Activation key dead Trigger 2 Hack Tool Pin - News - The Qin age of
CLICK or TAP BELOW TO VISIT THE WEBSITE: http. Facebook is showing information to help you better understand the purpose of a Page. Game Resources Hack Online Mobile Game New Tricks Cheating Hack Tool Helpful Hints Ios It Works. Dead trigger 2 hack tool for android. Nice trying and really efficient.
Activity code dead Trigger 2 Hack and Cheats Tool Online
Dead Trigger 2 Mod Apk Download Android Latest Version look at here now. Our web site grew rapidly. We're talking about an app like Darklings Season 2, Alien Shooter, Into the Dead, Daddy Was A Thief, Samurai Tiger. This tool is also known as an unlocking pattern tool due to its main features. Select your device and press Connect.
Hacked dead Trigger 2 Hack For Android No Survey
Welcome to page the place you may download dead set off 2 cheats tool. H2testw 1.6 download, h2testw official site, h2testw cnet, h2testw windows 10, h2testw android, h2testw sd card test, h2testw mac, how to use h2testw. It built on x86 Architecture, support advanced features like OpenGL & hardware acceleration, run faster, more stability and compatibility than other Android Emulators. You will study within this location a great deal of things about the Madden Mobile. DEAD TRIGGER 2 Hack for iOS, Android & Windows Dead Trigger 2, Madfinger has attempted to inject some variety into the series, adding new zombie types, more varied mission objectives, and a hideout featuring upgradeable workstations and weaponry.
Crack dead Trigger Hacked Money and Gold + Cheats
Now the survivors of this plague have joined the Global Resistance and must fight against. Dead Trigger 2 became very popular game, so we decided to make hack tool for it. We are happy to announce that this is our first cheat tool that works for android and iOS (iPad, iPhone). Feb 16 - Dead Trigger 2 Hack Tool 2020 Free Download (NEW) 2020 Feb 16 - Dead Trigger 2 Hack Tool 2020 Free Download (NEW). Over the last few days has been testing the correct. If you are looking for a easier way and to make your progressing experience much more entertaining then we really recommend you this tool.
Download jurassic world the game cheats
Dead Trigger 2 Glitch for Unlimited Gold and Money. Dead Trigger 2 Hack Gold and Money Cheat Tool Android iOS UPDATED No Download1. Dead Trigger 2 Cracked Repo Dead Trigger 2 Cheat Gold Facebook cheats for contract killer 1 android dead trigger 2 free money and gold dead trigger 2 ios cheats 2020 dead trigger 2 hack tool apk android cara cheat dead trigger 2 apk dead trigger 2 ios hack jailbreak descargar dead trigger 2 hack apk 2020 dead trigger 2 hack unlimited gold and money dead trigger 2 earn money fast 2020 dead. Topic: Dead Trigger 2 Quick Money Now. Dead Trigger 2 Gold right here. Download Dead Trigger 2 Mod APK v1.6.9 [Ammo] + OBB for.
Enemy front key generator tool 100% working free download
Dead Trigger 2 is the brand new zombie shooter game which brings intense horror. Dead Trigger 2 How To Get Easy Money Dead Trigger 2 How To Get Easy Money This topic has 0 replies, 1 voice, and was last updated 1 year, 9 months ago by TragisteabeZV. Dead Trigger 2 is a game released in as a first person shooter by Madfinger [HOST] game was released for Android and iOS on 23 October and for Facebook in February Dead Trigger 2 was created with Unity game engine. You do not have to worry about detection, because our cheats work on the basis of undetectable scripts. Best Software Dead Trigger 2. Zombie Tsunami Best Zombie By Any Means Necessary Free Android Games Android Apk.
Battlefield 4 Hack Free Download [No Survey] [No Password
Kill Shot Hack Tool (Android/iOS) - HacksBook. [MOD][HOW TO]Enable Tegra 4 Graphics on Dead Trigger 2 my website. Dead Trigger 2 Hack No Human Verification Free Cheats. The graphic is impressive with the game. This topic has 0 replies, 1 voice, and was last updated 1 year, 8 months ago by DenekhoiniDI.
Rules + Events + Android Spoofing Setup Guides + Other Android Guides + GPX Routes + Poke Maps + Discord Group Invites + Frequently Asked Questions
- Events for the Month
- Our Subreddit Rules, read, and follow them.
- New to Spoofing?
- No Root Android Method Guides
- Rooting and Buying Guides
- Rooted Android Method Guides
- Other Android Guides
- Adventure Sync Guides
- GPX Routes
- Catching Pokemon: Poke Maps, Nest, and Discord Groups
- Frequently Asked Questions
- [Active] Lake Legends Event: Shiny Goldeen released! Legendary Lake Trio in raids! Tue, Nov 24, 8 AM to Mon, Nov 30, 10 PM Local Time [IV Charts / GPX Routes / Discord]
- [Active] November 2020 - Research Tasks & Rewards - Togetic - Spinda #4
- [Infographics] Mega Raids - Infographics on the latest Mega Raids
- [Infographics] Team Go Rocket Grunts, Leaders, and Boss - Cheat Sheet and Battle Hints
- [Event Countdown Site] P337 Pokemon Go Countdown Timers and Events
- See this link to read all of about them: https://www.reddit.com/PoGoAndroidSpoofing/about/rules
- Rules are simple.
- How to Spoof Correctly
- What triggers a cooldown? How to avoid softban (cannot spin Pokestop & all Pokemon flee)?
- Softban Cooldown Chart
- All About Red Warnings and Strike System 2020
- How to Spoof with a Windows and Mac Computer for 2020?
- Poke Coins - Free to Play and buying tips
- VPN does not add a joystick to help you spoof
- EX RAID Pass (Information)
- Multiple/Bonus Raid Passes Guide by aditya-lr
- [No Root Method] How to Downgrade OS Firmware and Downgrade Google Play Services
- This is FREE but setting this up may or may not work on your device. Works on Android 5.0 to 7.0 and some 8.0; the older the firmware, the better chances you may get this to work.
- [No Root Method] PGSharp.com Modified App - up to Android 10, easy to set up, Gotcha support, free trial available, but costs $5/month - Updated August 23, 2020
- This is EASY to set up but requires money to use after your free trial has expire. Works up to Android 10 without rooting.
- How to ROOT your Android device for Smali Patcher, Systemize, Taichi, or Modified Apps spoofing methods and BUYING guide
- How to Root your Huawei or Honor device 2020
- Below are Full Root to Spoof Guides for specific devices:
These rooted methods rank from medium to hard difficulty depending on your tech skills and requires your device to be rooted with Magisk. Rooted Methods #1, #2, #3, and #5 are FREE. Methods #4 and #6 requires money.
- [ROOTED METHOD #1] Smali Patcher Guide for Android 6.0 to 11.0 devices Oct 2020
- This is FREE and is the best method.
- I have just updated it on October 19, 2020 to support the newest version of Magisk Manager v8.X.X.
- If this one does not work on your device, you can try #2.
- [ROOTED METHOD #2] Systemized Spoofing App with Tin Foil (alternative old method)
- This is FREE and is an older method that still works but requires tin foil to block GPS signal in order to spoof.
- [ROOTED METHOD #3] Enhancer with special features Nov 2020
- Cost money for premium Android features like 100% excellent throws and etc.
- [ROOTED METHOD #4] Pokemod with special features like a Virtual Gotcha Nov 2020
- This is FREE for premium Android features like 100% excellent throws and etc. This "cheat tool" has already been through one ban wave.
- [ROOTED METHOD #5] Charbot, the very hard to set up Pokemon Go Bot Nov 2020
- Please read all warnings about this bot.
- 100% Dead spoofing methods: VMOS & Taichi
- VMOS no longer works because they charge money to use the Android emulator. VMOS' purpose is not to help you spoof in Pokemon Go but to allow Huawei devices to circumvent the US sanction for not allowing to use Google apps and services on Huawei and ZTE devices. There is no more VFIN app to help you bypass the SafetyNet checks. The emulator is only rooted with SuperSu, so you will always get an incompatible screen.
- Recommendation: Pay money to spoof with PGSharp.
- Taichi, which was an alternative method to Smali Patcher, no longer works because you cannot download the Taichi module within the Magisk download section inside the Magisk Manager. This module is required to set up the method. They removed it because the creators of the Taichi module put malware into it. Since I am not an Android coding expert, I cannot verify the claims. You can read about it here XDA Thread: WARNING: Do NOT use TaiChi any way!!!!!!
- You can continue using it at your own risk if you are using this method.
- Try Smali Patcher again.
- Buy a different device to try Smali Patcher.
- Pokewalk FAQ, Guide and Info
- NemoADB for GPS Joystick [multi-device teleport and fast map loading]
- Mirroring screen of your phone (rewritten)(updated)
- How to use a Macro Recorder to Automatically Evolve Pokemon and do Raid Battles
- Samsung Galaxy Split Screen Dual Accounts
- Adventure Sync Using Machines (Defit and Pokewalk Alternatives)
- These machines can be used on Apple iOS devices too.
- Pokewalk FAQ, Guide and Info (Android) by Bonfi96
- Creating and Using GPX Routes + GPX Downloads (November 2020)
- Covers how to make GPX Routes, Gotchas, and pre-made ones to use.
- Generate Optimal Routes for your FakeGPS app
- Use Ingress map to pull portal/Pokestop coordinates from a large area. This is currently a work in progress. This is best used on a computer.
- How to Convert a GPX Route using a Computer
- Poke Maps and other map sites [Nov 2020] *Some down due to Coronavirus.
- Nest sites & List of Pokemon that Do Not Nest [November 2020]
- Regional Pokemon Locations [November 2020]
- Discord Group Invite Links List for Raiding, Sniping, Friending, Trading, and Battles Nov 2020
- How to Create a Free Rare Pokemon Tracker Using a Second Account
- Shiny Rates - Gives you an idea of what the shiny rate might be for a Pokemon
- [Game Related] Searching & Filtering your Pokémon Inventory
- [Event Timer] Community Day Timers
- [Timezone] TimeBie - Time Converters among Different Time Zones
- "Time Buddy" is their app.
- [Weather] Best Way to Find Weather using Weather Apps
- [Trading] Pokemon Go Global Trades (Subreddit link)
- [Paid Ticket Events] All about Safari Zone and Go Fest for 2020 (was written before the Coronavirus outbreak)
- [Multiple Raid Passes] Mewtwo and Moltres Bonus Raid Passes Guide
- [Spoofing Locations] Spoofers of the world, it’s time for us to rejoice! (May 2019)
- [Spoofing Locations] Best Hot Spots in the World
- [Unlinking Account] How To Unlink Gmail/Facebook from a permanently terminated Accounts
- Community Day Guide with Coordinates and GPX Routes
- Spotlight Guide
Flatten the Curve. #47. Keep Calm and Carry On meme was/is Propaganda. Pentagon MEME Warfare Center. Bill Gates Gene Drive Editing. Pakistan and China Biowarfare Lab Cooperation. Chinese Spy at UC & CRISPR-Cas9/Covid-19 Data? Political Chess at the WHO. AI and Gene Drive Can Stop the Pandemic.
Propaganda. Real propagandists are good at what they do. Really good. This is why you don't know it's propaganda until after the dust has settled, so to speak. All we can do is look back after the fact.
The truth doesn't always lead to the facts, but the facts always lead to the truth.
I came up with that axiom years ago. It just popped into my head. Don't know why, it just did. But keep that in the back of your head whenever you read fake facts.
So what are the facts and where is the truth? What can we line up in a manner that makes sense. Where do we dig in all this information for the artifacts they try to bury from us?
Let's start at Keep Calm and Carry On. Remember that? It's strange how viral it became, isn’t it? Almost like governments like viral information pandemics they choose, and use fake facts to suppress viral information that isn't good for your mental health, like conspiracy theories.
Have you noticed me using Keep Calm and Carry On a lot? It was on purpose. I wanted to illustrate how easy it is to be bombarded by terms like Keep Calm or New Normal into everyday usage. You don't think it affects the majority of society? Please. They don't spend billions upon billions into advertising just because they like commercials, they do it because it shapes our behavior.
Keep calm and carry on posters weren't mass-produced until 2008. It is a historical object of a very peculiar sort. By 2009, when it had first become hugely popular, it seemed to respond to a particularly English malaise connected directly with the way Britain reacted to the credit crunch and the banking crash. From this moment of crisis, it tapped into an already established narrative about Britain’s “finest hour” – the aerial Battle of Britain in 1940-41 – when it was the only country left fighting the Third Reich.
2008 Financial Crisis.That's odd timing, isn't it. They we're mass produced. And if you remember there's also strong evidence that the Financial Collapse was probably engineered by China through MBS manipulation.
Let's keep calm and dig on.
This was similar to the “Keep calm and carry on shopping” commanded by George W Bush both after September 11 and when the sub-prime crisis hit America. The wartime use of this rhetoric escalated during the economic turmoil in the UK; witness the slogan of the 2010-15 coalition government, “We’re all in this together”.
What a wonderful world we live in. Keep calm. It's all good. Nothing to fear but fear itself. Right? Because there is nothing strange about President Bush using that phrase after 9/11, or the coalition UK government saying we're all in this together. Aren't we hearing more and more about how we're all in this pandemic together? Do you really believe this is by chance? Remember, world leaders have speech writers and world wide PR firms. And let's not forget that Afghanistan seemed to be more than about a former CIA asset against the Soviet Union hiding in a cave after he brought down the World Trade Towers using terrorists who didn't pass flight school.
So the slogan started in WW2 and it was created by the British Ministry of Information. That alone should make you hit pause, ask WTH, and rewind to see what else was missed.
Memetics: A Growth Industry in US Military operations was published in 2005 by Michael Prosser, now a Lieutenant Colonel in the Marine Corps. He proposed the creation of a 'Meme Warfare Center'.
Memetic warfare has been seriously studied as an important concept with respects to information warfare by NATO's Strategic Communications Centre of Excellence. Jeff Giesea, writing in NATO's Stratcom COE Defense Strategic Communications journal, defines memetic warfare as "competition over narrative, ideas, and social control in a social-media battlefield. One might think of it as a subset of ‘information operations’ tailored to social media. Information operations involve the collection and dissemination of information to establish a competitive advantage over an opponent".
The 2008 cyberattack on the United States was the "worst breach of U.S. military computers in history". The defense against the attack was named "Operation Buckshot Yankee". It led to the creation of the United States Cyber Command.As usual, the suspect was Russia. Blame Russia. They stole the cookies from the cookie jar. But we have the 2008 financial collapse at the same time. Now this either points to Russia did it alone, Russia did it with China, China did it alone and Russia is the scapegoat to keep us in the dark, or an unknown party attempted to gain access. The third option is unlikely.
That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control. It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary.
So we had a financial collapse. Keep calm and carry on posters mass produced in the same year. A cyberattack. All in 2008. That's a very busy year, isn’t it? It's almost like 2015.
Almost like they took control of the narrative information flow before the information went viral and an uncontrolled narrative sprang up from the information.
And that narrative control is growing and getting stronger. Let's think about the Sentinel world simulation program. Or rather, simulations simultaneously simulated to simulate simulation possibilities. (Maybe I should write Dr. Suess kids books for the New Normal kids of tomorrow?) In other words, they can plan back up plans for back up plans. But as the simulations grow more accurate and Sentinel learns from it's mistakes, the simulations will grow in accuracy, and the machine could very well become pre-cognitive. Yes that's an outlandish proposition, but so was flying three hundred years ago, or a thinking computer for that matter. You can't dismiss tomorrow's possible advances in science as fiction when today's science was yesterday's science fiction.
ORDO AB CHAO meaning ORDER OUT OF CHAOS.
Yes this can mean creating chaos in events to manufacture order. But on a grand scale it also means to create order in the chaos of reality. It means controlling information before it becomes viral and takes on a life of it's own, becoming an out of control pandemic.
And we don't have a pandemic that's being subjected to a narrative, do we?
Well now that you ask, let's see if I can show some more information to potentially break the sanctioned narrative.
I'm not going to lie, the level of control at this point is frightening, and it's so obvious that it's become normal and nobody notices. It's background noise. A hum. A constant current of conflicting information to increase cognitive confusion to camouflage current events.
After and before the 2008 cyberattack and financial collapse, we had the Great Recession, which began in December 2007 and ended in June 2009, which makes it the longest recession since World War II.
And then there was this.
2009 swine flu pandemic. Analysis of the genetic divergence of the virus in samples from different cases indicated that the virus jumped to humans in 2008, probably after June, and not later than the end of November, likely around September 2008.Cyber Attack. Economic Crash. Keep Calm and Carry On starts. Great Recession ends. Pandemic.
Unlike most strains of influenza, the Pandemic H1N1/09 virus does not disproportionately infect adults older than 60 years; this was an unusual and characteristic feature of the H1N1 pandemic.
The 2009 swine flu pandemic was an influenza pandemic that lasted for about 19 months, from January 2009 to August 2010, and was the second of two pandemics involving H1N1 influenza virus (the first being the 1918–1920 Spanish flu pandemic).
The timing looks awfully suspicious, doesn't it? It looks rather strategic, doesn't it?
So Let's Keep Calm and Contagion On.
Margaret Chan Fung Fu-chun, OBE, JP, FRCP (born August 21, 1947) is a Chinese-Canadian physician, who served as the Director-General of the World Health Organization (WHO) delegating the People's Republic of China for 2006–2017. Chan has previously served as Director of Health in the Hong Kong Government (1994–2003), representative of the WHO Director-General for Pandemic Influenza and WHO Assistant Director-General for Communicable Diseases (2003–2006). In 2014, Forbes ranked her as the 30th most powerful woman in the world. In early 2018 she joined the Chinese People's Political Consultative Conference (CPPCC).And she was followed by another Director General.
Tedros "was supported by a bloc of African and Asian countries, including China, which has considerable influence with those members" while "the US, UK and Canada... lent their support to... the British doctor David Nabarro." One observer called it "a really nasty" election.There were allegations made of a cover up by the David Nabarro camp about a pandemic in Ethiopia, which were covered by the NY TIMES.
Does this put things in a little better perspective about recent events? President Trump pulls American funding from the WHO, Bill Gates increases funding becoming the number one source of revenue. In other words, it allows the political message to be made, while also removing American legal oversight, yet still leaving or increasing control over the WHO in the hands of Bill Gates.
Recall the DoD advisory board with all the tech gurus? Wasn't the absence of Bill Gates or Microsoft strange? What about all the disparaging statements by Bill towards the President? Yes all of this could be real, but it could also very well be staged. Don't forget about the central point in Unrestricted Warfare, you hide your attacks and confuse the enemy. And the same in Full Spectrum Dominance, you control all the sources of information because you fight in a Gray Zone, where you leave the enemy unbalanced and unsure of factual information.
This is why it's next to impossible to get a handle on all the information, it's by design. We don’t know who's responsible for what. But it's becoming increasingly clear that we are already in a war.
To our way of thinking, a planned stock market crash, a computer virus attack, making the currency exchange rate of an enemy country erratic, and spreading rumors on the Internet about the leaders of an enemy country can all be thought of as new concept weapons.Again, think of the timelines. Think back to one nation in 1989 squashing the revolution. Think about rare earth elements. Was this blackmail to force trade with the west? Are there indicators that point to a greater catastrophe and a war for dominace and survival of culture? There are ample examples in Western National Security papers indicating this. And there are also Asian Security papers indicating the same, which we will look at in a later post.
"Unrestricted Warfare": Military/Civilian Distinctions Break Down "Unrestricted Warfare" means that any methods can be prepared for use, information is everywhere, the battlefield is everywhere, and that any technology might be combined with any other technology, and that the boundaries between war and non-war and between military and non-military affairs has systematically broken down.
Qiao and Wang called for a “revolution in war,” which combines conventional with non-war actions, and military with non-military actions. In an alarming opinion, they stated that war may include a blend of stealth planes and cruise missiles, along with biochemical, financial, and terrorist attacks.
Lawfare • Lawfare, or political action through transnational or non-governmental organizations can effect a policy change that would be impossible otherwise. Because of the international nature of the modern world and activism, it is much easier for nation-states to affect policy in other nation-states through a proxy. Network warfare • One of the better-known alternatives in this book is the idea of attacking networks. Networks are increasingly important in not only data exchange but also transportation, financial institutions, and communication. Attacks that disable networks can easily hamstring large areas of life that are dependent on them for coordination. One example of network warfare would be shutting down a network that supplies power. If there is a significant failure in the power grid caused by the attack, massive power outages could result, crippling industry, defense, medicine, and all other areas of life. Chinese writings over the past two decades have amplified that cross integration of biotechnology, engineering, and information technology will become the new strategic doctrine for future military revolutions, as cited in the October 2015 edition of the Liberation Army Daily. These writings consistently put forth that weaponization of living organisms shall become a reality in the future, with non-traditional combat styles taking center stage. Zhang is a retired general and former president of China’s National Defense University. In the book, Zhang argues that modern biotechnological development is gradually showing strong signs characteristic of an offensive capability, including the possibility of employing “specific ethnic genetic attacks”.
I do caution you not to interpret all events from a position of West vs East and only the East is attacking the West. Keep in mind that all strategic moves are being made to confuse the adversary and to confuse and demoralize each other's citizens, and also to build up tension amongst their own population in order to increase support for the war. Because the west has been indoctrinated with justifiable wars for human rights, they can't suddenly try to convince us to wage war in a fight over declining resources, the majority would insist on trying to find a solution to the problem for humanity, not to exterminate some humanity as a solution.
In our leaders eyes, we are the problem to the solution. Our leaders believe that we can't handle the truth. This is partly why so many events are still being hidden. This is also why the Keep Calm and Carry On propaganda started. And this is why biological warfare is so vital, because you it's almost impossible to discern whether it's a real virus or a labmade virus by the public. You can guess, but unless your government declared it tentional act of war, how would you truly know. And even when they do, how can you know with one hundred percent certainty that it was? You won't. Want an example? Alright, let's go.
The U.S. Department of Justice (DoJ) yesterday revealed charges against two Chinese nationals for their alleged involvement in a decade-long hacking spree targeting dissidents, government agencies, and hundreds of organizations in as many as 11 countries. The 11-count indictment, which was unsealed on Tuesday, alleges LI Xiaoyu (李啸宇) and DONG Jiazhi (董家志) stole terabytes of sensitive data, including from companies developing COVID-19 vaccines, testing technology, and treatments while operating both for private financial gain and behalf of China's Ministry of State Security. "China has now taken its place, alongside Russia, Iran and North Korea, in that shameful club of nations that provide a safe haven for cyber criminals in exchange for those criminals being 'on call' to work for the benefit of the state, [and] to feed the Chinese Communist party's insatiable hunger for American and other non-Chinese companies' hard-earned intellectual property, including COVID-19 research," said Assistant Attorney General John C. Demers, who leads the DoJ's National Security Division.Hacking companies to get Covid-19 research. A shameful club of nations (How dare you! - Greta Thunberg). Hard earned intellectual property. Those are some pretty emotional trigger (you're triggering me!) words being used, aren't they? Mentioning hard earned intellectual property sounds a lot like making money, doesn't it? But the pandemic is a planet wide catastrophe, isn't it?
Billionaire philanthropist Bill Gates called for COVID-19 drugs and an eventual vaccine to be made available to countries and people that need them most, not to the "highest bidder," saying relying on market forces would prolong the deadly pandemic.One of these things is not like the other, one of these things is not the same. I understand the controversy over the WHO. But does it make sense to fight over Covid-19 intellectual property rights when the world is at stake? Yes, I know hacking is bad - Edward Snowden makes new claims about American hacking in China. - but so is hiding research and making money off of people's lives when researching goes faster when it's open sourced.
May 04, 2020 • The European Commission pledged $1bn to fund research on a vaccine. Norway matched the European Commission's contribution, and France has pledged €500m, as have Saudi Arabia and Germany. Japan pledged more than $800m. The US and Russia did not take part. China, where the virus originated in December, was represented by its ambassador to the European Union. Of the money raised, $4.4bn will go on vaccine development, some $2bn on the search for a treatment and $1.6bn for producing tests, the EU said. Mr Johnson, who spent three nights in intensive care with Covid-19, was to confirm the UK's pledge of £388m for vaccine research, testing and treatment during the conference. Along with the European Commission, the conference is being co-hosted by the UK, Canada, France, Germany, Italy, Japan, Norway and Saudi Arabia. "If we can develop a vaccine that is produced by the world, for the whole world, this will be a unique global public good of the 21st Century," they added.
So why would they hide research from China? Why did accusations of China hiding the pandemic start almost immediately a few months ago, just after China shared the mapped Covid-19 genome?
January 11, 2020 • Chinese researchers reveal draft genome of virus implicated in Wuhan pneumonia. Scientists praise decision to make date public; U.S. group sets out to produce live virus from the sequence. Source HereChina shares the information. The American Government accuses China of not sharing it fast enough and hiding information. Then they start a spy ring round up to stop them from stealing information. So why would China have to steal the information if We’re All in This New Normal Together to Flatten the Curve?
July 24, 2020 • As part of a broader offensive against India and Western rivals, Pakistan and China have entered a secret three-year agreement to expand potential bio-warfare capabilities, including several research projects related to the deadly agent anthrax, the Klaxon reported citing multiple intelligence sources. China has been criticised for handling of coronavirus pandemic with speculations that disease could have emerged from Wuhan Institute of Virology, though most experts have discounted the theory. According to the report authored by Anthony Klan, the same lab has signed the covert deal with Pakistan military's Defense Science and Technology Organization (DESTO), to collaborate research in "emerging infectious diseases" and advance studies on the biological control of transmitted diseases.Propaganda doesn't have to be fake to be propaganda, it only has to shape your outlook and behavior. And let's face it, in the face of an environmental collapse, issues of morality won't be a priority for the majority. Empty stomachs accept the truth, full stomachs fall for lies.
So let's just Keep Calm and Carry On.
July 23, 2020.
Justice Department official: Chinese consulate in Houston ‘went well over the line’ The State Department ordered Beijing to shutter the facility earlier this week.The USA closes the embassy in Houston, and then the very next day the headline runs about the biological weapons co-operation between China and Pakistan, intended to be used against the West and India. Strange timing, isn’t it? Don't article's of that nature take a while to compile? Maybe not if you only quote unnamed intelligence sources. (I've led an interesting life. I'm like the Greek Forest Gump. I've met "famous" and influential people all my life. From Lawrence Taylor of the NY Giants to Alfonso Ribeiro (Carlton Banks from Fresh Prince, and he did the Carlton dance). Not a big deal to me at all, other than experiencing that Hypernormal unreal feeling of seeing the person and not the digital image - and yes it's actually disorienting at first - is what I end up talking about to others. But the other story I talk about is meeting a journalist from the Globe and Mail some twenty years ago, and he warned me to never trust an unnamed source. He insisted that the source was the person standing closet to him who answers a question for the journalist.
Journalist #1 - Hey, do you agree that Sasquatch is real and being kept hidden by the government?
Journalist #2 - Yes I do.
1 - Unnamed intelligence sources claim Sasquatch is being kept hidden by the government.This narrative about China might be true, or it might not be true. I just want you to be aware of the narrative and how it shapes your perceptions.
There is one final part of this Gray Zone New Normal Narrative left.
UC Davis said Tang left her job as a visiting researcher in the Department of Radiation Oncology in June. Her work was funded by a study-based exchange program affiliated with China’s Ministry of Education, the university said in a statement. Agents have said they believe Tang sought refuge at the consulate after they interviewed her at her home in Davis on June 20. The FBI has been interviewing visa holders in more than 25 American cities suspected of hiding their ties to the Chinese military.The FBI has been interviewing visa holders across more than 25 American cities. Let that sink in. Swim in it so you don’t drown in the endless distractions that are being thrown at you. The politics are a stage play, and at some point something will happen that will stop the bickering and unite them, and most of the West too. It's only a matter of time now. This is why we witness but don't see the subtle insinuations of ordinary acts being sinister.
In Houston, fire services were called after smoke was seen rising from the compound. US officials said staff, who were given 72 hours to leave the country, were burning documents in its grounds. A Republican senator claimed that the consulate, which covered several southern states, was an “espionage hub”.Burning documents at a consulate? That never happens! They must be up to no good.
Classified documents and special equipment is to be destroyed according to State Department procedure or, in some instances, taken out (in the case of the evacuation of diplomats in 2014, some equipment not normally destroyed was taken from Libya to Tunisia). The flag will also be removed from the embassy. (Marines lowered the flag in Cuba when the embassy closed in 1961, then raised it again in 2015). The State Department did not immediately respond to a request for comment regarding what will happen to the embassy files, or what process the embassy staff will follow to get out of Caracas. Source Here.Our news articles make it seek like the Chinese Consulate did something out of the ordinary by burning the documents. It's not. It's standard operating procedures. But what about the proof that they we're engaged in espionage? Proof? You don't need proof! Every single Embassy on the planet is engaged in espionage. That's reality.
www.washingtonpost.com Diplomatic Titles Often Used to Protect Intelligence Aides Source Here
The vast majority of the agency’s overseas officers are under what is known as “official cover,” which means they are posing as employees of another government agency. The State Department allows hundreds of its positions in embassies around the world to be occupied by CIA officers representing themselves as diplomats. A rarer and more dangerous job category is “nonofficial cover” — or “NOC” (pronounced knock) — in which CIA officers pose as employees of international corporations, as scientists or as members of other professions. Such covers tend to provide a plausible reason to work long periods overseas and come in contact with foreign nationals the agency wants to recruit. Source Here.
China Evil. China Evil. Repeat it enough and it become an accepted narrative. Is the paradigm shift necessary? TPTB think it is. But remember, this is geopolitics, there is no evil. There is just reality. And the reality is Russia, China, and the West, are positioning themselves for natural resource scarcity in the future. If you need greener pastures those pastures can't have a herd already living there, can they? So you spy, plot, and maneuver, all to be ready for the endgame.
Just China spying? Please.
October 27, 2013 • How NSA Spied on Merkel Cell Phone from Berlin. Source HereBusiness as usual is always framed as unusual business when they need our engagement and outrage. Keep Calm and Propoganda On.
So should we Keep Calm and Carry On? That's a big fat nope. This is the New Normal, and over the next few posts I'll shake the tree more and show you how Keep Calm and Carry On stopped because the New Normal has started and the narrative has changed to alter our perceptions. You don’t start expelling illegal immigrants, trade wars, improve the emergency alert system, ramp up strategic anti-nuclear missle defense, and position military units worldwide in anticipation of repelling an invasion for no reason.
So the Chinese spy that was detained from the SF embassy? She worked at the University of California. So, you might ask, what's your point?
October 01, 2019 • UC now holds largest CRISPR-Cas9 patent portfolio | Berkeley News. Source HereCRISPR-Cas9. 2015. Bill Gates investment. Birdman Plauge Doctor Video. Ralph Baric discovers new coronavirus in bats can leap to humans. Gates pandemic warnings started. Chinese spy working at UC. How's the picture?
July 16, 2020 • The DNA-cutting proteins central to CRISPR-Cas9 and related gene-editing tools originally came from bacteria, but a newfound variety of Cas proteins apparently evolved in viruses that infect bacteria. The new Cas proteins were found in the largest known bacteria-infecting viruses, called bacteriophages, and are the most compact working Cas variants yet discovered — half the size of today’s workhorse, Cas9. “Adenoviruses are the perfect Trojan horse for delivering gene editors: You can easily program the viruses to reach almost any part in the body,” said Patrick Pausch, a postdoctoral fellow at the University of California, Berkeley, and in UC Berkeley’s Innovative Genomics Institute (IGI), a joint UC Berkeley/UCSF research group devoted to discovering and studying novel tools for gene editing in agriculture and human diseases. Source HereAdenoviruses are the perfect Trojan Horse. Gene Drive Editing and CRISPR-Cas9.
December 15, 2017 • The technology is called gene drive. Scientists introduce a genetic defect that can spread rapidly through a population, causing it to die off. A few years ago gene drive was just a theory. But it became a near-reality almost overnight once the CRISPR gene editing system made it easier for scientists to do precise genetic modification. The recently discovered CRISPCas9 system functions like molecular scissors, allowing scientists to modify the DNA of humans and other species with unprecedented ease. Now many groups — including the Defence Advanced Research Projects Agency, an agency of the U.S. military — are developing gene drive technology aimed at solving a variety of problems including wiping out disease-carrying insects and eradicating invasive mammals like rodents and rabbits. That brings us to the great email dump last week. Scientists around the world were stunned when dozens of their personal emails suddenly appeared in the public domain — released by an environmental activist who obtained the documents through U.S. freedom of Information laws. The emails reveal a Canadian public relations firm, Emerging Ag Inc., recruiting scientists to participate in an online UN gene-drive forum and notifying them when to jump into the discussions. The emails do reveal a co-ordinated effort to mobilize scientists to defend their research turf, an effort that is funded by deep philanthropic pockets. The Bill and Melinda Gates Foundation has paid $1.6 million US to Emerging Ag for a three-year program to manage the scientists' network, including setting up a website and organizing meetings. The network is so new they haven't decided on an official name, but the working title is the Gene Drive Outreach Network.Oh Bill. You're so far Ahead of the Curve, aren't you? Hiring a PR firm to shape public opinion, putting the spotlight on you and away from the AI military biowarfare industrial complex.
Keep calm and let us do the research: that's essentially the message from the new group. Source HereKeep Calm. Nice use of language CBC. I cant help but think it was intentionally used to indicate the modern New Normal propoganda that's currently underway.
February 14, 2020 • Why Bill Gates thinks gene editing and artificial intelligence could save the world. Source HereAnd this is what I mean when I say that's it all connected. All of it. If the effort of getting ahead of the curve is wasted on focusing on individual pieces of the puzzle without seeing where they connect to other pieces, the big picture will never be seen.
Keep Calm and Carry On memes. Military looks to open up meme warfare division. Power Geopolitics at the World Health Organization. Pandemic. Spy games. Spy worked at UC. UC has majority of CRISPR-Cas9 patents. Bill Gates wants gene drive editing. Public relations firms. AI and Gene Drive Editing can save the world.
Nothing is random when you prepare for an environmental collapse that will happen at random.
Keep Calm and Carry On? No thanks. There's a storm coming.
Heads up and eyes open. Talk soon.