It’s never been about clean new fuels and the environment.
It’s about new data streams and control.
Think “Pegasus”.

Most laughed and forgot this next minute, I saw it as a prime example of how the manufacturers, the government or any decent hacker can troll you in your computerized car

Don’t be a crash test dummy.

If data is the new oil is the new gold…

These new computerized cars are new oil pumps.

The drivers are the data wells.

SHARE THIS VIDEO

The first news segment in my video edit is what prompted this report. It’s been released by Israeli tv only a few days ago and it’s nothing but an ad for the Israeli hacking industry.

Many drivers spend hours every day in super-sized smartphones on wheels, mobile Matrix pods, and everything that goes for smartphones goes for computerized cars, in terms of hackability.

Basically, these new cars belong to the best hacker around. Which is, usually, some military/intelligence service or some private basement dweller.

Think Pegasus.

WikiLeaks CIA files: Spy agency looked at ways to hack and control cars to carry out assassinations

The agency allegedly also used tools to hack smartphones and turn smart TVs into covert microphones

The Independent, 07 March 2017

WikiLeaks describes Vault 7 as 'the largest intelligence publication in history'
WikiLeaks describes Vault 7 as ‘the largest intelligence publication in history’ (REUTERS/Yuri Gripas)

WikiLeaks has alleged that the CIA looked into vehicle interference methods that could potentially enable it to assassinate people without detection.

According to the whistle-blowing organisation, the CIA explored the tactic in October 2014.

It hasn’t included any more details about the alleged practice.

WikiLeaks included the claim in its release announcing ‘Vault 7’, a huge batch of documents, which Julian Assange claims to account for the CIA’s “entire hacking capacity”.

“As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks,” reads a passage in the release.

“The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.”

The CIA has also been accused of using malware and hacking tools to turn TVs into covert microphones and remotely break into smartphones.

The latter, according to WikiLeaks, allowed it to bypass encryption on a number of popular messaging apps, including WhatsApp.

WikiLeaks describes Vault 7 as “the largest intelligence publication in history” and says that the initial batch of 8,761 files is just the first in a series of releases.

What does your car know about you? We hacked a Chevy to find out.

Our privacy experiment found that automakers collect data through hundreds of sensors and an always-on Internet connection. Driving surveillance is becoming hard to avoid.

Washington Post, Dec. 17, 2019

Cars now run on data. We hacked one to find out what it knows about you.

Washington Post tech columnist Geoffrey A. Fowler cracked open a Chevrolet to find an always-on Internet connection and data from his smartphone. (Jonathan Baran/The Washington Post)

Behind the wheel, it’s nothing but you, the open road — and your car quietly recording your every move.

On a recent drive, a 2017 Chevrolet collected my precise location. It stored my phone’s ID and the people I called. It judged my acceleration and braking style, beaming back reports to its maker General Motors over an always-on Internet connection.

Cars have become the most sophisticated computers many of us own, filled with hundreds of sensors. Even older models know an awful lot about you. Many copy over personal data as soon as you plug in a smartphone.

But for the thousands you spend to buy a car, the data it produces doesn’t belong to you. My Chevy’s dashboard didn’t say what the car was recording. It wasn’t in the owner’s manual. There was no way to download it.

To glimpse my car data, I had to hack my way in.

We’re at a turning point for driving surveillance: In the 2020 model year, most new cars sold in the United States will come with built-in Internet connections, including 100 percent of Fords, GMs and BMWs and all but one model Toyota and Volkswagen. (This independent cellular service is often included free or sold as an add-on.) Cars are becoming smartphones on wheels, sending and receiving data from apps, insurance firms and pretty much wherever their makers want. Some brands even reserve the right to use the data to track you down if you don’t pay your bills.

When I buy a car, I assume the data I produce is owned by me — or at least is controlled by me. Many automakers do not. They act like how and where we drive, also known as telematics, isn’t personal information.

Cars now run on the new oil: your data. It is fundamental to a future of transportation where vehicles drive themselves and we hop into whatever one is going our way. Data isn’t the enemy. Connected cars already do good things like improve safety and send you service alerts that are much more helpful than a check-engine light in the dash.

But we’ve been down this fraught road before with smart speakers, smart TVs, smartphones and all the other smart things we now realize are playing fast and loose with our personal lives. Once information about our lives gets shared, sold or stolen, we lose control.

There are no federal laws regulating what carmakers can collect or do with our driving data. And carmakers lag in taking steps to protect us and draw lines in the sand. Most hide what they’re collecting and sharing behind privacy policies written in the kind of language only a lawyer’s mother could love.

Car data has a secret life. To find out what a car knows about me, I borrowed some techniques from crime scene investigators.

What your car knows

Jim Mason hacks into cars for a living, but usually just to better understand crashes and thefts. The Caltech-trained engineer works in Oakland, Calif., for a firm called ARCCA that helps reconstruct accidents. He agreed to help conduct a forensic analysis of my privacy.

I chose a Chevrolet as our test subject because its maker GM has had the longest of any automaker to figure out data transparency. It began connecting cars with its OnStar service in 1996, initially to summon emergency assistance. Today GM has more than 11 million 4G LTE data-equipped vehicles on the road, including free basic service and extras you pay for. I found a volunteer, Doug, who let us peer inside his two-year-old Chevy Volt.

I met Mason at an empty warehouse, where he began by explaining one important bit of car anatomy. Modern vehicles don’t just have one computer. There are multiple, interconnected brains that can generate up to 25 gigabytes of data per hour from sensors all over the car. Even with Mason’s gear, we could only access some of these systems.

This kind of hacking isn’t a security risk for most of us — it requires hours of physical access to a vehicle. Mason brought a laptop, special software, a box of circuit boards, and dozens of sockets and screwdrivers.

We focused on the computer with the most accessible data: the infotainment system. You might think of it as the car’s touch-screen audio controls, yet many systems interact with it, from navigation to a synced-up smartphone. The only problem? This computer is buried beneath the dashboard.

After an hour of prying and unscrewing, our Chevy’s interior looked like it had been lobotomized. But Mason had extracted the infotainment computer, about the size of a small lunchbox. He clipped it into a circuit board, which fed into his laptop. The data didn’t copy over in our first few attempts. “There is a lot of trial and error,” said Mason.

(Don’t try this at home. Seriously — we had to take the car into a repair shop to get the infotainment computer reset.)

It was worth the trouble when Mason showed me my data. There on a map was the precise location where I’d driven to take apart the Chevy. There were my other destinations, like the hardware store I’d stopped at to buy some tape.

Among the trove of data points were unique identifiers for my and Doug’s phones, and a detailed log of phone calls from the previous week. There was a long list of contacts, right down to people’s address, emails and even photos.

For a broader view, Mason also extracted the data from a Chevrolet infotainment computer that I bought used on eBay for $375. It contained enough data to reconstruct the Upstate New York travels and relationships of a total stranger. We know he or she frequently called someone listed as “Sweetie,” whose photo we also have. We could see the exact Gulf station where they bought gas, the restaurant where they ate (called Taste China) and the unique identifiers for their Samsung Galaxy Note phones.

Infotainment systems can collect even more. Mason has hacked into Fords that record locations once every few minutes, even when you don’t use the navigation system. He’s seen German cars with 300-gigabyte hard drives — five times as much as a basic iPhone 11. The Tesla Model 3 can collect video snippets from the car’s many cameras. Coming next: face data, used to personalize the vehicle and track driver attention.

In our Chevy, we probably glimpsed just a fraction of what GM knows. We didn’t see what was uploaded to GM’s computers, because we couldn’t access the live OnStar cellular connection. (Researchers have done those kinds of hacks before to prove connected vehicles can be remotely controlled.)

My volunteer car owner Doug asked GM to see the data it collected and shared. The automaker just pointed us to an obtuse privacy policy. Doug also (twice) sent GM a formal request under a 2003 California data law to ask who the company shared his information with. He got no reply.

GM spokesman David Caldwell declined to offer specifics on Doug’s Chevy but said the data GM collects generally falls into three categories: vehicle location, vehicle performance and driver behavior. “Much of this data is highly technical, not linkable to individuals and doesn’t leave the vehicle itself,” he said.

The company, he said, collects real-time data to monitor vehicle performance to improve safety and to help design future products and services.

But there were clues to what more GM knows on its website and app. It offers a Smart Driver score — a measure of good driving — based on how hard you brake and turn and how often you drive late at night. They’ll share that with insurance companies, if you want. With paid OnStar service, I could, on demand, locate the car’s exact location. It also offers in-vehicle WiFi and remote key access for Amazon package deliveries. An OnStar Marketplace connects the vehicle directly with third-party apps for Domino’s, IHOP, Shell and others.

The OnStar privacy policy, possibly only ever read by yours truly, grants the company rights to a broad set of personal and driving data without much detail on when and how often it might collect it. It says: “We may keep the information we collect for as long as necessary” to operate, conduct research or satisfy GM’s contractual obligations. Translation: pretty much forever.

It’s likely GM and other automakers keep just a slice of the data cars generate. But think of that as a temporary phenomenon. Coming 5G cellular networks promise to link cars to the Internet with ultra-fast, ultra-high-capacity connections. As wireless connections get cheaper and data becomes more valuable, anything the car knows about you is fair game.

Protecting yourself

GM’s view, echoed by many other automakers, is that we gave them permission for all of this. “Nothing happens without customer consent,” said GM’s Caldwell.

When my volunteer Doug bought his Chevy, he didn’t even realize OnStar basic service came standard. (I don’t blame him — who really knows what all they’re initialing on a car purchase contract?) There is no button or menu inside the Chevy to shut off OnStar or other data collection, though GM says it has added one to newer vehicles. Customers can press the console OnStar button and ask a representative to remotely disconnect.

What’s the worry? From conversations with industry insiders, I know many automakers haven’t totally figured out what to do with the growing amounts of driving data we generate. But that’s hardly stopping them from collecting it.

Five years ago, 20 automakers signed on to volunteer privacy standards, pledging to “provide customers with clear, meaningful information about the types of information collected and how it is used,” as well as “ways for customers to manage their data.” But when I called eight of the largest automakers, not even one offered a dashboard for customers to look at, download and control their data.

Automakers haven’t had a data reckoning yet, but they’re due for one. GM ran an experiment in which it tracked the radio music tastes of 90,000 volunteer drivers to look for patterns with where they traveled. According to the Detroit Free Press, GM told marketers that the data might help them persuade a country music fan who normally stopped at Tim Horton’s to go to McDonald’s instead.

GM would not tell me exactly what data it collected for that program but said “personal information was not involved” because it was anonymized data. (Privacy advocates have warned that location data is personal because it can be re-identified with individuals because we follow such unique patterns.)

GM’s privacy policy, which the company says it will update before the end of 2019, says it may “use anonymized information or share it with third parties for any legitimate business purpose.” Such as whom? “The details of those third-party relationships are confidential,” said Caldwell.

There are more questions. GM’s privacy policy says it will comply with legal data demands. How often does it share our data with the government? GM doesn’t offer a transparency report like tech companies do.

Automakers say they put data security first. But I suspect they’re just not used to customers demanding transparency. They also probably want to have sole control over the data, given that the industry’s existential threats — self-driving and ride-hailing technologies — are built on it.

But not opening up brings problems, too. Automakers are battling with repair shops in Massachusetts about a proposal that would require car companies to grant owners — and mechanics — access to telematics data. The Auto Care Association says locking out independent shops could give consumers fewer choices and make us end up paying more for service. The automakers say it’s a security and privacy risk.

In 2020, the California Consumer Privacy Act will require any company that collects personal data about the state’s residents to provide access to the data and give people the ability to opt out of its sharing. GM said it would comply with the law but didn’t say how.

Are any carmakers better? Among the privacy policies I read, Toyota’s stood out for drawing a few clear lines in the sand about data sharing. It says it won’t share “personal information” with data resellers, social networks or ad networks — but still carves out the right to share what it calls “vehicle data” with business partners.

Until automakers put even a fraction of the effort they put into TV commercials into giving us control over our data, I’d be wary about using in-vehicle apps or signing up for additional data services. At least smartphone apps like Google Maps let you turn off and delete location history.

And Mason’s hack brought home a scary reality: Simply plugging a smartphone into a car could put your data at risk. If you’re selling your car or returning a lease or rental, take the time to delete the data saved on its infotainment system. An app called Privacy4Cars offers model-by-model directions. Mason gives out gifts of car-lighter USB plugs, which let you charge a phone without connecting it to the car computer. (You can buy inexpensive ones online.)

If you’re buying a new vehicle, tell the dealer you want to know about connected services — and how to turn them off. Few offer an Internet “kill switch,” but they may at least allow you turn off location tracking.

Or, for now at least, you can just buy an old car. Mason, for one, drives a conspicuously non-connected 1992 Toyota.

The ‘Pegasus’ creators, Israeli Military trains and ‘privatizes’ some of the world’s best hackers

the perfect tool for the perfect murder

These being said, we’re dealing here with the perfect tool for the perfect murder.
Speaking of which, we will be commemorating soon 10 years since the death of Michael Hastings, in 2013. #NeverForget

Here’s DARPA talking about hacking cars just months before Michael Hasting’s suspicious death:

SHARE VIDEO

Nowadays, with the Pentagon, the WEF and the Bilderbergers freaking out about the demise of their low-IQ fake-news media and the advent of independent journalism, this report alone is enough to get us targeted by a bunch of agencies that commonly use Pegasus and likely more advanced technology we haven’t even found out about.


You can’t hope much from a truther who drives computerized cars. Since 2013.

Why voting technology has to stay primitive is why cars have to stay primitive.
these cars are never yours and you’re never safe in them

FOLLOW UPS

JAN. 2023: GOOGLE IS READY TO TAKE FULL CONTROL OVER YOUR CAR

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

! Articles can always be subject of later editing as a way of perfecting them

I feel this is not getting the deserved attention and I will rectify the situation.
Because, traditionally, drills precede a false flag, which is organized by the same people who did the drill.

The official press release of the event, basically, published yesterday by Reuters and sent out to every mainstream news outlet out there:

EXCLUSIVE IMF, 10 countries simulate cyberattack on global financial system

By Steven Scheer

Israel financial-cyber officials take part in a simulation of a major cyber attack on the global financial system with 9 other countries, the World Bank and IMF at the Finance Ministry in Jerusalem December 9, 2021 REUTERS/ Ammar Awad

<<Israel financial-cyber officials take part in a simulation of a major cyber attack on the global financial system with 9 other countries, the World Bank and IMF at the Finance Ministry in Jerusalem.

JERUSALEM, Dec 9 (Reuters) – Israel on Thursday led a 10-country simulation of a major cyberattack on the global financial system in an attempt to increase cooperation that could help to minimise any potential damage to financial markets and banks.

Israel financial-cyber officials take part in a simulation of a major cyber attack on the global financial system with 9 other countries, the World Bank and IMF at the Finance Ministry in Jerusalem December 9, 2021 REUTERS/ Ammar Awad

The simulated “war game”, as Israel’s Finance Ministry called it and planned over the past year, evolved over 10 days, with sensitive data emerging on the Dark Web. The simulation also used fake news reports that in the scenario caused chaos in global markets and a run on banks.

The simulation — likely caused by what officials called “sophisticated” players — featured several types of attacks that impacted global foreign exchange and bond markets, liquidity, integrity of data and transactions between importers and exporters.

“These events are creating havoc in the financial markets,” said a narrator of a film shown to the participants as part of the simulation and seen by Reuters.

Israeli government officials said that such threats are possible in the wake of the many high-profile cyberattacks on large companies, and that the only way to contain any damage is through global cooperation since current cyber security is not always strong enough.

“Attackers are 10 steps ahead of the defender,” Micha Weis, financial cyber manager at Israel’s Finance Ministry, told Reuters.

Participants in the initiative, called “Collective Strength”, included treasury officials from Israel, the United States, the United Kingdom, United Arab Emirates, Austria, Switzerland, Germany, Italy, the Netherlands and Thailand, as well as representatives from the International Monetary Fund, World Bank and Bank of International Settlements.

The narrator of the film in the simulation said governments were under pressure to clarify the impact of the attack, which was paralysing the global financial system.

“The banks are appealing for emergency liquidity assistance in a multitude of currencies to put a halt to the chaos as counterparties withdraw their funds and limit access to liquidity, leaving the banks in disarray and ruin,” the narrator said.

The participants discussed multilateral policies to respond to the crisis, including a coordinated bank holiday, debt repayment grace periods, SWAP/REPO agreements and coordinated delinking from major currencies.

Rahav Shalom-Revivo, head of Israel’s financial cyber engagements, said international collaboration between finance ministries and international organizations “is key for the resilience of the financial eco-system.”

The simulation was originally scheduled to take place at the Dubai World Expo but it was moved to Jerusalem due to the Omicron variant of COVID-19, with officials participating over video conference.>>

Now please tell me which countries spearheaded restrictions and the Great Reset the most. Australia and Canada belong to the British Crown and need to be assimilated with UK.

And this is the view from Israel, as per Times of Israel:

Israel leads 10-country simulation of major cyberattack on world markets

10-day drill led by Finance Ministry aims to boost international cooperation against hacker threat to global financial systems

By TOI STAFF9 December 2021, 11:02 pm  

An illustrative image of computer popup box screen warning of a system being hacked; hackers, cybersecurity attack. (solarseven; iStock by Getty Images)

Israel led a 10-country, 10-day-long simulation of a major cyberattack on the world’s financial system by “sophisticated” players, with the goal of minimizing the damage to banks and financial markets, the Finance Ministry said on Thursday.

The Finance Ministry led the scenario with help from the Foreign Ministry, and said the “war game” was the first of its kind.

The exercise simulated several scenarios, including sensitive data surfacing on the dark web alongside fake news, leading to global financial chaos.

Participants included representatives from the US, UK, United Arab Emirates, Germany, Italy, Austria, Switzerland, the Netherlands, Thailand, the International Monetary Fund and the World Bank.

The Finance Ministry’s chief economist, Shira Greenberg, headed the Israeli team. The exercise was “further evidence of Israel’s global leadership” in the field of financial cyber defense, she said.Get The Times of Israel’s Daily Editionby email and never miss our top storiesNewsletter email addressGET ITBy signing up, you agree to the terms

“The unique and groundbreaking exercise held today showed the importance of coordinated global action by governments together with central banks in the face of financial cyber threats,” Greenberg said.

The simulation “featured several types of attacks that impacted global foreign exchange and bond markets, liquidity, integrity of data and transactions between importers and exporters,” Reuters reported.

Israeli officials said international cooperation was the only way to counter the threat of major cyberattacks.

“Attackers are 10 steps ahead of the defender,” said Micha Weis, financial cyber manager at the Finance Ministry.

In October, the National Cyber Directorate issued a general warning to Israeli businesses to be aware of potential cyberattacks, as the country faced an uptick in hacking attempts.Prime Minister Naftali Bennett speaks at the annual Cyber Week, at Tel Aviv University, on July 21, 2021. (Miriam Alster/FLASH90)

The warning came after an Israeli hospital faced a major ransomware cyberattack that crippled systems, and from which it could take several months to recover.

On Wednesday, Israel’s National Insurance Institute said that its website had been hacked, causing it to go offline for several hours.

In July, cybersecurity firm Check Point reported that Israeli institutions are targeted by about twice as many cyberattacks as is average in other countries around the world, particularly the country’s health sector, which experiences an average of 1,443 attacks a week.

The most targeted sectors around the world, including in Israel, are education and research, followed by government and security organizations, and then health institutions, Check Point said.

The report found that, on average, one in every 60 Israeli organizations or firms is targeted every week with ransomware attacks, an increase of 30 percent over the rate in 2020.Hospital staff at Hillel Yaffe Medical Center log patient details with pen and paper, following a ransomware cyberattack, October 13, 2021. (Hillel Yaffe Medical Center)

Last month, the Black Shadow hacking group released what it said was the full database of personal user information from the Atraf website, an Israeli LGBTQ dating service and nightlife index.

The group also uploaded personal medical information for patients of Israel’s Machon Mor medical institute, including medical records of some 290,000 patients.

The two attacks amounted to one of Israel’s largest-ever privacy breaches.

Black Shadow is a group of Iran-linked hackers who use cyberattacks for criminal ends, according to Hebrew media reports.

Very interesting report from ToI, as opposed to Reuters, isn’t it? Now let’s zoom out a little, for more context

BETWEEN HYSTERICALS ABOUT RUSSIAN HACKERS, WEF MEMBERS GATHER UNDER RUSSIAN HELMS TO WORK ON THE CYBER GREAT RESET

World Economic Forum’s Centre for Cybersecurity Platform

The Centre for Cybersecurity is leading the global response to address systemic cybersecurity challenges and improve digital trust.

As technological advances and global interconnectivity accelerate exponentially in the Fourth Industrial Revolution, unprecedented systemic security risks and threats are undermining trust and growth.

The World Economic Forum’s Centre for Cybersecurity is an independent and impartial global platform committed to fostering international dialogues and collaboration between the global cybersecurity community both in the public and private sectors. We bridge the gap between cybersecurity experts and decision makers at the highest levels to reinforce the importance of cybersecurity as a key strategic priority.

Our Community has identified the following three key priorities:

Building Cyber Resilience – enhance cyber resilience by developing and scaling forward-looking solutions and promoting effective practices across digital ecosystems.

Strengthening Global Cooperation – increase global cooperation between public and private stakeholders by fostering a collective response to cybercrime, and jointly addressing key security challenges.

Understanding Future Networks and Technology – identify future cybersecurity challenges and opportunities related to Fourth Industrial Revolution technologies and envision solutions which help build trust.

Founding Partners

Accenture, Fortinet, Palo Alto Networks, Salesforce, Saudi Aramco, Sberbank

Governments, International Organizations, Academia and Civil Society

Carnegie Endowment for International PeaceEuropol, FIDO AllianceGlobal Cyber Alliance (GCA), International Telecommunications Union (ITU), INTERPOL, Israel National Cyber Directorate (INCD), Oman Information Technology Authority (ITA), Organization of American States (OAS), Republic of Korea National Information Resources Service (NIRS), Saudi Arabia National Cybersecurity Authority, Swiss Reporting and Analysis Centre for Information Assurance (MELANI), University of OxfordUK National Cyber Security Centre (NCSC)

Among the speakers we also find the CyberPeace Institute, a Geneva-based company that describes itself as “citizens who seek peace and justice in cyberspace,” funded by Microsoft, Facebook, Mastercard, and the Hewlett Foundation.

I’m still feeling I’m looking at pictures from the same wedding party. Can we find more? Aplenty, but let’s zoom out even more:

Remember IMF / Worls Bank are official partners of the World Economic Forum. I didn’t mention them in the headline below, but they are a key factor there too:

VACCINES AS GATEWAY TO DIGITAL ID, A CONCEPT LAUNCHED IN 2016, AT DAVOS, BY GATES AND PHARMAFIA

And before that..

[EXCLUSIVE] FINAL EVIDENCE COVID-19 IS A ‘SIMEX’ – PLANNED SIMULATION EXERCISE BY WHO AND WORLD BANK

And right before that:

FINANCIAL VACCINES: “OBSCENE” PANDEMIC INSURANCE BONDS ISSUED SINCE 2017 BY WORLD BANK AND WHO, WITH NO INTENT TO PAY OR HELP

Also:

On June 28, 2017, The World Bank (International Bank for Reconstruction and Development) launched specialized bonds aimed at providing financial support to the Pandemic Emergency Financing Facility (PEF), a facility created by the World Bank to channel surge funding to developing countries facing the risk of a pandemic.

“This marks the first time that World Bank bonds are being used to finance efforts against infectious diseases, and the first time that pandemic risk in low-income countries is being transferred to the financial markets.”

The World Bank – June 28, 2017

Read more on pandemic bonds.

FOR MY FINAL BULLETPOINT: WHICH COUNTRY DO YOU THINK IT HAS BEST CYBERATTACK CAPABILITIES, IN TERMS OF KNOW-HOW AND TECHNOLOGY?

Israeli Military trains and ‘privatizes’ some of the world’s best hackers

Where I’m getting at:

We’ve isolated the virus here, in its many variants.

It’s the same small core of culprits running both the defense and the attack, with the same old tactics. They’ve already coopted or allied everyone that could pose a threat, except Iran. Similarly to how Epstein’s customers sit on both benches in Ghislaine Maxwell’s trial.

I mean, who attacks “the global financial system”, aliens?
I know some people who have been attacking it for centuries now. They’re largely the same ones doing this ‘defense’ exercise.
Noticed all militaries are ran by “defense” ministries? There’s no Land and Resources Grabbing Ministry or industry.

If you prefer sports analogies better, think all the teams involved in this pandemic / Great Reset were football teams, and this reveals once again the board of the International Football Association that organizes the World Cup. They don’t care that much who wins as long as the show meets the profitability targets and doesn’t threaten their control positions.

They make money off the ‘rivalry’ and the show, not teams.

And we’re watching the semi-finals.

Ah, by the way, most of them also worked together on the WW2 Cup.
COVID, HITLER, BLM, THE GREAT RESET – MANY BRANDS, ONE CARTEL. AUSCHWITZ PERFECTED AND GLOBALIZED

To be continued?
Our work and existence, as media and people, is funded solely by our most generous supporters. But we’re not really covering our costs so far, and we’re in dire needs to upgrade our equipment, especially for video production.
Help SILVIEW.media survive and grow, please donate here, anything helps. Thank you!

We gave up on our profit shares from masks, if you want to help us, please use the donation button!
We think frequent mask use, even short term use can be bad for you, but if you have no way around them, at least send a message of consciousness.
Get it here!