Sunday, February 27, 2022

Google Censors America's Frontline Doctors

By Tim Gamble

Google has decided to remove the website of America's Frontline Doctors (AFLDS) from its search results, according to a Twitter post made on Saturday by Dr. Simone Gold, founder of America's Frontline Doctors. Her initial post on the subject read:
WOW: @Google sent notice stating they will be removing the America’s Frontline Doctors website from search results. 

We are a team of medical doctors who dared to speak the truth. 

And we have been proven right, again and again, and again.

In a follow-up post, Dr. Gold went on to state:
This is how they censor and silence (bully and threaten) anyone who refuses to parrot their corporate narrative.

They will lie about you and manipulate data just to shut you down. That’s how scared Big Pharma is of being exposed. 

Google should be ashamed—and held accountable.
The notice from Google, received yesterday, did not state when the website would be removed from Goggle search results, just that it will be. As of 10AM this morning, the website was still available through Google search. 

Google's notice cited their medical content policy that does not allow websites with any content "that contradicts or runs contrary to scientific or medical consensus."  The notice did not say how Google determines scientific or medical consensus, nor did it acknowledge that the AFLDS website is founded and maintained by medical doctors. 

America's Frontline Doctor's (website: https://aflds.org/ or alternately: 
https://americasfrontlinedoctors.org/ ) is a medical civil rights organization for the expressed purpose of providing "medical and legal resources to defend your freedom." It was founded by and is comprised of a team of medical doctors. 

When I posted on Gettr (follow me: https://gettr.com/user/timgamble ) and Gab (follow me: https://gab.com/TimGamble ) about Google's censorship action against AFLDS, the story immediately drew much interest, with over 350 interactions (likes, reposts, comments) and counting. All of the comments were supportive of AFLDS, and many users suggested alternatives to Google search that do not practice political censorship. 

The delisting of AFLDS from Google search is only the latest in a long line of decisions by Google punishing through censorship websites and individuals who hold views contrary those held by Google.

Suggested alternatives to Google search:
Many commentors also suggest using the Brave browser as a good alternative to Google Chrome. I personally use Brave as my main Browser, and Brave search as my main search engine. I also occasionally use Qwant and DuckDuckGo. 
----------------

Join the Resistance, Subscribe to Tim Gamble by clicking here and by following me on social media (see list near top of right-hand column of this website).  

Monday, February 21, 2022

What Is the Great Reset?

 Credit Line: "Reprinted by permission from Imprimis, a publication of Hillsdale College."

This article is from the December 2021 issue of Imprimis. Get your FREE print subscription to Imprimis now! (click link to go to the Imprimis subscription webpage). 

What Is the Great Reset?

By Michael Rectenwald
Chief Academic Officer, American Scholars

Michael Rectenwald is the chief academic officer for American Scholars. He has a B.A. from the University of Pittsburgh, an M.A. from Case Western Reserve University, and a Ph.D. in Literary and Cultural Studies from Carnegie Mellon University. He has taught at New York University, Duke University, North Carolina Central University, Carnegie Mellon University, and Case Western Reserve University. He is the author of numerous books, including Nineteenth-Century British Secularism: Science, Religion, and LiteratureGoogle ArchipelagoBeyond Woke; and Thought Criminal.
----------------------

The following is adapted from a talk delivered at Hillsdale College on November 7, 2021, during a Center for Constructive Alternatives conference on “The Great Reset.”

Is the Great Reset a conspiracy theory imagining a vast left-wing plot to establish a totalitarian one-world government? No. Despite the fact that some people may have spun conspiracy theories based on it—with some reason, as we will see—the Great Reset is real.

Indeed, just last year, Klaus Schwab, founder and executive chairman of the World Economic Forum (WEF)—a famous organization made up of the world’s political, economic, and cultural elites that meets annually in Davos, Switzerland—and Thierry Malleret, co-founder and main author of the Monthly Barometer, published a book called COVID-19: The Great Reset. In the book, they define the Great Reset as a means of addressing the “weaknesses of capitalism” that were purportedly exposed by the COVID pandemic.

But the idea of the Great Reset goes back much further. It can be traced at least as far back as the inception of the WEF, originally founded as the European Management Forum, in 1971. In that same year, Schwab, an engineer and economist by training, published his first book, Modern Enterprise Management in Mechanical Engineering. It was in this book that Schwab first introduced the concept he would later call “stakeholder capitalism,” arguing “that the management of a modern enterprise must serve not only shareholders but all stakeholders to achieve long-term growth and prosperity.” Schwab and the WEF have promoted the idea of stakeholder capitalism ever since. They can take credit for the stakeholder and public-private partnership rhetoric and policies embraced by governments, corporations, non-governmental organizations, and international governance bodies worldwide.

The specific phrase “Great Reset” came into general circulation over a decade ago, with the publication of a 2010 book, The Great Reset, by American urban studies scholar Richard Florida. Written in the aftermath of the 2008 financial crisis, Florida’s book argued that the 2008 economic crash was the latest in a series of Great Resets—including the Long Depression of the 1870s and the Great Depression of the 1930s—which he defined as periods of paradigm-shifting systemic innovation.

Four years after Florida’s book was published, at the 2014 annual meeting of the WEF, Schwab declared: “What we want to do in Davos this year . . . is to push the reset button”—and subsequently the image of a reset button would appear on the WEF’s website.

In 2018 and 2019, the WEF organized two events that became the primary inspiration for the current Great Reset project—and also, for obvious reasons, fresh fodder for conspiracy theorists. (Don’t blame me for the latter—all I’m doing is relating the historical facts.)

In May 2018, the WEF collaborated with the Johns Hopkins Center for Health Security to conduct “CLADE X,” a simulation of a national pandemic response. Specifically, the exercise simulated the outbreak of a novel strain of a human parainfluenza virus, with genetic elements of the Nipah virus, called CLADE X. The simulation ended with a news report stating that in the face of CLADE X, without effective vaccines, “experts tell us that we could eventually see 30 to 40 million deaths in the U.S. and more than 900 million around the world—twelve percent of the global population.” Clearly, preparation for a global pandemic was in order.

In October 2019, the WEF collaborated with Johns Hopkins and the Bill and Melinda Gates Foundation on another pandemic exercise, “Event 201,” which simulated an international response to the outbreak of a novel coronavirus. This was two months before the COVID outbreak in China became news and five months before the World Health Organization declared it a pandemic, and it closely resembled the future COVID scenario, including incorporating the idea of asymptomatic spread. 

The CLADE X and Event 201 simulations anticipated almost every eventuality of the actual COVID crisis, most notably the responses by governments, health agencies, the media, tech companies, and elements of the public. The responses and their effects included worldwide lockdowns, the collapse of businesses and industries, the adoption of biometric surveillance technologies, an emphasis on social media censorship to combat “misinformation,” the flooding of social and legacy media with “authoritative sources,” widespread riots, and mass unemployment. 

In addition to being promoted as a response to COVID, the Great Reset is promoted as a response to climate change. In 2017, the WEF published a paper entitled, “We Need to Reset the Global Operating System to Achieve the [United Nations Sustainable Development Goals].” On June 13, 2019, the WEF signed a Memorandum of Understanding with the United Nations to form a partnership to advance the “UN 2030 Agenda for Sustainable Development.” Shortly after that, the WEF published the “United Nations-World Economic Forum Strategic Partnership Framework for the 2030 Agenda,” promising to help finance the UN’s climate change agenda and committing the WEF to help the UN “meet the needs of the Fourth Industrial Revolution,” including providing assets and expertise for “digital governance.”

In June 2020, at its 50th annual meeting, the WEF announced the Great Reset’s official launch, and a month later Schwab and Malleret published their book on COVID and the Great Reset. The book declared that COVID represents an “opportunity [that] can be seized”; that “we should take advantage of this unprecedented opportunity to reimagine our world”; that “the moment must be seized to take advantage of this unique window of opportunity”; and that “[f]or those fortunate enough to find themselves in industries ‘naturally’ resilient to the pandemic”—think here of Big Tech companies like Apple, Google, Facebook, and Amazon—“the crisis was not only more bearable, but even a source of profitable opportunities at a time of distress for the majority.” 

The Great Reset aims to usher in a bewildering economic amalgam—Schwab’s stakeholder capitalism—which I have called “corporate socialism” and Italian philosopher Giorgio Agamben has called “communist capitalism.” 

In brief, stakeholder capitalism involves the behavioral modification of corporations to benefit not shareholders, but stakeholders—individuals and groups that stand to benefit or lose from corporate behavior. Stakeholder capitalism requires not only corporate responses to pandemics and ecological issues such as climate change, “but also rethinking  [corporations’] commitments to already-vulnerable communities within their ecosystems.” This is the “social justice” aspect of the Great Reset. To comply with that, governments, banks, and asset managers use the Environmental, Social, and Governance (ESG) index to squeeze non-woke corporations and businesses out of the market. The ESG index is essentially a social credit score that is used to drive ownership and control of production away from the non-woke or non-compliant. 

One of the WEF’s many powerful “strategic partners,” BlackRock, Inc., the world’s largest asset manager, is solidly behind the stakeholder model. In a 2021 letter to CEOs, BlackRock CEO Larry Fink declared that “climate risk is investment risk,” and “the creation of sustainable index investments has enabled a massive acceleration of capital towards companies better prepared to address climate risk.” The COVID pandemic, Fink wrote, accelerated the flow of funds toward sustainable investments:

We have long believed that our clients, as shareholders in your company, will benefit if you can create enduring, sustainable value for all of your stakeholders. . . . As more and more investors choose to tilt their investments towards sustainability-focused companies, the tectonic shift we are seeing will accelerate further. And because this will have such a dramatic impact on how capital is allocated, every management team and board will need to consider how this will impact their company’s stock.

Fink’s letter is more than a report to CEOs. It is an implicit threat: be woke or else.

In their recent book on the Great Reset, Schwab and Malleret pit “stakeholder capitalism” against “neoliberalism,” defining the latter as “a corpus of ideas and policies . . . favouring competition over solidarity, creative destruction over government intervention, and economic growth over social welfare.” In other words, “neoliberalism” refers to the free enterprise system. In opposing that system, stakeholder capitalism entails corporate cooperation with the state and vastly increased government intervention in the economy.

Proponents of the Great Reset hold “neoliberalism” responsible for our economic woes. But in truth, the governmental favoring of industries and players within industries—what used to be known as corporatism or economic fascism—has been the real source of what Schwab and his allies at the WEF decry. 

While approved corporations are not necessarily monopolies, the tendency of the Great Reset is toward monopolization—vesting as much control over production and distribution in as few favored corporations as possible, while eliminating industries and producers deemed non-essential or inimical. To bring this reset about, Schwab writes, “[e]very country, from the United States to China, must participate, and every industry, from oil and gas to tech, must be transformed.”

Another way of describing the goal of the Great Reset is “capitalism with Chinese characteristics”—a two-tiered economy, with profitable monopolies and the state on top and socialism for the majority below. 

Several decades ago, as China’s growing reliance on the for-profit sectors of its economy could no longer be credibly denied by the Chinese Communist Party (CCP), its leadership approved the slogan “socialism with Chinese characteristics” to describe its economic system. Formulated by Deng Xiaoping, the phrase was meant to rationalize the CCP’s allowance of for-profit development under a socialist political system. The CCP considered the privatization of the Chinese economy to be a temporary phase—lasting as long as 100 years if necessary—on the way to a communist society. Party leaders maintain that this approach has been necessary in China because socialism was introduced too early there, when China was a backward agrarian country. China needed a capitalist booster shot.

Stripped of its socialist ideological pretensions, the Chinese system amounts to a socialist or communist state increasingly funded by capitalist economic development. The difference between the former Soviet Union and contemporary China is that when it became obvious that a socialist economy had failed, the former gave up its socialist economic pretenses, while the latter has not.

The Great Reset represents the development of the Chinese system in the West, but in reverse. Whereas the Chinese political class began with a socialist political system and then introduced privately held for-profit production, the West began with capitalism and is now implementing a Chinese-style political system. This Chinese-style system includes vastly increased state intervention in the economy, on the one hand, and on the other, the kind of authoritarian measures that the Chinese government uses to control its population.

Schwab and Malleret write that if “the past five centuries in Europe and America” have taught us anything, it is that “acute crises contribute to boosting the power of the state. It’s always been the case and there is no reason it should be different with the COVID-19 pandemic.”

The draconian lockdown measures employed by Western governments managed to accomplish goals of which corporate socialists in the WEF could only dream—above all, the destruction of small businesses, eliminating competitors for corporate monopolists favored by the state. In the U.S. alone, according to the Foundation for Economic Education, millions of small businesses closed their doors due to the lockdowns. Yelp data indicates that 60 percent of those closures are now permanent. Meanwhile companies like Amazon, Apple, Facebook, and Google enjoyed record gains. 

Other developments that advance the Great Reset agenda have included unfettered immigration, travel restrictions for otherwise legal border crossing, the Federal Reserve’s unrestrained printing of money and the subsequent inflation, increased taxation, increased dependence on the state, broken supply chains, the restrictions and job losses due to vaccine mandates, and the prospect of personal carbon allowances. 

Such policies reflect the “fairness” aspect of the Great Reset—fairness requires lowering the economic status of people in wealthier nations like the U.S. relative to that of people in poorer regions of the world. One of the functions of woke ideology is to make the majority in developed countries feel guilty about their wealth, which the elites aim to reset downwards—except, one notices, for the elites themselves, who need to be rich in order to fly in their private jets to Davos each year. 

The Great Reset’s corporate stakeholder model overlaps with its governance and geopolitical model: states and favored corporations are combined in public-private partnerships and together have control of governance. This corporate-state hybrid is largely unaccountable to the constituents of national governments. 

Governance is not only increasingly privatized, but also and more importantly, corporations are deputized as major additions to governments and intergovernmental bodies. The state is thereby extended, enhanced, and augmented by the addition of enormous corporate assets. As such, corporations become what I have called “governmentalities”—otherwise private organizations wielded as state apparatuses, with no obligation to answer to pesky voters. Since these corporations are multinational, the state essentially becomes globalist, whether or not a one-world government is ever formalized.

As if the economic and governmental resets were not dramatic enough, the technological reset reads like a dystopian science fiction novel. It is based on the Fourth Industrial Revolution—or 4-IR for short. The first, second, and third industrial revolutions were the mechanical, electrical, and digital revolutions. The 4-IR marks the convergence of existing and emerging fields, including Big Data, artificial intelligence, machine learning, quantum computing, genetics, nanotechnology, and robotics. The foreseen result will be the merging of the physical, digital, and biological worlds, which presents a challenge to the ontologies by which we understand ourselves and the world, including the definition of a human being.

There is nothing original about this. Transhumanists and Singularitarians (prophets of technological singularity) such as Ray Kurzweil forecasted these and other revolutionary developments long ago. What’s different about the globalists’ vision of 4-IR is the attempt to harness it to the ends of the Great Reset.

If already existing 4-IR developments are any indication of the future, then the claim that it will contribute to human happiness is false. These developments include Internet algorithms that feed users prescribed news and advertisements and downrank or exclude banned content; algorithms that censor social media content and consign “dangerous” individuals and organizations to digital gulags; “keyword warrants” based on search engine inputs; apps that track and trace COVID violations and report offenders to the police; robot police with scanners to identify and round up the unvaccinated and other dissidents; and smart cities where residents are digital entities to be monitored, surveilled, and recorded, and where data on their every move is collected, collated, stored, and attached to a digital identity and a social credit score. 

In short, 4-IR technologies subject human beings to a kind of technological management that makes surveillance by the NSA look like child’s play. Schwab goes so far as to cheer developments that aim to connect human brains directly to the cloud for the sake of “data mining” our thoughts and memories. If successful, this would constitute a technological mastery over decision-making that would threaten human autonomy and undermine free will. 

The 4-IR seeks to accelerate the merging of humans and machines, resulting in a world in which all information, including genetic information, is shared, and every action, thought, and motivation is known, predicted, and possibly precluded. Unless taken out of the hands of corporate-socialist technocrats, the 4-IR will eventually lead to a virtual and inescapable prison of body and mind.

In terms of the social order, the Great Reset promises inclusion in a shared destiny. But the subordination of so-called “netizens” implies economic and political disenfranchisement, a hyper-vigilance over self and others, and social isolation—or what Hannah Arendt called “organized loneliness”—on a global scale. This organized loneliness is already manifest in lockdowns, masking, social distancing, and the social exclusion of the unvaccinated. The title of the Ad Council’s March 2020 public service announcement—“Alone Together”—perfectly captures this sense of organized loneliness.

In my recent book, Google Archipelago, I argued that leftist authoritarianism is the political ideology and modus operandi of what I call Big Digital, which is on the leading edge of a nascent world system. Big Digital is the communications, ideological, and technological arm of an emerging corporate-socialist totalitarianism. The Great Reset is the name that has since been given to the project of establishing this world system.

Just as Schwab and the WEF predicted, the COVID crisis has accelerated the Great Reset. Monopolistic corporations have consolidated their grip on the economy from above, while socialism continues to advance for the rest of us below. In partnership with Big Digital, Big Pharma, the mainstream media, national and international health agencies, and compliant populations, hitherto democratic Western states—think especially of Australia, New Zealand, and Austria—are being transformed into totalitarian regimes modeled after China.

But let me end on a note of hope. Because the goals of the Great Reset depend on the obliteration not only of free markets, but of individual liberty and free will, it is, perhaps ironically, unsustainable. Like earlier attempts at totalitarianism, the Great Reset is doomed to ultimate failure. That doesn’t mean, however, that it won’t, again like those earlier attempts, leave a lot of destruction in its wake­—which is all the more reason to oppose it now and with all our might. 

Credit Line: "Reprinted by permission from Imprimis, a publication of Hillsdale College."

Wednesday, February 16, 2022

New Revelations on Clinton Campaign Spying on the Trump White House

Judicial Watch: Records Reveal Tech Operatives Allegedly Used by Hillary Clinton Campaign to Spy on Trump WH Had Contract with Defense Advanced Research Projects Agency (DARPA)

Feb. 16, 2022 (Washington, DC) – Judicial Watch announced today that it received 127 pages of records from the Georgia Institute of Technology of communications among four individuals. These records reveal that the individuals, who are mentioned in the Durham probe indictment of Michael Sussmann, worked with the Defense Advanced Research Projects Agency (DARPA) from 2016-2021. The documents also suggest the group was interested in targeting then-Trump campaign adviser Steve Bannon. 

Judicial Watch obtained the records through an October 13, 2021, Georgia Open Records Act request for records of communication among Rodney Joffe, April Lorenzen, David Dagon, and Manos Antonakakis.

According to The New York Times:

"Mr. Durham used a 27-page indictment to lay out a far more expansive tale, one in which four computer scientists who were not charged in the case ‘exploited’ their access to internet data to develop an explosive theory about cyberconnections in 2016 between Donald J. Trump’s company and a Kremlin-linked bank — a theory, he insinuated, they did not really believe."

The indictment’s “Originator-1” is April Lorenzen, chief data scientist at the information services firm Zetalytics. Her lawyer, Michael J. Connolly, said she has “dedicated her life to the critical work of thwarting dangerous cyberattacks on our country,” adding: “Any suggestion that she engaged in wrongdoing is unequivocally false.” 

The indictment’s “Researcher-1” is another computer scientist at Georgia Tech, Manos Antonakakis. “Researcher-2” is Mr. Dagon. And “Tech Executive-1” is Mr. Joffe, who in 2013 received the F.B.I. Director’s Award for helping crack a cybercrime case, and retired this month from Neustar, another information services company. 

In a court filing last week, Durham alleged this operation directly spied on Trump tower, Trump’s home, and the Trump White House by exploiting “access to non-public and/or proprietary Internet data.”

The anti-Trump operation used the “assistance of researchers at a U.S.-based university who were receiving and analyzing large amounts of Internet data in connection with a pending federal government cybersecurity research contract.” 

On November 18, 2016, a redacted email address writes on “behalf of Manos Antonakakis” to two Georgia Tech officials in an email titled “Signed DARPA Contract:”

Hey Ashley,

Please send to Michael the signed contract for their records.

Thanks,

Manos

On November 21, 2016, Ashley Williams, a Georgia Tech contracting officer, replies:

Good morning!!

Attached is a copy of the new award for your records. Please note the contract is subject to publication restrictions identified in the DD 254. I’m actively working with AFRL [likely Air Force Research Laboratory] to revise the DD 254 to clarify that fundamental research is excluded from the publication restrictions. Although we’ve signed the contract award and I have to defer project initiation until the publication restrictions are resolved by the AFRL sponsor.

Let me know if you have any questions.

On August 2, 2016, Antonakakis writes to Danielle Gambino and Keromytis, Angelos, a DARPA employee:

The subs and I, would like to have the permission to begin spending against the project from August 15th. This is the date when students needs to be hired [as graduate research assistants], so we can execute against the goals we have set in the [statement of work] this year.

UNC, GT and UGA would require an acknowledgment from you (or DARPA) that we are allowed to do that. I guess, once we are done negotiating the contract we will have to have as an effective start date the August 15th. If we cannot do that, it appears that it will complicate things for all three schools, as we cannot immediately hire the students necessary that will execute against the set milestones.

Please let me know how you think we should resolve this issue.

At 2:55 p.m. Angelos replies, “I’m ok with that, but I seriously doubt the contracting officer will agree.”

At 3:16 p.m. Gambino also replies:

As usual, Angelos is correct!

Working with contracting to authorize pre-award work can take a while and typically is not allowed until closer to contract award. Although I certainly appreciate your eagerness to start working, we are at the very start of the contracting process – this is really way too early for this type of request. (The contract specialists haven’t even been assigned yet.)

Please don’t hesitate to reach out to me with any other questions.

On January 9, 2017, a DARPA employee, Kelly McLaughlin, follows up with Antonakakis. She writes:

Manos,

DARPA put $153,138 on the Georgia Tech Transparent Computing (TC) contract back in October, 2016 to cover the costs proposed in the attached SOW. The SOW asked for 0.83 month of your academic salary, salary for one Research Engineer, David Dagon, and funds for four graduate student research assistants. Were the proposed grad student costs supposed to cover UNC grad students or Georgia Tech grad students? The SOW shows them as Georgia Tech students.

Please let me know if these funds were supposed to cover UNC. If so, the TC BFM, Laurisa Goergen, will reach out to the TC admin POC for Georgia Tech to see what, if anything, can be done at this point.

Please let me know if you have any questions.

Emails indicate that Neustar employees may have visited Georgia Tech to collaborate with Antonakakis. On May 27, 2016, Atreya Mohan from Neustar writes in an email with the subject line “Introducing Peter Burke:” 

Hello Manos

Just wanted to introduce you to Peter (our SVP Engg and Operations). 

Peter. We contact Manos on his gmail account for consulting purposes and his Georgia Tech email address for interactions that relate with the university (example: sponsorship etc)”

Burke replies:

Hi Manos, 

It was great to meet you today – it is very interesting work that you do and I see great opportunities to collaborate with you. 

I would like to try to figure out a time to come and spend more time with so that you can continue my education :-)

I am guessing you are based in Atlanta?

 Antonakakis writes that evening:

 Hey Mohan,

Many thanks for the intro. Peter, the pleasure was all mine!

Yes, you should come and visit us. I would suggest sometime in September, when the semester starts and my students are back from their internships in the bay area. You are more than welcome to visit sooner, but it will be just me and my three postdocs. 

The Neustar team is always welcome to visit my lab. Anytime you, Rodney, Brian or anyone else want to visit.

Antonakakis responds to this chain again on July 14, 2016, writing: 

Gentlemen,

By now all of you should be aware of the great news from DARPA. We have a 5 year long collaboration ahead of us, so I think it would make sense for the Neustar team to visit Atlanta and my lab.

How is the week of August 15 looks like for you? Mine is completely open. Perhaps, we should schedule the visit then?

In an email to Antonakakis on January 29, 2017, Dagon writes:

The Russians are killing spies with knowledge of the dossier materials:

http://www.inquisitr.com/3930099/former-kgb-chief-who-allegedly-helped-to-compile-golden-shower-dossier-on-donald-trump-found-dead/

Oh, and Trump purged the National Security Council (removing General Dunford) and put Steve Bannon (his PR guy) on the NSC:

http://www.politico.com/story/2017/01/mccain-bannon-nsc-234329

My guess: The purged NSC will now say that Russia has given us great intel on ISIS, and that we should lift sanctions now that Russia is helping. (The public will have no way to judget [sic] this.)

All this to protect Trump from the dossier materials.

Antonakakis replies the same day, “What the [f*ck] is going on? Can you please explain why GOP is not doing something?” 

He then writes again a few minutes later:

Some in the GOP knows what’s up (Graham, McCain), but most are all too happy to have their narrow, specific agendas advanced (e.g., removing social security, ACA/Obama-care repeal, more tax cuts for companies, etc.) They put party ahead of country, in short.

In 2018 the Senate (and maybe the House) may flip, and there will then be real investigations (but again, party will be ahead of country, as Democrats look into corruption for narrow purposes).

Now that the Russians are killing people with knowledge of the dossier, we can hope for a defector who gets to a non-US embassy in Moscow.

An August 25, 2016, email from Joffe to Antonakakis, Dagon and Lorenzen indicates a possible interest in investigating Steve Bannon. The subject line is “To be added….” Joffe writes: “They think he may have some baggage… ;-)” A link to a Washington Post opinion piece is included. 

“Was the Defense Department’s DARPA funding information misused by the Clinton campaign to spy on the Trump White House?” asked Judicial Watch President Tom Fitton. “The emails highlight that the ‘tech’ experts implicated in the Durham indictment were very much interested in the fake dossier used to smear President Trump.”

----------------

Join the Resistance, Subscribe to Tim Gamble by clicking here and by following me on social media (see list near top of right-hand column of this website).  

3 Things To Do Today To Protect Yourself In The Digital Age

This article was originally published on Dystopian Survival on December 29, 2021.

By Tim Gamble

As 2021 draws to a close, now is the perfect time to do three things to help protect yourself and your family in this digital age. I did all three on Monday.

1) Change your passwords. There were six major data breaches this year, and hundreds of smaller ones. Millions of people had their personal information, including passwords and pin numbers, exposed. This stolen personal information is now for sale on the Internet (yes, there are websites that actually sell stolen data to the bad guys). One of the best ways to protect yourself is to change all your passwords on a regular basis. It is a hassle, but having a bad guy get access to your bank account, for example, will be much more of a hassle.   

I changed all my passwords on Monday - email accounts, social media accounts, bank accounts, car insurance, cell phone provider, PayPal, Amazon, Google, and so forth. It was a long list and took some time, but my safety and privacy is worth it.

Don't forget to change the password for your home Wi-Fi.

2) Add two-factor authentication (also called two-step authentication) to your accounts if available. Yep, it seems like a hassle to go through that extra step every time you log on to an account, but it is no where near as big a hassle as a bad guy getting into your account. 

There are several ways websites can handle two-factor authentication. You can set it up at the same time you change your password, and probably from the same page. Each website will walk you through the set-up process for their site. It really isn't hard. 

I was reluctant to use two-factor authentication because of the perceived hassle, but on Monday I finally added it to my bank accounts, PayPal account, and other accounts which store my financial information, including card numbers. So far it hasn't been as big a hassle as I imagined. Better safe than sorry.

3) Use the lock screen for your phone and other mobile devices. Lock screens use various methods - pin  numbers, passwords, fingerprint or facial recognition - to make sure that you are the only one with access to your device. No one thinks they will ever misplace, lose, or have their phone stolen, but it happens all the time. Think about how much personal data is stored on your phone, and how many apps on it have access to your accounts. All this information is freely available to any bad guy that gets ahold of your device if you don't use a lock screen. 

Once again, I was reluctant to use my lock screen because of the perceived hassle. On Monday, I finally set up my lock screen. So far, not a hassle at all. Don't forgot your pin number or password. Write it down on a piece of paper and stick it somewhere like a desk drawer (just don't carry it with you) in case you ever forget it. 

----------------

Join the Resistance, Subscribe to Tim Gamble by clicking here and by following me on social media (see list near top of right-hand column of this website).  

Protecting Yourself and Your Family in Cyberspace

This article was originally published on Dystopian Survival on October 17, 2020. 

By Tim Gamble

Cyberspace sī′bər-spās noun: 1) The interconnected world of computer networks, digital communications, and the Internet. 2) The interdependent systems of digital information, telecommunications networks, and digital infrastructure. 3) The whole of the Internet, including all devices capable of accessing the Internet, as well as all associated infrastructure.  

Cyberspace. The word has its origins in science fiction, but today it is simply reality. Virtually every human is connected to cyberspace in some way. If you have a smart phone, you are in cyberspace. If you have a computer or use a computer, you are in cyberspace. If you have email, you are in cyberspace. If you have a Facebook account, or are on Twitter, Instagram, or any other social media, you are in cyberspace. If you have GPS in your car, you are in cyberspace. If you buy things from Amazon, or any other online retailer, you are in cyberspace. If you have a bank account, retirement account, or any other financial account, you are in cyberspace. If you are reading this article, you are in cyberspace. And the list goes on... 

Cyberspace has many advantages. It facilitates easy and quick communication. It disseminates  knowledge. It enhances markets. It is even a source of entertainment. But, dangers do lurk in cyberspace. As in the real world, there are bad guys, ranging from bullies and troublemakers to actual criminals and others seeking to do great harm, Being in cyberspace  puts you at risk to viruses, spyware, ransomware and other forms of malware. It puts you at risk of fraud, identity theft, and loss of privacy. It puts your life on display to nosy neighbors, self-righteous activists, intolerant social justice warriors, snooping employers, and petty government bureaucrats. For small businesses, being in cyberspace brings with it potential legal liabilities, as they have an obligation to protect their customers' and clients' personal and financial information. 

In today's world, being in cyberspace is a necessity. It is very difficult, if not impossible, to live a modern life completely separate from cyberspace. That being the case, how do we protect ourselves and our families from the threats found in cyberspace? Here are some suggestions:

1- Use security software and keep it updated. Security software includes antivirus programs, firewalls, anti-spyware, anti-ransomware, and anti-malware programs. Make sure you are updating your security programs on a regular basis (daily is best). Be aware that the "free" software that came with your new computer or laptop was most likely only for a "limited time," during which you had to subscribe (pay money) to the software maker to continue using it. After the limited time period expired, often in 30-days or less, your security software either turned off, in full or in part, or quit doing automatic updates.

2- Update your operating system and other programs on a regular basis. Keeping your computer and smartphone updated is a hassle, but these updates often include security fixes. Not updating your computer and smartphone on a regular basis puts you at risk as new threats emerge daily in cyberspace.

3-  Secure your Wi-Fi.  Your Wi-Fi router is the physical device that controls who can connect to your wireless network. Make sure you are using one with at least WPA2 encryption, and enable encryption on the router. Make sure you are using a strong password, and are keeping that password private. 

4- Use a strong password. And use a different password for each account. This means not using "password" or "12345" or your wife's maiden name, or your favorite sports team, or you kid's birthday, or any other common and easily-guessed password. Don't make it easy for a hacker by using the same password for every account. Use different passwords for your bank, email, social media, Amazon, PayPal, and other accounts. Consider using two-step or multi-factor authentication when available, especially on your bank and other financial accounts. Sure, it is a hassle. But it is much less of a hassle than having some bad guy drain all the money from your bank account.  

5- Don't fall for the phishing bait. Phishing is an attempt by bad guys to trick you into giving away passwords or other private information by pretending to be an official email, text message, or website from a trusted source. Be wary of unsolicited emails and text messages. Be very wary of emails or text messages that insist you must respond immediately, or you'll be locked out of your account. These are almost always scams. 

Make sure the email address or website url is spelled correctly (bad guys often use slight misspellings of the company's url to trick folks who aren't paying close attention). Be wary of websites that contain a lot of misspellings, grammatical mistakes, or pages that won't open. Legitimate companies will be more professional. 

Large companies use email addresses tied to their domain name, not to public email services. For example, your bank uses email addresses similar to employee@BankName.com, but never employee@yahoo.com or employee@gmail.com.

Remember, deals that seem too good to be true, probably are to good to be true. Don't let your greed overtake your commonsense. 

6- If you can't verify, delete. It is best to simply delete SPAM without opening it. Also, delete, without opening any links, suspicious emails and text messages from unknown and unidentifiable sources. 

7- Make back-ups often. Important data can be lost multiple ways, including computer malfunctions, loss or theft of your device, viruses, or ransomware attacks. Backing up your your important data on a regular basis will make your life easier if your data is lost, and will make it less likely you'll have to give in to a ransomware attack.  

Data can be backed-up in multiple ways, including online or cloud storage, portable external hard drives (here's a good one on Amazon: Seagate 2TB for less than $65), or USB flash drives (I use and recommend the GorilaDrive brand). 

8- Stay away from the "red light districts" and bad neighborhoods of cyberspace. Just like in real life, cyberspace has its share of places to avoid. You can become a victim anywhere, but you are much more likely to become one if you hang out in bad places, both in real life and online. Stay away from porn sites, illicit pharmaceutical sites, gambling sites, and other vice-associated sites. Even if those websites are legitimate and safe, they often link to very shady websites that may be infested with phishing attempts, viruses, malware, and ransomware. Deal only with companies and websites that you know and trust. 

9- Don't overshare on social media. Privacy is important, but it is virtually non-existent in cyberspace. Once you put it on the Internet, it is out there forever. Just ask any celebrity or politician who said something stupid, then tried to delete it. Screenshots are forever.  Even if you have your social media account set to "private," your information is still available to the social media company, government and law enforcement, and those people who you allow to follow you. Any of those people can, accidentally or on purpose, leak that information publicly. Think carefully about what you share on social media, and who might see it.

----------------


Ad: Cybersecurity For Dummies
.  If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You’ll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!





----------------

Join the Resistance, Subscribe to Tim Gamble by clicking here and by following me on social media (see list near top of right-hand column of this website).  

Monday, February 14, 2022

Trump Statement on Media Ignoring Durham’s Recent Clinton Findings

Donald J. Trump, 45th President of the United States of America, has released the following statement on the corporate media refusing to report on Special Prosecutor John Durham's findings that the Hillary Clinton campaign and the Democratic National Committee tried to infiltrate the Trump campaign and White House servers. The following unedited press release is dated February 14, 2022:

Can you imagine that, what should be the biggest story of our time, bigger than Watergate, is getting absolutely no mention, ZERO, in the New York Times, Washington Post, ABC Fake News, NBC Fake News, CBS Fake News, ratings-dead CNN, and MSDNC. This in itself is a scandal, the fact that a story so big, so powerful, and so important for the future of our Nation is getting zero coverage from LameStream, is being talked about all over the world. Just like they wouldn’t talk about the many Biden corruption scandals prior to the Election, (or for that matter now!), they won’t talk about this, which is potentially even bigger. It shows how totally corrupt and shameless the media is. Can you imagine if the roles were reversed and the Republicans, in particular President Donald Trump, got caught illegally spying into the Office of the President? All hell would break loose and the electric chair would immediately come out of retirement. The good news is, everybody is talking about not only this atrocity against our Nation, but that the press refuses to even mention the major crime that took place. 

----------------

Join the Resistance, Subscribe to Tim Gamble by clicking here and by following me on social media (see list near top of right-hand column of this website).  

Saturday, February 12, 2022

Afghanistan: Abandoned Christians Remain Underground

When the Biden administration pulled out of Afghanistan last year in a rushed and extremely chaotic way, they left behind an estimated 9,000 American citizens, and untold thousands of Afghani allies and Christians. Those left behind are being hunted down and killed by the Taliban. Biden continues to refuse any blame for the situation. 

The following press release from from International Christian Concern describes the situation faced by Christians left behind in Afghanistan, . Please check out their website at www.persecution.org for more on the persecution and genocide of Christians around the world. 

Afghan Christians Remain Underground

02/11/2022 Afghanistan (International Christian Concern) – Nina Shea, director of the Hudson Institute’s Center for Religious Freedom illustrates “the dirty little secret” of why no churches are being destroyed in Afghanistan since the Taliban takeover. “There were no churches before the Taliban returned to power, Christians were already underground because of the constant threats to their lives, so they didn’t have any church buildings to blow up.”

The unfortunate Christians who did not manage to evacuate Afghanistan are facing even more danger. Most of the Christians living in Afghanistan are apostates. Conversion from Islam to Christianity is a sin punishable by death in the eyes of the Taliban. The terrorist organization hunts anyone who does not follow their extremist views, using torture and the fear of death to probe potential apostates and have them betray their friends and families.

Shea is urging the United States Secretary of State to grant admission to the Christians trying to flee Afghanistan into the US. She calls the current requirement of needing third-party testimony of personal threats “extremely unrealistic” and hopes to include religious minorities in those granted eligibility.

There are still thousands of Christians in Afghanistan in imminent danger because of their faith. a Georgia Congressman commented on the current situation in Afghanistan, saying that, “the environment under Sharia law creates an extremely dangerous situation for anyone who is of any other faith, the top of which are Christians… We’re in a serious fight for the clock right now, there are threats emerging by the hour.”

We pray for the Christians in Afghanistan who remain underground, yet stalwart in their faith in the face of torture and death.

----------------

Join the Resistance, Subscribe to Tim Gamble by clicking here and by following me on social media (see list near top of right-hand column of this website).  


Monday, February 7, 2022

Opinion: The Problem with Modern Christianity

By Tim Gamble

The following is adapted from a series of posts I made on Gab a few weeks ago. Please join me there for more discussions on this and many other topics. Don't let misinformation scare you away from Gab - most folks there are good people who just want to exercise their free speech rights. Find me on Gab at https://gab.com/TimGamble 

The Problem with Modern Christianity

In the 1960s and1970s, modern feminism (anti-male, anti-family, anti-traditional values) began infecting many Christian Churches (in the name of equality and fairness). Many pastors and other leaders did nothing, or even embraced modern feminism, often out of fear of losing donations, or even their jobs, if they didn't fit in with modern times.

In more recent decades, the concept of "social justice" (which is NOT Biblical justice, see the book mentioned at the bottom of this opinion piece) has similarly infected many Christian Churches. Today, many pastors and other leaders have embraced social justice out of a desire to fit in with the modern world (though they would call it being "relevant" and "authentic" - two buzz words of the Left).

This desire to "fit in with the world" is condemned in Scripture many, many times. Yet, many modern Christians try to adopt worldly ways, thinking it is okay because they are giving it a Christian spin. It is not okay. We are followers of The Way, not followers of The World.

God, and God alone, decides what is right and what is wrong, what is sin and what is not, what is good and what is evil. What God has decided is never "out dated" or "old fashioned." We have not "out grown" what God has revealed to us. We do not become "relevant" or "authentic" by rejecting God's teachings as given to us through the Scriptures and the Early Church. The world may praise us for doing so, but God won't. 

Worldly ways are not God's ways, and slapping a Christian bumper sticker on it won't change that fact. Follow God, not the World. Reject modern "Christianity" that tries to fir in with the World. Reject churches, pastors, and teachers that worry more about being seen as relevant than about pleasing God.

----------------

Why Social Justice Is Not Biblical Justice: An Urgent Appeal to Fellow Christians in a Time of Social Crisis, by Scott David Allen. I want to recommend it to my readers, as it does an excellent job of explaining the difference between politically-correct "social justice" and true Biblical justice. Social justice has creeped in modern churches, which have become weak as they seek worldly acceptance. Sadly, most church-goers today don't understand enough about social justice (or Biblical justice for that matter) to see the dangerous distortions embedded in the social justice concept. 


----------------

Join the Resistance, Subscribe to Tim Gamble by clicking here and by following me on social media (see list near top of right-hand column of this website).  

Syria: Christian Population Dwindles to Nearly Nothing

 The following is an unedited press release from International Christian Concern (ICC). Please check out their website at www.persecution.org for more on the persecution and genocide of Christians around the world. 

Syria’s Christian Population Dwindles to Nearly Nothing

02/06/2022 Syria (International Christian Concern) – Idlib’s last Christian, 90-year-old Michel Butros al-Jisri, recently recalled the strife and war he faced over the past years that have pushed out the other Christians that used to live alongside him. The majority of the city’s residents left in 2015 when the opposition took control.

With no children, family or church congregation, Butros lives, worships and prays alone. He shared with Al-Monitor, “My family is from Idlib city. My family and I used to live here in this house, which became a part of me, and I shall not leave it, come what may. My brothers moved to live in Aleppo while my father, his wife and I chose to stay.” His parents have since died, but Butros remains steadfast in his commitment to his home.

Idlib was once home to a moderate Christian community that lived alongside the Muslim majority with little friction. A Greek Orthodox church was built in 1886 and a National Evangelical Church came years later, providing places for the minority Christians to worship. Idlib governorate was once home to 10,000 Christians, but numbers began declining in 2012 and then drastically in 2015 when the opposition took over. Today, Christians account for less than 1% of Idlib’s residents.

----------------

Join the Resistance, Subscribe to Tim Gamble by clicking here and by following me on social media (see list near top of right-hand column of this website).  

Friday, February 4, 2022

Video: Thomas Renz, attorney for the Frontline Doctors

Please watch this Interview from last week with Thomas Renz, attorney for the Frontline Doctors:


------------------

AD: The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health, by Robert F. Kennedy Jr. This new book is #1 on AMAZON, and a NEW YORK TIMES, WALL STREET JOURNAL, USA TODAY and PUBLISHERS WEEKLY NATIONAL BESTSELLER. Pharma-funded mainstream media has convinced millions of Americans that Dr. Anthony Fauci is a hero. He is anything but, as Robert Kennedy, Jr. proves in this book, available on Amazon. 

----------------

Join the Resistance. Subscribe to Tim Gamble by clicking here and by following me on social media (see list near top of right-hand column of this website).