Datura tales

When I was in my “lost in the wilderness” period in my life (After I joined MAJestic, but not yet trained at China Lake, I wandered about.) we were living on a farm in Yanciville, NC. (I don’t know if I spelled that name right.)

And there was a guy (named Holt) who introduced us to the Datura plant.

Datura is a genus of nine species of highly poisonous, vespertineflowering plants belonging to the nightshade family (Solanaceae).[1] They are commonly known as thornapples or jimsonweeds, but are also known as devil’s trumpets[2] (not to be confused with angel’s trumpets, which are placed in the closely related genus Brugmansia). Other English common names include moonflower, devil’s weed, and hell’s bells.

All species of Datura are extremely poisonous and potentially psychoactive, especially their seeds and flowers, which can cause respiratory depression, arrhythmias, fever, delirium, hallucinations, anticholinergic syndrome, psychosis, and even death if taken internally.[3]

Due to their effects and symptoms, Datura species have occasionally been used not only as poisons, but also as hallucinogens by various groups throughout history.[4][5]

Traditionally, their psychoactive administration has often been associated with witchcraft and sorcery or similar practices in many cultures, including the Western world.[5][6][7] Certain common Datura species have also been used ritualistically as entheogens by some Native American groups.[8][9]

Non-psychoactive use of plants in the genus is usually done for medicinal purposes, and the alkaloids present in some species have long been considered traditional medicines in both the New and Old Worlds due to the presence of the alkaloids scopolamine and atropine, which are also produced by Old World plants such as Hyoscyamus niger, Atropa belladonna, and Mandragora officinarum.

And we all tried this old fashioned remedy using this dangerous plant.

We soaked the roots of the plant in water for a week, and then drank the water.

I know it was terribly stupid, but we were young and in our 20’s and we believed Holt.

The effect was that every thing turned very blue and soft to us. We heard the twinkling of soft bells, and when we went to sleep later on the night, had very vivid dreams.

I would NEVER do that again. And I DO NOT suggest anyone duplicate our stupidity.

But the point of this story is that …

  • Well-meaning friends can put you in life threatening situations.
  • When you are in your 20s you can do very stupid things.
  • Whatever the experience was, it was not worth the risk of death.

And so, I ask everyone to heed my story and pay attention to what might transpire in your own lives.

Today…

Huawei unveiled their new smartphone, which is undeniably impressive and packed with numerous technological breakthroughs. How many of you are keeping tabs on this development, and what are your thoughts on Huawei’s achievements with this phone?

I am following it closely; the Mate 60 Pro is just the first step.

Over the next decade, I expect China to launch many new products based on new technologies. Most of these products will be launched in BRICS markets instead of the G7 nations.

The West is poised to feel what it is like to live in a a “banana republic.”

Granny’s Old-Fashioned Bread Pudding
with Vanilla Sauce

grannys old fashioned bread pudding
grannys old fashioned bread pudding

Ingredients

Bread Pudding

  • 1 pound French bread, cubed
  • 1/2 cup raisins
  • 2 cups milk
  • 1/4 cup butter
  • 1/2 cup granulated sugar
  • 2 eggs, slightly beaten
  • 1 tablespoon vanilla extract
  • 1/2 teaspoon ground nutmeg

Sauce

  • 1/2 cup butter
  • 1/2 cup granulated sugar
  • 1/2 cup firmly packed brown sugar
  • 1/2 cup heavy whipping cream
  • 1 tablespoon vanilla extract
  • 1/2 cup chopped walnuts (optional)

Instructions

  1. Heat oven to 350 degrees F.

Bread Pudding

  1. Combine bread and raisins in a large bowl.
  2. Combine milk and 1/4 cup butter in a 1 quart saucepan. Cook over medium heat until butter is melted.
  3. Pour milk mixture over bread; let stand for 10 minutes.
  4. Stir in all remaining pudding ingredients. Pour into greased 1 1/2 quart casserole.
  5. Bake for 40 to 50 minutes or until set in center.

Vanilla Sauce

  1. Combine all sauce ingredients except vanilla in 1-quart saucepan.Cook over medium heat, stirring occasionally, until mixture thickens and comes to a full boil (5 to 8 minutes).
  2. Stir in vanilla extract and walnuts*, if using.

To serve

  1. Spoon warm pudding into individual dessert dishes; serve with sauce.
  2. Store refrigerated.

Notes

I usually serve this without the walnuts, but sprinkle them over individual servings if anyone likes walnuts.

Niger Raises Uranium Price From €0.80/kg to €200/kg

Niger Raises Uranium Price From €0.80/kg to €200/kg – In a groundbreaking development that signals a seismic shift in the global resource market, Niger, a prominent player in the uranium industry, has reportedly taken a bold step towards securing fair compensation for its invaluable natural resource, uranium.

Multiple reports suggest that Niger has substantially increased the price of its uranium, skyrocketing it from a mere €0.80 per kilogram to €200 per kilogram.

This remarkable decision underscores a burgeoning determination among African nations to break free from historical imbalances and demand equitable remuneration for their vital contributions to the global economy.

According to the World Nuclear Association (WNA), Niger is the world’s seventh-largest uranium producer.

The radioactive metal is the most widely used fuel for nuclear energy. It is also utilised in cancer treatment, naval propulsion, and nuclear weapons.

Uranium prices increased slightly in the aftermath of the military coup in Niger that saw the ousting of President Mohamed Bazoum, with many analysts forecasting larger gains in the future. For instance, Ben Godwin, head of analysis at London-based Prism Political Risk Management, said that current events in Niger, which produces about 4 percent of the world’s uranium supply, could be critical to Europe.

“It is certainly a topic of great interest in the moment, particularly as uranium markets are very, very tight at the moment,” he said.

“Demand has been going up over the last few years, and this year, we’ve seen the uranium spot price go up by nearly 40 percent year to date.”

Does the US believe that China is powerless to attack the US mainland if it attacks China first?

The Pentagon understands the true and real abilities that China possess.

There is absolutely no questions regarding whether or not China can attack the United States mainland. The answer is affirmative. China has numerous weapon systems designed to acquire, target, stealthy evade and strike with great accuracy targets within the United States geographical landmass.

This has been proved. Demonstrated beyond any question of doubt, and is known to be stockpiled in enormous quantities.

The Pentagon believes that China is capable of destroying targets within the United States without problem or interference.

That being said. What does the “government” think?

I’m sure that President Biden has his own points of view…

main qimg a7e1345fe6e7b99031320bb423d4606a
main qimg a7e1345fe6e7b99031320bb423d4606a

I’m sure that key and influential members of the US Senate has their ideas as well…

main qimg 31abfa22c7712659717f74bcead91cce
main qimg 31abfa22c7712659717f74bcead91cce

And since they will be the ones who will decide whether China shall use these weapons systems on American cities, perhaps we need to listen to what their thoughts are.

One way is to go though the people that elected them to office, and ask those people what they think.

main qimg c6c7f321775e90046cb10509a2a3b34d
main qimg c6c7f321775e90046cb10509a2a3b34d

But, you know, most are going through the “trials” of being an American. So perhaps the smarter thing to do is ask a more diverse cross section of the American population and see what they think…

main qimg ec46b35a182640dbd43e3faba5aa261f
main qimg ec46b35a182640dbd43e3faba5aa261f

My guess is that these people would have a diverse opinion that would be heavily influenced by their social media of choice. So, if you want some real unbiased opinion of what Americans think, perhaps you should visit the more rural areas…

main qimg eaea341906732b762833d5c79479a093
main qimg eaea341906732b762833d5c79479a093

And their opinion is “China ain’t gonna do shit. We’ll kick their ass!”.

And so, to answer the question…

  • Yes. China is fully capable of attacking the United States.
  • But Americans are not worried because…

IRAN’S VICTORY! China Takes Over Iran’s $2.7 Billion Strategic Project | Break US Sanctions!

The United States has long imposed a series of sanctions on Iran, including restricting oil exports and cutting Iran off from the international financial system.

This has greatly affected Iran’s economy and international status. In order to break through US sanctions, Iran has been working hard. Recently, Iran became a member of the BRICS as it wished.

In order to express its sincere desire to its Eastern partners, Iran signed an infrastructure agreement with China immediately after the BRICS summit ended. According to the agreement, Iran will invest at least US$2.7 billion in the expansion of the international airport, and Chinese companies have successfully become the sole builders of the project.

However, what is most concerning is that this time Iran’s $2.7 billion infrastructure cooperation with China will use a special payment method.

From an analysis point of view, the payment method reached by Iran and China not only effectively got rid of the sanctions of the United States, but may even accelerate the process of “de-dollarization”, which made President Biden feel very panicked.

So, what exactly happened?

https://youtu.be/XMoWgo4jUVQ

Why does Elon Musk blame a Los Angeles-based school for turning his transgender “woke” and making her hate him?

It’s kind of a crazy story.

One of those stories that seem almost surreal.

But essentially, Elon Musk sent his children to the finest schools money could buy. Only to discover, much to his chagrin, that such schools are rather progressive.

[1] Now his oldest son suddenly isn’t his son anymore, but his daughter. And she self-identifies as a “communist” and hates Musk for “being rich”.

main qimg 58e59ff552016cd136f71523a814d6b0
main qimg 58e59ff552016cd136f71523a814d6b0

This is where the whole “campaign against wokeness” comes from, for Musk — it’s a personal vendetta of sorts. This is why he bought up Twitter in the first place; because ‘the woke’ have gotten to his own family, and he resents it. I’m not entirely sure it’s this school in particular that turned his child transgender, however — the school boasts several famous alumni, among them Jack Black. And Jack Black is pretty much the bloke-iest bloke to ever bloke around.

main qimg 192310e5ba870d220813b1e09d1eb4fb
main qimg 192310e5ba870d220813b1e09d1eb4fb

Either way, Elon Musk decided that schools pushing woke narratives turned his own child against him, brainwashing her. He’s upset. I kind of get it. I would be, too. Change is scary. And when someone hates you to the point of legally petitioning for a name change (from Musk to Wilson, the last name of his ex-wife), that’s rather awful.

Anyway, it’s the school’s fault, not Musk’s. And now, the wider issue Musk identified, is the the type of policies peddled at schools and campuses in general. The left-wing ideologies, the gender-bending, the overly progressive attitude towards pretty much everything. I’ve never given much thuoight to what started Elon’s crusade against wokeness… but now we know the answer. Now we know what started it all.

The Death of Disney – Narrated by A.I David Attenborough

Sir David Attenborough narrates the rise and fall of Mickey Mouse (A.I parody).

As a police officer, have you ever received an unusual ‘thank you’ for taking care of someone?

Around 6 months after I finished field training, I was working a night shift and was dispatched to an animal cruelty call. Arriving at the home,I was met by a woman and her 4 year old son,both in tears. In this line of work, you quickly become accustomed to dealing with upset people, it’s just a part of the job. I introduced myself to both of them and listened as the mother explained the situation to me.

Arriving home from work, she and her son had parked in the driveway and walked to the side door of the house where they found the little boy’s 4 month old kitten lying on the steps. The kitten had been skinned by someone, and carefully placed on the steps to be noticed immediately. Being a cat person myself, my heart ached for this little boy. Not only was his kitten dead, it had been killed on purpose by someone and carefully skinned then left on display for maximum shock value! I took a report on the incident and then I helped the little boy bury his dead kitten in his back yard, fashioning a little cross out of some sticks.

There were really no leads of any kind on who may have perpetrated this horrible crime. I had the 911 telecommunicator search for any similar crimes in the area that had been reported recently and had no luck. I knew that the chance of finding out who did this was slim to none, but promised the little boy that I would do everything in my power to find and punish those responsible. Before clearing the call, I gave the little fella a tour of my patrol car, letting him play with the lights and siren. I always kept some stickers and stuffed animals in my trunk for situations just like this, and I let him choose a couple stickers and an animal.

About two weeks later, my Lieutenant called me in to his office after shift briefing. On his desk was a thank you card and a picture of a kitten that had been colored for me. My Lieutenant explained that the lady and little boy from the animal cruelty call had visited the office and left the items for me earlier that afternoon. It warmed my heart to receive this heartfelt thanks from them.

Maybe a month or so later, I answered a call about someone throwing a kitten out of a car window. Arriving on that scene, I found the kitten on the side of the road amazingly uninjured. Normally on a call like this we would turn the animal over to animal control, but I had an idea. I put the kitten in my patrol car and drove towards the little boy’s house, hoping that since it was a Saturday I would find them at home. I was in luck! Before showing the kitten to the little boy, I spoke with his mother to make sure she was OK with it. She agreed, so I got the kitten out of the car and presented it to the little boy. His eyes were the size of dinner plates when he saw the kitten! Both mother and son thanked me profusely and I left knowing that I had made that little boy happy.

It is situations like this that made being a law enforcement officer one of the most rewarding experiences of my life.

“Nuclear war between U.S. and Russia is inevitable” – Russian General | Redacted with Clayton Morris

Retired Major General Alexander Vladimirov, who wrote Russia’s three volume book called the ‘General Theory of War,’ says the moment war broke out in Ukraine is the moment that nuclear war with the West became inevitable.

Why is everyone talking about the G20 Summit?

The biggest point on every media outlet outside India is

WHY IS XI JINGPING BOYCOTTING THE G20?

That’s the only thing that has made the G20 summit newsworthy so far

In India locally – the G20 Summit isnt even the top news

It’s the renaming of India to BHARAT and Modi hiding slums with green posters or something like that


Every major outlet is only discussing that one thing on the G20

Why is Xi Jingping not attending?

Some say he has kidney ailments, Some say he fears CPC revolt, Some say Putin and he plan a major meeting and some others say something else

All of it nonsense of course


The G20 Summit will not make a splash unless it becomes G21 which means inclusion of the African Union

Li Qiang will support the proposal wholeheartedly as will Lavrov and i am sure so shall Modi

Then the G20 may draw some traction

Right now nobody is talking about it at all

Douglas Macgregor: What A Deep Penetration!

https://youtu.be/0ibt2nrh0IQ

What are the gayest things I should avoid?

According to my homophobic father?

There was an entire list.

  • Shorts. Invented by gay men so that they could check out men’s legs.
  • Football. All that back slapping and hugging when they score a goal. They’re all closet <insert homophobic slur here>.
  • Rugby. The scrum? Closet <insert homophobic slur here>, the lot of ‘em.
  • Art. They’re all <insert homophobic slur here>.
  • Actors. They’re all <insert homophobic slur here>. Putting on wigs and make-up – sends them “funny”.
  • Having female friends. Women are for looking at and for having sex with, not being friends with.
  • Wearing your watch on the right wrist. I never learned why.
  • Anything pink.
  • Looking at your nails “funny”. (This translated to holing your hand out, flat palm facing away from you, fingers straight).
  • Cooking.
  • Baking.
  • Garlic. The French use it a lot, and we all know the French are all <insert homophobic slur here>.
  • The French. A special rung of gay was reserved for the French (yes, the entire population) in his head. Apparently the women were gay and the men were gay. He never did elaborate as to how France has managed to still exist generation after generation. The “womanizing” Frenchman was a cover to hide his gayness.
  • Thai men. Yes. Every man from Thailand is a homosexual… apparently.
  • The Navy.
  • Glam Rock.
  • ABBA’s music. But only the one’s in which Bjorn sings lead in. ¯\_(ツ)_/¯

Do you want to know what my homophobic father regarded as the most macho, manliest-man, hetero thing in the world?

Wrestling.

Wasn’t regarded as gay, but eating garlic and hanging around with French girls was.

The Sopranos ( best ending scene ) season 6

When Phil says “no more Butchie. No more of this” and the music starts rolling, you know the war is about to start.

What was the moment you cancelled the friendship with your best friend?

My best friend spent most weekends with my husband and I, we had lots of fun cooking, going places, etc. She would get a guy, get serious, then find some awful thing wrong with him, call him names, and had to change her number numerous times.

When I got pregnant she seemed off. I know she always wanted a family and was jealous. She gave me an IOU for an expensive breast pump and bragged about it at my shower. 5 months after, no breast pump, whatever. But not even a pair of socks to welcome my child into the world. Yest she got a mani- pedi every two weeks, like clockwork. I am the type of person who yses the same old bargain pur for years, never get manicures or pedicures, and i get my hair cut twice per year. I shop at goodwill for clothes. I summoned up the courage to tell her I felt insulted that she never acknowledged my child, not even a pair of socks. She went of the deep end and called me materialistic! And all sorts of swear words. I never spoke with her again. Been 16 years. I couldn’t wrap my head around what she said to me.

Crunchy Taco Wraps

This taco wrap gets its crunch from a tostada in the middle of delicious taco fillings; and of course wrapped up in a delicious Rhodes grilled flatbread.

crunchy taco wrap
crunchy taco wrap

Prep: 15 min | Bake: 15 min | Yield: 6 servings

Ingredients

  • 12 Rhodes Dinner Rolls, thawed
  • 6 tostada shells
  • 1 pound lean ground beef
  • 1 small yellow onion, chopped
  • 2 tablespoons taco seasoning
  • 1/4 cup water
  • 1 teaspoon garlic
  • 1 jar nacho cheese or Queso cheese dip
  • 1 cup sour cream (optional)
  • 2 cups shredded lettuce
  • 1 cup salsa
  • 1 cup shredded Mexican cheese blend

Instructions

  1. Lightly spray counter or table with nonstick spray. Combine two dinner rolls and roll into an 8 inch circle. Repeat with remaining rolls. Cover with sprayed plastic wrap and let rest.
  2. In a large skillet or griddle, over medium-high heat, brown ground beef and. Stir in taco seasoning, water and garlic. Reduce heat to low and let simmer for 5 more minutes.
  3. Heat griddle to medium heat. Carefully remove plastic wrap from dough. Grill dough for 20 to 30 seconds on each side or until cooked through.
  4. Lay one grilled flatbread on a flat surface. Spread 1/2 cup of taco meat onto the center of the flatbread. Spread queso over one side of the tostada and place it cheese side down on the meat.
  5. Spread a thin layer of sour cream or more queso on top of the tostada shell. Top with lettuce, tomato and cheese.
  6. To fold the taco wrap, start with the bottom of the tortilla and fold the edge up over the center. Continue to work your way around, folding the tortilla over the center fillings. There will be an open spot on the top in the center.
  7. Repeat with all remaining flatbreads, tostadas and toppings.

every store is CLOSED in San Jose

San Jose the Bay Area’s largest city has dropped out of the top 10 largest cities in the US by population and stores are closing left and right in this city tour I am exploring downtown San Jose, and what I found was shocking, blocks after blocks of empty storefronts.

Why don’t the Western countries “peacefully evolve” China by breaking the Chinese Great Firewall?

Has it ever occurred to you that the Great Fire Wall protects you? Yes, you!

main qimg c2d5fcb2380564a20ec56de57213a704
main qimg c2d5fcb2380564a20ec56de57213a704

Imagine if suddenly 1.4 billion people flooded the internet with pro-China content. Okay, some are dissidents so make that one billion instead. My point is, in the Western world where “safe spaces” and “trigger warnings” abound, unleashing the mainlanders into that environment en masse would have a profoundly negative impact for Westerners. I’m not sure they (the “outside” world) could handle it. Fun to think about though.

About those cute little robots that are all over China these days…

Unknown in the rest of the world, but commonplace in China are these little robots that are seemingly everywhere. They scan you when you go into public buildings, and they help deliver food to you. They ask you if you need help or directions, and they help sweep the sidewalks and perform basic maintenance tasks. And here I am in a second tier city. Not even a first tier city. It’s all really cool.

According to the International Federation of Robotics (IFR), China has had the most industrial robots in operation globally since 2016. By 2020, China is expected to produce 150,000 industrial robot units and have 950,300 industrial robots in operation.

A few years back was when I first noticed them. I think that my first exposure to the public robots was around 2013. There I saw my first one patrolling the immigration walkways of Shenzhen.

Then a few years ago, I bought my infant her first baby robot. This is a cute little egg about the size of  barbie doll that sang and talked. It would pulse in this kind of pale yellowish light and it’s eyes would twinkle blue and green. She loved her little baby robot.

Since then I really haven’t paid the robot developments too closely. Most of my concern were in the industrial aspects of AI and robotics. Not so much regarding the commercial and public aspects.

Then 2020 Coronavirus hit.

Ouch! Then suddenly the skies were filled with thermal imaging drones, and police robots making sure that people are kept off the streets and maintaining good citizenship behaviors. The first were nothing more than a nice shiny white cylinder with a pair of eyes, a television screen and a nice voice.

Now they are getting more sophisticated. they all seem to have either a female voice or a cute little girls voice. It’s actually quite charming.

Here’s some videos. Check out the little girly voice on this delivery robot…

Factory Robots

And they have been in factories for decades now.

China made robotics a focal point of its recent “Made in China 2025” plan, and has set national goals of producing 100,000 industrial robots a year and having 150 robots in operation for every 10,000 employees by 2020, a figure known as robot density.

-Robots are key in China's strategy to surpass rivals

Service Robots

A service robot operates semi or fully autonomously to provide services for human health or the maintenance of equipment, excluding industrial operations.

Healthcare/medical devices, finance, warehousing/logistics, and customer service/catering are the hottest industries for service robots. Service robots have also increasingly been appearing in households as home-cleaning robots, accompanying robots, entertainment robots, and education robots.

In 2017, the market for service robots was worth an estimated US$1.32 billion in China. But with a rapidly aging population, the continuous demand for healthcare and education, and the rapid development of parking robots and supermarket robots, the market size of service robots in China is expected to exceed US$2.9 billion by 2020.

Here’s an example of a video performing warehouse activities…

Some fun pictures

The main applications of industrial robots in China are in the following sectors: automobile manufacturing, electrical and electronics, rubber plastics, metallurgy, food, chemical engineering, and medicine and cosmetics.

-The Robotics Industry in China - China Briefing News

Here’s a police robot that connects to your cell phone. It enables you to chat with it via your cell phone, exchange pictures, get directions and offers the entire host of government APPs that are available within China.

Robots come in many sizes and shapes. the smaller ones are just as capable as the larger ones and can provide translation services, guide, help and directions. This one is Wechat enabled and enables you to connect to it directly for information access and data.

Hospital Robots

Here’s a couple of police robots that assist in hospitals, airports, rail stations and other public venues. Like all police robots they provide ready access to a Police hot line, and immediate help in any distress situation.

Specialized service robots

Specialized service robots in China are generally considered those used for military applications, extreme operations, and emergency rescue.

Specialized service robots in China are increasingly being used in response to earthquakes, floods, extreme weather, fire, security, and other public safety incidents. With Chinese enterprises’ increasing safety awareness, specialized service robots will be used in dangerous environments to perform a wide variety of tasks.

In 2017, China’s market for specialized service robots was worth an estimated US$740 million. By 2020, it is expected to reach US$1.24 billion.

Here’s a robust all-terrain police robot for crowd control and assistance to people. It monitors the environment and responds to issues just like a normal policeman would.

In addition to regional clusters, China has more than 40 robotics-focused industrial parks throughout the country. Robotics-focused industrial parks benefit from government resources and incentives to promote the industry. At the 2017 World Robot Conference in Beijing, CIE released the Report on the Development of China’s Robot Industry (2017).

-The Robotics Industry in China - China Briefing News

AI advancements in Manufacturing

China has been the world’s largest industrial robot market for four consecutive years. In 2016, China had a total sales volume of almost 90,000 units – a 27 percent increase compared to 2015 and representing 30 percent of the global market.

The Chinese government has ambitious plans for the country’s robotics industry.

MIC 2025 starts by listing the robotics industry, along with artificial intelligence and automation, as one of the priority sectors for high-end development to push forward the transformation and upgrading of the manufacturing industry. This push sees the government aiming to raise the global market share of Chinese-made robots from 31 percent in 2016 to over 50 percent by 2020.

Further, in 2016, the government launched the Robotics Industry Development Plan (2016-2020) to promote robot applications to a wider range of fields and to attract foreign investment, aiming to make 100,000 industrial robots produced by domestic technology annually by 2020.

To attain these goals, the government supports companies that implement robotics-enabled automation in key industries, including automobile manufacturing, electronics, household electrical appliances, and logistics. The government has several programs and incentives to encourage R&D development and innovation, such as offering robot manufacturers and automation businesses subsidies, low-interest loans, tax relief, and land rental incentives.

Furthermore, the Ministry of Industry and Information Technology recently announced at a news conference in anticipation of the 2018 World Robot Conference that China has “approved a plan to build a national robotics innovation center, which will focus on tackling common bottlenecks such as human-machine interaction technologies and compliant control.”

During the 2017 Boao Forum, Chinese officials also restated the importance of domestic and foreign companies to be “treated equally in terms of qualification licenses, government procurement, and enjoying preferential policies of MIC 2025.” Nevertheless, many foreign governments and tech companies fear that MIC 2025 gives Chinese companies an unfair advantage.

-China Briefing

Police Robots

Here’s a police robot that answers your queries. Can provide directions, answer questions, respond to distress and show you where to go, including taking you to the police office or exit if you need help.

To date, the government’s efforts to develop the industry appear largely successful: China is the fastest growing robot market in the world. Analysts attribute China’s rising robotics industry to its scale, growth momentum, and capital.

As of March 2017, more than 800 companies in China were directly involved in robot manufacturing, and by the end of 2017, there were over 6,500 companies relating to robotics. Major Chinese robotics players include SIASUN and DJI Innovations.

Development primarily focuses on servo control, motor, and reducer, human-machine interaction techniques, robot vision and intelligent speech, and underwater robots, among other technologies.

The rapid growth in China’s robotics industry is not limited to domestic companies. Foreign companies such as Nachi-Fujikoshi and FANUC have franchised with KUKA, Reis Robotics, Staubli, and ABB to establish production facilities in China – not only sales or integrated offices. The Taiwanese electronics giant Foxconn is another major robotics player in China.

Government incentives have also allowed Chinese companies to acquire Western robotics technology companies. For example, in 2016, Midea Group acquired KUKA, one of the world’s largest robot manufacturers, to advance its home appliance production.

With strong government interest in the robotics industry, a large and growing number of Chinese companies, and foreign companies that often hold the most advanced technology, there are a number of different actors involved in the industry.

According to Martin Kefer, founder of Motus Operandi, a robotics software company based in Shanghai, foreign robotics companies entering the Chinese market must be prepared to deal with a large number of stakeholders.

Kefer noted that many of the manufacturers that are adopting robots operate in Sino-foreign joint ventures, such as in the auto industry, where foreign ownership is still capped.

“Getting the foot in the door with JV manufacturers can be difficult,” Kefer noted. “Every car company partnering with a local factory in a mandatory JV agreement can make negotiations among stakeholders more complicated.”

Furthermore, investors must be prepared for the government to be another key stakeholder in the industry. “[The] government is an actor on all levels,” Kefer said.

-China Briefing

Software for robots

Besides the current two traditional robotics businesses in China – hardware and system integration – foreign companies such as Motus Operandi are investing in a third solution: software designed for robots.

For example, Motus Operandi provides software for installation in robots that finds the most energy efficient way for a robot to carry out a given task, which can save companies millions annually.

“We focus on smart motion for robotics arms in manufacturing industries. We bring something new, which is reducing the energy consumption and improving the speed of the robot system, based on the data from the robot system.” 

- Martin Kefer, founder of Motus Operandi, a robotics software company based in Shanghai

Robotics companies such as Motus Operandi benefit from the Chinese government’s support for the industry.

“Electricity is subsidized in China, which means the government pays the final bill,”

Yet, Kefer cautioned against over-reliance on subsidies and incentives.

“Avoid relying on government for growth,” 


“Support for startups in China are mostly for Chinese startups – securing government funding is harder for foreign startups.”

Motus Operandi’s experience is demonstrative of opportunities in China’s robotics industry. Aided by government support, producers of robots and related software and services are finding substantial room for growth.

However, these same government initiatives can also create competition and hurdles for foreign players in the long run. Such policies make the robotics industry an alluring but challenging area for foreign investment.

Everyday Robots

Here’s a police robot. It’s going around and helping people and monitoring crowd control and providing situational awareness.

According to the Chinese Institute of Electronics (CIE), east China’s Yangtze River Delta region has the most solid foundation for robotics development.

The Yangtze River Delta region has formed an agglomeration effect in Shanghai, Kunshan, Changzhou, Xuzhou, and Nanjing.

Many global robotics giants establish headquarters or offices in the Yangtze River Delta, especially in Shanghai, where Kefer noted that the startup environment is very supportive.

The robotics industry in the Pearl River Delta and the Beijing-Tianjin-Hebei (Jing-Jin-Ji) regions are also gradually growing.

The number of robotics-related companies in the Pearl River Delta region is over 700, second only to the Yangtze River Delta region, with a total output value of RMB 75 billion (US$11.80 billion).

However, the industry’s overall innovative capabilities in the northeastern region – China’s rust belt – have been limited in recent years.

In China’s central and western regions, the foundation of robot production is relatively weak. However, these generally fast-growing regions still show potential for development.

In addition to regional clusters, China has more than 40 robotics-focused industrial parks throughout the country. Robotics-focused industrial parks benefit from government resources and incentives to promote the industry.

-China Briefing

Human appearing Robots

The world of robots is very interesting. From what I have shown so are, which are the norm inside of China, to the stuff that you don’t see often…

…like military robots.

…like sex robots.

I would say that about 99% of the sex robots are manufactured within China. It's a big industry and many Americans and people from the Middle East don't hesitate to pay a couple of thousand US dollars for a model of their choice.

And one of the most interesting are the human appearing life-like robots. Such as this…

Everyday Robots

These are some pictures of scenes that are not uncommon within China…

Or, this… which was all over Chinese television back in 2016 during the Chinese New Year. These little guys all danced up a storm, and five thousand or so.

Or, this little guy which is being exported to Japan…

Or, this… even this is becoming more common in the larger cities such as Shenzhen.

Some Chinese military robots

It’s a new world out there.

These are currently fielded. There are many more in development.

And an interesting write up on Chinese robots in 2016 (five years ago) on Global Security

Some published science fiction a long time ago imagined battle scenes of robot soldiers in the future. Now this fantasy is becoming a reality due to the rapid development of automation technology in recent years. Military robots replace individual soldiers on the battlefield, which can greatly reduce the casualty rate of military personnel on the battlefield. Robots can return to the battlefield by mechanically repairing and replacing parts. The machine can be mass produced and hardly needs any training.

Military robots have stronger battlefield awareness than individual soldiers, and can detect potential dangers on the battlefield through sensors. Compared with individual soldiers, the machine has a stronger load capacity and can be equipped with various heavy weapons, which greatly improves the combat capability. The machine can perform round-the-clock tasks with guaranteed energy. Machines are more adaptable than individual soldiers and can adapt to different battlefield environments. Robots will not have emotions, making military tasks go more smoothly.

Unmanned technology has broad application prospects in the military field, will profoundly change the form and style of future warfare, and is the strategic frontier of the development of army equipment. Just as the invention of gunpowder sent modern warfare into the era of hot weapons, some scholars have asserted that artificial intelligence will be the key to detonating future warfare changes. Future wars will be wars on chips. This is not just a contest of human wisdom, but also a confrontation between unmanned systems. Unmanned systems will gradually free human soldiers from heavy physical work and extreme danger and let them focus on making combat decisions and carrying out technical and tactical movements. If such killer robots are put into battle on a large scale, it is very difficult for the human army to win.

The equipment of unmanned combat vehicles has greatly improved the technical and informatization level of Chinese troops. It gives infantry units stronger battlefield reconnaissance, situational awareness and support firepower. How to achieve perfect tactical coordination with unmanned combat vehicles and give full play to the combat capabilities of unmanned combat vehicles has become a very important issue facing the Chinese military.

The Chinese military is developing and testing autonomous / remote control large (over one ton) UGVs (unmanned ground vehicles), which include tanks based on the transformation of the equipment with a lot of artificial intelligence. With the ability to fight autonomously, soldiers can control it remotely. According to military experts of China, the program of robotization of the armed forces in the period from 2014 to 2022 and meeting the needs of the PLA with various types must be accompanied by a 15 percent annual increase in expenditures for these purposes from 570 million. USA in 2013 to 2 billion in 2022.

China is trying to catch up and intends to become the first in this field. UGVs can be traced back to the 1990s , when the U.S. Department of Defense developed a four-wheeled, 1.6- ton MDARS (Motion Detection Evaluation and Response System) robotic vehicle for security tasks. This robot is equipped with radar and three-dimensional vision sensors. It can avoid obstacles and recognize any objects encountered. Since 2001, Americans have equipped thousands of robots of this type. Chinese military experts have concluded that the design and creation of fully Autonomous weapons systems is possible only in the long term. The unresolved question is to determine the volume of tasks, operation and the role of Autonomous robotic systems on the battlefield.

The People’s Liberation Army Ground Force (PLAGF) recently announced that the Sharp Claw I unmanned ground vehicle (UGV), manufactured by China North Industries Corporation (Norinco), entered service on April 13. This was first reported by China Central Television 7 and was subsequently confirmed by the PLA’s Eastern Theatre Command. Jane’s, the UK-based military news site, was among the first to report the development in the West.

According to Jane’s, Sharp Claw I is a tracked combat and reconnaissance robot weighing 120 kg. (265 lbs.) and measuring 70 cm (28 inches) in length, with an operational range of 1 kilometer (0.6 miles). It can be carried in the cargo bay of the much larger Sharp Claw II UGV, and is designed primarily for use in remote areas unaccessible to human infantry. Sharp Claw II is a 6' x 6' wheeled, unmanned ground vehicle designed to execute combat reconnaissance, patrol, assault and transport duties.

Sharp Claw I is capable of detecting and attacking targets “in all weather conditions during the day and at night,” according to Norinco. It is armed with a light machine gun firing 7.62mm rounds. Norinco says the killer robot can operate autonomously.


First displayed as a prototype in air shows in 2014 and 2018, the operational Sharp Claw I has been fitted with numerous upgrades designed to improve its reconnaissance and killing abilities. These include an improved short-range electro-optical payload, machine vision, lighting suite and a refined magazine box and ammunition feed mechanism.

The Sharp Claw 1 can walk autonomously, or it can be carried in the cabin of a larger "pointed claw 2" transport unmanned combat vehicle. When marching, they will be transported by the "Jianclaw" 2, and when they reach the combat area, they will march down from the back panel placed behind the cab of the Jianclaw 2 wheeled unmanned combat vehicle for combat. Four years later, at the Zhuhai Air Show in 2018, North Company once again demonstrated an upgraded version of the "Jianclaw" 1 unmanned fighter. The new version has many upgrades, including improved short-range photoelectric loads, machine vision and lighting components, and a newly designed remote weapon station. The weapon station uses ammunition boxes to load ammunition, which can improve the continuous firing ability of unmanned combat vehicles.


Unmanned ground systems (UGVs) are a priority in China’s defense plans, but their deployment appeared limited. UGVs encompass numerous vehicles that operate on land with a human operator or autonomously. They can execute military missions including combat, ordnance disposal, and transport. Numerous Chinese civilian and defense companies, universities, and research institutes are developing UGVs and other unmanned ground systems. R&D on intelligent guidance for unmanned ground platforms is reported to receive support from China’s 973 and 863 programs for high-technology development, as well as the Twelfth FYP of the General Armament Department (GAD).

To spur these systems’ development, in 2014 the former GAD hosted the first robot competition, which featured 21 vehicles from over ten research institutes. Teams from NUDT came in first and second place, a team from BIT came in third place, and a team from the PLA’s Military Transportation University came in fourth place.

In September 2016 the Chinese military hosted the “2016 Leap Over Treacherous Paths” contest. The contest hosted five competitions for unmanned ground systems to simulate battle operations in different terrains and missions. The competition areas are rough terrain battlefield reconnaissance, rough terrain battlefield marching in formation, urban battlefield reconnaissance and search, transport in mountainous regions by bionic unmanned platforms, and transport in mountainous regions by non-bionic unmanned platforms.

The “Overcoming Dangers 2016” Ground Unmanned System Challenge took the form of socialized public release. Since its release on June 7, a total of 56 units, 116 platforms (times), and 557 people signed up to participate in the competition. Research institutes, state-owned enterprises, private enterprises and many other fields of research forces signed up to participate.

On the morning of September 6, the preliminary round of the “Overcoming Dangers 2016” Ground Unmanned System Challenge was grandly held in Tahe, Heilongjiang. After review by the expert group, a total of 40 leading units, 44 cooperating units, 73 teams, and 99 vehicles. Equipment participated in the preliminary round of this challenge. Lasted for 8 days, the preliminary round was successfully concluded on September 13, and 22 of the 73 participating teams advanced to the final.

The finals focused on strengthening the leadership of military requirements in the setting of missions and drove the development of unmanned systems related technology. There were three types of competitions, divided into five competition groups, namely: field battlefield missions, urban battlefield reconnaissance and There are three types of competitions, search and mountain transportation, which are divided into five groups according to the tonnage of the participating platforms and the features of functional structure.

After fierce competition, the Lions Intelligent No. 1 fleet of the Military Transportation Academy, the live-fire robot fleet of Inner Mongolia Zhongyi Electric Instrument Automation Company, the Run No. 1 fleet of the China North Vehicle Research Institute, and the Sunward Intelligent Fleet of Sunward Intelligent Equipment Co., Ltd. Champion of each participating project group.

More robot warriors are entering the arsenal of the Chinese military, with the latest additions being a small model that's equipped with a machine gun and a crane-like missile-loading robot, and experts said on Tuesday that robots will free human soldiers from heavy physical work and unnecessary danger.

The Chinese People's Liberation Army (PLA) is in possession of the small ground robot, which can traverse complicated terrains, accurately observe battlefield situations and provide ferocious firepower, the PLA Eastern Theater Command said on Sina Weibo on Monday when reposting a China Central Television (CCTV) report on the robot. In an announcement made on 13 April via its Sina Weibo account the PLA’s Eastern Theatre Command confirmed an 11 April report by the China Central Television 7 (CCTV 7) channel stating that the tracked, combat, and reconnaissance UGV was now in service with the Chinese military.

The thigh-high robot looks like a small assault vehicle. It walks on tracks similar to a tank, allowing it to adapt to complicated terrains in open field combat, move quickly and climb stairs, CCTV reported. Equipped with a machine gun, and observation and detection equipment including night vision devices, the robot can replace a human soldier in dangerous reconnaissance missions, the report said. Target practice results showed the robot has acceptable accuracy, and the use of weapons still requires human control.

This last picture looks like a ripoff of the Boston Dynamics robot, eh?

Well, you all do know that the leading scientists, engineers and designers for Boston Dynamics are all Chinese nationals. And when Trump told them to leave the country, they left and tried to find other work in China. Lucky for them that China is an engineering-friendly and manufacturing-friendly nation.

Some fun links

Anyways, enough of that. Here’s some fun links about robots in China.

Conclusion

Robots are not just science fiction anymore. They left the industrial applications and have entered the realms of consumer appliances, government services, and are providing new avenues and opportunities for the Chinese citizenry.

I wrote this post because I am seeing them slide into my life effortlessly. And now I’ve got a baby robot for my child and health and police robots at my local malls and police stations. It’s become normal.

So what do you suppose is next?

Here’s an army of “attack robots” made in China that are designed to fight in packs and coordinate their movements.

I guess that it is the new “wave of the future”.

And speaking of waves… how about some mechanical sharks. Maybe with death lasers for eyes…

Fearsome life-size ‘bionic machine shark’ robot unveiled at Chinese military tech show. It can be a bomb or can provide intel via sensory system. It can jam radar, communications and mess up sensors. Pretty cool. Especially as it is the size of a baby shark.

Oh, heck.

Forget about ships. How about entire navy of robot craft…

A robotic navy.

And finally

Do you want more?

I have more posts in my China Index here…

China

.

Articles & Links

Master Index

.

You’ll not find any big banners or popups here talking about cookies and privacy notices. There are no ads on this site (aside from the hosting ads – a necessary evil). Functionally and fundamentally, I just don’t make money off of this blog. It is NOT monetized. Finally, I don’t track you because I just don’t care to.

  • You can start reading the articles by going HERE.
  • You can visit the Index Page HERE to explore by article subject.
  • You can also ask the author some questions. You can go HERE to find out how to go about this.
  • You can find out more about the author HERE.
  • If you have concerns or complaints, you can go HERE.
  • If you want to make a donation, you can go HERE.

 

 

..

..

 

Why Vault 7 matters. It’s not about collection of your information, instead it’s about control of your mind.

All the people writing about the intrusive nature of the NSA, and the collection of data through the cell-phones by back-door access has got it all wrong. It’s not about the collection of data. It’s about using your phone to control your mind.

All these “back doors” and secret embedded code within your electronics, your chips, and your cell-phones is not simply about collecting your personal information. That is the obvious purpose, but that is not the ultimate purpose.

The ultimate purpose is to enable the embedding of special algorithms and embedded code that allow the government to manipulate what you see, read and hear. These enormous (and hidden) embedded programs overlay instructions to your mind. They alter the selection of programs that you might want to use, they change the access and ease of access to websites. They alter the type, range and frequency of information on your feeds, and change what you would watch, see and listen to.

Have you ever been on your cell phone, and musing about something... thinking about a memory or an event... and then suddenly you see a link or an article related to a similar type of event?

No. It's not coincidence.

It's intentional. 

You are being subconsciously manipulated to act, think, and behave as part of a herd of humans, that the oligarchy wants to shepherd into certain defined behaviors.

And the revelations by Wiki-leaks in Vault 7 proves this.

Vault 7

Whenever you mention the “power” that the United States has over the serfs citizens living there, you really need to mention “Vault 7”. “Vault 7” proves, beyond all and any shadow of a doubt, that the United States government has complete distain for the Bill of Rights, and everything that it stands for. Americans have no protections.  ZERO. Americans exist at the mercy of their government.

Democrat Senator Feinstein trying to put limits on the the first amendment to the Bill of Rights.
Democrat Senator Feinstein trying to put limits on the the first amendment to the Bill of Rights.

Americans are just monitored cattle. They are monitored by their owners; those handful of Billionaires that fully control the government.

WikiLeaks has published what it claims is the largest-ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of “Vault 7”, a series of leaks on the agency, which have allegedly emerged from the CIA’s Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:

A total of 8,761 documents have been published[v] as part of “Year Zero”. This “Year Zero” is the first in a series of leaks the whistle-blower organization has been dubbed “Vault 7.” WikiLeaks said that “Year Zero” revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Wikileaks released ORG Chart.
Wikileaks released ORG Chart.

Among the more notable disclosures which, if confirmed, “would rock the technology world“, the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in “false flag” cyberattacks which portray Russia as the assailant. Discussing the CIA’s Remote Devices Branch’s UMBRAGE group, Wikileaks’ source notes that it “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”

As Kim Dotcom summarizes this finding,

"CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE"

— Kim Dotcom (@KimDotcom) March 7, 2017

But perhaps what is most notable is the purported emergence of another Snowden-type whistleblower: the source of the information told WikiLeaks in a statement that they wish to initiate a public debate about the “security, creation, use, proliferation and democratic control of cyberweapons.”  Policy questions that should be debated in public include “whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency,” WikiLeaks claims the source said.

The FAQ section of the release, shown later, provides further details on the extent of the leak, which was “obtained recently and covers through 2016”. The time period covered in the latest leak is between the years 2013 and 2016, according to the CIA timestamps on the documents themselves. Secondly, WikiLeaks has asserted that it has not mined the entire leak and has only verified it, asking that journalists and activists do the leg work.

Weeping Angel

Among the various techniques profiled by WikiLeaks is “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As Kim Dotcom chimed in on Twitter,

BREAKING: CIA turns Smart TVs, iPhones, gaming consoles and many other consumer gadgets into open microphones. #Vault7Kim Dotcom (@KimDotcom) March 7, 2017

Dotcom also added that “Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!”

Obama accused Russia of cyberattacks while his CIA turned all internet enabled consumer electronics in Russia into listening devices. Wow!

— Kim Dotcom (@KimDotcom) March 7, 2017

Julian Assange, WikiLeaks editor stated that

“There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Key Highlights

  • “Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
  • Wikileaks claims that the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
  • By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook.
  • The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

CIA targets iPhones, Androids, smart TVs:

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

Take aways…

  • CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
  • The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo“) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools.

Also cars,

  • As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks.
  • The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

This is quite suggestive of the CIA having a role in the death of Michael Hastings.

And computers:

  • The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware.
  • This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Hoarding of Zero Day exploits:

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

Take aways…

  • In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.
  • Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.
  • Please see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”. (Over 500 and counting…)

Proliferation of leaked/hacked Cyberwar programs:

  • While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.
  • Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
  • Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
  • Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

The U.S. Consulate in Frankfurt is a covert CIA hacker base

  • In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.
  • CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover.
  • The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Examples of CIA projects

  • The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.
  • Umbrage: The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation. With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
  • Fine Dining:  Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations.  Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals.
  • ‘Improvise’; a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor).
  • HIVE: HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs.

These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance.

For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM“.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

It’s easy to have the NSA place “digital fingerprints” on their hacking efforts using these tools, and then blame another nation.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Unless maintained, the Bill of Rights becomes useless and superannuated.
Unless maintained, the Bill of Rights becomes useless and superannuated.

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations.

The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

What is an "implant"?

It is the embedded code that instructs your brain what to do and how to behave when you are using electronics technology.

It is the software that has the back of your mind musing about certain things, issues of the day, or getting all emotionally upset about something.

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Conclusion

“You could have all the crazy thoughts you wanted, as long as you smiled and kept them to yourself.”

― Mara Purnhagen, Past Midnight

99.9% of the articles (on the internet and in books) discuss how “unconstitutional” the collection of information, by the NSA, is. They argue (and rightfully so) that the United States government should not be doing this, that it is against the Constitution, the law, the purpose of government, and is a dangerous precedent. Ah. We all get this and understand it.

I argue something a little different.

The reason why the United States wants your reading, watching, listening, and Geo-location information (as well as your passwords, your friends, and your associations) is not so much to track your actions and behaviors. But instead, to be able to feed embedded algorithms into your phone.

These hidden and secretive signals direct your subconscious actions.

They control what you look at, what you listen to, and what you are exposed to.

Thus, they “box you in” to a particular “mind set”. And in so doing, they control you.

And the American PTB (Deep State) Oligarchy leadership are believing that this 2D manipulation of minds will guarantee their successful implementation of change; guarantee that they will remain in power forever, and guarantee that their goals and societal adjustments will occur without any opposition.

But the universe is far more complex than any 2D operation. It’s at a bare minimum, an 11D exercise. And pushing this controlling narratives into the minds of millions of Americans will have , or is having…

… unexpected, or unintended consequences.

It should be no surprise that the United States is now balkanized into violently radical warring factions. All of which are attuned to certain pre-defined narratives. Individual, independent thought no longer exists. You are either “A”, or “B” or “C”. And they have further classified you in to a direct subcategory all for the purposes of your control. “A-4”, or “B-7”.

Vault 7 exposes this.

Now a cursory look at the files might (indeed) give you the impression that it’s just advanced techniques for the collection and gathering of information. I urge the reader to think past that. Any nation that has an intimate knowledge of your “private papers” and “personal privacy” in real time has the ability to control you.

It’s all about control.

The control of what and how you think, by a very powerful government.

And this is why Donald Trump and Mike Pompeo are all up in arms about 5G, and Huawei. It's not that the technology is better, dangerous, or would have "back doors". It is that the stranglehold of the American government control over people would come to an end as less and less people use programs with these embedded algorithms. 

If you want to protect yourself from being manipulated by hidden, invisible and secret manipulations, you need to start using phones, and software developed outside of the United States. Those products that are being “banned from American use” such as Huawei and Xiaomi are almost certainly devoid of NSA malware.

Though, perhaps the best thing might be to just move away from all electronic media and live a far simpler life.

A simpler life.
A simpler life.

Do you want more?

Do you want to see similar posts?

I hope that you found this post curious. Please take care. You can view other similar posts in my SHTF Index, here…

SHTF Articles

Articles & Links

You’ll not find any big banners or popups here talking about cookies and privacy notices. There are no ads on this site (aside from the hosting ads – a necessary evil). Functionally and fundamentally, I just don’t make money off of this blog. It is NOT monetized. Finally, I don’t track you because I just don’t care to.

  • You can start reading the articles by going HERE.
  • You can visit the Index Page HERE to explore by article subject.
  • You can also ask the author some questions. You can go HERE to find out how to go about this.
  • You can find out more about the author HERE.
  • If you have concerns or complaints, you can go HERE.
  • If you want to make a donation, you can go HERE.

Please kindly help me out in this effort. There is a lot of effort that goes into this disclosure. I could use all the financial support that anyone could provide. Thank you.

I have been using 5G for over a year in my home. This is my experience.

My brother, and a number of friends, have been warning me all about the dangers of 5G. They tell me to “stay away” from it, and avoid any technology that might have it. They do so because they earnestly believe that it is dangerous. They know that it is dangerous ever since there was a flood of articles about how dangerous it is.

The articles are convincing. They have great charts, links to impressively worded scientific studies, and stores that tug at my emotions.

An article written on 26 April 2020 titled "5G Technology is Coming – Linked to Cancer, Heart Disease, Diabetes, Alzheimer’s, and Death". Yet, it's been in use in China for nearly three years with ZERO problems.
An article written on 26 April 2020 titled “5G Technology is Coming – Linked to Cancer, Heart Disease, Diabetes, Alzheimer’s, and Death“. Yet, it’s been in use in China for nearly three years with ZERO problems.

The articles talk about cell damage due to radiation. They discuss about how once the cells are damaged, that you can get ill. You can catch diseases, and that you are receptive to such things as cancer, strange and exotic illnesses and even the COVID-19. Yikes!

Nasty stuff for sure.

Except…

Except…

China has been wired for domestic 5G for a couple of years now. It’s NOT coming soon to you and you need to avoid it and stay clear of it. It arrived years ago, been here, been everywhere, and the fear-mongering is three years too late…

…inside of China.

Sorry, but that’s just the way it is.

Like how there was an article in 2019 about how the Chinese were afraid of the implementation of "face recognition" technology. Except that "face recognition" technology was implemented around 2014 and today is considered a mature, and well established technology. 

I guess the point here is that the United States is not leading the world in "cutting edge" technology. It is lagging behind.

So the products and the "innovations" that Americans need to be fearful of are all chimeras. Americans are roughly (right now) approximately 3 to 5 years "behind the ball".

Yes. China is where all of the world’s factories are and where most of the technology development occurs. My 5G Huawei phone is almost two years old, and my Wifi station is a full year and a half old.

And that is the way that it is.

The anti-5G narrative.

Like most of the fear-mongering American media, it only applies to Americans.

When other people, outside of the United States, read the American “news” they end up scratching their head. “WTF?” they ask.

It’s not just China, Europe, Russia and all of Africa. It’s places that Americans consider to be “Third World Shit Holes” like Cambodia and Vietnam…

In Hanoi, Vietnam everyone is using the amazing Huawei 5G phones with amazingly quick speeds and all sorts of abilities and capabilities unheard of in the Untied States. You know like 3D QR purchases, and hologram GPS overlays.
In Hanoi, Vietnam everyone is using the amazing Huawei 5G phones with amazingly quick speeds and all sorts of abilities and capabilities unheard of in the United States. You know like 3D QR purchases, and holographic GPS overlays.

In the United States, 5G is a new, and unobtainable, technology for Americans. It’s a big dark “boogieman” that Americans must fear.

But for China, nah. The first 5G towers domestically are over three years old.

We’ve been using 5G and getting (according to the US media) “dangerously irradiated” for almost three years now…

My theory on why…

So 5G technology came out and started to be disseminated everywhere. It went to China first. Then to Vietnam, Germany, Poland, France, Brazil, and then started to snake into the American markets after the American agencies finished their near-glacial approval process…

The American industry could not compete.

Diversity director being interviewed in how "inclusiveness" and "social realignment" will make their technology company stronger.
Diversity director being interviewed in how “inclusiveness” and “social realignment” will make their technology company stronger.

The 5G technology is so over-the-top better than 4G and it’s predecessors that it is “mind blowing”. It’s like comparing modern CGI animation with 1920’s black and white cartoons. Fast is only part of the story. The first time I turned on my phone, I was actually startled in how fast it turned on and how blazingly quick it worked.

The American industry could not compete.

Over the last decade they laid off American engineers, outsourced to India, and China, and contracted work to China. Meanwhile they spent enormous amount of time, resources and expenditures on “Diversity Directors” and social engineering causes.

Now, do not misunderstand.

It’s not that I do not think that “fairness”, and “corporate responsibility” and the “environment” are not important. They are. Very much so. I believe that we all need to step up to the plate and work together to make the world a far better place to live in.

However…

The point that I am making is that the emphasis on what a company does, it’s “bottom line” and the salaries and the work force do not reflect a healthy working and corporate environment in America. Instead other considerations have taken over. While I use the social re-engingineering as an example, it actually consists of an entire litany of ills. From shareholder desires to human resource policies.

Consider…

  • The salaries of one “Diversity Director” at any of the companies above is around $450,000 / year.
  • The salary for a design engineer is around $50,000 / year.

My argument is that instead of hiring five design engineers to develop 5G technology, the America companies opted, instead to hire social re-engineers. This resulted in a slew of meetings, training, and policies for social justice. While other nations, and other companies, focused on improving their products, their services and their manufacturing.

Instead.

American technology is losing ground and is being eclipsed by hard-working intelligent competitors that reward merit and hard work with wads of cash. Meanwhile American industry clutches on fads, and social restructuring in the belief that their monopolies will always stay intact.
American technology is losing ground and is being eclipsed by hard-working intelligent competitors that reward merit and hard work with wads of cash. Meanwhile American industry clutches on fads, and social restructuring in the belief that their monopolies will always stay intact.

Now, with that understood…

The anti-5G cabal

The anti-5G narrative only came into being when Huawei completely eclipsed their American counterparts in technology leadership, and their CEO’s came to Trump and begged for his help.

It did not materialize in a manner associated with scientific concern or distress. It came about precisely when the political scene narrated an anti-Huawei, and thus anti-5G stance.

The American industry, lead by Cisco approached the Trump administration, latched on his “Make America Great Again”, anti-China screed, and demanded for action. Their arguments were valid. They donated millions to the Republican and Trump campaigns, and now they needed government help and action.

They genuflected in front of Trump. Kissed his signet ring and placed accolades at the feet of John Bolton and Mike Pompeo. And then…

…lo and behold, it suddenly became a “national security issue”.

The flood of articles came immediately hard and fast, once President trump declared war on Huawei.

One wonders why America ends up with Trump as president. Trump is just a symptom. He is not the only one doing the non-stop and endless lying. America is an empire of lies and its leader is the emperor of lies. One shouldn't be surprised.

All this talk about US-China conflict is just wishful thinking. All China needs to do is ignore the lying liars and go its own way. America will self immolate. A people so delusional with its own lies will wake up one day to notice that reality and viruses do not care. Nature abhors a moron; it most certainly abhors a moronic and delusional nation. 

There is no news in truth and no truth in news.

-Peter Man

When I point this fact out, they retort, well the President is (after all) looking out for people. He wants to protect them. You know, from the evil dark communists that want to take over the world. We know this, because Trump told us so.

Well. Personally, I think it’s more an economic issue rather than a health issue.

You know, like how GM bought up all the trolley cars in Los Angles, or the way that GM rode Preston Tucker out of business. It’s an American norm. If your company has a monopoly you use everything in your power to crush the opposition.

GM bought up all the streetcars in Los Angles and then sold their buses to a captive market.
GM bought up all the streetcars in Los Angles and then sold their buses to a captive market.

So…

An American company is being eclipsed by a Chinese company that spent money on scientists and engineers. While the American company spent money on social engineering programs, diversity, and diversity officers (all very, very well paid for, of course).

This is the result.

The result of all this.

Well, all these events have created a very interesting situation.

  • People in Vietnam have access to 5G, and Americans do not.
  • People in Burma, Cambodia, and Japan have access to 5G. Americans do not.
  • People in China, Russia and Poland have access to state-of-the-art 5G technology. Americans do not.

Don’t you think that there is something wrong about this picture?

But, you know, Americans are just fine and dandy with that. You see, 5G is bad. It is terrible. It’s evil communist technology. Not the pure, free and wonderful “democratic technology” constructed through “American exceptionalism”, don’t you know. Just google it. It’s outrageous.

So Americans can live without that terrible, icky, nasty technology.

How do I know?

I’ve been using 5G phones and a base station in my house for years now.

I have a 5G router in my living room, and another on the nightstand beside my bed. (You see, the 5G technology cannot penetrate walls that well. You need to have multiple wifi stations to use it effectively.)

My two year old, 5G router inside my living room. Sorry for the dust.
My two year old, 5G router inside my living room. The normal 2.4G is the low flat rectangular box to the right, and the 5G is the big white cube to the left. Sorry for the dust.

Now I am not sick, I haven’t been sick and none of the problems that all those articles profess that should happen to me are no where to be found.

Now the reader should not be confused.

Just because the radiation has not affected me, my family, those around me, the city that I live in, or my nearby business associates, does not mean that the American narrative is a fiction. It could be that we are all the exception rather than the rule.

Perhaps.

I've been using 5G for a while now, and I don't see anything wrong.
I’ve been using 5G for a while now, and I don’t see anything wrong.

Tab soda drink

I well remember the 1970’s. My father was trying to keep his weight down, and so he switched from drinking Coke-cola to “Tab”.

He would go to the local “beer distributor” and pick up cases of the stuff. And he ended up guzzling that soda just like it was water.

In a world filled with sugary drinks, the Tab product was one of the first to offer a non-sugar beverage.
In a world filled with sugary drinks, the Tab product was one of the first to offer a non-sugar beverage.

Tab was similar to Coke except that it didn’t use sugar.

Tab is a diet cola soft drink created and produced by The Coca-Cola Company, introduced in 1963. Coca-Cola's first diet drink, Tab was notably popular throughout the 1960s and 1970s, and several variations were made, including a number of fruit-flavored, root beer, and ginger ale versions. Caffeine-free and clear variations were released in the late-1980s and early-1990s.

-Wikipedia

And it really started to take a big bite into the Pepsi-cola franchise. They started to lose money, and their competitor (the one who manufactured Tab) started to gobble up Pepsi market-share.

So what do you think happened?

Suddenly sugar-fee substitutes were "dangerous" and had to be banned. Otherwise people would get brain damage and cancer!
Suddenly sugar-fee substitutes were “dangerous” and had to be banned. Otherwise people would get brain damage and cancer!

That’s right!

All of a sudden, studies “proved” that the sugar substitute in Tab was dangerous. As I recall, lab mice started to die.

Of course, it came out later that they were given near-lethal does of sugar-substitute to begin with. I think it was an equivalent to a human ingesting a 50lb sack of chemicals every day until they died. It was pretty gosh-darn horrific, I’ll tell you what.

The studies proved that mice feed enormous doses of sugar substitute got fat and died.
The studies proved that mice feed enormous doses of sugar substitute got fat, ended up with cancer and died.

Anyways, this is all “ancient” history. Those that have a monopoly do everything in their power to keep and hold market-share. This was true of GM, Coke-cola, and is very true with Microsoft and Cisco.

So I am not at all surprised that they decided to create an exclusive market for their products.

You WILL use American made cell-phones! You will use what ever technology we say, and we will make it a law to punish you if you refuse!

Just like how the American military-industrial market has forced the DoD to purchase inadequate, outdated, and very expensive products with questionable utility and dangerous application.

The problem is, it’s only a short-lived phenomenon.

Soon, they will lose ground in the market unless they develop innovation, product design and development. But that is not what I am seeing. Instead, I am seeing more of the “same oh, same oh”. With no real aggressive technical efforts.

Conclusion

I use 5G technology. I haven’t had any problems with it. I like it’s speed and the amazing things that it can do. It is revolutionizing technology outside of America and while the rest of the world are advancing in leaps and bounds, the United States is hunkering down and entrenching.

If this keeps up, the prognosis will not be good for America and Americans.


I hope that you enjoyed this post. I have more in my Trump Trade War Index. You can access it through this little green button.

Trump Trade War

Articles & Links

You’ll not find any big banners or popups here talking about cookies and privacy notices. There are no ads on this site (aside from the hosting ads – a necessary evil). Functionally and fundamentally, I just don’t make money off of this blog. It is NOT monetized. Finally, I don’t track you because I just don’t care to.

To go to the MAIN Index;

Master Index

.

  • You can start reading the articles by going HERE.
  • You can visit the Index Page HERE to explore by article subject.
  • You can also ask the author some questions. You can go HERE .
  • You can find out more about the author HERE.
  • If you have concerns or complaints, you can go HERE.
  • If you want to make a donation, you can go HERE.

Please kindly help me out in this effort. There is a lot of effort that goes into this disclosure. I could use all the financial support that anyone could provide. Thank you very much.

[wp_paypal_payment]