Mankind uses the mobile phone as a shovel to dig its own grave.
With very rare exceptions of conscious users. If you want to be one of them, you need to be informed and aware of how this thing works and how our enemies use it against us. And in order to become so, you need, among other things, to fully absorb what I’m about to show you.

Perceptive people over 40 years old have often sensed a rift in the logic of events last few years.
The powers that be occasionally commit apparently illogical and inexplicable acts, that later make sense in relation with other later events . Like a present response to unpredictable future events. Which is also illogical, unless they have a time-travelling machine, another illogical concept. So we often erase these senselessly convoluted connections from our minds just to maintain sanity.

The mind-trap there is the assumption of unpredictability.

Pre-scripted events and predictive programming are two ways to solve the predictability problem. But sometimes these don’t work either and there’s just no way you can draw a straight timeline and causality.

What if you don’t need to time-travel to see the future?

What if they can simulate it, then build it and tune it up?
Which means they can react to what you would’ve done if they didn’t REACT BEFORE THE CAUSE?
Remember those stories in media where morons get arrested for resisting arrest and they are too dumb to defend themselves. Add a topping of Minority Report for good taste.
And to soften the edges, what if they just can control your edge perception?
Here’s how:

The Sentient World Simulation (SWS) vs. Targeted Individuals
The Sentient World Simulation (SWS) can plant Cognitive Autonomous Agents inside your head

A Military Second Earth

By BRUCE STERLING / Wired JUN 25, 2007

SOURCE: Sentient world: war games on the grandest scale | The Register .

“Perhaps your real life is so rich you don’t have time for another.

“Even so, the US Department of Defense (DOD) may already be creating a copy of you in an alternate reality to see how long you can go without food or water, or how you will respond to televised propaganda.

“The DOD is developing a parallel to Planet Earth, with billions of individual “nodes” to reflect every man, woman, and child this side of the dividing line between reality and AR.

“Called the Sentient World Simulation (SWS), it will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information”, according to a concept paper for the project.

“SWS provides an environment for testing Psychological Operations (PSYOP),” the paper reads, so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.

SWS also replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

“Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next….

(((Yeah, and New World Order cybersoldiers are gonna be Warcrafting-out on awesome gizmoscapes like this while some nimble illiterate teen with a cheap assault rifle simply shoots them.)))

Raytheon demonstrates how their RIOT software illegally tracks you online (2010)

Sentient World Simulation: You’re In It Now

by Ken Korczak, 01.01.2023

A powerful ‘sentient’ computer simulation of billions of people and nations that ‘mirrors’ reality is up-and-running and likely tracking your every move

Artificial neural network with chip. Credit: mikemacmarketing / original posted on flickr (Wiki Commons Public Domain)

What if someone created a digital avatar of you and placed it in a massive simulation database –- and you knew nothing about it?

How would you feel about that?

Yes, while you are blissfully ignorant and unaware and just going about your normal life, your “simulated self” is now also going about its own life in a simulated global environment with most of the other eight billion other people inside a simulated planet earth.

Well, what if I were to tell you that this has already happened?

It has!

The server for this world simulation database –- that includes your avatar -– is actually located in (drumroll): Indiana!

That’s right!

It’s called the Sentient World Simulation (SWS). It is up and running, and housed in a building at Purdue University, West Lafayette, Indiana.

The SWS is the brainchild of Dr. Alok R. Chaturvedi, a professor of information systems who is also the founder and director of the SEAS Laboratory at Purdue’s Krannert School of Management.

SEAS stands for Synthetic Environment and Analysis Simulations.

Dr. Chaturvedi outlined his concept for the SWS in a 2006 academic paper titled:

Sentient World Simulation: A Continuously Running Model of the Real World: A Concept Paper

From the abstract of this document, the concept is explained this way:

“The goal of the Sentient World Simulation (SWS) is to build a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information, such as major events, opinion polls, demographic statistics, economic reports, and shifts in trends.”

I should add that the “geography” of an area is modeled at multiple levels, including city, state, country, selected regions of interest and, of course, globally. Some categories for models include military, political, social, economic, informational and infrastructure nodes.

After publishing his 2006 concept paper, it didn’t take long for the thing to get up and running. By 2007, the SWS had already collected massive amounts of data in 62 of the 195 nations on Earth.

It is important to point out that the SWS is a project that was initiated by the U.S. Joint Forces Command.

Some believe, as does futurist Rebecca Hardcastle Wright Ph.D., that SWS has since advanced well beyond 62 countries in the 15 years since 2007 to now encompass most areas of the planet that matter and has swept up the majority of Earth’s 8-billion-person population.

IT’S NOT QUITE ‘THE MATRIX’ YET BUT …

Now let me clarify that your avatar in the SWS is not (probably not yet) a complete duplicate of yourself in terms of image or looks, and it does not possess self-aware consciousness as did Neo and his pals in the Matrix.

It is significant to note that the SWS team at Purdue maintains that they “do not create your identical likeness” and instead used a “depersonalized likeness.” They also say this depersonalized likeness is “not immediately identifiable” and “cannot be replicated.”

Even so, many may find it equally disturbing that each avatar in the SWS virtual reality universe does represent a thorough activity profile of who you are and what you are doing in the real world.

That’s because you are likely “feeding” your avatar every day whether you know it or not.

You do that by participating in the digital world. Every time you engage with cyberspace, the SWS vacuums up that data point and adds it to the profile of your avatar.

For example, when you make a purchase on Amazon, search for something on Google, do your taxes online, text a friend, pay a utility bill, use a debit card to pay for a meal at a restaurant –- that information is funneled to the SWS and your avatar is updated to reflect your ongoing lifestyle.

This creates a “predictive model” of you and tells SWS operators how you are likely to react in certain situations as well as how you will perform or act in a group dynamic situation.

WHY WAS THE SENTIENT WORLD SIMULATION BUILT?

Well …

Remember when former NSA computer consultant Edward Snowden went rogue in 2013 and fled to Hong Kong and then to the Russian Federation along with a treasure trove of highly classified intelligence files on the NSA’s massive global surveillance program?

This surveillance program involved mostly tapping and monitoring millions, if not billions of telephones and internet communication accounts. The overt rationale for the creation of this program was for counterterrorism.

Ostensibly, the NSA wanted to be able to identify terrorist chatter across the telecom and cybernetwork bandwidth as a way to identify and thwart possible major attacks against American interests.

National Security Agency HQ, Fort Meade, Maryland (Public Domain)

Snowden bolted because of the NSA’s ability to tap and monitor private citizens and everyday innocent Americans a fundamental violation of privacy, unconstitutional and the start of a bona fide “Big Brother” nightmare state.

Well, one might consider the SWS the next logical step. It is the NSA wiretap effort on steroids.

With this new system, the information gathering on all citizens of the world can go well beyond listening into their phone chatter, texting or email communications.

Rather, it collects a wide range of data points that essentially provides a complete profile of every person, including what they do, what they like, how they act in certain situations, and so on.

When all this information is dumped into one massive database –- in this case, an actual simulation program –- you not only have real-time data on every individual in every nation on earth -– you also now can massage the data in myriad useful ways.

That includes running gaming simulations on how vast populations will react to specific situations.

For example, let’s say the U.S. Department of Defense (DoD) would like to know how the population of the East Coast would react if they knew an enemy had released a deadly virus into the subway system of New York City.

The DoD folks would be eager to “game the scenario” of a bioweapons attack before it happened to that they, in turn, could formulate an effective response by knowing with a high degree of certainty how large populations of people would react.

As Dr. Chaturvedi writes in his concept paper:

“The ability of a synthetic model of the real world to sense, adapt, and react to real events distinguishes SWS from the traditional approach of constructing a simulation to illustrate a phenomenon. Behaviors emerge in the SWS mirror world and are observed much as they are observed in the real world.”

WHO USES SWS DATA?

As you might expect, the SWS has no lack of eager clients consisting of powerful government agencies, private entities and Fortune 500 companies. A short (and by far not exhaustive) list includes:

· The U.S. Department of Defense

· The U.S. Department of Justice

· Eli Lilly

· Lockheed Martin

· The U.S. Department of Homeland Security

Furthermore, SWS has found customers in everything from banks and financial institutions that use it to test psyop events — to Hollywood studios who want to “game out” audience reactions to proposed movie scripts and ideas.

The above is according to Hardcastle Wright in her book 2021 book, Exoconscious Humans. She also said the SWS was used to simulate a cough spreading inside an airplane during the height of COVID. (Exoconscious Humans, Page 160).

NSA poster, circa 1950s-60s (Public Domain)

IS THERE PUBLIC OUTRAGE?

There is some, but as far as I can tell, those sounding an alarm about the intrusiveness of the SWS are few and far between.

One person who is disturbed by the existence of the SWS is software specialist and cryptocurrency advocate Alireza Beikverdi. He wrote in a 2015 article for Cointelegraph.com:

“The project is dangerous and intrusive enough that one of its researchers even quit, citing concerns about the possibility of handing over such a dangerous weapon to a top-secret agency with little accountability.” (Source)

Beikverdi added:

“This not only invades our privacy but can also cause severe damage to society. Knowing that there is a copy of each of us in the virtual world, which can think and behave like us, and whose actions can be predicted by the authorities is a far more intimidating invasion. This will have a negative impact on societies by reducing trust between citizens and government, as well as among people — altering normal human behavior since the populace will be conscious of the fact that there is a copy of them in a virtual world without their consent.” (Source)

Others grumble about the SWS but also express a sense of inevitability. One example is the commentators over at the Everywhere You Go is Bullsh*t webcast. In this video, they state:

“As our lives move online, this (the SWS) is an inevitable part of that. We all want that feeling of safety and this kind of thing provides … and we allowed this to happen. I think as more people become aware that this is the reality of this intense kind of privacy breach is happening, I think eventually we are going to accept it and it is going to get worse — or there will be some kind of rebellion about it and it’s going to be a pretty interesting future.”

ONLY SCRATCHING THE SURFACE

Certainly, the existence of the Sentient World Simulation project at Purdue University has profound implications in and of itself.

However, in conducting research for this story, I quickly found myself drawn into a much deeper and more complex rabbit hole.

When you place the SWS into context with other current facets driving other kinds of technological determinism — such as the race toward fully self-conscious AI, the cybernetic manipulation/transformation of the human body, the transhumanism movement writ large — it becomes apparent that SWS is but one aspect of a rapidly evolving human sphere of fundamental transformations.

Thus, even if you loathe the idea of the SWS and want to implement social and/or political efforts to slow it down or kill it — you’ll be up against an array of technological/social initiatives of profound scope, character, variety and purpose.

Can anyone stop it, or even opt out? That won’t be easy.

CIA’s Gus Hunt On Big Data: We ‘Try To Collect Everything And Hang On To It Forever’

The CIA Wants Big Data — All Of It

By Matt Sledge / Huffington Post, Mar 20, 2013

NEW YORK — The CIA’s chief technology officer outlined the agency’s endless appetite for data in a far-ranging speech on Wednesday.

Speaking before a crowd of tech geeks at GigaOM’s Structure:Data conference in New York City, CTO Ira “Gus” Hunt said that the world is increasingly awash in information from text messages, tweets, and videos — and that the agency wants all of it.

“The value of any piece of information is only known when you can connect it with something else that arrives at a future point in time,” Hunt said. “Since you can’t connect dots you don’t have, it drives us into a mode of, we fundamentally try to collect everything and hang on to it forever.”

Hunt’s comments come two days after Federal Computer Week reported that the CIA has committed to a massive, $600 million, 10-year deal with Amazon for cloud computing services. The agency has not commented on that report, but Hunt’s speech, which included multiple references to cloud computing, indicates that it does indeed have interest in storage and analysis capabilities on a massive scale.

The CIA is keenly interested in capabilities for so-called “big data” — the increasingly massive data sets created by digital technology. The agency even has a page on its website pitching big data jobs to prospective employees.

Hunt acknowleded that at some scale, data storage becomes impractical, adding that he meant “forever being in quotes” when he said the agency wants to keep data “forever.” But he also indicated that he was interested in computing capabilities like 1 petabyte of RAM, a massive capacity for on-the-fly calculations that has heretofore been seen only in computers that simulate nuclear explosions.

He referenced the failure to “connect the dots” in the case of Umar Farouk Abdulmutallab, the “underwear bomber” who was able to board a plan with an explosive device despite repeated warnings of his intentions. In that case, a White House review found that the CIA had all of the data it needed to identify the would-be bomber, but still failed to stop him. Nevertheless, the agency does not seem to have curbed its ambitions for an endless amount of data.

A slide from Hunt’s presentation.

“It is really very nearly within our grasp to be able to compute on all human generated information,” Hunt said. After that mark is reached, Hunt said, the agency would also like to be able to save and analyze all of the digital breadcrumbs people don’t even know they are creating.

“You’re already a walking sensor platform,” he said, nothing that mobiles, smartphones and iPads come with cameras, accelerometers, light detectors and geolocation capabilities.

“You are aware of the fact that somebody can know where you are at all times, because you carry a mobile device, even if that mobile device is turned off,” he said. “You know this, I hope? Yes? Well, you should.”

Hunt also spoke of mobile apps that will be able to control pacemakers — even involuntarily — and joked about a “dystopian” future where self-driving cars force people to go to the grocery store to pick up milk for their spouses.

Hunt’s speech barely touched on privacy concerns. But he did acknowledge that they exist.

“Technology in this world is moving faster than government or law can keep up,” he said. “It’s moving faster I would argue than you can keep up: You should be asking the question of what are your rights and who owns your data.”

US Govt Develops a Matrix-Like World Simulating the Virtual You

ALIREZA BEIKVERDI, COINTELEGRAPH, MAY 05, 2015

Picture a parallel virtual world that collects information on our virtual identities in real time, tracks our behavior, and is smart enough to interpret this data to simulate a virtual YOU on its own.

It is not surprising that data in the Information Age can be extremely valuable, even a source of power. Now picture a parallel virtual world that collects information on our virtual identities in real time, tracks our behavior, and is smart enough to interpret this data to simulate a virtual YOU on its own. This is exactly the concept of Sentient World Simulation (SWS) that was proposed in a paper by a few researchers in 2006, which has since largely flown under the radar.

Sentient World Simulation

SWS is one of the ongoing projects by secret agencies and organizations such as the NSA. In fact, these organizations have a long history of always seeking new technologies to process a continuous stream of information about the population. However, SWS differs from other information aggregators such as Google in that this technology actually simulates us, while taking our personalities into account, in a parallel virtual world.

SWS is actually a continuously running, continually updated mirror model of the real world in parallel on a computer, designed to predict and evaluate future events and courses of action. Put simply, SWS is a virtual mirror of the real society where individuals, leaders, organizations and institutions are simulated according to real data. The geography of a society is modeled at various levels including city, province, country, region, and world in terms of political, military, economic, social, information and infrastructure nodes.

SWS uses Synthetic Environment for Analysis and Simulation (SEAS), which is designed to be agnostic to the type of simulations and choice of models in order to allow experimentation in the context of multiple and potentially conflicting theories and predictions.

In a complex scenario, a single theory from SWS doesn’t give comprehensive information about the case. It requires a different analysis from different perspectives of the same phenomena by combining all the theories. It’s developed in a way where each component and theory is built on the previous, serving as stepping stones in the development of SWS.

Global Research reported that “U.S. defense, Intel and homeland security officials” are involved in constructing this project. With all the massive data collections, and also all the records from the Internet, SWS has the potential to predict the answers to many complicated queries, as it gets more intelligent the more information it is fed.

Watched Over by Machines

The project is dangerous and intrusive enough that one of its researchers even quit, citing concerns about the possibility of handing over such a dangerous weapon to a top secret agency with little accountability.

Back in 2009, PBS Nova reported:

“With the entire Internet and thousands of databases for a brain, the device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collected — through phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records — it may one day be possible to know not just where people are and what they are doing, but what and how they think.”

This not only invades our privacy but can also causes severe damage to society. Knowing that there is a copy of each of us in the virtual world, that can think and behave like us, and whose actions can be predicted by the authorities is a far more intimidating invasion. This will have a negative impact on societies by reducing trust between citizens and government, as well as among people — altering normal human behavior, since the populace will be conscious of the fact that there is a copy of them in a virtual world without their consent.

Another thing in the back of everyone’s minds could also be the possibility of a virtual copy doing something that you are doing right now. Perhaps a simulated version of me has actually written this article? The line between actual reality and virtual reality will surely blur as more and more information is collected.

Some people may argue that SWS could also be a beneficial tool for governments and secret agencies to use to prevent terrorism and predict incidents by simulating them in a mirror world. Moreover, these type of models are often justified by the phrase: “If you have nothing to hide, then you have nothing to fear.” This phrase has always been the excuse of those who want to downplay increasing threat of a surveillance state and imply guilt for those who express concern.

But while massive data gathering and simulation models could indeed have their benefits for society. Such is the double-edged sword of most breakthrough technology. The centralized control of personal and social information by a single entity gives it immense and unprecedented power.

Decentralization

Blockchain architecture could be used to create a decentralized data network that would not give any particular entity control, mitigating the risk of data misuse. Decentralization, by not giving an advantage to any one entity, is a viable solution that can save us from horrible future scenarios.

While this system is certainly more difficult to build and implement, as it requires the involvement of a lot of people, a decentralized data network not only guarantees and makes sure that the technology isn’t used against the interests of the majority of the population, but also reduces the possibility of censorship, facilitating free speech

Any new technology can be used for both good and evil. Nevertheless, if these technologies are used transparently and in a way that reduces the possibility of manipulation and centralized control by bad actors, then the relationship between people and their representative government would be drastically improved. Perhaps then we would be able to attain greater individual privacy and realize the vision of Edward Snowden, who described his childhood:

“I grew up with the understanding that the world I lived in was one where people enjoyed a sort of freedom to communicate with each other in privacy, without it being monitored, without it being measured or analyzed or sort of judged by these shadowy figures or systems, any time they mention anything that travels across public lines.”

How the Government Predicts The Future – Inside the “Sentient World Simulation”

by James Corbett
BoilingFrogsPost.com
July 4, 2012

Podcast: Play in new window | Download | 

The NSA’s illegal warrantless wiretapping program. The building of the massive NSA data center in Utah to permanently store copies of all digital communication sent around the world. The UK government’s “Communications Data Bill” to monitor emails, instant messages and other personal information. What was dismissed as crazy conspiracy theory just over a decade ago has become, in this post-9/11 era, the all-too-familiar stuff of newspaper headlines and talking head reportage.

In fact, it was about a decade ago that the tactic of the intelligence agencies seemed to change. Instead of keeping their activities classified–referring to the NSA as “No Such Agency,” for example, or officially denying the existence of Echelon–the government increasingly began shoving this information in the public’s face.

Perhaps the scariest thing about something like the Total Information Awareness Office is not merely that it was proposed in the first place, or that it incorporated such blatantly creepy Orwellian imagery to convey its true nature and purpose, but that, as we sit here 10 years later, and as the core functions of the TIA office are now being openly performed by the NSA, DHS and other governmental agencies, people are now actively making excuses for this nightmarish police state.

“If you have nothing to hide then you have nothing to fear” has always been the rallying cry for those who are too afraid of questioning presumed governmental authority to speak out against the surveillance state and the implied assumption of guilt that goes along with it. With feigned bemusement these moral midgets inevitably ask “What’s so bad about the government spying on you, anyway?”

The answer, of course, is that the very question implies that the agencies tasked with carrying out this constant Big Brother surveillance are themselves above reproach, shining lights of moral rectitude who would never abuse this incredible power for nefarious ends. For the unimaginative out there, Hollywood yarns like “Enemy of the State” have provided fictional examples of what can go wrong if someone, somewhere, abuses this power of information and surveillance to target an innocent person in the wrong place at the wrong time.

To be sure, the power that these technologies give for agencies, or corrupt groups within those agencies, to destroy the lives of targeted individuals, is itself a fitting answer to the question of why government surveillance should be troubling to us. But beyond what can happen to specific, targeted individuals in such a scenario, however, is a much larger question: What if this data, our emails, our phone calls, our credit card transactions, our social media posts, our cell phone GPS logs, and all of the hundreds of other pieces of data that are admittedly being collected on us every day, were being fed into a database so gargantuan it contains a digital version of every single person on the planet? And what if that database were being used by the Department of Defense to war game various scenarios, from public reactions to natural disasters to the likelihood of civil unrest in the wake of a declaration of martial law?

Remarkably, this is precisely what is happening.

It is called the “Sentient World Simulation.” The program’s aim, according to its creator, is to be a “continuously running, continually updated mirror model of the real world that can be used to predict and evaluate future events and courses of action.” In practical terms that equates to a computer simulation of the planet complete with billions of “nodes” representing every person on the earth.

The project is based out of Purdue University in Indiana at the Synthetic Environment for Analysis and Simulations Laboaratory. It is led by Alok Chaturvedi, who in addition to heading up the Purdue lab also makes the project commercially available via his private company, Simulex, Inc. which boasts an array of government clients, including the Department of Defense and the Department of Justice, as well as private sector clients like Eli Lilly and Lockheed Martin.

Chatruvedi’s ambition is to create reliable forecasts of future world events based on imagined scenarios. In order to do this, the simulations “gobble up breaking news, census data, economic indicators, and climactic events in the real world, along with proprietary information such as military intelligence.” Although not explicitly stated, the very type of data on digital communications and transactions now being gobbled up by the NSA, DHS and other government agencies make ideal data for creating reliable models of every individuals’ habits, preferences and behaviors that could be used to fine-tune these simulations and give more reliable results. Using this data, the SEAS Laboratory and its Sentient World Simulation offshoot are able to create detailed, operable real-time simulations of at least 62 nations. “The Iraq and Afghanistan computer models,” according to a 2007 Register report on the project, “each has about five million individual nodes representing things such as hospitals, mosques, pipelines, and people.”

At the time of initial reports on the program five years ago, there were only 62 country-level simulations being run by the US Department of Defense. These simulations grouped humans into composites, with 100 individuals acting as a single node. But already at that time, the US Army had used the systems to create a one-to-one level simulation of potential Army recruits. The ultimate aim would be to archive enough data on each individual to be able to make a computer model of everyone on the planet, one that could be used to predict the behaviors and reactions of every single person in the event of various scenarios.

The program can be used to predict what would happen in the event of a large scale tsunami, for example, or how people would react during a bioterror attack. Businesses can use the models to predict how a new product would fare in the market, what kind of marketing plans would be most effective, or how best to streamline a company’s organization.

The original concept paper for the project was published in 2006 and in 2007 it was reported that both Homeland Security and the Defense Department were already using the system to simulate the American public’s reaction to various crises. In the intervening five years, however, there has been almost no coverage at all of the Sentient World Simulation or its progress in achieving a model of the earth.

There is a very good chance that these types of systems are, at least for the moment, pure quackery. Computers are only as valuable as their programming, after all, and the algorithms required to accurately predict responses in chaotic systems with multiple, dimly-understood variables is orders of magnitude beyond what is currently possible. Or is it? One of the great ironies of our time, as Glenn Greenwald goes on to point out in his speech on the surveillance state, is that although we live in a time when it is possible for nebulous government agencies to know every detail of your life, from what you ate for breakfast to where you shopped last night to who your friends are, we are also living in an age of unprecedented ignorance about what are our own governments are actually doing.

This is the heart of the matter. Somehow we are expected to go along with the sophomoric sophism that “If we have nothing to hide then we have nothing to fear,” yet at the same time we are asked to believe that the government must keep all manner of information secret from the public in order to carry out its work of “protecting” that public.

If the government has nothing to hide, then why doesn’t it release the notes, memoranda and findings of the 9/11 Commission in full and unredacted?

Why doesn’t it release the records of the JFK assassination investigation instead of arguing, as it is, that those records should once again be removed from a declassification review that is to take place in 2013, 50 years after the assassination itself took place?

Why doesn’t it release the full audit trail of what banks received the emergency TARP funds and in what amounts?

Is it because, after all, the government does have something to hide from the public that are its ostensible masters? Is it because the old maxim that “Knowledge is power” is more true than we could ever know, and that the government’s one-way insistence on transparency for the citizens and opacity for itself is a reflection of the power that it holds over us?

The Sentient World Simulation is just one example of one program run by one company for various governmental and Fortune 500 clients. But it is a significant peek behind the curtain at what those who are really running our society want: complete control over every facet of our lives achieved through a complete invasion of everything that was once referred to as “privacy.” To think that this is the only such program that exists, or even that we have any significant details about the ways that the SWS has already been used, would be hopelessly naive.

So where does this leave a public that is at such a disadvantage in this information warfare? A public that is effectively told that anything and everything they do, say or buy, can and will be catalogued by the a.i. control grid even as the details of that grid are to be kept from them? Unfortunately there is no easy way back from the precipice that we were ushered toward with the creation of the national security state and the passage of the National Security Act of 1947. Perhaps we have already stepped over that precipice and there is no going back in the current political paradigm. These are things for an informed, aware, knowledgeable citizenry to decide through a societal dialogue over the nature of and importance of “privacy.”

But without a general awareness that programs like the Sentient World Simulation even exist, what hope do we have in counteracting it?

SIMULATORS’ POV

Human running performance from real-world big data

Wearable exercise trackers provide data that encode information on individual running performance. These data hold great potential for enhancing our understanding of the complex interplay between training and performance. Here we demonstrate feasibility of this idea by applying a previously validated mathematical model to real-world running activities of ≈ 14,000 individuals with ≈ 1.6 million exercise sessions containing duration and distance, with a total distance of ≈ 20 million km. Our model depends on two performance parameters: an aerobic power index and an endurance index. Inclusion of endurance, which describes the decline in sustainable power over duration, offers novel insights into performance: a highly accurate race time prediction and the identification of key parameters such as the lactate threshold, commonly used in exercise physiology. Correlations between performance indices and training volume and intensity are quantified, pointing to an optimal training. Our findings hint at new ways to quantify and predict athletic performance under real-world conditions. Laboratory performance tests provide the gold standard for running performance but do not reflect real running conditions. Here the authors use a large, real world dataset obtained from wearable exercise trackers to extract parameters that accurately predict race times and correlate with training.

DARPA contractor runs real time AI simulations of live events to assess best response scenario

SOLUTIONS?

  1. Starve the beast of your data by minimizing unnecessary usage. You don’t really need a smartphone half the times you’re out. You’re just being a junkie. Buy a goddam laptop, you need it more than a new expresso machine, tape the camera and the mic, use it wisely to give away a minimum of info etc… whatever you can think of to minimize the authentic data about you.
  2. Intoxicate the beast with fake data: like things 7ou don’t really like, follow people you don’t care about, tag yourself in unrelated things, build a web o fake random connections, be unpredictable, break patterns, do random acts of randomness. When you start getting ads and suggestions you can’t care about, you’re on the good path.
  3. I await suggestions.

Worldwide Smartphone Shutdown Now! #WWSS

Also check: THE INTERNET OF BODIES AKA THE BORG IS HERE, KLAUS SCHWAB SAYS (BIOHACKING P.5)

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Few people noticed. And he’s not alone in this!
Insider info?

I used excerpts form this video.

This happened last days of may, followed shortly by:

Insider Selling: Alphabet Inc. (NASDAQ:GOOG) CAO Sells 42 Shares of Stock

Posted by MarketBeat News on Jun 3rd, 2022

   Alphabet Inc. (NASDAQ:GOOG – Get Rating) CAO Amie Thuener O’toole sold 42 shares of the business’s stock in a transaction that occurred on Wednesday, June 1st. The shares were sold at an average price of $2,298.63, for a total transaction of $96,542.46. Following the completion of the transaction, the chief accounting officer now owns 1,181 shares of the company’s stock, valued at $2,714,682.03. The sale was disclosed in a legal filing with the SEC, which is available at this link.

Amie Thuener O’toole also recently made the following trade(s):Get Alphabet alerts: 

  • On Tuesday, May 3rd, Amie Thuener O’toole sold 42 shares of Alphabet stock. The stock was sold at an average price of $2,335.30, for a total transaction of $98,082.60.
  • On Friday, April 1st, Amie Thuener O’toole sold 42 shares of Alphabet stock. The stock was sold at an average price of $2,800.20, for a total transaction of $117,608.40.

NASDAQ GOOG traded up $72.18 on Thursday, hitting $2,354.92. 1,373,569 shares of the company were exchanged, compared to its average volume of 1,582,973. The company has a market cap of $1.55 trillion, a PE ratio of 21.30, a PEG ratio of 1.07 and a beta of 1.13. Alphabet Inc. has a 12 month low of $2,044.16 and a 12 month high of $3,042.00. The stock has a fifty day moving average of $2,464.33 and a 200-day moving average of $2,675.68. The company has a current ratio of 2.87, a quick ratio of 2.85 and a debt-to-equity ratio of 0.06.

Shares of Alphabet are scheduled to split on Monday, July 18th. The 20-1 split was announced on Tuesday, February 1st. The newly minted shares will be payable to shareholders after the closing bell on Friday, July 15th.

Alphabet (NASDAQ:GOOG – Get Rating) last released its quarterly earnings data on Tuesday, April 26th. The information services provider reported $24.62 earnings per share for the quarter, missing analysts’ consensus estimates of $25.51 by ($0.89). Alphabet had a net margin of 27.57% and a return on equity of 30.18%. During the same quarter in the prior year, the business earned $26.29 earnings per share. On average, analysts expect that Alphabet Inc. will post 112.46 earnings per share for the current year.

GOOG has been the subject of a number of research analyst reports. Tigress Financial upped their price objective on shares of Alphabet from $3,540.00 to $3,670.00 in a research report on Friday, March 18th. Deutsche Bank Aktiengesellschaft decreased their price target on shares of Alphabet from $3,150.00 to $2,900.00 in a research report on Wednesday, April 27th. Canaccord Genuity Group upped their price target on shares of Alphabet from $3,350.00 to $3,500.00 and gave the company a “buy” rating in a research report on Wednesday, February 2nd. Cowen upped their price target on shares of Alphabet from $3,500.00 to $3,600.00 and gave the company an “outperform” rating in a research report on Wednesday, February 2nd. Finally, Wedbush restated an “outperform” rating on shares of Alphabet in a research report on Wednesday, April 20th. One investment analyst has rated the stock with a hold rating and thirty have assigned a buy rating to the company. According to data from MarketBeat.com, Alphabet presently has a consensus rating of “Buy” and a consensus price target of $3,308.77.

Several institutional investors have recently added to or reduced their stakes in GOOG. Morgan Stanley lifted its stake in shares of Alphabet by 2.1% in the second quarter. Morgan Stanley now owns 2,433,132 shares of the information services provider’s stock valued at $6,098,209,000 after buying an additional 50,601 shares in the last quarter. New World Advisors LLC purchased a new stake in shares of Alphabet in the third quarter valued at about $724,000. EagleClaw Capital Managment LLC raised its holdings in shares of Alphabet by 3.5% in the third quarter. EagleClaw Capital Managment LLC now owns 2,946 shares of the information services provider’s stock valued at $7,853,000 after purchasing an additional 99 shares during the last quarter. Legacy Wealth Planning LLC purchased a new stake in shares of Alphabet in the third quarter valued at about $205,000. Finally, BloombergSen Inc. raised its holdings in shares of Alphabet by 1.4% in the third quarter. BloombergSen Inc. now owns 45,471 shares of the information services provider’s stock valued at $121,180,000 after purchasing an additional 616 shares during the last quarter. 31.20% of the stock is currently owned by hedge funds and other institutional investors.

About Alphabet

Alphabet Inc provides various products and platforms in the United States, Europe, the Middle East, Africa, the Asia-Pacific, Canada, and Latin America. It operates through Google Services, Google Cloud, and Other Bets segments. The Google Services segment offers products and services, including ads, Android, Chrome, hardware, Gmail, Google Drive, Google Maps, Google Photos, Google Play, Search, and YouTube.

MarketBeat News

So Alphabet stock doesn’t seem to be currently underperforming. If the cause of all these evolutions is not something happening in the present, Gates and the Alphabet CAO could very well have information about something in the future that determined them to take action. Insider info?

As for publicly available info on Alphabet’s future, the only notable event announced is:

Google parent Alphabet announced a 20-for-1 stock split. Here’s what that means and how it will impact investors – CNBC

In short, that means Alphabet shares aren’t many and they are expensive. It also means the current owners are not trading them enough to create speculative value growth. So they split every share in 20 tinier shares with the same total value. Those are bite-sized shares that smaller sharks can take on.

What that also means is that Alphabet needs funds and the little closed circle of rich elite stockholders isn’t providing enough, the actual business is not making much either, so they need to raise more from market speculations. The strategy chosen to achieve this:
They lower their pants a bit for easier plebeian access, in hope they will get access to more plebeian pockets in return.

While all this info might not be enough to derive definitive and specific conclusion about the future of these two pillars of the digital dome, namely Alphabet and Microsoft, a few things can be said with close to 100% certainty:

Extraordinary evolutions have extraordinary causes.

The Military BioTech Complex will have to transform and adapt to the extraordinary change it’s causing. That will reflect in its corporate avatars.

If Twitter is going through a self-inflicted crisis, it’s hardly possible for Google to fully avoid something similar, for the same reasons.
I’d guess Google should suffer even more from user backlash by now, because their offer is even easier to replace, but they’re just better at hiding it and there’s no Elon Musk to look under their hood.

Microsoft’s public image is inextricably tied to Bill Gates’, whose credibility took the most spectacular nosedive last couple of years.

These previous four statements might be one and the same.

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Sometimes my memes are 3D. And you can own them. Or send them to someone.
You can even eat some of them.
CLICK HERE

For my mother, who has just buried my father, passed away from a very suspicious heart event involving some clots. She had to bury him in my absence, because the Military BioTech Complex holds us prisoners on two different continents. I had to bury myself in work to keep it together.

Work in progress, I will keep adding pieces to the Tetris until it goes away.
Please return regularly for updates, this is a very long and fascinating story that should change the worldview for most people.

This is to request that the current retention allowance [(b)(6) redaction] for Dr. Anthony S. Fauci be converted to a permanent pay adjustment in the amount [(b)(6) redaction] over his base pay of [(b)(6) redaction] in order to appropriately compensate him for the level of responsibility in his current position of Director, National Institute of Allergy and Infectious Diseases (NIAID), National Institutes of Health (NIH), especially as it relates to his work on biodefense research activities.”

GW BUSH

Key points

First, in the US, Military and an emerging petrochemical industry with strong roots in agriculture but expanding into health, among others. The Rockefellers were the main force driving this expansion in the US and bridging over the ocean to Germany, the most advanced country in terms of chemical industrialization.
But it was mostly Crown-controlled and Rothschild-controlled from the City of London, through their many henchmen.

After a few good collaborative experiences, the Military and Pharmafia decided they have a future together, and they bought up the Academia to help with the labs and the brains, as both industries already had a foot in the door there.

Two world wars demonstrated there’s hardly any limit to what they can achieve together.

The Cold War is then used as an excuse to develop more surveillance and population control tools. From these efforts spring1 out Silicon Valley and the Internet.

Before the end of 20th century, Big Pharma and Big Tech are fused by all means: capital, gear, agenda.

The Great Military BioTech Complex is born to be the main Operating System of the system.

9/11 is the launch of the new control grid.

Many of the following events were just test runs.

Covid is a forced upgrade of this operating system.

Weapons trade is disguised as “defense”, bioweapons trade as “biodefense”. And the latter is booming.

Transhumanism Airlines depart from Humanism and are set to land in lifeless soulless material existence.

The Military Biotech Complex Origins

After 1865, American inventiveness turned away from war and toward commerce and industry. Development of the lands of the West did promote some agencies to investigate natural resources. The Department of Agriculture, the Department of Commerce and Labor, and the National Park Service appeared during this period. While government research tended toward the applied end of the research spectrum, newly-created private foundations, such as the Rockefeller Foundation and the Carnegie Institute of Washington, supported much of the nation's basic scientific research.- Daniel Else, "Origins of the Military-Industrial Complex", 2017 
This is the official history, not whistleblowing. It’s redacted by a system critter to make crimes palatable to the normies. Still a good starting point

Summary

Daniel Else explored the results of his year-long inquiry into the organizational underpinnings of that military technological revolution of the 1940s and 1950s. By mining the Library’s resources, Else traced the evolving relationship between science and the federal government leading to the creation of the Office of Scientific Research and Development (OSRD) in 1941. A temporary wartime agency, OSRD mobilized the nation’s academic and industrial technological resources in support of the war effort, and in so doing profoundly altered the linkages between science and engineering, industry, and government. Else explored those wartime changes and outline their impact, still seen and felt today more than seven decades after V-J Day.

Event Date September 21, 2017

Notes-  Daniel Else was a specialist in national defense in the Congressional Research Service in the Library of Congress and the 2016 Kluge Staff Fellow at the Library’s John W. Kluge Center.

Finally in 1950, the Air Force created a larger organization, the Air Research and Development Command. The House finally passed the Senate bill that had been passed the year before, and the president signed the bill, establishing the National Science Foundation. So in that five-year gap, what we saw was the creation of a number of military, Department of Defense organizations for science and scientific research, and the final NSF bill contained no mandate for military research for the National Science Foundation. 

So, what are its legacy organizations? A number of federal agencies can trace their origins back to the OSRD. National Science Foundation, of course, the Office of Naval Research, the Army Research Development and Engineering, or, and Evaluation Command, Air Force Office of Scientific Research, DTRA, the Defense Threat Reduction Agency, DARPA, of course, and in the Department of Energy, the National Nuclear Security Administration, which is the custodian of atomic stockpile. - Daniel Else, "Origins of the Military-Industrial Complex", 2017 
Some of Vannevar Bush’s greatest official honors

One of Vannevar Bush’s PhD students at MIT was Frederick Terman, who was later instrumental in the development of “Silicon Valley”.

Wikipedia
CIA’s Senate Hearing on the Heart Attack Gun and the Bioweapons Developed in Fort Derrick (1975)

MEANWHILE, IN EUROPE

AND FROM THERE TO ALL THE QUEEN’S TERRITORIES

MIT is basically MBTC’s main civilian lab
Rockefeller Medicine – James Corbett
One of the most essential videos on Internet. Source

From Dark Winter to the coming winter – how biodefense drills have altered society

DR. HEIKO SCHÖNING: THE STAGE FOR THE DARK WINTER HAS BEEN SET WITH THE ANTHRAX ATTACKS FROM 2001. There was even an Event201 for the Anthrax attacks. It was called “The Dark Winter”

The Dark Winter exercise was the collaborative effort of 4 organizations. John Hamre of the Center for Strategic and International Studies (CSIS) initiated and conceived of an exercise wherein senior former officials would respond to a bioterrorist induced national security crisis. Tara O’Toole and Tom Inglesby of the Johns Hopkins Center for Civilian Biodefense Studies and Randy Larsen and Mark DeMier of Analytic Services, Inc., (ANSER) were the principal designers, authors, and controllers of Dark Winter. Sue Reingold of CSIS managed administrative and logistical arrangements. General Dennis Reimer of the Memorial Institute for the Prevention of Terrorism (MIPT) provided funding for Dark Winter.

DARK WINTER Official page

Deleted article, now ARCHIVED HERE

Simulations and Tabletop Exercises

Part of the: Homeland Security Archived Projects

Preparing homeland security professionals through scenario-based simulations and exercises on key issues.

Steadfast Resolve

The Steadfast Resolve exercise was planned to address the concern that poorly designed government response to the next terrorist attack could disrupt America’s economy and society as much or more than the attack itself. This concern is particularly relevant in the context of an attack that may be harmful, but not catastrophic.

In the event of a next attack, government officials will be under enormous pressure to respond swiftly, more than likely with limited information about the status of the attack or what to expect next. In today’s news cycle, the public – and the situation – will demand a swift and decisive response perhaps before exactly what is happening becomes clear. Confusion, indecision, or false starts at government’s highest levels will be magnified and may have long-lasting ramifications. Getting it wrong will be easier than getting it right. As the Hurricane Katrina experience has demonstrated, a lack of situational awareness, understanding of current plans, and an absence of effective decisionmaking tools can lead to disaster. 

Dark Winter: Bioterrorism Simulation Exercise

In the summer of 2001, a group of senior-level officials, including Gov. Frank Keating of Oklahoma, David Gergen, and James Woolsey, participated in an executive level simulation. Dark Winter simulated a U.S. National Security Council meeting at which senior officials were confronted with a smallpox attack on the United States. The exercise illustrated the issues to be addressed in the event of a bioterrorism crisis, including the challenges facing state and local governments, the role and responsiveness of the federal government, and the likely friction spots between federal- and state-level responders and responses.

Coming as it did before the September 11 terrorist attacks and the subsequent anthrax attacks, Dark Winter generated an enormous amount of interest in both the public policy community and the media. CSIS briefed Vice President Dick Cheney, then National Security Advisor Condoleeza Rice, then FEMA Director Joe Allbaugh, over 80 members of Congress, senior government officials and leaders, including approximately 20 ambassadors to the United States, and senior government officials from Asia, Latin America, and Europe. Besides raising public awareness of the bioterrorism threat, these briefings contributed to the Bush administration’s decision to manufacture 300 million doses of the smallpox vaccine.

Silent Vector: A Critical Energy Infrastructure Simulation Exercise

The events of September 11 and additional intelligence on al Qaeda demonstrate the potential for an attack against the infrastructure of the United States. To face this challenge, CSIS developed an executive-level simulation focusing on U.S. critical energy infrastructure. The exercise took place in October 2002 and employed a simulated National Security Council of senior policymakers with former senator Sam Nunn, now chairman of CSIS’s Board of Trustees, serving as scenario president.

Silent Vector was designed to simulate possible U.S. reaction to a credible threat of terrorist attack when there is not sufficient information for effective protection. The overall purpose of the exercise was to assist the administration and Congress in their attempts to improve the effectiveness of response during the pre-attack phase of a major terrorist incident. Silent Vector challenged current and former senior government leaders to respond to increasingly credible and specific intelligence indicating the possibility of a large-scale attack against critical energy and energy-related infrastructure on the East Coast of the United States.
 

Black Dawn: A Scenario-Based Exercise on Catastrophic Terrorism

Organized under the auspices of the Strengthening the Global Partnership project by CSIS and the Nuclear Threat Initiative, Black Dawn gathered approximately 55 current and former senior officials and experts from the European Council, the European Commission, NATO, 15 member states, and various international organizations to grapple with the challenges associated with preventing the use of weapons of mass destruction (WMD) by terrorists.

The exercise aimed to develop a set of actionable recommendations for the EU, NATO and individual European governments to prevent terrorists from acquiring and using WMD. The exercise was designed to energize discussion and debate as various European countries and institutions entered into their policy and budget deliberations. The central question animating the exercise was this: In hindsight, what could we have done to prevent terrorists from acquiring WMD and conducting such an attack? And what more can and should we do now?

The exercise concluded with several lessons learned: the threat of WMD terrorism is real; it could happen in Europe; prevention is the best option; we can take concrete steps to significantly reduce the risk of terrorists acquiring nuclear, biological, and chemical weapons; Europe has a leadership role to play; and we need to act now.

  • Simon Chair BlogCommentaries on U.S. relations with countries in the Western Hemisphere – focusing on international political economy, trade, investment, energy, and other current events.

A “Dark Winter” for Public Health: Meet Homeland Security’s New Bioterror Czarina

by Tom Burghardt / August 24th, 2009

In the wake of the 2001 anthrax attacks, successive U.S. administrations have pumped some $57 billion across 11 federal agencies and departments into what is euphemistically called “biodefense.” Speaking at the World Economic Forum in Davos, Switzerland in January 2005, former U.S. Senate Majority Leader William Frist, a Bushist acolyte, baldly stated that “The greatest existential threat we have in the world today is biological” and predicted that “an inevitable bioterror attack” would come “at some time in the next 10 years.”

Later that year, Frist and former House Speaker Dennis Hastert (R-IL) covertly inserted language into the 2006 Defense Appropriations bill (H.R. 2863) that granted legal immunity to vaccine manufacturers, even in cases of willful misconduct. It was signed into law by President Bush.

According to Public Citizen and The New York Times, Frist and Hastert benefited financially from their actions; the pair, as well as 41 other congressmen and senators owned as much as $16 million in pharmaceutical stock. revealed that “the Biotechnology Industry Organization (BIO) is purported to be the key author of the language additions. This trade association represents virtually all major vaccine manufacturers.”

The Senate Majority Leader’s alarmist jeremiad at Davos was seconded by Dr. Tara O’Toole who added, “This [bioterrorism] is one of the most pressing problems we have on the planet today.”

Really? Not grinding poverty, global warming or the lack of access by hundreds of millions of impoverished workers and farmers to clean water, an adequate diet, health care or relief from epidemic levels of preventable diseases such as malaria, tuberculosis or diarrhea, but “bioterrorism” as narrowly defined by securocrats and their academic accomplices.

But Dr. Victor W. Sidel, a founder of Physicians for Social Responsibility (PSR) and an outspoken critic of the Bioweapons-Industrial-Complex challenged O’Toole’s hysterical paradigm.

Sidel made the point that there is a fundamental conflict between the state’s national security goals and health care providers’ professional responsibilities to patients. He wrote in 2003 that “military, intelligence, and law enforcement agencies and personnel have long histories of secrecy and deception that are contrary to the fundamental health principles of transparency and truthfulness. They may therefore be unsuitable partners for public health agencies that need to justify receiving the public’s trust.”

In this context, the choice of O’Toole as the Department of Homeland Security’s (DHS) Undersecretary of Science and Technology is troubling to say the least. As former CEO and Director of UPMC’s Center for Biosecurity, critics charge that O’Toole’s appointment will be nothing short of a disaster.

No ordinary policy wonk with an impressive résumé and years as a government insider, O’Toole is a key player advocating for the expansion of dual-use biological weapons programs rebranded as biodefense.

Subverting the Biological Weapons Convention

The resuscitation of American bioweapons programs are facilitated by their secretive and highly-classified nature. Under cover of academic freedom or intellectual property rights, the U.S. Bioweapons-Industrial-Complex has largely been outsourced by the state to private companies and contractors at top American corporations and universities.

Efforts to strengthen the Biological Weapons Convention (BWC) by the inclusion of verification language into the treaty and regular inspection of suspect facilities by international experts have been shot-down since 2001 by the Bush and now, the Obama administrations. Why?

Primarily because the United States view onsite measures as a threat to the commercial proprietary information of multinational pharmaceutical and biotechnology companies as well as to America’s reputedly “defensive” biological programs; initiatives that continue to work with nature’s most dangerous and deadly pathogens.

In fact, the problem of the dual-use nature of such research is a conundrum facing critics who challenge the break-neck expansion of concealed weapons programs. Simply put, military activities can be disguised as commercial research to develop medical countermeasures without anyone, least of all the American people, being any the wiser.

Highly-trained microbiologists deployed across a spectrum of low-key companies, trained for academic, public health, or commercial employment are part of the dual-use problem. Who’s to say whether scientists who genetically-manipulate pathogens or create Frankenstein-like chimera disease organisms (say, synthesized Marburg or Ebola virus as has already been done with poliovirus in a U.S. lab) are engaged in treaty-busting weapons research or the development of life-saving measures.

And what about the accidental, or more sinisterly, the deliberate release of some horrific new plague by a scientist who’s “gone rogue”? As researcher Edward Hammond pointed out:

British researchers pled guilty in 2001 to charges that they improperly handled a genetically engineered hybrid of the viruses causing hepatitis C and dengue fever. British authorities characterized the virus as “more lethal than HIV”. ‘Dengatitis’ was deliberately created by researchers who wanted to use fewer laboratory animals in a search for a vaccine for Hepatitis C. Under unsafe laboratory conditions, the researchers created and nearly accidentally released a new hybrid human disease whose effects, fortunately, remain unknown; but which may have displayed different symptoms than its parents and thus been difficult to diagnose, and have required a new, unknown treatment regime. (Emerging Technologies: Genetic Engineering and Biological Weapons, The Sunshine Project, Background Paper No. 12, November 2003)

A new report by the Center for Arms Control and Nonproliferation has charged that despite restrictions under the BWC prohibiting the development, production, stockpiling and use of weaponized disease agents such as anthrax, smallpox or plague, as well as equipment and delivery systems intended for offensive use, the rapid growth of “biodefense and research programs over the last decade” has placed “new pressure” on efforts to curb the development of banned weapons listed in the treaty.

In an interview with Global Security Newswire Gerald Epstein, a senior fellow with the hawkish Center for Security and International Studies (CSIS) told the publication, “When one is doing bioresearch and biodefense, one has to be careful to not overstep the treaty itself.”

He cited the U.S biodefense effort Project Bacchus–an investigation by the Defense Threat Reduction Agency to determine whether it was possible to build a bioweapons production facility using readily available equipment–as an instance where questions were raised if the treaty had been violated.

The type of biodefense activity that is most likely to raise questions regarding treaty compliance is “threat assessment,” the process of determining what type of biological attacks are most likely to occur, he told Global Security Newswire. A dangerous biological agent could inadvertently be developed during such research, Epstein said. (Martin Matishak, “Biodefense Research Could Violate Weapons Convention, Report Warns,” Global Security Newswire, August 20, 2009)

But Pentagon bioweaponeers did more than build “a bioweapons productions facility using readily available equipment.” They built banned weapons. According to Jeanne Guillemin, author of Biological Weapons: From the Invention of State-Sponsored Programs to Contemporary Bioterrorism, the Pentagon and CIA made and tested a model of a Soviet anthrax bomb and created an antibiotic-resistant strain of anthrax.

After consulting with scientists who strongly suggested that the CIA anthrax bomb project would violate the BWC, “CIA lawyers decided the project was within the allowed realm of defensive research,” Guillemin revealed. Project Clear Vision, a joint investigation by the CIA and the Battelle Memorial Institute, under contract to the Agency, reconstructed and tested a Soviet-era anthrax bomblet in order to test its dissemination characteristics. The Agency “decided the same” for the small, fully functional bioweapons facility built under the rubric of Project Bacchus.

The third initiative, Project Jefferson, led to the development of an antibiotic-resistant strain of anthrax based on a Soviet model. After the outgoing Clinton administration hesitated to give the CIA the go-ahead for the project, the Bush regime’s National Security Council gave the Pentagon permission. “They believed” Guillemin wrote, “the Pentagon had the right to investigate genetically altered pathogens in the name of biodefense, ‘to save American lives’.”

Shortly thereafter, the Pentagon authorized the Defense Intelligence Agency (DIA), one of the most secretive and heavily-outsourced Defense Department branches, to re-create the deadly anthrax strain.

What the scope of these programs are today is currently unknown. We do know however, that based on available evidence the Department of Homeland Security, the Defense Department and the oxymoronic Intelligence Community, using the Department of Health and Human Services (HHS) and the U.S. Department of Agriculture (USDA) as a cover, continue to investigate the feasibility of transforming nature’s most deadly pathogens into weapons.

In close coordination, the United States government and their outsourced corporate partners are spending billions of dollars on research and simulation exercises, dubbed “disaster drills” by a compliant media, to facilitate this grisly trade.

Secrecy and Deceit

That the official bioterror narrative is a preposterous fiction and swindle as even the FBI was forced to admit during its much-maligned Amerithrax investigation, is hardly worth a second glance by corporate media beholden to the pharmaceutical industry for advertising revenue; call it business as usual here in the heimat.

As we now know, the finely-milled anthrax powder which killed five people and shut down representative government didn’t come from the Afghan-Arab database of disposable Western intelligence assets known as al Qaeda, but rather from deep within America’s own Bioweapons-Industrial-Complex, to wit, from the U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) at Ft. Detrick in Maryland. But such troublesome and inconvenient truths are barely worth a mention by “respectable” media, e.g. the corporate stenographers who sold two imperialist military adventures to the American people.

Indeed, a credible case can be made that without the anthrax attacks, the fear levels gripping the country in the wake of the 9/11 terrorist events–and the subsequent clamp-down that followed, from the USA Patriot Act to the indefinite detention and torture of “terrorism” suspects, and from warrantless wiretapping to the demonization of dissent–may very well have been impossible.

It is difficult not to conclude that from the beginning of the affair, there was a clear intent on the part of the anthrax terrorist(s) to draw a straight line between 9/11 and the anthrax mailings. From there, it was but a short step to stitching-up a case for “regime change” in Iraq. The media’s role in this criminal enterprise was indispensable for what Salon’s Glenn Greenwald has called“the single greatest, unresolved media scandal of this decade.” As Greenwald points out,

During the last week of October, 2001, ABC News, led by Brian Ross, continuously trumpeted the claim as their top news story that government tests conducted on the anthrax–tests conducted at Ft. Detrick–revealed that the anthrax sent to [former Senator Tom] Daschle contained the chemical additive known as bentonite. ABC News, including Peter Jennings, repeatedly claimed that the presence of bentonite in the anthrax was compelling evidence that Iraq was responsible for the attacks, since–as ABC variously claimed–bentonite “is a trademark of Iraqi leader Saddam Hussein’s biological weapons program” and “only one country, Iraq, has used bentonite to produce biological weapons.” (Glenn Greenwald, “Vital unresolved anthrax questions and ABC News,” Salon, August 1, 2008)

Despite ABC News’ claims that their information came from “four well-placed and separate sources,” they were fed information that was patently false; as Greenwald avers, “No tests ever found or even suggested the presence of bentonite. The claim was just concocted from the start. It just never happened.”

And as we will shortly explore below, the dubious “Dark Winter” and “Atlantic Storm” bioterror exercises designed by Dr. Tara O’Toole freely drew from the neocon’s sinister playbook, right down to the weaponized smallpox supplied to al Qaeda by Saddam.

Whether or not one buys the current permutation of the “lone nut” theory, this one alleges that Dr. Bruce Ivins, a vaccine specialist employed by USAMRIID, was the anthrax mailer; the fact is, when all is said and done the attacks, to use a much over-hyped phrase, were an inside job.

And like other “lone nuts” who have entered the parapolitical frame at their own peril, Ivins isn’t around to refute the charges.

The Alliance for Biosecurity: Insiders with a Mission and (Very) Deep Pockets

Before being pegged by the Obama administration to head DHS’s Science and Technology division where she will oversee the department’s billion dollar budget, with some 45 percent of it going towards chemical and bioweapons defense, O’Toole, as previously mentioned, was the CEO and Director of UPMC’s Center for Biosecurity, a satrapy which describes itself as “an independent organization dedicated to improving the country’s resilience to major biological threats.”

How “independent”? You make the call!

According to their web site The Alliance for Biosecurity is “a collaboration among the Center for Biosecurity and 13 pharmaceutical and biotechnology companies whose mission is to work in the public interest to improve prevention and treatment of severe infectious diseases–particularly those diseases that present global security challenges.”

Alliance partners include the usual suspects: Bavarian Nordic; Center for Biosecurity of UPMC; Cangene Corporation; DOR BioPharma, Inc.; DynPort Vaccine Company LLC, a CSC company; Elusys Therapeutics, Inc.; Emergent BioSolutions; Hematech, Inc., a subsidiary of Kyowa Kirin; Human Genome Sciences, Inc.; NanoViricides, Inc.; Pfizer Inc.; PharmAthene; Siga Technologies, Inc.; Unither Virology LLC, a subsidiary of United Therapeutics Corporation. Rounding out this rogues gallery are associate members, the spooky Battelle Medical Research and Evaluation Facility and the Lovelace Respiratory Research Institute.

Among the chief activities of the Alliance is lobbying Congress for increased funding for the development of new drugs deemed “countermeasures” under the Project BioShield Act of 2004, previously described by Antifascist Calling as a particularly grotesque piece of Bushist legislative flotsam.

The Alliance avers that “the United States faces unprecedented risks to national security … by the clear and growing danger of bioterrorism or a destabilizing infectious disease pandemic,” and that “our nation’s vulnerability to biothreats is so severe” due to the fact that “most of the vaccines and medicines that will be needed to protect our citizens do not now exist.” Therefore, countermeasures needed to mitigate nebulous biothreats never spelled out once in the group’s literature “will likely require several years and several hundred million dollars each to successfully develop and produce.” (emphasis added)

An Alliance report, The State of Biosecurity in 2008 and Proposals for a Public/Private Pathway Forward, charts a course for “improving and accelerating” efforts to “develop medical countermeasures (MCMs) for the nation’s Strategic National Stockpile (SNS).”

Under the Project Bioshield Act of 2004, Congress authorized $5.6 billion over ten years “to purchase MCMs for the SNS.” Funds were allocated for the procurement of the anthrax vaccine as well as for “therapeutic antibodies for inhalational anthrax, a botulism heptavalent antitoxin, a smallpox vaccine, and several products for radiological and nuclear threats, obligating a total of about $1.9 billion of the $5.6 billion BioShield fund.”

In 2006 as I noted previously, Congress created the Biomedical Advanced Research and Development Authority (BARDA) within the Department of Health and Human Services (HHS). BARDA was authorized to spend some $1.07 billion over three years for MCMs, “only $201 million has been provided by Congress through FY 2008″ noted the Alliance, “approximately one-fifth of the authorized level.”

According to an “independent economic analysis” carried out by (who else!) the Alliance’s academic partner, the Center for Biosecurity, “it would require $3.4 billion in FY 2009 to support one year of advanced development.”

“Similarly” according to the organization, “the original appropriation of $5.6 billion for Project BioShield is equally insufficient to ensure that once MCMs are developed there will be funds available to procure them and maintain the stockpile.” Indeed, “this level of funding would need to be sustained for many years.” You can bet however, that Alliance lobbyists are busy as proverbial bees in pressuring Congress to fork over the dough!

The report state’s that Alliance goals necessarily entail instilling “a sense of urgency … with Congress” by hyping the “bioterror threat.” But there’s much more here than a simple cynical exercise at preparing the “public diplomacy” ground through academic and industry “message force multipliers” that will enable Congress to shower Big Pharma with a veritable tsunami of cash. A “risk-tolerant culture” should be promoted within BARDA, one that “understands the realities, risks, timelines, and costs of drug development.”

The “risks” to whom and for what purpose are not enumerated, but one can be certain that a “risk-tolerant culture” crafted by industry insiders will come at the expense of the health and safety of the American people, one that pushes potential legal liability should things head south onto the taxpaying public.

The stealth nature of Alliance recommendations are clearly spelled out when they aver that “stakeholders” should “focus more on the potential biothreats and the corresponding countermeasures, rather than the price tag” and that BARDA, ostensibly a public agency, should be packed with insiders “who have drug development and manufacturing experience.” This will lead to the development of “a culture that is focused on partnering with industry and academia.”

But the bottom line as always, is the corporatist bottom line for Alliance shareholders! How else can one interpret their statement that emerging “biothreats” are all the more dire today now that “interest of the public and private capital markets in biodefense has declined over the last 2-3 years.” What better way then, to beef-up those sagging capital markets than to install an industry-friendly individual at DHS with a documented track record of overplaying the “bioterror threat.”

Dark Winter

O’Toole was the principal designer of two “tabletop” bioterror preparedness drills, the 2001 Dark Winter exercise and the 2005 Atlantic Storm run-through; both were criticized by scientific experts as fabrications of an alleged threat of a smallpox attack mounted by al Qaeda.

Reviewing Milton Leitenberg’s 2005 report, Assessing the Biological Weapons and Bioterrorism Threat, published the U.S. Army War College’s Strategic Studies Institute, protein chemist Dr. Eric Smith wrote the following:

Of note is Leitenberg’s dissection of the process of assessment as practiced through bioterrorism threat scenarios conducted by the US government and private think tanks. Exercises like Dark Winter, which modeled an “aerosolized” smallpox attack, Top Off 2 and 3, both on pneumonic plague strikes, and Atlantic Storm, an exercise that purported to show an al Qaida group manufacturing a dry powder smallpox weapon, were rigged. In the cases of Dark Winter and the Top Offs, transmission rates of disease were sexed up beyond historical averages so that “a disastrous outcome was assured” no matter any steps taken to contain outbreaks. Eight pages are reserved to pointedly condemn the Atlantic Storm exercise on a host of sins which can generally be described as a bundle of frank lies and misinformation coupled with a claimed terrorist facility for making smallpox into a weapon that even state run biological warfare operations did not possess. And once again, juiced transmission rates of disease were employed to grease theoretical calamity. The reader comes to recognize the deus ex machina–a concoction or intervention added to dictate an outcome, in these cases very bad ones–as a regular feature of the exercises. However, the results of the same assessments–the alleged lessons learned–have never been reported with much, if any, skepticism in the media. (Eric Smith, “A Vaccine for the Hype: Milton Leitenberg’s new ‘Assessing the Biological Weapons and Bioterrorism Threat,” Global Security, National Security Notes, March 31, 2006)

In criticizing “the fancy that such attacks are easy and one of the most catastrophic threats faced by the American people,” Smith denounces the alarmist scenarios of Dark Winter and Atlantic Storm’s designers–people like Dr. Tara O’Toole and the coterie of industry insiders and other well-paid “experts”–as guilty of perpetrating a massive “fraud … and a substantial one” on the American people.

While one of Atlantic Storm’s architects proclaimed “this is not science fiction” and that “the age of Bioterror is now…” Leitenberg and Smith denounce O’Toole’s spurious claims as “not the least bit plausible.”

Leitenberg wrote that “well before October-November 2001, the spectre of ‘bioterrorism’ benefitted from an extremely successful sales campaign.” Indeed, hyped-up scenarios such as Dark Winter and Atlantic Storm that place “weapons of mass destruction” in the hands of shadowy, intelligence-linked terror outfits like al Qaeda provided “inflated predictions that … were certainly not realistic. Much worse, in addition to being wrong, inflated predictions were counterproductive. They induced interest in BW in the wrong audiences.”

But the implausible nature of the scenarios deployed in national exercises hardly prohibited the Bioweapons-Industrial-Complex from concocting scarecrow-like straw men designed to sow terror amongst the American people while extracting regular infusions of cash from Congress.

Among the eight exercises analyzed by Leitenberg between 1998-2005, he found that each and every one were fraudulently designed and the threat of bioterrorism had been framed as a rationalization for “political action, the expenditure of public funds for bioterrorism prevention and response programs,” that could “not occur without it.” This is “not benign,” Leitenberg concludes.

A second consequence of sexed-up “bioterror” drills have even more ominous implications for the immediate future. Because of national security state perceptions that mitigation of catastrophic bioterrorism is of supreme importance for national survival–perceptions reinforced by academic, corporate and militarist peddlers of crisis–”the US biodefense research program appears to be drifting into violation” of the Biological Weapons Convention. This is a menacing development and has happened, I would argue precisely because the evaluation process which justifies research into biological weapons threat capabilities and scenarios, are repackaged to conceal the offensive thrust of this research as wholly defensive in nature, which it certainly is not.

How else would one explain ongoing research funded by the National Institutes of Health to study botulism toxin, “with the added qualification” Smith points out, that because the protein toxin is “unstable, therefore there will be collaboration with other researchers to stabilize it.” The NIH grant “means preparing a much more effective botulinum toxin than had been available before.”

Smith goes on to cite “another problematical breakout” offered by two scientists to study the “aerobiological” characteristics of the lethal Marburg and Ebola viruses. How this is “defensive” in nature, in keeping with research restrictions under the Biological Weapons Convention, is another instance of a backdoor move to kick-start illicit bioweapons development.

According to Smith, the study “looks to define how the organisms can be aerosolized, an instance of research into examining vulnerability in the complete absence of a verified threat.” But I would argue that showering taxpayers dollars into such dark and troubling research tributaries deploy hyped-up threats as cover for the development of illegal weapons.

When her nomination was announced in May, Rutgers University and homeland security critic Richard Ebright told Wired,

“This is a disastrous nomination. O’Toole supported every flawed decision and counterproductive policy on biodefense, biosafety, and biosecurity during the Bush Administration. O’Toole is as out of touch with reality, and as paranoiac, as former Vice President Cheney. It would be hard to think of a person less well suited for the position.”

“She was the single most extreme person, either in or out of government, advocating for a massive biodefense expansion and relaxation of provisions for safety and security,” he adds. “She makes Dr. Strangelove look sane.” (Noah Shachtman, “DHS’ New Geek Chief is a Bioterror ‘Disaster,’ Critics Charge,” Wired, May 6, 2009)

And Dr. Smith told Wired that exercises designed by O’Toole and her colleagues show her to be “the top academic/salesperson for the coming of apocalyptic bioterrorism which has never quite arrived.”

As noted above, “[She’s] most prominent for always lobbying for more money for biodefense, conducting tabletop exercises on bioterrorism for easily overawed public officials, exercises tweaked to be horrifying,” Smith told Wired.

But Smith goes even further and denounces O’Toole as an industry shill who “has never obviously appeared to examine what current terrorist capabilities have been… in favor of extrapolating how easy it would be to launch bioterror attacks if one had potentially unlimited resources and scientific know-how.” It’s a “superb appointment if you’re in the biodefense industry and interested in further opportunity and growth.”

“Alternatively” Smith avers, O’Toole’s appointment is “a disaster if threat assessment and prevention” has “some basis in reality.”

Not that any of this matters in Washington. The Senate Homeland Security and Governmental Affairs Committee led by “independent Democrat” and arch neocon Sen. Joseph Lieberman, voted to send her nomination to the full Senate July 29.

Never mind that the deadly weaponized pathogen employed in the attacks didn’t originate in some desolate Afghan cave or secret underground bunker controlled by Saddam.

And never mind that the principal cheerleaders for expanding state-funded programs are Pentagon bioweaponeers, private corporations and a shadowy nexus of biosecurity apparatchiks who stand to make a bundle under current and future federal initiatives.

Leading the charge for increased funding is the Alliance for Biosecurity, a collaborative venture between the Center for Biosecurity of the University of Pittsburgh Medical Center (UPMC) and Big Pharma.

Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. His articles are published in many venues. He is the editor of Police State America: U.S. Military “Civil Disturbance” Planning

Bioweapon manufacturing and trading is ‘biodefense’. Guess who does the bioterrorism that sells the ‘biodefense’.
Deleted article ARCHIVED HERE

 Soviet scientists reportedly used newly developed genetic engineering techniques to create vaccine-subverting and antibiotic-resistant strains of anthrax, plague, tularemia, and smallpox for attacks against military forces and civilian populations (Bozheyeva et al. 1999Alibek and Handelman 2000)

More info: BBC / GRUNGE / THE GUARDIAN
Sure
Is that US bill ‘military’ for the same reason the Defence Force is involved in this act?
SOURCE
TRUMP: WE’RE MOBILIZING THE MILITARY TO DELIVER THE CORONAVIRUS VACCINE END OF 2020
Dr Sharad S. Chauhan is a decorated Indian Police Service (IPS) officer awarded the Prime Minister’s baton and the Home Minister’s Revolver. He is also a Gold Medallist MBBS Doctor from Delhi University with a PhD in Bioterrorism. He also authored the book Biological Weapons.
SOURCE

The market is fragmented, and the degree of fragmentation will accelerate during the forecast period. Alexeter Technologies LLC, Alnylam Pharmaceuticals Inc., Altimmune Inc., ANP Technologies Inc., Bavarian Nordic AS, Cleveland BioLabs Inc., Elusys Therapeutics Inc., Emergent BioSolutions Inc., General Dynamics Corp., and GlaxoSmithKline Plc are some of the major market participants. Although the rising prevalence of infectious disease and rapid increase in government funding in R&D will offer immense growth opportunities, to leverage the current opportunities, market vendors must strengthen their foothold in the fast-growing segments, while maintaining their positions in the slow-growing segments.

TECHNAVIO BIODEFENSSE MARKET REPORT

GERMAN & UK DEFENSE WORK ON MASSIVE “HUMAN AUGUMENTATION” PROJECT FOR CIVILIAN POPULATION

In an exclusive interview, Dr. Boyle touches upon GreatGameIndia‘s exclusive report Coronavirus Bioweapon – where we reported in detail how Chinese Biowarfare agents working at the Canadian lab in Winnipeg were involved in the smuggling of Coronavirus to Wuhan’s lab from where it is believed to have been leaked.

In this bombshell interview (full transcript below), Boyle talks about:

  • The bioweapons origins of the coronavirus
  • How the Deep State deployed anthrax on US soil to whip up publicity about biological weapons and increase funding for bioweapons labs
  • Why the WHO and CDC are both criminal organizations which are complicit in the covert development of biological weapons
  • The “death science” industry and why the US government has spent over $100 billion developing self-replicating weapons
  • Details about the Pirbright Institute and its ties to bioweapons, depopulation, vaccines and coronavirus patents. (It’s partially funded by Bill & Melinda Gates)
  • Why all BSL-3 and BSL-4 labs in the world should be banned and shut down.

Full transcript


Geopolitics and Empire: Geopolitics & Empire is joined by Dr. Francis Boyle, who is international law professor at the University of Illinois. We’ll be discussing the Wuhan coronavirus and biological warfare. He’s served as counsel to numerous governments such as Bosnia and Herzegovina and the Palestinian authority. He’s represented numerous national international bodies in the areas of human rights, war crimes and genocide, nuclear policy, and biowarfare. He’s written numerous books, one of my favorites being “Destroying Libya and World Order”, which I assigned as mandatory reading material for my own students when I taught at the Monterrey Institute of Technology.

But most important for this interview, he’s written a book called “Biowarfare and Terrorism”, and drafted the US domestic implementing legislation for the biological weapons convention, known as the Biological Weapons Anti-Terrorism Act of 1989 that was approved unanimously by both houses of the US Congress and signed into law by President Bush. Thanks for joining us, Dr. Boyle.

Dr. Francis Boyle: Wow. Thank you so much for having me on and thanks for that kind introduction.

Geopolitics and Empire:  Now let’s get to what’s been on the news recently. This coronavirus in Wuhan. There have been some reports recently, there’s a really interesting website called GreatGameIndia that has been reporting on this. They’ve been talking about China, which they say has been complying with biological weapons convention in recent years.

But then there are some people in the US and experts that have been saying that in reality, China isn’t complying with the weapons convention. And I think neither, perhaps the US as well. I’m wondering if China is developing its own biosafety level four lab in Wuhan and elsewhere, as you know, as a type of deterrence. Is it a type of a biological arms race that we have going on?

You told me in an email that you suspect China was developing the coronavirus as a dual use of biowarfare weapons agent. Also, what do you make of reports that Chinese scientists have been stealing research and viruses, including the coronavirus from a Canadian bio lab this past December?

And as well, Chinese nationals have been charged with smuggling vials of biological research to China from the US with the aid of Charles Lieber who was the chair of Harvard’s chemistry department. And he also happens to be in 2011 a strategic scientist at Wuhan University. So, can you tell us what’s going on with this recent outbreak in Wuhan?

Dr. Francis Boyle: Well, that’s a lot of questions. I guess we can take them one at a time, but if you just do a very simple Google search on “Does China have a BSL-4 laboratory?”, Wuhan comes up right away. It’s at the top of the list. That’s all with the moment this type of thing happened I began to do that. So a BSL-4 is the most serious type. And basically BSL-4 labs, we have many of them here in the United States, are used to develop offensive biological warfare weapons with DNA genetic engineering.

So it does seem to me that the Wuhan BSL-4 is the source of the coronavirus. My guess is that they were researching SARS, and they weaponize it further by giving it a gain of function properties, which means it could be more lethal.

Indeed, the latest report now is it’s a 15% fatality rate, which is more than SARS at 83% infection rate. A typical gain of function travels in the air so it could reach out maybe six feet or more from someone emitting a sneeze or a cough. Likewise, this is a specially designated WHO research lab. The WHO was in on it and they knew full well what was going on there.

Yes. It’s also been reported that Chinese scientists stole coronavirus materials from the Canadian lab at Winnipeg. Winnipeg is Canada’s formal center for research, developing, testing, biological warfare weapons. It’s along the lines of Fort Detrick here in the United States of America. I have three degrees from Harvard. It would not surprise me if something was being stolen out of Harvard to turn over to China. I read that report. I don’t know what was in those vials one way or the other.

But the bottom line is I drafted the US domestic implementing legislation for the Biological Weapons Convention that was approved unanimously by both Houses in the United States Congress signed into law by President Bush Sr. that it appears the coronavirus that we’re dealing with here is an offensive biological warfare weapon that leaped out of Wuhan BSL-4. I’m not saying it was done deliberately. But there had been previous reports of problems with that lab and things leaking out of it. I’m afraid that is what we are dealing with today.

Geopolitics and Empire: We’ll be talking about the Wuhan and the coronavirus and China, but can you give us kind of like a bigger context. I know you’ve, previously, in interviews said that since 9/11, you think that the US has spent $100 billion on biological warfare research. We know the Soviet Union, if I’m not mistaken, developed anthrax as a bioweapon. And you’ve also mentioned that UK, France, Israel and China are all involved in biological warfare weapons research.

And something interesting, I believe one or two years ago a Bulgarian journalist and the Russian government shared their concern of the discovery of a US bioweapons lab in the country of Georgia. You’ve commented how in Africa, US has set up bioweapons labs to work on Ebola, which I think is illegal under international law. But they were allowed somehow to put those in Africa. Can you give us like a bigger picture? What’s going on with these different countries and what’s the purpose of this research?

Dr. Francis Boyle: All these BSL-4 labs are by United States, Europe, Russia, China, Israel are all there to research, develop, test biological warfare agents. There’s really no legitimate scientific reason to have BSL-4 labs. That figure I gave $100 billion, that was about 2015 I believe. I had crunched the numbers and came up with that figure the United States since 9/11.

To give you an idea that’s as much in constant dollars as the US spent to develop the Manhattan Project and the atom bomb. So it’s clearly all weapons related. We have well over 13,000 alleged life science scientists involved in research developed testing biological weapons here in the United States. Actually this goes back it even precedes 9/11 2001.

I have another book, The Future of International Law and American Foreign Policy, tracing that all the way back to the Reagan administration under the influence of the neocons and they got very heavily involved in research development testing of biological weapons with DNA genetic engineers. It was because of that I issued my plea in 1985 in a Congressional briefing sponsored by the Council for Responsible Genetics, I’m a lawyer for them. They’re headquartered in Cambridge, Mass. All the MIT, Harvard people are involved in that, the principal ones. And then they asked me to draft the implementing legislation.

The implementing legislation that I drafted was originally designed to stop this type of work. “Death science work”, I call it, “by the United States government”. After 9/11, 2001, it just completely accelerated. My current figure, that last figure a 100 billion. I haven’t had a chance to re-crunch the numbers because I just started classes. But you have to add in about another 5 billion per year.

Basically, this is offensive biological weapons raised by the United States government and with its assistance in Canada and Britain. And so other States, the world have responded accordingly including Russia and China. They were going to set up a whole series of BSL-4 facilities as well. And you know Wuhan was the first. It backfired on them.

Geopolitics and Empire: Would you basically consider what happened and Wuhan and just boil it down to ineptitude or incompetence on the Chinese part?

Dr. Francis Boyle: Well, it’s criminality. It does appear they stole something there from Winnipeg. This activity that they engaged in clearly violates the Biological Weapons Convention. Research development of biological weapons these days is an international crime, the use of it would be. That was criminal.

I’m not saying they deliberately inflicted this on their own people, but it leaked out of there and all these BSL-4 facilities leak. Everyone knows that who studies this. So this was a catastrophe waiting to happen. Unfortunately, it happened. The Chinese government under Xi and his comrades there have been covering this up from the get-go. The first reported case was December 1, so they’d been sitting on this until they couldn’t anymore. And everything they’re telling you is a lie. It’s propaganda.

The WHO still refuses to declare a global health emergency. It said Tedros was over there shaking hands with Xi and smiling and yanking it up. The WHO was in on it. They’ve approved many of these BSL-4 labs., they know exactly what’s going on and that is a WHO research-approved laboratory. They know what’s going on too. You can’t really believe anything the WHO is telling you about this, either they’re up to their eyeballs in it, in my opinion.

Geopolitics and Empire: I’d probably agree with you that this outbreak in Wuhan was an accidental leak from the laboratory. But just your thoughts, it’s happening at quite an opportune time because namely we’re smack in the middle of a US-China new Cold War, which is currently characterized by economic warfare such as the trade war among other forms of hybrid and technological warfare. And it seems the Wuhan outbreak will likely hit the Chinese economy hard. The Chinese are flat out dismissing any idea that the US is involved in. Like I said, it’s probably they made the mistakes in the Wuhan lab. What are your thoughts of any seemingly, this would benefit the US…

Dr. Francis Boyle: When the outbreak occurred, of course I considered that alternative too. When you have an outbreak, you’re never quite sure who or what is behind it. It certainly isn’t bats, that’s ridiculous. They made the same argument on Ebola in West Africa. I demolished that online. You can check it out. So I kept competing theories about this.

But right now, when you originally contacted me, I said I wasn’t prepared to comment because I was weighing the evidence. I’m a law professor and a lawyer,  I try to do the best I can to weigh the evidence. But right now, the Wuhan BSL-4 in my opinion is the most likely source, apply Occam’s razor, the simplest explanation. I’m not ruling out some type of sabotage. But right now, I believe that is the source here.

Geopolitics and Empire: And you mentioned WHO. I’d like to just get your thoughts on the WHO and the Big Pharma. There’s also some analysts who are downplaying this news media hype of the coronavirus. You’ve just said that it seems to be lethal, but if we go back a decade to the 2009 swine flu, which I believe didn’t have too many casualties, but I think profited greatly the pharmaceutical companies. If I recall that back in 2009, many countries purchased great stocks of the vaccines and they ended up not using anywhere from 50 to 80% of the vaccines that they purchased.

You’ve previously stated in an interview that the World Health Organization is a front for Big Pharma if I’m not mistaken. Robert F. Kennedy Jr. also agrees and he says, you know, 50% of WHO funding comes from pharmaceutical companies. And that the CDC itself is also severely compromised. What are your thoughts on the WHO? The CDC?

Dr. Francis Boyle: Can’t trust anything the WHO says because they’re all bought and paid for by Big Pharma and when they work in cahoots with the CDC, which is the United States government, they work in cahoots with Fort Detrick, so you can’t trust any of it.

However, the swine flu and yes, I agree pharma made a lot of money, but that swine flu which I looked at it, it did seem to me to be a genetically modified biological warfare weapon. It was a chimera of three different types of genetic strains that someone put it together in a cocktail. Fortunately, it was not as lethal as all of us fear. So fine. But as I said, this figure I just gave to you was Saturday from Lancet, which is a medical publication, saying it’s a 15% fatality rate and an 83% infection rate. So it’s quite serious, I think, far more serious than the swine flu.

As for big pharma, sure they’re all trying to profit off this today as we speak. There was a big article yesterday in the Wall Street Journal, all big pharma trying to peddle whatever they can over there in China even if it’s worthless and won’t help. We do know, if you read the mainstream news media they say there isn’t a vaccine.

Well, there is, it’s by the Pirbright Institute in Britain that’s tied into their biological warfare program over there. They were behind the hoof and mouth disease outbreak over there that wiped out their cattle herd and it leaked out of there. So it’s clear they’re working on a hoof and mouth biological warfare weapon, but the vaccine is there. I have the patent for it here, I haven’t had a chance to read the patent it’s about 25 pages long and my classes just resume. So eventually, I get some free time and I’ll read the patent.

You can’t patent a vaccine with the United States patent office unless the science is there. So there is a vaccine. Everyone’s lying about that, no one’s pointing this out – there’s a vaccine but instead big pharma wants to make money and the researchers say, well, it’ll take three months and we’re racing forward, you know. Everyone’s gonna make a buck off of this, that’s for sure. But there is a vaccine, I have the patent here. It’s been patented by the United States government.

So obviously, I don’t know exactly how workable it is, but it’s a vaccine. I don’t know why it isn’t out there now? Why isn’t someone saying there is a vaccine? Perhaps political leaders have already been vaccinated for all I know, I really don’t know.  But there is a vaccine, Pirbright is well known there in Britain and it’s tied into Fort Detrick and CDC is tied into Fort Detrick too. So they all know there’s a patented vaccine.

Geopolitics and Empire:  And just to get your comment on, I mean, something to related to this, which was my next question. So I think, I’m not sure if it’s that same Institute that you just mentioned that has the patent.  I read somewhere that the Bill & Melinda Gates foundation maybe funds or has some connection to that Institute that has the patent.

Dr. Francis Boyle:  I think they do. The Bill & Melinda Gates information, they fund this type of DNA genetically engineered biological warfare work. That’s correct. So you can’t trust anything they’re telling you that somehow they’re out there trying to make the world a better place.  I mean, we have Bill Gates publicly admitting that the world be a better place if there were a lot less people. So the Bill & Melinda Gates foundation, they are wolves in sheep’s clothing and they are funding this type of stuff. Sure.

Geopolitics and Empire: And just your comment, there was also the report that I guess it was a consortium of companies which included the Gates foundation that back in just two or three months ago in October of 2019 they held a pandemic exercise simulating an outbreak. I mean, what are the chances specifically of a coronavirus and it was called events 201. People can find this online online and they gave a list of seven recommendations for governments and international organizations to take. I also find that kind of interesting how they had this simulation.

Dr. Francis Boyle:  That’s correct. It raises that question,  the origins of what happened here.  But right now, I’m just looking at the evidence I have and applying Occam’s razor and we know that Wuhan BSL-4 was research developing, testing, SARS as a biological warfare agent. So it could have been, they gave it this DNA genetic engineering enhanced properties gain of function which we do here in the West, in the United States all the time. We have  all sorts of research that is clearly a bio warfare research that has been  approved by the National Institutes of Health, it’s a joke. They know full well they are proving all kinds of biological warfare research and it gets funded by the United States government.

Geopolitics and Empire:  And you’ve also mentioned in the email to me that what happened in the biosafety lab level 4 in Wuhan calls into question the safety of all of these level 3and 4four labs around the world.

Dr. Francis Boyle:  They’re complete unsafe. BSL-3 and BSL-4 lab are only designed for research development testing of offense of biological warfare agents.  In my opinion, they serve no legitimate purpose at all. They should all be shut down, every one of them. Even assuming, they’re simply too dangerous. If you want, there’s an excellent  documentary called Anthrax Wars by Nadler and Coen and I’m in there.  Repeatedly at the end, I say with respect to these labs, three and four, this is a catastrophe waiting to happen. Well, I’m afraid the catastrophe is now happened. So there it is.

Geopolitics and Empire:  Yeah, I was just watching that documentary before we connected and I recommend the listeners go check that out. Do you see, in the future, any countries,  if we come to a conflict between US, EU, Israel, Saudi Arabia, Iran, China, Russia,  I mean you name it. Do you see any of these countries actually utilizing these biological weapons?  I mean, it’s illegal under international law but we know like in the past that international law isn’t followed. Do you think that there’s a real danger of this escalating?

Dr. Francis Boyle: For sure. That’s the only reason they develop these biological weapons to eventually be used, sure.  I mean, it’s like the Manhattan project, we put all that money into developing an atom bomb and even though it was not needed to end world war II they still knew Hiroshima and Nagasaki. So, yes,  I think that’s correct.  And also these can be used covertly. Anytime you see an unexplained  sudden outbreak of a disease like this anywhere in the world, both for human beings and or animals, I always suspect the bio warfare agent is at work.  I monitor the situation like I did at Wuhan until I can reach a conclusion. Yes, they can be used as the eyes for the United States government, today they are fully prepared, armed, equipped, supplied to wage a biological warfare with anthrax.

These other more exotic things I don’t know, but they have the weapons, there are stockpiles. We have to understand if you read Seymour Martin Hersh’s book published about 1968, he won the Pulitzer prize, he had the whole offensive US biological warfare industry in there back before it was illegal and criminal. Basically after 9/11, 2001, that entire industry – offensive biological warfare industry has been reconstituted here in the United States with all these BSL-4 BSL-3 labs, well over 13,000, alleged scientists sort of like Dr. Mengele working on these things. Other countries have responded in kind like Russia, like China, France is involved, Britain’s involved. Sure.

Geopolitics and Empire: I just wanted to get your thoughts on, in the last few years there was the Russian double agent spy Sergei Skripal who had been allegedly poisoned with Novichok out in Britain and  I thought it was funny. It just so happened where he was allegedly poisoned, he was right in Porton down the British bio weapons lab, I guess the world’s first bio weapons lab that was created in 1916. I mean,  I don’t know if you have thoughts on that whole incident.

Dr. Francis Boyle: Yeah, I was right down the street from Porton Down, so applying Occam’s razor who you think might’ve been behind this and it was not a nerve agent. A nerve agent would have killed him immediately. This is Novichok. It was something else like DX or something like that. So fine. But, I would just say that I don’t think that was a coincidence, but, you know, there you go. There’s the, obviously there’s a lot of speculation on that.

Geopolitics and Empire: Something else that’s kind of interesting. You’ve written in bio warfare and terrorism in your book and there’s also Graeme Macqueen, I think your colleague who wrote the anthrax deception the case for domestic conspiracy…

Dr. Francis Boyle:  Everything you said in there. That’s correct.

Geopolitics and Empire:  I’m wondering also if this new war for biotechnological dominance, whatever you want to call it, if it can also be used kind of as a pretext for the centralization of political power and the initiation of wars like I guess it did in the 2003 Iraq war. I mean, is this another danger that we get these events like now this coronavirus and then governments will call for a centralization of greater power and taking away some of our civil liberties?

Dr. Francis Boyle:  Sure. If you look at the October, 2001 anthrax attacks here in the United States, that was clearly by elements of the United States government that was behind that. That was a super weapons grade anthrax with a trillion spores per gram and it floated in the air solely a very sophisticated biological weapons lab like Fort Detrick could produce that. And they use that anthrax attack including on Congress to brand through the USA Patriot act which basically turned the United States to a police state which is what we have now. You have to understand the Pentagon, Fort Dietrich made the dugway proving ground still has a stockpile of that super weapons grade anthrax that we saw in October of 2001 that they can use the next time they want to do something like that to further develop the American police thing. Right.

Geopolitics and Empire:  Is there anything else you feel important to mention regarding this Wuhan Coronavirus outbreak or biological warfare or any other thoughts you’d like to leave us with?

Dr. Francis Boyle:  Well, you just can’t believe anything the Chinese government, the WHO,  the CDC are telling. They’re all lies because they know what’s going on here  and so you’re going to have to figure it out as fast as you can. But in my opinion, as of this time and I’m fully prepared to consider further evidence on this, it does seem to me that this was  a DNA genetically engineered biological warfare agent leaking out of Wuhan that has gain-of-function properties which can make it more lethal.  I think they are probably doing something with SARS to make it a lot more lethal and more infectious. And so for that reason,  you have to take extreme precautions and they’re now finally admitted anyone within six feet can be infected, whereas with SARS that was about two feet. Well, that’s gaining a function right there and that should be a tip off.

So, I guess you’re gonna have to protect yourself.  Laurie Garrett had a pretty good essay in a foreign policy yesterday and she was over there covering the SARS and she has very good advice in there except that she took the SARS figure out two to three feet and said  well, you gotta stay to two to three. I think you’ve got to stay at least six feet away because this is gained function. It can flow through the air and infect and it can get you in the eyes. Any orifice, the mouth, maybe the ears, we’re not sure at this point.

Geopolitics and Empire: I’m here on the border of China in Kazakhstan and I was just reading yesterday – today that they’re no longer allowing Chinese citizens into Kazakhstan without a medical paper, a medical check to get their visas to enter Kazakhstan

Dr. Francis Boyle:  Those medical checks are worthless because this is just public relations by all the governments involved because there is a 14 day incubation period where people can still be infected. So someone could walk right through a medical inspection and passing a gate into your country and then they come down with the coronavirus.  So that’s all public relations in my opinion by governments and they know it and they’re just sending people out there with temperatures and things like that. It’s not like SARS, this is more dangerous than SARS.  As I said, I think that Wuhan lab, we know they had SARS in there that they were dealing with and I think they enhanced it at and  I’m afraid that’s what we’re dealing with. But you know, I’m keeping an open mind as to what other sources that might have and I wasn’t prepared to say anything until that Wuhan lab is right there and it’s dealing with coronavirus. So again, apply Occam’s razor. It seems to me that’s the simplest explanation here.

Geopolitics and Empire: I guess my, one of my final question would be in the months ahead, apart of what you say staying six feet away from people.  I’ve read taking high doses of vitamin C and other things like this can help you. But, if they come out as the situation develops and if it gets worse and they come out with a coronavirus vaccine,  should people take it or not? What are your thoughts?

Dr. Francis Boyle:  Well, what I would say is this. Right now, if you look at the article at the Wall Street Journal, big pharma is trying to sell all sorts of – they’re taking all their drugs off the shelf and say well let’s see if it works. Which is preposterous. Okay. The scientists are saying, well, we can get you a vaccine maybe two to three months but they’re not tested.  So what we do know, however, is that Pirbright vaccine has been patented. So all I can assume is that that might work. But I don’t think I’d be taking any of these other vaccines. No, you have no idea what’s in there. You’ll be the Guinea pig for big pharma and everyone figures they’re gonna make a lot of money here. So I’ll keep my eye open on this  and how it develop but I wouldn’t trust anything they’re trying to sell right now. They’re just pulling these things off the shelf.

If they do come up with something in two to three months, even that’s not going to be tested in accordance with normal scientific protocol. So it’s going to be a crap shoot. If it’s going to help you, indeed it might not help you because they’ll be using for this vaccines (these DNA genetic engineered vaccines) they’ll be using live coronavirus probably and sticking it in there and giving you some live coronavirus on the theory you’ll develop an immunityThat’s the way a lot of these vaccines worked out, that’s what happened with the Ebola vaccine that created the Ebola pandemic there in West Africa. They were testing out a vaccine on poor black Africans, as usual, and  this vaccine had live Ebola in it so it gave them Ebola. So again, I’d be very careful even if they do come up with these vaccines two to three months from now, very careful. Why would you want to inject the live coronavirus in you?

Geopolitics and Empire: All right. I don’t believe you have a strong online presence. How can people best follow your work? I suppose to search for interviews as well as get your books.

Dr. Francis Boyle: Well, basically I’m blackballed and blacklisted off all the mainstream news media here on purpose. As far as I can figure out, the US government gave an order that I should not be interviewed by anyone, so I’m not.  I guess you could just put my name in there under Google, Google alert, and some interviews might come up. What happened was, right after the anthrax attacks of 9/11 2001, I was giving a lecture out at Harvard m Alma Mater.  I was running a panel on biological warfare for the council for responsible genetics and it was at Harvard Divinity School and as I was going in, there was a Fox camera crew there from Boston and I said it looks to me like this has come out of the US government lab. We know they do research and testing on anthrax. Then I said the same thing there at Harvard then I gave an interview to a radio station in Washington, D C then I gave an interview on that to the BBC. So the whole world saw it and at that point I was completely cut off and I’ve been cut off  ever since. So you  probably not going to hear too many  interviews from me here. As for my book. Biowarfare & Terrorism, you can just get it at amazon.com. That picks up the story pretty much from 9/11 2001 and until it went to press and then there are interviews I’d given to an investigative reporter, Sherwood Ross and a big one I just sent you and you might want to put that on your web page. That was pretty comprehensive.

Geopolitics and Empire: Yeah,  I read that as well and I’ll include the link in the description of this interview so people can go check that out. You’re not the only academic I know and have heard of others that similar things have happened and that’s just I guess the price we pay for telling the truth. Again, for listeners, if people wanted to have a broader context and deeper understanding of what’s happening today especially with biological warfare as well as us foreign policy and international affairs, I urge you to get Dr. Francis Boyle’s books and listen to his interviews as well as his colleagues book. Graeme Macqueen, The Anthrax Deception, The Case For Domestic Conspiracy. Thank you for being with us, Dr. Boyle.

Dr. Francis Boyle: Well, thank you and again, please understand these are my current opinions.  I could change my opinion here based on more evidence. So  I’m just looking at the evidence out there as I see it and you have to understand there is so much disinformation, lies and propaganda that it’s kind of very difficult to distinguish truth from fact.  I’m doing the best job I can here.

— end interview —


Originally published (greatgameindia.com)


A message from a former US Army psyops officer
VINCE JAMES DOES A GREAT JOB EXPLORING THE COMPLEX FROM THE CIA ANGLE AND ARRIVING TO THE SAME BIG PICTRE AND ALL THE GOOD CONCLUSIONS, MUST WATCH ENTIRELY!

UPDATE SEPTEMBER 23, 2022:

The Pentagon has ordered a sweeping audit of how it conducts clandestine information warfare after major social media companies identified and took offline fake accounts suspected of being run by the U.S. military in violation of the platforms’ rules.

Colin Kahl, the undersecretary of defense for policy, last weekinstructed the military commands that engage in psychological operations online to provide a full accounting of their activities by next month after the White House and somefederal agencies expressed mounting concerns over the Defense Department’s attempted manipulation of audiences overseas, according to several defense and administration officials familiar with the matter.

The takedowns in recent years by Twitter and Facebook of more than 150 bogus personas and media sites created in the United States was disclosed last month by internet researchers Graphika and the Stanford Internet Observatory. While the researchers did not attribute the sham accounts to the U.S. military, two officials familiar with the matter said that U.S. Central Command is among those whose activities are facing scrutiny. Like others interviewed for this report, they spoke on the condition of anonymity to discuss sensitive military operations.

The researchers did not specify when the takedowns occurred, but those familiar with the matter said they were within the pasttwo or three years. Some were recent, they said, and involved posts from the summer that advanced anti-Russia narratives citing the Kremlin’s “imperialist” war in Ukraine and warning of the conflict’s direct impact on Central Asian countries. Significantly, they found that the pretend personas — employing tactics used by countries such as Russia and China — did not gain much traction, and that overt accounts actually attracted more followers.

Centcom, headquartered in Tampa, has purview over military operations across 21 countries in the Middle East, North Africa and Central and South Asia. A spokesman declined to comment.

Air Force Brig. Gen. Patrick Ryder, the Pentagon press secretary, said in a statement that the military’s information operations “support our national security priorities” and must be conducted in compliance with relevant laws and policies. “We are committed to enforcing those safeguards,” he said.

Spokespersons for Facebook and Twitter declined to comment.

According to the researchers’ report, the accounts taken down included a made-up Persian-language media site that shared content reposted from the U.S.-funded Voice of America Farsi and Radio Free Europe. Another, it said, was linked to a Twitter handle that in the past had claimed to operate on behalf of Centcom.

One fake account posted an inflammatory tweet claiming that relatives of deceased Afghan refugees had reported bodies being returned from Iran with missing organs, according to the report. The tweet linked to a video that was part of an article posted on a U.S.-military affiliated website.

Centcom has not commented on whether these accounts were created by its personnel or contractors. If the organ-harvesting tweet is shown to be Centcom’s, one defense official said, it would “absolutely be a violation of doctrine and training practices.”

Independent of the report, The Washington Post has learned that in 2020 Facebook disabled fictitious personas created by Centcom to counter disinformation spread by China suggesting the coronavirus responsible for covid-19 was created at a U.S. Army lab in Fort Detrick, Md., according to officials familiar with the matter. The pseudo profiles — active in Facebook groups that conversed in Arabic, Farsi and Urdu, the officials said — were used to amplify truthful information from the U.S. Centers for Disease Control and Prevention about the virus’s origination in China.

The U.S. government’suse of ersatz social mediaaccounts, though authorized by law and policy, has stirred controversy inside the Biden administration, with the White House pressing the Pentagon to clarify and justify its policies. The White House, agencies such as the State Department and even some officials within the Defense Department have been concerned that the policies are too broad, allowing leeway for tactics that even if used to spread truthful information, risk eroding U.S. credibility, several U.S. officials said.

“Our adversaries are absolutely operating in the information domain,” said a second senior defense official. “There are some who think we shouldn’t do anything clandestine in that space. Ceding an entire domain to an adversary would be unwise. But we need stronger policy guardrails.”

A spokeswoman for the National Security Council, which is part of the White House, declined to comment.

Kahl disclosed his review at a virtual meeting convened by the National Security Council on Tuesday, saying he wants to know what types of operations have been carried out, who they’re targeting, what tools are being used and why military commanders have chosen those tactics, and how effective they have been, several officials said.

The message was essentially, “You have to justify to me why you’re doing these types of things,” the first defense official said.

Pentagon policy and doctrine discourage the military from peddling falsehoods, but there are no specific rules mandating the use of truthful information for psychological operations. For instance, the military sometimes employs fiction and satire for persuasion purposes, but generally the messages are supposed to stick to facts, officials said.

In 2020, officers at Facebook and Twitter contacted the Pentagon to raise concerns about the phony accounts they were having to remove, suspicious they were associated with the military. That summer, David Agranovich, Facebook’s director for global threat disruption, spoke to Christopher C. Miller, then assistant director for Special Operations/Low Intensity Conflict, which oversees influence operations policy, warning him that if Facebook could sniff them out, so could U.S. adversaries, several people familiar with the conversation said.

“His point‚” one person said, “was ‘Guys, you got caught. That’s a problem.’ ”

Before Miller could take action, he was tapped to head a different agency — the National Counterterrorism Center. Then the November election happened and time ran out for the Trump administration to address the matter, although Miller did spend the last few weeks of Donald Trump’s presidency serving as acting defense secretary.

With the rise of Russia and China as strategic competitors, military commanders have wanted to fight back, including online. And Congress supported that. Frustrated with perceived legal obstacles to the Defense Department’s ability to conduct clandestine activities in cyberspace, Congress in late 2019 passed a law affirming that the military could conduct operations in the “information environment” to defend the United States and to push back against foreign disinformation aimed at undermining its interests. The measure, known as Section 1631, allows the military to carry out clandestine psychologic operations without crossing what the CIA has claimed as its covert authority, alleviating some of the friction that had hindered such operations previously.

“Combatant commanders got really excited,” recalled the first defense official. “They were very eager to utilize these new authorities. The defense contractors were equally eager to land lucrative classified contracts to enable clandestine influence operations.”

At the same time, the official said, military leaders were not trained to oversee “technically complex operations conducted by contractors” or coordinate such activities with other stakeholders elsewhere in the U.S. government.

President Biden, right, Defense Secretary Lloyd Austin, left, and Chairman of the Joint Chiefs of Staff Gen. Mark A. Milley attend a Pentagon ceremony to remember the victims of 9/11. (Leigh Vogel/Bloomberg)

Last year, with a new administration in place, Facebook’s Agranovich tried again. This time he took his complaint to President Biden’s deputy national security adviser for cyber, Anne Neuberger. Agranovich, who had worked at the NSC under Trump, told Neuberger that Facebook was taking down fake accounts because they violated the company’s terms of service, according to people familiar with the exchange.

The accounts were easily detected by Facebook, which since Russia’s campaign to interfere in the 2016 presidential election has enhanced its ability to identify mock personas and sites. In some cases, the company had removed profiles, which appeared to be associated with the military, that promoted information deemed by fact-checkers to be false, said a person familiar with the matter.

Agranovich alsospoke to officials at the Pentagon. His messagewas: “We know what DOD is doing. It violates our policies. We will enforce our policies” and so “DOD should knock it off,” said aU.S. official briefed on the matter.

In response to White House concerns, Kahl ordered a review of Military Information Support Operations, or MISO, the Pentagon’s moniker for psychological operations. A draft concluded that policies, training and oversight all needed tightening, and that coordination with other agencies, such as the State Department and the CIA, needed strengthening, according to officials.

The review also found that while there were cases in which fictitious information was pushed by the military, they were the result of inadequate oversight of contractors and personnel training — not systemic problems, officials said.

Pentagon leadership did little with the review, two officials said, before Graphika and Stanford published their report on Aug. 24, which elicited a flurry of news coverage and questions for the military.

Army psyop graduates receive pins at the end of a field exercise reading “Persuade, Change, Influence.” (Cynthia McIntyre/Fort Hunter Liggett Public Affairs)

The State Department and CIA have been perturbed by the military’s use of clandestine tactics. Officers at State have admonished the Defense Department, “Hey don’t amplify our policies using fake personas, because we don’t want to be seen as creating false grass roots efforts,” the first defense official said.

One diplomat put it this way: “Generally speaking, we shouldn’t be employing the same kind of tactics that our adversaries are using because the bottom line is we have the moral high ground. We are a society that is built on a certain set of values. We promote those values around the world and when we use tactics like those, it just undermines our argument about who we are.”

Psychological operations to promote U.S. narratives overseas is nothing new in the military, but the popularity of western social media across the globehas led to an expansion of tactics, including the use of artificial personas and images — sometimes called “deep fakes.” The logic is that views expressed by what appears to be, say, an Afghan woman or an Iranian student might be more persuasive than if they were openly pushed by the U.S. government.

The majority of the military’s influence operations are overt, promoting U.S. policies in the Middle East, Asia and elsewhere under its own name, officials said. And there are valid reasons to use clandestine tactics, such as trying to infiltrate a closed terrorist chat group, they said.

A key issue for senior policymakers now is determining whether the military’s execution of clandestine influence operations is delivering results. “Is the juice worth the squeeze? Does our approach really have the potential for the return on investment we hoped or is it just causing more challenges?” one person familiar with the debate said.

The report by Graphika and Stanford suggests that the clandestine activity did not have much impact. It noted that the “vast majority of posts and tweets” reviewed received “no more than a handful of likes or retweets,” and only 19 percent of the concocted accounts had more than 1,000 followers. “Tellingly,” the report stated, “the two most-followed assets in the data provided by Twitter were overt accounts that publicly declared a connection to the U.S. military.”

Clandestine influence operations have a role in support of military operations, but it should be a narrow one with “intrusive oversight” by military and civilian leadership, said Michael Lumpkin, a former senior Pentagon official handling information operations policy and a former head of the State Department’s Global Engagement Center. “Otherwise, we risk making more enemies than friends.”

Excerpt from the article sourced above:

A LONG PATTERN OF INFILTRATION

45 years ago, legendary journalist Carl Bernstein released an investigation documenting how the CIA had managed to infiltrate U.S. and global media. The CIA had placed hundreds of agents into newsrooms and had convinced hundreds more reporters to collaborate with them. These included individuals at some of the most influential outlets, including The New York Times. The CIA needed to do this clandestinely because any attempt to do so openly would harm the effectiveness of the operation and provoke stiff public resistance. But by 2015, there was barely a murmur of disapproval when Reuters announced that it was hiring 33-year veteran CIA manager and director Dawn Scalici as a global director, even when the company announced that her primary responsibility was to “advanc[e] Thomson Reuters’ ability to meet the disparate needs of the U.S. government.”

Facebook, however, is vastly more influential than the New York Times or Reuters, reaching billions of people daily. In that sense, it stands to reason that it would be a prime target of any intelligence organization. It has become so big and ubiquitous that many consider it a de facto public commons and believe it should no longer be treated as a private company. Considering who is making many of the decisions on the platform, that distinction between public and private entities is even more blurry than many presume.

DARPA’s Secret Mind Control Technology In Works Since the 1960’s – History Channel 2022

BONUS:

I’ve just brought to light insider information that confirms a very similar model has been pursued in USSR / Russia. I wonder if the two are eventually merging at the top, like Coca-Cola and Pepsi, seeing that Putin is a former Klaus Schwab disciple and a Davos regular.

Bottom line…

‘It’s warfare, not science’ – Dr. Nancy T. Banks – the legendary 2012 interview on vaccines & pharma

FOLLOW UPS

THIS SUBSTACK AND RESEARCHER DESERVE A SEPARATE POST O THEIR OWN!

Discussion with Sam Dube and Lara Logan (after 15 min) on DoD Vax Ownership and FDA Theatrics

The role of the US DoD (and their co-investors) in “covid countermeasures” enterprise.

Intelligence is never artificial.

By Sasha Latypova, Dec 28, 2022

I asked the AI Chat Bot “What was the role of the DoD in covid-countermeasures?” Here is what it wrote:

“The Department of Defense (DoD) played a significant role in the development of countermeasures against COVID-19, the disease caused by the novel coronavirus. The DoD worked closely with other federal agencies, such as the Department of Health and Human Services (HHS), to respond to the pandemic.

One of the main roles of the DoD in the COVID-19 response was to provide logistical support and medical resources to help healthcare workers and first responders on the front lines of the pandemic. The DoD also worked to develop and distribute personal protective equipment (PPE) and other supplies to support the response efforts.

In addition, the DoD provided funding and resources to support the development of vaccines and treatments for COVID-19. The Defense Advanced Research Projects Agency (DARPA), a research arm of the DoD, played a key role in this effort by funding and supporting the development of treatments and vaccines through its “Rapid Response Research” program.

Overall, the DoD played a vital role in the response to the COVID-19 pandemic by providing logistical support, medical resources, and funding for research and development efforts to combat the disease.”

AI Chat Bot gets a “F” – for a highly controlled narrative answer, which was fed to all MSM sources, while the “alternative” media did not examine it very much, with some exceptions. It wasn’t just logistics or even just lots of funding, and certainly nobody was “combatting disease”.

INTENT TO HARM – EVIDENCE OF THE CONSPIRACY TO COMMIT MASS MURDER BY THE US DOD, HHS, PHARMA CARTEL

DOD contracts for “covid countermeasures” can be found here: https://www.keionline.org/covid-contracts

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

ORDER

! Articles can always be subject of later editing as a way of perfecting them

For years, the Pentagon tried to convince the public that they work on your dream secretary. Can you believe that?
Funny how much those plans looked just like today’s Google and Facebook. But it’s not just the looks, it’s also the money, the timeline and the personal connections.
Funnier how the funding scheme was often similar to the one used for Wuhan, with proxy organizations used as middlemen.

WIRED 05.20.2003

A Spy Machine of DARPA’s Dreams

IT’S A MEMORY aid! A robotic assistant! An epidemic detector! An all-seeing, ultra-intrusive spying program!

The Pentagon is about to embark on a stunningly ambitious research project designed to gather every conceivable bit of information about a person’s life, index all the information and make it searchable.

What national security experts and civil libertarians want to know is, why would the Defense Department want to do such a thing?

The embryonic LifeLog program would dump everything an individual does into a giant database: every e-mail sent or received, every picture taken, every Web page surfed, every phone call made, every TV show watched, every magazine read.

All of this — and more — would combine with information gleaned from a variety of sources: a GPS transmitter to keep tabs on where that person went, audio-visual sensors to capture what he or she sees or says, and biomedical monitors to keep track of the individual’s health.

This gigantic amalgamation of personal information could then be used to “trace the ‘threads’ of an individual’s life,” to see exactly how a relationship or events developed, according to a briefing from the Defense Advanced Projects Research Agency, LifeLog’s sponsor.

Someone with access to the database could “retrieve a specific thread of past transactions, or recall an experience from a few seconds ago or from many years earlier … by using a search-engine interface.”

On the surface, the project seems like the latest in a long line of DARPA’s “blue sky” research efforts, most of which never make it out of the lab. But DARPA is currently asking businesses and universities for research proposals to begin moving LifeLog forward. And some people, such as Steven Aftergood, a defense analyst with the Federation of American Scientists, are worried.News of the future, now.

With its controversial Total Information Awareness database project, DARPA already is planning to track all of an individual’s “transactional data” — like what we buy and who gets our e-mail.

While the parameters of the project have not yet been determined, Aftergood said he believes LifeLog could go far beyond TIA’s scope, adding physical information (like how we feel) and media data (like what we read) to this transactional data.

“LifeLog has the potential to become something like ‘TIA cubed,'” he said.

In the private sector, a number of LifeLog-like efforts already are underway to digitally archive one’s life — to create a “surrogate memory,” as minicomputer pioneer Gordon Bell calls it.

Bell, now with Microsoft, scans all his letters and memos, records his conversations, saves all the Web pages he’s visited and e-mails he’s received and puts them into an electronic storehouse dubbed MyLifeBits.

DARPA’s LifeLog would take this concept several steps further by tracking where people go and what they see.

That makes the project similar to the work of University of Toronto professor Steve Mann. Since his teen years in the 1970s, Mann, a self-styled “cyborg,” has worn a camera and an array of sensors to record his existence. He claims he’s convinced 20 to 30 of his current and former students to do the same. It’s all part of an experiment into “existential technology” and “the metaphysics of free will.”

DARPA isn’t quite so philosophical about LifeLog. But the agency does see some potential battlefield uses for the program.

“The technology could allow the military to develop computerized assistants for war fighters and commanders that can be more effective because they can easily access the user’s past experiences,” DARPA spokeswoman Jan Walker speculated in an e-mail.

It also could allow the military to develop more efficient computerized training systems, she said: Computers could remember how each student learns and interacts with the training system, then tailor the lessons accordingly.

John Pike, director of defense think tank GlobalSecurity.org, said he finds the explanations “hard to believe.”

“It looks like an outgrowth of Total Information Awareness and other DARPA homeland security surveillance programs,” he added in an e-mail.

Sure, LifeLog could be used to train robotic assistants. But it also could become a way to profile suspected terrorists, said Cory Doctorow, with the Electronic Frontier Foundation. In other words, Osama bin Laden’s agent takes a walk around the block at 10 each morning, buys a bagel and a newspaper at the corner store and then calls his mother. You do the same things — so maybe you’re an al Qaeda member, too!

“The more that an individual’s characteristic behavior patterns — ‘routines, relationships and habits’ — can be represented in digital form, the easier it would become to distinguish among different individuals, or to monitor one,” Aftergood, the Federation of American Scientists analyst, wrote in an e-mail.

In its LifeLog report, DARPA makes some nods to privacy protection, like when it suggests that “properly anonymized access to LifeLog data might support medical research and the early detection of an emerging epidemic.”

But before these grand plans get underway, LifeLog will start small. Right now, DARPA is asking industry and academics to submit proposals for 18-month research efforts, with a possible 24-month extension. (DARPA is not sure yet how much money it will sink into the program.)

The researchers will be the centerpiece of their own study.

Like a game show, winning this DARPA prize eventually will earn the lucky scientists a trip for three to Washington, D.C. Except on this excursion, every participating scientist’s e-mail to the travel agent, every padded bar bill and every mad lunge for a cab will be monitored, categorized and later dissected.

WIRED 07.14.2003

Pentagon Alters LifeLog Project

By Noah Shachtman.

Bending a bit to privacy concerns, the Pentagon changes some of the experiments to be conducted for LifeLog, its effort to record every tidbit of information and encounter in daily life. No video recording of unsuspecting people, for example.

MONDAY IS THE deadline for researchers to submit bids to build the Pentagon’s so-called LifeLog project, an experiment to create an all-encompassing über-diary.

But while teams of academics and entrepreneurs are jostling for the 18- to 24-month grants to work on the program, the Defense Department has changed the parameters of the project to respond to a tide of privacy concerns.

Lifelog is the Defense Advanced Research Projects Agency’s effort to gather every conceivable element of a person’s life, dump it all into a database, and spin the information into narrative threads that trace relationships, events and experiences.

It’s an attempt, some say, to make a kind of surrogate, digitized memory.

“My father was a stroke victim, and he lost the ability to record short-term memories,” said Howard Shrobe, an MIT computer scientist who’s leading a team of professors and researchers in a LifeLog bid. “If you ever saw the movie Memento, he had that. So I’m interested in seeing how memory works after seeing a broken one. LifeLog is a chance to do that.”

Researchers who receive LifeLog grants will be required to test the system on themselves. Cameras will record everything they do during a trip to Washington, D.C., and global-positioning satellite locators will track where they go. Biomedical sensors will monitor their health. All the e-mail they send, all the magazines they read, all the credit card payments they make will be indexed and made searchable.

By capturing experiences, Darpa claims that LifeLog could help develop more realistic computerized training programs and robotic assistants for battlefield commanders.

Defense analysts and civil libertarians, on the other hand, worry that the program is another piece in an ongoing Pentagon effort to keep tabs on American citizens. LifeLog could become the ultimate profiling tool, they fear.

A firestorm of criticism ignited after LifeLog first became public in May. Some potential bidders for the LifeLog contract dropped out as a result.

“I’m interested in LifeLog, but I’m going to shy away from it,” said Les Vogel, a computer science researcher in Maui, Hawaii. “Who wants to get in the middle of something that gets that much bad press?”

New York Times columnist William Safire noted that while LifeLog researchers might be comfortable recording their lives, the people that the LifeLoggers are “looking at, listening to, sniffing or conspiring with to blow up the world” might not be so thrilled about turning over some of their private interchanges to the Pentagon.

In response, Darpa changed the LifeLog proposal request. Now: “LifeLog researchers shall not capture imagery or audio of any person without that person’s a priori express permission. In fact, it is desired that capture of imagery or audio of any person other than the user be avoided even if a priori permission is granted.”

Steven Aftergood, with the Federation of American Scientists, sees the alterations as evidence that Darpa proposals must receive a thorough public vetting.

“Darpa doesn’t spontaneously modify their programs in this way,” he said. “It requires public criticism. Give them credit, however, for acknowledging public concerns.”

But not too much, said John Pike, director of GlobalSecurity.org.

“Darpa adds these contractual provisions to appear to be above suspicion,” Pike said. “But if you can put them in, you can take them out.”

WIRED 07.29.2003

Helping Machines Think Different

By Noah Shachtman.

While the Pentagon’s project to record and catalog a person’s life scares privacy advocates, researchers see it as a step in the process of getting computers to think like humans.

TO PENTAGON RESEARCHERS, capturing and categorizing every aspect of a person’s life is only the beginning.

LifeLog — the controversial Defense Department initiative to track everything about an individual — is just one step in a larger effort, according to a top Pentagon research director. Personalized digital assistants that can guess our desires should come first. And then, just maybe, we’ll see computers that can think for themselves.

Computer scientists have dreamed for decades of building machines with minds of their own. But these hopes have been overwhelmed again and again by the messy, dizzying complexities of the real world.

In recent months, the Defense Advanced Research Projects Agency has launched a series of seemingly disparate programs — all designed, the agency says, to help computers deal with the complexities of life, so they finally can begin to think.

“Our ultimate goal is to build a new generation of computer systems that are substantially more robust, secure, helpful, long-lasting and adaptive to their users and tasks. These systems will need to reason, learn and respond intelligently to things they’ve never encountered before,” said Ron Brachman, the recently installed chief of Darpa’s Information Processing Technology Office, or IPTO. A former senior executive at AT&T Labs, Brachman was elected president of the American Association for Artificial Intelligence last year.

LifeLog is the best-known of these projects. The controversial program intends to record everything about a person — what he sees, where he goes, how he feels — and dump it into a database. Once captured, the information is supposed to be spun into narrative threads that trace relationships, events and experiences.

For years, researchers have been able to get programs to make sense of limited, tightly proscribed situations. Navigating outside of the lab has been much more difficult. Until recently, even getting a robot to walk across the room on its own was a tricky task.

“LifeLog is about forcing computers into the real world,” said leading artificial intelligence researcher Doug Lenat, who’s bidding on the project.

What LifeLog is not, Brachman asserts, is a program to track terrorists. By capturing so much information about an individual, and by combing relationships and traits out of that data, LifeLog appears to some civil libertarians to be an almost limitless tool for profiling potential enemies of the state. Concerns over the Terrorism Information Awareness database effort have only heightened sensitivities.

“These technologies developed by the military have obvious, easy paths to Homeland Security deployments,” said Lee Tien, with the Electronic Frontier Foundation.

Brachman said it is “up to military leaders to decide how to use our technology in support of their mission,” but he repeatedly insisted that IPTO has “absolutely no interest or intention of using any of our technology for profiling.”

What Brachman does want to do is create a computerized assistant that can learn about the habits and wishes of its human boss. And the first step toward this goal is for machines to start seeing, and remembering, life like people do.

Human beings don’t dump their experiences into some formless database or tag them with a couple of keywords. They divide their lives into discreet installments — “college,” “my first date,” “last Thursday.” Researchers call this “episodic memory.”

LifeLog is about trying to install episodic memory into computers, Brachman said. It’s about getting machines to start “remembering experiences in the commonsensical way we do — a vacation in Bermuda, a taxi ride to the airport.”

IPTO recently handed out $29 million in research grants to create a Perceptive Assistant that Learns, or PAL, that can draw on these episodes and improve itself in the process. If people keep missing conferences during rush hour, PAL should learn to schedule meetings when traffic isn’t as thick. If PAL’s boss keeps sending angry notes to spammers, the software secretary eventually should just start flaming on its own.

In the 1980s, artificial intelligence researchers promised to create programs that could do just that. Darpa even promoted a thinking “pilot’s associate — a kind of R2D2,” said Alex Roland, author of The Race for Machine Intelligence: Darpa, DoD, and the Strategic Computing Initiative.

But the field “fell on its face,” according to University of Washington computer scientist Henry Kautz. Instead of trying to teach computers how to reason on their own, “we said, ‘Well, if we just keep adding more rules, we could cover every case imaginable.'”

It’s an impossible task, of course. Every circumstance is different, and there will never be enough to stipulations to cover them all.

A few computer programs, with enough training from their human masters, can make some assumptions about new situations on their own, however. Amazon.com’s system for recommending books and music is one of these.

But these efforts are limited, too. Everyone’s received downright kooky suggestions from that Amazon program.

Overcoming these limitations requires a combination of logical approaches. That’s a goal behind IPTO’s new call for research into computers that can handle real-world reasoning.

It’s one of several problems Brachman said are “absolutely imperative” to solve as quickly as possible.

Although computer systems are getting more complicated every day, this complexity “may be actually reversing the information revolution,” he noted in a recent presentation (PDF). “Systems have grown more rigid, more fragile and increasingly open to attack.”

What’s needed, he asserts, is a computer network that can teach itself new capabilities, without having to be reprogrammed every time. Computers should be able to adapt to how its users like to work, spot when they’re being attacked and develop responses to these assaults. Think of it like the body’s immune system — or like a battlefield general.

But to act more like a person, a computer has to soak up its own experiences, like a human being does. It has to create a catalog of its existence. A LifeLog, if you will.

WIRED 02.04.2004

Pentagon Kills LifeLog Project

THE PENTAGON CANCELED its so-called LifeLog project, an ambitious effort to build a database tracking a person’s entire existence.

Run by Darpa, the Defense Department’s research arm, LifeLog aimed to gather in a single place just about everything an individual says, sees or does: the phone calls made, the TV shows watched, the magazines read, the plane tickets bought, the e-mail sent and received. Out of this seemingly endless ocean of information, computer scientists would plot distinctive routes in the data, mapping relationships, memories, events and experiences.

LifeLog’s backers said the all-encompassing diary could have turned into a near-perfect digital memory, giving its users computerized assistants with an almost flawless recall of what they had done in the past. But civil libertarians immediately pounced on the project when it debuted last spring, arguing that LifeLog could become the ultimate tool for profiling potential enemies of the state.

Researchers close to the project say they’re not sure why it was dropped late last month. Darpa hasn’t provided an explanation for LifeLog’s quiet cancellation. “A change in priorities” is the only rationale agency spokeswoman Jan Walker gave to Wired News.

However, related Darpa efforts concerning software secretaries and mechanical brains are still moving ahead as planned.

LifeLog is the latest in a series of controversial programs that have been canceled by Darpa in recent months. The Terrorism Information Awareness, or TIA, data-mining initiative was eliminated by Congress — although many analysts believe its research continues on the classified side of the Pentagon’s ledger. The Policy Analysis Market (or FutureMap), which provided a stock market of sorts for people to bet on terror strikes, was almost immediately withdrawn after its details came to light in July.

“I’ve always thought (LifeLog) would be the third program (after TIA and FutureMap) that could raise eyebrows if they didn’t make it clear how privacy concerns would be met,” said Peter Harsha, director of government affairs for the Computing Research Association.

“Darpa’s pretty gun-shy now,” added Lee Tien, with the Electronic Frontier Foundation, which has been critical of many agency efforts. “After TIA, they discovered they weren’t ready to deal with the firestorm of criticism.”

That’s too bad, artificial-intelligence researchers say. LifeLog would have addressed one of the key issues in developing computers that can think: how to take the unstructured mess of life, and recall it as discreet episodes — a trip to Washington, a sushi dinner, construction of a house.

“Obviously we’re quite disappointed,” said Howard Shrobe, who led a team from the Massachusetts Institute of Technology Artificial Intelligence Laboratory which spent weeks preparing a bid for a LifeLog contract. “We were very interested in the research focus of the program … how to help a person capture and organize his or her experience. This is a theme with great importance to both AI and cognitive science.”

To Tien, the project’s cancellation means “it’s just not tenable for Darpa to say anymore, ‘We’re just doing the technology, we have no responsibility for how it’s used.'”

Private-sector research in this area is proceeding. At Microsoft, for example, minicomputer pioneer Gordon Bell’s program, MyLifeBits, continues to develop ways to sort and store memories.

David Karger, Shrobe’s colleague at MIT, thinks such efforts will still go on at Darpa, too.

“I am sure that such research will continue to be funded under some other title,” wrote Karger in an e-mail. “I can’t imagine Darpa ‘dropping out’ of such a key research area.”

MEANWHILE…

Google: seeded by the Pentagon

By dr. Nafeez Ahmed

In 1994 — the same year the Highlands Forum was founded under the stewardship of the Office of the Secretary of Defense, the ONA, and DARPA — two young PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency programme of the National Science Foundation (NSF), NASA and DARPA.

But that’s just one side of the story.

Min 6:44!


Also check: OBAMA, DARPA, GSK AND ROCKEFELLER’S $4.5B B.R.A.I.N. INITIATIVE – BETTER SIT WHEN YOU READ

Throughout the development of the search engine, Sergey Brin reported regularly and directly to two people who were not Stanford faculty at all: Dr. Bhavani Thuraisingham and Dr. Rick Steinheiser. Both were representatives of a sensitive US intelligence community research programme on information security and data-mining.

Thuraisingham is currently the Louis A. Beecherl distinguished professor and executive director of the Cyber Security Research Institute at the University of Texas, Dallas, and a sought-after expert on data-mining, data management and information security issues. But in the 1990s, she worked for the MITRE Corp., a leading US defense contractor, where she managed the Massive Digital Data Systems initiative, a project sponsored by the NSA, CIA, and the Director of Central Intelligence, to foster innovative research in information technology.

“We funded Stanford University through the computer scientist Jeffrey Ullman, who had several promising graduate students working on many exciting areas,” Prof. Thuraisingham told me. “One of them was Sergey Brin, the founder of Google. The intelligence community’s MDDS program essentially provided Brin seed-funding, which was supplemented by many other sources, including the private sector.”

This sort of funding is certainly not unusual, and Sergey Brin’s being able to receive it by being a graduate student at Stanford appears to have been incidental. The Pentagon was all over computer science research at this time. But it illustrates how deeply entrenched the culture of Silicon Valley is in the values of the US intelligence community.

In an extraordinary document hosted by the website of the University of Texas, Thuraisingham recounts that from 1993 to 1999, “the Intelligence Community [IC] started a program called Massive Digital Data Systems (MDDS) that I was managing for the Intelligence Community when I was at the MITRE Corporation.” The program funded 15 research efforts at various universities, including Stanford. Its goal was developing “data management technologies to manage several terabytes to petabytes of data,” including for “query processing, transaction management, metadata management, storage management, and data integration.”

At the time, Thuraisingham was chief scientist for data and information management at MITRE, where she led team research and development efforts for the NSA, CIA, US Air Force Research Laboratory, as well as the US Navy’s Space and Naval Warfare Systems Command (SPAWAR) and Communications and Electronic Command (CECOM). She went on to teach courses for US government officials and defense contractors on data-mining in counter-terrorism.

In her University of Texas article, she attaches the copy of an abstract of the US intelligence community’s MDDS program that had been presented to the “Annual Intelligence Community Symposium” in 1995. The abstract reveals that the primary sponsors of the MDDS programme were three agencies: the NSA, the CIA’s Office of Research & Development, and the intelligence community’s Community Management Staff (CMS) which operates under the Director of Central Intelligence. Administrators of the program, which provided funding of around 3–4 million dollars per year for 3–4 years, were identified as Hal Curran (NSA), Robert Kluttz (CMS), Dr. Claudia Pierce (NSA), Dr. Rick Steinheiser (ORD — standing for the CIA’s Office of Research and Devepment), and Dr. Thuraisingham herself.

Thuraisingham goes on in her article to reiterate that this joint CIA-NSA program partly funded Sergey Brin to develop the core of Google, through a grant to Stanford managed by Brin’s supervisor Prof. Jeffrey D. Ullman:

“In fact, the Google founder Mr. Sergey Brin was partly funded by this program while he was a PhD student at Stanford. He together with his advisor Prof. Jeffrey Ullman and my colleague at MITRE, Dr. Chris Clifton [Mitre’s chief scientist in IT], developed the Query Flocks System which produced solutions for mining large amounts of data stored in databases. I remember visiting Stanford with Dr. Rick Steinheiser from the Intelligence Community and Mr. Brin would rush in on roller blades, give his presentation and rush out. In fact the last time we met in September 1998, Mr. Brin demonstrated to us his search engine which became Google soon after.”

Brin and Page officially incorporated Google as a company in September 1998, the very month they last reported to Thuraisingham and Steinheiser. ‘Query Flocks’ was also part of Google’s patented ‘PageRank’ search system, which Brin developed at Stanford under the CIA-NSA-MDDS programme, as well as with funding from the NSF, IBM and Hitachi. That year, MITRE’s Dr. Chris Clifton, who worked under Thuraisingham to develop the ‘Query Flocks’ system, co-authored a paper with Brin’s superviser, Prof. Ullman, and the CIA’s Rick Steinheiser. Titled ‘Knowledge Discovery in Text,’ the paper was presented at an academic conference.

“The MDDS funding that supported Brin was significant as far as seed-funding goes, but it was probably outweighed by the other funding streams,” said Thuraisingham. “The duration of Brin’s funding was around two years or so. In that period, I and my colleagues from the MDDS would visit Stanford to see Brin and monitor his progress every three months or so. We didn’t supervise exactly, but we did want to check progress, point out potential problems and suggest ideas. In those briefings, Brin did present to us on the query flocks research, and also demonstrated to us versions of the Google search engine.”

Brin thus reported to Thuraisingham and Steinheiser regularly about his work developing Google.

==

UPDATE 2.05PM GMT [2nd Feb 2015]:

Since publication of this article, Prof. Thuraisingham has amended her article referenced above. The amended version includes a new modified statement, followed by a copy of the original version of her account of the MDDS. In this amended version, Thuraisingham rejects the idea that CIA funded Google, and says instead:

“In fact Prof. Jeffrey Ullman (at Stanford) and my colleague at MITRE Dr. Chris Clifton together with some others developed the Query Flocks System, as part of MDDS, which produced solutions for mining large amounts of data stored in databases. Also, Mr. Sergey Brin, the cofounder of Google, was part of Prof. Ullman’s research group at that time. I remember visiting Stanford with Dr. Rick Steinheiser from the Intelligence Community periodically and Mr. Brin would rush in on roller blades, give his presentation and rush out. During our last visit to Stanford in September 1998, Mr. Brin demonstrated to us his search engine which I believe became Google soon after…

There are also several inaccuracies in Dr. Ahmed’s article (dated January 22, 2015). For example, the MDDS program was not a ‘sensitive’ program as stated by Dr. Ahmed; it was an Unclassified program that funded universities in the US. Furthermore, Sergey Brin never reported to me or to Dr. Rick Steinheiser; he only gave presentations to us during our visits to the Department of Computer Science at Stanford during the 1990s. Also, MDDS never funded Google; it funded Stanford University.”

Here, there is no substantive factual difference in Thuraisingham’s accounts, other than to assert that her statement associating Sergey Brin with the development of ‘query flocks’ is mistaken. Notably, this acknowledgement is derived not from her own knowledge, but from this very article quoting a comment from a Google spokesperson.

However, the bizarre attempt to disassociate Google from the MDDS program misses the mark. Firstly, the MDDS never funded Google, because during the development of the core components of the Google search engine, there was no company incorporated with that name. The grant was instead provided to Stanford University through Prof. Ullman, through whom some MDDS funding was used to support Brin who was co-developing Google at the time. Secondly, Thuraisingham then adds that Brin never “reported” to her or the CIA’s Steinheiser, but admits he “gave presentations to us during our visits to the Department of Computer Science at Stanford during the 1990s.” It is unclear, though, what the distinction is here between reporting, and delivering a detailed presentation — either way, Thuraisingham confirms that she and the CIA had taken a keen interest in Brin’s development of Google. Thirdly, Thuraisingham describes the MDDS program as “unclassified,” but this does not contradict its “sensitive” nature. As someone who has worked for decades as an intelligence contractor and advisor, Thuraisingham is surely aware that there are many ways of categorizing intelligence, including ‘sensitive but unclassified.’ A number of former US intelligence officials I spoke to said that the almost total lack of public information on the CIA and NSA’s MDDS initiative suggests that although the progam was not classified, it is likely instead that its contents was considered sensitive, which would explain efforts to minimise transparency about the program and the way it fed back into developing tools for the US intelligence community. Fourthly, and finally, it is important to point out that the MDDS abstract which Thuraisingham includes in her University of Texas document states clearly not only that the Director of Central Intelligence’s CMS, CIA and NSA were the overseers of the MDDS initiative, but that the intended customers of the project were “DoD, IC, and other government organizations”: the Pentagon, the US intelligence community, and other relevant US government agencies.

In other words, the provision of MDDS funding to Brin through Ullman, under the oversight of Thuraisingham and Steinheiser, was fundamentally because they recognized the potential utility of Brin’s work developing Google to the Pentagon, intelligence community, and the federal government at large.

==

The MDDS programme is actually referenced in several papers co-authored by Brin and Page while at Stanford, specifically highlighting its role in financially sponsoring Brin in the development of Google. In their 1998 paper published in the Bulletin of the IEEE Computer Society Technical Committeee on Data Engineering, they describe the automation of methods to extract information from the web via “Dual Iterative Pattern Relation Extraction,” the development of “a global ranking of Web pages called PageRank,” and the use of PageRank “to develop a novel search engine called Google.” Through an opening footnote, Sergey Brin confirms he was “Partially supported by the Community Management Staff’s Massive Digital Data Systems Program, NSF grant IRI-96–31952” — confirming that Brin’s work developing Google was indeed partly-funded by the CIA-NSA-MDDS program.

This NSF grant identified alongside the MDDS, whose project report lists Brin among the students supported (without mentioning the MDDS), was different to the NSF grant to Larry Page that included funding from DARPA and NASA. The project report, authored by Brin’s supervisor Prof. Ullman, goes on to say under the section ‘Indications of Success’ that “there are some new stories of startups based on NSF-supported research.” Under ‘Project Impact,’ the report remarks: “Finally, the google project has also gone commercial as Google.com.”

Thuraisingham’s account, including her new amended version, therefore demonstrates that the CIA-NSA-MDDS program was not only partly funding Brin throughout his work with Larry Page developing Google, but that senior US intelligence representatives including a CIA official oversaw the evolution of Google in this pre-launch phase, all the way until the company was ready to be officially founded. Google, then, had been enabled with a “significant” amount of seed-funding and oversight from the Pentagon: namely, the CIA, NSA, and DARPA.

The DoD could not be reached for comment.

When I asked Prof. Ullman to confirm whether or not Brin was partly funded under the intelligence community’s MDDS program, and whether Ullman was aware that Brin was regularly briefing the CIA’s Rick Steinheiser on his progress in developing the Google search engine, Ullman’s responses were evasive: “May I know whom you represent and why you are interested in these issues? Who are your ‘sources’?” He also denied that Brin played a significant role in developing the ‘query flocks’ system, although it is clear from Brin’s papers that he did draw on that work in co-developing the PageRank system with Page.

When I asked Ullman whether he was denying the US intelligence community’s role in supporting Brin during the development of Google, he said: “I am not going to dignify this nonsense with a denial. If you won’t explain what your theory is, and what point you are trying to make, I am not going to help you in the slightest.”

The MDDS abstract published online at the University of Texas confirms that the rationale for the CIA-NSA project was to “provide seed money to develop data management technologies which are of high-risk and high-pay-off,” including techniques for “querying, browsing, and filtering; transaction processing; accesses methods and indexing; metadata management and data modelling; and integrating heterogeneous databases; as well as developing appropriate architectures.” The ultimate vision of the program was to “provide for the seamless access and fusion of massive amounts of data, information and knowledge in a heterogeneous, real-time environment” for use by the Pentagon, intelligence community and potentially across government.

These revelations corroborate the claims of Robert Steele, former senior CIA officer and a founding civilian deputy director of the Marine Corps Intelligence Activity, whom I interviewed for The Guardian last year on open source intelligence. Citing sources at the CIA, Steele had said in 2006 that Steinheiser, an old colleague of his, was the CIA’s main liaison at Google and had arranged early funding for the pioneering IT firm. At the time, Wired founder John Batelle managed to get this official denial from a Google spokesperson in response to Steele’s assertions:

“The statements related to Google are completely untrue.”

This time round, despite multiple requests and conversations, a Google spokesperson declined to comment.

UPDATE: As of 5.41PM GMT [22nd Jan 2015], Google’s director of corporate communication got in touch and asked me to include the following statement:

“Sergey Brin was not part of the Query Flocks Program at Stanford, nor were any of his projects funded by US Intelligence bodies.”

This is what I wrote back:

My response to that statement would be as follows: Brin himself in his own paper acknowledges funding from the Community Management Staff of the Massive Digital Data Systems (MDDS) initiative, which was supplied through the NSF. The MDDS was an intelligence community program set up by the CIA and NSA. I also have it on record, as noted in the piece, from Prof. Thuraisingham of University of Texas that she managed the MDDS program on behalf of the US intelligence community, and that her and the CIA’s Rick Steinheiser met Brin every three months or so for two years to be briefed on his progress developing Google and PageRank. Whether Brin worked on query flocks or not is neither here nor there.

In that context, you might want to consider the following questions:

1) Does Google deny that Brin’s work was part-funded by the MDDS via an NSF grant?

2) Does Google deny that Brin reported regularly to Thuraisingham and Steinheiser from around 1996 to 1998 until September that year when he presented the Google search engine to them?

LESS KNOWN FACT: AROUND THE SAME YEAR 2004, SERGEY BRIN JOINED WORLD ECONOMIC FORUM’S YOUTH ORGANIZATION, THE “YOUNG GLOBAL LEADERS”

Total Information Awareness

A call for papers for the MDDS was sent out via email list on November 3rd 1993 from senior US intelligence official David Charvonia, director of the research and development coordination office of the intelligence community’s CMS. The reaction from Tatu Ylonen (celebrated inventor of the widely used secure shell [SSH] data protection protocol) to his colleagues on the email list is telling: “Crypto relevance? Makes you think whether you should protect your data.” The email also confirms that defense contractor and Highlands Forum partner, SAIC, was managing the MDDS submission process, with abstracts to be sent to Jackie Booth of the CIA’s Office of Research and Development via a SAIC email address.

By 1997, Thuraisingham reveals, shortly before Google became incorporated and while she was still overseeing the development of its search engine software at Stanford, her thoughts turned to the national security applications of the MDDS program. In the acknowledgements to her book, Web Data Mining and Applications in Business Intelligence and Counter-Terrorism (2003), Thuraisingham writes that she and “Dr. Rick Steinheiser of the CIA, began discussions with Defense Advanced Research Projects Agency on applying data-mining for counter-terrorism,” an idea that resulted directly from the MDDS program which partly funded Google. “These discussions eventually developed into the current EELD (Evidence Extraction and Link Detection) program at DARPA.”

So the very same senior CIA official and CIA-NSA contractor involved in providing the seed-funding for Google were simultaneously contemplating the role of data-mining for counter-terrorism purposes, and were developing ideas for tools actually advanced by DARPA.

Today, as illustrated by her recent oped in the New York Times, Thuraisingham remains a staunch advocate of data-mining for counter-terrorism purposes, but also insists that these methods must be developed by government in cooperation with civil liberties lawyers and privacy advocates to ensure that robust procedures are in place to prevent potential abuse. She points out, damningly, that with the quantity of information being collected, there is a high risk of false positives.

In 1993, when the MDDS program was launched and managed by MITRE Corp. on behalf of the US intelligence community, University of Virginia computer scientist Dr. Anita K. Jones — a MITRE trustee — landed the job of DARPA director and head of research and engineering across the Pentagon. She had been on the board of MITRE since 1988. From 1987 to 1993, Jones simultaneously served on SAIC’s board of directors. As the new head of DARPA from 1993 to 1997, she also co-chaired the Pentagon’s Highlands Forum during the period of Google’s pre-launch development at Stanford under the MDSS.

Thus, when Thuraisingham and Steinheiser were talking to DARPA about the counter-terrorism applications of MDDS research, Jones was DARPA director and Highlands Forum co-chair. That year, Jones left DARPA to return to her post at the University of Virgina. The following year, she joined the board of the National Science Foundation, which of course had also just funded Brin and Page, and also returned to the board of SAIC. When she left DoD, Senator Chuck Robb paid Jones the following tribute : “She brought the technology and operational military communities together to design detailed plans to sustain US dominance on the battlefield into the next century.”

Dr. Anita Jones, head of DARPA from 1993–1997, and co-chair of the Pentagon Highlands Forum from 1995–1997, during which officials in charge of the CIA-NSA-MDSS program were funding Google, and in communication with DARPA about data-mining for counterterrorism

On the board of the National Science Foundation from 1992 to 1998 (including a stint as chairman from 1996) was Richard N. Zare. This was the period in which the NSF sponsored Sergey Brin and Larry Page in association with DARPA. In June 1994, Prof. Zare, a chemist at Stanford, participated with Prof. Jeffrey Ullman (who supervised Sergey Brin’s research), on a panel sponsored by Stanford and the National Research Council discussing the need for scientists to show how their work “ties to national needs.” The panel brought together scientists and policymakers, including “Washington insiders.”

DARPA’s EELD program, inspired by the work of Thuraisingham and Steinheiser under Jones’ watch, was rapidly adapted and integrated with a suite of tools to conduct comprehensive surveillance under the Bush administration.

According to DARPA official Ted Senator, who led the EELD program for the agency’s short-lived Information Awareness Office, EELD was among a range of “promising techniques” being prepared for integration “into the prototype TIA system.” TIA stood for Total Information Awareness, and was the main global electronic eavesdropping and data-mining program deployed by the Bush administration after 9/11. TIA had been set up by Iran-Contra conspirator Admiral John Poindexter, who was appointed in 2002 by Bush to lead DARPA’s new Information Awareness Office.

The Xerox Palo Alto Research Center (PARC) was another contractor among 26 companies (also including SAIC) that received million dollar contracts from DARPA (the specific quantities remained classified) under Poindexter, to push forward the TIA surveillance program in 2002 onwards. The research included “behaviour-based profiling,” “automated detection, identification and tracking” of terrorist activity, among other data-analyzing projects. At this time, PARC’s director and chief scientist was John Seely Brown. Both Brown and Poindexter were Pentagon Highlands Forum participants — Brown on a regular basis until recently.

TIA was purportedly shut down in 2003 due to public opposition after the program was exposed in the media, but the following year Poindexter participated in a Pentagon Highlands Group session in Singapore, alongside defense and security officials from around the world. Meanwhile, Ted Senator continued to manage the EELD program among other data-mining and analysis projects at DARPA until 2006, when he left to become a vice president at SAIC. He is now a SAIC/Leidos technical fellow.

Google, DARPA and the money trail

Long before the appearance of Sergey Brin and Larry Page, Stanford University’s computer science department had a close working relationship with US military intelligence. A letter dated November 5th 1984 from the office of renowned artificial intelligence (AI) expert, Prof Edward Feigenbaum, addressed to Rick Steinheiser, gives the latter directions to Stanford’s Heuristic Programming Project, addressing Steinheiser as a member of the “AI Steering Committee.” A list of attendees at a contractor conference around that time, sponsored by the Pentagon’s Office of Naval Research (ONR), includes Steinheiser as a delegate under the designation “OPNAV Op-115” — which refers to the Office of the Chief of Naval Operations’ program on operational readiness, which played a major role in advancing digital systems for the military.

From the 1970s, Prof. Feigenbaum and his colleagues had been running Stanford’s Heuristic Programming Project under contract with DARPA, continuing through to the 1990s. Feigenbaum alone had received around over $7 million in this period for his work from DARPA, along with other funding from the NSF, NASA, and ONR.

Brin’s supervisor at Stanford, Prof. Jeffrey Ullman, was in 1996 part of a joint funding project of DARPA’s Intelligent Integration of Information program. That year, Ullman co-chaired DARPA-sponsored meetings on data exchange between multiple systems.

In September 1998, the same month that Sergey Brin briefed US intelligence representatives Steinheiser and Thuraisingham, tech entrepreneurs Andreas Bechtolsheim and David Cheriton invested $100,000 each in Google. Both investors were connected to DARPA.

As a Stanford PhD student in electrical engineering in the 1980s, Bechtolsheim’s pioneering SUN workstation project had been funded by DARPA and the Stanford computer science department — this research was the foundation of Bechtolsheim’s establishment of Sun Microsystems, which he co-founded with William Joy.

As for Bechtolsheim’s co-investor in Google, David Cheriton, the latter is a long-time Stanford computer science professor who has an even more entrenched relationship with DARPA. His bio at the University of Alberta, which in November 2014 awarded him an honorary science doctorate, says that Cheriton’s “research has received the support of the US Defense Advanced Research Projects Agency (DARPA) for over 20 years.”

In the meantime, Bechtolsheim left Sun Microsystems in 1995, co-founding Granite Systems with his fellow Google investor Cheriton as a partner. They sold Granite to Cisco Systems in 1996, retaining significant ownership of Granite, and becoming senior Cisco executives.

An email obtained from the Enron Corpus (a database of 600,000 emails acquired by the Federal Energy Regulatory Commission and later released to the public) from Richard O’Neill, inviting Enron executives to participate in the Highlands Forum, shows that Cisco and Granite executives are intimately connected to the Pentagon. The email reveals that in May 2000, Bechtolsheim’s partner and Sun Microsystems co-founder, William Joy — who was then chief scientist and corporate executive officer there — had attended the Forum to discuss nanotechnology and molecular computing.

In 1999, Joy had also co-chaired the President’s Information Technology Advisory Committee, overseeing a report acknowledging that DARPA had:

“… revised its priorities in the 90’s so that all information technology funding was judged in terms of its benefit to the warfighter.”

Throughout the 1990s, then, DARPA’s funding to Stanford, including Google, was explicitly about developing technologies that could augment the Pentagon’s military intelligence operations in war theatres.

The Joy report recommended more federal government funding from the Pentagon, NASA, and other agencies to the IT sector. Greg Papadopoulos, another of Bechtolsheim’s colleagues as then Sun Microsystems chief technology officer, also attended a Pentagon Highlands’ Forum meeting in September 2000.

In November, the Pentagon Highlands Forum hosted Sue Bostrom, who was vice president for the internet at Cisco, sitting on the company’s board alongside Google co-investors Bechtolsheim and Cheriton. The Forum also hosted Lawrence Zuriff, then a managing partner of Granite, which Bechtolsheim and Cheriton had sold to Cisco. Zuriff had previously been an SAIC contractor from 1993 to 1994, working with the Pentagon on national security issues, specifically for Marshall’s Office of Net Assessment. In 1994, both the SAIC and the ONA were, of course, involved in co-establishing the Pentagon Highlands Forum. Among Zuriff’s output during his SAIC tenure was a paper titled ‘Understanding Information War’, delivered at a SAIC-sponsored US Army Roundtable on the Revolution in Military Affairs.

After Google’s incorporation, the company received $25 million in equity funding in 1999 led by Sequoia Capital and Kleiner Perkins Caufield & Byers. According to Homeland Security Today, “A number of Sequoia-bankrolled start-ups have contracted with the Department of Defense, especially after 9/11 when Sequoia’s Mark Kvamme met with Defense Secretary Donald Rumsfeld to discuss the application of emerging technologies to warfighting and intelligence collection.” Similarly, Kleiner Perkins had developed “a close relationship” with In-Q-Tel, the CIA venture capitalist firm that funds start-ups “to advance ‘priority’ technologies of value” to the intelligence community.

John Doerr, who led the Kleiner Perkins investment in Google obtaining a board position, was a major early investor in Becholshtein’s Sun Microsystems at its launch. He and his wife Anne are the main funders behind Rice University’s Center for Engineering Leadership (RCEL), which in 2009 received $16 million from DARPA for its platform-aware-compilation-environment (PACE) ubiquitous computing R&D program. Doerr also has a close relationship with the Obama administration, which he advised shortly after it took power to ramp up Pentagon funding to the tech industry. In 2013, at the Fortune Brainstorm TECH conference, Doerr applauded “how the DoD’s DARPA funded GPS, CAD, most of the major computer science departments, and of course, the Internet.”

From inception, in other words, Google was incubated, nurtured and financed by interests that were directly affiliated or closely aligned with the US military intelligence community: many of whom were embedded in the Pentagon Highlands Forum.

Google captures the Pentagon

In 2003, Google began customizing its search engine under special contract with the CIA for its Intelink Management Office, “overseeing top-secret, secret and sensitive but unclassified intranets for CIA and other IC agencies,” according to Homeland Security Today. That year, CIA funding was also being “quietly” funneled through the National Science Foundation to projects that might help create “new capabilities to combat terrorism through advanced technology.”

The following year, Google bought the firm Keyhole, which had originally been funded by In-Q-Tel. Using Keyhole, Google began developing the advanced satellite mapping software behind Google Earth. Former DARPA director and Highlands Forum co-chair Anita Jones had been on the board of In-Q-Tel at this time, and remains so today.

Then in November 2005, In-Q-Tel issued notices to sell $2.2 million of Google stocks. Google’s relationship with US intelligence was further brought to light when an IT contractor told a closed Washington DC conference of intelligence professionals on a not-for-attribution basis that at least one US intelligence agency was working to “leverage Google’s [user] data monitoring” capability as part of an effort to acquire data of “national security intelligence interest.”

photo on Flickr dated March 2007 reveals that Google research director and AI expert Peter Norvig attended a Pentagon Highlands Forum meeting that year in Carmel, California. Norvig’s intimate connection to the Forum as of that year is also corroborated by his role in guest editing the 2007 Forum reading list.

The photo below shows Norvig in conversation with Lewis Shepherd, who at that time was senior technology officer at the Defense Intelligence Agency, responsible for investigating, approving, and architecting “all new hardware/software systems and acquisitions for the Global Defense Intelligence IT Enterprise,” including “big data technologies.” Shepherd now works at Microsoft. Norvig was a computer research scientist at Stanford University in 1991 before joining Bechtolsheim’s Sun Microsystems as senior scientist until 1994, and going on to head up NASA’s computer science division.

Lewis Shepherd (left), then a senior technology officer at the Pentagon’s Defense Intelligence Agency, talking to Peter Norvig (right), renowned expert in artificial intelligence expert and director of research at Google. This photo is from a Highlands Forum meeting in 2007.

Norvig shows up on O’Neill’s Google Plus profile as one of his close connections. Scoping the rest of O’Neill’s Google Plus connections illustrates that he is directly connected not just to a wide range of Google executives, but also to some of the biggest names in the US tech community.

Those connections include Michele Weslander Quaid, an ex-CIA contractor and former senior Pentagon intelligence official who is now Google’s chief technology officer where she is developing programs to “best fit government agencies’ needs”; Elizabeth Churchill, Google director of user experience; James Kuffner, a humanoid robotics expert who now heads up Google’s robotics division and who introduced the term ‘cloud robotics’; Mark Drapeau, director of innovation engagement for Microsoft’s public sector business; Lili Cheng, general manager of Microsoft’s Future Social Experiences (FUSE) Labs; Jon Udell, Microsoft ‘evangelist’; Cory Ondrejka, vice president of engineering at Facebook; to name just a few.

In 2010, Google signed a multi-billion dollar no-bid contract with the NSA’s sister agency, the National Geospatial-Intelligence Agency (NGA). The contract was to use Google Earth for visualization services for the NGA. Google had developed the software behind Google Earth by purchasing Keyhole from the CIA venture firm In-Q-Tel.

Then a year after, in 2011, another of O’Neill’s Google Plus connections, Michele Quaid — who had served in executive positions at the NGA, National Reconnaissance Office and the Office of the Director of National Intelligence — left her government role to become Google ‘innovation evangelist’ and the point-person for seeking government contracts. Quaid’s last role before her move to Google was as a senior representative of the Director of National Intelligence to the Intelligence, Surveillance, and Reconnaissance Task Force, and a senior advisor to the undersecretary of defense for intelligence’s director of Joint and Coalition Warfighter Support (J&CWS). Both roles involved information operations at their core. Before her Google move, in other words, Quaid worked closely with the Office of the Undersecretary of Defense for Intelligence, to which the Pentagon’s Highlands Forum is subordinate. Quaid has herself attended the Forum, though precisely when and how often I could not confirm.

In March 2012, then DARPA director Regina Dugan — who in that capacity was also co-chair of the Pentagon Highlands Forum — followed her colleague Quaid into Google to lead the company’s new Advanced Technology and Projects Group. During her Pentagon tenure, Dugan led on strategic cyber security and social media, among other initiatives. She was responsible for focusing “an increasing portion” of DARPA’s work “on the investigation of offensive capabilities to address military-specific needs,” securing $500 million of government funding for DARPA cyber research from 2012 to 2017.

Regina Dugan, former head of DARPA and Highlands Forum co-chair, now a senior Google executive — trying her best to look the part

By November 2014, Google’s chief AI and robotics expert James Kuffner was a delegate alongside O’Neill at the Highlands Island Forum 2014 in Singapore, to explore ‘Advancement in Robotics and Artificial Intelligence: Implications for Society, Security and Conflict.’ The event included 26 delegates from Austria, Israel, Japan, Singapore, Sweden, Britain and the US, from both industry and government. Kuffner’s association with the Pentagon, however, began much earlier. In 1997, Kuffner was a researcher during his Stanford PhD for a Pentagon-funded project on networked autonomous mobile robots, sponsored by DARPA and the US Navy.

Dr Nafeez Ahmed is an investigative journalist, bestselling author and international security scholar. A former Guardian writer, he writes the ‘System Shift’ column for VICE’s Motherboard, and is also a columnist for Middle East Eye. He is the winner of a 2015 Project Censored Award for Outstanding Investigative Journalism for his Guardian work.

Nafeez has also written for The Independent, Sydney Morning Herald, The Age, The Scotsman, Foreign Policy, The Atlantic, Quartz, Prospect, New Statesman, Le Monde diplomatique, New Internationalist, Counterpunch, Truthout, among others. He is the author of A User’s Guide to the Crisis of Civilization: And How to Save It (2010), and the scifi thriller novel ZERO POINT, among other books. His work on the root causes and covert operations linked to international terrorism officially contributed to the 9/11 Commission and the 7/7 Coroner’s Inquest.

Nafeez is 120% corroborated by Quartz:

A rich history of the governments science funding

There was already a long history of collaboration between America’s best scientists and the intelligence community, from the creation of the atomic bomb and satellite technology to efforts to put a man on the moon.The internet itself was created because of an intelligence effort.

In fact, the internet itself was created because of an intelligence effort: In the 1970s, the agency responsible for developing emerging technologies for military, intelligence, and national security purposes—the Defense Advanced Research Projects Agency (DARPA)—linked four supercomputers to handle massive data transfers. It handed the operations off to the National Science Foundation (NSF) a decade or so later, which proliferated the network across thousands of universities and, eventually, the public, thus creating the architecture and scaffolding of the World Wide Web.

Silicon Valley was no different. By the mid 1990s, the intelligence community was seeding funding to the most promising supercomputing efforts across academia, guiding the creation of efforts to make massive amounts of information useful for both the private sector as well as the intelligence community.

They funded these computer scientists through an unclassified, highly compartmentalized program that was managed for the CIA and the NSA by large military and intelligence contractors. It was called the Massive Digital Data Systems (MDDS) project.

The Massive Digital Data Systems (MDDS) project 

MDDS was introduced to several dozen leading computer scientists at Stanford, CalTech, MIT, Carnegie Mellon, Harvard, and others in a white paper that described what the CIA, NSA, DARPA, and other agencies hoped to achieve. The research would largely be funded and managed by unclassified science agencies like NSF, which would allow the architecture to be scaled up in the private sector if it managed to achieve what the intelligence community hoped for.

“Not only are activities becoming more complex, but changing demands require that the IC [Intelligence Community] process different types as well as larger volumes of data,” the intelligence community said in its 1993 MDDS white paper. “Consequently, the IC is taking a proactive role in stimulating research in the efficient management of massive databases and ensuring that IC requirements can be incorporated or adapted into commercial products. Because the challenges are not unique to any one agency, the Community Management Staff (CMS) has commissioned a Massive Digital Data Systems [MDDS] Working Group to address the needs and to identify and evaluate possible solutions.”

Over the next few years, the program’s stated aim was to provide more than a dozen grants of several million dollars each to advance this research concept. The grants were to be directed largely through the NSF so that the most promising, successful efforts could be captured as intellectual property and form the basis of companies attracting investments from Silicon Valley. This type of public-to-private innovation system helped launch powerful science and technology companies like Qualcomm, Symantec, Netscape, and others, and funded the pivotal research in areas like Doppler radar and fiber optics, which are central to large companies like AccuWeather, Verizon, and AT&T today. Today, the NSF provides nearly 90% of all federal funding for university-based computer-science research.

MIT is but a Pentagon lab

The CIA and NSAs end goal

The research arms of the CIA and NSA hoped that the best computer-science minds in academia could identify what they called “birds of a feather:” Just as geese fly together in large V shapes, or flocks of sparrows make sudden movements together in harmony, they predicted that like-minded groups of humans would move together online. The intelligence community named their first unclassified briefing for scientists the “birds of a feather” briefing, and the “Birds of a Feather Session on the Intelligence Community Initiative in Massive Digital Data Systems” took place at the Fairmont Hotel in San Jose in the spring of 1995.The intelligence community named their first unclassified briefing for scientists the “birds of a feather” briefing.

Their research aim was to track digital fingerprints inside the rapidly expanding global information network, which was then known as the World Wide Web. Could an entire world of digital information be organized so that the requests humans made inside such a network be tracked and sorted? Could their queries be linked and ranked in order of importance? Could “birds of a feather” be identified inside this sea of information so that communities and groups could be tracked in an organized way?

By working with emerging commercial-data companies, their intent was to track like-minded groups of people across the internet and identify them from the digital fingerprints they left behind, much like forensic scientists use fingerprint smudges to identify criminals. Just as “birds of a feather flock together,” they predicted that potential terrorists would communicate with each other in this new global, connected world—and they could find them by identifying patterns in this massive amount of new information. Once these groups were identified, they could then follow their digital trails everywhere.

Sergey Brin and Larry Page, computer-science boy wonders 

In 1995, one of the first and most promising MDDS grants went to a computer-science research team at Stanford University with a decade-long history of working with NSF and DARPA grants. The primary objective of this grant was “query optimization of very complex queries that are described using the ‘query flocks’ approach.” A second grant—the DARPA-NSF grant most closely associated with Google’s origin—was part of a coordinated effort to build a massive digital library using the internet as its backbone. Both grants funded research by two graduate students who were making rapid advances in web-page ranking, as well as tracking (and making sense of) user queries: future Google cofounders Sergey Brin and Larry Page.

The research by Brin and Page under these grants became the heart of Google: people using search functions to find precisely what they wanted inside a very large data set. The intelligence community, however, saw a slightly different benefit in their research: Could the network be organized so efficiently that individual users could be uniquely identified and tracked?

This process is perfectly suited for the purposes of counter-terrorism and homeland security efforts: Human beings and like-minded groups who might pose a threat to national security can be uniquely identified online before they do harm. This explains why the intelligence community found Brin’s and Page’s research efforts so appealing; prior to this time, the CIA largely used human intelligence efforts in the field to identify people and groups that might pose threats. The ability to track them virtually (in conjunction with efforts in the field) would change everything.

It was the beginning of what in just a few years’ time would become Google. The two intelligence-community managers charged with leading the program met regularly with Brin as his research progressed, and he was an author on several other research papers that resulted from this MDDS grant before he and Page left to form Google.

The grants allowed Brin and Page to do their work and contributed to their breakthroughs in web-page ranking and tracking user queries. Brin didn’t work for the intelligence community—or for anyone else. Google had not yet been incorporated. He was just a Stanford researcher taking advantage of the grant provided by the NSA and CIA through the unclassified MDDS program.

Left out of Googles story

The MDDS research effort has never been part of Google’s origin story, even though the principal investigator for the MDDS grant specifically named Google as directly resulting from their research: “Its core technology, which allows it to find pages far more accurately than other search engines, was partially supported by this grant,” he wrote. In a published research paper that includes some of Brin’s pivotal work, the authors also reference the NSF grant that was created by the MDDS program.

Instead, every Google creation story only mentions just one federal grant: the NSF/DARPA “digital libraries” grant, which was designed to allow Stanford researchers to search the entire World Wide Web stored on the university’s servers at the time. “The development of the Google algorithms was carried on a variety of computers, mainly provided by the NSF-DARPA-NASA-funded Digital Library project at Stanford,” Stanford’s Infolab says of its origin, for example. NSF likewise only references the digital libraries grant, not the MDDS grant as well, in its own history of Google’s origin. In the famous research paper, “The Anatomy of a Large-Scale Hypertextual Web Search Engine,” which describes the creation of Google, Brin and Page thanked the NSF and DARPA for its digital library grant to Stanford. But the grant from the intelligence community’s MDDS program—specifically designed for the breakthrough that Google was built upon—has faded into obscurity.

Google has said in the past that it was not funded or created by the CIA. For instance, when stories circulated in 2006 that Google had received funding from the intelligence community for years to assist in counter-terrorism efforts, the company told Wired magazine founder John Battelle, “The statements related to Google are completely untrue.”

Did the CIA directly fund the work of Brin and Page, and therefore create Google? No. But were Brin and Page researching precisely what the NSA, the CIA, and the intelligence community hoped for, assisted by their grants? Absolutely.The CIA and NSA funded an unclassified, compartmentalized program designed from its inception to spur something that looks almost exactly like Google.

To understand this significance, you have to consider what the intelligence community was trying to achieve as it seeded grants to the best computer-science minds in academia: The CIA and NSA funded an unclassified, compartmentalized program designed from its inception to spur the development of something that looks almost exactly like Google. Brin’s breakthrough research on page ranking by tracking user queries and linking them to the many searches conducted—essentially identifying “birds of a feather”—was largely the aim of the intelligence community’s MDDS program. And Google succeeded beyond their wildest dreams.

The intelligence communitys enduring legacy within Silicon Valley

Digital privacy concerns over the intersection between the intelligence community and commercial technology giants have grown in recent years. But most people still don’t understand the degree to which the intelligence community relies on the world’s biggest science and tech companies for its counter-terrorism and national-security work.

Civil-liberty advocacy groups have aired their privacy concerns for years, especially as they now relate to the Patriot Act. “Hastily passed 45 days after 9/11 in the name of national security, the Patriot Act was the first of many changes to surveillance laws that made it easier for the government to spy on ordinary Americans by expanding the authority to monitor phone and email communications, collect bank and credit reporting records, and track the activity of innocent Americans on the Internet,” says the ACLU. “While most Americans think it was created to catch terrorists, the Patriot Act actually turns regular citizens into suspects.”

When asked, the biggest technology and communications companies—from Verizon and AT&T to Google, Facebook, and Microsoft—say that they never deliberately and proactively offer up their vast databases on their customers to federal security and law enforcement agencies: They say that they only respond to subpoenas or requests that are filed properly under the terms of the Patriot Act.

But even a cursory glance through recent public records shows that there is a treadmill of constant requests that could undermine the intent behind this privacy promise. According to the data-request records that the companies make available to the public, in the most recent reporting period between 2016 and 2017, local, state and federal government authorities seeking information related to national security, counter-terrorism or criminal concerns issued more than 260,000 subpoenas, court orders, warrants, and other legal requests to Verizon, more than 250,000 such requests to AT&T, and nearly 24,000 subpoenas, search warrants, or court orders to Google. Direct national security or counter-terrorism requests are a small fraction of this overall group of requests, but the Patriot Act legal process has now become so routinized that the companies each have a group of employees who simply take care of the stream of requests.

In this way, the collaboration between the intelligence community and big, commercial science and tech companies has been wildly successful. When national security agencies need to identify and track people and groups, they know where to turn – and do so frequently. That was the goal in the beginning. It has succeeded perhaps more than anyone could have imagined at the time.

CLICK HERE TO WATCH BOOK PRESENTATION BY THE AUTHOR

FFW to 2020

From DARPA to Google: How the Military Kickstarted AV Development

 27 Feb 2020

FromDarpatoGoogle

The Stanford Racing Team

by Arrow Mag, Feb 2020

Sebastian Thrun was entertaining the idea of self-driving cars for many years. Born and raised in Germany, he was fascinated with the power and performance of German cars. Things changed in 1986, when he was 18, when his best friend died in a car crash because the driver, another friend, was going too fast on his new Audi Quattro.

As a student at the University of Bonn, Thrun developed several autonomous robotic systems that earned him international recognition. At the time, Thrun was convinced that self-driving cars would soon make transportation safer, avoiding crashes like the one that took his friend’s life.

In 1998, he became an assistant professor and co-director of the Robot Learning Laboratory at Carnegie Mellon University. In July 2003, Thrun left Carnegie Mellon for Stanford University, soon after the first DARPA Grand Challenge was announced. Before accepting the new position, he asked Red Whittaker, the leader of the CMU robotics department, to join the team developing the vehicle for the DARPA race. Whittaker declined. After moving to California, Thrun joined the Stanford Racing Team.

On Oct. 8, 2005, the Stanford Racing Team won $2 million for being the first team to complete the 132-mile DARPA Grand Challenge course in California’s Mojave Desert. Their robot car, “Stanley,” finished in just under 6 hours and 54 minutes and averaged over 19 mph on the course.

Google’s Page wanted to develop self-driving cars

Two years after the third Grand Challenge, Google co-founder Larry Page called Thrun, wanting to turn the experience of the DARPA races into a product for the masses.

When Page first approached Thrun about building a self-driving car that people could use on the real roads, Thrun told him it couldn’t be done.

But Page had a vision, and he would not abandon his quest for an autonomous vehicle.

Thrun recalled that a short time later, Page came back to him and said, “OK, you say it can’t be done. You’re the expert. I trust you. So I can explain to Sergey [Brin] why it can’t be done, can you give me a technical reason why it can’t be done?”

Finally, Thrun accepted Page’s offer and, in 2009, started Project Chauffeur, which began as the Google self-driving car project.

The Google 101,000-Mile Challenge

To develop the technology for Google’s self-driving car, Thrun called Urmson and offered him the position of chief technical officer of the project.

To encourage the team to build a vehicle, and its systems, to drive on any public road, Page created two challenges, with big cash rewards for the entire team: a 1,000-mile challenge to show that Project Chauffeur’s car could drive in several situations, including highways and the streets of San Francisco, and another 100,000-mile challenge to show that driverless cars could be a reality in a few years.

By the middle of 2011, Project Chauffeur engineers completed the two challenges.

In 2016, the Google self-driving car project became Waymo, a “spinoff under Alphabet as a self-driving technology company with a mission to make it safe and easy for people and things to move around.”

Urmson led Google’s self-driving car project for nearly eight years. Under his leadership, Google vehicles accumulated 1.8 million miles of test driving.

In 2018, Waymo One, the first fully self-driving vehicle taxi service, began in Phoenix, Arizona.

From Waymo to Aurora

In 2016, after finishing development of the production-ready version of Waymo’s self-driving technology, Urmson left Google to start Aurora Innovation, a startup backed by Amazon, aiming to provide the full-stack solution for self-driving vehicles.

Urmson believes that in 20 years, we’ll see much of the transportation infrastructure move over to automation. – Arrow.com

TO BE CONTINUED

Here’s a peek into the next episode:

Facebook Hired a Former DARPA Head To Lead An Ambitious New Research Lab

Source: TIME | by VICTOR LUCKERSON

If you need another sign that Facebook’s world-dominating ambitions are just getting started, here’s one: the Menlo Park, Calif. company has hired a former DARPA chief to lead its new research lab.

Facebook CEO Mark Zuckerberg announced April 14 that Regina Dugan will guide Building 8, a new research group developing hardware projects that advance the company’s efforts in virtual reality, augmented reality, artificial intelligence and global connectivity.

Dugan served as the head of the Pentagon’s Defense Advanced Research Projects Agency from 2009 and 2012. Most recently, she led Google’s Advanced Technology and Projects Lab, a highly experimental arm of the company responsible for developing new hardware and software products on a strict two-year timetable.

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

“The greatest conspiracies are in plain sight” – Edward Snowden

UPDATE JANUARY 25th, 2022: 200% VINDICATED

A 2017 interview, resurfaced just now by Rise Melbourne (thanks!), shows Klaus Schwab making a summary of this expose in just one minute:

UPDATE JANUARY 9, 2022: SHAMELESS SHILLS:

I’ve just unearthed a series of videos that show an unpublicized side of the World Economic Forum and its leader Klaus Schwab.

These videos are extra bonuses to a 2019 German Documentary titled “Das Forum” (The Forum), which seems part of Klaus Schwab’s idea of imprinting his personal image in history for the 50th WEF anniversary.

In 2018, Schwab decided to allow a carefully selected outsider in his kitchen, in a mutually complicit attempt at positive publicity and fame. There are precedents in history. What followed was quite a disaster, in my personal opinion, because Klaus doesn’t have the subtlety needed to do this and it all derailed in a blatant bad-taste cult of personality. All under the disguise of investigative journalism, of course.

I have previously published some of these extras, but now I have the full package and we’re going to weed out the propaganda looking for real truth gems.

From this first video we find out about the so called “Young Global Leaders”, which are pretty clearly World Economic Forum’s youth elite organization. I don’t have yet a quality translation of the part in German, but the English dialogue in the beginning is quite telling.

This second video reveals shocking former Young Global Learders names, and possible new candidates (as of 2018)

Class of 2011

Justin Trudeau has been among the first to let us know he’s aligned and awaiting instructions, even before he came out in the news claiming “The Great Reset” is a conspiracy. He’s been mentioning “Build Back Better” since February-March 2020, before Biden ever heard this oxymoron put together for the first time.

“Kyle Kemper is not a nobody. Not only is he Justin Trudeau’s half-brother, and the son of Margaret Trudeau, but he has a business portfolio: a founder and the Chief Executive Officer of Swiss Key, and previously an Executive Director and Strategic advisor at the Chamber of Digital Commerce Canada. He finished his BCOMM, marketing business, from Dalhousie University.” – En-volve

In the video above, Putin confirms Blair is one of his “good friends”. Recorded 10 years ago, when they were fresh YGL alumni.

In this third “resurrected” video, we watch them openly discussing regime change in countries unaligned with WEF’s “democratic liberalism” and the Fourth Industrial Revolution

VIDEO DELETED BY YOUTUBE, COULDN’T RECOVER IT YET, BUT I WILL…

Welcome to the younger Forum!

No one’s younger than the king and his heirs, right?

Young Global Leaders

The Young Global Leaders, or Forum of Young Global Leaders, is an independent non-profit organization managed from GenevaSwitzerland, under the supervision of the Swiss government.

History

Launched by Klaus Schwab of the World Economic Forum in 2004, the Young Global Leaders are governed by a board of twelve world and industry leaders, ranging from Queen Rania of Jordan to Marissa Mayer of Yahoo! and Wikipedia co-founder Jimmy Wales. Schwab created the group with $1 million won from the Dan David Prize, and the inaugural 2005 class comprised 237 young leaders. Young Global Leaders participate in the Annual Meeting of the New Champions, established in 2007 and known informally as “Summer Davos“, alongside Global Growth Companies and other delegations to the World Economic Forum.

Papa Schwab welcomes his “Young Global Leaders” at their Inaugural Summit in 2005

In this shape and form, YGL exists since 2004, but it’s actually an older structure bearing different names over time, such as Global Leaders for Tomorrow. Thus, the archives intertwin and overlap, and named get lost. But the agenda stayed the same.
I just dug out a very interesting little gem from the belly of the Internets, which brings us to:

Selection process

Found their original playbook!
SOURCE

As per this Israeli SOURCE:

“The World Economic Forum, which is an independent international organization that defines its goal as improving the state of the world, started the Global Leaders for Tomorrow Program began in 1993. The program’s aim is “to provide an informal, efficient framework for an ongoing exchange of opinions on strategic issues of concern to this younger generation of decision-makers,” the forum describes.

“The GLT Community represents the new generation of global leaders, nearly 500 individuals from business, politics, public interest groups, the media, the arts and the sciences, who have demonstrated responsible leadership vis-a-vis society, business developments, the environment and socially responsible initiatives,” the Geneva-based forum said.

The criteria for making the list include being under 37 years old, proving a commitment to public affairs, and demonstrating leadership in addressing issues beyond their immediate professional interest.

Once selected, GLTs are invited for three consecutive years to a special GLT program at the annual meeting of the World Economic Forum, and for five years to a yearly GLT Summit and to regional activities of the World Economic Forum.”

The current narrative, as per Wikipedia:
“Representing over 70 different nations, Young Global Leaders are nominated by alumni to serve six-year terms and are subject to veto during the selection process. Candidates must be younger than 38 years old at the time of acceptance (meaning active YGLs are 44 and younger), and highly accomplished in their fields. Over the years, there have been hundreds of honorees, including several popular celebrities, alongside recognized high achievers and innovators in politics, business, academia, media, and the arts.”

Reception

BusinessWeeks Bruce Nussbaum describes the Young Global Leaders as “the most exclusive private social network in the world”, while the organization itself describes the selected leaders as representing “the voice for the future and the hopes of the next generation”.

Members and alumni

Notable members and alumni of Young Global Leaders include:

Young Global Leader David Rothschild, fresh off the YGL boat, preaching the WEF gospel on TV
YOPP! SHE GOT HER OWN FEATURE

BOOM! IVANKA TRUMP A WEF YOUNG GLOBAL LEADER CONFIRMED BY WH

More American horsemen of the Great Reset

Let’s look at more celebrity YGL’s

Interestingly enough, Daniel Crenshaw has been deleted from their website. But not from the Internet Archive 😉

Crenshaw is also confirmed by this CNBC report

Dude doesn’t even look alive

Young Global Leaders–Anderson Cooper and Leonardo DiCaprio Are In The Most Exclusive Private Social Network In The World.

By Bloomberg, March 18, 2008, 4:00 AM GMT

The World Economic Forum out of Davos just announced its new 2008 list of YGLs—Young Global Leaders. In a growing universe of private social networks, the YGL network has got to be one of—if not THE—most exclusive sn around. A few weeks ago, I predicted that Cameron Sinclair, who founded Architecture for Humanity  would become a YGL—and he did.

YGL website profile

YGLers can find out who fellow members of the social network are in any particular city around the world by clicking on the map site (can’t do it here, sorry). Works for regions too. Want to chat with a fellow YGLer if you’re visiting Silicon Valley, call up Marc Benioff, Shai Agassi, Sergey Brin (Google founder), Gavin Newson (San Fran mayor), Jerry Yang or John Battelle. If you’re in New York City, Business News TV star Maria Bartiromo is a YGLer.

WEF’s ‘Young Global Leader’ and Google owner Sergey Brin chats with his mentor at Davos 2017

Fellowship Supporters

  • Aliko Dangote Foundation

Executive Education Partners and Supporters

  • Bill and Penny George
  • David Rubenstein
  • Harvard Kennedy School
  • Howard Cox
  • Nanyang Technological University, Singapore
  • Marilyn Carlson Nelson and Glen Nelson
  • Princeton University Andlinger Center for Energy and the Environment
  • Singapore Economic Development Board
  • University of Oxford Saïd Business School
  • University of Cape Town Graduate School of Business
  • Willis Towers Watson

Endowment Supporters (gifts from YGL members of 50,000+ CHF)

The YGL Endowment Fund was created by the community’s members to support the long-term ambitions of the Forum of Young Global Leaders. Its proceeds are intended to support the community programming and to ensure participation is accessible to all members.

  • Andrew Cohen
  • Ellana Lee
  • Georges Kern
  • Henrik Naujoks
  • Jill Otto
  • Katherine Garrett-Cox
  • M Arsjad Rasjid Mangkuningrat
  • Peter Lacy
  • Richard Stromback
  • Ron Cao
  • Sandro Salsano
  • Thor Björgolfsson
  • Veronica Colondam
  • Yana Peel
  • Zhang Yi-Chen

About us

Our growing membership of more than 1,400 members and alumni of 120 nationalities includes civic and business innovators, entrepreneurs, technology pioneers, educators, activists, artists, journalists, and more.

Aligned with the World Economic Forum’s mission, we seek to drive public-private co-operation in the global public interest. We are united by the belief that today’s pressing problems present an opportunity to build a better future across sectors and boundaries.

History

Klaus Schwab, Founder and Executive Chairman of the World Economic Forum, created the Forum of Young Global Leaders in 2004 to help the world meet increasingly complex and interdependent problems. His vision was to create a proactive multistakeholder community of the world’s next-generation leaders to inform and influence decision-making and mobilize transformation.

Through the Forum of Young Global Leaders, Klaus Schwab envisioned facilitating earnest dialogue and friendships across cultures to bridge divides, fostering fresh thinking and dynamic new ways of collaboration to shape a more positive, peaceful and prosperous society.

Annual Reports

AND THE ACTUAL GOAL OF THIS WHOLE OPERATION:

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

ORDER

We found a contractual clause between governments and Covid jabs manufacturers that may end the pandemic no later than this summer.

A question from Sky News, we know better because we can critically analyze their reports better than they do

We’ve just learned that AstraZeneca (and likely other vaccine manufacturers) can’t properly milk their new cash cow before the pandemic is over. Several of the biggest contracts closed so far between governments and vaccine manufacturers stipulate that profits won’t be paid before the pandemic is officially declared over.

AstraZeneca, which has promised not to profit from its Covid-19 vaccine “during the pandemic”, has the right to declare an end to the pandemic as soon as July next year, according to a document seen by the Financial Times.

An Oxford University press release confirms:
“A key element of Oxford’s partnership with AstraZeneca is the joint commitment to provide the vaccine on a not-for-profit basis for the duration of the pandemic across the world, and in perpetuity to low- and middle-income countries. “

Also, according to Sky News Australia, “AstraZeneca has committed that the vaccine will be made on a not-for-profit basis as long as COVID-19 is classified as a pandemic, and will remain so when sold to developing nations.
Should the disease recede and the vaccine become an annual defence against COVID-19 sold at a profit, Professor Gilbert, her close colleagues, the university, and a range of private and corporate investors – including Google’s parent company Alphabet – all stand to benefit.”

Note that AstraZeneca is a member of the World Economic Forum (think The Great Reset), same as Pfizer, Moderna and J&J, and Google is a shareholder, so they have amassed more support than a country can raise.

These claims are also supported by their main partners in AstraZeneca, Oxford Science Innovation, who says:
“In the interest of accelerating global vaccine development, Vaccitech assigned its rights to the vaccine candidate to Oxford University Innovation, to facilitate the licence of those rights to AstraZeneca for the development and manufacture of the vaccine. None of the parties will profit from vaccine sales during the pandemic.
Vaccitech is backed by leading investment institutions, including GV (formerly Google Ventures), Sequoia Capital China, Liontrust (formerly Neptune), Korea Investment Partners and Oxford Sciences Innovation.”

So Google is a Pharmafia giant who also controls the media and can censor any inconvenient report on its services and products

The problem is that the propaganda and the fear porn didn’t work as they hoped (nothing does when you’re as deranged as they are) and the governments are way behind the schedule with inoculations and other related affairs, hence the prolonged lockdowns in some parts of the world. If they open in summer, they will lose even more customers and they can’t use the emergency situation excuse to inject people with hazardous untested chemicals like these mRNA jabs.


This is what obliges Google and the Gang to ramp up censorship and propaganda.
So now Pharmafia insiders (lower level salesmen) inform us that the powers behind these covid jabs are pressuring governments to end the pandemic and start the payments. But that’s hardly achievable and politicians find themselves between a rock and a hard place.


We’ve said before that this state of emergency has no end in sight because it’s a necessary condition for injecting experimental garbage into the gullible masses. It was mostly true but we’ve already corrected that statement because this new revelation might just bring that end.


Some governments may be able to win a few extra-months, but it’s very likely that many will not have that power and will do whatever stunt necessary to please their Pharmafia overlords.

This is how you may explain the unexplainable recent plunge in case stats too.
As we showed before, they have a knob that can control the stats: the PCR test cycle threshold. The higher, the more positive results.
As the pandemic was scheduled to ease and the covid business to normalize after Biden/WEF’s hostile takeover of US Government, WHO ordered lowering the threshold precisely on Biden’s inauguration day and these are the immediate results. Which also proves how they pumped up the numbers before.

Financial Times goes into details:
<<While some companies said from the outset they can only develop the vaccine for profit, others, such as AstraZeneca and Johnson & Johnson, have agreed to provide doses on a cost basis for at least as long as the pandemic lasts.
The memorandum of understanding, seen by the FT, outlines the conditions of a deal signed in July between AstraZeneca and Fiocruz, a Brazilian public health institution, to produce at least 100m vaccine doses, worth more than $300m.The document states that for the purposes of the MoU and the “Definitive Agreements” the pandemic will be considered over on July 1, 2021. The so-called “Pandemic Period” could be extended but only if “AstraZeneca acting in good faith considers that the SARS-COV-2 pandemic is not over”, it says. 

Pascal Soriot, AstraZeneca’s chief executive, has previously said that a number of factors would influence the company’s assessment of when the pandemic is over, including the World Health Organisation’s own analysis, but has not been more specific. He has also declined to disclose a post-pandemic price point.
The WHO declared the current outbreak a pandemic in March. More than 1m have died and cases globally show no sign of tapering. Even optimistic forecasts predict an approved vaccine is unlikely to be widely available for public vaccination campaigns before the middle of next year.
AstraZeneca declined to answer specific questions regarding its definition of the “Pandemic Period” or the Fiocruz agreement.
“From the outset, AstraZeneca’s approach has been to treat the development of the vaccine as a response to a global public health emergency, not a commercial opportunity,” the company said in a statement. “We continue to operate in that public spirit and we will seek expert guidance, including from global organizations, as to when we can say that the pandemic is behind us.”
Oxford university also declined to respond to specific questions. “The terms of our agreement are confidential but uphold Oxford’s commitment to fair and equitable access to the vaccine for the duration of the pandemic should it prove to be effective in our global phase 3 clinical trials,” the university said.
Public health experts say many of the vaccine deals, including those involving AstraZeneca, are shrouded in secrecy, offering little room for scrutiny.

Manuel Martin, medical innovation and access policy adviser at Médecins Sans Frontières, said the terms of the Fiocruz MoU gave AstraZeneca “an unacceptable level of control over a vaccine developed through public funds”. “Relying on voluntary measures by pharmaceutical corporations to ensure access is a mistake with fatal consequences,” he said.
AstraZeneca has received large amounts of public money to develop its vaccine and secure forward orders, including at least $1bn from the US. Supply deals to date indicate that the vaccine, which requires two doses, is priced at about $3 to $4 per dose, lower than the prices disclosed or reported for other potential vaccines.
Ellen Hoen, director of Medicines Law & Policy, a non-profit campaigning for greater access to medicines, said more transparency was needed.
“Despite all the talk about the Covid-19 vaccine needing to be a ‘global public good’ by political leaders who spend billions on Covid-19 R&D, it seems that it is the drug companies that determine, in secret deals, who will get access to the vaccine and when,” she said.>>

If this trend keeps going on a bit longer, it very likely means that they are staying on the course and many countries will officially end the pandemic starting June/July.

And that will force them do more stupid stunts we can’t wait to expose.
They already are stumbling at all levels, from production and distribution to research. Last minute news from Financial Times inform that “Scientists are demanding to know why AstraZeneca’s paused trial of its Covid-19 vaccine is still on hold in the US while it has been restarted elsewhere, worrying it could damage public trust there. The trial was originally halted because a UK participant developed a serious inflammatory condition. In the US, it has been on hold for almost two weeks, while trials in other countries including the UK have restarted.
Ashish Jha, dean of the school of public health at Brown University, said: “Normally, companies wouldn’t give out information in the middle of a trial, but this is an exceptional case and we need to have radical transparency. Otherwise, there is a risk the public will lose confidence in the whole process.”
AstraZeneca is telling participants in resumed trials that the “unexplained neurological symptoms” were either unlikely to be associated with the vaccine or that there was “insufficient evidence” to say whether they were or were not associated, and so independent reviewers had recommended that vaccinations continue. Clinical trials do not usually publish data before hitting pre-determined milestones.”

LAST MINUTE UPDATE: This came in hours after we published this. Ah, well…

Source

As a side note: watch the video from the above source and everything featuring Fauci this year and tell me he didn’t have better energy and mood during Trump’s mandate. I blame that on the fact that Trump was the best pro-vaccine campaigner they had and now that he’s gone from the screens, they’re in shambles. But that’s just me.

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

CLICK

Anyone who has any remnants of humanity inside has asked this question.
One answer is no secret to anyone: poor countries. But that’s not always the case, and this is where it gets darker.

The ethics of deliberately infecting volunteers with Covid-19 to test vaccines are a complicated issue only if you value something more than human life, which is actually common, but not the case here. So I’m not making a secret that everything I know and feel made me conclude long ago that most medical tests that occurred on humans were abominations permitted only by a massive lack of empathy / humanity and usually driven by financial incentives. Everything that followed after that was but a confirmation. Point being: I’m long over that debate, there is absolutely no essential difference between the Bayer labs in Auschwitz and the Pfizer Labs in London (or wherever).
And I know a large slice of society, if not the majority, still has major moral, rational and ethical concerns about this, luckily, and it can’t be that easy to find these kids without leveraging finances on poorest people, and even then…
Proof to that, Moderna has just publicly admitted it has big difficulties in finding 3000 kids, and I hope they never sort it out. So much so that They appealed to all their presstitutes to make a roll call for them.
Funnily, only days after Moderna’s appeal, CBS lies that they were having “more than enough volunteers, so basically these two messages are now still being propagated simultaneously:
“Last fall, the Clinical Research Institute sent out letters to pediatricians’ offices and posted on Facebook looking for volunteers in the 12-year-old to 17-year-old age group. Though the study will run for 13 months, the researchers have more than enough volunteers for this trial.” – CBS


Since you can’t expect anyone involved to be honest and open about it, based on their past and present performance, and they’re not, where to find the answer? There’s about 50 vaccines being trialed right now, some are moving into babies as young as 6 months old, this IS urgent!
If you need another reminder why, go to Forbes and read “The Hideous Truths of Testing Vaccines on Humans”, or watch the videos below.

To get back to the headline question, remember wherever demand forms, a market forms and an industry develops.

A 2017 report in Gizmodo, entitled “How a Company You’ve Never Heard of Sends you Letters about your Medical Condition,” quotes a company called Acurian saying it purchases “public information” and “lifestyle data” to find candidates.

It does not access your doctor’s medical file. Here are some excerpts:

In the summer of 2015, Alexandra Franco got a letter in the mail from a company she had never heard of called AcurianHealth. The letter, addressed to Franco personally, invited her to participate in a study of people with psoriasis, a condition that causes dry, itchy patches on the skin.

Franco did not have psoriasis. But the year before, she remembered, she had searched for information about it online, when a friend was dealing with the condition. And a few months prior to getting the letter, she had also turned to the internet with a question about a skin fungus. It was the sort of browsing anyone might do, on the assumption it was private and anonymous.

Now there was a letter, with her name and home address on it, targeting her as a potential skin-disease patient. Acurian is in the business of recruiting people to take part in clinical trials for drug companies. How had it identified her? She had done nothing that would publicly associate her with having a skin condition.

When she Googled the company, she found lots of people who shared her bewilderment, complaining that they had been contacted by Acurian about their various medical conditions. Particularly troubling was a parent who said her young son had received a letter from Acurian accurately identifying his medical condition and soliciting him for a drug trial—the first piece of mail he’d had addressed to him besides birthday cards from family members.

Acurian has attributed its uncanny insights to powerful guesswork, based on sophisticated analysis of public information and “lifestyle data” purchased from data brokers. What may appear intrusive, by the company’s account, is merely testimony to the power of patterns revealed by big data.

“We are now at a point where, based on your credit-card history, and whether you drive an American automobile and several other lifestyle factors, we can get a very, very close bead on whether or not you have the disease state we’re looking at,” Acurian’s senior vice president of operations told the Wall Street Journal in 2013.

Yet there’s some medical information that Acurian doesn’t have to guess about: The company pays Walgreens, which uses a privacy exemption for research, to send recruitment letters to its pharmacy customers on Acurian’s behalf, based on the medications they’re using. Under this arrangement, Acurian notes that it doesn’t access the medical information directly; the customers’ identities remain private until they respond to the invitations.

And that is not the entire story. An investigation by the Special Projects Desk has found that Acurian may also be pursuing people’s medical information more directly, using the services of a startup that advertises its ability to unmask anonymous website visitors. This could allow it harvest the identities of people seeking information about particular conditions online, before they’ve consented to anything.

A letter sent out to a Walgreens customer in Connecticut on Acurian’s behalf. It invited her to visit a generic sounding website for people with pulmonary disease. At the time, she had a prescription from Walgreens for asthma.
A letter sent out to a Walgreens customer in Connecticut on Acurian’s behalf. It invited her to visit a generic sounding website for people with pulmonary disease. At the time, she had a prescription from Walgreens for asthma.

If you’re suddenly thinking back on all of the things you’ve browsed for online in your life and feeling horrified, you’re not alone.

AcurianHealth has created dozens and dozens of generic sounding websites for the trials they’re recruiting for: www.trialforCOPD.com, www.studiesforyourarthritis.com, and www.kidsdepressionstudy.com are a few examples of the many websites they own. The sites all feature stock images of people in distress, sometimes include AcurianHealth’s logo, and include promises of up to $1,000 for participating, depending on the study.

An example of one of the Acurian sites, www.sleepapneastudies.com
An example of one of the Acurian sites, http://www.sleepapneastudies.com

Out of view, some of these sites include something else: code from a company called NaviStone—which bills itself as a specialist in matching “anonymous website visitors to postal names and addresses.” So if a person is curious about one of those letters from Walgreens, or follows one of Acurian’s online ads, and visits one of Acurian’s generic disease-specific sites, their identity could be discovered and associated with the relevant condition.

NaviStone says it can send personalized mail to anonymous website visitors with a day or two of their visit.
NaviStone says it can send personalized mail to anonymous website visitors with a day or two of their visit.

This tracking function undermines what’s supposedly a formal separation between Walgreens customer data and Acurian’s recruitment. If Walgreens sends out a bunch of letters to customers taking certain medications, and those customers then visit the generic website controlled by Acurian provided in the letter, Acurian can infer its wave of new visitors are taking those medications—and, if NaviStone delivers on its promise to identify visitors, Acurian can see who they are.

Walgreens gives itself permission to use customers’ health information for “research” purposes, which would include clinical trials, in its privacy policy. It’s been working with Acurian since at least 2013, and in 2015, Walgreens announced it was “leveraging” its 100 million customer database to recruit patients directly for five major drug companies.

When asked about its partnership with Acurian, Walgreens spokesperson Scott Goldberg pointed me to a Walgreens FAQ page about clinical trials. It states that Walgreens doesn’t share health information with third parties without permission, but that a third party may “receive your information if you contact the web-site and/or toll-free number in the letter to seek more information about the clinical trial.”

The question is whether users will know that one of Acurian’s websites has received their information—even if they haven’t necessarily agreed to submit it. NaviStone, an Ohio-based business spun out from the marketing firm CohereOne last year, claims to be able to identify between 60 and 70 percent of anonymous visitors to the websites that use its services.

When we contacted the firm last month to ask how it does this, Allen Abbott, NaviStone’s chief operating officer, said by phone that talking about how its technology works is “problematic.”

“A lot of our competitors would love to know how we made it work,” Abbott said. “We have an advantage that we would be silly to reveal.”

We asked whether the company had thought about the privacy implications involved in identifying people visiting a website for sensitive reasons, and whether there were certain customers the company wouldn’t work with.

“Our business is almost entirely e-commerce, helping retailers sell to their customers,” he said. “There was one site that came into our radar that was adult-related material that we decided not to pursue.”

We then described what Acurian does.

“We don’t work with anyone like that,” he said.

We explained that the call was because we’d found NaviStone’s code on AcurianHealth sites.

“It’s possible,” he then said. “We have a lot of customers.”

But Abbott insisted that NaviStone had found a “privacy compliant way” to identify anonymous website visitors—again saying he couldn’t describe it because it was a proprietary technology.

When we analyzed the NaviStone code on Acurian’s sites, we found one way that NaviStone’s technology works: It collects information as soon as it is entered into the text boxes on forms, before the person actually agrees to submit it. When we typed a test email address in the “Join Us” page on Acurian’s site, it was immediately captured and sent to the company’s servers, even if we later chose to close the page without hitting the “Send” button on the form.

In fact, the information was collected before we got to the part of the form that said, “Your privacy is important to us. By selecting this box, you agree to our Privacy Policy and Terms of Use, and agree that we contact you by phone using automated technology or other means using the information you provided above regarding research studies.” – Gizmodo

But that was long ago in terms of technological progress.

However, the methods persist in 2021, an US local tv station reveals that exactly the same scenario occurred in Cincinnati, with the same company at the center of the scandal. Here’s what they’ve just published:

<<Nancy Brashear opened her mail at her Campbell County, Kentucky, home to find an offer to earn money if she joined a COVID-19 vaccine test.

“I got a letter from Acurian Health looking for volunteers for a COVID vaccine study, promising up to $1,200 if you participate or volunteer,” she said.

It looked promising, but Brashear said she started to wonder how they knew she would be a good candidate for a vaccine trial. Did someone with a hospital, doctor’s office or pharmacy sell her health information?

“How do they get my information?” Brashear said. “That really bothers me.”

We called and emailed Acurian Health to find out how they got her name, but did not hear back.

Company is a data firm, not a testing center

Acurian is a legitimate company, according to the Better Business Bureau, and states it is a data firm that connects people with medical trials.

It does not do the actual testing.

“Where did they get this information?” Brashear asked. “HIPPA laws make your history private.”

The Protect Patients Blog has an in-depth article of how Acurian learns if you are a good candidate for a medical trial.

But Brashear found that if you decide to apply, you will then have to give much more medical information to see if you actually qualify. There is no guarantee you will be accepted for a trial, and no guarantee you will earn anything close to $1,200.

“If you go on the website, you have to go through steps to do that, so they are looking for information,” she said.

In the end, she said thanks, but no thanks, wondering if she would be sharing too much medical and personal information with a company she knew little about.

If you want to sign up for a COVID-19 trial, the NIH, National Institutes of Health, is a government site that lists all the authorized vaccine trials going on.

Many of them will pay money, typically a few hundred dollars. However, they may not cover treatment for any side effects.

So be sure to read all the fine print, so you don’t waste your money.>> – WCPO

Also let’s recall our October 2020 article: CONTACT-TRACING DATA HARVESTED FROM PUBS AND RESTAURANTS BEING SOLD ON

I don’t know about you, but what I’ve learned so far is:

  1. Pharmafia still does whatever it takes to get what it wants, even primitive hacking as described above.
  2. These methods are still too primitive for the biggest actors in Pharmafia who are well into artificial intelligence and cutting edge technologies

So what are these top cats doing then?
I’ve consulted some of my insider sources, put it together with my own digs and, as per usual with these creatures, the most obvious suspicions are also true.

If you’ve been around, you should be aware by now of three tendencies that are one, actually:


1. Big Tech and Big Pharma are merging

2. Healthcare and Big Data are merging

They’re not only after health data, don’t worry, all data helps a sale


3. The above are merging with media and the elected government

What are Google and Facebook selling, in fact?
Your data.
What for?
So you can be best manipulated by different interests, with custom-design ads and policies.

Oracle’s National Electronic Health Records Cloud dates back to the beginnings of the COVID-19 pandemic. In March 2020, a couple of weeks after letting President Trump use his estate near Palm Springs for a $100,000-a-plate golfing fundraiser, Ellison placed a call to the White House. According to a Forbes cover story on Ellison, he “asked Trump if a clearinghouse existed for real-time data about treatment efficacies and outcomes.”

Within a week after the president asked “how much?” and Ellison said, “for free,” the tech titan had brought together a team of Oracle engineers “to build a database and website registering coronavirus cases” and work with the National Institutes of Health (NIH), U.S. Food and Drug Administration (FDA) and other agencies.

The first public acknowledgment of Oracle’s progress came on July 3, 2020, when the NIH’s National Institute for Allergies and Infectious Diseases (NIAID), overseen by Dr. Anthony Fauci, launched the COVID-19 Prevention Trials Network (COVPN), aimed at enrolling thousands of volunteers in large-scale trials for a variety of investigational vaccines and monoclonal antibodies.

Fauci achieved this by merging four existing networks, all researching HIV/AIDS, something they would continue to do. “The network is expected to operate more than 100 clinical trial sites across the United States and internationally,” according to the NIAID press release which also stated “the COVPN website features a customized data collection platform, which Oracle (Redwood Shores, CA) built and donated, to securely identify potential trial participants.”

In August, a paper published by the Johns Hopkins Center for Health Security proposed that the “passive reporting” systems managed by the CDC and FDA ought to be revamped to forge “an active safety surveillance system directed by the CDC that monitors all [COVID-19] vaccine recipients — perhaps by short message service or other electronic mechanisms.”

By September, Operation Warp Speed director Moncef Slaoui was telling the periodical Science: “We’re working super hard on a very active pharmacovigilance system, to make sure that when the vaccines are introduced that we’ll absolutely continue to assess their safety.

In October, Slaoui told the New York Times: “The FDA is proposing that at least 50% of the individuals in the study population have at least two months of follow-up on safety before the vaccines are approved. And secondly, we are working really hard with the FDA and the CDC to make sure we have a very active pharmacovigilance surveillance system to allow us to continue to assess the safety of the vaccines as they are being used in the high risk population.”

And the Wall Street Journal reported in a profile of Slaoui that he’d said “tracking systems will have to be ‘incredibly precise’ to ensure that patients each get two doses of the same vaccine and to monitor them for adverse health effects. Operation Warp Speed has selected the medical-distribution company McKesson and cloud operators Google and Oracle to collect and track vaccine data.”

“This marked the first time that Oracle’s role was revealed to have expanded to include Operation Warp Speed.

Oracle Chairman Ellison’s lucrative government arrangements trace back to the data software pioneer’s origins. In 1975, then in his early thirties, Ellison worked on a project for the electronics company Ampex in the Bay area, building a large terabit memory system for the CIA.

Ellison revealed in 2014 that the CIA not only became his firm’s first customer for a “relational database” two years later, but that he adopted the name from a CIA project called Oracle. “The news about our hot little database traveled around the intelligence community pretty quickly,” Ellison was quoted as saying in the 2003 book, “Softwar.” “In a little over six months’ time we had won several deals — the CIA, Navy Intelligence, Air Force Intelligence and the NSA [National Security Agency].” – Technocracy News

From this industry’s perspective, you enrolling KFC’s Fidelity Club or a vaccine trial is the same technical challenge. One that they keep winning lately.

Remember when the sister of YouTube’s CEO and former wife of Google’s founder Sergey Brin, still a business partner, set up a DNA testing company and then sold the data for $300 million to pharma giant genocidal company GSK?

Source

Oh, it’s all about science and health, sure, but what science and whose health?
Because anyone who’s been in touch with reality lately knows a few more things:
– Pharmafia invests much more in the science of marketing than in medical sciences
– That data often comes from marketing experts such as Google and Facebook
– Marketing and propaganda sell and persuade much more efficiently than science when it comes to large masses of people. Or all of them. It’s way easier and cheaper to manipulate the low-IQ majority than to heal it. Especially with these tools Big Tech brought aboard.

What keeps them from finding and manipulating the feeble minds they need for these new atrocities they call “vaccines human trials” and, in fact, are neither vaccines or human, just deranged human abuse experimentation?
From what I’ve found out so far, the answer is: nothing.
Everything you type on your computer is collected and can be processed to obtain a method to target and determine people to subject their kids to this. It’s probably much easier to sell than some of their other products. This is already a massive industry that often breaks ethical and even legal barriers.

Source: The Guardian


What, you’ve never thought Cambridge Analytica can work for Pharmafia too?
Well then remember we’ve passed that, Facebook, Amazon, Microsoft (recording my typing right now) and Alphabet (Google) are not distinguishable from Pharmafia at all. The concept that they wouldn’t take any and all advantage of their new powers and domination is comically delirious.
Moderna must be running out of money or love if Google won’t send them a mere 3000 kids, no joke.

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Now THESE are words I never imagined I would ever write.
And these are the times…

So I am here to praise rapper Pitbull.
Not only for wokeness and having the balls to drop truth bombs, not only for being informed…

But mainly because he struck a major chord, with his plead for freedom.
You see, I am too born and raised in the communist gulag, my Romania and his Cuba were very much alike back then, 30+ years ago…
So after seeing this, I REALLY REALLY WANT TO GIVE A HUG TO THIS MAN, you know, make it physical.
I also feel bad, I lumped him with the Cardi B’s of this world, and that’s his fault for making money with all these sell outs. But then again, if he keeps dropping truth from that height, it’s all better than good.
So watch this and please please spread it around, it has the potential to drive more awareness in the masses! Let’s end this shit!

PS: The part where he says Fidel Castro must be dead jealous on Klaus Schwab… 💥💥💥

Watch the whole show and tell them Silview sent you over, for the woke part (it’s over 2h long) 😉

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

Imagine Jewish company Ben&Jerry went like: “People who don’t eat our ice-cream are anti-food and anti-semitic”. That’s exactly what Pharmafia does, amplified by their presstitutes and mass-mediots.
But facts don’t care about fake Semites impersonating a victim while caring out a worldwide genocide.

Btw. Times of Israel deleted its most popular post of 2012, last one in my collage, but not quite every trace of it.

Source
Source
Dershowitz: Jews should never hide or excuse their disproportionate control over society

COVID-19 Vaccines Have Jewish Links

“AS A PROUD JEW, I WANT AMERICA TO KNOW ABOUT OUR ACCOMPLISHMENT. YES, WE CONTROL HOLLYWOOD”

Who are the Jews behind the coronavirus vaccines?

World’s 50 most influential Jews – The Jerusalem Post’s first annual list of those who are shaping the future.

Argentine TV host fired over ‘Jews control the media’ tweet

Microsoft and Google invest in medical research platform

PULITZER-WORTHY! KLAUS SCHWAB’S NAZI ROOTS FINALLY TRACED!

Want more? There’s tons out there.

BONUS: 2021: Companies who gassed Jews and those who jab them hold hands, throw money at BLM & Climate-19

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them