The hidden history of the United States: https://thememoryhole.substack.com/
In the conclusive chapter of this revealing series, we delve deeper into the mechanisms of elite control within the economic framework. Discover the intricacies of how stock ownership and shared directorates create an interconnected web, particularly among ruling class banks and insurance companies, solidifying their dominance.
Explore a comprehensive assessment of wealth and income distribution in the nation, shedding light on the disparities that underscore the power dynamics. Unveil the role and significance of mass media within this structure, highlighting how elite-controlled media operate as a critical component of the system of control.
Delve into the nuanced examination of election control and gain insights from a review of "Trading with the Enemy." Witness a thought-provoking segment from "America/from Hitler to MX," exposing the paradoxical involvement of American economic institutions aiding Axis powers during World War II while the US was engaged in combat against them.
As the finale approaches, witness a concise exploration into actionable steps toward fostering genuine democracy within the United States. Join us in this thought-provoking conclusion as we ponder the pathways to a more equitable and democratic future.
Aug 30, 2024 Full Episodes of Impact Theory
Welcome to another thought-provoking episode of Impact Theory with Tom Bilyeu! In today's mashup, Tom sits down with evolutionary biologist and intellectual provocateur, Bret Weinstein, for an in-depth discussion on some of the most pressing and contentious issues of our time. From the challenge of defining and understanding facts in a polarized world, to geopolitical conflicts and national security concerns, this conversation dives deep into the complexities of our global landscape.
Bret sheds light on the "cartesian crisis" and the importance of using science as a nonpartisan tool to establish truth. Together, they explore the disruptive effects of Western intervention in the Middle East, the potential strategic implications of China's one-child policy, and the alarming issues surrounding migration through Central America. With an eye on the upcoming 2024 election, they also discuss the need for inspiring leadership and the potential of movements like Unity 2020 to bring about meaningful change.
This episode delves into the Israel-Gaza conflict, the rise of antisemitism, and the disturbing challenges of making sense in an era of obstructed information. Join us as we navigate these intricate topics and seek solutions for a better future. Stay tuned for a rich dialogue that promises to leave you with new insights and perspectives.
00:00 Migration quickly moving north, countries facilitating passage.
06:19 Migrants seeking political asylum, Chinese men silent.
10:57 Questioning uncertainty of certain hypothesis due to confidence.
18:32 Qualitative feedback on writing and cultural views.
24:11 Intelligence community failing to address border security.
26:44 Producing rare sex for evolutionary success and warfare.
35:51 Biden is unfit to lead the country.
42:01 Deep admiration expressed for someone's beliefs and abilities.
44:21 Andrew Yang's future in politics is uncertain.
51:53 Join forces for Unity 2020 movement success.
56:45 Fear of shutdown stem is deeply concerning.
01:00:16 Sex appeal guy emphasizes the importance of people.
01:04:26 Patriotism drives risk-takers in tough times.
01:13:01 Uncertainty about Ukraine conflict, involvement of governments.
01:15:07 Save the Middle East from predicament, fight.
01:23:46 Different perspectives on interpreting and understanding facts.
01:30:42 Human consensus through tapping into base desires.
01:36:44 Market internalizes costs, enhances life, guides values.
01:39:24 Antagonists hinder our ability to understand life.
genocide, geopolitical conflicts, beliefs and values, cartesian crisis, nonpartisan tools, science, modernization in Islamic states, Middle East conflicts, Unity 2020 movement, political polarization, media noise, China's one-child policy, Belt and Road Initiative, 2024 election, Bobby Kennedy Jr., Democratic Party candidate, US interference in Iran, global structure, lineage violence, COVID mRNA side effects, China's migration to U.S., open southern border, surplus males, Israel-Gaza conflict, Netanyahu, consent of the governed, anti-semitism, migration across the Darien gap, Andrew Yang, Universal Basic Income, humanitarian disaster.
Secret history of the CIA: https://thememoryhole.substack.com/
Featuring a diverse array of voices, including intellectual powerhouse Dr. Noam Chomsky, prolific author Dr. William Domhoff, former US Attorney General Ramsey Clark, and the astute perspectives of former Congressman Ron Paul, among others, this series delves into the multifaceted layers of power shaping the nation.
The inaugural segment meticulously dissects the ruling class institutions that wield immense influence, such as the Council on Foreign Relations, Bilderbergers, and Trilateral Commission. It unveils how these entities, irrespective of political affiliations, intricately steer US economic and political landscapes. Through an astute examination of personnel and policies, the program elucidates how these entities exert control, transcending the boundaries of Democrat or Republican administrations.
Unraveling the intricate interplay of power and policy, this episode serves as an eye-opening journey into the unseen forces governing the American socio-political sphere.
George William "Bill" Domhoff (born August 6, 1936) is a Distinguished Professor Emeritus and research professor of psychology and sociology at the University of California, Santa Cruz, and a founding faculty member of UCSC's Cowell College.[1][2] He is best known as the author of several best-selling sociology books,[3] including Who Rules America? and its seven subsequent editions (1967 through 2022).[4]
Biography
Early life
Domhoff was born in Youngstown, Ohio, and raised in Rocky River, 12 miles from Cleveland. His parents were George William Domhoff Sr., a loan executive, and Helen S. (Cornett) Domhoff, a secretary at George Sr.'s company.
In high school, Domhoff was a three-sport athlete (in baseball, basketball, and football), wrote for his school newspaper's sports section, served on student council, and won a contest to be the batboy for the Cleveland Indians. He graduated as co-valedictorian.[2]
Education
Domhoff received a Bachelor of Arts degree in psychology at Duke University (1958), where he finished freshman year tenth in his class, wrote for the Duke Chronicle, played baseball as an outfielder, and tutored the student athletes. As an undergraduate, he also wrote for The Durham Sun and received his Phi Beta Kappa key.[2] He later earned a Master of Arts degree in psychology at Kent State University (1959), and a Doctor of Philosophy degree in psychology at the University of Miami (1962).[5]
Family
Domhoff has four children. His son-in-law was a Major League Baseball player, Glenallen Hill.[2][6]
Career
Academia
Domhoff was an assistant professor of psychology at California State University, Los Angeles, for three years in the early 1960s. In 1965, he joined the founding faculty[7] of the University of California, Santa Cruz (UCSC), as an assistant professor at Cowell College. He became an associate professor in 1969, a professor in 1976, and a Distinguished Professor in 1993. After his retirement in 1994, he has continued to publish and teach classes as a research professor.[2][8]
Over the course of his career at UCSC, Domhoff served in many capacities at various times: acting dean of the Division of Social Sciences,[9] chair of the Sociology Department, chair of the Academic Senate, chair of the Committee on Academic Personnel, and chair of the Statewide Committee on Preparatory Education.[2] In 2007, he received the University of California's Constantine Panunzio Distinguished Emeriti Award, which honors the post-retirement contributions of UC faculty.[10]
Sociology
Domhoff's first book, Who Rules America? (1967), was a 1960s sociological best-seller.[2] It argues that the United States is dominated by an elite ownership class both politically and economically.[11] This work was partially inspired by Domhoff's experience of the Civil Rights Movement and projects that he assigned for his social psychology courses to map how different organizations were connected.[2] It built on E. Digby Baltzell's 1958 book Philadelphia Gentlemen: The Making of a National Upper Class, C. Wright Mills' 1956 book The Power Elite, Robert A. Dahl's 1961 book Who Governs? and Paul Sweezy work on interest groups, and Floyd Hunter's 1953 book Community Power Structure and 1957 book Top Leadership, USA.
Who Rules was followed by a series of sociology and power structure books like C. Wright Mills and the Power Elite (1968), Bohemian Grove and Other Retreats (1974), and three more best-sellers: The Higher Circles (1970), The Powers That Be (1979), and Who Rules America Now? (1983).[2]
Domhoff has written seven updates to Who Rules America? Every edition has been used as a sociology textbook. He also has a "Who Rules America?" website, hosted by UCSC.[12]
Psychology
In addition to his work in sociology, Domhoff has been a pioneer in the scientific study of dreams.[13][14] In the 1960s, he worked closely with Calvin S. Hall, who had developed a content analysis system for dreams. He has continued to study dreams, and his latest research advocates a neurocognitive basis for future dream research.[15][16]
He and his research partner, Adam Schneider, maintain two websites dedicated to quantitative dream research: DreamResearch.net and DreamBank.net.[14]
Selected bibliography
Who Rules America?
1967. Who Rules America? Englewood Cliffs, New Jersey: Prentice Hall.
1983. Who Rules America Now? A View for the 80's. New York: Simon and Schuster.
1998. Who Rules America? Power and Politics in the Year 2000. 3rd Edition. Mountain View, Calif.: Mayfield Publishing Co.
2002. Who Rules America? Power and Politics. 4th Edition. New York: McGraw-Hill.
2006. Who Rules America? Power, Politics, and Social Change. 5th Edition. New York: McGraw-Hill.
2010. Who Rules America? Challenges to Corporate and Class Dominance. 6th Edition. New York: McGraw-Hill.
2014. Who Rules America? The Triumph of the Corporate Rich.. 7th Edition. New York: McGraw-Hill.
2022. Who Rules America? The Corporate Rich, White Nationalist Republicans, and Inclusionary Democrats in the 2020s. 8th Edition. Abingdon, UK: Routledge.
Dreams
1996. Finding Meaning in Dreams: A Quantitative Approach. New York: Plenum Publishing.
2003. The Scientific Study of Dreams: Neural Networks, Cognitive Development, and Content Analysis. Washington: American Psychological Association Press.
2018. The Emergence of Dreaming: Mind-Wandering, Embodied Simulation, and the Default Network. New York: Oxford University Press.
2022. The Neurocognitive Theory of Dreaming: The Where, How, When, What, and Why of Dreams. Cambridge, MA: MIT Press.
References
"Psychology Faculty". University of California at Santa Cruz. Retrieved 16 December 2019.
Domhoff, G. William (February 13, 2014). "G. William Domhoff: The Adventures and Regrets of a Professor of Dreams and Power". University of California.
Gans, H. (1997). "Best-sellers by sociologists: An exploratory study". Contemporary Sociology. 26 (2): 131–135. doi:10.2307/2076741. JSTOR 2076741.
Seidman, Derek. ""Who Rules America?" After 50 Years: An Interview with Professor G. William Domhoff". Eyes on the Ties (LittleSis). Retrieved 16 December 2019.
Domhoff, p.209 in Class in America: An Encyclopedia. by Robert E. Weir ABC-CLIO, 2007
"Sunday, Dec. 3, 1995 C-7. Weddings, Engagements, Anniversaries". Santa Cruz Sentinel. December 3, 1995.
"G. William (Bill) Domhoff, founding faculty, and psychologist Calvin S. Hall, at the Cowell College fountain". UCSC. 1968. Archived from the original on 2017-09-16. Retrieved 2017-06-12.
Domhoff, G. William. "G. William Domhoff: Power Structure Research retrospective (1994)." YouTube.
"William (Bill) Domhoff, dean of the division of social sciences". UCSC. Archived from the original on 2017-12-29. Retrieved 2017-06-12.
"UCSC's Michael Nauenberg wins UC distinguished emeriti award". Santa Cruz Sentinel. 8 May 2013. Retrieved 16 December 2019.
World of Sociology. Gale. November 2000. ISBN 978-0-7876-4965-4.
"Who Rules America?"
"Keynote Speakers: 2017 Annual International Dream Conference". International Association for the Study of Dreams.
King, Philip; Bulkeley, Kelly; Welt, Bernard (2011). Dreaming in the Classroom: Practices, Methods, and Resources in Dream Education. SUNY Press. p. 245.
Domhoff, G. William (2018). The Emergence of Dreaming: Mind-Wandering, Embodied Simulation, and the Default Network. Oxford, UK: Oxford University Press. ISBN 9780190673420.
Domhoff, G. William (2022). The Neurocognitive Theory of Dreaming. Cambridge, MA: MIT Press. ISBN 9780262544214.
William Ramsey Clark (December 18, 1927 – April 9, 2021) was an American lawyer, activist, and federal government official. A progressive, New Frontier liberal,[1] he occupied senior positions in the United States Department of Justice under Presidents John F. Kennedy and Lyndon B. Johnson, serving as United States Attorney General from 1967 to 1969; previously, he was Deputy Attorney General from 1965 to 1967 and Assistant Attorney General from 1961 to 1965.
As attorney general, Clark was known for his vigorous opposition to the death penalty, aggressive support of civil liberties and civil rights, and dedication to enforcing United States antitrust laws.[2] Clark supervised the drafting of the Voting Rights Act of 1965 and Civil Rights Act of 1968.
After leaving public office, Clark led many progressive activism campaigns, including opposition to the War on Terror. He offered advice or legal defense to such prominent figures as Charles Taylor, Slobodan Milošević, Saddam Hussein, Colonel Muammar Gaddafi, and Lyndon LaRouche.[3] Until his death in 2021, Clark was the last surviving member of the cabinet of Lyndon B. Johnson.[4]
Early life and career
Clark was born in Dallas, Texas, on December 18, 1927,[5] the son of jurist Tom C. Clark and his wife Mary Jane (née Ramsey). Clark's father served as United States Attorney General from 1945 to 1949 under President Harry S. Truman and then became a Supreme Court Justice in August 1949.[6] His maternal grandfather was William Franklin Ramsey, who served on the Supreme Court of Texas,[7][8] while his paternal grandfather, lawyer William Henry Clark, was president of the Texas Bar Association.[7]
Clark attended Woodrow Wilson High School in Washington, D.C., but dropped out at the age of 17 in order to join the United States Marine Corps, seeing action in Western Europe in the final months of World War II;[7] he served until 1946. Back in the U.S., he earned a Bachelor of Arts from the University of Texas at Austin in 1949, and obtained a Master of Arts in American history from the University of Chicago and a Juris Doctor from the University of Chicago Law School in 1950 and 1951, respectively.[9] While at the University of Texas, he was a member of the Delta Tau Delta fraternity.[10]
He was admitted to the Texas bar in 1950, and was admitted to practice before the Supreme Court of the United States in 1956. From 1951 to 1961, Clark practiced law as an associate and partner at his father's Texas law firm, Clark, Reed and Clark.[11]
Kennedy and Johnson administrations
Attorney General Clark and President Lyndon B. Johnson in 1967
In the Kennedy and Johnson administrations, Clark occupied senior positions in the Justice Department; he was Assistant Attorney General, overseeing the department's Lands Division from 1961 to 1965, and then served as Deputy Attorney General from 1965 to 1967.[12]
In 1967, President Lyndon B. Johnson nominated him to be Attorney General of the United States. He was confirmed by the Senate and took the oath of office on March 2. Clark was one of Johnson's popular and successful cabinet appointments, being described as "able, independent, liberal and soft-spoken" and a symbol of the New Frontier liberals;[1] he had also built a successful record, especially in his management of the Justice Department's Lands Division; he had increased the efficiency of his division and had saved enough money from his budget so that he had asked Congress to reduce the budget by $200,000 annually.[1]
However, there also was speculation that one of the reasons that contributed to Johnson's making the appointment was the expectation that Clark's father, Associate Justice Tom C. Clark, would resign from the Supreme Court to avoid a conflict of interest.[13] Johnson wanted a vacancy to be created on the Court so he could appoint Thurgood Marshall, the first African American justice. The elder Clark assumed senior status on June 12, 1967, effectively resigning from the Supreme Court and creating the vacancy Johnson apparently desired.[14]
During his years at the Justice Department, Clark played an important role in the history of the civil rights movement. He:
supervised the federal presence at Ole Miss during the week following the admission of James Meredith;
surveyed all school districts in the South desegregating under court order (1963);
supervised federal enforcement of the court order protecting the 1965 Selma to Montgomery marches;
headed the Presidential task force to Watts following the 1965 riots; and
supervised the drafting and executive role in passage of the Voting Rights Act of 1965 and Civil Rights Act of 1968.[3]
As attorney general during part of the Vietnam War, Clark oversaw the prosecution of the Boston Five for "conspiracy to aid and abet draft resistance." Four of the five were convicted, including pediatrician Dr. Benjamin Spock and Yale chaplain William Sloane Coffin Jr.,[15] but in later years, Clark expressed his regret at the prosecution's victory: "We won the case, that was the worst part."[16]
Clark served as the attorney general until Johnson's term as president ended on January 20, 1969.[17] Because of Richard Nixon's attacks on Clark's liberal record during the 1968 presidential election campaign and ultimate narrow victory over Hubert H. Humphrey, relations between Johnson and Clark soured and, by inauguration day, they were no longer on speaking terms.[15]
In addition to his government work, during this period Clark was also director of the American Judicature Society (in 1963) and national president of the Federal Bar Association in 1964–65.[17]
Private career
Following his term as attorney general, Clark taught courses at the Howard University School of Law (1969–1972) and Brooklyn Law School (1973–1981).[18] He was active in the anti-Vietnam War movement and visited North Vietnam in 1972 as a protest against the bombing of Hanoi.[15] During this time he was associated with the New York law firm Paul, Weiss, Rifkind, Wharton & Garrison, but he resigned in 1973, saying, "I didn't feel like working on things I didn't believe in, I didn't think were important."[19]
On January 28, 1970, Ramsey Clark testified in the Chicago Seven trial. He was barred by Judge Julius Hoffman from testifying before the jury after Clark had testified outside the presence of the jury. Judge Hoffman upheld the prosecution's objections to 14 of Defense Attorney William Kunstler's 38 questions to Clark, but Clark did testify that he had told the prosecutor Tom Foran to investigate the charges against the defendants through Justice Department lawyers "as is generally done in civil rights cases", rather than through a grand jury.[20]
At the 1972 Democratic National Convention, Clark received one delegate vote for the presidential nomination[21] and two delegate votes for the vice-presidential nomination.[22]
In the 1974 New York state election, Clark ran as the Democratic candidate for U.S. Senator; he defeated the party's designee Lee Alexander in the primary, but lost in the general election to the incumbent Jacob Javits. In the 1976 election, Clark again sought the Democratic nomination to represent New York in the Senate, but finished a distant third in the primary behind Daniel Patrick Moynihan and Congresswoman Bella Abzug.[15]
On November 5, 1979, at the start of the Iranian hostage crisis, President Jimmy Carter instructed Clark and Senate staffer William Miller to visit Tehran and seek to open negotiations with Iranian authorities for the hostages' release; while en route, they were refused entry into the country by Ayatollah Khomeini.[23][24] Defying a travel ban, Clark went to Tehran again in June 1980 to attend a conference on alleged U.S. interference in Iranian affairs, on which occasion he was granted admission. While there he both demanded the release of the hostages and criticized past U.S. support for the deposed Shah. This second unauthorized trip reportedly infuriated President Carter.[25][15]
International activism
In September 1998, Clark led a delegation to Sudan to collect evidence in the aftermath of President Bill Clinton's bombing of the Al-Shifa pharmaceutical factory in Khartoum the previous month as part of Operation Infinite Reach. Upon returning to the U.S., the delegation held a press conference on September 22, 1998, to refute the U.S. State Department's claims that the facility had been producing VX nerve agent.[26] U.S. officials later acknowledged that the evidence cited as the rationale for the Al-Shifa strike was weaker than initially believed.[27]
In 1991, Clark's Coalition to Stop U.S. Intervention in the Middle East opposed the U.S.-led war and sanctions against Iraq.[28] Clark accused the administration of President George H. W. Bush, its officials Dan Quayle, James Baker, Dick Cheney, William Webster, Colin Powell, Norman Schwarzkopf, and "others to be named" of "crimes against peace, war crimes", and "crimes against humanity" for its conduct of the Gulf War against Iraq and the ensuing sanctions;[29] in 1996, he added the charges of genocide and the "use of a weapon of mass destruction".[30] Similarly, after the 1999 NATO bombing of the Federal Republic of Yugoslavia Ramsey charged and "tried" NATO on 19 counts and issued calls for its dissolution.[31]
As a lawyer, Clark was criticized by both opponents and supporters for some of the people he agreed to defend, such as foreign dictators hostile to the United States; Clark stood beside and defended his clients, regardless of their own admitted actions and crimes.[32]
In 2004, Clark joined a panel of about 20 Arab and one other non-Arab lawyers to defend Saddam Hussein in his trial before the Iraqi Special Tribunal.[33] Clark appeared before the Iraqi Special Tribunal in late November 2005 arguing "that it failed to respect basic human rights and was illegal because it was formed as a consequence of the United States' illegal war of aggression against the people of Iraq."[34] Clark said that unless the trial was seen as "absolutely fair", it would "divide rather than reconcile Iraq".[35] Christopher Hitchens said Clark was admitting Hussein's guilt when Clark reportedly stated in a 2005 BBC interview: "He [Saddam] had this huge war going on, and you have to act firmly when you have an assassination attempt".[36]
Hitchens continued to describe Clark in the following terms:
"From bullying prosecutor he mutated into vagrant and floating defense counsel, offering himself to the génocideurs of Rwanda and to Slobodan Milosevic, and using up the spare time in apologetics for North Korea. He acts as front-man for the Workers World Party, which originated in a defense of the Soviet invasion of Hungary in 1956."[36]
Sociologist and anti-communist scholar Paul Hollander wrote of Clark:
"It is likely that well before Clark took his bizarre positions in support of highly repressive, violent, and intolerant political systems and their leaders, he came to the conclusion that the United States was the most dangerous and reprehensible source of evil in the world. This overarching belief led to the reflexive sympathy and support for all the enemies and alleged victims of the United States. They include dictators of different ideological persuasion noted above, whose inhumane qualities and policies Clark was unable to discern or acknowledge, let alone condemn. It was sufficient for Clark's moral accounting that if these dictators were opposed to (and allegedly victimized by) the United States, they deserved and earned his sympathy."[37]
Clark was not alone in criticizing the Iraqi Special Tribunal's trial of Saddam Hussein, which drew intense criticism from international human rights organizations. Human Rights Watch called Saddam's trial a "missed opportunity" and a "deeply flawed trial",[38][39] and the UN Working Group on Arbitrary Detention found the trial to be unfair and to violate basic international human rights law.[34] Among the irregularities cited by HRW, were that proceedings were marked by frequent outbursts by both judges and defendants, that three defense lawyers were murdered, that the original chief judge was replaced, that important documents were not given to defense lawyers in advance, that paperwork was lost, and that the judges made asides that pre-judged Saddam Hussein.[40] One of the aforementioned outbursts occurred when Clark was ejected from the trial after passing the judge a memorandum stating that the trial was making "a mockery of justice". The chief judge Raouf Abdul Rahman shouted at Clark, "No, you are the mockery ... get him out. Out!"[41]
On March 18, 2006, Clark attended the funeral of Slobodan Milošević. He commented: "History will prove Milošević was right. Charges are just that: charges. The trial did not have facts." He compared the trial of Milošević with Saddam's, stating "both trials are marred with injustice, both are flawed." He characterized Milošević and Saddam Hussein as "both commanders who were courageous enough to fight more powerful countries."[42]
Ramsey Clark speaks to the anti-war protest in Washington, D.C., on March 20, 2010.
In June 2006, Clark wrote an article criticizing U.S. foreign policy in general, containing a list of 17 U.S. "major aggressions" introduced by "Both branches of our One Party system, Democrat and Republican, favor the use of force to have their way."[a] He followed this by saying, "The United States government may have been able to outspend the Soviet Union into economic collapse in the Cold War arms race, injuring the entire planet in the process. Now Bush has entered a new arms race and is provoking a Second Cold War."[43]
On September 1, 2007, in New York City, Clark called for detained Filipino Jose Maria Sison's release and pledged assistance by joining the latter's legal defense team headed by Jan Fermon. Clark doubted Dutch authorities' "validity and competency", since the murder charges originated in the Philippines and had already been dismissed by the country's Supreme Court.[44]
In November 2007, Clark visited Nandigram in India[45][46] where conflict between state government forces and villagers resulted in the death of at least 14 villagers.[47][48][49] In a December 2007 interview, he described the War on Terrorism as a war against Islam.[50]
Ramsey Clark visiting Nandigram, India, November 2007
In April 2009, Clark spoke at a session of the UN's anti-racism Durban Review Conference at which he accused Israel of genocide.[51]
In September 2010, an essay on torture by Clark was published in a three-part paperback entitled The Torturer in the Mirror (Seven Stories Press).[52][15]
Clark was a recipient of the 1992 Gandhi Peace Award,[53] and also the Peace Abbey Courage of Conscience Award for his commitment to civil rights, his opposition to war and military spending and his dedication to providing legal representation to the peace movement, particularly, his efforts to free Leonard Peltier.[54] In 1999, he traveled to Belgrade to receive an honorary doctorate from Belgrade University.[55][56] In 2008, the United Nations awarded him its Prize in the Field of Human Rights for "his steadfast insistence on respect for human rights and fair judicial process for all".[57]
Advocating the impeachment of George W. Bush
See also: Efforts to impeach George W. Bush
VoteToImpeachFounded 2002
Dissolved January 20, 2009
Type Political advocacy
Focus Impeachment of Bush administration members
Location
Washington, D.C.
Area served
United States
Members
Reported over 1,000,000 signatories
Key people
Ramsey Clark (founder)
In 2002, Clark founded "VoteToImpeach", an organization advocating the impeachment of President George W. Bush and several members of his administration. For the duration of Bush's terms in office, Clark sought, unsuccessfully, for the House of Representatives to bring articles of impeachment against Bush. He was the founder of the International Action Center, which holds significant overlapping membership with the Workers' World Party.[58] Clark and the IAC helped found the protest organization A.N.S.W.E.R. (Act Now to Stop War and End Racism).[59]
On March 19, 2003, the New Jersey newspaper and website The Independent reported Clark's efforts to impeach Bush and others, prior to the start of the Iraq War. The paper commented: "Clark said there is a Web site, www.votetoimpeach.org, dedicated to collecting signatures of U.S. citizens who want President George W. Bush impeached, and that approximately 150,000 have signed to impeach, he said."[60] The Weekly Standard magazine stated in an article dated February 27, 2004, "Ramsey Clark's VoteToImpeach.org is a serious operation", and said the group had run full-sized newspaper advertising on both coasts of the U.S. though the Standard also went on to describe them as also being an "angry petition stage."[61]
Clark's speech to a counter-inauguration protest on January 20, 2005, at John Marshall Park in Washington, D.C., was broadcast by Democracy Now in which Clark stated: "We've had more than 500,000 people sign on 'Vote to Impeach'."[62] The San Francisco Bay Guardian listed the website as one of three "Impeachment links", alongside afterdowningstreet.org and impeachpac.org.[63]
The organization, under Clark's guidance, drafted its own articles of impeachment against President Bush, Vice President Richard B. Cheney, Secretary of Defense Donald Rumsfeld, and Attorney General John Ashcroft. The document argues that the four committed, "violations and subversions of the Constitution of the United States of America in an attempt to carry out with impunity crimes against peace and humanity and war crimes and deprivations of the civil rights of the people of the United States and other nations, by assuming powers of an imperial executive unaccountable to law and usurping powers of the Congress, the Judiciary and those reserved to the people of the United States."[64] Votetoimpeach.org claimed to have collected over one million signatures in favor of impeachment as of January 2009.[65]
Notable clients
As a lawyer, Clark also provided legal counsel and advice to prominent figures, including many controversial individuals.[66][67]
Regarding his role as a defense lawyer in the trial of Saddam Hussein, Clark said: "A fair trial in this case is absolutely imperative for historical truth."[68] Clark stated that by the time he decided to join Hussein's defense team, it was clear that "proceedings before the Iraqi Special Tribunal would corrupt justice both in fact and in appearance and create more hatred and rage in Iraq against the American occupation...affirmative measures must be taken to prevent prejudice from affecting the conduct of the case and the final judgment of the court...For there to be peace, the days of victor's justice must end."[69]
A partial listing of persons who have reportedly received legal counsel and advice from Ramsey Clark includes:
Lori Berenson, an American convicted of support of MRTA guerrillas in Peru.[70]
Father Philip Berrigan, a Catholic priest and antiwar activist (one of the Harrisburg Seven). Clark served as defense counsel at trial and won an acquittal.[71]
Young church worker Jennifer Casolo, charged by Salvadoran authorities in 1989 with aiding the Farabundo Marti National Liberation Front. Clark traveled to El Salvador to aid in her defense.[72][73] Casolo was released and deported to the U.S. after 18 days in police detention.[74][75]
Radovan Karadžić, former Bosnian Serb politician. In the 1990s, Clark represented Karadžić in a civil suit brought by Croats and Muslims from the former Yugoslavia who sued Karadžić under the Alien Tort Claims Act of 1789 and Torture Victims Protection Act of 1992 for atrocities and human rights abuses committed during the Bosnian War.[67][76]
About 100 survivors and relatives of the dead members of the Branch Davidian sect, whose Mount Carmel compound besieged by federal agents in a 51-day Waco siege in 1993, resulting in the death of about 80 members. Clark represented the plaintiffs in a suit alleging wrongful death and excessive force, giving an impassioned closing argument in which he called the siege "the greatest domestic law enforcement tragedy in the history of the United States." In a trial in 2000, the jury returned a verdict for the government.[77][78]
"Political-cult guru" Lyndon LaRouche.[79]
Nazi concentration camp commandant Karl Linnas.[80]
Camilo Mejía, a U.S. soldier who deserted his post.[81]
The National Organization for the Reform of Marijuana Laws Advisory Board during the 1970s and early 1980s.[82][83]
American Indian Movement prisoner Leonard Peltier.[84]
Elizaphan Ntakirutimana, a leader in the Rwandan genocide.[85]
Palestine Liberation Organization leaders in a lawsuit brought by the family of Leon Klinghoffer, who was murdered during hijacking of the Achille Lauro.[16]
Nazi War criminal Jakob "Jack" Reimer, charged for the killings of Jews in Warsaw.[86]
Liberian dictator Charles Taylor[3] during his 1985 fight against extradition from the United States to Liberia, Taylor would later be convicted of crimes against humanity.[87]
Civil rights attorney Stephen Yagman,[88] whose disbarment from U.S. federal court was sought based on his harsh criticism of a federal judge, William Duffy Keller, calling him an anti-Semite and saying he had been drunk on the bench.[89]
In popular culture
In Aaron Sorkin's 2020 film The Trial of the Chicago 7, Clark was portrayed by Michael Keaton.[90]
Personal life
Clark married Georgia Welch, a classmate from the University of Texas, on April 16, 1949. They had two children, Ronda Kathleen Clark and Tom Campbell Clark II. His wife died on July 3, 2010, at the age of 81.[91][92] His son Tom died from cancer on November 23, 2013.[93] Clark lived in Greenwich Village in New York City, where he died on April 9, 2021, at age 93.[15]
Works
Clark, Ramsey (1970). Crime in America: Observations on Its Nature Causes Prevention and Control. Simon & Schuster. ISBN 978-067120407-5.
— (1974). Crime and Justice. The Great Contemporary Issues. New York: Arno Press. ISBN 978-040504167-9.
— (1992a). The Fire This Time: U.S. War Crimes in the Gulf. Thunder's Mouth Press. ISBN 978-156025047-0.
— (1992b). War Crimes: A Report on U.S. War Crimes Against Iraq. Maisonneuve Press. ISBN 978-094462415-9.
— (1998). Challenge to Genocide: Let Iraq Live. International Action Center. ISBN 978-096569164-2.
— (2000). NATO in the Balkans: Voices of Opposition. International Action Center. ISBN 978-096569162-8.
— (2002a) [First published 1996]. The Impact of Sanctions on Iraq: The Children Are Dying (2nd ed.). World View Forum. ISBN 978-096569163-5.
— (2002b). "Appendix: On the fiftieth anniversary of the Universal Declaration of Human Rights". Acts of Aggression: Policing "Rogue" States. By Chomsky, Noam; Zangana, Haifa. Seven Stories Press. ISBN 978-158322546-2.
—; Doebbler, Curtis (2011). The Iraqi Special Tribunal: An Abuse of Justice [Draft Report] (Report). Lulu.com. ASIN B08KWYBVZ5.
—; Douglass, Frederick; Danticat, Edwidge; Dupuy, Ben; Laraque, Paul (2010). Chin, Pat; Dunkel, Greg; Flounders, Sara; Ives, Kim (eds.). Haiti: A Slave Revolution: 200 Years After 1804 (Updated ed.). Youth & The Military Education Project (US). ISBN 978-097475214-3.
— (2010). "Torture, the Cruelest of All Human Acts, Is a Crime in America". The Torturer in the Mirror. By Reifer, Thomas Ehrlich; Zangana, Haifa (First ed.). Seven Stories Press. ISBN 978-158322913-2.
See also
Biography portal
List of peace activists
Progressive Party (South Korea, 2017)
Notes
Clark's list of "major aggressions" by the United States:
Regime change in Iran (1953), the Shah replacing democratically elected Mossadegh; Eisenhower (R).
Regime change in Guatemala (1954), military government for democratically elected Arbenz; Eisenhower (R).
Regime change in Republic of the Congo (Léopoldville) (1961), assassination of Patrice Lumumba; Eisenhower (R).
The Vietnam War (1959–1975); Eisenhower (R), Kennedy (D), Johnson (D), Nixon (R).
Invasion of the Dominican Republic (1965); Johnson (D).
The Contras warfare against Nicaragua (1981–1988), resulting in regime change from the Sandinistas to corrupt capitalists; Reagan (R).
Attack and occupation of Grenada (population 110,000)(1983–1987); Reagan (R)
Aerial attack on the sleeping cities of Tripoli and Benghazi, Libya, (1986); Reagan (R).
Invasion of Panama (1989–1990), regime change; George H. W. Bush (R).
Gulf War (1991); George H. W. Bush (R)
"Humanitarian" occupation of Somalia (1992–1993), leading to 10,000 Somali deaths; George H. W. Bush (R) and Clinton (D).
Aerial attacks on Iraq (1993–2001); Bill Clinton (D)
War against Yugoslavia (1999), 23,000 bombs and missiles dropped on Yugoslavia; Clinton (D).
Missile attack in Khartoum (1998), (21 Tomahawk Cruise Missiles) destroying the Al-Shifa pharmaceutical factory which provided the majority of all medicines for Sudan; Clinton (D).
Invasion and occupation of Afghanistan (2001–present), regime change; George W. Bush (R).
War of aggression against Iraq and hostile occupation (2003–present); George W. Bush (R).
Regime change in Haiti (2004), deposing the democratically elected Aristide for years of chaos and systematic killings; George W. Bush (R).
References
"New Atty. General Is Liberal, Soft-Spoken Worker". Jet. Vol. 32, no. 9. Johnson Publishing. June 8, 1967. p. 10. Retrieved April 20, 2022.
Dewhirst, Robert E. (January 1, 2009). "Clark, Ramsey". In Genovese, Michael A. (ed.). Encyclopedia of the American Presidency. Facts on File. pp. 93–94. ISBN 9781438126388. Retrieved April 20, 2022.
McCool, Grant (April 11, 2021). "Ramsey Clark, former U.S. attorney general and human rights activist, dead at 93". Reuters. Retrieved April 11, 2021.
Wildstein, David (February 7, 2021). "3 of 12 living ex-U.S. cabinet secretaries over 90 are from New Jersey". New Jersey Globe. Retrieved April 11, 2021.
"Ramsey Clark (1967–1969)". Miller Center. October 4, 2016. Retrieved January 2, 2019.
"Ancestry of Ramsey Clark". www.wargs.com.
"Ramsey Clark". www.justice.gov. April 13, 2015. Archived from the original on May 2, 2019. Retrieved January 3, 2019.
Supreme Court Justice Tom C. Clark, A Life of Service by Mimi Clark Gronlund, Ramsey Clark, pg. 21
"Diverse Notable Alumni – Diversity & Inclusion". diversity.uchicago.edu.
The Rainbow, vol. 132, no. 2, p. 10.
"USDOJ: Environment and Natural Resources Division 100th Anniversary : Ramsey Clark". September 1, 2009. Archived from the original on September 1, 2009.
"Ramsey Clark". www.justice.gov. April 13, 2015. Archived from the original on May 2, 2019. Retrieved January 3, 2019.
Time Magazine, "The Ramsey Clark Issue", October 18, 1968
"Clark, Tom C." Federal Judicial Center. Retrieved April 11, 2021.
Martin, Douglas (April 10, 2021). "Ramsey Clark, Attorney General and Rebel With a Cause, Dies at 93". The New York Times. Retrieved April 10, 2021.
"Ramsey Clark, attorney general who represented Saddam Hussein, dies at 93". The Guardian. Associated Press. April 11, 2021. Retrieved April 11, 2021.
"Attorney General William Ramsey Clark". United States Department of Justice: Office of the Attorney General. October 23, 2014. Retrieved April 10, 2021.
"Clark, Ramsey, 1927-, Biographical info". LBJ Presidential Library. Retrieved April 11, 2021.
"Notes on People". The New York Times. May 10, 1973. ISSN 0362-4331. Retrieved April 11, 2021.
Times, J. Anthony Lukas Special to The New York (January 29, 1970). "Chicago 7 Judge Bars Ramsey Clark As Defense Witness". The New York Times. ISSN 0362-4331. Retrieved April 11, 2021.
"Our Campaigns - US President - D Convention Race - Jul 10, 1972". www.ourcampaigns.com.
"Our Campaigns - US Vice President - D Convention Race - Jul 10, 1972". www.ourcampaigns.com.
"The Iran Hostage Crisis: When Compromise Fails". iranhostagecrisis.net. Retrieved April 11, 2021.
Cumming-Bruce, Nicholas (November 8, 1979). "Tehran". The Washington Post. Retrieved April 11, 2021.
Getlin, Josh (February 18, 1990). "For a Politician, former U.S. Atty. Gen. Ramsey Clark Took a Road Less Traveled--a Hard Left Into the Hotbed of Human Rights Causes : Loner of the Left". The Los Angeles Times. Retrieved April 11, 2021.
Brendan (April 28, 2004). "Clinton Bombs Sudanese Pharmaceutical Plant". ThereItIs.org.
Lacey, Marc (October 20, 2005). "Look at the Place! Sudan Says, 'Say Sorry', but U.S. Won't". The New York Times. Retrieved August 17, 2016.
Gelbspan, Ross (January 22, 1991). "Peace activists express concern about anti-semites in movement". The Boston Globe.
War Crimes: A Report on United States War Crimes Against Iraq to the Commission of Inquiry for the International War Crimes Tribunal Archived February 15, 2013, at the Wayback Machine, by Ramsey Clark and others
The Wisdom Fund, "Former US Attorney General Charges US, British and UN Leaders", November 20, 1996
CJPY, "NATO found guilty", June 10, 2000 Archived September 5, 2008, at the Wayback Machine
John Judis, "The Strange Case of Ramsey Clark," The New Republic, April 22, 1991, pp. 23–29.
"US rebel joins Saddam legal team", news.bbc.co.uk, December 29, 2004
"Cases". Archived from the original on September 7, 2008.
"Chaos mars Saddam court hearing", news.bbc.co.uk, December 5, 2005
"Sticking up for Saddam", Slate.com
Hollander, Paul. From Benito Mussolini to Hugo Chavez: Intellectuals and a Century of Political Hero Worship. p. 272.
"Iraq's Shallow Justice" Human Rights Watch, December 29, 2006
"Hanging After Flawed Trial Undermines Rule of Law" Human Rights Watch, December 30, 2006
"Saddam trial 'flawed and unsound'" news.bbc.co.uk, November 20, 2006
"Saddam trial judge ejects Ramsey Clark". Reuters. January 19, 2007. Retrieved April 11, 2021.
"Balkan scapegoat". Frontline (The Hindu). April 7, 2006. Retrieved April 11, 2021.
"Ramsey Clark's Indictment of George W. Bush on June 15th, 2006". goodworksonearth.org.
"Ex-US attorney general calls for Joma release". Archived from the original on September 3, 2007.
"Ramsey Clark visits Nandigram". The Hindu. November 30, 2007.
"Nandigram says 'No!' to Dow's chemical hub".
"NHRC sends notice to Chief Secretary, West Bengal, on Nandigram incidents: investigation team of the Commission to visit the area". National Human Rights Commission of India. November 12, 2007. Archived from the original on June 24, 2016.
Hossain, Rakeeb; Chaudhuri, Drimi (November 10, 2007). "CPM cadres kill 3 in Nandigram". Archived from the original on April 17, 2008.
PTI (March 14, 2021). "Chose to fight anti-Bengal forces in Nandigram as mark of respect to martyrs: Mamata Banerjee | India News – Times of India". The Times of India. Retrieved April 11, 2021.
Dam, Marcus (December 17, 2007). "Interview: Consumerism and materialism deadlier than armed occupation". The Hindu. Chennai, India. Archived from the original on May 1, 2011.
The U.N.'s Anti-Antiracism Conference, The Wall Street Journal, April 22, 2009.
"The Torturer in the Mirror". Archived from the original on July 12, 2011.
"Horrors in Yemen". Promoting Enduring Peace.
"List of Award Recipients | The Peace Abbey FoundationThe Peace Abbey Foundation".
"Ramsey Clark Adresses Serbian Academic Community". www.oocities.org. Retrieved August 27, 2019.
"Ramsey Clark, the war criminal's best friend". Salon. June 21, 1999. Retrieved August 27, 2019.
"United Nations Human Rights Prize 2008". Office of the United Nations High Commissioner for Human Rights. Retrieved April 11, 2021.
Kevin Coogan, "The International Action Center: 'Peace Activists' with a Secret Agenda," Hit List, November/December 2001.
Coogan, "The International Action Center," Hit List, Nov/Dec 2001.
"Ramsey Clark speaks out against war at college". Archived from the original on December 17, 2005.
"Impeach Bush?". February 26, 2004.
"Former U.S. Attorney General Ramsey Clark Calls For Bush Impeachment". Democracy Now!.
"San Francisco Bay Guardian". Archived from the original on March 3, 2016. Retrieved September 5, 2009.
"ImpeachBush / VoteToImpeach: Articles of Impeachment". January 13, 2009. Archived from the original on January 13, 2009. Retrieved April 11, 2021.
"ImpeachBush / VoteToImpeach". January 5, 2009. Archived from the original on January 5, 2009. Retrieved April 11, 2021.
Dennis J. Bernstein, Ramsey Clark's Long Trek for Justice, Consortium News (March 9, 2013).
Josh Saunders, Ramsey Clark's Prosecution Complex: How did Lyndon Johnson's attorney general come to defend dictators, war criminals, and terrorists?, Legal Affairs (November/December 2003).
"Lawyer: Ex-U.S. attorney general to join Saddam defense". CNN. November 27, 2005.
"Why I'm Willing to Defend Hussein". Archived from the original on January 15, 2007.
"Lori Berenson returning to U.S. after 20 years in Peru" CBS News. Associated Press. November 30, 2015.
Christopher Reed, Obituary: Philip Berrigan, Guardian (December 12, 2002).
"American Charged in El Salvador". New York Times. Associated Press. December 6, 1989.
Casolo Retains Ramsey Clark, Los Angeles Times Wire Services (November 28, 1989).
Josh Getlin, Ramsey Clark's Road Less Traveled: the Former Attorney General Took a Hard Left and Hasn't Looked Back, Los Angeles Times (April 15, 1990).
Michael Hirsley, Saint or Sinner? Jennifer Casolo, Freed From El Salvador, Is Now On The Tour Circuit Archived December 22, 2015, at the Wayback Machine, Chicago Tribune (March 17, 1990).
Hope Viner Samborn, Ruling Could Lead to More Human Rights Tort Cases, ABA Journal (December 1995), p. 30.
Sam Howe Verhovek, 5 Years After Waco Standoff, The Spirit of Koresh Lingers, New York Times (April 19, 1998).
Jury clears US over Waco deaths, BBC News (July 15, 2000).
Lizzy Ratner, Ramsey Clark: Why I'm Taking Saddam's Case, Observer (January 10, 2005).
Margolick, David (June 14, 1991). "The Long and Lonely Journey of Ramsey Clark". The New York Times. ISSN 0362-4331. Retrieved April 11, 2021.
"Revista Envío - NICARAGUA BRIEFS". www.envio.org.ni. Retrieved April 11, 2021.
"Public Interest Group Files Civil Suit To Overturn All U.S. Marijuana Laws | News | The Harvard Crimson". www.thecrimson.com. Retrieved April 11, 2021.
"NORML 1981 - Drug Legalization". www.nationalfamilies.org. Archived from the original on September 25, 2021. Retrieved April 11, 2021.
"Chief behind bars". The Guardian. July 10, 1999. Retrieved April 11, 2021.
"Ramsey Clark, the war criminal's best friend". Salon. June 21, 1999. Retrieved April 11, 2021.
Cenziper, Debbie (January 28, 2020). "How a Red Army Officer-Turned-Nazi Recruit Made America His Home". HistoryNet. Retrieved April 11, 2021.
"Liberia ex-leader Charles Taylor get 50 years in jail". BBC News. May 30, 2012. Retrieved April 11, 2021.
"Judge Real's Sanctions Against Lawyer Killed but Feud Goes On". Los Angeles Times. November 29, 1991. Retrieved April 11, 2021.
"Attorney Sanctioned for Criticizing Judge : Courts: Panel finds that civil rights lawyer Stephen Yagman tried to force jurist to take himself off cases. He could face reprimand, suspension or other discipline". Los Angeles Times. May 20, 1994. Retrieved April 11, 2021.
Sinha-Roy, Piya (October 25, 2019). "Aaron Sorkin's 'The Trial of the Chicago 7' Adds Michael Keaton, Sets September 2020 Release". The Hollywood Reporter. Archived from the original on November 13, 2020. Retrieved October 25, 2019.
"Deaths Clark, Georgia Welch". The New York Times. July 6, 2010. Retrieved June 6, 2011.
"Death Notices: Georgia Welch Clark". The New York Times. July 6, 2010.
Barnes, Bart (December 23, 2013). "Tom C. Clark II, environmental lawyer, dies at 59". The Washington Post.
Further reading
Citizen Clark: A Life of Principle – documentary film on the life of former U.S. Attorney General Ramsey Clark (2018, 95 minutes)
Victor Navasky, "In memoriam Ramsesy Clark (1927–2021): The former US attorney general was sui generis", The Nation, vol. 312, no. 10 (17/24 May 2021), p. 6.
Wohl, Alexander (2013). Father, Son, and Constitution: How Justice Tom Clark and Attorney General Ramsey Clark Shaped American Democracy. University Press of Kansas. ISBN 978-070061916-0.
The dark side of history: https://thememoryhole.substack.com/
Checkpoint Charlie (or "Checkpoint C") was the best-known Berlin Wall crossing point between East Berlin and West Berlin during the Cold War (1947–1991), as named by the Western Allies.[1]
East German leader Walter Ulbricht agitated and maneuvered to get the Soviet Union's permission to construct the Berlin Wall in 1961 to stop emigration and defection westward through the Border system, preventing escape across the city sector border from East Berlin into West Berlin. Checkpoint Charlie became a symbol of the Cold War, representing the separation of East and West. Soviet and American tanks briefly faced each other at the location during the Berlin Crisis of 1961. On 26 June 1963, U.S. President John F. Kennedy visited Checkpoint Charlie and looked from a platform onto the Berlin Wall and into East Berlin.[2]
After the dissolution of the Eastern Bloc and the reunification of Germany, the American guard house at Checkpoint Charlie became a tourist attraction. It is now located in the Allied Museum in the Dahlem neighborhood of Berlin.
Background
Sign at Checkpoint Charlie on the way into West Berlin, as it appeared in 1981
Emigration restrictions, the Inner German border and Berlin
Further information: Eastern Bloc emigration and defection and Inner German border
By the early 1950s, the Soviet method of restricting emigration was emulated by most of the rest of the Eastern Bloc, including East Germany.[3] However, in occupied Germany, until 1952, the lines between East Germany and the western occupied zones remained easily crossed in most places.[4] Subsequently, the inner German border between the two German states was closed and a barbed-wire fence erected.
Even after closing of the inner German border officially in 1952,[5] the city sector border in between East Berlin and West Berlin remained considerably more accessible than the rest of the border because it was administered by all four occupying powers.[4] Accordingly, Berlin became the main route by which East Germans left for the West.[6] Hence the Berlin sector border was essentially a "loophole" through which Eastern Bloc citizens could still escape.[5]
The 3.5 million East Germans who had left by 1961 totaled approximately 20% of the entire East German population.[7] The emigrants tended to be young and well educated.[8] The loss was disproportionately great among professionals — engineers, technicians, physicians, teachers, lawyers and skilled workers.[7]
Berlin Wall constructed
Main articles: Eastern Bloc emigration and defection and Berlin Wall
The brain drain of professionals had become so damaging to the political credibility and economic viability of East Germany that the resecuring of the Soviet imperial frontier was imperative.[9] Between 1949 and 1961, over 2½ million East Germans fled to the West.[10] The numbers increased during the three years before the Berlin Wall was erected,[10] with 144,000 in 1959, 199,000 in 1960 and 207,000 in the first seven months of 1961 alone.[10][11] The East German economy suffered accordingly.[11]
On 13 August 1961, a barbed-wire barrier that would become the Berlin Wall separating East and West Berlin was erected by the East Germans.[9] Two days later, police and army engineers began to construct a more permanent concrete wall.[12] Along with the wall, the 830-mile (1336 km) zonal border became 3.5 miles (5.6 km) wide on its East German side in some parts of Germany with a tall steel-mesh fence running along a "death strip" bordered by mines, as well as channels of ploughed earth, to slow escapees and more easily reveal their footprints.[13]
Checkpoint
Soviet Zone from Checkpoint Charlie observation post, 1982
Checkpoint Charlie was a crossing point in the Berlin Wall located at the junction of Friedrichstraße with Zimmerstraße and Mauerstraße (which for older historical reasons coincidentally means 'Wall Street'). It is in the Friedrichstadt neighborhood. Checkpoint Charlie was designated as the single crossing point (on foot or by car) for foreigners and members of the Allied forces. (Members of the Allied forces were not allowed to use the other sector crossing point designated for use by foreigners, the Friedrichstraße railway station).[citation needed]
The name 'Charlie' came from the letter C in the NATO phonetic alphabet; similarly for other Allied checkpoints on the Autobahn from the West: Checkpoint Alpha at Helmstedt and its counterpart Checkpoint Bravo at Dreilinden, Wannsee in the south-west corner of Berlin. The Soviets simply called it the Friedrichstraße Crossing Point (КПП Фридрихштрассе, KPP Fridrikhshtrasse). The East Germans referred officially to Checkpoint Charlie as the Grenzübergangsstelle ("Border Crossing Point") Friedrich-/Zimmerstraße.[citation needed]
As the most visible Berlin Wall checkpoint, Checkpoint Charlie was featured in movies[14] and books. A famous cafe and viewing place for Allied officials, armed forces and visitors alike, Cafe Adler ("Eagle Café"), was situated right on the checkpoint.
The development of the infrastructure around the checkpoint was largely asymmetrical, reflecting the contrary priorities of East German and Western border authorities. During its 28-year active life, the infrastructure on the Eastern side was expanded to include not only the wall, watchtower and zig-zag barriers, but a multi-lane shed where cars and their occupants were checked. However, the Allied authority never erected any permanent buildings. A wooden shed used as the guard house was replaced during the 1980s by a larger metal structure, now displayed at the Allied Museum in western Berlin. Their reasoning was that they did not consider the inner Berlin sector boundary an international border and did not treat it as such.[citation needed]
Related incidents
Stand-off between Soviet and U.S. tanks in October 1961
Main article: Berlin Crisis of 1961
US M48 Patton tanks facing Soviet T-54 tanks at Checkpoint Charlie in October 1961
Soon after the construction of the Berlin Wall in August 1961, a stand-off occurred between US and Soviet tanks on either side of Checkpoint Charlie. It began on 22 October as a dispute over whether East German border guards were authorized to examine the travel documents of a US diplomat based in West Berlin named Allan Lightner heading to East Berlin to watch an opera show there, since according to the agreement between all four Allied powers occupying Germany, there was to be free movement for Allied forces in Berlin and that no German military forces from either West Germany or East Germany were to be based in the city, and moreover the Western Allies did not (initially) recognise the East German state and its right to remain in its self-declared capital of East Berlin. Instead, Allied forces only recognised the authority of the Soviets over East Berlin rather than their East German allies. By 27 October, ten Soviet and an equal number of American tanks stood 100 yards apart on either side of the checkpoint. This stand-off ended peacefully on 28 October following a US-Soviet understanding to withdraw tanks and reduce tensions. Discussions between US Attorney General Robert F. Kennedy and KGB[citation needed] spy Georgi Bolshakov played a vital role in realizing this tacit agreement.[15]
Early escapes
The Berlin Wall was erected with great speed by the East German government in 1961, but there were initially many means of escape that had not been anticipated. For example, Checkpoint Charlie was initially blocked only by a gate, and a citizen of the GDR (East Germany) smashed a car through it to escape, so a strong pole was erected. Another escapee approached the barrier in a convertible, the windscreen removed prior to the event, and slipped under the barrier. This was repeated two weeks later, so the East Germans duly lowered the barrier and added uprights.[16]
Death of Peter Fechter
On 17 August 1962, a teenaged East German, Peter Fechter, was shot in the pelvis by East German guards while trying to escape from East Berlin. His body lay tangled in a barbed wire fence as he bled to death in full view of the world's media. He could not be rescued from West Berlin because he was a few metres inside the Soviet sector. East German border guards were reluctant to approach him for fear of provoking Western soldiers, one of whom had shot an East German border guard just days earlier. More than an hour later, Fechter's body was removed by the East German guards. A spontaneous demonstration formed on the American side of the checkpoint, protesting against the action of the East and the inaction of the West.[17]
A few days later, a crowd threw stones at Soviet buses driving towards the Soviet War Memorial, located in the Tiergarten in the British sector; the Soviets tried to escort the buses with armoured personnel carriers (APCs). Thereafter, the Soviets were only allowed to cross via the Sandkrug Bridge crossing (which was the nearest to Tiergarten) and were prohibited from bringing APCs. Western units were deployed in the middle of the night in early September with live armaments and vehicles, in order to enforce the ban.[citation needed]
Today: Tourist and memorial site
On the night of 9 November 1989 when a part of the Wall was opened
Although the wall was opened in November 1989 and the checkpoint booth removed on 22 June 1990,[18] the checkpoint remained an official crossing for foreigners and diplomats until German reunification in October 1990.
Checkpoint Charlie has since become one of Berlin's primary tourist attractions, where some original remnants of the border crossing blend with reconstructed parts, memorial and tourist facilities.
The guard house on the American side was removed in 1990; it is now on display in the open-air museum of the Allied Museum in Berlin-Zehlendorf.[19] A copy of the guard house and the sign that once marked the border crossing was reconstructed later on roughly the same site. It resembles the first guard house erected during 1961, behind a sandbag barrier toward the border. Over the years this was replaced several times by guard houses of different sizes and layouts (see photographs). The one removed in 1990 was considerably larger than the first one and did not have sandbags. Tourists used to be able to have their photographs taken for a fee with actors dressed as allied military police standing in front of the guard house but Berlin authorities banned the practice in November 2019 stating the actors had been exploiting tourists by demanding money for photos at the attraction.[citation needed]
The course of the former wall and border is now marked in the street with a line of cobblestones.[citation needed]
Former Berlin Wall marker
An open-air exhibition was opened during the summer of 2006. Gallery walls along Friedrichstraße and Zimmerstraße give information about escape attempts, how the checkpoint was expanded, and its significance during the Cold War, in particular the confrontation of Soviet and American tanks in 1961. Also, an overview of other important memorial sites and museums about the division of Germany and the wall is presented.[citation needed]
Developers demolished the East German checkpoint watchtower in 2000, to make way for offices and shops. The watchtower was the last surviving major original Checkpoint Charlie structure. The city tried to save the tower but failed, as it was not classified as a historic landmark.[citation needed] Yet, that development project was never realised. To this day,[when?] the area between Zimmerstraße and Mauerstraße/Schützenstraße (the East German side of the border crossing) remains vacant, providing space for a number of temporary tourist and memorial uses. New plans since 2017 for a hotel on the site stirred a professional and political debate about appropriate development of the area. After the final listing of the site as a protected heritage area in 2018, plans were changed towards a more heritage-friendly approach.[20]
BlackBox Cold War Exhibition
The "BlackBox Cold War" exhibition has illuminated the division of Germany and Berlin since 2012. The free open-air exhibition offers original Berlin Wall segments and information about the historic site. However, the indoor exhibition (entrance fee required) illustrates Berlin's contemporary history with 16 media stations, a movie theatre and original objects and documents. It is run by the NGO Berliner Forum fuer Geschichte und Gegenwart e.V..[21]
Checkpoint Charlie Museum
Checkpoint Charlie Museum
Near the location of the guard house is the Haus am Checkpoint Charlie. The "Mauermuseum - Museum Haus am Checkpoint Charlie" was opened on 14 June 1963[citation needed] in the immediate vicinity of the Berlin Wall. It shows photographs and fragments related to the separation of Germany. The border fortifications and the "assistance of the protecting powers" are illustrated. In addition to photos and documentation of successful escape attempts, the exhibition also showcases escape devices including a hot-air balloon, escape cars, chair lifts, and a mini-submarine.
From October 2004 until July 2005, the Freedom Memorial, consisting of original wall segments and 1,067 commemorative crosses, stood on a leased site.[22][23]
The museum is operated by the Arbeitsgemeinschaft 13. August e. V., a registered association founded by Dr. Rainer Hildebrandt. The director is Alexandra Hildebrandt, the founder's widow. The museum is housed in part in the "House at Checkpoint Charlie" building by architect Peter Eisenman.[citation needed]
With 850,000 visitors in 2007, the Checkpoint Charlie Museum is one of the most visited museums in Berlin and in Germany.[24]
In popular culture
Checkpoint Charlie figures in numerous Cold War-era espionage and political novels and films. Some examples:
James Bond (played by Roger Moore) passed through Checkpoint Charlie in the film Octopussy (1983) from West to East.[25]
Checkpoint Charlie is featured in the opening scene of the 1965 film The Spy Who Came in from the Cold (starring Richard Burton and Claire Bloom), based on the John le Carré novel of the same name.
In the feature film Bridge of Spies, imprisoned American student Frederic Pryor is released at Checkpoint Charlie as part of a deal to trade Pryor and U-2 pilot Francis Gary Powers for convicted Soviet spy Rudolf Abel. Pryor's release happens offscreen while the trade of Powers for Abel takes place at the Glienicke Bridge.
It was depicted in the opening scene of the film The Man from U.N.C.L.E (2015).
The 1985 film Gotcha! includes a scene where the protagonist (Anthony Edwards) transits through Checkpoint Charlie into West Berlin.
Elvis Costello mentions Checkpoint Charlie in his hit song "Oliver's Army".[26]
See also
List of tourist attractions in Berlin
References
"A brief history of Checkpoint Charlie". Archived from the original on 19 March 2022. Retrieved 19 March 2022.
Andreas Daum, Kennedy in Berlin. New York: Cambridge University Press, 2008, pp. 134‒35.
Dowty 1989, p. 114
Dowty 1989, p. 121
Harrison 2003, p. 99
Maddrell, Paul (2006). Spying on Science: Western Intelligence in Divided Germany 1945–1961. Oxford University Press. pp. 56. ISBN 978-0-19-926750-7.
Dowty 1989, p. 122
Thackeray 2004, p. 188
Pearson 1998, p. 75
Gedmin, Jeffrey (1992). "The Dilemma of Legitimacy". The hidden hand: Gorbachev and the collapse of East Germany. AEI studies. Vol. 554. American Enterprise Institute. p. 35. ISBN 978-0-8447-3794-2.
Dowty 1989, p. 123
Dowty 1989, p. 124
Black et al. 2000, p. 141
Blau, Christine (6 November 2014). "Insider's Guide to Cold War Berlin". National Geographic. Archived from the original on 20 October 2022. Retrieved 2 November 2018.
Kempe, Frederick (2011). Berlin 1961. Penguin Group (USA). pp. 478–479. ISBN 978-0-399-15729-5.
Dearden, Lizzie (7 November 2014). "Berlin Wall: What You Need To Know About the Barrier That Divided East and West". The Independent. Archived from the original on 4 April 2018. Retrieved 16 September 2017.
"Media battle ensues following the death of Peter Fechter". www.axelspringer.com. Retrieved 6 September 2023.
"June 22, 1990: Checkpoint Charlie Closes". ABC News. Archived from the original on 2 February 2012. Retrieved 21 June 2011.
"Allied Museum Berlin". Archived from the original on 21 June 2008.
Eddy, Melissa (5 February 2019). "At Checkpoint Charlie, Cold War History Confronts Crass Commercialism". The New York Times. Archived from the original on 11 February 2019. Retrieved 11 February 2019.
"Black Box Cold War". www.berlin.de. 25 May 2016. Archived from the original on 15 October 2019. Retrieved 15 October 2019.
"Berlin Council Targets 'Checkpoint Charlie' Memorial". NPR. Archived from the original on 26 January 2018. Retrieved 5 April 2018.
Checkpoint Charlie: Between Memorials and Snack Bars. In: Sites of Unity (Haus der Geschichte), 2022.
"Museen in Berlin: Die Top Ten – 4. Platz 4: Mauermuseum - Haus am Checkpoint Charly". www.berlin.de. 4 July 2014. Archived from the original on 7 November 2017. Retrieved 6 November 2017.
"Bond's Border Crossing (Checkpoint Charlie) – James Bond Locations". www.jamesbondmm.co.uk. Archived from the original on 16 May 2012. Retrieved 18 November 2011.
Elvis Costello – Oliver's Army, retrieved 7 January 2023
Sources
Black, Cyril E.; English, Robert D.; Helmreich, Jonathan E.; McAdams, James A. (2000), Rebirth: A Political History of Europe since World War II, Westview Press, ISBN 0-8133-3664-3
Daum, Andreas, Kennedy in Berlin. New York: Cambridge University Press, 2008, ISBN 978-0-521-85824-3.
Dowty, Alan (1989), Closed Borders: The Contemporary Assault on Freedom of Movement, Yale University Press, ISBN 0-300-04498-4
Dowty, Alan (1988), "The Assault on Freedom of Emigration", World Affairs, 151 (2)
Harrison, Hope Millard (2003), Driving the Soviets Up the Wall: Soviet-East German Relations, 1953–1961, Princeton University Press, ISBN 0-691-09678-3
Pearson, Raymond (1998), The Rise and Fall of the Soviet Empire, Macmillan, ISBN 0-312-17407-1
Thackeray, Frank W. (2004), Events that changed Germany, Greenwood Publishing Group, ISBN 0-313-32814-5
Anon Audio Chat 83
As requested by overwhelming demand from Patriots out there, Audio Chat 83 is the eighty-third of direct, fireside-style conversations hosted by SG, and intended to help empower YOU (We The People everywhere) with some of the knowledge/guidance we are all collectively seeking.
In Anon Audio Chat 83, SG sits down w/ peacemaker Sheriff Candidate Aldo Dibelardino, from Virginia Beach, VA USA, to talk ongoing efforts towards truth, law, and justice in our Republic.
Viewer Note: This discussion was purposefully grounded in content that the average "Normie" or Sleeper can relate to, identify with, and reconcile, and was presented through this lens intentionally.
It is worth remembering that much of what is "At Play" in the world right now is orchestrated, forced, or otherwise part of a much larger Back-and-Forth between Good and Evil. We are ALL in Good Hands.
SG on TruthSocial: @RealSGAnon
SG on X(formerly Twitter): @TheQNewsPatriot
_______________________________________
For More Information on the Content in the Chat, You Can Contact Aldo at the Links Below
(Website): Https://courtofpublicawakening.org
(Candidate Website): https://aldoforsheriff.org
(Flash Jury Website): https://flashjury.org
(Email): jstagg68@gmail.com
_______________________________________
For questions regarding the content presented here, scheduling with SG for a joint-broadcast or Patriot event, and general inquiries, please contact Laura or SG directly at theqnewspatriothelp@protonmail.com. Please allow up to 72hrs for an adequate response.
_________________________________
For further information on the various “Action Steps” that Patriots can take, please see below:
*Those affected by Medical Murder can File Whistleblower Accounts here: Email carolyn.blakeman@formerfedsgroup.org or go to https://formerfedsgroup.org/
*For a video archive of Maricopa County Arizona election fraud, go here: https://rumble.com/c/SaveMyFreedom/videos
*To explore potential countermeasures to C19 Vaccine Injuries, go here: https://quantumroots.us
*Advice on Investments/Financials During the Great Awakening: https://www.kepm.com/sg
*To Learn About the Post-WWII Secret Space Programs, go here: https://a.co/d/dcc8vu7
*How to Use Constitutional Grand Juries to Redress Public Grievances: https://www.amazon.com/Tactical-Civics-Life-Responsible-Americans/dp/1726298817
*Educational Material on Government Structure (USA): https://www.whitehouse.gov/about-the-white-house/our-government/state-local-government/
*To learn more about Surety and Indemnity Bonds backing so-called US "public officials", see Bonds for the Win: https://bondsforthewin.com
Smart aggroooo ~ Augmented Human Capabilities with Data Cubes.
Source: Nonvaxer420 on Rumble :)
Buy me a coffee if you want to support this channel:
https://www.buymeacoffee.com/fanaticvoyage
Video tags: Augmented Human Capabilities with Data Cubes, agro, aggroooo, Smart Goo, Nonvaxer420 , Nonvaxer420 on Rumble, Augmented Human Capabilities with Data Cubes, Augmented Human, Data Cubes.
Video Content Topics and Keywords To Further Best Describe This Video Includes Showing Supporting Information and Supporting material for the latest in;
Human 2.0, Human Hybrid, Biodigital Convergence, Transmogrify Humans, Directed Evolution of Humans , Synthetic Biology , Biorevolution , Bio-revolution , SynBio , Inoculation , dental anesthetics , Ognocaine, Com , Research clip, Independent biotech experts , Human Modification , Bio Revolution , digital health system, Digital Government , School of , digital healthcare , Pol II , RNAP2 , Pol2 , RNAP 2 , e-health , Dr Love , telehealth , Switzerland, Operation, Geneva, Zurich, covid , medical , pharmacy , Plasmid replication , DNA looping ,Frontline Doctors, Mike Yeadon , Steve Kirsch , Sherri Tenpenny , Robert F. Kennedy Jr , Robert Malone , Paul Alexander , Ryan Cole , Reiner Fuellmich , John Campbell , John O’Looney , Simone Gold , Ron Johnson , Dr Eddy Bettermann , Peter McCullough , Lee Merritt , Richard Hirschman , Pierre Kory , Dolores Cahill , Scott Atlas , Edward Dowd , Carrie Madej , Alex Jones , Eddy Bettermann , Larry Palevsky , Christiane Northrup , Sucharit Bhakdi , Dr Sucharit Bhakdi, Dr. Sucharit Bhakdi, Dr. Bhakdi, Dr Bhakdi, M3, FOX News, EPISODE , Globalist Elite Cabal, Highwire, Hate Speech, Cyber attack, Florida Ban on , Social Media, COVID Apologists, Quectel , Bill Maher Goes , United Kingdom , MODERNA BIOTECH SPAIN, S.L., HP , Natural Products, Supplements, Minors, integration host factor , IHF , younger, Systematic , π , Florida ban, Social Media, April 4, 2024, Shawn Buckley, LLB, Dicky Barrett, Canada, Edward Bernays , Propaganda , Propaganda report , REALITY BITES, Crispr, C. Elegans, Advanced Institute of, Elegans, Parasite, C Elegans, medicine for , Lonza , mRNA-1273 , BRCA1 , BRCA 1 , Wilfredo Stokes Baltazar , Wilfredo , Stokes , Baltazar , Deep State, Shadow Government, Digital Governance , , digital healthcare provider, ai , Tucker Carlson, reporting, RNA Tagbits, Tagbits, Cell tagbit , cctv , immune system supplements, field work , calibration , flowmeter , loci, Furin cleavage site, environmental monitoring , technician life , aliphatic , fatty acids, aliphatic amines, paraffinic , Nasal Swab, hanitizer, Banks, sanitizer, Surfactant, Surfactants, biochemistry, control system , field instruments , toolporn , rpm , Claus Schwab, ICD-10 codes , ICD-10-CM , DICOM , FHIR , HL7 , PoC , PoC Device , Klaus Schwab, CMOS Device , CMOS Implants , CMOS , MEMS Devices , NEMS Devices , LATERO Device , LATERO , for human use , Responsible Person , TERA , ThW , biotechnology , Len Ber , Dr Len Ber , Lenber , Wikileaks , America , Sasha Latypova , Lipid A , synthetic derivatives , aluminium hydroxide , aluminium phosphate , calcium phosphate , Fulleren , Locus , Loci , Electron-donating , Polycyclic , Aromatic π-materials, Hole transporters , p-type semiconductors , π-materials , electron-accepting , aromatic π-materials , electron-transport , n-type semiconductors , Julian Assange, Assange, Joseph Ladapo , 882E , cell biology , lab , including, corals, sea anemones, zoanithids, copepods, lancelets , mg, ml, ELF, medical intervention, Pfizer-BioNTech, chemistry , FLCCC, biotechnology student , phospholipids, biology student , bio , biology memes , life sciences , DoDD 3000.09 , DoD Instruction 8500 , DoDD , Body as a Node , ByN , ICT networks , European central bank, Tokenization, Tokenomics, ECB, The Federal Reserve System, 1933, 1934, 1776, Bank Act, Martinsried, German, Dolin et al, Friedwald 1944, Henle and Henle, 1945, Eric Drexler , image motion is computed, Fly Motion Visuals, Synaptic Neurons, Neuron Directional, Necrosis, oil emulsion adjuvants, Salk et al, Miller et al, Grayston et al, Morein et al, T4 Selectivity, T5 Selectivity, T4 cells, T5 cells, Visual navigation in flies, How Flies Compute their Motion Visuals, neet , bioinformatics , covid , zoology , microscope , passive diffusion, medical implants, Invasive treatment, non-invasive, implants , frequency devices, frequency device , Maria Zeee, Zeee, Zeee Media, , vaksin , CBRN defense , CBRN , medical devices , radiological , innovations in , orthopaedics , repost , surgeons of instagram , trauma , surgeons , uk supplier , Embalmers, White Fibrous Clots, Secret societies, the deep state, the United Nations, Alpha , Beta , Gamma , Delta , Omega , saponin adjuvant, Saponin, Quil-A , Molecular virology , the global cabal, Patrick Wood , technocracy , Technocracy.news , Illuminati, the Vatican, the Catholic church, VA, The VA, the pope , Vivek Ramaswamy, Vivek , the global world order, one world government, Vaccine adjuvants, HydraSpace technology , HydraSpace , GlycoConnect , Synaffix , GlycoConnect™ , HydraSpace™ , adjuvant manufactures , adjuvants for , Sonovue™ , uk distributor , gbmfg , sbot , surgery , medical innovation , immune system drugs, uk mfg , actonfinishing , DeVries et al, Lovgren et al, medical equipment , 19F NMR , HAXON Microscope, Haxon La Quinta Columna, LQC, HAXON , metal finishing , tech-medical , tech medical br , ERC-1155, ERC-721, ERC1155, ERC721, implant surgery , Colombia, 7th Floor Group, Edgar, Hoover Building, Quantum Dots, AD, Semiconductor, Medical device, Wearable device, stretchable electronics, dermal patch, non-invasive, invasive treatments, surgical implant , super soldiers, Ministry of Defense, uoc uk , sbq , nano , RNA, DNA, PEG, Genotoxic, dental, Bupivacaine , Lidocaine , Mepivacaine , Prilocaine , Butanilicaine , Cinchocaine , Etidocaine, Articaine , Ropivacaine , Levobupivacaine , radioisotopes, radioisotop, radioceuticals, Graphene Flagship program, Therapeutics, Pharmaceuticals, Pharma, Daphnia, Big Pharma, WHO, IMF, Securities Act of 1933, Securities Act of 1934 , World Bank, 1934 Securities Act, 1933 Securities Act, Government, Young Global Leaders, Graphene Flagship, Dr Zelenko, EU Parliament, European Commission, EU, Horizon 2020, Horizon 2030, H2020, H2030, Brainmaster , Unconventional warfare, Asymmetric warfare, Washington DC, DC , WA , NBIC warfare , NATO , Russia , Ukraine , ng , g , Ukraine War, Russia Invasion, Digital health certificate, Covid passport , Mask, Mask wearing, Face Diapers, legal matter, Social distancing, Lockdown measures, freedom, slaves, Elites, Politicians, Academia, Corrupt, modelling, Dataset, Select Set , 1984, Huxley, Brave New World, DAVOS, Famous, Famous for , HPLC, The Highwire EPISODE, 2024, WEF, World Economic Forum, Bill Gates, Pfizer, Moderna, Pfizer vaccine, Moderna vaccine, Bill & Melinda Gates Foundation, Microsoft, Patent 060606, The High Wire, Mark of the Beast, Mark of Satan, Mos, Mosf, Mos-2, Codon tagging, Codon tags, High Wire, Evil, Surveillance, Post-marketing surveillance, EMA, EUA, Authorization, EUA Authorization, Guidelines, Protocol, protocols, Symbolic, Final , guideline, official statement, Official duty, Gov, Govern, health , healthtech , state-orchestrated , Israel Defense Forces, IDF, Edge , Nudge, CORE, Open-access research , Emergency use authorization, Informed consent, Mandates, Lockdown, , science and technology , Science and Art, Cestui Que Vie , Cestui Que Vie Trust, Lawfare , Gaza , Hamas , Rebels , Israel , Watchdog , nano ceramic , robotics , chemical engineering , manufacturing , RFID , ISO , ISO Code , ISO 15693 , detailing world , computer science , nanoscience , nems , Zelenko , Zelinsky, Treatment for, Natural remedy, Serum, Farmakopia, 333 , Game, Gaming, Gamers, Vietnam , mems , Includes , Integrates Plasmodium , Jefferey Jaxen, Del Bigtree, Rowling, mercury, Venus , Saturn , Moon , Jupiter , Mars , lol , memstagram , ix , 777 , NEMS, Bio-NEMS, synbio , Covid19 Death shots, igem , um, kg, kilo, K , bio-engineered Agrobacterium, synbioid , Niomics, Intracellular, 5G, 6G, And Beyond , Frequency , Tesla , Dr. Rife , Rife , Rife frequency treatment , Rife Frequencies , Health officials, Unlawful, Tyranny, Totalitarian, Overreach, Don't thread on me, Movement, Anti-establishment, icd10cm , Y36 , Y35 , Biotechnology found in foods, Biotechnology found in vaccines, Biotechnology found in Beverages, Chemical analysis, Medical Tyranny, Health codes, Mueller Matrix , Health regulations, 420 , 402 , Fluids , Haemophilus, influenzae type b, influenzae Type A, 5 Star , Curated, WHO treaty, World Health Organization, WHO prepardnes Treaty, WHO Health Regulations, Declaring Pandemics, Unvaccinated , Unjabbed , Anti-vaxxer, Anti-vaxer , Statistical evidence, Annontation, annontation pipelines , Genomic Pipeline , PFIZER PHARMACEUTICALS, Genome view, Genomic databases, In-silico , In-vivo , In-vitro , genomeediting , editing , gene , edit , enzymes , genome , organism , Synthetic , Synbio indonesia , crispr , team , igem hq , igem collaboration , mr iirs , synthetic biology , systems biology , iGEM , Synbio Europe , Harvard Study, Johns Hopkins , Maryland , Colorado , Pro- , Delaware , Hypnosis, ID2023, Culombia, mRNA flu shots, Nuremberg Code , biotechnology , viral capsid, viral capsid antigens, non-viral , non-viral amphipathic antigens, human vaccination, as part , in part , ISCOM's, rabies, gp340, EB-virus, gp120 HIV, technology , genetics research, design , genetic engineering , biotech , BioNTech , synbio indonesia , crispr , Haemophilus influenzae type b , bacteria , bacteria , Does a , 1st, 2nd, dosage, dose , Do The , covid , Covid-19, C10, Vaccine, Vaccines , Covid mRNA Vaccine , Covid mRNA Shot , Immunization , antibodies, research report , scientific findings, Chemspider , Bing Search , Biotech researchers , Nano , Nano world, NIH , CDC , FDA , Fauci , Dr. Collins, Ecohealth Alliance, Ecohealth, Baric, Barbaric, Chappel Hill, Genocide, Bioweapon, Injections, Biowarfare, hybrid, hybrid warfare, human 2.0. The Great Reset, Schwab, Charles Schwab, Dr Joseph Ladapo , PCR , Covid testing, Vax , Shot , Death shot , Clot shot , Bioweapon injections, DoD , State University , DARPA , URLLC , URLLC Event 201 , Pandemic , CNN , NSNBC , Bloomberg , BBC , BBC News , BBC Propaganda , Plandemic , on Fox, Biotechnology used, Laboratory , microbiologist , bacteriophages, isotropic, radiology, radiologics, lab , Genome Frequencies, Rev. 2, Rev 2, LgF, IgF, Fight , coronavirus , germs , microbial species , fungi , mycelium, ceramic, antiseptic, laboratory testing, Lab Test, Compound, Agent, Substance, Species, Chimera, Chimeric, Chimerical , Chimeras, T-CAR therapy, T-CAR , Pegylation, Pegylated nanoparticulates , Proteins , SPIONS , PRIONS , Disease , Sickness , SARS-COV-2, Simian Virus, Virus made in biolab, Lab-made , man-made , Escape, peer-reviewed papers, Swift , repository, GitHub , The Lancet , Biorivx , Live viruses, mRNA Technology , mRNA Platform , de novo mutations, de novo synthesis, Personalized Medicine , DNA Profile, DNA sequencing, DNA Frequence, URLLC network , IoT URLLC , EHR, Health registry, Electronic Health Registry, microscopy , microscopy findings, QD, Qdots , Spine, Spiral , Phages, Macrophages , Lymphocytes , Blood Cells, Plasma, Viruses, Bacterial infection, HIV, HIV-1, Tony Fauci, Main Stream Media , Media lies, American Frontline Doctors , NEVER FORGET , Search engine, Lockstep , Global operation , Florida Surgeon General, Florida , Texas , LA , NY , Freedom movement, Freedom truckers, Injustice, Justice, Polymeric, Polyethylene Glycol, PEI, PANI, PMMA; DAPI, ALEXA , County , Alexa488 , Siri , Luciferace , Luciferase proteins , Fluoricent , PFAS , PAF , Poly Aromatic Fluorides , Forever chemicals , pro-drug , Pro-drugs , Prodrug , Prodrugs , Gene therapy, DNA , Viruses , disinfection , Detox, Detox protocol, Podcast, FanaticVoyage, Fanatic Voyage, Fantastic Voyage, FantasticVoyage, Microscopic sample, Light field Microscopy , Light microscopy , Dark field Microscopy , Dark microscopy , Biosynthetic organism, Craig Venter, Human Genome, Human Genome Project, Institute, Orion, Greek mythology, Plato , Cognitive science, Neurotechnology, EMF, EMF weapons, Directed Energy Weapons, DEW, NBIC domain, Super soldiers, Artificial constructs, Fly, Vaccine schedule, Karen Kingston , Dr , MD , Carrie Maday , Jessica Rose , Stew Peters , Global news events, Trending news event , Senator Rand Paul , Rand Paul , News coverage , Alternative media, Alt Media , Groups , January 6 , 2021, 2022, 2023, Synthetic origin, Biosafety level, biosafety level 4, Gain of Function Research , Gain-of-Function Research , Gain of Function , Dual-use , Dual-use purpose , Battlefield , Military industrial complex , Stakeholders , Global health initiative, Global Alliance For Vaccine Initiative, GAVI , Rebel News , Aaron Siri , Plotkin , Donald Trump, Trump, Operation warpspeed, Mihalcea, Science debate , Podcast debate , Emerging , Future applications , Security, Radioactive drugs, insecurity, Unstable , Congress, House of Representatives, Senate hearing , Pony tail hearings, Micovic, Booster , Booster shot, Vaccine booster, Stopping transmission, Pfizer CEO, Pfizer Executive, Bourla, Health agencies, Green economy , Bioeconomy , Cryptocurrency , BTC , ERP , CRM , ETH , RIPPLE , Ripple effect , Cryptographic, Crypto , Altcoins , Token , Coinmarketcap , Lattice, Polymer matrix, etching, FIB , SEM , TEM , Electron microscope, EDX, Clinical outcome, Intra-body nano networks, IoT , Internet of Things , IoMT , Internet of Medical Things , IoBNT , Internet of Bio-nano things , nanonetworks, MESH, Mix , тут, Communication system, Innovations , Digitized , Implantable device, Point-of-care, Urgent care, Remote diagnostics , Health monitoring , Health screening, Bodily , Pertussis, Organs , Skin tissue , Tissue engineering , Polio , Measles, Superphyla, Rubella, Hydrogel , Hydrogels , Dermatology , Entropy , Ontology , Ovid metamorphosis, Ovid Metamorphoses, Transforming, Transmogrify, Transitioning, Drugs, Drug Prescription, Chain reaction, Long chain reaction, PCR Test, Nasal Swab, Cyborgs, Borgs, Genome taxonomy database, Genome taxonomy, Pets, Dogs, Cats, Rabies vaccine, Hepatit, Big Data, Reverse engineering, Reverse engineer, Spacecraft, Spaceship, UAP, UFO, HetNetShorts, Short Scientific Videos, Exclusive content, Paid Subscribers Get Extra , Stakeholder model, Stakeholder economy, Stakeholder Capitalism, Internal market, Secrecy, Black-ops, Psy-op, Department, Of medicine, of health, By , Ai, Ai-driven, Ai controlled, Biohacking, Cyborg, Brain-Machine Interface, NCI, Brain-machine, Neuro science, Government funded, Illegal, Kill, Killing, Innocent, kids, children, young, L-DOPA, Sequestration, school kids, Societal, Social pressure, ssDNA, modRNA; siRNA, sDNA, Genomic screening, Genomic sequencing, GAVI, MERCK, MDR, AIMDD, AIMD, Active Implantable Medical Device, IVMDR, Post-marketing surveillance, Phyla, superphylum, EU Law, Federal Law, International law , International treaties , SIC 8888 , SIC CODES , Ursula , food security , family protection , Criminals , Police , Interpol , CIA , FBI , Shadow government , deep state , Security State , Actors, Anthropology, anesthetics, 过 , Risk benefit reward, Nurses, Experimental Technology, Phase-1, Phase-2, Phase-3 Trial, Trial data, Desease of interest, The Elders Of Zion, Zion, LCB_4, MBG-B, DPANN, Pfizer documents, nursing homes, ventilators, masking kids, nonsense, nonsensical, medical board, medical profession, Metagenome, whistleblower, Administrators, Democratic party, Republican party, Democrats, ARMAN, Republicans, Climate change agenda, Right wing, radical left, Neo, Brainfog, Phsycological, Physiological, Phsycological effects, Adverse events, VAERS, Reporting system, V-SAFE, Crimes against humanity, Censor, Censoring, with intent, pedriatics, Dentist, Dental, Ivermectin, Zink, EDTA, Chelating, Vitamin-d, Vitamin D, Long-covid, Repevax Vaccine , Repevax , Drama, Diphtheria, Vaccine-induced, Vaccine side effects, Medical Data, Electronic Health, Et al, Reducing symptoms, Immune system, Immune respons, Foreign proteins, HEK-293, stakeholder group, Embryo, Blood infusion, Doctors visit, The Highwire, Compilation, Compilation video, Video clips, Insane, Mad, Crazy, Karen, Heart problems, Dendrimer, neurons, synapses, synapsis, cortex, frontal, body area, Micelles, Polymer, Death certificates, Integrated biology, Embedded nanotech, DOMS Sensors, DOM Sensors, Neutrino Lab, emmulsion, env technology, envelope technology, Drug carrier, Blood Brain Barrier, BBB, Encapsulated load, vorticellas , Hadesarchaea, SV40, SV40 Promoter, V40 , Lipid Nanoparticle, LNP, Microbubbles, MB, Nanobubbles, Sonification, Digital Optical Modules, DOM, MRI, Radiation, Radiation sickness, New World Order, Reagan, Eisenhover, Thatcher, Lincon, Cult, Cult-like, 5G Towers, Military operation, Mobiles, Cell phone, Nano Domestic Quell program Dossier, Van der Waals, Nano Domestic Quell program, Nano Domestic Quell, Nano Quell report, Nano Domestic Quell report, Nano Quell, Intentional release, Pathogen, Leathal pathogen, Patient, Trust, Misuse, Marsarchaeota, Appropriation, Trial, Legal cases, Fight for Freedom, Freedom lovers, Free speech, US Constitution, Rights, My Body My Choice, Hysteric, Animal farm, Future dystopia, Future scenario, Future prediction, Future technology, Technology application, Innovative solution, 442 , Free , Mortality, Infertility, Infertility rate, Mortality rates, Proof, Statistical proof, Anomaly, Figures, numbers, health insurance, CBDC, Central Bank Digital Currency, Canada, Australia, Covid restrictions, Humanitarian, Human rights, Bodily Autonomy, Regenerative art, Photography, Photos, Photo , 了, 的 , Vial, Vials, Vaccine vials, Japan, Advisory Panel, Stew Peters Network , Coronavirus, MERS, Osaka, Legemiddelverket, Serum, Ebola, AIDS, Sandoz, AstraZeneka, BioNtech, Oxford, Vaccine development, Anyone , His , Her , Him , She , They , Them, Science experiment, Chemotherapy, Medical intervention, Vaccination campaign, CBER , IC, Video of , Video with , Video showing , Video material , video footage , Undercover journalism, Legal authority, Legal rights, Statutory, Statutes, Order, Claiming, Horrific, Incredible , Loving , Caring , Kindness, Solfeggio, Fibonacci sequence, Fibonacci, Nostradamus, Predictions, Predict, Believes, Securities, SEC Filing, Security Exchange Commission, QR Code , QR , Code , QR scan , Transformative, Transformation, Great Reset, follow , memy , Why is it , Who is , video from , Video showing , Video proving , Video implying , military privatization, autonomous weapons, targeted killing, neurowarfare, paramilitary operations, Devestating, Unbelievable, Discovers , Discovery , undercover reporting, Project , Program , Project funding, Confiscation, FED , Nationwide, Nation States, US States, States in US, United States of America, Global companies, NASA , Intelligence community, Intel on, Failed, Mass Psychosis, Failure, Leaders, Photonic, Photonics, Microfluidic, Microchip, Nanochip, humor , Panama Papers, WBAN, WIFI, Bluetooth, MAC, MAC Emitting individuals, Demonic Intent, Propaganda, Ministry of Truth, Trudeau, Organized, Someone, Student, University, Discrimination, Racism, Synthetic filaments, bio-sensors, Local Area, NIL, FIB, Grafting, Etching, Focused Ion Beam Scattering, Organs-on-a-Chip, Rain-on-a-Chip, Quantum Dots, Silica Spheres, Au, An, Ti, Si, Mg, EC, CE, Metal Organic Framework, Parasites, что, Poisoning, Poison, mediated, Gross negligence, Fungus, sp , Herpes, World data, Effective Treatment, Graphene detox, Crispr gene editing, Cas9, CRISPR, CRISPR Technology, Genomics, Micromachines, 呢 , ACS Nano, Active colloids, adaptive nanoparticles, COF's, COF structure, Self-assemble, mimetic, Van der Waals Materials, msakni , youssef msakni , Rheology, Fundamental theory, computations of interfacial, Polymer, Upcycling, Polymer Upcycling, Interface and Colloid Science, Antifa, Immigration, CrossRoads, Joshua Philipp, Epoch TV, Epoch Times, Web of Science, SCIE, Scopus, CAS number , CAS , INSPEC, EBSCOHost, SwetsWise, Portico, Geopolitical News, Knowing, The Enemy, The Order Of , Illuminati, Ideology, Art Of War, ACSnano, Advanced Materials, Functional materials, Atomic level, Transcription, Translation, Virus transmission, Virulence, Viral, Going viral, Social media, Blackout, Breaking news, Unveils , Release , On Camera saying, Camera, Video proof , Potential, Abuse, Abusive , Shedding , Infecting , Mutating , Covid mutant, Going viral, Mutant variant , Covid Variant , Omicron, Delta, Omega, Paclitaxel, Remdesevir, Pharmacy, Causality, Causation, Linkage, Cross-linked , Cross-linked bacteria , CLN , CNT , Carbon nanotube , Single celled nano wall , United States Atomic Energy Commission, United States Atomic Energy Agency, AEA, AEC, deposition, electroporation, Conductive material, Hybrid material, Science Journal, Epidemiology, Public Health, Hard hitting, Going viral, Moderation of speech, Ai Assistant, Ai Buddy , Tablet, Talent, Pill , Nutraceuticals , Cationic , Anionic , Tectonic , Plasmonic , Sonofication , Colloidal Silver, Gold , Minerals, hydrocarbon tail surfactants, hydrocarbon, tail surfactants, Vitamins, Cancer, Tumor, Archaea, Mammals, Procryotic, Eucryotic, Hydrophobic, Lipids, Engineered Lipids, Half-life, Demonstration, Demonstrations, Red-pilled, Birx, Investigation, Attorney General, Sheriff, Local authorities, Virus made in biolab, Lab-made , man-made , Escape, Swift , NTNU , IEEE Presentation , IEEE Webinar , IEE paper, IEEE Researchers, Green New Deal, AOC, The Squad, Published in , PubMed , Article , Review, record and process , Tutorial , Learn How , MEDLINE , The Lancet , Biorivx , mdpd , Journal of , IEEE , Live viruses, Extremophiles, Folding proteins, Folded proteins, PRION Disease, Rise in cancer, Birth defects, Adulterated product, Dried blood sample, PVA , Polyvinyl Alcohol, PANI, PEI , PMMA PGLA , PA , PAA , PET , PEDOT , QBIT , Computing Humans, mRNA Bioweapon, Criminal liability, Claims, Breach of Contract, Clause, NEVER FORGIVE, Ralph Baric, Karen Kingston, Vanden bossche , Bossche , HeLa, memristor, SIV, SMV, Simian Monkey Virus, Saving lives, Spreading true information, Ions, Colloidal, David Martin , Dr. David Martin , Crystal, Crystal formation, Formation of, Additives, Food additives, Tracking device, Brain implant, Elon Musk, X, Tucker on X, TuckeronX, free speech platform, Rumble, Rumble.com , Toxic levels, Health risk, Contaminated, Contamination, Ingles, Idioma, Food supply, Water supply, Life, Live, Family, Friends, Parents, kids, Infected, Barcoding, Barcoding cells, News Media, Newspapers, Online news, SynBioBeta, Synbio Beta, Online sources, Hidden, Major Event, Catastrophy, Surveillance, Surveillance State, Big Brother, Photonic Crystals, Metamaterial, Professor, Prof. , International Atomic Energy Agency, IAEA, Helmar Krupp , ORAL , ADP-Ribose, remote monitoring , secure , Fumio Kodama , surveillance , sensor , cctv , lab work , biotech in biology , smart dust, aerosolized, restricted compounds, infectious disease, bioinformatics , inglês, zoology , microscope , medical implants , PFIZER PHARMACEUTICALS Inc, PFIZER PHARMACEUTICALS, Inc, implants , medical devices , repost , surgeons of instagram , trauma , surgeons , uk supplier , uk distributor , gbmfg , sbot , surgery , medical innovation , uk mfg , medical equipment , tech-medical , tech medical br , implant surgery , Quantum Dots, três , AD, Semiconductor, Medical device, Quatro , Wearable device, DK , DE , NO , SE , GB , stretchable electronics, dermal patch, non-invasive, invasive treatments, surgical implant , uocuk , sbq , nanotechnology , detailed , nano , RNA, DNA, PEG, Genotoxic, Therapeutics, Pharmaceuticals, Pharma, Big Pharma, WHO, IMF, Doze, World Bank, Government, Young Global Leaders, Graphene Flagship, EU Parliament, European Commission, debunked, debunking, EUH2020, Horizon 2020, Horizon 2030, H2020, like , funnymemes , instagram , H2030, Brainmaster, Unconventional warfare, Asymmetric warfare, NBIC, NATO, Russia, Ukraine, Act of , Ukraine War, Russia Invasion, Digital health certificate, Covid passport, Mask, Mask wearing, What is the , Social distancing, Lockdown measures, freedom, slaves, Elites, Politicians, Academia, Corrupt, nanotech , experimental COVID-19 shots , ceramic coating , JAMA , technology , nanotecnologia , modelling, 1984, Huxley, Brave New World, DAVOS, 2024, WEF, World Economic Forum, Bill Gates, Pfizer, Moderna, Pfizer vaccine, Moderna vaccine, Bill And Melinda Gates Foundation, Edwin Black, CHS, MS, Patent 060606, Mark of the Beast, Codon tagging, Codon tags, SUrveillance, Post-marketing surveillance, EMA, EUA, Authorization, Emergency use authorization, Informed consent, Mandates, Lockdown, Watson, IBM Watson, computer science , IBM Blue , nanoscience , e-numbers, 2 6, 6 2, 26, 62, Eco-health Alliance, fluorinated nanoparticles, nanoconjugates , Conjugated Drugs , Short Synthetic Peptides , COX-2 Inhibitors , Intra-host replication , In-host replication , Replication Defective , Mutating pathogen , Joe Rogan , leaky vaccine , Plasmid Replicons , PFAM Proteins, Replicons , PBRT system , DNAb , DNAa , primase , replisome , Dimer test , 06/2, 06/20, 02/06, 02/6, foods , Bizzini , Henle, Human species, Human subjects, D-dimer , vietnam , paris , explore , msakni , youssefmsakni , SRS, SSRI, Virology, depp, deep , Wang , viral vaccine, tunisia , Covax , phmpt , phmpt.org, tiktok , mems, NEMS, Bio-NEMS, synbio , synthetic biology , igem , Intelligent design, Theory, Theories, iGEM network, iGEM community, iGEM event, Video from , biotechnology , Make , Made , ellipsometric , ellipsometer technology , Ellipsometry , multisensory, sensor integration, Solid-state devices, multisensory neurons, neuromorphic computing, artificial Intelligence, natural intelligence, visuotactile neurons, photosensitive monolayer, monolayer MoS2, memtransistor, triboelectric , tactile sensors, bios , biotech , synbioid , Niomics, Intracellular, 5G, 6G, Computronium, Programmable matter, Programmable Materials, Frequency, Tesla, Dr. Rife, Rife, Rife frequency treatment, Vaccine makers , Health officials, Unlawful, Depopulation, Tyranny, Totalitarian, Overreach, Don't thread on me, Movement, Anti-establishment, Biotechnology found in foods, mRNA found in food, Contaminated food supply, Steve Kirsch, Biotechnology found in vaccines, Microbubbles found in Vaccines, Biotechnology found in Beverages, Chemical analysis , Biofield, Aura, Medical Tyranny, Health codes, Health regulations, WHO treaty, World Health Organization, WHO prepardnes Treaty, WHO Health Regulations, Declaring Pandemics, Unvaccinated, Unjabbed, Anti-vaxxer, Jessica Rose, Statistical evidence, Annontation, annontation pipelines, Genome view, Genomic databases, Expose-News, Daily Clout, In-silico , In-vivo , In-vitro , crispr , team , igem hq , igem collaboration , mr iirs , synthetic biology , systems biology , igem , synbio , biotechnology , biology , DoD Directive 5111.21 , Arms Transfer , Technology Release , Senior Steering Group , synbio indonesia , crispr , team , bioinformatics , Microsoft , Apple , bacteria , bacterial , Eternal Life, microbiology , virus , covid , Covid-19 , C10 , Vaccine , Routes of administration , Vaccines , Covid mRNA Vaccine , Atomic Energy Agency, Covid mRNA Shot, во , со , ли , whether , if , in , at , super, exact, Immunization, antibodies, research report , scientific findings, Chemspider , Biotech researchers , Nano , Nano world , NIH , CDC , FDA , Fauci , Dr. Collins , Ecohealth Alliance, Siemens , Ecohealth , Baric , Chappel Hill , Genocide , Bioweapon , Injections , Biowarfare , hybrid , hybrid warfare , human 2.0. The Great Reset , Schwab , Charles Schwab , PCR , Covid testing, Vax , Shot, Death shot, Clot shot, Bioweapon injections, DoD program , DARPA program , Event 201, Pandemic, Plandemic , biology gone wrong , microbiologia , bacteriophages, bacteria phages, Phages , search engine, isotropic, radiology, on video , raw footage , uncensored , radiologics , lab , coronavirus , ATP, germs , medicine , microscope , ZION, THE SEQUEL TO, microbes , fungi , laboratory testing , Compound , Agent , Substance , Species , Chimera, Chimeric , Chimerical , Pegylation, Pegylated , Proteins, SPIONS , PRIONS , Desease , Sickness, SARS-COV-2, Simian Virus, Virus made in biolab, philosopher Voltaire , Voltaire , Lab-made , man-made , Escape, Swift , The Lancet , 9/11 , 11/9 , Biorivx , Depp , DAPP , DAO , Live viruses, mRNA Technology , mRNA Platform , Personalized Medicine, DNA Profile, DNA sequencing, EHR , Health registry, Electronic Health Registry, microscopy , microscopy findings, QD, Qdots, Phages, Macrophages, self-replicating molecules , Lymphocytes, Blood Cells, Plasma , Viruses , Bacterial infection, HIV, HIV-1, Tony Fauci, Main Stream Media, Media lies, NEVER FORGET , Lockstep, Global operation, Florida Surgeon General, Florida, Texas, LA, NY, IcanX , Intelligent Soft Electronics , Healthcare Monitoring and VR , Intelligent Soft Electronics for VR , Soft Electronics for VR , Freedom movement, Freedom truckers, Injustice, Justice, Polymeric , Polyethylene Glycol , PEI , PANI , PMMA, DAPI , ALEXA , Siri , Ai Revolution , Ai in Health, Ai and Big data, Luciferase , Google , Luciferace , Fluoricent , PFAS', PAF's, PolyAromatic Fluorides , PAH's , Polycyclic aromatic hydrocarbons , Forever chemicals , pro-drugs , Drogas , gene therapy , treatment protocols, Hospital , Emergency room, Ambulance, Life-saving , Life-saving treatments , Treatment , scientist , medical , Young Global Leaders. corona , biotech , dna , viruses , VSRS, Kirsch, Kirsch podcast, event 201 video, disinfection , Detox, Detox protocol, Podcast, FanaticVoyage, Fanatic Voyage, Fantastic Voyage , FantasticVoyage , Microscopic sample , YouTube channel, genomics and genom, Light field Microscopy, Dark field Microscopy, IBM , Biosynthetic organism, Craig Venter, Human Genome, Human Genome Project, Institute, OG , Okey, Ok , Cognitive science, Altcoin, Neurotechnology, EMF, EMF weapons, ACE2 receptor, ACE2, Binding to ACE2, Directed Energy Weapons, DEW, DEW's, NBIC, Super soldiers, en , av , Artificial constructs, Fly, Vaccine schedule, Karen Kingston, Dr, MD, Carrie Maday, Tucker Carlson, Global news events, Solar Engineering, Dimming , Trending news, event , News coverage, Alternative media, Alt Media, Groups, January , February , March , April , June , July , August , September , October , November , Desember, 2019, 2020, 2021, 2022, 2023, Synthetic origin , Biosafety level, biosafety level 4, Gain of Function Research , Gain of Function Research , Gain of Function , Dual-use , Dual-use purpose , Atmospheric , Nós temos, Teamo, Te Amo, moneda , Amor, Battlefield, Military industrial complex, Global health initiative, på, Dr Akyildiz, ikke , har , å , Aaron Siri , Plotkin, Donald Trump, Trump's Operation warpspeed, Mihalcea, Podcast, Emerging, Future applications, Security, insecurity, Unstable, Geopolitics, Operation warpspeed, Geoengineering, Congress, House of Representatives, Senate hearing, Pony tail hearings, Micovic, Booster, Booster shot, Google search, Vaccine booster, Stopping transmission, Pfizer CEO, Pfizer Executive, Bourla, Health agencies, Green economy , Bioeconomy, Cryptocurrency, BTC, ERP, CRM, ETH, другой , RIPPLE, Token, BAN, Banned, Join, offer, students, Coinmarketcap, Lattice, Polymer matrix, etching, FIB, SEM, TEM, Electrion microscope, EDX, Clinical outcome, Intra-body nano networks, IoT, Internet of Things, IoMT, Internet of Medical Things, IoNT, Internet of Nano things, nanonetworks, MESH, Mix, Communication system, Innovations, Digitized, Implantable device, Point-of-care, PEG-Tailed , spherical micelles, disclike micelles, spherical PVA. micelles, disclike vesicles, vesicles, Urgent care, Remote diagnostics, Sabrina Davis, Health monitoring, Health screening, Bodily, Organs, Skin tissue, Tissue engineering, Hydrogel, Hydrogels, большой, non-polar solvents, Solvent, Solvents, hexane, toluene, Lipophilicity, Lipophilic, physicochemical, absorption, excretion, Half-life, pharmacokinetic, pharmacodynamic, ADMET, Drug discovery, drug development, Beta-glucosidase, non-polar solvents, Solvent, Solvents, hexane, toluene, Lipophilicity, Lipophilic, physicochemical, absorption, excretion, Half-life, pharmacokinetic, pharmacodynamic, ADMET, Drug discovery, drug development, Beta-glucosidase, β-Glucosidase, Beta-Glucosidase, Chemical properties, Dermatology, Entropy, Ontology, Ovid metamorphosis, Transforming, Transmogrify, Transitioning, transmitting graphene oxide, breath and skin, cf, blood of unvaxxed, , vaxxed parents, Drugs, Drug Prescription, Chain reaction, Long chain reaction, PCR Test, Nasal Swab, Cyborgs, Borgs, Pets, Substances, pre-licensure, Rabies vaccine, DTP vaccines, DTaP, DTaP vaccine, Hepatit, Big Data, Stakeholder model, Stakeholder economy, Internal market, Secrecy, Black-ops, Psy-op, Department, Of medicine, of health, By, Ai, Ai-driven, Ai controlled, Biohacking, Cyborg, Brain-Machine Interface, NCI, Brain-machine, Neuro science, Government funded, Illegal, virus-like particles, VLP, Adjuvanted, Adjuvants used in vaccines, Adjuvants, Adjuvants used, Kill, Killing, Innocent, kids, children, young, school kids, Societal, showing C. Elegans, c elegans, Protein Tagging, Jellyfish Protein, Social pressure, ssDNA, modRNA; siRNA, sDNA, Genomic screening, Genomic sequencing, GAVI, Polymerase Inhibitor, Polymerase, Inhibitor , Pharm Classes, Class , Poly(, Poly, polytail , PEG tail , Poly , MERCK , MDR , AIMDD Rev, AIMD , Active Implantable Medical Device, IVMDR, Post-marketing surveillance, EU Law, Federal Law, International law, International treaties, Ursula , food instability, A/S, GmBH, LLP, SpA, natural detoxification, LLC, healing pathways, Annua, Artemisia Annua, Wormwood, AS, NUF, Ltd, LLC, food security, family protection, Criminals, DoD Directive 2311.01 , DoD Law of War Program , Law Of War , Police, CIA, FBI, Shadow government, deep state, Actors, Anthropology, anesthetics, Dr. Yeadon, Dr. Merritt, Dr. Cahill, Risk benefit reward, Nurses, Experimental Technology, Phase-1, Phase-2, Phase-3 Trial, Corona Virus Vaccine, Recombinant vaccine, Trial data, Desease of interest, Pfizer documents, nursing homes, ventilators, Microbial Foods, Cornucopia , masking kids, medical board, medical profession, whistleblower , Administrators, surface antigen, NIBSC, UK, Toxicology, ACER, ACE, ACE-2 receptor, ACE-2, Binding to ACE-2, 相信我, Democratic party, Republican party, Democrats , Republicans , ICMRA , VRBPAC , Climate change agenda, Right wing , radical left, Brainfog, Psychological , Physiological , Pharmacological , Metabolic Reaction , Adverse events, VAERS , Reporting system, V-SAFE , Crimes against humanity, Antivaxxer, Censorship, Wang's universal constant , pedriatics, Dentist, Dental , Ivermectin , Zink , EDTA , Chelating , Vitamine-d, Vitamin D , Long-covid , Vaccine-induced , Vaccine side effects, Medical Data , ICD-10 Code Z2809 , ICD-10 Code Z2889 , Electronic Health, Documentary on Transhumanism, Korarchaeota, Thermoproteota, Elsevier , Aigarchaeota, Geoarchaeota, Nitrososphaerota, Bathyarchaeota, Eukaryomorpha, J. Giordano, Asgard , neuro-sensory augmentation devices, Odinarchaeota , Thorarchaeota , Lokiarchaeota , Helarchaeota , Heimdallarchaeota , Mitochondrial DNA, Chloroplast, DNA primer, 16S Ribosomal RNA, SSU rRNA, Proteoarchaeota, +α-Proteobacteria, Eukaryota, Reducing symptoms, Immune system, Immune respons, Faresignal, Hygiene products, Assessories, Foreign proteins, HEK-293, Embryo, Devs, same time, Maid, Void, Any, Blood infusion, Doctors visit, Compilation , Compilation video, Video clips , Insane , Mad , Crazy , Karen , Heart problems, Dendrimer, Dendrimers, neurons, synapses, synapsis, cortex, frontal, body area, Micelles, Polymer, Death certificates, Ovid Metamorphoses, Ovid Metamorphosis, Integrated biology, Nanoparticle vaccine, recombinant spike protein, Embedded nanotech, Integral part, emmulsion , env technology , envelope technology, Drug carrier, Blood Brain Barrier, BBB, Encapsulated load, SV40 , SV40 Promoter, Lipid Nanoparticle, LNP, Microbubbles , MB , MB's, 生命 , Nanobubbles, Sonification, Sunfellow, 你明白了吗, MRI, Radiation, Radiation sickness, 5G Towers, Military operation, Thor, Nano Qwell, Nano Quwell, ultracain, Intentional release, Pathogen, Leathal pathogen, Patient, Deal, Trust, Misuse, Dr John Campbell, John Campbell, Dr Campbell, Technometrics, Techmetrics, Tech Metrics, PAN, Personal area network, discriminatory topology, dimension theory, morphometrics, pattern recognition, Spatial , Temporal , Nuclear Physics, Arthur Raymond, Chief Engineer, Vacuna de Pfizer , Vacuna de Moderna , No Lo Se , Vacunas , Vacunar , Vacunados , Franklin Collbohm, iPSCs-neurons , hiPSC biology, organoid technologies , Organoid-on-a-Chip, neural circuitry, neural circuits, Brain organoid, Cerebral organoid, unlicensed LTE, Human Transformation, Z2889 , distributed antenna systems, DAS , Amoeba, Single cell organism, Hariolf Grupp, Devendra Sahal, A. J. Alexander, J. R. Nelson, B. M. Mitchell, RAND Corporation, Raytheon, Lepton, Muon, Electron , Gluon, SDM , Quark, Higgs Boson, Positron, Coccia, Small Cells, Cloud-RAN, CRAN , acs synthetic, Sacrificial, Sacrifice, Appropriation, Euryarchaeota, Trial, Legal cases, Legal case, Fight for Freedom, Freedom lovers, Free speech, Transparency , US Constitution , Rights , My Body My Choice, Hysteric, Animal farm, Future dystopia, people who, Future scenario, Future prediction, Future technology, Technology application, Innovative solution, Free , Mortality, Infertility, Infertility rate, Mortality rates, Active Implantable Medical Device Directive, Proof , Statistical proof, Anomaly, Figures, numbers, Nǐ gēn, CBDC, Central Bank Digital Currency, Weaponizable neuroscience technologies, Canada, Australia, Documentary about Transhumanism, Attack On Human Biology, Covid restrictions, Humanitarian, Human rights, Origami, DNA Origami, DNA microrobots, DNA Robot, DNA bots, Bodily Autonomy, Regenerative art , seen through a microscope, metallorgano framework, Radioactive isotopes, acoustic radiation, phonon scattering, thermoelastic effects, phonon viscosity , Photography, Photos , Vial, Vials, Danger of, Danger to, Vaccine vials, Japan, Advisory Panel, Coronavirus, MERS, Ebola, AIDS, Sandoz, Family, Nucleur Family, BrighteonTV channel, Brighteon TV, On Live TV , Broadcast , AstraZeneka, Bolag, BioNtech, GMBH, Oxford , Vaccine development, Anyone, Price, His , Her , Him , She , They , Them , Science experiment, société à responsabilité limitée, Società a garanzia limitata, Empresa, Bolag, Selskab, Selskap, Akyildiz , Firma, GmBH, Handelsregister, Commercial license, WHFIT , SICAV , ETF , UCITS , Kandel, Schwartz and Jessel , Biofouling, Foundry, Uptake , controlled release , Adaptive Colloids , repeated ethylene glycol units , CH2CH2O , battlescape , microbiome , UCITS ETF , MSCI , Luxembourg, Switzerland, SDG, UNDP, UNIDO, FAO, FN, FN systemet, UN System , Kongsberg Automotive, KOA , Chemotherapy, Medical intervention, Vaccination campaign, CBER , IC, Video of , Video with , Video showing , Video material, video footage , Undercover journalism, Color, Legal authority, Legal rights, Statutory, Statutes, Order , Claiming , Claim , Claims , Horrific , Incredible , Amazing , Love , Loving , Caring , Kindness , Believes , Securities , SEC Filing , Security Exchange Commission , StopWorldControl, mAbs, IgG antibodies, IgG, Transformative, Transmogrify, to user, to use in, substitute for, Transformation, Great Reset, Why is it , Who is , Norway , video from , Video clip showing , Video clip proving , M2 Matrix, Video implying , Is , Are , Devestating, Unbelievable, IEEE 802.15.6 , IEEE 802.0 , IEEE 802.1 , Discovers , Discovery, undercover reporting, Project , Program, Project funding, Confiscation, FED, Nationwide , Nation States, US States, States in US, United States of America, Global companies , NASA , Intelligence community, Walinsky, Anderson , Petersen, Debate, Intel on , Failed , emergent chronic illnesses, long covid, fatigue, infertility, Z2809 , miscarriages, cancers, diabetes, heart damage – myocarditis etc, blood clotting, string clotting, Mass Psychosis, Failure , Capsomere, Leaders , Photonic , Photonics, p24, Retroviruses, Microfluidic, on-a-Chip , Microchip, Nanochip, Soft Electronics for VR , VR Soft Electronics , WBAN, WIFI, Bluetooth , MAC, MAC Emitting individuals, Demonic Intent, Propaganda , IEEEEE, Pierdolic, Ministry of Truth, Trudeau , HetNet systems , HetNet Exclusive , HetNet Channel , HetNet Access , HetHet , ohälsa , HetHetExclusive , hälso , helse , helsa , hell , SA, ID Number, Psinergy , Stanford, Organized , Someone , Student , Biotronic , Dr. Akyildiz , telemonitoring, Abbott , Microport, Boston sc, Functional analysis, Declassified Government Documents, Declassified Documents , Diagnostic Catheter, electrostimulation, PES, Catheter device, Implantable Catheter, Platin, Platinum, Iridium, SINTEF, University, Discrimination, Racism, Uncensored, Against the world, EPIC video, Photo , Synthetic filaments, bio-sensors, BNS, BNB, Binance, stemcells, stem cells, Brundtland, Bio Nanosensors, Local Area, NIL, FIB, Grafting, Etching, Focused Ion Beam Scattering, Integrase, P24, Protease, Matrix Proteins, FIB, FIB's, Eugenics, Organs-on-a-Chip, rain-on-a-Chip, Quantum Dots, QD's, QD, Silica Spheres, Au, PMCPA ruling, PMCPA, PMC, PVP, PVS, PVC, An, Ti, Si, Mg, EC, CE, Metal Organic Framework, Parasites, Poisoning, Poison, mediated, ionic amphiphiles, Gross negligence, P17, Capsid, Fungus, sp, Herpes, World data, World In Data, Effective Treatment, Graphene detox, severe allergic reactions to vaccines, severe allergic reactions, allergic reactions, Allergy, Test, Examination, vaccine components, Vaccine patents, mRNA vaccine patents, Crispr gene editing, Cas9, CRISPR, CRISPR Technology, Genomics, Alternatives to, Micromachines, ACS Nano, ACSnano, Advanced Materials, Functional materials, Atomic level, Transcription, Translation, Virus transmission, Virulence, Viral, Going viral, Gp120, Gp41, p53, Social media, Breaking news, Prof, Unveils, Liposomes, nanoliposomes, Release, On Camera saying , Conversation, classified Government Documents, classified Documents, Roundtable, discussing , Oui , Le , La , non , tu , vous, un , Camera, Video proof showing , Camera Occulta, Potential, Abuse, Abusive , Glycoprotein, Shedding, Infecting, rsa conference, , Conference, Mutating, Covid mutant, Mutant variant, Strands, Strains, Stained, Covid Variant, Omicron, Delta, Omega, Paclitaxel, Remdesevir, Pharmacy, Causality, Causation, Linkage, Cross-linked, Cross-linked bacteria, CLN, CNT, Carbon nanotube, Single celled nano wall, Single celled wall, deposition, electroporation, Story , Conductive material, Hybrid material, Science Journal, Scheme , Plot , Seen in video , DoD Directive 1322.18, Military Training , Seen on TV, Epidemiology, FRITT, Solar Geoengineering, Geoengineering, 我不喜欢 , Weather modification, Weather Modification Program, Dim Earth, Dimming Sun, et.al, Langmuir, Public Health, Hard hitting, Ian Akyildiz, Going viral, они , Moderation of speech, Ai Assistant, Das, Ai Buddy, Tablet, Pill, Nutraceuticals, Cationic, Anionic, Tectonic, Plasmonic, Sonofication, FaceBook, FB, YT, I, Colloidal, Colloidal Silver, Gold, Minerals, Vitamins, Cancer, Tumor, Die, Nicht, Archaea, on tape, quadrivalent flu vaccine, exposing criminals, R.Y Pei, C. M. Francisco, Mammals, SCAM, cryogenic, Finland, Eucryotic, Video Loop, former CIA, officer, Fabeeo, Hydrophobic, Lipids, Engineered Lipids, Tactile, Half-life, Demonstration, Demonstrations, Red-pilled, Birx, Take, Investigation, Loop Sticker, Loops sticker, Bovine serum albumin, BSA , lysozyme , Synthetic albumin , Attorney General, Sheriff, Local authorities, Virus made in biolab, Lab-made, man-made, Escape, Swift, BlackRock, Black Carbon, Carbon Black, IEEE Presentations, IEEE Webinar, IEEE papers, IEEE Researchers, IEEEE, Published in, Product ID, SKU, MPN, GTIN, UPC, ISBN, EAN, EAN-13, GUDID , Conjugate, Conjugates, Immunoblotting, Methylated, Methylene blue, chemical compound, Nootropic, clifford carnicoms, Carnicom , Carnicom research, SEM images, TEM images, Xenobiotic compound, Xenobiotics, Live viruses, 很好 , The Lancet, Biorivx, mdpd, Journal of, IEEE society , FEDs, SWAP, Prisoner of war, Art of War, Jailed, Killed, jabbed, Extremophiles, Ovid metamorphoses, Metamorphoses, Ovid, Covidian, Draconian, Outside, vMAT, In the Sky, as seen on , SkyNet , similar to , Identical to , Other , Different , Major , Nuts, Euryarchaeota, Nanohalarchaeota, Halobacteria, Korarchaeota, epic move , EPIC Moment , Thermoproteota, Aigarchaeota, Geoarchaeota, bar-Ilan, bar-Ilan University, Nitrososphaerota, Bathyarchaeota, Eukaryomorpha, J Giordano, James Giordano, Giordano, R & D, Asgard, Odinarchaeota, Thorarchaeota, Lokiarchaeota, Helarchaeota, Heimdallarchaeota, Eukaryota, Infinite Lifespans, Grand Challenge, Mainstream research, Mindboggling, Folding proteins, Wǒ bù xǐ huan, Folded proteins, PRION Disease, Cognitive Dissonance, Nuremberg, Rise in cancer, Birth defects, Adulterated product, vMAP, Dried blood sample, CHD, Children's Health Defense, PVA, Polyvinyl Alcohol, PANI, PEI, PMMA, COVID Bioweapon , Shedding, Does , PGLA, PLGA, PA, PAA, PET, PEDOT, QBIT, QBits, Odin, Computing Humans, mRNA Bioweapon , Magenta , Criminal liability, Claims, Breach of Contract, Clause, NEVER FORGIVE, Ralph Baric, Karen Kingston, Eternity, Vanden bossche, Bossche, Geert Vanden Bossche , SARS-CoV-2 infection, Covid Infection, Circulating Vaccine-Derived Polio Virus, Morgellon, HeLa, memristor, SIV, SMV, Simian Monkey Virus, Saving lives, Graphene oxide Assembly , GO Assembly , in the blood , Fri , Electrochemistry, heterogeneous catalysis, photocatalysis, Single molecule, single atom catalysts, uptake , controlled release, Computated interface, Circulating Vaccine-Derived Poliovirus, cVDPV, Vaccine-Derived Poliovirus, VDPV, perpetuity, perpetual , Motion , Pictures , Pandemic Data , Polymer films, Adhesion, Spreading true information, THE PROTOCOLS OF ZION, Ions, Colloidal, 人生 , Vaccine-Induced , 生活 , Immune system response, 命 , David Martin, Dr. David Martin, Crystal, Crystal formation, Formation of, Additives, Food additives, Tracking device, Brain implant, Elon Musk, X, Tucker on X, TuckeronX, free speech platform, Rumble, Rumble.com, Rumble Inc, Rumble Stock, Rumble Company, Rumble CEO, Water supply , Life , Nayib Bukele , President El Salvador , Toxic levels , Health risk, Contaminated , Contamination , Food supply, Live , Family, Friends, Parents, kids, Infected , Biggest , Strongest , Smart , Smart Watch, Dr Bryan Ardis Show, Trump MAGA, Visuo-tactile, Operation Cumulus, Barcoding , Barcoding cells , Antifa, Immigration, CrossRoads, Joshua Philipp, News Media, Newspapers, Online news, Online sources, Hidden, Dr. Zandre Botha, Dr. Zandre, Major Event, Geoengineering watch, Cloud Seeding, Brighting Clouds, Brighteon, Mike Adams, Health Ranger, Information war, Infowars, Video of , Adams, Catastrophy, Surveillance, Surveillance State, Big Brother, Photonic Crystals, CRISPR-Engineered, GFP, Pollutants, Microplastics, LEE VLIET, Green Fluoresense Protein, Mutant Jellyfish Aequorea Victoria, Mutagenic Species, lidocaine, Mutagenic, Mutant Jellyfish, Research video showing, Aequorea Victoria Mutagenic Species, Moving Around, Metamaterial science, Professor, League of 300, MXenes, nano , 2D , control, Dr. Botha, material, killer app, Drexel, energy storage, electronics, optics, catalysis, transition metals, neuromorphic, Getting Sick, CRT, Critical Race Theory, Doctors Speak Out, Nurses Speak Out, Scientists Speak Out , aluminum , silicon , lithium , carbon, nitrogen , Naguib, MAX phases, LQC, Espana, Madrid, Sex Change Operation, Anthony Blinken, Blinken, Scholar, Secretary of state, secretary of , Sweden, Tau, ADAM, vice president of , CEO of , Admin , Lehman Brothers, Obama, The Obamas, International Monetary Fund, BlackRock, Black Rock, Trans, mCherry , m6Am , Cap1 , Cap 1 , Renilla, m6Am Cap , Cap 2 , Cap2 , B-gal , Cas9 mRNA , Uridine depletion , Pseudouridine function , Lipid Transfection , Chromatographic , THP-1 Dual , Renilla Luciferase , THP-1 , T7 RNA , T7 RNA polymerase , Luc expression , Transgene , Torture, Geoengineering, Terraforming, Protective Envelope, WBAN access , WLAN access , BLE sensors , Bt WLAN, Akyildiz, Ian Akyildiz, Todd Callender, Hybrid IEEE 802.15.6, Functional Hydrogel-Polymer, HINDAWI, Tactile sensing , radiation of colors, Dr Yeadon, dispersion oil, water , matrix of complex networks , chelate appendages, ghost shrimp , Hěn hǎo, bioluminiscent organism, weird fungus and tendrils, Synbio engineering, directed evolution of mankind, Hva ER , dimethylacrylamide , Kevin Shipp, anarchaea, hydra , drosophilia , spider silk network , thorax , hyphae , tremella fuciformis, protophyta, micro detail, long wispy tentacles, Photonic Crystals, ESG Score, ESG , Maga , Illness , Hab, Sudden death , Haraway , Zylinska , Tsing , Posthumanisme , transhumanisme , feminisme , antropocen , teknologi , etikk , teknopolitikk , in front of, Mega , AGA, Tom Haviland , Links, Linkage, NEMAtode, Metamaterials, microscopic view, Instagram, Judy Mikovitz, libertarian, The Movie , Harmonic, Harmonic frequencies, healing frequencies, Fail, Pfizer Comirnaty Vaccine, Pfizer Comirnaty, Pfizer Comirnaty Jab, Pfizer Comirnaty Vax, Pfizer, Global Elite, neutralizing antibodies, Systemic Reactions, local reactions, heterotypic , IP , IP rights, Trademark, Copyright, Dr Ardis, Pfizer Comirnaty Vaccination , T , Neural codes, Somatosensory , Haptic , Auditory cortex, Comirnaty vials, Comirnaty Vial, человек , Comirnaty vaccine, Ich, Comirnaty vaccine ingredients, Vaccine adjuvants, Comirnaty Ingredients, Eucaryotic, Eukaryotic, President Trump, Méi guān xi, Phony , Fake news, Fake , Biden, Former , Duchess , Trance, Professor James Kwan, Prof James Kwan, James Kwan, Presentation, Fillers, quadrivalent, flu vaccine, Novartis, Stockholm, Lund, Svenska, Inoculations , Oslo , Allergan, Immunologic, Glaxosmith, Copenhagen, LUMINA, RAD, Steering group, Steering committee, University of Oxford, Educational video, Paclab, Experimental metal structure, bubble , bubble model, bubbles, dislocations, cavitation, Engineered Lipids, Half-life, Birx, Birx Group, Birc Group, HMS, HMQ, Ecosystem, State Street, Goldman Sachs, Zionism, Ecolabel, Global infrastructure , synthetic biology market , Global energy system , Vesna Radovanovic , ModernaTX , ModernaTX Inc , tactile senses , neural feedback , Neurofeedback , TMS , Transcranial Magnetic Stimulation , NZDSOS Conference, NZDSOS, Vaccine Schedule, Sensor poisoning, Radiation poisioning, Reflecting light, reflect light, cl, Cmax, AUC, Vd, Vdf, ratio , at , at the , showcasing , G , India, tactile spatiotemporal , mechanoreceptors, Mitrokhin et al , Gallego et al , artificial tactile sensors , Sanket et al , tactile sensing technology , tactile perceptual completion , spatiotemporal stimuli , tactile spatio temporal , Bragging about , loosing it , brags , Argumentation , Old woman , Old man , Like , Mortality numbers, Causality, Causality proven, Education System, DR. LEE VLIET, Educational system, School system, Insurance, beyond a doubt, Mortality statistics, Increased mortality, David Sorensen, Excess deaths, Prescription Medicines, Codes in Practice, Authority, PMCP code, Prescription drugs, Code of Practice, Health codification, ic, Poly-vinyl Alcohol, Based on , Images of , Captured , Old , Brief , Meet , Meets , Joint , Richard M Fleming , Dr. Richard Fleming , press briefing, Briefing , From the , icn , ic10, ccc, M19, Rolapitant, DC Swamp, so , 没关系 , to , COVIVAX , CoviShield , Virtual reality, corpuscle , Nociceptor , Merkel cell , Augmented Reality , AR , AR/VR , VR , VR/AR , Zigbee , ISA100.11a, WirelessHART, MiWi, BLE networks, Thread, Matter, LR-WPAN, MTG, Marjorie Taylor Green, Who is , What , FINN, Illegal And Corrupt, Bribes, CDM, Suppression Charge, Ex CIA, snoRNA, Molecular Machine, archaebacteria, eubacteria, Corrupted , Materialize, Materialized, Dr. Sam Bailey, Sam Bailey , Dr. Bailey , spaghettification, Libs , Libertarianism, European Centre for Disease Prevention and Control , ECDC , Libtard , TheMolecularMachine , Substack , Dark field microscopy, Microphotograph , tremella fuciformis, protophyta, Deep State, Deep State Actors, Dr Merritt , Shadow Government, No se , No se nada , Que es , cuanto , Vacuna , Vacunas , Poly-Vinyl-Alcohol, Dr Cahill, chemical weapons, molecular micromachines, Zandre Botha , secrets , Macrobiotics, secret , huge , amount, people , Persons , Said to be , Switzerland, people say, Individuals, Lads, Chaves, corellation, metric , Dude , Man , Woman , Girl , Boy , Hen , Female , She , China, Chinese, Denmark, He , Male , the world, Tenure, Goldman Sachs, GSK, Amgen, Computation in Neural Systems , Stage, Dr. Judy Mikovitz, Yale, Genotoxicity, CCP, children living , Kids , Medical Documentary, Infomentary, Medical Speech, Excess Mortality, cell death, cytokine signaling, Adopsis, Free, Oslo Manual, synthetic mRNA, SARS-CoV-2 infection, LVMH, Roche, Sanofi, ASML, Lilly, Specialized Discipline, Lege, Läkare, läkarna, Lekare, lekarer, Leger, Lektor, akademia, Vaccine batch, Preservatives, polysaccharide, ISCOM, Tissue Fixatives, Squalene , IoMT , IoBNT, Internet of Nano things, Internet of Bio-Nano things, Makrogol, Macrogol, Makrogol 400, Kaliumsorbat , Kaliumsorbate , Liechtenstein , Natriumbenzoat , Technological Weapons , ACLU, CA , WH , PVA thin films , Center for , Hypersensitivity, Foreign substance, Thorax, Climax, Radical , Radio frequencies, RF signal, RF system , Qlimax, Qlimax Event, Satan, Devil worship, Ethnology, heterogenous, heterogenous network, HetNet , Chedid, Chedid 1985, Bioactivation, Bioactivation of foreign compounds, emulsified oil adjuvants, Gupta et al, Gupta, ethnography, cell fusion, cell death, Novo Nordisk, Novo Nordic, Apoptosis, Bio-RAD , Extra , Statens Serum Institut, SSI, NIPH, Disorder, Folkehelseinstituttet , locomotion, FHI , Folkhälsomyndigheten , FHM , Serum Institute of India , MSB , Clifford Carnicom , Dr. Young , Dr Young, Pandemiberedskap , Recombinant , Recombinant Human , Non-Lethal Weapons , Drinks , Legemiddelverket , Morgellons, Philanthropist, MAC ID , M13 , Philanthropists , Philanthropic, Dr Hoffe, Short Scientific Videos, HetNet Computing, HetNets, Computing Humans , Computation, The Fall Of The Cabal, Climate change , Support , Medical papers , pubmed , ncbi , nlm , nih , Unvaccinated , Unvaccinated people , vs , triple vaxxed , Folkhalso , Triple vaxed , boosted , 10th mRNA shot, cross-linked copolymers of , Effects of , Injectable hydrogels , chitosan derivative , Hydrogel biomaterials , Arzt, Doktor, Mediziner, chiral derivatizing agent , Chiral amines , Derivatization , population , get , similar sicknesses, APL , Ting Lu, ARPA-H , H-ARPA , Future Nutrition, Zionists , Rule , Ruler , Jerusalem, The King , PFIZER PHARMACEUTICALS, Inc, Ferromagnetic crystals , New , Old , Stop World Control, Humoral , Persinger , Koren , Chordata, Craniata, Vertebrata, Euteleostomi, Mammalia, Eutheria, Euarchontoglires, Primates, Haplorrhini, Catarrhini, Hominidae, Homo , Mass Psychosis Formation, Dr. Ian Akyildiz, King , De Novo , De Novo Trial , 6LoWPAN , Mitochondrial DNA , Chloroplast , DNA primer , Primer field , Biofield , 16S Ribosomal RNA , SSU rRNA , nanopore , Oxford nanopore , U.S Lab , UK Lab , Computing Humans , London , Applied sciences, WW3, UK , Kiev , Moscow , Aether , Shanghai , IEEE Computer Society , Bejing , Developing countries, Proteoarchaeota , Belgium , J. Giordano , Giordano , GOF Research , Must Watch, Viral video , NEWS , Neuroethics, GmBH, Lecture , King Of The World, Great Britain, Illumina , DYI , United States , Dual use applications, Brian McNamara , Electronic Warfare , Biohacked , Independent research , Ban The Jab Resolution , Ban The Jab , BanTheJab , весь, Event , Events , Pseudouridine, Ephedrine, Suxamethonium Chloride, Protozoan Parasites , ISSN , Metrical , Metric , Scale, Researching, IEEE 8802, ISO, IEC, Smart Utility Network, SUN, Frequency Shift Keying, FSK, Physical Layer, PHY, Phyton, Natural Immunity, Hydroxychloroquine, SIDS, Vaccine Injuries, Autoimmune disease, Microchimerism , Autoimmune , Doctor Fauci, Hillary Clinton, Freund, plasmid R6K , Plasmid DNA fragments , Sabrina Wallace, PAN sensors, Personal Area Network, Freud, Donald Trump, boosters, Booster shot, Booster shots, Misfits, Antifa, Violence, Phonology, PID, Criminal prosecution, Taking , belong , Home , Santander, Kevin Shipp, Comirnaty shot, away, Synthetic venom, Lidocaina, Lidocain, WRAN, Biofeedback , DOD Instruction 8500.01 , DoD Executive Agent , Military Standard 882E , human-machine interfaces and controls , LR-WPAN , LAN/MAN Standards , Novolin , Novolin Insulin , Human Insulin Crystals , Convergence , MIP-based biosensors, Light-absorbing Organelles, Endosymbiotic Genome, Chimeric RNA, Phagocytosis, Budocain Forte, Budocain, Mepivacainum, Injections, Mepivacainum Injections, blood clotting, Communism, Hib, polar PEG chain, Electromagnetic Chirality , Geodesic loop, Geodesic , Decomposition , Theorem , Decomposition theorem , infinity , Continuous ergodic , diffeomorphism groups , Manifolds , 3 manifolds , manifolds-3 , ForEverFolds , Operation Mongoose , SLTT entities , Wang Theory , Infinite , randomized Markov policy , Markov random field , Icteric , Integrated Human Microbiome Project , Immunoturbidimetric transferrin , Neura , Populær , Podcaster , Chile , Rue et al , Li et al , AIOT , IERC , ASTES , NB-IoT , Sigfox, LTE-M , Integrating Foreign DNA , Host Nuclear Genome , Transfection reagent , Transfection agent , Optical Transfection , Biolistic Transfection , Electroporation , In-host Transfection , Transduction , Stable transfection , Episomal vector , IoT Biosensors , Polycations , Sensorsickness , Engineered Dendrimers, Multiomics , Integrative omics , Panomics , Euclideanization, Beyond Triple Continuation , MQTT , UDP , Transcriptome , Epigenome , Etiologics, Hinduism, R&D, Software-Defined Metamaterials , Y36 , Other intentional injuries , Y35 , Nanoscale Machine Communication, Transparency Windows , Terahertz Band , Nano Communication Networks , Wireless Nano-Sensor Networks , WNSN , ICD-9 CM , ICD-10 CM , ICD10 code Z28.21 , ICD-10 code Z28.21 , Islam, Buddhism, Etymology, Ontology, aeternus, Ether , aether , Explained, Producing , Induced , ENOCH, Book Of Enoch, end times, National Academy of Sciences, Hindawi , Aerosolization , aerosolized , Psinergy , oxidized particles, Volume , Aculyn 33 Rheology Modifier, SunSpheres LCG, Defense Memorandum , Docket , Cybersecurity , Acquisition , DoD Instruction 5000.83 , biosensing , PVP copolymer, Eicosene, E 202 , E-202 , PVM crosspolymer, MA decadiene, PEG-20 stearate, Polymethacrylate, propylene glycol, Carbomers, Rhelogy Modifiers, semi-synthetic ligands, engineered aptamers, Tactile Lab, Montreal , RAFT, ATRP, iCVD, click-chemistry, Self-organized , Anodic aluminium oxide , AAO , AAO chip , microfluidic biochips, functional electropolymerisable monomer, DnaC , DnaG , Nezhadali et al , Nezhadali , Hindawi , Guyen et al , Guyen , UVISEL phase , surface plasmon resonance sensors, Reversible addition-fragmentation chain transfer, atom transfer radical polymerisation, living polymerisation, MINS , imprinted polymers, chain length, Acta , molecular weight, Pan et al , Peeters et al , Zhao et al , living macromolecules, Anionic polymerization, Vinyl Monomers, Online safety Act , Ring-Opening Polymerization, RNA polymerase II , Vinyl Ether , Functional oligomers, monofunctional polymers, hydroxylic, carboxylic, Acetate, Malonate, Imido, nucleophiles , divinyl ether , hetero-telechelic, telechelic polymer, Holden et al , pMOS devices , isotactic polyvinyl , Ergodics , Geodic , Geodics , Ergodic , polymeric diols , Pfizer coronavirus vaccine , coronavirus vaccine , Moderna coronavirus vaccine , Pfizer-BioNTech , Pfizer-BioNTech vaccine , Pfizer-BioNTech Covid Vaccine , Pfizer-BioNTech Covid-19 Vaccine , Pfizer and BioNTech , BioNTech and Pfizer , BioNTech-Pfizer vaccine vial , Pfizer vials , Moderna vials , Moderna Microscopic images , Moderna Microscopic photos , Microscopic Images of Moderna , Microscopic photos of Pfizer, Microscopic images of dental anesthetics , under a microscope , BioNTech-Pfizer vaccine vials, BioNTech-Pfizer vials under a microscope, BioNTech-Pfizer vaccine images , Pfizer vial images , Moderna vial images , Pfizer microphotos , Moderna microphotos , Microscopic image of Pfizer vaccine, Microscopic image of Moderna vaccine , Pfizer-BioNTec images , Pfizer-BioNTec photos , mRNA vaccines images , mRNA vaccine photos , epoxy prepolymer , living radical polymerization , Thin Solid Films , Bioconjugates , Self-Healing Polymer Hydrogel, organic electronic devices , highly intelligent devices , ICD10 code Z28.20 , ICD-10 code Z28.20 , biorevolusjonen , Homotelechelic , polymer conjugates, Drug-polymer, of prodrug , nanoassemblies , Chip Implants , HER2 receptor, heterobifunctional polymers , XPO1 , CRM1 , kb , Synthesis Of , nMOS devices , DMAP , PDMA PEG , Biodigital Convergence , PDMS PEG , protection from Pfizer vaccine, Pfizer Protection and Immunity, nuclear localization signals , SP Sensors , BioTac SP Sensors , NLS , nuclear export signal, Experimental frequency bands, FDA and FCC , FCC Experimental license , NES, Kunstig intelligens , Ki , PTX , PABTC , Fluorescent polymer , PDEGMA , DEGMA , PFP , Hyperbolic , IoT network , Beyond Hadoop , Metal-chelating moieties , MCP , Moieties , Novel Compounds , Beyond CMOS , Pegylated Derivatives , pyridyl disulfide , PDS , Marseilleviridae, Cytoplasmic Reactive Polymers , Methyl ether acrylate , POEGA polymers , Thiol-reactive Polymers , Maleimide chemistry , PNAS , Edge Tracking , Endosymbiont-host Systems , DoD DIRECTIVE 3000.09 , Gauss-Bonnet theory , PVA Matrix , Bio-discrimination, Cyber-biocrime, Biohacking, At-home drug manufacturing, Illegal gene editing, E. coli endosymbiont , Transjugular intrahepatic portosystemic , drug delivery system , V40 tor , MVA Vaccine , CSMA , gene-subtraction experiments , Autophago core histones , Core Histones Protein , Impfstoff , Lie Group , Automorphism groups , compact complex surfaces, Elliptic , Ultrasound device , Ultrasound Weapon, Biological terrorism , Bioterrorism , Anosov Diffeomorphisms, Nilmanifolds , Z integers , integers , Moderna Impfstoff , BNT162b2 , mRNA-1273 , AZD1222 , JNJ-78436725 , NVX-CoV2373 , Protein subunit , AS03 adjuvant , CoVPN , Simian Virus 40 , Simian vacuolating virus , attenuated poliovirus vaccines , Epidemiological studies , SV-40 , SV40 Insertion , SV40 , SV40 Promoter , SV40 amplification , plasmid vectors , SV40 Plasmid vectors , SV40 induced, imflammation , , SV40 Enhancer , Plattformsteknologi , Software for Multiomics , Pfizer Impfstoff , nucleocytoplasmic, large DNA viruses, Infinite replication , Wang's Theory , Wang's , Universal constant , Negative Riemannian manifold, complete Riemannian manifold , infinite-dimensional, Lie groups , Banach–Lie groups , nucleocytoplasmic viruses, endosymbiont nucleocytoplasmic species , Virtual Haptic Perception , Electroactive materials, Electroactive substrates, Intra-hepatic , Multipass Membrane Proteins , Electroactive compounds, Neurocognitive Battery , Technology Beyond Phagocytosis, Biosensor Variants , Bio-malware, Hyperbolic automorphisms , RNAP II , Hyperbolic manifolds , Isometry , Artificial Neuromorphic Somatosensory System , Radio Ulna Technology , Neuromorphic Engineers , Genetic blackmail, Neuro-hacking , Non-Human , Shadow Dexterous Hand , Asgard Archaea , Dekimpe , Module variants , Functional Biosensors , Quorum sensing , Computronium , Green Goo Scenario , Directed Evolution of Humans , The Cyborg Manifesto , Molecular Systems Biology , Synthetic Biology Open Language , SBOL standard , Reverse Genetic System , Asgardarchaea , God Helmet , End of the world , Christianity , Alive , Cestui Que Vie Act 1666 , Soul , Follow Jesus Christ, Christiantum, Christ, Jesus Christ, Jesus, God Can Save Our Souls.
The dark side of history: https://thememoryhole.substack.com/
Counterintelligence (counter-intelligence) or counterespionage (counter-espionage) is any activity aimed at protecting an agency's intelligence program from an opposition's intelligence service.[1] It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.
Many countries will have multiple organizations focusing on a different aspect of counterintelligence, such as domestic, international, and counter-terrorism. Some states will formalize it as part of the police structure, such as the United States' Federal Bureau of Investigation (FBI). Others will establish independent bodies, such as the United Kingdom's MI5, others have both intelligence and counterintelligence grouped under the same agency, like the Canadian Security Intelligence Service (CSIS).
History
Political cartoon depicting the Afghan Emir Sher Ali with his "friends" the Russian Bear and British Lion (1878). The Great Game saw the rise of systematic espionage and surveillance throughout the region by both powers
Modern tactics of espionage and dedicated government intelligence agencies developed over the course of the late-19th century. A key background to this development was The Great Game – the strategic rivalry and conflict between the British Empire and the Russian Empire throughout Central Asia between 1830 and 1895. To counter Russian ambitions in the region and the potential threat it posed to the British position in India, the Indian Civil Service built up a system of surveillance, intelligence and counterintelligence. The existence of this shadowy conflict was popularized in Rudyard Kipling's famous spy book, Kim (1901), where he portrayed the Great Game (a phrase Kipling popularized) as an espionage and intelligence conflict that "never ceases, day or night".[2]
The establishment of dedicated intelligence and counterintelligence organizations had much to do with the colonial rivalries between the major European powers and to the accelerating development of military technology. As espionage became more widely used, it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies. The Evidenzbureau (founded in the Austrian Empire in 1850) had the role from the late-19th century of countering the actions of the Pan-Slavist movement operating out of Serbia.
After the fallout from the Dreyfus affair of 1894–1906 in France, responsibility for French military counter-espionage passed in 1899 to the Sûreté générale—an agency originally responsible for order enforcement and public safety—and overseen by the Ministry of the Interior.[3]
The Okhrana, founded in 1880, had the task of countering enemy espionage against Imperial Russia. St. Petersburg Okhrana group photo, 1905
The Okhrana[4] initially formed in 1880 to combat political terrorism and left-wing revolutionary activity throughout the Russian Empire, was also tasked with countering enemy espionage.[5] Its main concern was the activities of revolutionaries, who often worked and plotted subversive actions from abroad. It set up a branch in Paris, run by Pyotr Rachkovsky, to monitor their activities. The agency used many methods to achieve its goals, including covert operations, undercover agents, and "perlustration"—the interception and reading of private correspondence. The Okhrana became notorious for its use of agents provocateurs, who often succeeded in penetrating the activities of revolutionary groups – including the Bolsheviks.[6]
Integrated counterintelligence agencies run directly by governments were also established. The British government founded the Secret Service Bureau in 1909 as the first independent and interdepartmental agency fully in control over all government counterintelligence activities.
Due to intense lobbying from William Melville and after he obtained German mobilization plans and proof of their financial support to the Boers, the British government authorized the formation of a new intelligence section in the War Office, MO3 (subsequently redesignated MO5) headed by Melville, in 1903. Working under-cover from a flat in London, Melville ran both counterintelligence and foreign intelligence operations, capitalizing on the knowledge and foreign contacts he had accumulated during his years running Special Branch.
Due to its success, the Government Committee on Intelligence, with support from Richard Haldane and Winston Churchill, established the Secret Service Bureau in 1909 as a joint initiative of the Admiralty, the War Office and the Foreign Office to control secret intelligence operations in the UK and overseas, particularly concentrating on the activities of the Imperial German government. Its first director was Captain Sir George Mansfield Smith-Cumming alias "C".[7] The Secret Service Bureau was split into a foreign and counter-intelligence domestic service in 1910. The latter, headed by Sir Vernon Kell, originally aimed at calming public fears of large-scale German espionage.[8] As the Service was not authorized with police powers, Kell liaised extensively with the Special Branch of Scotland Yard (headed by Basil Thomson), and succeeded in disrupting the work of Indian revolutionaries collaborating with the Germans during the war. Instead of a system whereby rival departments and military services would work on their own priorities with little to no consultation or cooperation with each other, the newly established Secret Intelligence Service was interdepartmental, and submitted its intelligence reports to all relevant government departments.[9]
For the first time, governments had access to peacetime, centralized independent intelligence and counterintelligence bureaucracy with indexed registries and defined procedures, as opposed to the more ad hoc methods used previously.
Categories
Collective counterintelligence is gaining information about an opponent's intelligence collection capabilities whose aim is at an entity.
Defensive counterintelligence is thwarting efforts by hostile intelligence services to penetrate the service.
Offensive counterintelligence is having identified an opponent's efforts against the system, trying to manipulate these attacks by either "turning" the opponent's agents into double agents or feeding them false information to report.[10]
Counterintelligence, counterterror, and government
Many governments organize counterintelligence agencies separately and distinct from their intelligence collection services. In most countries the counterintelligence mission is spread over multiple organizations, though one usually predominates. There is usually a domestic counterintelligence service, usually part of a larger law enforcement organization such as the Federal Bureau of Investigation in the United States.[11]
The United Kingdom has the separate Security Service, also known as MI5, which does not have direct police powers but works closely with law enforcement especially Special Branch that can carry out arrests, do searches with a warrant, etc.[12]
The Russian Federation's major domestic security organization is the FSB, which principally came from the Second Chief Directorate and Third Chief Directorate of the USSR's KGB.
Canada separates the functions of general defensive counterintelligence (contre-ingérence), security intelligence (the intelligence preparation necessary to conduct offensive counterintelligence), law enforcement intelligence, and offensive counterintelligence.
Military organizations have their own counterintelligence forces, capable of conducting protective operations both at home and when deployed abroad.[13] Depending on the country, there can be various mixtures of civilian and military in foreign operations. For example, while offensive counterintelligence is a mission of the US CIA's National Clandestine Service, defensive counterintelligence is a mission of the U.S. Diplomatic Security Service (DSS), Department of State, who work on protective security for personnel and information processed abroad at US Embassies and Consulates.[14]
The term counter-espionage is really specific to countering HUMINT, but, since virtually all offensive counterintelligence involves exploiting human sources, the term "offensive counterintelligence" is used here to avoid some ambiguous phrasing.
Other countries also deal with the proper organization of defenses against Foreign Intelligence Services (FIS), often with separate services with no common authority below the head of government.
France, for example, builds its domestic counterterror in a law enforcement framework. In France, a senior anti-terror magistrate is in charge of defense against terrorism. French magistrates have multiple functions that overlap US and UK functions of investigators, prosecutors, and judges. An anti-terror magistrate may call upon France's domestic intelligence service Direction générale de la sécurité intérieure (DGSI), which may work with the Direction générale de la sécurité extérieure (DGSE), foreign intelligence service.
Spain gives its Interior Ministry, with military support, the leadership in domestic counterterrorism. For international threats, the National Intelligence Center (CNI) has responsibility. CNI, which reports directly to the Prime Minister, is staffed principally by which is subordinated directly to the Prime Minister's office. After the March 11, 2004 Madrid train bombings, the national investigation found problems between the Interior Ministry and CNI, and, as a result, the National Anti-Terrorism Coordination Center was created. Spain's 3/11 Commission called for this center to do operational coordination as well as information collection and dissemination.[15] The military has organic counterintelligence to meet specific military needs.
Counterintelligence missions
Frank Wisner, a well-known CIA operations executive said of the autobiography of Director of Central Intelligence Allen W. Dulles,[16] that Dulles "disposes of the popular misconception that counterintelligence is essentially a negative and responsive activity, that it moves only or chiefly in reaction to situations thrust upon it and in counter to initiatives mounted by the opposition." Rather, he sees that can be most effective, both in information gathering and protecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services."[17] Today's counterintelligence missions have broadened from the time when the threat was restricted to the foreign intelligence services (FIS) under the control of nation-states. Threats have broadened to include threats from non-national or trans-national groups, including internal insurgents, organized crime, and transnational based groups (often called "terrorists", but that is limiting). Still, the FIS term remains the usual way of referring to the threat against which counterintelligence protects.
In modern practice, several missions are associated with counterintelligence from the national to the field level.
Defensive analysis is the practice of looking for vulnerabilities in one's own organization, and, with due regard for risk versus benefit, closing the discovered holes.
Offensive counterespionage is the set of techniques that at least neutralizes discovered FIS personnel and arrests them or, in the case of diplomats, expels them by declaring them persona non grata. Beyond that minimum, it exploits FIS personnel to gain intelligence for one's own side, or actively manipulates the FIS personnel to damage the hostile FIS organization.
Counterintelligence force protection source operations (CFSO) are human source operations, conducted abroad that are intended to fill the existing gap in national-level coverage in protecting a field station or force from terrorism and espionage.
Counterintelligence is part of intelligence cycle security, which, in turn, is part of intelligence cycle management. A variety of security disciplines also fall under intelligence security management and complement counterintelligence, including:
Physical security
Personnel security
Communications security (COMSEC)
Informations system security (INFOSEC)
security classification
Operations security (OPSEC)
The disciplines involved in "positive security," measures by which one's own society collects information on its actual or potential security, complement security. For example, when communications intelligence identifies a particular radio transmitter as one used only by a particular country, detecting that transmitter inside one's own country suggests the presence of a spy that counterintelligence should target. In particular, counterintelligence has a significant relationship with the collection discipline of HUMINT and at least some relationship with the others. Counterintelligence can both produce information and protect it.
All US departments and agencies with intelligence functions are responsible for their own security abroad, except those that fall under Chief of Mission authority.[18]
Governments try to protect three things:
Their personnel
Their installations
Their operations
In many governments, the responsibility for protecting these things is split. Historically, CIA assigned responsibility for protecting its personnel and operations to its Office of Security, while it assigned the security of operations to multiple groups within the Directorate of Operations: the counterintelligence staff and the area (or functional) unit, such as Soviet Russia Division. At one point, the counterintelligence unit operated quite autonomously, under the direction of James Jesus Angleton. Later, operational divisions had subordinate counterintelligence branches, as well as a smaller central counterintelligence staff. Aldrich Ames was in the Counterintelligence Branch of Europe Division, where he was responsible for directing the analysis of Soviet intelligence operations. US military services have had a similar and even more complex split.
This kind of division clearly requires close coordination, and this in fact occurs on a daily basis. The interdependence of the US counterintelligence community is also manifest in its relationships with liaison services. The counterintelligence community cannot cut off these relationships because of concern about security, but experience has shown that it must calculate the risks involved.[18]
On the other side of the CI coin, counterespionage has one purpose that transcends all others in importance: penetration. The emphasis which the KGB places on penetration is evident in the cases already discussed from the defensive or security viewpoint. The best security system in the world cannot provide an adequate defense against it because the technique involves people. The only way to be sure that an enemy has been contained is to know his plans in advance and in detail.
Moreover, only a high-level penetration of the opposition can tell you whether your own service is penetrated. A high-level defector can also do this, but the adversary knows that he defected and within limits can take remedial action. Conducting CE without the aid of penetrations is like fighting in the dark. Conducting CE with penetrations can be like shooting fish in a barrel.[18]
In the British service, the cases of the Cambridge Five, and the later suspicions about MI5 chief Sir Roger Hollis caused great internal dissension. Clearly, the British were penetrated by Philby, but it has never been determined, in any public forum, if there were other serious penetrations. In the US service, there was also significant disruption over the contradictory accusations about moles from defectors Anatoliy Golitsyn and Yuri Nosenko, and their respective supporters in CIA and the British Security Service (MI5). Golitsyn was generally believed by Angleton. George Kisevalter, the CIA operations officer that was the CIA side of the joint US-UK handling of Oleg Penkovsky, did not believe Angleton's theory that Nosenko was a KGB plant. Nosenko had exposed John Vassall, a KGB asset principally in the British Admiralty, but there were arguments Vassall was a KGB sacrifice to protect other operations, including Nosenko and a possibly more valuable source on the Royal Navy.
Defensive counterintelligence
Defensive counterintelligence starts by looking for places in one's own organization that could easily be exploited by foreign intelligence services (FIS). FIS is an established term of art in the counterintelligence community, and, in today's world, "foreign" is shorthand for "opposing." Opposition might indeed be a country, but it could be a transnational group or an internal insurgent group. Operations against a FIS might be against one's own nation, or another friendly nation. The range of actions that might be done to support a friendly government can include a wide range of functions, certainly including military or counterintelligence activities, but also humanitarian aid and aid to development ("nation building").[19]
Terminology here is still emerging, and "transnational group" could include not only terrorist groups but also transnational criminal organization. Transnational criminal organizations include the drug trade, money laundering, extortion targeted against computer or communications systems, smuggling, etc.
"Insurgent" could be a group opposing a recognized government by criminal or military means, as well as conducting clandestine intelligence and covert operations against the government in question, which could be one's own or a friendly one.
Counterintelligence and counterterrorism analyses provide strategic assessments of foreign intelligence and terrorist groups and prepare tactical options for ongoing operations and investigations. Counterespionage may involve proactive acts against foreign intelligence services, such as double agents, deception, or recruiting foreign intelligence officers. While clandestine HUMINT sources can give the greatest insight into the adversary's thinking, they may also be most vulnerable to the adversary's attacks on one's own organization. Before trusting an enemy agent, remember that such people started out as being trusted by their own countries and may still be loyal to that country.
Offensive counterintelligence operations
Wisner emphasized his own, and Dulles', views that the best defense against foreign attacks on, or infiltration of, intelligence services is active measures against those hostile services.[17] This is often called counterespionage: measures taken to detect enemy espionage or physical attacks against friendly intelligence services, prevent damage and information loss, and, where possible, to turn the attempt back against its originator. Counterespionage goes beyond being reactive and actively tries to subvert hostile intelligence service, by recruiting agents in the foreign service, by discrediting personnel actually loyal to their own service, and taking away resources that would be useful to the hostile service. All of these actions apply to non-national threats as well as to national organizations.
If the hostile action is in one's own country or in a friendly one with co-operating police, the hostile agents may be arrested, or, if diplomats, declared persona non grata. From the perspective of one's own intelligence service, exploiting the situation to the advantage of one's side is usually preferable to arrest or actions that might result in the death of the threat. The intelligence priority sometimes comes into conflict with the instincts of one's own law enforcement organizations, especially when the foreign threat combines foreign personnel with citizens of one's country.
In some circumstances, arrest may be a first step in which the prisoner is given the choice of co-operating or facing severe consequence up to and including a death sentence for espionage. Co-operation may consist of telling all one knows about the other service but preferably actively assisting in deceptive actions against the hostile service.
Counterintelligence protection of intelligence services
Defensive counterintelligence specifically for intelligence services involves risk assessment of their culture, sources, methods and resources. Risk management must constantly reflect those assessments, since effective intelligence operations are often risk-taking. Even while taking calculated risks, the services need to mitigate risk with appropriate countermeasures.
FIS are especially able to explore open societies and, in that environment, have been able to subvert insiders in the intelligence community. Offensive counterespionage is the most powerful tool for finding penetrators and neutralizing them, but it is not the only tool. Understanding what leads individuals to turn on their own side is the focus of Project Slammer. Without undue violations of personal privacy, systems can be developed to spot anomalous behavior, especially in the use of information systems.
Decision makers require intelligence free from hostile control or manipulation. Since every intelligence discipline is subject to manipulation by our adversaries, validating the reliability of intelligence from all collection platforms is essential. Accordingly, each counterintelligence organization will validate the reliability of sources and methods that relate to the counterintelligence mission in accordance with common standards. For other mission areas, the USIC will examine collection, analysis, dissemination practices, and other intelligence activities and will recommend improvements, best practices, and common standards.[20]
Intelligence is vulnerable not only to external but also to internal threats. Subversion, treason, and leaks expose vulnerabilities, governmental and commercial secrets, and intelligence sources and methods. The insider threat has been a source of extraordinary damage to US national security, as with Aldrich Ames, Robert Hanssen, and Edward Lee Howard, all of whom had access to major clandestine activities. Had an electronic system to detect anomalies in browsing through counterintelligence files been in place, Robert Hanssen's searches for suspicion of activities of his Soviet (and later Russian) paymasters might have surfaced early. Anomalies might simply show that an especially-creative analyst has a trained intuition possible connections and is trying to research them.
Adding the new tools and techniques to [national arsenals], the counterintelligence community will seek to manipulate foreign spies, conduct aggressive investigations, make arrests and, where foreign officials are involved, expel them for engaging in practices inconsistent with their diplomatic status or exploit them as an unwitting channel for deception, or turn them into witting double agents.[20] "Witting" is a term of intelligence art that indicates that one is not only aware of a fact or piece of information but also aware of its connection to intelligence activities.
Victor Suvorov, the pseudonym of a former Soviet military intelligence (GRU) officer, makes the point that a defecting HUMINT officer is a special threat to walk-in or other volunteer assets of the country that he is leaving. Volunteers who are "warmly welcomed" do not take into consideration the fact that they are despised by hostile intelligence agents.
The Soviet operational officer, having seen a great deal of the ugly face of communism, very frequently feels the utmost repulsion to those who sell themselves to it willingly. And when a GRU or KGB officer decides to break with his criminal organization, something which fortunately happens quite often, the first thing he will do is try to expose the hated volunteer.[21]
Counterintelligence force protection source operations
Attacks against military, diplomatic, and related facilities are a very real threat, as demonstrated by the 1983 attacks against French and US peacekeepers in Beirut, the 1996 attack on the Khobar Towers in Saudi Arabia, 1998 attacks on Colombian bases and on U.S. embassies (and local buildings) in Kenya and Tanzania the 2000 attack on the USS Cole, and many others. The U.S. military force protection measures are the set of actions taken against military personnel and family members, resources, facilities and critical information, and most countries have a similar doctrine for protecting those facilities and conserving the potential of the forces. Force protection is defined to be a defense against deliberate attack, not accidents or natural disasters.
Counterintelligence Force Protection Source Operations (CFSO) are human source operations, normally clandestine in nature, conducted abroad that are intended to fill the existing gap in national level coverage, as well as satisfying the combatant commander's intelligence requirements.[22] Military police and other patrols that mingle with local people may indeed be valuable HUMINT sources for counterintelligence awareness, but are not themselves likely to be CFSOs. Gleghorn distinguishes between the protection of national intelligence services, and the intelligence needed to provide combatant commands with the information they need for force protection. There are other HUMINT sources, such as military reconnaissance patrols that avoid mixing with foreign personnel, that indeed may provide HUMINT, but not HUMINT especially relevant to counterintelligence.[23] Active countermeasures, whether for force protection, protection of intelligence services, or protection of national security interests, are apt to involve HUMINT disciplines, for the purpose of detecting FIS agents, involving screening and debriefing of non-tasked human sources, also called casual or incidental sources. such as:
walk-ins and write-ins (individuals who volunteer information)
unwitting sources (any individual providing useful information to counterintelligence, who in the process of divulging such information may not know they are aiding an investigation)
defectors and enemy prisoners of war (EPW)
refugee populations and expatriates
interviewees (individuals contacted in the course of an investigation)
official liaison sources.
Physical security is important, but it does not override the role of force protection intelligence... Although all intelligence disciplines can be used to gather force protection intelligence, HUMINT collected by intelligence and CI agencies plays a key role in providing indications and warning of terrorist and other force protection threats.[24]
Force protection, for forces deployed in host countries, occupation duty, and even at home, may not be supported sufficiently by a national-level counterterrorism organization alone. In a country, colocating FPCI personnel, of all services, with military assistance and advisory units, allows agents to build relationships with host nation law enforcement and intelligence agencies, get to know the local environments, and improve their language skills. FPCI needs a legal domestic capability to deal with domestic terrorism threats.
As an example of terrorist planning cycles, the Khobar Towers attack shows the need for long-term FPCI. "The Hizballah operatives believed to have conducted this attack began intelligence collection and planning activities in 1993. They recognized American military personnel were billeted at Khobar Towers in the fall of 1994 and began surveillance of the facility, and continued to plan, in June 1995. In March 1996, Saudi Arabian border guards arrested a Hizballah member attempting plastic explosive into the country, leading to the arrest of two more Hizballah members. Hizballah leaders recruited replacements for those arrested, and continued planning for the attack."[25]
Defensive counterintelligence operations
In U.S. doctrine, although not necessarily that of other countries, CI is now seen as primarily a counter to FIS HUMINT. In the 1995 US Army counterintelligence manual, CI had a broader scope against the various intelligence collection disciplines. Some of the overarching CI tasks are described as
Developing, maintaining, and disseminating multidiscipline threat data and intelligence files on organizations, locations, and individuals of CI interest. This includes insurgent and terrorist infrastructure and individuals who can assist in the CI mission.
Educating personnel in all fields of security. A component of this is the multidiscipline threat briefing. Briefings can and should be tailored, both in scope and classification level. Briefings could then be used to familiarize supported commands with the nature of the multidiscipline threat posed against the command or activity.
More recent US joint intelligence doctrine[26] restricts its primary scope to counter-HUMINT, which usually includes counter-terror. It is not always clear, under this doctrine, who is responsible for all intelligence collection threats against a military or other resource. The full scope of US military counterintelligence doctrine has been moved to a classified publication, Joint Publication (JP) 2-01.2, Counterintelligence and Human Intelligence Support to Joint Operations.
More specific countermeasures against intelligence collection disciplines are listed below
CI roles against Intelligence Collection Disciplines, 1995 doctrine[22] Discipline Offensive CI Defensive CI
HUMINT Counterreconnaissance, offensive counterespionage Deception in operations security
SIGINT Recommendations for kinetic and electronic attack Radio OPSEC, use of secure telephones, SIGSEC, deception
IMINT Recommendations for kinetic and electronic attack Deception, OPSEC countermeasures, deception (decoys, camouflage)
If accessible, use SATRAN reports of satellites overhead to hide or stop activities while being viewed
Counter-HUMINT
Counter-HUMINT deals with both the detection of hostile HUMINT sources within an organization, or the detection of individuals likely to become hostile HUMINT sources, as a mole or double agent. There is an additional category relevant to the broad spectrum of counterintelligence: why one becomes a terrorist.[citation needed]
The acronym MICE:
Money
Ideology
Compromise (or coercion)
Ego
describes the most common reasons people break trust and disclose classified materials, reveal operations to hostile services, or join terrorist groups. It makes sense, therefore, to monitor trusted personnel for risks in these areas, such as financial stress, extreme political views, potential vulnerabilities for blackmail, and excessive need for approval or intolerance of criticism. With luck, problems in an employee can be caught early, assistance can be provided to correct them, and not only is espionage avoided, but a useful employee retained.
Sometimes, the preventive and neutralization tasks overlap, as in the case of Earl Edwin Pitts. Pitts had been an FBI agent who had sold secret information to the Soviets, and, after the fall of the USSR, to the Russians. He was caught by an FBI false flag sting, in which FBI agents, posing as Russian FSB agents, came to Pitts with an offer to "reactivate" him. His activities seemed motivated by both money and ego over perceived bad treatment when he was an FBI agent. His sentence required him to tell the FBI all he knew of foreign agents. Ironically, he told them of suspicious actions by Robert Hanssen, which were not taken seriously at the time.
Motivations for information and operations disclosure
To go beyond slogans, Project Slammer was an effort of the Intelligence Community Staff, under the Director of Central Intelligence, to come up with characteristics of an individual likely to commit espionage against the United States. It "examines espionage by interviewing and psychologically assessing actual espionage subjects. Additionally, persons knowledgeable of subjects are contacted to better understand the subjects' private lives and how they are perceived by others while conducting espionage."[27]
How an espionage subject sees himself (at the time of espionage) Attitude Manifestations
Basic belief structure – Special, even unique.
– Deserving.
– The individual's situation is not satisfactory.
– No other (easier) option (than to engage in espionage).
– Doing only what others frequently do.
– Not a bad person.
– Performance in a government job (if presently employed) is separate from espionage; espionage does not (really) discount contribution in the workplace.
– Security procedures do not (really) apply to the individual.
– Security programs (e.g., briefings) have no meaning for the individual unless they connect with something with which they can personally identify.
Feels isolated from the consequences of his actions: – The individual sees their situation in a context in which they face continually narrowing options until espionage seems reasonable. The process that evolves into espionage reduces barriers, making it essentially "Okay" to initiate the crime.
– They see espionage as a "Victimless" crime.
– Once they consider espionage, they figure out how it might be done. These are mutually reinforcing, often simultaneous events.
– Subject finds that it is easy to go around security safeguards (or is able to solve that problem). They belittle the security system, feeling that if the information was really important espionage would be hard to do (the information would really be better protected). This "Ease of accomplishment" further reinforces resolve.
Attempts to cope with espionage activity – Anxious on initial hostile intelligence service contact (some also feel thrill and excitement).
– After a relationship with espionage activity and HOIS develops, the process becomes much more bearable, espionage continues (even flourishes).
– In the course of long-term activity, subjects may reconsider their involvement.
– Some consider breaking their role to become an operative for the government. This occurs when access to classified information is lost or there is a perceived need to prove themselves or both.
– Others find that espionage activity becomes stressful, they no longer want it. Glamour (if present earlier) subsides. They are reluctant to continue. They may even break contact.
– Sometimes they consider telling authorities what they have done. Those wanting to reverse their role aren't confessing, they're negotiating. Those who are "Stressed out" want to confess. Neither wants punishment. Both attempt to minimize or avoid punishment.
According to a press report about Project Slammer and Congressional oversight of counterespionage, one fairly basic function is observing one's own personnel for behavior that either suggests that they could be targets for foreign HUMINT, or may already have been subverted. News reports indicate that in hindsight, red flags were flying but not noticed.[28] In several major penetrations of US services, such as Aldrich Ames, the Walker ring or Robert Hanssen, the individual showed patterns of spending inconsistent with their salary. Some people with changed spending may have a perfectly good reason, such as an inheritance or even winning the lottery, but such patterns should not be ignored.
Personnel in sensitive positions, who have difficulty getting along with peers, may become risks for being compromised with an approach based on ego. William Kampiles, a low-level worker in the CIA Watch Center, sold, for a small sum, the critical operations manual on the KH-11 reconnaissance satellite. To an interviewer, Kampiles suggested that if someone had noted his "problem"—constant conflicts with supervisors and co-workers—and brought in outside counseling, he might not have stolen the KH-11 manual.[28]
By 1997, the Project Slammer work was being presented at public meetings of the Security Policy Advisory Board.[29] While a funding cut caused the loss of impetus in the mid-nineties, there are research data used throughout the security community. They emphasize the
essential and multi-faceted motivational patterns underlying espionage. Future Slammer analyses will focus on newly developing issues in espionage such as the role of money, the new dimensions of loyalty and what seems to be a developing trend toward economic espionage.
Counter-SIGINT (Signals Intelligence)
Military and security organizations will provide secure communications, and may monitor less secure systems, such as commercial telephones or general Internet connections, to detect inappropriate information being passed through them. Education on the need to use secure communications, and instruction on using them properly so that they do not become vulnerable to specialized technical interception.
Counter-IMINT (Imagery Intelligence)
The basic methods of countering IMINT are to know when the opponent will use imaging against one's own side, and interfering with the taking of images. In some situations, especially in free societies, it must be accepted that public buildings may always be subject to photography or other techniques.
Countermeasures include putting visual shielding over sensitive targets or camouflaging them. When countering such threats as imaging satellites, awareness of the orbits can guide security personnel to stop an activity, or perhaps cover the sensitive parts, when the satellite is overhead. This also applies to imaging on aircraft and UAVs, although the more direct expedient of shooting them down, or attacking their launch and support area, is an option in wartime.
Counter-OSINT (Open-Source Intelligence)
While the concept well precedes the recognition of a discipline of OSINT, the idea of censorship of material directly relevant to national security is a basic OSINT defense. In democratic societies, even in wartime, censorship must be watched carefully lest it violate reasonable freedom of the press, but the balance is set differently in different countries and at different times.
The United Kingdom is generally considered to have a very free press, but there is the DA-Notice, formerly D-notice system. Many British journalists find that the system is used fairly, but there will always be arguments. In the specific context of counterintelligence, note that Peter Wright, a former senior member of the Security Service who left their service without his pension, moved to Australia before publishing his book Spycatcher. While much of the book was reasonable commentary, it revealed some specific and sensitive techniques, such as Operation RAFTER, a means of detecting the existence and setting of radio receivers.
Counter-MASINT (Measurement and Signature Intelligence)
MASINT is mentioned here for completeness, but the discipline contains so varied a range of technologies that a type-by-type strategy is beyond the current scope. One example, however, can draw on the Operation RAFTER technique revealed in Wright's book. With the knowledge that Radiofrequency MASINT was being used to pick up an internal frequency in radio receivers, it would be possible to design a shielded receiver that would not radiate the signal that RAFTER monitored.
Theory of offensive counterintelligence
Offensive techniques in current counterintelligence doctrine are principally directed against human sources, so counterespionage can be considered a synonym for offensive counterintelligence. At the heart of exploitation operations is the objective to degrade the effectiveness of an adversary's intelligence service or a terrorist organization. Offensive counterespionage (and counterterrorism) is done one of two ways, either by manipulating the adversary (FIS or terrorist) in some manner or by disrupting the adversary's normal operations.
Defensive counterintelligence operations that succeed in breaking up a clandestine network by arresting the persons involved or by exposing their actions demonstrate that disruption is quite measurable and effective against FIS if the right actions are taken. If defensive counterintelligence stops terrorist attacks, it has succeeded.
Offensive counterintelligence seeks to damage the long-term capability of the adversary. If it can lead a national adversary into putting large resources into protecting from a nonexistent threat, or if it can lead terrorists to assume that all of their "sleeper" agents in a country have become unreliable and must be replaced (and possibly killed as security risks), there is a greater level of success than can be seen from defensive operations alone, To carry out offensive counterintelligence, however, the service must do more than detect; it must manipulate persons associated with the adversary.
The Canadian Department of National Defence makes some useful logical distinctions in its Directive on its[30] National Counter-Intelligence Unit. The terminology is not the same as used by other services, but the distinctions are useful:
"Counter-intelligence (contre-ingérence) means activities concerned with identifying and counteracting threats to the security of DND employees, CF members, and DND and CF property and information, that are posed by hostile intelligence services, organizations or individuals, who are or may be engaged in espionage, sabotage, subversion, terrorist activities, organized crime or other criminal activities." This corresponds to defensive counterintelligence in other services.
"Security intelligence (renseignement de sécurité) means intelligence on the identity, capabilities and intentions of hostile intelligence services, organizations or individuals, who are or may be engaged in espionage, sabotage, subversion, terrorist activities, organized crime or other criminal activities." This does not (emphasis added) correspond directly to offensive counterintelligence, but is the intelligence preparation necessary to conduct offensive counterintelligence.
The duties of the Canadian Forces National Counter-Intelligence Unit include "identifying, investigating and countering threats to the security of the DND and the CF from espionage, sabotage, subversion, terrorist activities, and other criminal activity; identifying, investigating and countering the actual or possible compromise of highly classified or special DND or CF material; conducting CI security investigations, operations and security briefings and debriefings to counter threats to, or to preserve, the security of DND and CF interests." This mandate is a good statement of a mandate to conduct offensive counterintelligence.
DND further makes the useful clarification,[31] "The security intelligence process should not be confused with the liaison conducted by members of the Canadian Forces National Investigation Service (CFNIS) for the purpose of obtaining criminal intelligence, as the collection of this type of information is within their mandate."
Manipulating an intelligence professional, himself trained in counterintelligence, is no easy task, unless he is already predisposed toward the opposing side. Any effort that does not start with a sympathetic person will take a long-term commitment, and creative thinking to overcome the defenses of someone who knows he is a counterintelligence target and also knows counterintelligence techniques.
Terrorists on the other hand, although they engage in deception as a function of security appear to be more prone to manipulation or deception by a well-placed adversary than are foreign intelligence services. This is in part due to the fact that many terrorist groups, whose members "often mistrust and fight among each other, disagree, and vary in conviction.", are not as internally cohesive as foreign intelligence services, potentially leaving them more vulnerable to both deception and manipulation.
Further reading
Johnson, William R. Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer (2009)
Ginkel, B. van (2012). "Towards the intelligent use of intelligence: Quis Custodiet ipsos Custodes?". 3 (10). The Hague: The International Centre for Counter-Terrorism. {{cite journal}}: Cite journal requires |journal= (help)
Lee, Newton (2015). Counterterrorism and Cybersecurity: Total Information Awareness (Second ed.). Springer International Publishing Switzerland. ISBN 978-3319172439.
Selby, Scott Andrew. The Axmann Conspiracy: The Nazi Plan for a Fourth Reich and How the U.S. Army Defeated It. Berkley (Penguin), Sept. 2012. ISBN 0425252701
Toward a Theory of CI
See also
Irregular warfare
List of counterintelligence organizations
FBI Counterintelligence Division
SAEDA
The Institute of World Politics
X-2 Counter Espionage Branch
References
Johnson, William (2009). Thwarting Enemies at Home and Abroad: How to be a Counterintelligence Officer. Washington DC: Georgetown University Press. p. 2.
Philip H.J. Davies (2012). Intelligence and Government in Britain and the United States: A Comparative Perspective. ABC-CLIO. ISBN 9781440802812.
Anciens des Services Spéciaux de la Défense Nationale Archived 2016-03-15 at the Wayback Machine ( France )
"Okhrana" literally means "the guard"
Okhrana Britannica Online
Ian D. Thatcher, Late Imperial Russia: problems and prospects, page 50.
"SIS Or MI6. What's in a Name?". SIS website. Archived from the original on 26 September 2008. Retrieved 11 July 2008.
Christopher Andrew, The Defence of the Realm: The Authorized History of Mi5 (London, 2009), p.21.
Calder Walton (2013). Empire of Secrets: British Intelligence, the Cold War, and the Twilight of Empire. Overlook. pp. 5–6. ISBN 9781468310436.
Lowenthal, M. (2003). Intelligence: From secrets to policy. Washington, DC: CQ Press.
"Counterintelligence". FBI. Archived from the original on 2016-07-17.
"COUNTER-ESPIONAGE". Security Service MI5. Archived from the original on 2020-01-15.
Clark, R.M. and Mitchell, W.L., 2018. Deception: Counterdeception and Counterintelligence. CQ Press.
"Counterintelligence Investigations". Retrieved 2008-05-08.
Archick, Kristen (2006-07-24). "European Approaches to Homeland Security and Counterterrorism" (PDF). Congressional Research Service. Retrieved 2007-11-05.
Dulles, Allen W. (1977). The Craft of Intelligence. Greenwood. ISBN 0-8371-9452-0. Dulles-1977.
Wisner, Frank G. (1993-09-22). "On "The Craft of Intelligence"". CIA-Wisner-1993. Archived from the original on 2007-11-15. Retrieved 2007-11-03.
Matschulat, Austin B. (1996-07-02). "Coordination and Cooperation in Counerintelligence". Archived from the original on 2007-10-10. Retrieved 2007-11-03.
"Joint Publication 3-07.1: Joint Tactics, Techniques, and Procedures for Foreign Internal Defense (FID)" (PDF). 2004-04-30. Retrieved 2007-11-03.
"National Counterintelligence Executive (NCIX)" (PDF). 2007.
Suvorov, Victor (1984). "Chapter 4, Agent Recruiting". Inside Soviet Military Intelligence. MacMillan Publishing Company.
US Department of the Army (1995-10-03). "Field Manual 34–60: Counterintelligence". Retrieved 2007-11-04.
Gleghorn, Todd E. (September 2003). "Exposing the Seams: the Impetus for Reforming US Counterintelligence" (PDF). Retrieved 2007-11-02.
US Department of Defense (2007-07-12). "Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms" (PDF). Archived from the original (PDF) on 2008-11-23. Retrieved 2007-10-01.
Imbus, Michael T (April 2002). "Identifying Threats: Improving Intelligence and Counterintelligence Support to Force Protection" (PDF). USAFCSC-Imbus-2002. Retrieved 2007-11-03.
Joint Chiefs of Staff (2007-06-22). "Joint Publication 2-0: Intelligence" (PDF). US JP 2-0. Retrieved 2007-11-05.
Intelligence Community Staff (12 April 1990). "Project Slammer Interim Progress Report". Retrieved 2007-11-04.
Stein, Jeff (July 5, 1994). "The Mole's Manual". New York Times. Retrieved 2007-11-04.
Security Policy Advisory Board (12 December 1997). "Security Policy Advisory Board Meeting Minutes". Retrieved 2007-11-04. {{cite web}}: |last= has generic name (help)
"Canadian Forces National Counter-Intelligence Unit". 2003-03-28. Canada-DND-DAOD 8002-2. Archived from the original on 2007-11-21. Retrieved 2007-11-19.
"Security Intelligence Liaison Program". 2003-03-28. Canada-DND-DAOD 8002-3. Archived from the original on 2007-11-30. Retrieved 2007-11-19.
Mirrored from "Olympics Antichrist Appears on Stage, WATCH What Happens Next.. (R$E)" -- https://youtu.be/h0meoybonGc
.
The Closing Satanic Ritual showed the arrival of the Beast (Appolyon) and the Demons from the Bottomless PIT!
.
Paris Olympics Ends With Satanic Closing Ceremony -- https://youtu.be/nt5CEQDLUwg
.
The "golden" one who is dancing around has MANY names ... Apollo/Apollyon/the Beast from the Abyss, the resurrected Nimrod (the son of Satan) and Lucifer the Fallen Cherub one who masquerades as an Angel of Light (Satan).
.
This Beast will rise up from the Abyss at the midway point of the Tribulation (after 3 1/2 year) and he will possess the Antichrist who receives what looks like a fatal wound, then the Antichrist will rise as though resurrected.
.
The Antichrist/Beast will then kill the TWO witnesses ... and set up the image of the Beast, the Abomination of Desolation at the rebuilt Temple in Jerusalem.
.
The headless Angel may represent the False Prophet or it could represent the image of the Beast which has no head to think but directs the worship to the Beast and commands everyone to take the Mark of the Beast.
.
The Fifth Trumpet - Revelation 9
1Then the fifth angel sounded his trumpet, and I saw a star that had fallen from heaven to earth, and it was given the key to the pit of the Abyss. 2The star opened the pit of the Abyss, and smoke rose out of it like the smoke of a great furnace, and the sun and the air were darkened by the smoke from the pit.
.
3And out of the smoke, locusts descended on the earth, and they were given power like that of the scorpions of the earth. 4They were told not to harm the grass of the earth or any plant or tree, but only those who did not have the seal of God on their foreheads. 5The locusts were not given power to kill them, but only to torment them for five months, and their torment was like the stinging of a scorpion. 6In those days men will seek death and will not find it; they will long to die, but death will escape them.
.
7And the locusts looked like horses prepared for battle, with something like crowns of gold on their heads, and faces like the faces of men. 8They had hair like that of women, and teeth like those of lions. 9They also had thoraxes like breastplates of iron, and the sound of their wings was like the roar of many horses and chariots rushing into battle. 10They had tails with stingers like scorpions, which had the power to injure people for five months. 11They were ruled by a king, the angel of the Abyss. His name in Hebrew is Abaddon, and in Greek it is Apollyon.
.
Do you know who has Appolyn painted on the ceiling of his NYC Penthouse which is decked out in gold ... Trump-CINE ... the Antichrist King!
.
THE ORPHIC HYMN TO APOLLO (Greek god) -- https://www.hellenicgods.org/the-orphic-hymn-to-apollo
.
Apóllôn is the great protector of the Mysteries, and with his music, he propels our souls forward, if we are willing to accept his influence. He is the great God of enlightenment for which he is called Phívos (Φοίβος), the shining one and he is a mighty God of healing. Indeed, we could continue endlessly enumerating the splendid qualities of this God which make him a most worthy son of his father. So let us now examine the Orphic hymn to Apóllôn and gain greater insight into the nature of this magnificent deity.
.
The Opening Ceremony of the Olympics was a Satanic Ritual that mocked the Last Supper Covenant of Jesus Christ ... in preparation for the arrival of the Antichrist and the 7-year Covenant of the Antichrist Kingdom!
.
The Olympian Mystery - Opening Ceremony - The Secret Behind What You Just Saw | Jonathan Cahn Prophetic -- https://youtu.be/IFWM-ulP9fY?si=HtzsjLHFuuDoLwTo
.
What happened at the Olympics ceremony is a Satanic ritual to usher in the Return of the Pagan gods of Rome and Greece and Persia and Babylon!
.
The world is turning away from Jesus Christ who can save a person from sin (the fallen identity that each person is born with) and give a person peace with God, a sonship of God (the identity that each person was created to be before the fall ... which is called a "born again" identity in Christ).
.
The world is turning toward the Antichrist MAN who doesn't care about saving you from your fallen sin identity (He doesn't care about you at all, except to hear your applause when he speaks on the stage) but he promises to save the earth from conflict and give people a great MAGA life if they worship him and take his name!
.
========= Jesus is the Way, the Truth and the Life (John 14:6) ==========
.
Sound the shofar ... Jesus isn't "so far" away but He is NEAR to those who draw near to Him. The King is COMING!
.
Timeline 1: Possible Order of Events as described in the Book of Revelation - Chastic Structure:
- Day of the Lord Starts! Pre-Trib Rapture of Born-Again Church to Heaven with Jesus (Rev 4,5)
- Seal Judgments for Left Behind Church, Antichrist Chosen, 144K Jews Sealed, 6 months? (Rev 6,7)
- Trumpet Judgments for Nations, 7 yr covenant made, 2 witnesses, first 3 1/2 yrs (Rev 8,9,10,11)
------------ The SIGNS in Heavens describes the 7 years of Jacob's Trouble (Rev 12) -------------
- Bowl Judgments for Jews, Beast commits AoD and institutes MotB, last 3 1/2 yrs (Rev 13,14,15,16)
- Jesus TAKES out the Beast, False Prophet and those who have taken the MotB, 6 months? (17,18)
- Day of the Lord Ends! Jesus RETURNS with His Saints to REIGN and RULE for 1,000 years (Rev 19,20)
.
Timeline 2: Possible Order of Events as described in the Book of Revelation - Chastic Structure:
- Church on Earth (Rev 2,3)
-- Day of the Lord Starts! Jesus TAKES His Bride Church from Earth to Heaven (Rev 4)
--- Church in Heaven, 24 Elders on Thrones, casting their crowns to Jesus (Rev 5)
---- Seal Judgments, Antichrist Conquers, America Babylon Falls, first 3 1/2 years (Rev 6,7)
----- Trumpets and Bowls, 144K Jews, Beast kills Saints, last 3 1/2 yrs (Rev 8,9,10)
------ Seal Judgments, Two witnesses, building of the Temple, first 3 1/2 years (Rev 11)
------- Overview ... Rapture then Jacob's 7 years of Trouble, TWO 3 1/2 yr periods (Rev 12)
------ Seal Judgments, Beast and False Prophet, MotB, AoD first 3 1/2 yrs (Rev 13)
----- Trumpets and Bowls, 144K Jews, Hell on Earth! last 3 1/2 yrs (Rev 14,15,16)
---- Seal Judgments, Antichrist Conquers, America Babylon Falls, first 3 1/2 years (Rev 17,18)
--- Church on Earth, Marriage Supper of the Lamb, 1,000 year REIGN of Christ (Rev 20)
-- Day of the Lord Ends! Jesus RETURNS with His Bride Church from Heaven to Earth (Rev 19)
- Church in NEW Jerusalem on NEW Earth (Rev 21,22)
.
Will the Antichrist be the King of England, or Obummer, the Pope, a Rabi, a Muslim or will he be a "boaster" of power like Trump!
.
Hitler was a boaster to Make Germany Great Again! Trump-CINE is a boaster to MAGA - Make America Gullible Always! Will Trump eventually REPENT like Nebuchadnezzar did or will he perish as an unbeliever, since Trump said he has never asked for forgivenessness from God.
.
What is "Greatness"? It is works that are based on God's foundational Truths! God is the judge of a Nation and the works of that Nation ... based on God's STANDARD of Greatness which is based on His RIGHTEOUSNES.
.
Righteousness exalts a nation, But sin is a disgrace to any people. - Proverbs 14:34
.
The "media journalists" and "leaders" who talk about GREATNESS but don't talk about GREATNESS that is based on "God's Four Foundation Stones" vs the "Four Foundation Stones of Satan's Kingdom" are either ignorant, disingenuous ... or they are Controlled Opposition who are Dancing with the Devil, trying to get rich pedaling the hate of one party or person over another party or person (like World Wrestling Entertainment) ... which changes NOTHING except the faces on the stage and tactics of their Deception.
.
Righteousness and Justice are the foundation of Your throne; Mercy and Truth go before You. - Psalm 89:14
.
The foundation of America, its Declaration of Independence, was based on God's Foundation Stones but the America of today is resting on the Four Foundation Stones of Satan and that is why God's judgment is COMING! Unless we EXPOSE the EVILS of Satan's work (Ephesians 5:11) and TURN (Repent) from this EVIL (1 Peter 3:10-12), we will perish like every other Nation and people throughout history.
.
The Left is being driven to the radical LEFT (Obama - Lasciviousnes - Fake Love- No Truth - Anarchy - DEATH) and the RIGHT is being driven to the radical RIGHT (Trump - Legalism - Fake Truth - No Mercy - Tyranny - DEATH). People are being COMPELLED/MANDATED to Choose SIDES ... Left or Right ... Civil War is coming to America and it won't be CIVIL!
.
We should be standing on the Four Foundation Stones of God's Kingdom ... Righteousness, Justice, Mercy (Lovingkindness) and TRUTH ... to receive His forgiveness and blessing but instead we are arguing and choosing sides based on emotional psyops programming which pits persons and personalities against one another for Entertainment like a WWE match or Avenger's movie!
.
If Trump is an instrument of God in his present state of Spiritual awareness, he is being used in the Spirit of the Antichrist ... he is being raised up as a dictator to judge America for their unrighteous SIN ... like Nebuchadnezzar was raised up to judge/discipline the Jews for 70 years. When Nebuchadnezzar boasted of his GREAT accomplishments, God made him into a BEAST for 7 "times" (which is a reference to the last 3 1/2 years of the Tribulation Period ... the Beast Kingdom) ... then after that time of humbling he REPENTED of his boasting and his kingdom was RESTORED!
.
Now I, Nebuchadnezzar, praise and extol and honor the King of heaven, all of whose works are truth, and His ways justice. And those who walk in pride He is able to put down. - Daniel 4:37
.
.
======= Come out of her (Babylon America the NWO system) my (God's) people! ===================
.
I think voting "can" matter at a Local level ... for instance in a School Board election where I know one of the candidates is a Christian who desires to uphold Godly values and the other candidate is someone who is pushing a WOKE agenda. In this case voting for the Christian candidate "could" make a difference, if the Christian understands the significance of promoting Godly values and if the Christian understands the cost and difficulty of promoting Godly values and if the Christian does not compromise and vote against Godly values and if the Christian is able to convince the other members NOT to TAKE Federal Government MONEY which obligates them to implement a WOKE Federal agenda.
.
So I do see where voting for a Godly candidate can be beneficial at the Local level to restore/sustain Godliness to that community, however I do NOT see the same possibility at the Federal Level ... because the candidates who are running for office at the Federal Level or the representatives who are in office at the Federal Level are NOT EXPOSING the EVIL Foundations that our Federal Government is sitting upon. They are NOT discussing the "root causes" of America's sickness and how they plan to CURE America ... Therefore they are either woefully ignorant of what is going on (like most Americans), or they are deceived that these root causes are just Conspiracy theories or they are purposefully complicit in the Destruction of America!
.
The Patriots who answered the call of the "Declaration of Independence" knew the enemy of Freedom was King George of England for demanding "Taxation without Representation" ... THEIFT! However, today's Patriots can't correctly identify the enemy of Freedom ... It's not a few Deep State Politicians who misappropriate funds to enrich themselves but it's the Deep Demonic State that "We the People" have allowed America to become ... A Nation built upon the Satanic Foundations of Fake Money, Fake Medicine, Fake Morals and Fake Science ... with a RISING Antichrist Intelligence (AI) Technocratic Surveillance System that is monitoring us like a Prisoners and MANDATING that we abide by these 4 Satanic Pillars of LIES or suffer the loss of life!
.
Sadly, America is a nation that trusts in "chariots" (its Military) like the Egyptians who were washed away in the Red Sea! America uses its Military Industrial Complex to coerce, bully and topple Nations who won't trade their oil for the FAKE US petrol dollar. The dollar has NO real value ... it says "In God We Trust" but it displays the all-seeing eye of Lucifer on top of an Eqyptian pyramid ... this is the god of this world, NOT Jesus Christ! America is not using it's military "rod of iron" to feed the poor and promote the righteousness of God but it uses it to steal, kill and destroy others in the name of "Peace and Prosperity" for the benefit of the Bankers and the Elite and those who trust in their Mammon portfolios!
.
What sorrow for those who say that evil is good and good is evil, that dark is light and light is dark, that bitter is sweet and sweet is bitter. - Isaiah 5:20
.
God has judged America and the world. He has given it over to the coming 7-year period of Tribulation and wrath upon the earth, the NWO Survilleince State, the Antichrist Intelligence (AI) Kingdom.
.
Righteousness and Justice are the foundation of Your throne; Mercy and Truth go before You. - Psalm 89:14
.
God's Foundation - Satan's Foundation
1. Righteousness - Wickedness (FAKE Morals)
2. Justice - Corruption (FAKE Money)
3. Mercy - Ruthlessness (FAKE Medicine)
4. TRUTH - LIES (FAKE Science)
.
The Four Pillars of Satan's Works:
1. Fake Morals of LGBTQP+ reprobate mind, abortion and glorifying prideful/deceitful/sinful behavior (Wickedness)
2. Fake Money of Big Banks and a Crony Capitalism Public/Private Partnership (Corruption)
3. Fake Medicine of Big Pharma and the Mythology of Virology (Ruthlessness)
4. Fake Science of Climate CONTROL, Evolution and Transhumanism (LIES)
.
The 5th Column of Satan is the "Media and Technocracy" ... The Media uses "Collectivism" ... The Deceptive call for Unity and World Peace under a One World Human Government that is NOT accountable to God ... 6uild 6ack 6abel. Technocracy is the Big Tech Survillence State, Monitoring and Anithchrist Intelligence (AI) Control of everything and everybody ... a NWO/BEAST Kingdom!
.
The critical issue that should be discussed in the Churches today is NOT their differences in Theology but their understanding of Eschatology and their Discernment concerning the Signs of the Time (The Deception of Pharmecia, the agenda of a One World Order, the advancing Survilleiance State and the displays of Demonic Behavior!).
.
From the tribe of Issachar, there were 200 leaders of the tribe with their relatives. All these men understood the signs of the times and knew the best course for Israel to take. - 1 Chronicles 12:32
.
WAKE UP people! ... We are experiencing the "Time of Sorrows", the birth pains, before the onset of the 7-year Tribulation period. Stop clinging to this world ... get ready to be "caught up" to be with Jesus!
.
The world has lots it's mind! When a PhD is awarded to the one displaying the highest level of toxic positivity in society or to the one claiming to be the most victimized by society. They have received their title ... Philosopher of Hedonistic Delusion.
.
We are living at End Times when the love for one another has gone cold and the love of self is on FIRE! We are living in a Narriastic Worthless Order (NWO), where the Puppets on the world stage promise "Peace and Prosperity" while the Demonic Powers who CONTROL these Puppets are setting up a Technocratic Tyranny, a Surveillance State with Bio-Metric Digital IDs... A New World Order (NWO) Government of Elite Satanic Globalists (ESG) enforced by a Nerd World Order (NWO) system, the rod of silicon chips and Antichrist Intelligence (AI), controlled by a Noahide World Order (NWO) Religion! Maranatha!
.
And I heard another voice from heaven saying, “Come out of her, my people, lest you share in her sins, and lest you receive of her plagues - Revelation 18:4
.
Jesus answered and said to him, “Most assuredly, I say to you, unless one is born again, he cannot see the kingdom of God.” - John 3:3
.
The ABCs of Salvation explained by JD Farag --> https://youtu.be/XyNuvJNE3-Q
A - Admit your a sinner (Romans 3:23)
B - Believe Jesus is Lord (John 3:16)
C - Call upon His name (Romans 10:13)
.
For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life. - John 3:16
.
Jesus' Blood Saves - Jesus' Death for our sins, burial, resurrection for our justification ---> https://63b26a41e0946.site123.me/
.
That if thou shalt confess with thy mouth the Lord Jesus, and shalt believe in thine heart that God hath raised him from the dead, thou shalt be saved. - Romans 10:9
.
With your mind you BELIEVE
With your heart you RECEIVE
With your mouth you CONFESS
You're no longer DECEIVED!
.
Do you WANT to Know the TRUTH about what is going on in the world? This world and humanity is FALLEN and UNDER the CURSE of SIN. God has a WONDERFUL PLAN for you and for His Kingdom COME ... God doesn't want you to PERISH in SIN but to live in Christ and be BORN AGAIN! Listen to the Living word of God from the BOOK of John NKJV ---> https://youtu.be/0I8VfF310EE
.
Expose the LIES and Turn the EYES upon Jesus.
.
The "Mark of the Beast" is the Damnation of God upon those who don't believe in Jesus but the "Mark of the Feast" is the Grace and Pleasure of the Lord upon those who believe in Him!
.
Heart - The Will - (Red) - Jesus the Son - The Saving and Loving Relationship aspect of God
Mind - Reasoning - (Blue) - God the Father - The Righteous and Critical Thinking aspect of God
Breath - Emotions - (White) - Holy Spirit - The Convicting Revelation and Purifying aspect of God
.
HOPE - His Overcoming Power Everyday
REST - Resurrected Enjoyment (in the) Savior Today
LOVE - Living in Victory Everlasting
JOY - Jesus Only Y'all
.
My Pre-Tribulation Rapture Channel on Telegram ---> https://t.me/Pre_Trib_Rapture
.
Blessings - Rogersings
Learn how to use Notion to manage tasks and enhance team alignment with customizable templates for engineers in a fictional company setting.
### Highlights
- 🛠️ **Getting Started**: Notion offers pre-made templates to quickly set up your workspace.
- 📚 **Engineering Wiki**: A centralized place for all critical team documents and guidelines.
- 📂 **Subpages**: Create nested pages for organized access to information.
- 📝 **Task Management**: Use databases to track and manage engineering tasks effectively.
- 🎯 **Customizable Properties**: Add task details like status, priority, and assignee easily.
- 🔌 **Embedding Content**: Integrate various types of media and code snippets seamlessly.
- 🌙 **Dark Mode**: Reduce eye strain by switching to dark mode in settings.
### Key Insights
- 🛠️ **Templates for Efficiency**: Pre-made templates save time and provide a solid foundation for engineers to begin using Notion effectively. They can be customized to suit specific team needs.
- 📚 **Knowledge Management**: An engineering wiki is essential for maintaining a clear record of important documents, ensuring all team members, regardless of tenure, have access to vital information.
- 📂 **Nested Structure**: The ability to create subpages allows for an organized hierarchy of information, making it easier for teams to navigate and find what they need quickly.
- 📝 **Task Management Flexibility**: Notion's database feature transforms each task into a detailed page, allowing for comprehensive tracking and management of engineering projects.
- 🎯 **Custom Properties**: By customizing task properties, teams can tailor their workflow and ensure that critical information is easily accessible, enhancing productivity.
- 🔌 **Rich Media Integration**: The capability to embed various content types promotes collaboration and enhances the richness of the information shared within the team.
- 🌙 **User Comfort**: Features like dark mode improve usability, which is particularly beneficial for engineers who may spend long hours working on screens.
Check out 👉https://beacons.ai/theknowledgeshelf
In this video, Tatiana guides beginners on how to set up Notion, covering account creation, exploring features, and creating your first page.
### Highlights
- 🎉 Create Your Account: Sign up for Notion using email or social media.
- 📄 Explore Templates: Utilize built-in templates for easy organization.
- 📝 Customize Pages: Add text, images, and other elements to your pages.
- 🔗 Create Nested Pages: Organize content by creating pages within pages.
- 📊 Use Databases: Structure information with customizable databases.
- 🎨 Personalize Covers: Add images or icons to enhance your pages.
- 🔍 Access Help: Find documentation and shortcuts for easier navigation.
### Key Insights
- 🎯 **User-Friendly Setup**: The initial setup process is straightforward, allowing users to quickly dive into Notion's features and benefits.
- 📋 **Template Usage**: Built-in
In this gripping keynote from the 2024 Bitcoin Conference, Edward Snowden delivers a stark warning about the future of privacy in the age of AI and blockchain technology. Drawing from his unique background in intelligence and cybersecurity, Snowden outlines how advanced AI models could soon be used to analyze blockchain transactions, potentially compromising the privacy of cryptocurrency users worldwide.
Speaker: Edward Snowden
Chapters:
00:00:00 - The State of the Industry Update
00:03:56 - Concentration of Resources and Intermediation
00:07:10 - Systemization of Technologies
00:10:21 - Building a structure around them to prevent monopoly formation and tax avoidance
00:13:45 - Metadata as Activity Records
00:16:57 - The Potential Risks of Transaction Monitoring
00:20:10 - The vulnerability of enormous data sets
00:23:12 - The Changing Dynamics of Economy and Politics
00:26:25 - The Need for Cooperation and Working Together
00:30:07 - Hyperbitcoinization
🦁 www.MAGAlionHAT.com 🦁
-------------------------------------------------------------------------------------------------------
Enjoy the content I provide? Please help support this renegade channel with PayPal! 💰
PayPal: MAGAlionHAT@Gmail.com
Or, if you like you can Buy Me A Coffee: https://www.buymeacoffee.com/MAGAlionHAT
Crypto wallet addresses below. If you have a type of Crypto you wish to donate that I don't have a wallet for, email me and I will create one! 🤑
It keeps me afloat while I'm working to produce informative and entertaining videos while finding and providing gems from other creators for you to enjoy! 🤗
Any donation would be GREATLY appreciated! Thank you and God Bless! 🙏
₿itcoin (BTC):
bc1q63xshh2c2u4tvc6jksl5crlhtp554qu0l4nn8j
₿itcoin Cash (BCH):
qqms8t79e6rk5z5djad360d38y9kkqnh7yfpxkkuy5
₿itcoin SV (BSV):
1F6oH8qkMjswViJSwq965gRivE3DqKuJKC
Litecoin (LTC):
LgxrUdjUxnmFGLtsAbh76C3aAm3dXAGDFV
Dogecoin (DOGE):
DGn5bkC9WM1E2oM79HWiYoVxE3rHuEGkoS
Ethereum Classic (ETC):
0xC03AEe5333D50a20810e1A7585D9BB3f77E0B773
Ethereum (ETH):
0x27d5493Ac22D56B68cF36F5f77594BDC8e6FAc5E
Shiba Inu (SHIB):
0x27d5493Ac22D56B68cF36F5f77594BDC8e6FAc5E
Chainlink (LINK):
0x27d5493Ac22D56B68cF36F5f77594BDC8e6FAc5E
Polygon (MATIC):
0x27d5493Ac22D56B68cF36F5f77594BDC8e6FAc5E
Ripple (XRP):
rwvGofsMZQMyqro9YPe7swpo6C6Kagpg2e
VeChain (VET):
0x6410f2e05fEF8169bd1A6935884B9D4D56D9017b