF SWINGERS IN A PERPETUAL ORGY

EPIC TIMES: BILL GATES HAS BEEN AN OFFICIAL MEMBER OF CHINESE ACADEMIA FOR YEARS. AND THERE’S MORE…

To be continued?
Our work and existence, as media and people, is funded solely by our most generous readers and we want to keep this way.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Sometimes my memes are 3D. And you can own them. Or send them to someone.
You can even eat some of them.
CLICK HERE

Whatever happened to Rule #0 in true journalism: “verify every statement from three or more independent sources”?! Mainstream media is just commentary and unverified press releases. This research below gets as close to the requirements as it can in this heavily censored and gate-kept environment. But it also aligns with everything we’ve already published on this matter (quite a lot) unlike Fauci’s words align with each other.
You may have heard already some of this news as it goes viral, but it’s our original combo that puts to rest the entire official pandemic narrative.

Judicial Watch has just uncovered correspondences from Dr. Anthony Fauci outlining his focus on being in compliance with the Chinese Communist Party and their demands on the USA for COVID restrictions. And two more bombshells align.

“These new emails show WHO and Fauci’s NIH special accommodations to Chinese communist efforts to control information about COVID-19,” said Judicial Watch President Tom Fitton.

From the press release Judicial Watch has put out on Monday :

Judicial Watch announced today that it and the Daily Caller News Foundation (DCNF) received 301 pages of emails and other records of Dr. Anthony Fauci and Dr. H. Clifford Lane from the U.S. Department of Health and Human Services showing that National Institutes of Health (NIH) officials tailored confidentiality forms to China’s terms and that the World Health Organization (WHO) conducted an unreleased, “strictly confidential” COVID-19 epidemiological analysis in January 2020.

Additionally, the emails reveal an independent journalist in China pointing out the inconsistent COVID numbers in China to NIH’s National Institute of Allergy and Infectious Diseases’ Deputy Director for Clinical Research and Special Projects Cliff Lane.

The emails were obtained in response to a Freedom of Information Act (FOIA) lawsuit filed in the U.S. District Court for the District of Columbia by Judicial Watch on behalf of the DCNF (Daily Caller News Foundation v. U.S. Department of Health and Human Services(No. 1:20-cv-01149)).

The lawsuit was filed after HHS failed to respond to the DCNF’s April 1, 2020, FOIA request seeking:

  • Communications between Dr. Fauci and Deputy Director Lane and World Health Organization officials concerning the novel coronavirus.
  • Communications of Dr. Fauci and Deputy Director Lane concerning WHO, WHO official Bruce Aylward, WHO Director General Tedros Anhanom, and China.

The new emails include a conversation about confidentiality forms on February 14-15, 2020, between Lane and WHO Technical Officer Mansuk Daniel Han. Han writes: “The forms this time are tailored to China’s terms so we cannot use the ones from before.”

A WHO briefing package sent on February 13, 2020, to NIH officials traveling to China as part of the COVID response ask that the officials wait to share information until they have an agreement with China: “IMPORTANT: Please treat this as sensitive and not for public communications until we have agreed communications with China.”  

In an email dated January 20, 2020, a WHO official discusses the epidemiological analysis they conducted of COVID-19 earlier that month and states that it is “strictly confidential,” is “only for,” the Strategic and Technical Advisory Group for Infection Hazards (STAG-IH), and “should not be further disseminated.”

In an email dated March 4, 2020, from Chinese journalist Zeng Jia to Lane, a reporter for Caixin Media, points out to Fauci deputy Cliff Lane that the number of cases reported in the WHO Joint China Mission’s report are inconsistent with the number reported by the Wuhan Public Health Committee:

It says on Page 6 [in the WHO report] that there was at least one clinically diagnosed case of coronavirus on December 2th, 2019, in Wuhan; and from Jan 11th to 17th there were new clinically diagnosed and confirmed cases every day in Wuhan, which is not consistent with Wuhan Public Health Committee’s numbers.

In an email dated February 15, 2020, Gauden Galea, head of the WHO office in China, informs the joint mission members traveling to China that all of their activities in China would be arranged by the Chinese Government’s National Health Commission.

“These emails set the tone early on in the coronavirus outbreak. It’s clear that the WHO allowed China to control the information flow from the start. True transparency is crucial,” said Ethan Barton, editor-in chief for the Daily Caller News Foundation.  

“These new emails show WHO and Fauci’s NIH special accommodations to Chinese communist efforts to control information about COVID-19,” said Judicial Watch President Tom Fitton.

This is the latest information obtained in Judicial Watch and the DCNF’s ongoing investigation into Fauci’s and NIH’s response to the coronavirus pandemic. Judicial Watch and the DCNF previously uncovered emails showing a WHO entity pushing for a press release, approved by Dr. Fauci, “especially” supporting China’s COVID-19 response.  

And this comes just 10 days after Taiwan News unearthed another bombshell we’ve just learned about:

TAIPEI (Taiwan News, 2021/01/18 00:31) — Video taken just days before the start of the coronavirus pandemic shows a current World Health Organization (WHO) inspector discuss the testing of modified coronaviruses on human cells and humanized mice in the Wuhan Institute of Virology (WIV), just weeks before the first cases of COVID-19 were announced in the city of Wuhan itself.

In a video that was originally taken on Dec. 9, 2019, three weeks before the Wuhan Municipal Health Commission announced an outbreak of a new form of pneumonia, virologist Vincent Racaniello interviewed British zoologist and president of EcoHealth Alliance Peter Daszak about his work at the nonprofit to protect the world from the emergence of new diseases and predict pandemics. Since 2014, Daszak’s organization has received millions of dollars of funding from the U.S. National Institutes of Health (NIH), which it has funneled to the WIV to carry out research on bat coronaviruses.

In the first phase of research, which took place from 2014 to 2019, Daszak coordinated with Shi Zhengli, (石正麗), also known as “Bat Woman,” at the WIV on investigating and cataloging bat coronaviruses across China. EcoHealth Alliance received US$3.7 million in funding from the NIH for this research and 10 percent was channeled to the WIV, reported NPR.

The second, more dangerous phase, which started in 2019, involved gain-of-function (GoF) research on coronaviruses and chimeras in humanized mice from the lab of Ralph S. Baric of the University of North Carolina. Funding for the program was withdrawn by the NIH under the Trump administration on April 27 amid the pandemic.

At the 28:10 mark of the podcast interview, Daszak states that researchers found that SARS likely originated from bats and then set out to find more SARS-related coronaviruses, eventually finding over 100. He observed that some coronaviruses can “get into human cells in the lab,” and others can cause SARS disease in “humanized mouse models.”

He ominously warned that such coronaviruses are “untreatable with therapeutic monoclonals [antibodies] and you can’t vaccinate against them with a vaccine.” Ironically, he claims that his team’s goal was trying to find the next “spillover event” that could cause the next pandemic, mere weeks before cases of COVID-19 were beginning to be reported in Wuhan.

When Racaniello asks what can be done to deal with coronavirus given that there is no vaccine or therapeutic for them, Daszak at the 29:54 mark appears to reveal that the goal of the GoF experiments was to develop a pan-coronavirus vaccine for many different types of coronaviruses.

Based on his response, it is evident that just before the start of the pandemic, the WIV was modifying coronaviruses in the lab. “You can manipulate them in the lab pretty easily.” What he then mentioned has become the telltale trait of SARS-CoV-2, its spike protein: “Spike protein drives a lot of what happens with the coronavirus, zoonotic risk.”

Daszak mentions the WIV’s collaboration with Baric: “and we work with Ralph Baric at UNC [University of North Carolina] to do this.” As has been suggested by proponents that SARS-CoV-2 is a chimera made in a lab, he speaks of inserting the spike protein “into a backbone of another virus” and then doing “some work in the lab.”

Providing evidence of the creation of chimeras for the sake of a vaccine, he states “Now, the logical progression for vaccines is, if you are going to develop a vaccine for SARS, people are going to use pandemic SARS, but let’s try to insert these other related diseases and get a better vaccine.”

Based on Daszak’s statements, it appears that just before the start of the pandemic, the WIV was using GoF experiments with chimeras in an attempt to create a vaccine. These experiments appeared to have included infecting mice genetically modified to express the human ACE2 protein with these chimeras.

In a presentation titled “Assessing Coronavirus Threats,” which was delivered four years before the pandemic in 2015, Daszak points out that experiments involving humanized mice have the highest degree of risk. Demonstrating his close ties with the WIV, he also listed the lab as a collaborator at the end of the presentation. – Taiwan News

WHO inspector caught on camera revealing coronavirus manipulation in Wuhan before pandemic
(Assessing Coronavirus threats, Peter Daszak image)

Controversially, Daszak has been included among a team of experts from the WHO that has finally been allowed by Beijing to investigate the origin of the outbreak of COVID-19, over a year after it started. Scientists such as Richard Ebright, a molecular biologist at Rutgers University in New Jersey, are condemning Daszak’s participation due to conflicts of interest “that unequivocally disqualify him from being part of an investigation of the origins of the Covid-19 pandemic,” reported the Daily Mail.

“Peter Daszak’s organisation channelled cash to Wuhan scientists at the centre of growing concerns over a cover-up – and also collaborated on the sort of cutting-edge experiments on coronaviruses banned for several years in the United States for fear of sparking a pandemic.

The Wuhan Institute of Virology has been carrying out this risky research on bat viruses since 2015, including the collection of new coronaviruses and hugely controversial ‘gain of function’ experiments that increase their ability to infect humans.Peter Daszak¿s organisation channelled cash to Wuhan scientists at the centre of growing concerns over a cover-up

Peter Daszak’s organisation channelled cash to Wuhan scientists at the centre of growing concerns over a cover-up

Many leading scientists argue that deliberately creating new and infectious microbes poses a huge danger of starting a pandemic from an accidental release, especially as leaks from laboratories have often occurred.

Despite his close ties to the Wuhan Institute of Virology – and the way he has orchestrated efforts to stifle claims that the pandemic might not have happened naturally – Dr Daszak was invited by the World Health Organisation to join its team of ten international experts investigating the outbreak.

The prominent scientist, who runs a conservation charity originally founded by the famous naturalist and best-selling author Gerald Durrell, is also leading an investigatory panel on the pandemic’s origins set up by The Lancet medical journal

‘Peter Daszak has conflicts of interest that unequivocally disqualify him from being part of an investigation of the origins of the Covid-19 pandemic,’ said Richard Ebright, bio-security expert and professor of chemical biology at Rutgers University in New Jersey.

‘He was the contractor responsible for funding of high-risk research on Sars-related bat coronaviruses at Wuhan Institute of Virology and a collaborator on this research.’

Daszak, president of EcoHealth Alliance, has seen his career take him from researching rare land snails at Kingston University to his new key role investigating the eruption of the most destructive pandemic for a century.

SOURCE

The pugnacious scientist, originally from Manchester, spent much of the past year trying to counter claims of a possible laboratory leak while defending his friend Shi Zhengli, the Wuhan scientist known as Batwoman for her virus-hunting trips in caves.

‘Ignore the conspiracy theories: scientists know Covid-19 wasn’t created in a lab,’ ran the headline to one typical article he wrote in The Guardian.

But other scientists say there is no firm evidence at this stage to back Daszak’s insistence that Covid-19 crossed from animals to humans via natural transmission. Many point to the simple yet startling coincidence that Wuhan is home to Asia’s main research centre on bat coronaviruses as well as the place where the pandemic erupted.

Emails released through freedom of information requests have shown Daszak recruited some of the world’s top scientists to counter claims of a possible lab leak with publication of a landmark collective letter to The Lancet early last year. He drafted their statement attacking ‘conspiracy theories suggesting that Covid-19 does not have a natural origin’ and then persuaded 26 other prominent scientists to back it. He suggested the letter should not be identifiable as ‘coming from any one organisation or person’.

The signatories include six of the 12-strong Lancet team investigating the cause of the outbreak.

Yet it has emerged that Daszak had previously issued warnings over the dangers of sparking a global pandemic from a laboratory incident – and said the risks were greater with the sort of virus manipulation research being carried out in Wuhan.

In October 2015, he co-authored an article in the journal Nature on ‘spillover and pandemic properties of viruses’ that identified the risk from ‘virus exposure in laboratory settings’ and from ‘wild animals housed in laboratories’.

Seven months earlier, Daszak was a key speaker at a high-powered seminar on reducing risk from emerging infectious diseases hosted by the prestigious National Academies of Science in Washington. 

Among materials prepared for the meeting was a 13-page document by Daszak entitled ‘Assessing coronavirus threats’ that included a page examining ‘spillover potential’ from ‘genetic and experimental studies’.

This identified steps that increased dangers from such research – rising from lower risk sampling of viruses through to the highest risk from experiments on infecting isolated cells and on so-called ‘humanised mice’ – animals created for labs with human genes, cells or tissues in their bodies.

Yet on January 2 – three days after news broke outside China of a new respiratory disease in Wuhan – Daszak boasted on Twitter of isolating Sars coronaviruses ‘that bind to human cells in the lab’.

He added that other scientists have shown ‘some of these have pandemic potential, able to infect humanised mice’.

Another tweet two months earlier talked about ‘great progress’ with Sars-related coronaviruses from bats through identifying new strains, finding ones that bind to human cells and ‘using recombinant viruses/humanised mice to see Sars-like signs and showing some don’t respond to vaccines’.

Daszak also told a podcast that bat coronaviruses could be manipulated in a lab ‘pretty easily’, explaining how their spike proteins – which bind to human receptors in cells – drive the risk of transmission from animals to humans.” – Daily Mail

We gave up on our profit shares from masks, if you want to help us, please use the donation button!
We think frequent mask use, even short term use can be bad for you, but if you have no way around them, at least send a message of consciousness.
Get it here!

In light of the WHO’s trip to Wuhan, a researcher who goes by the pseudonym Billy Bostickson and his colleagues at DRASTIC (Decentralized Radical Autonomous Search Team Investigating COVID-19) have created a petition demanding that the international investigation team answer 50 key questions about the outbreak in Wuhan. Among the questions is a request to access to the facility’s database and laboratory records, which are supposed to go back 20 years and include a look at its safety procedures, safety audit reports, and safety incident reports.

And it gets even more explosive when we put all these in line with Daily Caller’s discovery that Daszak and his WHO commission boss have a long history of sucking China’s heels:

The chairman of a blue-ribbon commission working with the United Nations and the World Health Organization to investigate the origins of the coronavirus pandemic has a history of praising and working with China while criticizing the U.S. government.

Jeffrey Sachs, a Columbia economist, formed the Lancet COVID-19 Commission, affiliated with the prominent British medical journal of the same name, in July 2020 to investigate the virus’s origins.

Commission member Peter Daszak, a zoologist who is on the Lancet commission, served as the only American on a WHO team that recently visited Wuhan, China, to investigate the spread of the virus.

Daszak has been accused of having conflicts of interest due to millions of dollars of grants he has received from the U.S. government for research with the Wuhan Institute of Virology, which some U.S. officials have said may have been the initial, accidental source for the coronavirus.

Daszak, Sachs and the Chinese government have all vehemently disputed the so-called lab leak theory.

Also: Google has stakes in the Astrazeneca Covid jab

Sachs has also come under some scrutiny in the past for his praise of Chinese government initiatives and his appearances on China state-controlled media outlets criticizing the Trump administration.Does the COVID commission chief have a history of praising China?Yes No  Completing this poll entitles you to WND news updates free of charge. You may opt out at anytime. You also agree to our Privacy Policy and Terms of Use.

In June 2020, Sachs accused the U.S. government of “trying to create a new cold war” with China.

“The U.S. is a force for division, not for cooperation,” he told the BBC in a June 21, 2020, interview.

In December 2018, he called the U.S. government “today’s greatest threat to the international rule of law” and “global peace” after the U.S. asked Canada to arrest an executive with the Chinese tech firm Huawei.

And in an interview last month, Sachs deflected questions about China’s human rights abuses against Muslim Uighurs, saying that there are “huge human rights abuses committed by the U.S. on so many fronts.”

He also accused former Secretary of State Mike Pompeo of “stirring the pot to raise tensions” after the diplomat criticized Chinese authorities’ crackdown on pro-democracy protesters in Hong Kong.

The Lancet COVID-19 Commission has afforded Sachs access to both the United Nations and the WHO, both of which have been accused of appeasing the Chinese government amid fallout over Beijing’s early cover up of the severity of coronavirus.

The commission’s website says it partners with The Lancet, the prominent medical journal, and with the United Nations Sustainable Development Solutions Network, which was formed in 2012 by then-UN Secretary-General Ban Ki-Moon.

It is unclear what influence the Lancet commission has had on WHO and UN’s coronavirus related efforts, but Sachs co-hosted an online forum on Dec. 17 with the WHO to discuss Asian countries’ handling of the pandemic.

Sachs, who served as an adviser to the UN from 2002 to 2018, also met with the president of the United Nations General Assembly on Jan. 22 to discuss the Lancet commission’s work.

Sachs has also appeared on CNN to tout a study he co-authored at Columbia in October that estimated that then-President Donald Trump’s policies were responsible for between 130,000 and 210,000 additional COVID-19 deaths.

The Lancet commission claimed in its early statements that it would investigate all theories about the virus origins with an open mind, though remarks from Daszak and Sachs both suggest that they dismissed the lab leak theory long ago.

The commission listed 10 priorities for action in its initial statement on Sept. 14, 2020.

The top priority, the commission said, was to “Track down the origins of the virus in an open, scientific, and unbiased way not influenced by geopolitical agendas.”

Daszak, who leads the New York-based EcoHealth Alliance, said in a statement on Nov. 23 that the commission would conduct “a thorough and rigorous investigation” into the early spread of the virus.

But emails recently released by U.S. Right to Know, a health care watchdog group, show that Daszak organized a group of 27 scientists back in February 2020 to sign a letter published by The Lancet calling the accidental lab leak hypothesis a “conspiracy theory.”

U.S. Right to Know asserted that the emails show Daszak had made up his mind about the theory nearly a year before he joined the WHO team investigating the virus origins in China.

Daszak, along with many other scientists, have embraced the theory that the virus jumped from an animal species to humans, likely at a food market in Wuhan.

The watchdog group has also accused Daszak and the EcoHealth Alliance of having a conflict of interest because of grants the group has received from the U.S. government for work with the Wuhan lab.

Sachs also dismissed the lab leak theory before the Lancet commission had investigated the virus’s origins.

In a virtual discussion in September, Sachs called the lab leak hypothesis “an extremely dangerous point,” but said it was “important” to publicly dispute it.

Daszak has been one of the more vocal members of the 17-member WHO investigative team.

After State Department spokesman Ned Price said on Feb. 9 that the U.S. government planned to independently review the WHO team’s findings, Daszak shot back on Twitter, urging: “don’t rely too much on U.S. intel.”

The leader of the WHO team, Peter Ben Embarek, said last week that the theory that the virus was the result of an accidental lab leak from the Wuhan Institute of Virology was “extremely unlikely.”

The New York Times declared Embark’s remarks a “public relations win” for the Chinese government since officials there have long denied the lab leak hypothesis.

The WHO’s assessment has been met with wide skepticism, even within President Joe Biden’s administration, which has defended the WHO against conservative threats to defund it over its alleged appeasement of China.

Jake Sullivan, the Biden administration’s national security adviser, issued a statement Saturday saying the U.S. was “deeply concerned” by reports that Chinese authorities withheld raw data on early coronavirus cases from the WHO investigators.

Some scientists have cast doubt on the WHO’s findings, pointing to Daszak’s role on the team.

“I was not surprised at all about the conclusions of the WHO. Having Daszak on board and deciding to visit a few labs in Wuhan only after pressure from the media was not very promising,” Rossana Segreto, a researcher at the University of Innsbruck, told the Daily Caller.

While Sachs has no apparent financial ties to the Wuhan lab, he has for years been a reliable defender of China’s foreign and domestic policy. From 2001 to 2002, he advised China’s State Development Planning Commission, which sets the communist regime’s economic policies.

Sachs became a frequent guest of China’s state-controlled media outlets to voice criticism of Trump’s aggressive stance toward Beijing. The Washington Free Beacon reported some of his comments last year after progressive Democrats floated Sachs for a position in the Biden administration’s Treasury Department.

In an interview in April 2020 with CGTN, which the U.S. government considers a Chinese propaganda outlet, Sachs called Trump’s threat to cut funding to the WHO “disgusting” and “disgraceful.”

Trump had called for defunding the WHO based on allegations that it had failed to hold the Chinese government accountable for withholding data about the coronavirus.

Republicans accused WHO leaders of avoiding confrontation with China over the communist regime’s early handling of information about the coronavirus. In some cases, Beijing provided false information about the transmission of the virus and the number of cases detected in China.

On Jan. 14, 2020, the WHO cited Chinese authorities making the now-debunked claim that coronavirus was likely not infectious.

Sachs does not appear to have criticized the Chinese government over its bungled pandemic response.

Prior to the pandemic outbreak, Sachs contributed to a position paper released in November 2018 by Huawei, which manufactures surveillance equipment that the Chinese government has used to track Uighurs.

Sachs praised China’s poverty alleviation program during an interview with another state-controlled TV network.

“China has done more to reduce extreme poverty in a short period of time than any other country in history,” Sachs told the Beijing-controlled Xinhua News Agency in an interview that aired earlier this month.

The Chinese consulate in Australia tweeted out the video.

Sachs has also refused to condemn the Chinese government for engaging in intellectual property theft, and for human rights abuses against Uighurs in western China.

Instead, he accused the U.S. in an interview last month of engaging in similar human rights abuses and underhanded business tactics.

“It strikes me as odd that American policymakers think that the United States alone ought to run the show, or that the United States ought to gang up with other countries to corner China, as if this was the Cold War with the Soviet Union,” he said in an interview with The Wire China.

“Thereʼs no purity in this topic,” Sachs continued. “Thereʼs a lot of industrial espionage and cheating by U.S. companies.”

Sachs deflected questions about China’s human rights abuses against Uighurs, which Tony Blinken, the secretary of state under Biden, recently characterized as a “genocide.”

“We have huge human rights abuses committed by the U.S. on so many fronts,” Sachs said in the interview.

Sachs was on the advisory board to the China Energy Fund Committee, a think tank funded by CEFC China Energy, a now-defunct energy conglomerate affiliated with China’s People’s Liberation Army.

Sachs appeared at several events hosted by Patrick Ho, the chairman of the think tank.

During one event, Sachs praised China’s economic sustainability initiative, One Belt, One Road, at a China Energy Fund Event held in 2016.

“This plan is a pivotal one for China,” Sachs said at the event, according to China Daily.

Patrick Ho, the chairman of the think tank, was indicted and convicted on charges that he offered bribes on behalf of CEFC China Energy to two African leaders to purchase oil rights in their countries.

CEFC China paid Hunter Biden $6 million from August 2017, including $1 million to represent Ho.

Federal prosecutors obtained a Foreign Intelligence Surveillance Act (FISA) warrant on Ho based on the suspicion that he was working as a secret foreign agent, according to court filings in his case.

Sachs is also on the board of the Center for International Relations and Sustainable Development, a Serbian think tank founded by Vuk Jeremic, a former Serbian foreign minister who served as president of the UN General Assembly through 2012.

Jeremic testified at Ho’s trial that he made the introductions to the African officials who Ho tried to bribe.

Jeremic lobbied Hunter Biden to help him with his failed campaign for UN secretary-general in 2016, according to emails from Biden’s laptop.

The Lancet commission did not respond to questions about Sachs’ and Daszak’s past remarks, saying instead that the task force “will thoroughly and objectively review all publicly available evidence, and conduct interviews with key leaders in diverse fields.”

A spokesperson for the commission said that investigators “will carefully assess all leading hypotheses that have been raised about the origins of COVID-19, from a natural zoonotic event to a laboratory release.”

The commission plans to publish a final report in the Lancet.

Sachs did not respond to a detailed list of questions. – the Daily Caller News Foundation

As reported by GreatGameIndia last year, Chinese officials deleted 300 studies of Batwoman Shi Zhengli from the top secret Wuhan lab linked to the origins of COVID-19. Details of more than 300 studies, including many investigating diseases that pass from animals to humans are no longer available.

Last year a Beijing-based media group Caixin published a shocking report that the Hubei Provincial Health and Medical Commission ordered the destruction of Coronavirus samples.

Five years ago, Italian state owned media Company, Rai – Radiotelevisione Italiana, exposed these Chinese experiments on viruses.

The video, which was broadcast in November, 2015, showed how Chinese scientists were conducting biological experiments on a SARS connected virus believed to be Coronavirus, derived from bats and mice, asking whether it was worth the risk in order to be able to modify the virus for compatibility with human organisms.

The person who covered-up this biological experiments and orchestrated the myth of the natural origin of COVID-19 is Peter Daszak.

The President of EcoHealth Alliance, Peter Daszak is the one who orchestrated the myth that COVID-19 is natural in origin.

Emails obtained by U.S. Right to Know show that the statement in The Lancet authored by 27 prominent public health scientists condemning “conspiracy theories suggesting that COVID-19 does not have a natural origin” was organized by employees of EcoHealth Alliance.

I mean, correlation does not prove causation, but it proves correlation, and that’s bad enough. No way in hell can anyone claim the “autoritah” is telling the truth.

MORE RESOURCES:

NYT Daszak comes back from China: https://www.nytimes.com/2021/02/14/health/WHO-covid-daszak-china-virus.html

NIH Funding: https://reporter.nih.gov/project-details/8674931
2. https://reporter.nih.gov/project-details/9819304#details

Full Grant to EcoHealthAlliance: https://www.usaspending.gov/award/ASST_NON_R01AI110964_7529

Baric UNC Endeavors, Stalking Sars: http://endeavors.unc.edu/fall2003/baric.html

Baric Emails: https://usrtk.org/biohazards-blog/ralph-baric-emails/

Obama Guidance on Gain of Function: https://obamawhitehouse.archives.gov/blog/2017/01/09/recommended-policy-guidance-potential-pandemic-pathogen-care-and-oversight

GPMB thanking Resolve To Save Lives: https://apps.who.int/gpmb/assets/annual_report/GPMB_Annual_Report_English.pdf

Gain of Function is pointless and unsafe: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7128689/

Justia Patent for whole coronavirus genome: https://patents.justia.com/patent/6593111

Nature: Sars-Like cluster of circulating bat coronaviruses shows potential for human emergence: https://www.nature.com/articles/nm.3985

Baric gets grant for research on emerging viruses: https://sph.unc.edu/sph-news/niaid-renews-5-year-grant-for-research-on-emerging-viruses

Science Mag: Risky Bird Flu gain of function research to resume (Feb 2019): https://www.sciencemag.org/news/2019/02/exclusive-controversial-experiments-make-bird-flu-more-risky-poised-resume

Also read:

BREAKING! CHINA ADMITS THE BIGGEST LIE, THE WEST AND BIG TECH COMPLICIT
trailer
EXCLUSIVE: GATES, FAUCI AND SLAOUI HAVE LONG BEEN COOKING AND SELLING SCANDALOUS VACCINES TOGETHER. IT’S A CARTEL
(1ST ANNIVERSARY SPECIAL) SOROS A ROTHSCHILD FRONTMAN, FORGED IMF-CHINA ALLIANCE. WE’RE LIVING THE CONSEQUENCES

To be continued?
Our work and existence, as media and people, is funded solely by our most generous readers and we want to keep this way.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Sometimes my memes are 3D. And you can own them. Or send them to someone.
You can even eat some of them.
CLICK HERE

How do I know the public discourse on Covid-19 is fully controlled and dishonest?
Because no one important is discussing the most crucial question.

If we’re talking a “novel virus”, which is the first logical question to ask for a microbiology ignorant like pretty much all politicians, presstitutes and big-techoles? As much as for anyone who “cares”?

And here’s the answer for the f-ing lazy cnts

A more extensive video with more evidence finally available HERE
Soon on more free speech platforms. Unfortunately, we can only embed Youtube videos here.

To be continued?
Our work and existence, as media and people, is funded solely by our most generous readers and we want to keep this way.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Imagine sheep can be used to store information or mine Bitcoin. That technology exists. So then imagine what sheeple can do for their farmer.
From a human farmer perspective, most people are worth less than the data they generate.

When Klaus Schwab cries about Dark Winters and cyber attacks, that’s the bait and biohacking is the switch.
Most essential and chilling documentary to enter the Great Reset era.
Unfortunately

UPDATE: Whoa boy! CBS’ 60 minutes confirms the rule: SILVIEW.media is a glimpse in the future and a peak in the past, and mainstream media will run shabby versions of our headlines a few weeks or months after we got over them. Consider this an addendum to our work:

US intelligence officials say Chinese government is collecting Americans DNA via Covid tests – CBS

Related and recommended:

YES, THEY CAN VACCINATE US THROUGH NASAL TEST SWABS AND TARGET THE BRAIN (BIOHACKING P.1)

RNA MODIFICATION USED TO ALTER DNA, BRAIN FUNCTIONS AND BEHAVIOR (BIOHACKING P.2)


SOME OF THE VIDEO RESOURCES I USED:

You Should Be Worried About Your DNA Privacy

Spy Agencies Using DNA for Storage, Your Body Could Hold all Data Ever Created

Microsoft and University of Washington DNA Storage Research Project – Extended

China Wants Your DNA

The Spy in Your Phone

More links, resources and comments to be added here soon, right now I’m exhausted, but anxious to get this in front of you, I invested myself quite a lot in it, enjoy!

“People Are Hackable Animals” – Yuval Harari @ Davos 2020 – full presentation

To be continued?
Our work and existence, as media and people, is funded solely by our most generous readers and we want to keep this way.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Let me help with the larger context…

BONUS

HSBC is a Chinese bank and…
…HSBC is also involved with Dominion voting, among others…

To be continued?
Our work and existence, as media and people, is funded solely by our most generous readers and we want to keep this way.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

If 2020 was an IQ test, flunking it means repeating it

Due to a little editing error, this important piece of the puzzle is missing from the video. Source.

To be continued?
Our work and existence, as media and people, is funded solely by our most generous readers and we want to keep this way.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Sometimes my memes are 3D. And you can own them. Or send them to someone.
You can even eat some of them.
CLICK HERE