Estate Artistry - Homepage
  • Home
  • Project Portfolio
  • Customer Reviews
  • Power Washing is AMAZING !!!
  • Estate Artistry News
  • Blog
  • Tree Services
  • COMING SOON - Emmanuel Stone Product Page

CORONA-HOAX 
HAD ENOUGH YET?

This blog page, with all it's historical archived pages contains everything anyone would want to know about the pandemic crisis.  

I have also written two groundbreaking books.  The first was an international best seller that was BANNED BY AMAZON,  making it necessary to re submit it with a bullshit cover and title to get it past their censors.  After 3 months on the best-seller list they BANNED IT AGAIN AND STOLE MY ROYALTIES!

The original title was "
Covid-19 and Induced Anaphylaxis."  The covert title was "Curious?"

Inside I reveal information you won't hear anyplace else.  I explain exactly why and how ALL VACCINES cause injury.  

On April 9th, 2022 I self-published my second book, "What Now?" which includes a vax injury treatment protocol, but please DO NOT follow that.  While the book contains other good information, I have since been able to test the protocols effectiveness and found it to be lacking, however I have since learned what DOES work and in testing that I saw, and documented, extraordinary results.  The new approach reversed a terminal vaccine injury case. 
You can review my results here:

http://estateartistry.com/blog/reversing-vaccine-injuries  
Aeon-213 Capsule Website:  https://www.scalevitamins.com/ 

​If you or a loved one has had their health destroyed, I can help you.

PDF copies of both my books are free, just email me to get them.  "What Now?" print copies are for sale here:
https://www.printshopcentral.com/bookstore/book/what-now-recovering-from-a-tragic-mistake​ ​

Proceeds from book sales funds my work.  You do not have to buy one, but if you do it is the same as donating to me.  I thank you if you do.   

Email me for free PDF copies

2023 Wrap Up And The Great Taking- A MUST Read.

12/21/2023

6 Comments

 
Happy Holidays Everyone.  Enjoy yourself now.  With the way things are going lately it's beginning to look like next year may not supply many reasons for celebration, so look around, take stock of all your blessings and take a moment to be grateful.  Then do a little preparation.  Doesn't matter how you go about this.  Just consider what's most important to you personally and figure out two things:  How you can make sure you have those things if they become harder to get later, and how you can manage without, if getting them becomes impossible.  That's all.
 
This is how I maintain.  It's how I manage stress.  For me, it works.
 
Today I have some important news to cover.  The wretched infestation of globalist gremlins we have been dealing with the last few years are busy making their own preparations; to basically wreck everything in sight, so they can feed their greed some more.

 
POWER, PROFIT AND CONTROL.  That's what is important to them, and that’s all they care about.  They want it all and are getting ready to take it.  Really, it’s a thing they have already done, they just haven't made an official declaration to that effect yet.  What I am going to share with you today, among other news stories and opinions I have, is how the robbery will take place - officially.
 
This plan is NOT just my opinion, oh no, this is THE PLAN.


The Rich Will Get Richer -- Until The Poor Get The Picture.
​

INTENTIONAL DESTRUCTION: FIRST COVID, NOW COMES "THE GREAT TAKING"
https://www.zerohedge.com/geopolitical/intentional-destruction-first-covid-now-comes-great-taking
 
THE GREAT TAKING...THE PLAN TO HAND OVER YOUR ASSETS TO THE BANKSTERS
David Webb is the Author of "The Great Taking". A free download is available here: https://thegreattaking.com/
 
What is this book about?  You should have a look and find out.
 
It is about the taking of collateral (all of it), the end game of the current globally synchronous debt accumulation super cycle. This scheme is being executed by long-planned, intelligent design, the audacity and scope of which is difficult for the mind to encompass. Included are all financial assets and bank deposits, all stocks and bonds; and hence, all underlying property of all public corporations, including all inventories, plant and equipment, land, mineral deposits, inventions and intellectual property. Privately owned personal and real property financed with any amount of debt will likewise be taken, as will the assets of privately owned businesses which have been financed with debt.
 
If even partially successful, this will be the greatest conquest and subjugation in world history. Private, closely held control of ALL central banks, and hence all money creation, has allowed a very few people to control all political parties and governments, the intelligence agencies and their myriad front organizations, the armed forces and the police, the major corporations and, of course, the media.
 
These very few people are the prime movers. Their plans are executed over decades. Their control is opaque. To be clear, it is these very few people, who are hidden from you, who are behind this scheme to confiscate all assets, who are waging a hybrid war against humanity.
 
David has deep experience with investigation and analysis within challenging and deceptive environments, including the mergers and acquisitions boom of the 80’s, venture investing, and the public financial markets. He managed hedge funds through the period spanning the extremes of the dot-com bubble and bust, producing a gross return of more than 320% while the S&P 500 and the NASDAQ indices had losses. His clients included some of the largest international institutional investors.
 
I actually had an opportunity to meet David recently, on a conference call that went on for hours.  What this man has to say will floor you.  This is NOT a drill.

 
Question:
In the next global financial panic, what are the chances that there will be much of anything remaining in these pools of securities after the secured creditors have helped themselves?

Answer:
There will be a game of musical chairs. When the music stops, you will not have a seat. It is designed to work that way. It is time to ask: cui bono? Who benefits?

It is now assured that in the implosion of “The Everything Bubble”, collateral will be swept up on a vast scale. The plumbing to do this is in place. Legal certainty has been established that the collateral can be taken immediately and without judicial review, by entities described in court documents as “the protected class.” Even sophisticated professional investors, who were assured that their securities are “segregated”, will not be protected.
 
An enormous amount of sophisticated planning and implementation was sustained over decades with the purpose of subverting property rights in just this way. It began in the United States by amending the Uniform Commercial Code (UCC) in all 50 states. While this required many years of effort, it could be done quietly, without an act of Congress. 

These Are The Key Facts:
  • Ownership of securities as property has been replaced with a new legal concept of a "security entitlement", which is a contractual claim assuring a very weak position if the account provider becomes insolvent.
  • All securities are held in un-segregated pooled form. Securities used as collateral, and those restricted from such use, are held in the same pool.
  • All account holders, including those who have prohibited use of their securities as collateral, must, by law, receive only a pro-rata share of residual assets.
  • “Re-vindication,” i.e. the taking back of one’s own securities in the event of insolvency, is absolutely prohibited.
  • Account providers may legally borrow pooled securities to collateralize proprietary trading and financing.
  • "Safe Harbor" assures secured creditors priority claim to pooled securities ahead of account holders.
  • The absolute priority claim of secured creditors to pooled client securities has been upheld by the courts. Account providers are legally empowered to “borrow” pooled securities, without restriction. This is called “self help.” As we will see, the objective is to utilize all securities as collateral.
  • The “self help” applies to “market participants”, meaning definitely not you, the person whose retirement savings are invested in those markets. “Market participants” is a euphemism for the powerful creditors who control governments via debt. The establish their legal certainty with respect to the financial assets while removing yours. Interestingly, besides a small group of the private mafia behind the veneer of the central banks, nobody else is really protected. Not even the multi-millionaires and billionaires if they hold financial securities in the same collateralized structure..

QUOTE FROM SASHA LATYPOVA:
"From my personal experience, I already lived through one “great taking”, performed by whoever collapsed the Soviet Union. When Ukraine became independent from the former USSR in 1991, the ruble and any savings that anyone had at Sberbank (the only bank that existed in the USSR) disappeared overnight, and were not replaced. One can argue this was a very simple exercise given that only one state-owned bank was involved or needed to implement this reset, and there were no financial instruments, only cash savings in that bank. My grandparents had meager savings there and ended up with zero. I had no money at all as a young person, and I guess that can be a plus - when you own nothing, nobody can confiscate it from you. Afterwards, there was no currency in circulation in the country for approximately 2 years until hryvna was designed and printed and introduced. During those years, people (including me) received paychecks in the form of this - gov issued IOUs exchangeable for goods in stores that had any goods."
 
MEET THE BANKING CARTEL THAT IS PLANTING THE SEEDS FOR THE NEXT BANKING PANIC AND BAILOUT
https://wallstreetonparade.com/2023/09/meet-the-banking-cartel-that-is-planting-the-seeds-for-the-next-banking-panic-and-bailout/
 
EXPERTS ON CENTRAL BANK PLANS TO TOKENIZE AND CONFISCATE ALL YOUR PROPERTY
https://www.bitchute.com/video/zp83SuWr3jxE/
 
US BANKS RANKED BY DERIVATIVES EXPOSURE
https://www.usbanklocations.com/bank-rank/derivatives.html

Picture
If all of this "finance-speak" makes your eyes glaze over, here is the simplest explanation I can offer:
 
A derivative is basically a loan, but it differs from the type of loan you are probably familiar with in one very important way.  Loans are debt.  Debt is a liability.  Too much debt is a weakness, financially.  But a derivative is not reported on financial statements as a liability.  Derivatives are "legally" (clearly not lawfully) reported as assets.
 
Derivatives exposure is financial weakness, but due to some very deceptive accounting practices that have been legalized by those who benefit from this, derivative exposure is reported as financial strength.  Borrowed money looks like liquid cash on hand on a typical set of corporate financial statements.  When people looking for good investments choose where to invest they look for strong companies, but today they cannot find any.
 
Why would any company use derivatives?  Well, a smart one would not, but those that have do so because the money is cheap and easy to obtain.  When companies borrow funds they do what you would do, they look for the best rates and terms they can qualify for, but a derivative option can look more attractive simply because it gives them access to large sums at rates and terms they DO NOT qualify for.  It's a risky move that could either pay off big or bite them in the ass, and these messed up accounting rules allow them to do this in secret.  Nobody has to know they took such a risk.  It's like going to a loan shark, but they are called sharks for a reason.
 
All kinds of large companies, including banks, securities firms, brokerage houses, etc.  all APPEAR to be solid, but they are not.  If their loans are called, meaning they are asked to pay, or if the repayment terms of these massive loans cannot be met, those borrowers, along with all their investors, will go POOF!
 
And this situation is like a string of dominoes.  All it takes is one big borrower to fuck up somehow, and everything downstream of them collapses.  Now if I had to speculate on which one of the criminal institutions listed in the chart above is most likely to be either deliberately sacrificed or thrown under the bus to kick this off my guess is that it will be the Bank of America.  It's not the largest, but it is large, and in a previous post I mentioned a strange situation that was reported on in Wall Street on Parade not too long ago, in which BofA had apparently prepared for its own impending bankruptcy by setting up numerous financially empty shell companies to take the heat of creditors as well as bankruptcy filing paperwork, but this paperwork has to date not been filed.
 
Is this "legal"?  Probably not.  But then "legal" is a relative term that has very little to do with ethics.  I don't have much of anything to protect, but if I did, and any part of that involved BofA, I would remedy that situation fast.  But in all honesty, it does not matter where your personal exposure is.  If you have any at all you are vulnerable to a total loss of whatever that is.  The best possible position to be in right now is debt-free, in possession of some tangible asset of value, and an ability to provide some kind of skilled labor that will be in demand later should everything go tits up.
 
The way things in general look to me, all things considered, is there is a timetable in motion here, and every shit move on the globalist agenda has an appointment slot.  I cannot really see this economic time bomb ticking away too much longer.  My gut is telling me it will most likely go off sometime next year, so by this time next year, we will all be deep in "the suck".


Something Positive:
​

 
MY BUDDY TODD CALLENDER TAKES THE DEPOP AGENDA TO THE SUPREME COURT!
https://rumble.com/v40o4ni-todd-callender.html
This outcome should be interesting to watch.  This is a real court case that will formally accuse those responsible for trying to force poisonous vaccinations of Americans. 
 
Todd and I first met way back when he was doing work for America's Frontline Doctors.  Todd rightfully bailed on that group when it became clear that Simone Gold was in the market for a gold toilet seat.  Since then we have been in contact somewhat regularly.  I did a few alt media shows with him, appearing to discuss various things like the real power handling capacity of large cell masts and other pandemic related news.
 
This announcement, that he has a case officially docketed on the Supreme Courts 2024 calendar is a big deal.  It has been suggested, rather astutely I might add, that his case was selected as a setup, to give the kind of predetermined decision we might expect, since the government is not in the habit of incriminating itself, but the fact his case was selected to be heard at all is, I think, a major victory.
 
What this essentially means is the judicial branch of government has just legitimized these claims.  Its no longer a "conspiracy theory".  And this is something I predicted a long time ago, that at some point we would turn a corner with regard to someone officially acknowledging what actually motivated this massive, global scam I call the corona-hoax.
 
I think when this case goes to trial next year the publicity that it generates will be a game changer, if of course, everyone does their part to flood the media with stories about it, to focus attention on the case itself.  Regardless of the outcome, this is sure to be a lighting rod for similar accusations. 
 
As I have said before, if you want things to change you have to stop asking questions and start making accusations.  Todd is leading the way, so my advice is to get behind him.

 
Understanding the Creepy Pseudoscience and Religion Behind Eugenics
 
For those unfamiliar with eugenics, it is a pseudoscience whose thesis is that it is possible to improve the “breeding stock” of humanity (positive eugenics) by ensuring that, for example, the Nazi ideal of pure-blood Aryan Germans breeding with other pure-blood Aryan Germans will create blond-hair, blue-eyed “Übermensch” or “Supermen”. 
 
The darker side is called negative eugenics: the poisonous idea that society can be improved by sterilizing, aborting, euthanizing or even murdering those deemed unfit or “useless eaters”.
 
Many of the largest fortunes the world has ever seen were left to foundations that continue the work of eugenics today.

Picture
CENSORED – THE STUDY THAT SHOWS A STAGGERING 17 MILLION DEATHS AFTER COVID VACCINE ROLLOUT.
https://dailynewsfromaolf.substack.com/p/censored-the-study-that-shows-a-staggering
"A groundbreaking study [17 Countries, 4 Continents ] found that 17 million people died worldwide after the Covid “vaccine” rollout and therefore should be garnering worldwide attention and calls for an immediate cessation of all Covid vaccines. Instead, it has been CENSORED!
 
The shocking study, COVID-19 vaccine-associated mortality in the Southern Hemisphere, by Drs. Denis Rancourt, Marine Baudin, Joseph Hickey and Jérémie Mercier was published September 17, 2023, yet, also shockingly the study has not had the attention it deserves, but, has met only censorship and narrative-confirming “fact-checks” on the safety and effectiveness of the as-yet untested Covid-19 “vaccines.”
 
The team of doctors studied 17 countries across 4 continents, in Latin America and in the equatorial region which provided them with a representative sample of the world. “We calculate the toxicity of the vaccine for all ages,” explained Dr. Rancourt, “given the number of doses given worldwide to conclude that 17 million people would have been killed by this vaccine.”
 

ANALYSING BATCH IDS OF THE PFIZER SHOTS, HOW MANY PEOPLE DIED
https://www.bitchute.com/video/828LP0kemJUz/?list=subscriptions
Vaccinator fails pegged.  As it turns out, certain jabbers were much better assassins than others.
 
DR. LEE MERRITT AND I FINALLY MEET!

https://rumble.com/v3zhihw-dr-lee-merritt-md.html
This is a replay of a recent MD4CE conference call which had Dr. Lee Merritt as the guest presenter.  These meetings are sponsored by Dr. Stephan Frost and moderated by Charles Kovess.  I am a regular participant and contributor in this group and attend their twice weekly standing calls.  The core contributors usually come on a bit early, before the replay recording begins, so we had an opportunity to have a quick exchange, at the start of which another doctor, Daria Schooner MD, interrupted to basically explain to Dr. Merritt who I was, since she didn't know, and she explained how important she felt my work is.  Daria graciously described me as the biggest contributor to this group over the past year.  So that was unexpected, and just great, because that introduction gave me the street cred I needed to really get Lee's attention. 
 
Hearing that, Lee asked me for my contact info and promised a personal call soon.  Lee has a lot of knowledge, high security clearance type stuff and work experience in advanced bioweaponry.  She is aware of the bio cyber area but a little sheepish about covering it.  And this is the hell hole I am digging into, so I was gunning for an offline chat with her and she promised me one, so mission accomplished. 
 
You probably won't see a public interview between the two of us unless she wants to interview me for her channel or something to muse over some less dangerous topics.  I want to talk with her about some of the documentation I am not supposed to have, and slipped her one of those papers on this call to review.  She dances around some of these areas publicly, but she knows more, and I want to know what that is, so this meet up is going to be the two of use sharing info and playing the connect the dots game at a level you cannot do on camera.
 
The thing about Lee is, for the last three years I would conclude something extraordinary on my own and a week later I would Lee say the exact same thing on some show.  And I told her that. I told her it made me think to myself, "What the hell?"  Does Lee Merritt actually poach my blog?"  And that made her laugh, which was fun.  It was uncanny how many times this happened.  I was always about 6-8 months ahead on insider stuff and she usually was about 4.  Just by comparing the dates of certain  articles I posted from 2020-2022 with her appearances during the same time proves it. 
 
People don’t generally believe me because, let's face it, I am me, but they do respect Lee, and hearing her later come to the same conclusions I was arriving at was so encouraging, and also like having my own PhD carrier pigeon.   Lee single-handedly kept me at my desk month after month early on.  Today I have so many things that compliment and confirm things she muses about that I know she has not seen yet.  The two of us comparing notes is going to be epic.  Not sure when this will happen just yet but it will, and I can't wait.  I have a whole file just on her at home.

I only heard her say one thing on this call that I would challenge, and that was the stuff about instant flu spread having a historical basis.  I'm not buying that, because of where it came from.  Blavatsky, Steiner, et.al  all these people, and there were 5-6 of them, were parapsychological gurus in their day and they all ran what amounted to fortune teller circuits, spirit cults and enlightenment mystery schools.  They all had a huge influence on people in general, but look into any of them hard and it's clear they had had backdoor relationships to power like Nixon/Dixon and Reagan/Barron.  We are gonna have to hash that one out.  I think offering such weak evidence creates doubt where it should not be, and that whole theory she floats out is one I can shoot a dozen holes in without much effort.  I don't mean to be a censor to anyone, least of all her, but coming from her that sort of acknowledgement is the inch the enemy needs to take several miles of our territory. 
 
There are other things she could include in this presentation that take back territory from them, like JJ Couey's observations as to why the virus/no virus crowds argument only looks strong.  It's not, not at all.  Yeah, it makes sense that if viruses can be disproven a lot of what follows from virology can be debunked, but they do not offer a replacement theory, and there is one, hell, I have offer a great one in my second book you will never hear elsewhere.  Simply maintaining there are no viruses and letting that be your entire position ignores a whole lot of evidence that will never go away.  This evidence is of course all the result of faulty observations, flawed logic, and outright fraud that is misleadingly presented and maliciously used to deceive laypeople, but it is there, and they just ignore that.  Its presence is as serious a problem as believing in fake viruses, that is just as important to expunge from lexicon of professional medicine as dispelling the superstition.  Leaving it there unaddressed has allowed this con to be repeated every couple generations for the last couple THOUSAND years!
 
These people come to the debate table stating they don't have a better explanation for all of that, which is lazy as hell, stubbornly hiding behind this weak defense that they are only there to refute the current understanding, but that’s a half-ass job.  If they win it means what the want is for everyone to just dismiss and throw out "all things virology" and revert back to the previous understanding which, by the way, was demons!  No shit.  Before Pasteur, another con man, showed up on the scene if you got terminally ill, what you needed was an exorcist. 
 
The "no virus" people, a movement spearheaded by people like Tom Cowen and Andrew Kauffman, don't realize that is actually the position they are defending.  And that is why, despite all the good they do, they get lumped into the controlled opposition bin with more serious decepticons like Peter McCullough and Robert Malone.  And JJ Couey gave a perfect explanation for their strange behavior in a clip excerpt I put at the bottom of a recent post: 
http://estateartistry.com/blog/brain-science-the-mind-is-useless-if-the-eyes-are-blind 
 
So definitely watch that.

More Libtard Politics and War Mongering
​

CONGESTION TAX?
https://www.bitchute.com/video/jbSSY1D0H89M/
This is so ridiculous. "Congestion is costing NYC businesses 20 billion annually?" Oh fuck off, you daft cunt! You don't just float that out like a fact. Based on what? Prove it! When the hell has a business ever moaned about high traffic? Hell, they pay premium prices for high traffic locations.
 
You know what really costs them money? NO TRAFFIC!   Fuckin morons. Hang em high.
 
I have a great answer to this bullshit. Remove the plates on your car. If everyone simply does that they are fucked.

 
NEW YORK PASSES THE BILL ALLOWING THEM TO KIDNAP AND IMPRISON NY RESIDENTS SUSPECTED OF HAVING "COVID" AGAINST THEIR WILL !!!
https://govt.westlaw.com/nycrr/Document/I3783ab18c22411dd80c2c6f42ff0193c?viewType=FullText&originationContext=documenttoc&transitionType=CategoryPageItem&contextData=%28sc.Default%29
Yeah.  You heard right.  If you live in New York you better get the hell out right now.  I swear this is a bridge too far.
 
DO YOUR PART FOR GLOBAL WARMING: STOP BREATHING!
https://www.zerohedge.com/political/do-your-part-global-warming-stop-breathing
Ha!  Finally...  A WEF measure I can get behind.  Attention, all you fools who have been impersonating speed bumps to save the planet:  Here's the ultimate virtue signal.  Go wave this flag.  I promise I will notice you this time.
 
TENNESSEE SLAPS BLACKROCK WITH FIRST-OF-ITS-KIND CONSUMER PROTECTION LAWSUIT OVER ESG SHAM
https://www.zerohedge.com/markets/tennessee-slaps-blackrock-first-its-kind-consumer-protection-lawsuit-over-esg-sham
I covered ESG in previous posts.  This has been how the WEF has managed to reward corporate support of its absurdly destructive climate change policies.  Either you endorse and promote that shit or they will tax your non-compliance with carbon footprint type invoices.
 
Where this sham begins to impact investors is when companies adopt ineffectual "green" policies that involve equipment and practices that are hugely expensive, and as a result become financially dependant upon subsidies offered by the gov't that are UN-sustainable.  Being a climate change whore eventually impacts their bottom line, which is where investors end up holding the bag, and this sort of back-door dealing has finally been exposed for what it is.

 
JOURNALIST WHITNEY WEBB EXPOSES THE WEF FALSE FLAG PLAN TO CARRY OUT A MASSIVE CYBER ATTACK IN 2024 THAT WILL PAVE THE WAVE FOR A REGIONAL WAR IN THE MIDDLE EAST.

https://dailynewsfromaolf.substack.com/p/shes-exposing-the-wef-false-flag/comments
https://www.youtube.com/watch?v=Y36ZEKYMvzM
When it comes to geopolitical mudslinging, I find it endlessly entertaining that the same people who have pursued the declared goal of "Total Information Awareness" all the way to the point of it becoming a reality, constantly float out such outrageous accusations with such thin evidence.
 
These are the same clowns that are always being caught off guard by whatever sort of attack succeeds, after which we are treated to a Broadway show quality level of shame and lament over some gaping hole of a blind spot they somehow had, which provides an equally lame excuse that then seamlessly morphs into closure that neatly zips up a story that always ends the same way;

​Where they generously grant themselves "self-forgiveness", for being conveniently asleep at the switch.
 
At some point, any reasonable person can only conclude that the entire foundational premise of "National Security and Defense vs. Invisible Enemy" is a total farce in which both sides of any conflict consist of colluding members on the same deep state committee.

THE U.S. STANDS ALONE IN THE WORLD SUPPORTING GENOCIDE AGAINST THE PALESTINIAN PEOPLE
https://vaccineimpact.com/2023/the-u-s-stands-alone-in-the-world-supporting-genocide-against-the-palestinian-people/
This article is pretty long, but one of the things you will learn if you read it, is all of the reasons the US has for supporting this atrocious genocide.  Are the good reasons?  Not really.  In fact, it's worse than you ever thought.
 
FULL SCALE NAVAL WAR BREAKS OUT IN RED SEA AND (PROBABLY FAKE OR FALSE FLAG) "CYBER ATTACKS"
https://vaccineimpact.com/2023/full-scale-naval-war-breaks-out-in-red-sea-as-cyber-attacks-take-down-fuel-station-distribution-in-iran/
Add Taiwanese container shipping line Evergreen and Belgian tanker owner Euronav to the growing list of major shipping firms halting all sails through the Red Sea strait. This brings the total to seven.
 
Also, the UK Navy disclosed more details regarding today’s incident in the Red Sea, reporting that an explosion hit the side of a commercial vessel near Yemen. The Norwegian owner of the ship confirmed that an “unidentified object” had impacted the vessel on the port side.
 
12/19/23 Bloomberg reports:
YEMEN HOUTHIS SAY THEY ATTACKEDMSC CLARA CONTAINER SHIP
YEMEN HOUTHIS CLAIM THEY ALSO ATTACKED SWAN ATLANTIC OIL TANKER
 
Between 10% and 12% of global trade passes through the Red Sea each year.

 
US EARNS THE HATE WITH THINLY VEILED MOTIVES
https://www.zerohedge.com/geopolitical/houthis-vow-keep-attacks-us-unveils-details-multi-national-naval-force
https://www.zerohedge.com/markets/red-sea-blockage-means-new-round-surging-cost-push-inflation
So we're not defending Israel, we are "protecting" free trade?  Is anyone buying this charade?
 
Picture
REINER FUËLLMICH IS STILL IN PRISON!  A MESSAGE FROM REINER FUËLLMICH
https://expose-news.com/2023/11/19/a-message-from-reiner-fuellmich/?cmid=3cdb44fa-eb81-4d42-adc9-2cf88935dba6
"As has been reported in the Expose, attorney Dr. Reiner Fuëllmich was arrested on Friday the 13th October while trying to renew a passport. He was detained in Mexico and escorted back to Germany where he was rearrested and imprisoned. There has been very little publicity surrounding his arrest and current situation, however, we have previously published an update on Dr. Fuëllmich that had been shared by his friend Dr. Elsa Schieder and attorney Dagmar Schoen on the 28th October."
 
IS YOUR STATE SUPPRESSING YOUR GUN RIGHTS? TRY STARTING A MILITIA
https://www.youtube.com/watch?v=dCSF8mZy80M
Washington Gun Law President, William Kirk, heads out to Holton Township in Michigan, who not only declared themselves a Second Amendment Sanctuary, but also have formed the town's first militia.  This move, which goes far beyond the normal declaration and instead implements a militia which anyone who is lawfully permitted to carry a firearm may join. 
 
So learn why they did this, why others may want to think about it, and why some will never be able to do this, and arm yourself with education today.  


You Vill Eat Zee Bugs…
​

PHARMA FOOD: BIOTECH ON YOUR PLATE WITH ELZE VAN HAMELEN
https://live.childrenshealthdefense.org/chd-tv/shows/financial-rebellion-with-catherine-austin-fitts/pharma-food-biotech-on-your-plate-with-elze-van-hamelen-fr/
Believe it or not, I actually know Elze Van Hamlin.  She and I spoke quite often after my first book was published and she wrote a fabulous two page spread on it that appeared in Gezond Verstand in November of 2019.  The magazine was in Dutch but it has a fairly large circulation that extended all the way to South Africa, so Elze almost single handedly delivered me a global audience with that review. (after which it was promptly censored globally)
 
Anyway, she is quite the researcher herself and pretty well known in Europe.  In this clip she is being interviewed by Catherine Austin Fitts, who did a deep dive into this toxic sludge and compiling all the supporting research at Solari for this expose Elze is doing on what this shit actually is, and I gotta say, it's quite a bit more than I knew about it.  I knew enough to know I should not go near it, but after hearing this, to say these products are simply nasty and toxic is a gross understatement.  You should hear this.
 
To me, knowing what I know about vaccines, vaccine production, and vaccine history, it sounds a lot like these products are literally oral vaccine formulations.  The lack of health and safety oversight, the flawed production processes, the ridiculous amount of money being thrown at developing a thing that has no market whatsoever reveals almost as much about the real purpose behind this stuff as the ingredients that go into it. 
 
I see them doing the same thing with these Franken foods as they did with deadly vaccines, where they made up the term "medical countermeasures", to hide the fact that they were never intended to be any sort of medicinal product.  The vaccines were always biological depopulation bioweapons meant to murder people in hideous ways.  Funding and pushing synthetic foods is the same play, different day.  The environment in which this work advances is literally a wild west in terms of any real checks against the levels of sinister that are possible.  Just like the vaccines, nobody is legally responsible for anything connected to this agenda.
 
Someone out there might want to put some of this shit under the scope to see what it looks like.  I am tempted to do the same but like the vaccine solutions, which I would advise against even coming into physical contact with, I frankly don't even want to handle it.  It is basically bovine (but I suspect also probably human) fetal matter, cancerous tissue and chemical poisons, created with a process that can only breed and harbor rapidly proliferating bacterial pathogens. 
 
Remember all the stories about unclean Pfizer production facilities that were shipping out vaccines by the barrel?  Same deal.  Lab grown meat is straight-up carrion, soaked in a bath of artificial flavorings, and I guarantee the plan they have is to label this as "organic" to sneak some version of it into everything like they poisoned everything medicinal with graphene.
 
Yikes.  This is beyond repulsive.  Branded as such or not, I think I have eaten my last fast food menu item, and damn close to passing on anything I don't slaughter myself.  Seriously, man, I'd rather trap and fry squirrels than take a chance at the supermarket right now.
 
FDA APPROVED, CONTROVERSIAL LAB-GROWN MEAT BECOMES A REALITY
https://www.zerohedge.com/commodities/fda-approved-controversial-lab-grown-meat-becomes-reality
"FDA Approved"  has a new meaning you all better become aware of and take seriously. 
 
It means "Poisonous, Unsafe, Not for Human Consumption, or Use"
 
"In 2025, the nuggets segment is expected to account for the largest share of the lab-grown meat market,"
 
Ya hear that?  Pay attention.  NO MORE NUGGETS FOLKS!


This Will Probably Be My Last Blog Post For The Year.
​

I attend the regular standing weekly calls sponsored by Medical Doctors for Covid Ethics International.  This is how I manage to meet and talk to all the alt media people with any celebrity status, and I am one of their main contributors.  They are hosted by Dr. Stephan Frost and moderated by Charles Kovess, who has a regular weekly show on TNT Radio.  Charles has interviewed me on that show a couple times.

On a recent call we heard from an attorney who was doing some important case work, and he finished up quick.  We ended the call on time, but about 15 people still wanted to discuss other topics.   Charles Kovess had to scram, so he gave me host privileges and the remaining participants began asking me questions about synthetic biology.

THREE HOURS LATER…

Everyone was so gob smacked Stephan Frost insisted I give a formal presentation for MD4CE in January to the usual room of 80+ participants (which is stacked with at least 40 PhD's. from every field).  The exact date is not set because I told him this is going to take a LOT of work to create.  I am working feverishly on this now. This will hopefully clear a lot of people up as to what's really going on, but a 90 minute presentation on this material is a massive project. (Probably 60 pages of script, a huge slide deck with diagrams and video clips, source appendix, etc…) No xmas break for me, that’s for sure, but I did manage to obtain a dedicated research assistant in AU, thankfully, to help with the visual aids. 

The topic will be Nanotechnology, and the Tools of Electronic Biological Warfare.  This will cover bio-photonics, optogenetics, teslaphoresis, synthetic biology, and the Bio-API material I have been covering here in a series of articles.  Despite there being a bunch of people out there all talking about this stuff I seem to be the only one I can find that is able to lay it all out in the proper context, and that needs to be done.
​
Preparing for this lecture will unfortunately take precedence over penning blog articles, so I apologize to my regular readers for that.  I will continue to follow certain developments however, and if something really important pops up I will give it a mention, but until this project is finished I am gong to have to devote a lot of attention to it.
 
When a final date is set I will announce it here, and for anyone not on the invite list, a replay will appear on Charles Kovess's Rumble channel 48 hours after.
 
Thanks for stopping by.
 
I wish everyone a Merry Christmas and I will see you again in the New Year.
 
In the meantime;
DO NOT COMPLY!
 
-John
6 Comments

Exposing the Bio-API - Part Six

12/8/2023

1 Comment

 
Before we jump back into it, a little related news:
 
NETWORKING NANO-BIOSENSORS FOR WIRELESS COMMUNICATION IN THE BLOOD
https://phys.org/news/2023-11-networking-nano-biosensors-wireless-communication-blood.amp
UhOh... Problems getting the signal through?  Bummer.
 
LED LIGHTS.
https://www.youtube.com/watch?v=5CyfrRNTKfM
Isn't it interesting that the Biden puppet recently outlawed incandescent bulbs.  Hmm, I wonder why.  Remember Li-Fi?  Optogenetics?  Bio-photonics?  If not, maybe you should look those terms up and see what they mean.  Because these LED bulbs just may be talking to some part of you that you depend on.
 
THE POLYCRISIS
https://www.zerohedge.com/geopolitical/polycrisis
Look left, now right, now up, now over there…  everywhere except where you should be looking.
 
EU MOVES FORWARD WITH DIGITAL ID DESPITE SECURITY CONCERNS AND POTENTIAL FOR ABUSE
https://www.zerohedge.com/political/eu-moves-forward-digital-id-despite-security-concerns-and-potential-abuse
Think about that picture on the back of every dollar bill, the pyramid with the all seeing eye at the top.  Take note of how there is a little gap between the bulk of the pyramid and the cap stone.  All of the WEF's key "stakeholders" are up top.  Its not as if they do not know their precious vaccines kill people.  Its not like the can't see the millions of people that fill the streets of London bitching about this or that. 
 
It isn't that the wheels of governmental bureaucracy turn slowly, or that the voices of millions of dissenters who protest every day, objecting to  the global agendas their supposedly elected leaders relentlessly move ahead with cannot be heard.
 
It's that they are not elected.  They are carefully SELECTED…  and they are all either well paid or appropriately blackmailed to ensure they turn a blind eye and a deaf ear to all of that.

 
DID BRICS JUST COVERTLY LAUNCH THEIR CBDC?
https://www.bitchute.com/video/8rZujYVffhFO/
I don't know for sure, but probably.

CBDC won't work unless they can also bulldoze the digital ID through as well. So they way you stop this is to refuse both. The people behind all these agendas are really obvious, even Putin, who is playing the role of a villain and a populist champion at the same time. Listen to Putin and he's defending rights, listen to US political tripe he's the devil. What I would remind this fellow of is:  Its all just theater.
 
Putin is a BRICS big dog, just like China, but everybody has skin in the NWO game, you see them putting on this show basically for you, so you think there are sides to this drama, and to encourage you to take one.
 
There is only you, "Joe Average" with average wallet size, and the globalists who are actively consolidating everything an obedient sheeple needs to comply with owning nothing and being happy (in front of their screens and video games, all medicated, dying from vaccines, and cheering for whoever is dropping bombs on people they don't know), SO THEY CAN DENY IT WHEN YOU GET OUT OF LINE!  That’s what all of this, including the current Gaza conflict, is.  It is a "hey, look at the right hand" trick while the left punches you in the nuts. 
 
Don't be a sucker and you won't get sucker punched.



Picking up where we left off in Part Five, (page 19) what I will be showing you next are the various ways in which the vulnerabilities inherent in this nanobiological interface can be exploited.  People who work in IT network engineering and cyber security fields will no doubt be much more familiar with a lot of these type of common exploits than I am, but the general concepts are not all that hard to grasp, and they really do not require very much explanation beyond what is laid out in these sections.
A. ATTACK TYPES IN NANONETWORKS
This section presents the possible attacks and existing proposals related to the nanonetworks. A summarization of security proposals for nanonetworks is presented in Table 6.
Picture
1) EAVESDROPPING
"Eavesdropping refers to passively listening to the transmission between two nodes. The listened information can be stored and later used maliciously to launch attacks. Eavesdropping in nanonetworks can take place when two legitimate nanomachines are exchanging messenger molecules and a nearby malicious nanomachine intercepts the messenger molecules silently. The passive eavesdropper can be detected in nanonetworks by a mechanism such as stochastic geometry, distance estimation techniques. The active eavesdropper might absorb the messenger molecules in the case where MC is used as a communication medium, this attack might be prevented through secrecy capacity. Other anticipated eavesdropping prevention mechanisms include beamforming, game theory (collation formation games), and artificial noise generation."
 
Here the discussion is around intercepting either actual molecules or data concerning their presence.  In mathematics, stochastic geometry is the study of random spatial patterns, so the discussion is about how available this information is to a potential eavesdropper (hacker) by analyzing things like an eavesdroppers proximity to the information exchange going on.  I am not sure what "secrecy capacity" refers to, possibly some sort of encoding that makes the information more difficult to decode.  Beamforming refers to methods that are available to limit the possibilities for data interception by focusing the communication much more precisely.  Coalition game theory, I believe, is a reference to subset of game theory which involves making deductions about who or where an eavesdropper might be based on his likelihood of belonging to a certain group.  Finally, artificial noise generation is just what it sounds like, obfuscating the target of an eavesdropping attempt by muddying up the information the hacker is able to access in some way.
 
The rest of this section cites a few specific proposals that have been offered about of how these approaches might be used to enhance security, but I don't see anything mentioned below that is new or necessarily bulletproof.
 
"Several proposals have been demonstrated to detect eavesdropper location and secure the nano communication paradigm from eavesdropping attacks.
 
Islam et al. [180] proposed a secure channel for Molecular communication. Firstly, a Diffie–Hellman algorithm-based secure key is exchanged between sender nanomachine and receiver nanomachine. Then hardware ciphering is performed using the secret key. As MC is a resource-constrained paradigm, therefore, Exclusive OR (XOR) cipher is used in this work due to its simple implementation and inexpensive computation. Moreover, hardware ciphering used in this work further reduces the associated time, instead of its software counterpart. The results are presented through simulation. In our opinion, the proposed method is simple and computationally less expensive but the overall security is compromised as MC needs more mathematically resilient models for security.
 
Guo et al. [181] have proposed a mathematical model for eavesdropper detection and localization in a random walk channel. This is the only work in MC that considers the detection of an absorbing malicious receiver in a random walk channel. The authors have chosen transmitter side detection of the eavesdropper because the MC channels are 1-D and receivers cannot affect the transmission and secondly the molecules absorbed at the receiver are quite small that do not aid in detecting eavesdropper presence. Simulation has shown accurate results in detecting the eavesdropper’s presence.
 
Recently a proposal for physical layer authentication for Diffusion Based Molecular Communication (DbMC) has been proposed in [182]. The channel impulse response of 1-D DbMC has been exploited to detect transmitting eavesdropper in the transmission region."
​

​2) BLACKHOLE ATTACK
"Blackhole attack refers to the attack where malicious nodes spread attractant molecules to draw the network traffic towards a different location from the intended target. Blackhole attack is similar to sinkhole attack in WSNs but the sinkhole attack disrupts the routing process while the blackhole attack physically moves legitimate nodes away from the target. When it comes to blackhole attacks in nanonetworks, there are a variety of approaches that can be taken. For example in a scenario of artificial immune system support application, the white blood cells that are responsible for detecting and tackling the infection, can be attracted by malicious nodes to stop them from detecting an infection in the host system."
 
The place my mind goes to whenever I read something like the section above in red is the converse of any given example.  Here the reader is supposed to think in terms of white hat motives, i.e. preventing a hacker from interfering with white blood cells that are trying to attack an infection, but turn that around and you have the opposite scenario; a hacker trying to CAUSE an infection.
 
Everyplace you look regardless of the literature you choose to read, everything being discussed is framed in terms of patient benefits and physician capabilities, but this tech has been weaponized, so what is really being discussed is how to protect the weaponry, how to make the weapon more effective, more accessible to criminals, etc.  You cannot just read it the way it is presented but rather one MUST consider two opposing intents for the use of this technology to see the whole picture.
 
"Blackhole attack and its countermeasure using two approaches, Bayes rule and simple threshold approach for MC have been proposed in [183]. Blackhole attacks are type of DoS (Denial of Service) attack in which nanomachines can be drawn away for target e-g in case of targeted drug delivery the actuator nodes might not reach the target due to Blackhole attack."
 
Ask yourself this:  Which situation is more likely to require a higher level of security?  A situation in which a hacker is trying to deliver a life saving medicine or the situation in which the hacker is trying to poison a target subject?  If the situation is one in which insulin delivery or uptake in a diabetic is blocked is blocked, the vulnerability of the diabetic is being leveraged to harm the diabetic.  This is how "life saving" capabilities become weapons in the blink of an eye.

3) SENTRY ATTACK
"Sentry attacks are opposite to Blackhole attacks where legitimate nanomachines are impeded away from the target, due to a large number of repellent molecules spread around the target location by malicious nodes. This kind of attack can be fatal in medical applications where instant lifesaving action needs to be taken e-g nanorobots that are designated to prevent bleeding by repairing veins are attacked by a sentry to impede from reaching the target. Sentry attack and its countermeasure using two approaches, Bayes rule, and simple threshold approach have been proposed in [183]. Giaretta et al. [183] have proposed a blackhole attack and sentry attack for MC. The authors have described two scenarios where (L-BNTs) Legitimate Bio-Nano Things are repelled from reaching the targeted site in targeted drug delivery application, thus keeping Bio-Nano Things from performing the normal operation. In the second scenario called black hole attack, M-BNTs (Malicious Bio-Nano Things) are attracted to the targeted site which can lead in a delivery unwanted dosage of medication in the targeted area.
 
Next, in the proposal, a countermeasure that enables the Bio- NanoThings to make decisions and cooperate in order to overcome blackhole and sentry attacks during target localization is proposed. The mechanisms are based on known cellular decision processes using Bayes’ rule as well as artificially designed genetic circuits that evaluate chemical signal threshold (this will be known as Thresholdbased decision process), which are both lightweight enabling them to be easily implementable on resource constrained Bio- NanoThings. Results show that the proposed countermeasure is effective against the attack, where L-BNTs successfully move towards the target."
 
What I hear being explained in the section above is how someone can potentially be "medically extorted" by a nanobio-hacker.

4) SPOOFED, ALTERED, REPLAY MESSAGE ATTACK
"This attack can be launched by malicious nodes by spoofing legitimate nodes identities to become trustable and enter the network. Furthermore, the malicious nodes then send fake messages in the network and alter the data. In the case of nanonetworks, consider an exemplary communication scenario where a legitimate node ‘Alice’ is transmitting messages to receiver ‘Bob’. Attack can be launched by an intruder ‘‘Eave’’ impersonates to be Alice and tries to control Bob by sending malicious commands.
 
A distance-dependent path loss based authentication scheme for nanonetworks using the terahertz band has been proposed in [184] for spoofing attacks. Rahman et al. [184] have proposed an authentication scheme for terahertz band EMbased nanonetworks. This work exploits physical layer attribute i.e., distance-dependent path loss for authentication at nano receiver. Moreover, an algorithmic solution has been proposed for the authentication scheme. Experimentation verification of authentication scheme via tera hertz time-domain spectroscopy setup at QMUL, UK."
 
This is where I begin to get very concerned, because this is the type of exploit I believe is being used to electronically torture those people known as "targeted individuals".  I have interviewed some of these folks, and the things they report happening to them can be truly shocking.
 
What I can tell you authoritatively about this is this type of exploit is it includes making of use of a persons own electroencephalogram patterns to harass them.  It has become known that anything your body and brain perceive is the result of electrical signals generated by your central nervous system.  These signals can be reduced to EEG patterns that can now be recorded and played back. 
 
What has also become known is the fact that your patterns are unique to you.  One cannot transmit a recording of someone else's EEG patterns to you and cause any reliable effect with that procedure, but if your own EEG patterns are recorded, something that is possible with all these embedded biosensors and associated medical data cloud storage, and then replayed by re-transmitting them back to you, something that is also possible with the same nanotech, then you will re-experience the recorded event JUST AS IF IT IS HAPPENING TO YOU ALL OVER AGAIN!  The target of such an attack is physically unable to distinguish between actual stimulus and simulated stimulus.
 
Now this makes for some really frightening scenarios.  If, for example, you are selected as a target, a handler, (which does not have to be a human being, many times this is accomplished with an AI program), will monitor you over a period of time.  During that time actual people may present situations, provide stimulus, or place you in certain situations you must react to, to ensure they are recording your EEG readings in various emotional states, under different levels of stress, whatever it is they want to use later.  If these recordings are then re-transmitted back to you surreptitiously, they can literally drive you crazy with them. 
 
They can force a person to re-experience whatever experience they have recorded as if it was happening all over again, which is what many targeted  individuals report.  Hallucinations, sounds… anything.  Instant fight or flight reactions can be induced over nothing and at any time.  So you can see how sinister a threat this can be if we are using this nanotech for medical monitoring on a widespread basis, and that is exactly what they are doing. 
 
File those recordings away with a unique identifier, in this case it is that Bluetooth ID the vaccinated all have, and some spook has an instantly accessible control file on you that allows real control over you. 
 
This is the capability they have been cultivating all this time and selling to everyone in the form of various benefits, like making the blind see, the lame walk, direct neuro-prosthesis control, early detection of diseases, and so on.
 
A distinct subset of these patterns also run your autonomic nervous system, so this would include the electrical signals that cause your heart to beat regularly or cause your breathing to be automatic.  All those bodily functions that you don't have to consciously think about are included as part of your autonomic nervous system.   Give a bad actor control over these functions and a bio-hacker can murder you and make it look like an accident.  They can cause a stroke, give you a disease, or induce some sort of mental psychosis that will drive you, unaware, into the psychiatric profession where you can be institutionalized.
 
Imagine the level of influence one could have over a head of state, were he to become compromised in this way through what he thought was a simple vaccination.  And these are exactly the sort of advantages pitched by people like James Giordano when he lectures on deploying weaponized IoBNT in intelligence applications.
 
Think this is not being used today?  Think again.  Giordano comes right out and admits it, without the slightest hesitation, even openly stating that the kind of manipulations made possible by synthetic biology is currently actively deployed and being used everywhere.

B. ATTACK TYPES IN BIO CYBER INTERFACE
"To ensure an end-to-end protection of IoBNT applications, the security of these bio-electronic devices is a prerequisite. In order to pursue a preliminary investigation for types of attacks that are possible in bio-electronic devices, the attack vectors are explored in related fields like WBAN. (Wireless Body Area Network) [28], IMD (Implantable Medical Devices) [178] and Wireless sensor networks [187]. This investigation has helped us to individuate attacks that are likely to occur in bio-electronic devices. The major objective of a bio-electronic device in the IoBNT healthcare application is to enable two-way communication between intra-body nanonetworks and healthcare provider. The communication mode is divided into two categories: inbound and outbound, making it easier to recognize and categorize attacks. Figure 6 presents possible attack types in case of bio cyber interface."
 
Are you paying attention?  I hope so.  They are talking about the abuse of wireless body sensor networks, the whole focus of another paper I mentioned in this post: 
http://estateartistry.com/blog/now-do-you-believe-me

Picture
1) EAVESDROPPING
"Eavesdropping is a passive attack that enables the attacker to covertly gain access to confidential information. The bio-electronic device might possess critical information like patient identification information, clinical history, disease detail, treatment detail, patient location, and battery status, etc. This confidential information can be exploited not only to breach a patient’s privacy, but also to launch other types of active attacks. Eavesdropping can be realized during the communication of bio-electronic devices with biological nanonetworks and during communication with the gateway devices.
 
Countermeasures:
Traditional networking paradigms employ encryption schemes like RSA and DES, to prevent against eavesdropping attacks. These encryption schemes are effective for the prevention of eavesdropping attacks, but these are computationally expensive and must be adopted after analyzing the resources of bio-electronic devices [188]. Lightweight encryption schemes like Elliptic Curve cryptography has been proven to be effective for resource-constrained devices [189], also a review on other lightweight encryption schemes has been presented in [190]"
 
Do you hear in this last paragraph how someone is already complaining about how difficult it is to protect this system with traditional encryption?

2) REPLAY ATTACK
"This type of attack can be launched after a successful eavesdropping attempt. The eavesdropped authentication sequence of the legitimate devices can be replayed to get illegitimate access into the communication channel. Moreover, an attacker can copy previously sent commands from legitimate users to replay the message again which in the case of bio-electronic can have a number of consequences like drug release multiple times which harm patient’s health, unnecessary and repeated queries for patients physiological values to engage and deplete the resources, etc.
 
Countermeasures:
Authentication schemes, Intrusion detection, delegate authentication to external devices. (See Section VI)."

 
3) MAN-IN-THE-MIDDLE (MITM) ATTACK
"A MITM attack is projected through illegitimate devices when they become part of communication between legitimate transmitting devices, and legitimate devices are spoofed to believe that they are communicating with the authorized device. In the case of bio-electronic devices, the attacker must be in the vicinity of the patient to launch the MITM attack. From the communication perspective, the MITM attack can be achieved by replaying the legitimate authentication sequence to get access to the communication channel. MITM is the type of an active eavesdropping attack where the attacker not only listens to the communication but also alters the data and communication sequence.
 
Countermeasures:

Traditionally MITM is prevented using encryption schemes. A lightweight scheme to prevent implantable medical devices from MITM attacks has been proposed that utilize chaotic generators for randomness and a signature algorithm to prevent third-party interference [191]."
 
Unfortunately, there is currently no encryption scheme that cannot be broken, which means there is no viable protection against this kind of exploit.


4) RESOURCE DEPLETION (RD)
"Bio-electronic devices are essentially capable of performing in-situ [77] operations and for this purpose they contain built-in processing unit, memory unit, and power unit. However, these units are only able to perform trivial tasks due to resource limitation in terms of space, power consumption and computation complexity, which comes with their minute size. The attacker can cause resource depletion by sending multiple authentication messages with the wrong credentials to occupy the processor. Each authentication request is processed which exploits the memory to create access logs and drains the battery. Moreover, bogus communication packets sent by MITM can utilize and drain the resources.
 
This sounds to me less like a hacker exploit and more like a way around limited nano resource limitations.

 
Countermeasures:
 Access control mechanisms, Anomaly detection system, user notification, and use of rechargeable batteries. Moreover, mitigation from resource depletion attacks can be achieved by using passive wireless communication media like RF signals and the use of novel energy preserving techniques like ZPD (ZeroPower Defence) [192]."
 
Again, I hear this paper discussing how to maintain control by overcoming the limitations of an underpowered nanobio network installation.  A LOT of what is covered in papers like this can be read two entirely different ways depending on what one considers "a potential problem" to be.  You must always think, "problem for whom?"


5) INJECTION ATTACKS  (<--HA! Pun intended???)
"Injection attack can be performed by the illegitimate users in three ways, insertion, alteration and replication [135]. In insertion attack, hacker generates new seemingly legitimate data packet into the communication channel. In alteration attack, hacker captures the data packet from communication link, tampers with the values of dosage commands from the inbound channel and alter the values of bodily parameters in the outbound channel. In replication attack, attacker re-sends previously executed commands into the system. Insecure communication between bio-electronic and gateway devices can result in an injection attack. This attack can have fatal consequences on the patient. For example in a scenario where a diabetic patient is fully dependent on wirelessly controlled insulin and glucose monitoring pump [73], the alteration in dosage values received from health care provider can result in hazardous consequences like underdose can cause hyperglycemia and overdose can result in hypoglycemia both of which can be fatal [193].
 
Countermeasures:
Careful mitigation strategies are needed to be designed which include authentication protocols [194], access control mechanisms [178] Intrusion Detection, Input validation, and Authorization techniques."
 
In other words… they don't have any countermeasures for this yet.
 
6) DEVICE TAMPERING
"This attack is majorly launched in the bio-electronic devices by local attackers, due to low transmission range of bio-electronic devices. The device can be reprogrammed or physically replaced to perform the malicious tasks that are not intended by the device in the first place. This attack can also be launched by accessing the device remotely by sending fake firmware update and device upgrade message that alter the software configuration of the device to perform maliciously [195]. This attacker can alter the original treatment prescribed by the healthcare provider and replace it with false treatment which can cause life threatening consequences.
 
Countermeasures:
Tamper proofing and self destruction, device hardening, and Physically unclonable Function (PUF)."
 
Yeah, keep talking.  Not buying it.


7) DENIAL OF SERVICE (DOS) ATTACK
"Denial of service attack causes disruption and blockage of information flow between legitimate communicating parties. An attacker tries to suspend services of the bio-electronic device to make it unavailable for communication and processing. DoS can be launched in the form of any of the above-mentioned attacks. The DoS attacks such as battery drainage, sleep deprivation and outage attacks can be performed by hackers after getting access to the devices. As the power source of these devices is limited and attackers can send an unlimited number of messages, causing the battery to drain. In outage attacks the device can be made unavailable by stopping it from carrying its essential functions, behaving abnormally or premature shutdown. These types of attacks can pose serious consequences for the patients [135]. Moreover, the hacker can intentionally drop the forwarded packets, making the recipient deprived of requested data.
 
In other words, say a person is compromised such that medically they need something regularly to survive and that thing is delivered electronically.  All ya gotta do is interfere with the delivery of whatever that life saving thing is, and they go poof.
 
Countermeasures:
 Intrusion Detection."
 
 (Go Onnn… How?  Oh sorry, you got nothin)

8) MALWARE ATTACKS
"Malware attack is another type of network attack that is common in IoT based applications. Malware attack is used to remote control a distant device maliciously, steal sensitive information from a device and use it to launch further malware attacks. A system infected with malware attack may start running certain programs automatically like sending messages, re-configuring internal software and turning of anti virus. In case of IoBNT application an infected bio cyber interface might start dispensing inappropriate amount of drugs, thus causing harm to the patient. Some of the popular malware attacks that are still active in IoT environments are Mirai, Echobot, Reaper, Emotet, Gamut and Nucer [196]. There different types of malware attacks, but malware attacks specific to IoBNT applications can be botnets, rootkit, ransomware, and keylogger attack.
 
Botnets: In this type of attack, attacker gains access to a number interconnected devices by launching malware and further control them to steal information, launch DDoS (Destributed Denial of Service) attack to launch unplanned system downtime and even sell network access to other cyber criminals.

Let's get real for just one moment, pull back from the microscope and recall some of the more "Macro" sized  crimes we all saw recently.  Could this botnet model also be used to describe the act of capturing a whole bunch of government regulatory agencies to enable a bunch of criminals to deny you of your right to bodily autonomy?
 
Ransomeware: The attacker gets hold of the device by encrypting user’s data and locks the device, thus, restricting access of the owner to the device. The attacker than demands for some ransom amount by displaying messages on the device screen.
 
And if the device in this example is your body…?
 
Keylogger: It is a malicious piece of code that records the keystrokes of user to gain access to ID and passwords. This attack is dangerous than brute force attacks and strong passwords does not provide protection against this malware.

Kind of sounds like what happened when you were told you were getting a life saving vaccine when what was really happening is you were injected with a whole swarm of nano sized biosensors that could record your EEG keystrokes.  
 
Rootkit: A malicious piece of code is installed on IoT device that hides its identity to steal data, reconfigure the device, or control the system by executing malicious commands. This kind of attack is most dangerous as it bypasses all the security mechanisms and successfully hides its presence.

Now we're talkin!  Something malicious is installed on an IoT device, meaning you, that steals your health by re-configuring your immune system function and thereby taking over your bodily systems and forcing them to execute malicious commands that disable you.  Well, well, well… If that ain't just the perfect description of a vaccine bio-weapon I sure as hell don't know what is!
 
After all what is a booster shot if not the latest malware update, eh?

 
Countermeasures:
Access control, device hardening and system monitoring, Antivirus, Intrusion Detection. (See Section VI)."
 
Access control             =    "Your account has been suspended for violating TOC's"
Device hardening        =    "That’s all conspiracy theory"
System monitoring     =    "Don't read that without the proper context"

Antivirus                      =    "Safe and effective"
Intrusion Detection    =   
"That’s all mis/dis/mal information."
​

All these brave new medical advantages just keep sounding better and better, don't they?  Don't be surprised if one day someone refers to the message below as "The Blue Screen of Health."

Picture
9) FIRMWARE ATTACKS
"Firmware updates are necessary in order to ensure proper device functioning. The firmware updates can be done remotely or directly(through usb port). An advertisement is usually broadcast on the network whenever a new version of the firmware update is available. Hackers can send false firmware update requests to the users in order to access the firmware and program it with malicious code. Fake firmware updates can cause fatal consequences to the patients.
 
Countermeasures:
Firmware Encryption, periodic firmware updates, malicious firmware detection."

 
C. SUMMARY ON THE SECURITY OF IOBNT
"The protection of IoBNT based systems is crucial as the consequences of security compromise can be detrimental. A summarization of existing security proposals for nanonetworks is presented in Table 6. Apart from the software attacks mentioned in the above section, there exist some other attributes can effect the security of IoBNT. The origin from where the attack has been instantiated can help in providing some insights into the profile and goals of the attacker. Local attacks require the attacker to be close to the physical location of the patient. Local attackers can replace the bio-electronics device with a maliciously programmed device, can eavesdrop the communication between bio-electronic devices and gateway devices to gather information to launch an active attack remotely. Remote attacks are launched outside the premises of the bio-electronic devices. These attacks can be launched by accessing the smartphone of the patient that is delegated a gateway device, to send malware and reconfiguration requests to reprogram the device. In wireless communication, attackers can evade the system in two possible ways: active and passive. Passive attack is launched by an attacker silently without revealing their presence in the system. A passive attack can violate the privacy of the patient and can reveal confidential information about the device.
 
By just intercepting the communication, a passive attacker can gather information like the patient’s location, diagnosed disease, type of treatment, etc. This information can be used to further mount active attacks. Active attacker not only enables the attacker to read the transmission but also uses this information to disrupt the communication. The active attacker can modify the messages in transit, drop the messages so they do not arrive at the destination, block the communication, reprogram the device and even induce a shock to the patient by manipulating the device. As the major application of area of IoBNT is bio medicine, therefore, breach in security means life threatening consequences."
 
Still think this is all impossible?  Here is an example of the worst kind of hacking described in this paper already becoming a real problem.  


PWNING ELECTROENCEPHALOGRAM (EEG) MEDICAL DEVICES BY DEFAULT
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pwning-electroencephalogram-eeg-medical-devices-by-default/
 
Key Takeaways:
Default credentials, while written off by the vendor in this case as seldom used and unnecessary to change, can lead to the exploitation of active directory environments.
 
The way NeuroWorks configures their EEG Software initially leads to a high likelihood of out-of-the box remote code execution.
 
If an administrator changes the default password, the software will not function properly, thus the vendor recommends not changing the default password.
 
Multiple host machines with the EEG software installed suffered from this vulnerability, allowing an emulated threat actor to obtain remote code execution on each host machine as a local user, and privilege escalate to obtain domain user credentials.
 
Depending on the environment, domain users who login to these machines could potentially have their credentials stolen, and with specifically assigned domain permissions – lead to a much larger compromise in the active directory network.
 
There’s a high probability of operating systems with Neuroworks Natus EEG Software installed lacking antivirus or endpoint detection response measures, making it a valuable target for threat actors to gain a foothold while trying to maintain network persistence.


Hacking Countermeasures my ass!
Nobody is working all that hard to secure your biology.

 
The ability to able to maliciously hack your biology
was all this type of research has ever been about!



Next up in Part Seven:
VI. Potential Mitigation Strategies



If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:

http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
​http://estateartistry.com/blog/cure-your-cancer-by-christmas
1 Comment

A Good Man, A Champion, Needs You

12/3/2023

0 Comments

 
Jonathan J. Couey is a fellow WARRIOR.  He is a PhD that works at Children's Health Defense, and he is fighting evil, for you.  He just lost his best friend, like just now, to a sudden brain aneurysm.

Let him know you are behind him.  That he is not alone.

[email protected] 

​The condolence note I sent him is below:

"We are very alike JJ.  You are a champion.  The world needs champions.  I fight this evil every hour of every day and it's not enough, but together there are enough people like us out there, and together, we can vanquish it. 
 
Believe it, know it… Act "as if" and you can manifest, with sheer will, that which you need.
 
My own brother is in the hospital right now having parts of him lopped off because he refused to listen to me.  He will die within a cpl years, followed by his wife and my two young nephews.  I have seen this before, and see it more and more.  I have two best friends, both have dying parents.  One has been to three family member funerals this year.  It's not my fault, nor is your best friend's passing your fault.  Never let your mind go there. There is nothing more you could have done.  Nothing would change this.  Guilt will not bring them back.  These things happen for a reason.  Lessons are being given.  You either receive them, or ignore them.  
 
God gives each one of us what we need to do the best job we can at whatever it is we are doing.   He can be brutal sometimes.  You have to understand how to take a beating like that and turn it into fuel.  He is not trying to destroy you.  He is helping you destroy those that mean to do you and the rest of his children, your friends children, harm; because you can.  He didn't take a friend.  He gave you a sword.
 
Because in your hands it would do the most good.
 
Take time to grieve, but then go out and swing it with the righteous and divine fury of the Lord!
 
(Know that when you do I will be there at your side, without fear, and proud to be there.)"
 
-J

​
0 Comments

Brain Science: The Mind Is Useless If The Eyes Are Blind

12/1/2023

1 Comment

 
Today I am going to give you a scary look behind the "National Security" curtain, but not to scare you.  These are things you need to know.  I share them to empower you.  

First imagine the most evil character you can, a person hopelessly devoid of any redeeming qualities. A completely lost soul, incapable of empathy, and for whom there is no possible path back to anything resembling humanity.

Now imagine the kind of thing that would give such a character wet dreams. 

Most people cannot come close to what this might include.  What I want you to think about, is what would happen if a person like this devised a way to acquire capabilities that could give him practically unlimited power and control over others.  A power he would be inescapably compelled to utilize.  Capabilities that would enable him to mangle the entire civilized world, to flog it, mercilessly, into a form he would truly enjoy.
I am not suggesting there is a guy out there like this. 

​What I am telling you,
is that there are many of them. 
​
What you are about to see is one guy, that is going to explain what they have been working on, secretly, and rather expertly.  A carefully organized plan that includes the powers I just described, that has been unfolding right under your nose and on schedule, for the last hundred and twenty YEARS! Because it has taken that long to create what was needed to make this possible, cover their tracks, set boundaries that would limit what entire fields of science were allowed to pursue, and to also create the perfect situation in which to finally bare their teeth.

And if we allow them to succeed, by continuing to underestimate their abilities as we have been doing all this time, justifying our tolerance of the intolerable by thinking such a plan must surely be impossible, they will, very soon, with the just the flip of a switch,
 take most everything they want from anyone that has it. 

They have the means now, to be 
invincible.  Just a few more moves left in this game before the big shocking realization that that we are trapped and cannot escape, that will move us all past a point of no return. 

Please do not scoff at this.  I have mountains of proof this is real.  Help me drag this operation, and them, into the light of day, and stop this runaway train.

BRAIN SCIENCE FROM BENCH TO BATTLEFIELD:
THE REALITIES AND RISKS OF NEUROWEAPONS | CGSR SEMINAR
https://www.youtube.com/watch?v=aUtQbriWt64
This is a 2017 presentation by James Giordano at Lawrence Livermore National Laboratory’s Center for Global Security Research (CGSR). He elaborates on how neuroscience can be weaponized and used in warfare.
 
Meet "Slipping Jimmy" Giordano.
 
This guy is a classic example of what a hyper-Machiavellian, pathological lying psychopath looks like…
Picture
AND SOUNDS LIKE!
 
The first lie he told was in his opening remarks, where he began by gently chastising YOU for what he internally views as childish over reactions, before feigning what I think is the worst ever impression of a guy trying way too hard to sell you his custom personality cloak of self-effacing humility, by reminding you, reassuringly, not to worry, because: "We don't know what makes you, you".  After which, he then goes on at great length and excruciating detail, explaining exactly how he can make you into anything he wants to for the next hour, adding that this currently viable form of brain hacking that he is so proud of is not only out of the beta stage, not only lethally effective, but that it is:

"without a doubt, actively deployed and in use today, everywhere, internationally".

Don't  let his calm demeanor and poker face fool you.  This behavior is a typical "tell" that betrays the level of insanity, inhumanity, and the total absence of empathy that defines all psychopaths. 
 
You see, "Slipping Jimmy" Giordano chose that opener with ice-cold, calculated care, for its manipulative utility, and delivered his lines as all high functioning psychopaths stereotypically do, but he also simultaneously demonstrated how acute psychopathy presents itself with an irresistible display of high stakes gambling behavior. 
 
What's the bet? 
 
He is wagering that nobody will notice
it is this very capability he is there to explain which makes his first statement the lie that it is. 
 
In other words, it doesn’t matter what you were before he fucks with you, using all this torture tech he loves to create for the torturers that pay him to figure out the nuts and bolts of how to do it, because nobody cutting the paychecks that fund this shop of horrors ever placed any value on that whatsoever. 

It's what kind of "you" they can force you to be that matters here, confirming the thing I always say that should never be forgotten, no matter what the area of research is:

"Once a thing can be utilized as a weapon, that is the only thing it will ever be"

This is simply high tech eugenics.  Always has been.
 
This man should be jailed immediately, but preferably shot dead.

As you listen to his lecture, pay particular attention to "Slippin Jimmy" Giordano's content (not his presentation of it)  He is a textbook example of a high functioning psychopath.  Work backwards from his material and you will discover, as I did, that doing so will massively reduce a huge pile of research bulk into a manageable list of key bullet points.

Then go back to whatever you have collected yourself and evaluate it for relevance, and to see if any of the random puzzle pieces you think are important intersects solidly with it and your focus will be where you need to be. The tenants of apophatic inquiry should guide your critical thinking, not the presence of any presenter. 

Giordano's character flaws make him a weak link.  Use that.  And use HIM.  He did me a huge service by  summarizing the mountain of documentation that was paralyzing me.  He did the work I was struggling to do, and did a masterful job of it.  I could make a similarly brilliant presentation of my own simply by pressing the pause button frequently, and talking over him, and I may in fact do exactly that.  

Read between his lines. Understand that his true role in this is organizational, that he is the prize "pitchman", and you will then have the biggest picture there currently is. 

When you are trying to place a value on some piece of information you must first figure out where that puzzle piece fits.  If there is "no clear fit" what you have is something of low importance, a misdirection, false narrative, diversion, time suck, etc.  Some fringe things fit, but many don't.  Some things you may be spending way too much time on are simply failed explorations, mental floss, or suppressive fire.
 
Remember: 
A PhD is an inch wide and a mile deep.  You don't need to be one to understand this.  In fact, its better to be an inch deep and a mile wide.
 
But to effectively explain it to others, you need to be 50 miles wide, and ferry people across this trench by honing your own ability to pole vault over craters of disinformation like a ninja, without looking down, or backwards.  Some rabbit holes need to be back filled with cement. 

Over explaining, over citing, obsessing on supporting documentation… everything good researchers do when they prepare a lecture, in this case, will ruin your case delivery, because it leads to intractable debates that serve a very real operational intelligence security function.  Those debates (i.e virus/no virus, medical literature, environment, economics, politics, ethics, healthcare for all, biosecurity, et.al.) are intentionally placed obstacles designed to thwart or derail the efforts of anyone trying to expose the real agenda, the vision, the motivation, ultimately, the end points of it all. 
 
They are distractions that you should  recognize, and
rightfully treat, as the armor plating around the core operation.
 
Mousey protests and activism that results in activists being satisfied when they hear people asking the right questions is completely ineffective.  


Don’t question.  ACCUSE!  There is more than enough evidence.
 
In other words, what distinguishes a "truth warrior" from a "truth WAR-LORD" is this:
 

The war-lord never wastes time trying to make dents in this armor when planning his attack strategy against such an elite and overly prepared class of criminals. 

The War-Lord's goal is penetration.

I sincerely hope seeing this lecture will rattle a bunch of you "sleeping people" awake.

For those of you who are awake,
my hope is that it will make you mad enough to take some decisive actions.

PSYCHOPATH KLAUS SCHWAB HAS A WARNING TO THE WORLD
https://www.bitchute.com/video/Fx2DGjeMLizW/
So here we have a quick recap of something "Col. Klinck" tipped us off to a while back:  "The covid-19 crisis would be seen as a small disturbance compared to a comprehensive cyber attack."
 
You might think you know what he's talking about.  Back when he said this I thought I did, but considering what I have learned since then, today I look at this a bit differently, and I would encourage you to do the same.
 
Back then, given the overbearing "Russian Man Bad" narrative they were pushing, we were all encouraged to believe what he was referring to was a Putin-inspired hack attack on the power grid, or the internet, or both, and that our reliance on these things would be the end of us all were they ever disabled.  They even gave this a name if you recall: "cyberpolygon". 
 
However that was all before myself and others let the Bio-Nano Electronic Warfare cat out of the bag.
 
You have to always remember that while these psychopaths love to telegraph their moves and laugh behind closed doors about how we are all so stupid that they can openly disclose their intentions and it will go right over our heads, they also relish tricking us with misdirections.  They want us looking away while they skulk about in other areas and advance different aspects of multiple coordinated agendas.
 
What I now think our favorite Nazi is referring to is a biological cyber attack.  It makes sense, doesn't it?  Now that you are starting to become aware of all the things they have been doing under the guise of diagnostic medical devices that are supposed to save us all from the next covid-esque surprise, all this time they have been doping us all with graphene vaccines, medical injectables, foods, etc.
 
The ultimate control they hope to obtain over the populations of the world has always been a thing they intended to exercise covertly, with synthetic biological nanotech, and they have managed to do this right under our noses.  While everyone was duly aware of being chipped, we were expecting actual chips, and only the most stupid people were opting into that idea as a novel way to buy a latte or open a door.
 
When you consider what is now possible to do to a person that has become vulnerable to the weapons of under-the-skin bioterrorism, the scamdemic probably would seem like a small disturbance in comparison to electronically causing that sudden death syndrome everyplace in everyone they consider to be expendable.
 
Depopulation?  Mission easily accomplished.


Sound Sleepers Suck


If I had to summarize ​the level of psychological maturity that characterizes sleepers; the truth is that these people we are surrounded by are children, capricious brats terrified of disobeying "authority" figures, who feel they would lose everything, such as their "self-esteem" (which they clearly don't have) if they tried to do so.
 
This is my point.  There are very, very few true adults around.  People don't really want to grow up because they have not had to.  They are technically considered to be adults, but they are are actually selfish children with practical experience, and the system we all live in is a playground/cage for these children, where functional game rules are imposed in such a way that "validations" from "authoritative" figures have to be competitively fought for without scruples.
 
I believe that the problem stems not only from their level of education, (more aptly described as their level of indoctrination), or cognitive sophistication, but can also be due to the level of awareness and courage that someone has, or believes they have.
 
The system is founded on encouraging support of everything except those valued maxims that would bring it to its knees, namely truth and justice.  The system works in such a way as to make it inconvenient, even repulsive, to integrate these characteristics into oneself.
 
Selfish "adult" children are raised to value lying, and to believe in "mors tua vita mea" (A Latin expression that means "Your death, my life".)  It is considered the law of the jungle, and is used in competitions where only one winner can be chosen.)  If we consider the phenomenon of feral children, we can see the degree of (persistent) mental conditioning to which human beings can be subjected, which then becomes the limit of one's horizons.
 
We are dealing with a mass of selfish, capricious, evil little shit kids, who all have one over-arching character flaw in common -- Cowardice.
 
Our ruling class are another thing entirely, and the best descriptive term I can think of to embody their collective behaviors is Self Absorbed Predation:  A complete focus on oneself to the exclusion of the rights and liberties, and in fact, the very personhood, of those around them.

To be so self-absorbed is to embody an unhealthy mix of the dark triad of traits: Narcissism, psychopathy, and Machiavellianism, and such individuals do not see other people as an end, but as a means, meaning they see others as mere objects to be used, rather than subjects to be connected with.  They need not concern themselves with any sort of obligatory stewardship roles, for those they consider beneath them neither deserve nor demand basic human dignity.


Who are "They"?

To answer that question I will, once again, strongly recommend you take this clip in, frequently, to help you see "them" more clearly:


Dr.SHIVA™: SHATTER THE SWARM. How The Few Control the Many.
https://www.youtube.com/watch?v=OEkgZtu_Q2Q
This is a BRILLIANT 15 minute whiteboard presentation that explains the hidden hand that is so hard for people to see by explaining its organizational structure. 

Its not a pyramid or club, it is a self-reinforcing swarm.  I am not promoting anything but this presentation, you cannot miss the message.  Even normies get it super quick.  It's an A-HA experience for everyone that is way more powerful even than Jones Plantation.
​
I have one more brutally blunt, but perfect answer, to a very hard question. 

JJ COUEY EXPLAINS CONTROLLED OPPOSITION BEHAVIOR
https://www.bitchute.com/video/bbuvc9LL181M/
Please listen to Jonathan Jay Couey, PhD explain the behavior of people who you see talking all the time, faux activists that carefully avoid certain topics, earning the suspicion those of us with a superior degree of awareness have about them; the people we notice that are curiously just as shifty as they are believable, that we accuse of being agents of "controlled opposition".  This is a long roster of names that is sure to include people you follow, and possibly even some you foolishly trust.
1 Comment
    Click here to E-Mail me

    Author

    John Lukach - Former slave

    PayPal canceled my donation account!
    The information I provide here and in my book can save your life.  If it did, or you just want to support my efforts, please download CashApp and send a cash donation to me with the hash tag:
        $Had Enough Yet

    No pressure.  But if you do that, THANKS!

    Archives

    January 2025
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    March 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    September 2019
    July 2019
    March 2019
    November 2018
    October 2018
    June 2018
    February 2018
    January 2018
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    January 2016

    Categories

    All

    RSS Feed