AustraliaOne Party – Deborah Tavares: Nasa Depopulation Document

AustraliaOne Party Published September 16, 2022

Interview from 2013

This document was retrieved from NASA’s website created in July 2001 that outlines how War HAS BEEN DECLARED AGAINST HUMANITY.

Source video link:

Deborah Tavares Website:

SourceSouth Australian Gov Criminal Organisation

Twitter Whistleblower Surfaces Presenting Challenge for U.S. Surveillance State, Enter CNN and The Washington Post

Twitter Whistleblower Surfaces Presenting Challenge for U.S. Surveillance State, Enter CNN and The Washington Post

The background story behind Jack’s Magic Coffee Shop takes an interesting twist today, as a whistleblower deep inside the Twitter technology side of the platform begins to outline what CNN calls, “a threat to its own users’ personal information, to company shareholders, to national security, and to democracy.”

This discussion is where it becomes critical to remember the nature of stakeholders in media.

CNN is the national media firm protecting the interests of the U.S. State Dept.  The Washington Post is the national media firm protecting the interests of the U.S. intelligence apparatus.  The latest Twitter whistleblower information originates in,.. wait for it… “an explosive whistleblower disclosure obtained exclusively by CNN and The Washington Post.”

The whistleblower is a former technology expert who came from within the research farm of DARPA, the Defense Advanced Research Projects Agency.  Peiter “Mudge” Zatko, is a well-known cybersecurity expert who left government work, entered the public world, and eventually became the head of Twitter security, reporting directly to the CEO.

Peiter “Mudge” Zatko is now saying the background technology of Twitter is vulnerable to manipulation.  I’m not going to go into the granules of what Mudge is outlining, instead I prefer to focus on the bigger picture, a scenario we have been outlining for quite a while that could, emphasize *could*, become very explosive, especially considering the legal challenges between the social media platform and Elon Musk.

The nub of the bigger story is essentially that the database of Twitter, and likely other social media platforms, is integrated with the U.S. intelligence system.  The database of Twitter is not necessarily vulnerable to hacking by outside entities, although that is the framework used by media reporting this whistleblower issue.

The bigger risk to the surveillance state is discovery that Twitter and the U.S. intelligence community are in a public-private partnership. The Dept of Homeland Security has access by design, not flaw.  How the stakeholder media are reporting on the issue shows the nature of the risk, (emphasis mine):

[…] The scathing disclosure, which totals around 200 pages, including supporting exhibits — was sent last month to a number of US government agencies and congressional committees, including the Securities and Exchange Commission, the Federal Trade Commission and the Department of Justice. The existence and details of the disclosure have not previously been reported. CNN obtained a copy of the disclosure from a senior Democratic aide on Capitol Hill. The SEC, DOJ and FTC declined to comment; the Senate Intelligence Committee, which received a copy of the report, is taking the disclosure seriously and is setting a meeting to discuss the allegations, according to Rachel Cohen, a committee spokesperson. (link)

How would it damage the U.S. government if previous claims about the Chinese government having access to all user data on TikTok, are shown to be exactly identical to the U.S. government having access to all user data on Twitter?

Let that question settle in for a few moments, because that is exactly what I have been alleging since, well, 2011, when the U.S. State Dept first collaborated with Twitter in a joint public-private partnership to use the platform as a communication tool exploiting the Arab Spring uprising in Egypt, Libya and beyond.

The issue of Jack’s Magic Coffee Shop is an issue of financial viability.  The business model of Twitter just doesn’t exist as a free social media discussion platform while running the ultra-expensive data processing system needed for millions of simultaneous users.  A global chat that requires exponential database responses as an outcome of simultaneous users is just ridiculously expensive. {Go Deep} However, if the computing system and massive database were being subsidized by the U.S. government, then the viability of the ‘free coffeebusiness model makes sense.

“Cloud computing is one of the core components of the strategy to help the IC discover, access and share critical information in an era of seemingly infinite data.” … “A test scenario described by GAO in its June 2013 bid protest opinion suggests the CIA sought to compare how the solutions presented by IBM and Amazon Web Services (AWS) could crunch massive data sets, commonly referred to as big data.” … “Solutions had to provide a “hosting environment for applications which process vast amounts of information in parallel on large clusters (thousands of nodes) of commodity hardware” using a platform called MapReduce. Through MapReduce, clusters were provisioned for computation and segmentation. Test runs assumed clusters were large enough to process 100 terabytes of raw input data. AWS’ solution received superior marks from CIA procurement officials”… (MORE)

Legal Stuff – The issue of American citizen privacy and U.S. constitutional limits against the government listening in on communication is functionally obsolescent.  The Foreign Intelligence Surveillance Act (FISA) prohibits communication intercepts on U.S. citizens without a valid search warrant.  However, if a U.S. citizen is engaged in a conversation with a foreign person, all privacy restrictions are essentially gone. [Insert example of Michael Flynn taking to Russian Ambassador Sergey Kislyak here]

Your phone calls can be intercepted by the government from the foreign side of the call.  The govt can freely monitor the calls that involve foreign actors.  The only rule is that your privacy must be maintained. If the foreign actor is in communication with a U.S. citizen, the U.S. citizen must be “minimized” or not identified in any intercept.

However, what happens when the phone call is on a community line that is connected, and visible, to the entire world?   That’s the benefit of social media monitoring from a surveillance perspective. It is from that opaque and unresolved archaic legal perspective that surveillance authority of social media platforms, by the U.S. intelligence community, exists.   Now you see why the SSCI is taking an interest in the Twitter whistleblower, classic risk mitigation.

Hopefully, you can also see why the 200-page whistleblower document was leaked, by a Democrat staffer, to the Washington Post and CNN.

CNN defends the equity interests of the U.S. State Dept., and WaPo defend the Intelligence Community (CIA, DHS, etc).

Within the narrative as constructed you will note, “Zatko further alleges that Twitter’s leadership has misled its own board and government regulators about its security vulnerabilities, including some that could allegedly open the door to foreign spying or manipulation, hacking and disinformation campaigns.”

If the relationship between Twitter and the U.S. intelligence community is a public-private partnership, why would Twitter want to shut down the portals given to the Dept of Homeland Security?

Answer, they wouldn’t… Ergo the response from Twitter to the whistleblower complaint is (emphasis mine), “What we’ve seen so far is a false narrative about Twitter and our privacy and data security practices that is riddled with inconsistencies and inaccuracies and lacks important context.

Put another way, the “lacks important context” is the nature of the security risk, which is structural to the relationship between the intelligence community and the platform.  See how that works?

The integration between Twitter and the United States Intelligence Community has been hiding in plain sight:

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (more)

A shared hashing protocol is a form of data system integration.  The databases of the identified social media platforms are integrated with the U.S. intelligence system.

I shall leave on a happy note, which highlights the nature of the risk:

After this article was initially published, Alex Spiro, an attorney for Musk, told CNN, “We have already issued a subpoena for Mr. Zatko, and we found his exit and that of other key employees curious in light of what we have been finding.” (LINK)

Hello, fellas…


Now, for the pantomime, and to showcase the need for extreme control by the narrative engineers.  Notice how the directors of the CNN segment use alternative actors to shape the context of what Mr. Peiter “Mudge” Zatko is saying.  This is classic intelligence community media tradecraft.

Notice what is expressly attributed to Mudge in his own words, versus what is implied toward Mudge from alternative voices and faces that appear.  Once you see the strings on the marionettes, you can never return to that moment in the performance when you did not see them.  WATCH:


Exclusive: Spygate Researchers Said Claim Russians Hacked The DNC Could Have Relied On ‘Spoofed’ Data

Exclusive: Spygate Researchers Said Claim Russians Hacked The DNC Could Have Relied On ‘Spoofed’ Data

The Georgia Tech cyber security experts ensnared in the Alfa Bank hoax conducted a retrospective analysis of the Democratic National Committee hack, according to the Department of Defense. While the results of that analysis have yet to be made public, internal documents obtained by The Federalist reveal that Georgia Tech’s computer scientists believed CrowdStrike’s approach to investigating computer intrusions relied on the use of easily “spoofed/impersonated” signals of traffic.

In June 2016, about one month before WikiLeaks released a trove of internal communiques revealing top DNC officials plotted to destroy Bernie Sanders’ presidential ambitions in favor of their preferred candidate, Hillary Clinton, the DNC publicly confirmed that its server had been hacked. In the Washington Post article breaking the story, the DNC maintained that the private security firm it had hired to investigate the hack, CrowdStrike, had concluded two Russian military intelligence groups, branded Cozy Bear and Fancy Bear, bore responsibility for the intrusions.

Given that Democrats and the media would later rely on CrowdStrike’s conclusion that Putin’s agents had hacked the DNC to support the Russia collusion hoax, those seeking to unravel Spygate paid particular attention to CrowdStrike’s initial assessment. The declassification of CrowdStrike President Shawn Henry’s December 2017 testimony before the House Intelligence Committee, that “there was no ‘concrete evidence’ that the emails were stolen electronically,” later raised more “questions about whether Special Counsel Robert Mueller, intelligence officials and Democrats misled the public” about the hack.

In his final report, Mueller concluded “that Russian intelligence ‘appears to have compressed and exfiltrated over 70 gigabytes of data’ and agents ‘appear to have stolen thousands of emails and attachments’ from Democratic Congressional Campaign Committee and DNC servers, respectively.” But CrowdStrike remained the only publicly known source to support Mueller’s conclusion. Given the numerous illegal efforts to frame Donald Trump as colluding with Russia exposed by then, conservatives were unwilling to trust either Mueller or CrowdStrike.

Concerns over CrowdStrike’s analysis reemerged after Special Counsel John Durham indicted former Clinton campaign attorney Michael Sussmann for allegedly lying to FBI General Counsel James Baker. That indictment and other documents filed in the Sussmann criminal case revealed that cyber-security experts assisted tech executive Rodney Joffe in crafting deceptive data and whitepapers to create the false appearance of a secret communication network between Trump and the Russian-based Alfa Bank. Sussmann then fed this “intel” to the CIA and FBI.

After the election, Sussmann also provided the CIA with deceptively cherry-picked data to suggest a connection between Trump or his transition team and Russians, using cyber-tracking of a Russian Yota cell phone. To compile both the Alfa Bank and Yota phone hoaxes, according to the indictment, Joffe exploited proprietary information he had access to because of his positions in various tech companies. More troubling still was the revelation that Joffe used sensitive data from the Executive Office of the President in his attempt to frame Trump.

This backdrop provided powder to the news The Federalist broke that Durham’s team had asked Georgia Tech cybersecurity expert Manos Antonakakis “point blank” whether the Department of Defense’s Defense Advanced Research Projects Agency (DAPRA) “should be instructing you to investigate the origins of a hacker (Guccifer_2.0) that hacked a political entity (DNC).”

Antonakakis, according to documents obtained by The Federalist, told lead prosecutor Andrew DeFilippis — in a seeming confirmation that DARPA had directed him to investigate the DNC hack or hacker — that that was “a question for DARPA’s director.”

Within days, however, DARPA denied any involvement “in efforts to attribute the DNC hack.” Jared Adams, then the spokesmen for the agency, told the Washington Examiner that “Dr. Antonakakis worked on DARPA’s Enhanced Attribution program, which did not involve analysis of the DNC hack.” The Washington Examiner further reported that Adams maintained “DARPA was not involved in efforts to attribute the Guccifer 2.0 persona, nor any involvement in efforts to attribute the origin of leaked emails provided to Wikileaks.”

But then another document dump by Georgia Tech revealed the university’s cybersecurity experts had drafted four “DARPA whitepapers.” Those included one “Whitepaper on DNC attack attribution” and a second identified as the “‘Mueller List’—list of domains and indicator related to APT-28.” (APT-28 is the more formal name for the Russian intelligence group of hackers known colloquially as Fancy Bear; Mueller would later charge 12 Russian intelligence agents with allegedly working as Fancy Bear with crimes related to the DNC hack.)

An email from Georgia’s attorney general’s office further indicated involvement by the tech researchers in Mueller’s investigation. The lawyer handling Durham’s subpoena of Georgia Tech noting that one of the individuals involved had “indicated that there was a ‘fairly large file of Trump related materials’ that had been assembled for production to the office of Special Counsel Robert Muller (sic) or the DOJ.” The state’s lawyer added that they were “unable to locate such a file,” and sought further assistance.  

Following The Federalist’s reporting on this latest inconsistency between DARPA’s story and what the documents obtained through Right To Know requests showed, Republican Sens. Ron Johnson and Charles Grassley sent a letter to Stefanie Tompkins, the director of DARPA, demanding copies of the alleged “whitepapers.”

In their joint letter, the senators stressed that “the DNC hack occurred during the lead up to the 2016 presidential election, which was marked by claims of meddling by foreign actors. Some of those claims have since been confirmed to be disinformation efforts by operatives from the Democratic campaign.” “As details continue to emerge,” the letter continued, “the public is rightly concerned about the extent to which various federal agencies investigated, validated, dispelled, or relied on these claims. Indeed, the credibility of some agencies has been called into question, and the public deserves a full accounting of federal officials’ involvement in these activities.”

When contacted by The Federalist concerning Johnson and Grassley’s letter, DARPA’s new spokeswoman, Tabatha Thompson, noted it had received the letter and “is following proper procedures to respond to the inquiry.” In response to questions concerning the whitepapers that appeared connected to the Mueller investigation and the DNC hack, Thompson told The Federalist that, “consistent with our previous statements, the research neither contributed to the Mueller investigation nor the investigation into the DNC hack or Guccifer 2.0 attribution.”

Thompson, however, then noted that contractors often conduct “retrospective analyses of publicly disclosed, real-world scenarios to verify and validate tools and capabilities in development on the EA program,” and that in the course of such programs, the contractors may “produced reports, sometimes referred to as white papers, explaining the retrospective analyses on those topics, relying on commercially available data to analyze attributions previously disclosed to the public.” “For example,” DARPA’s representative, added, enhanced attribution “performers analyzed indicators from publicly released DoJ indictments, such as the Mueller indictment, as well as public attribution reports from other federal agencies.”

In response to multiple requests from The Federalist for comment, Mark Schamel, the lawyer for Antonakakis, refused to go on the record with an explanation or to state whether the Georgia Tech whitepaper confirmed or contradicted CrowdStrike’s conclusion that Russians had hacked the DNC. He also refused to answer whether the whitepaper had been provided to Mueller’s office.  

Also unknown is whether Joffe provided Antonakakis the data used for the research and the whitepapers related to the DNC hack. That is a concern given Joffe’s role in the Alfa Bank and Yota phone hoaxes and given that other documents from Georgia Tech state that Joffe assisted with two other attribution requests performed by Antonakakis over the summer of 2016.

Other documents recently obtained by The Federalist likewise raise concerns over the validity of CrowdStrike’s analysis of the hack, namely an exchange between Antonakakis and the executive director of the university’s Institute for Information Security and Privacy, Lee Wenke.

In an email thread from May of 2018, in response to Antonakakis’ statement that “you do attribution from studying the mistakes they do during an operation,” Wenke wrote: “Then are you in principle doing the same as crowdstrike, e.g., using ‘signatures’ of coding/texting styles? And didn’t we all agree[] that those can be ‘spoofed/impersonated’?”

The exchange continued with Antonakakis stating that he is “not like” CrowdStrike, and is “not building signatures,” to which Wenke replied: “I was saying that if you are using signatures/signals of traffic and if those can be (easily) spoofed/impersonated, then in principle your approach would suffer the same weakness (spoof-able) as [CrowdStrike.]”

Antonakakis ended the exchange by acknowledging his point, but “strongly” disagreeing on the “value that policy has in computer security.” What remains unclear from this email thread, though, is whether Antonakakis’ retroactive analysis of the DNC hack reached the same conclusion as CrowdStrike, namely that Russians had hacked the servers.

Frankly, given Cozy Bear and Fancy Bear’s propensity to hack government networks, it is extremely likely the Russian intelligence services were behind the DNC hack. Evidence unrelated to Trump or attempts to destroy the former president indicate, for instance, that between 2012 and 2018, Russian intelligence officers “targeted hundreds of energy companies around the world.”

Both U.S. and U.K. national security agencies likewise believe the Russia’s military intelligence agency, GRU, has “engaged in a global campaign to target ‘hundreds’ of predominantly American and European entities, including government and military organizations, energy companies, think tanks and media companies.”

But given what we know now about the Steele dossier and Alfa Bank and Yota cell phone hoaxes, as well as the FISA abuse by the Crossfire Hurricane team, taking the word of the intelligence community no longer suffices. It’s now: Show me the evidence, who gave you the evidence, and that person’s political affiliation.

That is far from the ideal situation for national security, but it is the intelligence agencies and those in the cybersecurity world who own that reality — as well as Hillary Clinton and the media.

Margot Cleveland is The Federalist’s senior legal correspondent. She is also a contributor to National Review Online, the Washington Examiner, Aleteia, and, and has been published in the Wall Street Journal and USA Today. Cleveland is a lawyer and a graduate of the Notre Dame Law School, where she earned the Hoynes Prize—the law school’s highest honor. She later served for nearly 25 years as a permanent law clerk for a federal appellate judge on the Seventh Circuit Court of Appeals. Cleveland is a former full-time university faculty member and now teaches as an adjunct from time to time. As a stay-at-home homeschooling mom of a young son with cystic fibrosis, Cleveland frequently writes on cultural issues related to parenting and special-needs children. Cleveland is on Twitter at @ProfMJCleveland. The views expressed here are those of Cleveland in her private capacity.


Docs: Spygate Researchers Did Work For Former Special Counsel Robert Mueller

Docs: Spygate Researchers Did Work For Former Special Counsel Robert Mueller

The U.S. Department of Defense and private individuals pumping the Alfa Bank hoax also assisted former Special Counsel Robert Mueller’s investigation into Donald Trump for supposed collusion with Russia, newly discovered documents suggest.

The Georgia Tech researchers embroiled in the Alfa Bank hoax prepared white papers for the U.S. Department of Defense about the Democratic National Committee hack and created a “Mueller List” on the Russian intelligence agency hackers, the newly obtained documents indicate. The white papers were prepared for the Defense Advanced Research Projects Agency (DARPA), a section of the U.S. Department of Defense.

A recent dump of documents from Georgia Tech reveals that explosive detail and several other facts connected to the continuing special counsel investigation into Spygate. Here’s a rundown.

White Papers for the U.S. Department of Defense

Last month, The Federalist first reported that Special Counsel John Durham’s team asked lead Georgia Tech researcher Manos Antonakakis: “‘Do you believe that DARPA should be instructing you to investigate the origins of a hacker (Guccifer_2.0) that hacked a political entity (DNC)?’” Antonakakis responded that that was a question for the DARPA director, an implied acknowledgment that yes, DARPA had asked him to investigate the hack.

In response, DARPA’s chief of communications denied any involvement “in efforts to attribute the DNC hack.” “Dr. Antonakakis worked on DARPA’s Enhanced Attribution program, which did not involve analysis of the DNC hack,” DARPA spokesman Jared Adams told the Washington Examiner. Adams further told the Washington Examiner that “DARPA was not involved in efforts to attribute the Guccifer 2.0 persona, nor any involvement in efforts to attribute the origin of leaked emails provided to Wikileaks.”

But now an email obtained by The Federalist indicates Georgia Tech researchers drafted a series of white papers for DARPA, including on the “DNC attack attribution,” and on what they called a “Mueller List” of “domains and indicators related” to DNC hackers.

The email dated July 23, 2021 followed Durham dropping a second subpoena on Georgia Tech for more documents related to its investigation of the Alfa Bank hoax and other related issues. (More on that subpoena below). In that email, a lawyer representing David Dagon, the second Georgia Tech researcher involved in the Alfa Bank hoax who also worked on the DARPA Enhanced Attribution program, shared a list of “documents/data sources” Dagon believed would be responsive to the subpoena of Georgia Tech documents.

Listed under the heading of “DARPA whitepapers” were four documents, including “Whitepaper on DNC attack attribution”; Analysis of attacks of EOP (Executive Office of the President) networks”; “Whitepaper for DOJ on APT-29 related hackers, crypto coin transactions, and analysis that includes Yota-related domains”; and “‘Mueller List’—list of domains and indicator related to APT-28.”

Of these DARPA whitepapers, the first and fourth both relate to the DNC hack, with the final paper also connecting to the Mueller investigation. APT-28 is the more formal name for the Russian intelligence group of hackers known colloquially as Fancy Bear. As part of his investigation, Mueller charged 12 Russian intelligence agents allegedly working as Fancy Bear with crimes related to the DNC hack.

This email represents the latest evidence suggesting Georgia Tech and DARPA assisted in the DNC hack investigation and Mueller’s investigation, notwithstanding DARPA’s strident denials.

Yota-Related Domains

The above email raises a second question worth probing, namely whether tech executive Rodney Joffe used the whitepaper Georgia Tech researchers prepared for DARPA on “Yota-related domains” in his continued attempt to frame Trump as colluding with Russia.

As I explained earlier this week, in February 2017, Michael Sussmann, allegedly on behalf of Joffe, presented the CIA four files of data purporting to show the use of the Russian-made Yotaphone near Trump. The Yotaphone supposedly traveled with Trump to Michigan and later to the Executive Office of the President during the presidential transition period.

The Yotaphone hoax, as I detailed, represents a huge scandal because it involved both the exploitation of sensitive data related to the EOP and the apparent physical (or electronic) surveillance of Trump. Further, the data provided to the CIA was deceptive by omission and peddled to trigger a CIA investigation of the sitting president of the United States of America.

But the above email now adds to the scandal the possibility that the DARPA-funded research on the Yota domains was shared with Joffe or other outsiders, who then used that intel to track the Russian-based Yotaphones to create the conspiracy theory later peddled to the CIA. This potential scenario needs further investigation.

Georgia Tech Gave Mueller a Large File of Trump-Related Material That Went Missing

That the Georgia Tech researchers worked with Mueller’s investigation into Trump also seems clear from an exchange between lead prosecutor Andrew DeFilippis and the Georgia Attorney General’s Office, which represented Georgia Tech in its response to the subpoena. In that email thread, the attorney representing Georgia Tech noted that DeFilippis had “indicated that there was a ‘fairly large file of Trump related materials’ that had been assembled for production to the office of Special Counsel Robert [Mueller] or the DOJ.”

“We are unable to locate such a file,” the email continued, even though “Dr. Antonakakis has searched his server for such a file and did not find anything meeting that description.”

Whether the “fairly large file of Trump related materials” was ever found is unknown.

Durham Is Digging Far and Wide

The most recent Georgia Tech documents also reveal the breadth and scope of the potential conspiracies Durham is investigating, with a subpoena from July 2021 to Georgia Tech and its related organization seeking documents related to “a purported secret communications channel between the Trump Organization, Spectrum Health, and the Russian Bank Alfa Bank,” as well as material related to “the purported presence or use of Russian-made Yotaphones by or in the vicinity of Donald Trump or individuals affiliated with Donald Trump.”

Significantly, the subpoena also sought “all documents, records, and information” related to the Alfa Bank and Yotaphone research, including work conducted under or pursuant to contracts with DARPA.

The Georgia Tech documents also reveal that this subpoena is the second served on the university by the special counsel’s office, with the first issued in fall 2020, according to another email. (One wonders what the original subpoena sought and what put the investigators onto the Alfa Bank and Yotaphone trail.) Emails released also indicate that the special counsel’s office subpoenaed documents from Dagon.

Immunity for Dagon

Emails included in the Right-to-Know release from Georgia Tech also provide more texture to the Durham case against Sussmann, who is currently awaiting trial next month on a charge that he lied to the now-former FBI General Counsel James Baker in providing Baker data and white papers purporting to establish the Trump-Alfa Bank secret communication network.

Last Friday, in response to Sussmann’s claim that Durham should be required to provide Joffe immunity so the tech executive would testify on Susssmann’s behalf, the special counsel noted that to date it had only immunized one witness—Dagon. The special counsel noted that it granted Dagon immunity on July 28, 2021, “because, among other reasons, at least five other witnesses who conducted work relating to the [Alfa Bank] allegations invoked (or indicated their intent to invoke) their right against self-incrimination.”

The documents reviewed by The Federalist show that, as of July 26, 2021, Dagon was “en route to DC for his meeting with the Special Counsel and testimony with the Grand Jury,” meaning the immunity grant came late in the day for Dagon. Another email from Dagon’s attorney to Georgia Tech noted that “David Dagon was given full statutory immunity by the Special Counsel in its investigation.”

“He has been cooperating and working with the Special Counsel’s team and testified before the Grand Jury on three days,” Dagon’s attorney Jody Westby told the Georgia Tech legal team, in the context of requesting payment from the university for the legal services Westby and her team performed on behalf of Dagon.

That Dagon testified for three days before the grand jury suggests the special counsel’s team had quite a few questions to ask the cyber researcher. From another email, it seems likely that, whatever Dagon said, he convinced the special counsel’s office that Antonakakis was not involved in any criminal activity. On July 29, 2021, Antonakakis’ attorney Mark Schamel emailed DeFilippis, noting that now that the special counsel has “appropriately categorized Dr. Antonakakis as a witness,” they would happily discuss a follow-up meeting with Durham’s team.

Georgia Tech Entered a Joint Defense Agreement—Until It Didn’t

Another fascinating detail contained in the Georgia Tech dump concerned the apparent joint defense agreement the individuals ensnared in the Alfa Bank hoax initially entered into with each other. A “joint-defense agreement” is where parties agree to exchange confidential information and work together, typically, but not always, in relation to a criminal investigation. When parties have entered a joint-defense agreement, they may share information and communications with each other, without the communications losing the protection of attorney-client privilege.

After the special counsel dropped its second subpoena on Georgia Tech, Dagon’s attorney emailed a lawyer at Georgia Tech, noting that Dagon would not be responding to the subpoena served on Georgia Tech—that was solely Georgia Tech’s responsibility. Dagon’s attorney then added: “We have never seen the first subpoena Georgia Tech produced or your production; nor have we seen this second subpoena. Although Georgia Tech agreed to an informal joint defense agreement, after we produced our subpoena and relevant documents, Georgia Tech pulled back from that and refused to share any information, . . . We are also not privy to your discussions with the Special Counsel office.”

A few days later, Dagon’s attorney provided more background when she emailed the Georgia attorney general’s office, noting that Georgia Tech “cannot produce those white papers,” in reference to three white papers Dagon’s lawyer had provided Georgia Tech’s lawyer in September 2020.

Those white papers, Dagon’s lawyer noted, “were shared under a joint defense/common interest agreement and came from other counsel.” “We shared them with Ga Tech when we were in a joint defense agreement with them, until [Georgia Tech’s lawyer] decided Ga Tech could not participate anymore, supposedly on advice from the Georgia AG office,” Dagon’s attorney snarked.

This exchange suggests that Georgia Tech, in addition to having entered into a joint defense agreement with Dagon, had entered into one with another of the players involved in the Alfa Bank hoax, although which one is unknown.

Also of interest is that Dagon’s attorney noted that she expects “all of our communications with GA Tech counsel’s office will be protected from disclosure, since the subpoena does not ask for documents related to David Dagon’s counsel.” The question, then, is whether special counsel Durham ever saw those three white papers or ever followed up with a subpoena for communications with Dagon’s attorney. If not, he may want to do so now.

Margot Cleveland is The Federalist’s senior legal correspondent. She is also a contributor to National Review Online, the Washington Examiner, Aleteia, and, and has been published in the Wall Street Journal and USA Today. Cleveland is a lawyer and a graduate of the Notre Dame Law School, where she earned the Hoynes Prize—the law school’s highest honor. She later served for nearly 25 years as a permanent law clerk for a federal appellate judge on the Seventh Circuit Court of Appeals. Cleveland is a former full-time university faculty member and now teaches as an adjunct from time to time. As a stay-at-home homeschooling mom of a young son with cystic fibrosis, Cleveland frequently writes on cultural issues related to parenting and special-needs children. Cleveland is on Twitter at @ProfMJCleveland. The views expressed here are those of Cleveland in her private capacity.


Newly Obtained Emails Raise Questions About Department Of Defense Involvement In Spygate

Newly Obtained Emails Raise Questions About Department Of Defense Involvement In Spygate

After spending weeks dismissing concerns about its work with Russia hoax-connected researchers, a newly discovered email from The Defense Advanced Research Projects Agency to a Georgia Tech researcher with the subject line “Mueller case” casts doubt on DARPA’s denials.

Last month, The Federalist first reported that an email exchange obtained from Georgia Tech pursuant to a Right-to-Know request indicated that Special Counsel John Durham’s office was investigating the Democrat National Committee hack. Manos Antonakakis, the Georgia Tech researcher branded “Researcher-1” in the special counsel’s indictment of former Clinton campaign lawyer Michael Sussmann, penned the email shortly after being questioned by one of Durham’s top prosecutors.

The special counsel’s office charged Sussmann last fall with lying to the FBI’s general counsel, James Baker, when Sussmann provided Baker with data and white papers supposedly showing the existence of a secret communications network between the Donald Trump campaign and the Russian-based Alfa Bank. The Sussmann indictment also revealed that the Georgia Tech researchers, since identified as Antonakakis and David Dagon, “were receiving and analyzing Internet data in connection with a pending federal government cybersecurity research contract.”

The then-unidentified government contract originated with DARPA, with DARPA eventually awarding Georgia Tech more than $17 million for the project dubbed “Rhamnousia,” after the mythical Greek goddess of divine retribution, Rhamnous.

As part of its investigation into Sussmann, the special counsel’s office subpoenaed both Antonakakis and Dagon and later granted Dagon immunity. While Durham did not provide Antonakakis immunity, Antonakakis nonetheless spoke with the special counsel’s office after receiving assurances that he was merely considered a witness in the investigation.

Then, after speaking with the special counsel’s team, Antonakakis told the university’s general counsel and other members of upper management that he was asked point-blank by lead prosecutor Andrew DeFilippis: “‘Do you believe that DARPA should be instructing you to investigate the origins of a hacker (Guccifer_2.0) that hacked a political entity (DNC)?’”

According to his email, Antonakakis told DeFilippis that was “a question for DARPA’s director.” As I reported at the time, this represented “a seeming confirmation that DARPA had, as the special counsel’s question presumed, directed Antonakakis to investigate who bore responsibility for the DNC hack, although it is unclear whether Antonakakis’ task concerned solely the supposed identity of ‘Guccifer,’ or more broadly the question of who hacked the DNC.”

However, within days, DARPA denied any involvement “in efforts to attribute the DNC hack.” “Dr. Antonakakis worked on DARPA’s Enhanced Attribution program, which did not involve analysis of the DNC hack,” according to Jared Adams, DARPA’s chief of communications. Adams further told the Washington Examiner that “DARPA was not involved in efforts to attribute the Guccifer 2.0 persona, nor any involvement in efforts to attribute the origin of leaked emails provided to Wikileaks.”

While acknowledging DARPA met with the special counsel’s office, DARPA noted that “the meeting between DARPA and special counsel Durham was to provide a high-level overview of the Enhanced Attribution program,” stressing that “during the course of that meeting, DARPA did not discuss matters related to the DNC hack, Guccifer 2.0, or leaked DNC emails provided to Wikileaks.” The Washington Examiner’s article added the DARPA spokesman’s claim that, “to the best our knowledge, no DARPA-funded researchers investigated” the DNC hack or assisted the FBI’s or Special Counsel Robert Mueller’s investigation of the hack.

In response to a request for clarification based on the Washington Examiner’s reporting, Adams told The Federalist that, to DARPA’s knowledge, no one affiliated with DARPA had asked Antonakakis “to research, in any way, at any time, either the DNC hack or the hacker.” An attorney for Antonakakis did not respond to requests for comment.

But now an email first obtained by The Federalist shows Chris Schneck from DARPA’s Information Innovation Office, known as “I2O,” writing Antonakakis on September 25, 2018, with the subject line of “Mueller case.” While redactions prevent a full understanding of the email, the “Mueller case” subject line and Schneck’s “great work” closer indicate the DARPA-funded Georgia Tech researcher was assisting Special Counsel Robert Mueller.

The only apparent pending Mueller case at the time of the email appears to have been that special counsel’s case against the 12 officers of the Russian military intelligence organization known as GRU, who had been indicted two months earlier and charged with crimes related to the hacking of the DNC’s emails in 2016.

While DARPA’s September 25, 2018 email to Antonakakis about his “great work” regarding the “Mueller case” does not mention the DNC hack, a “chat log” for the DARPA Rhamnousia project shows the Georgia Tech researchers discussing both the DNC hack and GRU. One text reads: “For FBI to give a heads up to the DNC in fall 2015, this means that the attack was active for many months before.” In another message, one of the researchers jokes that if GRU sends the Russian beauty Annet Mahendru after him, he’s “giving up” his colleagues.

Moreover, another email reviewed by The Federalist reveals that Dagon told Durham’s team that the “entire set” of “Rhannousia chat logs” were “pertinent to” the Special Counsel’s investigation.” Those chat logs, in addition to involving chats between Dagon and Antonakakis, included conversations involving, or about, two other DARPA-connected individuals, Angelos Keromytis and Tejas Patel—both of whom were included on the September 25, 2018 email about the “Mueller case.” (The Georgia Tech emails obtained by The Federalist also established that Durham’s team sought to question Keromytis about his time at DARPA.)

The extensive redactions in the “Rhannousia chat logs” make it impossible to assess whether Antonakakis and his colleagues were working on the DNC hack or investigating the identity of Guccifer2.0 for the “Mueller case” against the Russian GRU agents. But if so, it raises serious questions, the foremost of which is: Why did DARPA claim no DARPA-funded researchers assisted the FBI’s or Special Counsel Robert Mueller’s investigation of the DNC hack?

If Antonakakis assisted Mueller in the DNC hack investigation, as these various documents suggest, it raises a second significant question: Did Rodney Joffe provide Antonakakis the data necessary to conduct an attribution analysis of the hack?

Other emails The Federalist obtained from Georgia Tech establish that Joffe had assisted Antonakakis with data requests he needed for some attribution requests, beginning in August of 2016, even before the DARPA contract became official. So, the question is, did Joffe continue providing the data Antonakakis needed to run various attribution analyses, and specifically did he provide data used to investigate the DNC hack?

Given Joffe’s role in the Alfa Bank hoax, and given yesterday’s revelation by the special counsel’s lead prosecutor DeFilippis that a CIA analyst believed the data was user-created, the country deserves to know whether Georgia Tech researchers assisted the special counsel’s office in investigating the DNC hack and, in turn, relied on data Joffe provided.

DARPA Chief of Communications Jared Adams has not replied to multiple requests for clarification from The Federalist, leaving one to wonder why. (The author of the “Mueller case” email, Chris Schneck, also did not respond to The Federalist’s request for comment.) And if DARPA and Antonakakis weren’t working on the DNC hack case, then what was the Mueller case with which they were assisting?

Margot Cleveland is The Federalist’s senior legal correspondent. She is also a contributor to National Review Online, the Washington Examiner, Aleteia, and, and has been published in the Wall Street Journal and USA Today. Cleveland is a lawyer and a graduate of the Notre Dame Law School, where she earned the Hoynes Prize—the law school’s highest honor. She later served for nearly 25 years as a permanent law clerk for a federal appellate judge on the Seventh Circuit Court of Appeals. Cleveland is a former full-time university faculty member and now teaches as an adjunct from time to time. As a stay-at-home homeschooling mom of a young son with cystic fibrosis, Cleveland frequently writes on cultural issues related to parenting and special-needs children. Cleveland is on Twitter at @ProfMJCleveland. The views expressed here are those of Cleveland in her private capacity.


Snake Venom Key Ingredient In “Covid-19 Vaccine” Patents

Snake Venom Key Ingredient In “Covid-19 Vaccine” Patents

By Dr. Ariyana Love, ND

The world premier documentary Watch The Water aired on Red Voice Media this week. Dr. Bryan Ardis dropped a bombshell during his interview with Stew Peters about one of the greatest conspiracy truths of all time. The intentional poisoning of the world’s population through our municipal water supply using snake venom.

Please see: VenomTech company announces massive library of SNAKE VENOM peptides for pharmaceutical development; “nanocarriers” stabilize snake venom in WATER (PubMed)


Most snake venoms contain proteolytic enzymes. I found Snake venom in ten Covid-19 vaccine patents listed as “venom” and “proteolytic” (enzyme).

Snake venom is being recently touted as an “anti-HIV” drug, since January 2022. There’s six PLA2s from Snake Venoms patents “against HIV”. These synthetically derived snake venoms are marketed under the guise of being “antiviral” and as a preventive treatment for HIV infection.

The study claims snake venom works to “protect against Lentiviruses” through the “destruction of the viral membrane.” However, this is a lie because we know the Lentiviruses are a lab generated, chimeric mRNA bioweapon containing SARS, MERS, HIV 1-3 and SRV-1 (AIDS), as I documented in my article entitled, Transgenic Hydras & Parasites A Biological Weapons System For Rapid Human Cloning.

In actuality, snake venom is being used to destroy the human cell membrane not the “viral membrane”, so that nanoparticles can enter the cell and code your genome. This PubMed study proves that HIV is being encoded into people’s cells to produce a new cell line persistently. So snake venom assists mRNA to clone your cells. The J&J patent also mentions “RNA Replicons” which are forever replicating proteins.

Our Satanic “elites” have programmed the AI to create bioweapons far more complex than humans could ever come up with and the AI came up with 40,000 of the most deadly bioweapons to date.


The ACE2 protein acts as an anti-inflammatory, keeping immune cells from inflicting damage on the body’s own cells. The ACE2 receptor helps muscles contract and acts as a messenger between nerves, muscles and cells. It’s crucial in your cell signaling processes.

The ACE2 molecule acts as a gateway, preventing toxins from entering your cells. The mainstream narrative says that SARS-CoV-2 or the “spike protein”, attaches to human cells and blocks the ACE2 receptors. Snake venoms are postsynaptic neurotoxins, meaning they block the Ace2 receptors. So, I think we’ve identified the “spike protein”.

Snake venom latches onto ACE2 proteins and they get knocked out of commission. This destroys the body’s cell signaling function and enables the nanotech weapons system to enter the cells and reach the nucleus, where the mRNA is reverse-transcribed and integrated into the human genome.

Snake venom causes paralysis, the loss of muscle function and respiratory failure. It also causes inflammation, cytokine storms and induces auto-immune illness. Studies say snake venom triggers irreversible intracellular alterations, organ failure and continued cell death.

Heart and lung cells are covered with these ACE2 surface proteins which could explain why there’s so many reports of acute Myocardial injury following “Covid-19 vaccination”. I am receiving a lot of reports from my clients of prolonged stomach pain from these lethal jabs, another causation of snake venom which affects your digestion. 

Speaking of digestion, the Food and Agriculture Organization of the US approved the use of snake venom in food last year (2021). According to the FAO/WHO the PLA2 enzyme (snake venom) complies with the General Specifications and Considerations for Enzyme Preparations Used in Food Processing. They’re using a combination of snake venom and a genetically modified Streptomyces violaceoruber bacteria (strain pChi). In other words, it will alter your genome.

Notice the conflict of interest in this safety study that declares the pChi strain is not harmful for consumption. The study does admit that this bacterial strain modifies your genome. I don’t believe that any level of genetic modification of humans is at all safe.


60% of snake venom consists of a neurotoxic substance called Crotoxin. It was the first proteinic toxin to be crystallized into protein crystallization. Once crystallized it can be used in structural biology. You can even buy Crotoxin online


Organoids are being grown a lab to mass produce snake venom. Organoids of snake glands can produce snake venom artificially, without the entire snake. 


Monoclonal antibodies were funded and developed by DARPA and Bill Gates. All monoclonal antibody patents reveal this is a mRNA “vaccine” that codes your cells with HIV-1. Just like the “Covid-19 vaccines”, monoclonal antibodies never underwent clinical safety trials. They’ve never been approved for use on humans and were passed under the Emergency Use Authorization.

In his interview with Mike Adams, Dr. Bryan Ardis mentioned a study funded by Fauci and the NIH that proved monoclonal antibodies are in fact, unsafe. They specifically target and destroy your T-cells (killer cells) through cytotoxicity. Thermo Fisher’s monoclonal antibodies actually contain snake venom (PLA2)!

Please read: Monoclonal Antibodies Is Experimental Gene Therapy – Patent Review

All monoclonal antibodies contain Hydroxychloroquine or chloroquine in “some embodiments”. This explains why some people report feeling better after using monoclonal antibodies at first and that’s enough to fool doctors but later they become extremely fatigued. The long-term effects are still unknown but they cannot be good. When your immune system is destroyed, your body cannot fight off disease.


The Oxford patent mentions “Nanobodies” and says that “antibodies have been replaced with Nanobodies”. The whole purpose of the “Covid-19 vaccines” was to invoke an “antibody response”. Now that lie too is exposed. The nanotechnology is being programmed to kill.


There are breakthrough medicines and supplements that work antidotally against all poisons, including snake venom. In the Dr. Bryan Ardis interview with Dr. Braun, he mentioned the power of redox molecules against snake poison.

A peer-reviewed study from 2018, shows that Melatonin will also protect you against snake venom: 

“Besides antibodies, molecules like melatonin are reported to underlie the antivenom effect. The study of such was established in Egyptian cobra (Naja haje) venom using a rat model; the vital organs, like kidney, liver and heart, of the rat were protected from the venomous effect.”

Contact me on Telegram for information on where you can obtain the redox molecule supplement that enables your body to remove all poisons and restores all of your body system functions.

Also, follow my Telegram channel here.

Watch my latest interview with Stew Peters at Red Voice Media, here.


DEMOCIDE: U.S. Biolabs In Ukraine Supply Race-Specific Gene Weaponry

DEMOCIDE: U.S. Biolabs In Ukraine Supply Race-Specific Gene Weaponry

By Dr. Ariyana Love, N.D.


In March, I joined Stew Peters Show for a couple of interviews, to provide insight into Putin’s purging of bioweapons labs in Ukraine. Those interviews went viral.

First interview: Putin’s Secret War: Ukrainian Bioweapon Labs Exposed

Second interview: Horrifying Russian Report: Ukrainian Biolabs Creating Special Bioweapons For Ethnic Cleansing

This article is to provide supporting evidence, links and documents for further study.


Russia’s military operation in Ukraine is entirely justified and in accordance with international law. The US Government, DOD and NATO partners were funding and operating 30 Ukrainian bioweapons labs under a “Covid-19 prevention program” but in actuality, they were producing chimeric pathogens for the “vaccine” Holocaust.  

The US has admitted to the bioweapons labs but is desperately trying to destroy and hide the evidence that they violated Article 1 of the Biological and Toxic Weapons Convention of 1973. The UN is participating in the cover-up by rebranding the bioweapons facilities as “Public Health laboratories”.

The same corrupt media trickery and propaganda is being used today by the cabal, to black PR Russia/Putin and create a false narrative that spins confusion and drives division among people. It was no different during Putin’s intervention in Syria.

Moscow reports that Hunter Biden helped finance a US military ‘bioweapons’ research program in Ukraine. Hunter’s laptop emails provide the supporting evidence that he did in fact help secure millions in funding for US contractor in Ukraine, specializing in deadly pathogen research.  

145 species of bioweapons have been developed in Ukraine in violation of international law and two of them were crossing into Russia. The cabal had used biological weapons in an act of war against not only Russia, but the entire world.

Routes into Europe were also being mapped. Parasites and insects that carry chimeric pathogens to infect Humans with, were being smuggled out of Ukraine and the bio-samples were being transferred abroad.

Classified documents captured by Russia reveal a paper trail between Ukrainian biolabs and the Doherty Institute in Australia. Victorian Infectious Diseases Laboratory in Melbourne was caught importing blood serum from Ukrainian biolabs. There’s 350 cryocontainers with samples of blood at the Australian Institute that are being used under the pretense of “antibody research”. 

Aussie Cossak reported that Australian mercenaries have been spotted in Ukraine, in the city of Zhitomir, 150km West of Kiev.

Russia also revealed that the U.S. biolabs in Ukraine created genetic bioweapons to target certain ethnic groups for race-specific ethnic cleansing. A scientific study published in December of 2021, shows that Europeans are the most targeted ethnic group while Ashkenazi Jews (Khazars) are entirely immune to any genetic modification. Now this is some damning evidence.

Now the DNA harvesting PCR Kits under the guise of “covid testing” should make a lot more sense to you. Your DNA is so valuable to them.


George Soros has been controlling Ukraine since 2012 and stealing the regions natural resources.

Former President Barack Obama himself authorized the construction of the biolabs in Ukraine for creating dangerous pathogens, in 2005. It was the Obama/Biden deep state regime established a coup d’etat rule in Kiev, together with the Israeli state.

Jewish oligarch billionaires in Ukraine with dual nationality to Israel, such as Igor Kolomoisky, funded the neo-Nazi Azov Battalion while the Israeli state armed them.

Former US Marine Corp Intelligence Officer Scott Ritter told George Galloway “The first troops to be trained by US and British soldiers were the neo-Nazi Azov Battalion”.

The Azov Nazi’s officially integrated into the National Guard of Ukraine in 2014. Azov violently overthrew the legitimate president of Ukraine and forced their way into the government. The newer Zelensky’s puppet regime has been using internationally banned cluster bombs and other bombs against civilians, according to a Human Rights Watch reports, while the militarized Azov Nazi’s have been committing war crimes atrocities against Russian-Christian Ukrainians, especially in Eastern Ukraine. Investigative Journalist Laura Logan confirms there are mass graves in Ukraine from Zelensky’s regime.

In October 2019, Congress wrote U.S. Secretary Mike Pompeo, asking why the State Department failed to include the Azov Battalion on the Foreign Terrorist Organization list.

Israeli news Haaretz reported that the Jewish oligarchs will now flee to Israel where they will be given indemnity from their crimes against humanity.


The US Department of State was able to control everything that happened within the Ukrainian biolabs. Tucker Carlson reported that the U.S. Government released a document in 2020 admitting that the bioweapons facilities in Ukraine are for “vaccine development”. 

The Russian military discovered the plague, anthrax, tularemia, cholera, Ebola, Filoviruses’ and more, were being developed in Ukraine. Ebola is used in the J&J and Sinovax gene editing weaponry while the Filovirus is used in Moderna. Biotech companies are clearly getting their Gain-of-Function pathogens from Ukraine.

Russia also mentioned that the H5N1 and H1N1 are being produced in the U.S. biolabs. H1N1 induces Smallpox. I found an mRNA vaccine patent for cattle using the H5N1 and H1N1 and the deadly Brucella bacteria. This means the cabal has also been producing weaponry in Ukraine, to poison our food supply. The patent is owned by Khazakstanians. Incidentally, there’s a U.S. bioweapons lab in Khazakstan that weaponized Coronavirus for aerosolized dissemination on civilian populations. 

I also found an mRNA vaxxine patent for animals that uses the Brucella melitensis for US and UK cattle.


Journalist Dilyana Gaytandzheiva reports that the Pentagon has conducted biological experiments on 4,400 soldiers in Ukraine and 1,000 soldiers in Georgia, and unleashed deadly, antibiotic-resistant bacteria on the local civilian population as well as on allied troops, according to leaked documents. 

The documents read that all deaths should be reported to the U.S. Government. The U.S. personnel in these biolabs were given Diplomatic Immunity, although they are not diplomats and they are indemnified from deaths and injuries to the local population. 

The Pentagon project in Ukraine and Georgia was code-named GG-21 for “Arthropod-borne and zoonotic infections”. Arthropod-borne means ticks and other insects carrying deadly pathogens to infect Humans. Zoonotic infections are caused by harmful germs, bacteria, parasites, fungi and mold.

Blood samples were being obtained from 1,000 military recruits during their physical exams at a military hospital in Gori, Georgia.

The 13 deadly pathogens that were being tested on the troops are:

Bacillus anthracis


Coxiella burnetii

Francisella tularensis


Rickettsia species

Bartonella species

Borrelia species

Ehlrichia species

Leptospira species

Salmonella typhi

West Nile Virus (WNV)

The Bacillus anthracis (anthrax) bacteria can be disseminated by aerial spraying. I found a patent with a method for removing plasma (DNA) from Bacillus anthracis bacteria using CRISPR/Cas9 system and it’s owned by China. This is how they get Mycoplasmas. 

Brucella is another deadly bactera. In the 1950s, the US military developed artillery shells and bombs armed with a bacterium that causes a debilitating flu-like disease in humans. In 2001, the US and DARPA artificially sequenced the Brucella suis genome and began applying it to vaccines. Being infected with Brucellosis is like having the flu times ten, though it’s not life-threatening unless you have some other condition. The US Army likes the Brucella suis pathogen because they’re able to debilitate people without killing them, just like “COVID-19”.  

Crimean-Congo hemorrhagic fever (CCHF) has been weaponized using ticks to infect Humans. It has a 40% lethality. Coxiella burnetii and Francisella tularensis are also highly infectious. You need only 10 bacteria to make you sick. The U.S. military was supposed to have destroyed the Francisella tularensis in 1973 because it has up to a 60% lethality.

TBE is tick-borne and causes encephalitis. Bartonella species cause Lyme Disease. Borrelia bacteria hides inside parasitic worms, causing chronic brain diseases. Ehlrichia is a disease from dogs. WNV (West Nile Virus) is carried by mosquitos.


Putin just cut off the head of the snake in Ukraine and exposed the whole shit-show. Now let’s make the most of it.


Klaus Schwab & Hunter Biden Connected To Ukraine Bio-Labs

Klaus Schwab & Hunter Biden Connected To Ukraine Bio-Labs

Greg Reese – Mar 11, 2022

A closer examination of the Pentagon funded bio-labs in Ukraine brings up all the usual suspects

We are in this fight together.

SourceSouth Australian Gov Criminal Organisation


Please help truthPeep spread the word :)