We would like to provide important clarifications regarding the case of the climate activist who was recently arrested by French police on criminal charges. We are also deeply concerned about this case and deplore that the legal tools for serious crimes are being used in this way. In the interest of transparency, we would like to provide additional context.
In this case, Proton received a legally binding order from Swiss authorities which we are obligated to comply with. There was no possibility to appeal this particular request.link
The patent in question is for a system that would use quantum teleportation in order to boost a quantum computer’s reliability, while at the same time reducing the number of qubits required for a given calculation. This “teleportation” technology would help solve scaling issues and calculation errors that arise from system instability.link
The Taliban has mobilized a special unit, called Al Isha, to hunt down Afghans who helped US and allied forces — and it’s using US equipment and data to do it.
Nawazuddin Haqqani, one of the brigade commanders over the Al Isha unit, bragged in an interview with Zenger News that his unit is using US-made hand-held scanners to tap into a massive US-built biometric database and positively identify any person who helped the NATO allies or worked with Indian intelligence. Afghans who try to deny or minimize their role will find themselves contradicted by the detailed computer records that the US left behind in its frenzied withdrawal.link
A key database of the biometric information of Afghan allies who assisted U.S. and coalition forces may now be in the hands of Taliban militants who are seeking revenge.
On Tuesday, the Intercept reported, based on the accounts of a Joint Special Operations Command (JSOC) official and three former U.S. military personnel, that Taliban fighters obtained U.S. Handheld Interagency Identity Detection Equipment (HIIDE) systems during their sweeping offensive throughout Afghanistan last week.
“We processed thousands of locals a day, had to ID, sweep for suicide vests, weapons, intel gathering, etc.” a U.S. military contractor told the Intercept. “[HIIDE] was used as a biometric ID tool to help ID locals working for the coalition.”link
Today’s Bombshell – 20:25, to 22:26, here, Mike Lindell’s partner says during the 2020 election, they had friendly clerks across the country, who helped “them” get full forensic images of voting machines before, during, and after the audit, and they caught what dominion added just before the election, what they did with it during the election, and what they wiped to cover their tracks after the audit. Probably where Lindell got the PCAP data from. Note, Lindell did not set that up, nor did this guy. Something much, much bigger than those two, with the ability to recruit diverse and disconnected assets across the nation, and get them to technically violate the law at risk of imprisonment or death, did that. But that massive operation is something whom they feel they are agents of, enough so, that when they speak of it, they refer to it as “We.” He also has somebody talking into his earpiece, and although it could be normal event control, it could be something more akin to AOC’s earpiece. These two minutes are a must listen, because if true, and it appears to be, it is 100% confirmation the election wasn’t a four-year election – it was a sting operation that must have been years, if not decades in the making. And it happened in an environment where, if you would strike the king, you must kill him. So it probably won’t fail. Though I would still operate as if you think it will and prepare. I would assume the enemy gets a vote in the outcome too.link
Riveting presentation. ABN
If China or any other foreign nation state is behind this, it’s an act of war. ABN
Ron told us, “The video I put out was 1 minute 13 seconds and I’ve got approximately 30 minutes of video total.”
…Ron Watkins: And what I put out is maybe 1% is conservative. Maybe 1% of 1%. What I put out is highly focused because it caught the CEO of Dominion in perjury. He said there’s no way these machines can be connected in his Michigan testimony. Well they can be… Technically they can be connected by the administration BIOS.link
Code Monkey has more. It turns out the boot options are to boot from the SATA drive on board, or to boot from an embedded network interface card, ie from a remote drive somewhere else, probably off the internet. He shows the screenshot of the screen, which shows USB boot enabled, which was a third option, to boot from a USB stick somebody brought with still different software. The question is were any of those remote or USB boot option software packages reviewed and/or certified by the election certification bodies?
Code Monkey’s 1:17 minute long video is here, showing the whistleblower’s evidence that the state has the bios passwords Maricopa claims they don’t have (which they can’t release because it would prove the system was knowingly rigged instantly), and that the voting machines connect to the internet, which Dominion denies, because that would show the elections were knowingly rigged by a corrupt system.link
This refers to the article with the “smoking gun” news about Antibody Dependent Enhancement. Why is China attacking Robert Malone? Why is US government ignoring Robert Malone? In this and in many other areas it seems bad actors in USA are colluding with bad actors in China. This collusion always promotes pseudoscience and always blocks real science. From the beginning of covid till now this pattern has been apparent. ABN