๐Ÿšจ Pentagonโ€™s Lost Playbook ๐Ÿ“‚๐Ÿ•ต๏ธโ€โ™‚๏ธ Declassified Defense Science Board Files (1982โ€“2000) Reveal PSYOP, Cyber War & Secret Tech Agendas – Public Version

“๐ŸŒ Dive into the shadows of the Trump-Putin Alaska summit with this cinematic snapshot, revealing insider whispers and the leaked Brussels memorandum’s chilling secrets. Unlock the full story at berndpulch.org, exclusively for Patreon supporters, as of 02:00 PM CEST, August 25, 2025. #ArcticEcho #AboveTopSecret #BerndPulchOrg”

๐Ÿšจ ABOVE TOP SECRET โ€“ LEAKED DOSSIER ๐Ÿšจ
๐Ÿ“‚ SOURCE: Insider Insights from Declassified Archives
๐Ÿ”’ CLEARANCE: PUBLIC ACCESS
๐Ÿ“… DATE: August 25, 2025, 02:15 PM CEST


๐Ÿงจ EXECUTIVE BRIEF

Uncover a fascinating glimpse into the past with this report, compiled at 02:15 PM CEST on August 25, 2025, based on recently declassified Defense Science Board (DSB) studies from 1982โ€“2000. These once-hidden Pentagon documents reveal how U.S. military strategists shaped the future of warfare, technology, and influence. ๐ŸŒ This public version offers a teaser of the secrets withinโ€”join our Patreon for the full story! ๐Ÿ•ต๏ธโ€โ™‚๏ธ


๐Ÿ” KEY HIGHLIGHTS

  1. Tech Foundations
    Early studies from the 1980s recognized the critical role of microchips in national security, laying the groundwork for todayโ€™s global semiconductor race. ๐Ÿ’ป
  2. Mind Games Ahead
    A 2000 report explored how information could be used to shape perceptions, hinting at the roots of modern information warfare long before social media. ๐Ÿ“ฐ
  3. Cyber Awareness
    A 1996 document flagged network vulnerabilities, showing U.S. planners were ahead of the curve on what we now call cybersecurity. ๐Ÿ”’
  4. Space & Power
    Plans for advanced weapons and space systems from the 1980s and 1990s mirror todayโ€™s cutting-edge military tech, including hypersonic developments. ๐Ÿš€
  5. Private Sector Role
    A 1996 study on outsourcing foreshadowed the rise of private contractors in defense, a trend dominating today. ๐Ÿ’ผ
  6. Biometric Beginnings
    A 1995 report on DNA technology suggests early experiments in identification that could extend to military uses. ๐Ÿงฌ

โš ๏ธ INSIDER TEASER

An anonymous source calls these documents a โ€œblueprintโ€ for todayโ€™s military priorities, from AI to space, hinting at a deeper story yet to be told.


๐Ÿ“Œ WHY YOU SHOULD EXPLORE MORE

These archives arenโ€™t just historyโ€”they predicted todayโ€™s conflicts. ๐ŸŒ The public version scratches the surface, but the full index and raw files are locked away.

  • Exclusive Access: Unlock detailed reports, classifications, and more with a Patreon subscription.
  • Support the Cause: Join at https://www.patreon.com/berndpulch to fuel our mission of uncovering truth.

โ“ CURIOUS FOR MORE?

  • What secrets hide in the full files? ๐Ÿค”
  • How did these plans shape our world? ๐ŸŒ
  • Subscribe now to find out!

๐Ÿ” APPENDIX โ€“ PUBLIC PREVIEW

  • Study Snapshots: Brief looks at key reports from 1982โ€“2000.
  • Next Step: Become a Patron for the complete archive!

๐Ÿ”— Join Now: https://www.patreon.com/berndpulch for full access and updates.


๐Ÿงจ #AboveTopSecret #LeakedDossier #PulchIntelligence #JoinPatreon #BerndPulchOrg

Snapshot of Page 1

Text Content:
“DEPARTMENT OF DEFENSE
OFFICE OF THE SECRETARY OF DEFENSE/JOINT STAFF
FREEDOM OF INFORMATION

1155 DEFENSE PENTAGON
WASHINGTON, DC 20301-1155

Ref: 25-F-3093
August 18, 2025

This is a final response to your April 26, 2025 Freedom oflnformation Act (FOIA) request,
a copy of which is enclosed for your convenience. The Office of the Secretary of Defense/Joint
Staff (OSD/JS) FOIA Requester Service Center received your request on April 28, 2025, and
assigned it FOIA case number 25-F-3093. We ask that you use this number when referring to your
request.

The Defense Science Board, a component of OSD, conducted a search of their records
systems and located 1 document, consisting of an Excel spreadsheet, determined to be responsive to
your request. It has been determined that this document is appropriate for release in its entirety,
without excision.

This constitutes a full grant of your request and closes your case file in this office. There are
no assessable fees associated with this response.

Should you wish to inquire about mediation services, you may contact the OSD/JS FOIA
Public Liaison, Virginia Burke, by email at osd.mc-alex.oatsd-pclt.mbx.foia-liaison@mail.mil or by
phone at 571-372-0462. You may also contact the Office of Government Information Services
(OGIS) at the National Archives and Records Administration to inquire about the FOIA mediation
services they offer at: email at ogis@nara.gov, or phone at 202-741-5770 or
1-877-684-6448.

You have the right to appeal to the appellate authority, Mr. Michael Kremlacek, Acting
Principal Deputy to the Secretary of Defense for Privacy, Civil Liberties, and Transparency (PCLT),
Office of the Secretary of Defense, at: 4800 Mark Center Drive, ATTN: PCLFD, FOIA Appeals,
Mailbox #24, Alexandria, VA 22350-1700. Your appeal must be postmarked within 90 calendar
days of the date of this response. Alternatively, you may email your appeal to
osd.foia-appeal@mail.mil. If you use email, please include the words “FOIA Appeal” in the subject
of the email. Please also reference FOIA case number 25-F-3093 in any appeal correspondence.
,”

Snapshot Description: A formal letter from the Department of Defense’s FOIA office, including the department logo, address, reference number, date, and the body of the response detailing the FOIA request processing and release of an Excel spreadsheet. Signed by Pamela Andrews, Chief, FOIA. Enclosures noted as stated.

Snapshot of Page 2

Text Content:
“If you have any questions or concerns about the foregoing or about the processing of your
request, please do not hesitate to contact the Action Officer assigned to your request, Andrew
Thomas, at andrew.m.thomas54.ctr@mail.mil or 571-372-0418. Additionally, if you have concerns
about service received by our office, please contact a member of our Leadership Team at
571-372-0498 or Toll Free at 866-574-4970.

Sincerely,

//๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
u1โ€ฆ. Pamela Andrews
{)
Chief, FOIA

Enclosures:
As stated”

Snapshot Description: Continuation of the FOIA response letter, including instructions for questions, contact details for the Action Officer and Leadership Team, a signature line for Pamela Andrews (with a handwritten signature), and enclosures notation.

Snapshot of Page 3

Text Content:
“Date Published
Report Title
DTIC Number
Classification/Releasability
Jan-82
University Responsiveness to National Security Requirements
ADA112070
Publicly Released
Feb-82
Very High Speed Integrated Circuits (VHSIC) Program
ADA117238
Publicly Released
Mar-82
Defense Nuclear Agency Technology Base Program
ADA199796
Publicly Released
Apr-82
Operational Readiness with High Performance Systems (1981 Summer Study)
ADA120223
Publicly Released
Aug-82
Training and Training Technology (1982 Summer Study)
ADB096094 (CAC required)
CUI, Distro C
Oct-82
Mapping, Charting and Geodesy
ADA199738
Publicly Released
Nov-82
Training and Training Technology (1982 Summer Study)
ADA127596
Publicly Released
Nov-82
AUTODIN II
ADA127476
Publicly Released
Feb-83
Application of High Technology for Ground Operationsโ€“Final Report: An Assessment of United States Army High Technology Test Bed
ADA127449
Publicly Released
Jun-83
Industry-to-Industry International Armaments Cooperation, Phase Iโ€“NATO Europe
ADA134131
Publicly Released
Aug-83
Joint Service Acquisition Programs (1983 Summer Study)
ADA199739
Publicly Released
Aug-83
Transition of Weapons Systems from Development to Production
ADA135049
Publicly Released
Jun-84
Industry-to-Industry International Armaments Cooperation, Phase IIโ€“Japan
ADA145095
Publicly Released
Nov-84
Improved Defense Through Equipment Upgrades: The U.S. and Its Security Partners (1984 Summer Study)
ADA151862
Publicly Released
Dec-84
Military Applications of New-Generation Computing Technologies
ADA152154
Publicly Released
Jun-85
Journal of Defense Research (JDR)
ADA199457
Publicly Released
Aug-85
Final Defense Data Network
ADA162888
Publicly Released
Mar-86
Practical Functional Performance (1985 Summer Study)
ADA170961
Publicly Released
Mar-86
Small Intercontinental Ballistic Missile Modernization
ADA173675
Publicly Released
May-86
Conflict Environment: Implications of Third World Urban Involvement
ADA171677
Publicly Released
Jun-86
Defense Nuclear Agency Management
ADA171578
Publicly Released
Aug-86
LHX Requirements
ADA173696
Publicly Released
Jan-87
Use of Commercial Components in Military Equipment (1986 Summer Study)
ADA180338
Publicly Released
Feb-87
Defense Semiconductor Dependency
ADA178284
Publicly Released
Jul-87
Command and Control Management
ADA188811
Publicly Released
Aug-87
Technology Base Management (1987 Summer Study)
ADA188560
Publicly Released
Sep-87
Military Software
ADA188561
Publicly Released
Dec-87
Technology Base Management (1987 Summer Study)
ADA196469
Publicly Released
May-88
Computer Applications to Training and Wargaming
ADA199456
Publicly Released
May-88
Strategic Air Defense (SDI Milestone Panel)
ADA200164
Publicly Released
Sep-88
National Aerospace Plane (NASP)
ADA201124
Publicly Released
Oct-88
Military System Applications of Superconductors
ADA201125
Publicly Released
Oct-88
Defense Industrial and Technology Baseโ€“Volume I (1988 Summer Study)
ADA202469
Publicly Released
Dec-88
Image Recognition Systems
ADB132930 (CAC required)
CUI, Distro E/Export Controlled
Dec-88
Defense Industrial and Technology Baseโ€“Volume II, Subgroup Appendices (1988 Summer Study)
ADA212698
Publicly Released
Jun-89
Use of Commercial Components in Military Equipment
ADA274729
Publicly Released
Oct-89
Defense Industrial Cooperation with Pacific Rim Nations
ADA216021
Publicly Released
Dec-89
Improving Test & Evaluation Effectiveness (1989 Summer Study)
ADA274809
Publicly Released
Mar-90
National Space Launch Strategy (1989 Summer Study)
ADA274781
Publicly Released
Nov-90
Research and Development Strategy for the 1990sโ€“Volume I, Executive Summary (1990 Summer Study)
ADA275358
Publicly Released
Nov-90
Research and Development Strategy for the 1990sโ€“Volume II, Scenarios & Intelligence Task Force (1990 Summer Study)
ADA274796
Publicly Released
Nov-90
Research and Development Strategy for the 1990sโ€“Volume V, Technology & Technology Transfer Task Force (1990 Summer Study)
ADA274681
Publicly Released
Nov-91
Weapon Development and Production Technology (1991 Summer Study)
ADA274224
Publicly Released
Jun-92
Microelectronics Research Facilities
ADA274529
Publicly Released
Nov-92
National Aero-Space Plane (NASP) Program
ADA274530
Publicly Released
Jan-93
Simulation, Readiness and Prototyping: Impact of Advanced Distributed Simulation on Readiness, Training and Prototyping (1992 Summer Study)
ADA266125
Publicly Released
Feb-93
Aircraft Assessment
ADA274531
Publicly Released
Mar-93
Engineering in the Manufacturing Process (1992 Summer Study)
ADA266366
Publicly Released

Page 1 of 3 pages”

Snapshot Description: An Excel spreadsheet listing Defense Science Board reports from 1982 to mid-1993, including columns for Date Published, Report Title, DTIC Number, and Classification/Releasability. Many are marked “Publicly Released,” with a few requiring CAC or CUI/Distro restrictions.

Snapshot of Page 4

Text Content:
“Date Published
Report Title
DTIC Number
Classification/Releasability
Apr-93
Defense Nuclear Agency
ADA274638
Publicly Released
May-93
FY 1994โ€“99 Future Years Defense Plan
ADA274606
Publicly Released
May-93
FY 1994โ€“99 Future Years Defense Planโ€“Part II
ADA274598
Publicly Released
Jul-93
Defense Acquisition Reform, Phase I
ADA268734
Publicly Released
Jul-93
Tactical Aircraft Bottom Up Review
ADA274506
Publicly Released
Sep-93
Defense Manufacturing Enterprise Strategy (1993 Summer Study)
ADA275233
Publicly Released
Nov-93
Tactical Air Warfare (1993 Summer Study)
ADA275347
Publicly Released
Dec-93
C-17 Review
ADA275120
Publicly Released
Apr-94
Antitrust Aspects of Defense Industry Consolidation
ADA278619
Publicly Released
Apr-94
Depot Maintenance Management
ADA278284
Publicly Released
Apr-94
Tracked Vehicle Industrial Base
ADA286415
Publicly Released
Apr-94
Interim Report on Defense Laboratory Management
ADA294700
Publicly Released
May-94
Defense Acquisition Reform, Phase IIโ€“Appendix D, Jet Engine Commercial Practices Panel
ADA286413
Publicly Released
Jun-94
Persian Gulf War Health Effects
ADA281449
Publicly Released
Jun-94
Joint Precision Interdiction
ADA286414
Publicly Released
Jun-94
Readiness
ADA286412
Publicly Released
Jun-94
Acquiring Defense Software Commercially
ADA286411
Publicly Released
Aug-94
Defense Acquisition Reform (Phase II)
ADA286410
Publicly Released
Sep-94
Joint Advanced Strike Technology (JAST) Program
ADA292094
Publicly Released
Oct-94
Addendum to the Depot Maintenance Management
ADA433317
Publicly Released
Oct-94
Information Architecture for the (1994 Summer Study)
ADA317309
Publicly Released
Nov-94
Military Operations in Built-up Areas (MOBA) (1994 Summer Study)
DA292130
Publicly Released
Dec-94
Interim Concurrency and Risk of the F-22 Program
ADA301209
Publicly Released
Jan-95
Cruise Missile Defense (1994 Summer Study)
ADB197180 (CAC Required)
CUI, Distro C/Export Controlled
Apr-95
The Role of Federally Funded Research & Development Centers in the Mission of the Department of Defense
ADA301344
Publicly Released
Apr-95
Concurrency and Risk of the F-22 Program
ADA301209
Publicly Released
Apr-95
Environmental Security
ADA301379
Publicly Released
Jul-95
The Use of DNA Technology for Identification of Ancient Remains
ADA301521
Publicly Released
Sep-95
Defense Mapping for Future Operations
ADA301843
Publicly Released
Oct-95
Quality of Life
ADA317183
Publicly Released
Jan-96
Theater Missile Defense
ADA318537
Publicly Released
May-96
Defense Acquisition Reform, Phase III
ADA316651
Publicly Released
May-96
Combat Identification
ADA316956
Publicly Released
Jul-96
Improved Application of Intelligence to the Battlefield (Report on Bosnia Lessons Learned)
ADA323629
Publicly Released
Jul-96
Logistics Modernization
ADA317309
Publicly Released
Aug-96
International Armaments Cooperation in an Era of Coalition Security
ADA316860
Publicly Released
Aug-96
International Armaments Cooperation (Source Code Working Groupโ€“Assessment of DoD Source Code Export Practices)
ADA317443
Publicly Released
Aug-96
Strategic Mobility
ADA316992
Publicly Released
Aug-96
Space and Missile Tracking System
ADA317252
Publicly Released
Aug-96
Outsourcing and Privatization
ADA316936
Publicly Released
Aug-96
Military Personnel Information Management
ADA316649
Publicly Released
Oct-96
Tactics and Technologies for 21st Century Military Superiorityโ€“Volume I (1996 Summer Study)
ADA318788
Publicly Released
Oct-96
Tactics and Technologies for 21st Century Military Superiorityโ€“Volume II, Part 1, Supporting Materials (1996 Summer Study)
ADA320508
Publicly Released
Oct-96
Tactics and Technologies for 21st Century Military Superiorityโ€“Volume III, Technology White Papers (1996 Summer Study)
ADA320452
Publicly Released
Nov-96
Achieving an Innovative Support Structure for 21st Century Military Superiority (1996 Summer Study)
ADA320394
Publicly Released
Nov-96
Information Warfare Defense
ADA319571
Publicly Released
Jan-97
Deep Attack Weapons Mix Study (DAWMS)
ADA345434
Publicly Released
Jan-97
Federally Funded Research and Development Centers (FFRDC) and University Affiliated Research Centers (UARC)
ADA327794
Publicly Released

Page 2 of 3 pages”

Snapshot Description: Continuation of the Excel spreadsheet, listing reports from mid-1993 to mid-1997, with similar columns. Entries include topics like Defense Acquisition Reform, Persian Gulf War Health Effects, and Tactics and Technologies for 21st Century Military Superiority.

Snapshot of Page 5

Text Content:
“Date Published
Report Title
DTIC Number
Classification/Releasability
Feb-97
C4ISR Integration
ADA326142
Publicly Released
Feb-97
Aviation Safety
ADA327417
Publicly Released
Apr-97
Image Based Automatic Target Recognition
ADB227711 (CAC Required)
CUI, Distro C
May-97
Vertical Integration and Supplier Decisions
ADA324688
Publicly Released
May-97
Land-Attack Cruise Missile Defense
ADB227738 (CAC Required)
CUI, Distro C/Export Controlled
Oct-97
DoD Responses to Transnational Threatsโ€“Volume I (1997 Summer Study)
ADA333273
Publicly Released
Oct-97
DoD Responses to Transnational Threatsโ€“Volume II, Force Protection Report (1997 Summer Study)
ADA338911
Publicly Released
Jan-98
Deep Attack Weapons Mix Study (DAWMS)
ADA345434
Publicly Released
Jan-98
Satellite Reconnaissance
ADA341955
Publicly Released
Feb-98
DoD Responses to Transnational Threatsโ€“Volume III, Supporting Reports (1997 Summer Study)
ADA342133
Publicly Released
Mar-98
Acquisition Reformโ€“Acquisition Workforce Sub-Panel
ADA341250
Publicly Released
Apr-98
Year 2000
ADA345719
Publicly Released
Apr-98
Unexploded Ordnance (UXO) Clearance, Active Range UXO Clearance, and Explosive Ordnance Disposal (EOD) Programs
ADA345904
Publicly Released
Jun-98
Defense Science and Technology Base for the 21st Century
ADA433761
Publicly Released
Jun-98
Submarine of the Future
ADA352853
Publicly Released
Aug-98
Open Systems
ADA358287
Publicly Released
Oct-98
Joint Operations Superiority in the 21st Centuryโ€“Volume I (1998 Summer Study)
ADA358401
Publicly Released
Oct-98
Joint Operations Superiority in the 21st Centuryโ€“Volume II, Supporting Reports (1998 Summer Study)
ADA364142
Publicly Released
Oct-98
Nuclear Deterrence
ADA433328
Publicly Released
Dec-98
DoD Logistics Transformationโ€“Volume I (1998 Summer Study)
ADA360132
Publicly Released
Dec-98
Control of Military Excess and Surplus Material
ADA360839
Publicly Released
Dec-98
DoD Logistics Transformationโ€“Volume II, Panel Reports
ADA364930
Publicly Released
May-99
Tritium Production Technology Options
ADA364686
Publicly Released
May-99
Advanced Modeling and Simulation for Analyzing Combat Concepts in the 21st Century
ADA364933
Publicly Released
May-99
Investment Strategy for DARPA
ADA367410
Publicly Released
Jul-99
Acquisition Reform, Phase IV
ADA367411
Publicly Released
Jul-99
Acquisition Reform, Phase IVโ€“Sub-Panel on Research and Development
ADA367459
Publicly Released
Sep-99
DoD Warfighting Transformation
ADA369135
Publicly Released
Sep-99
Test and Evaluation
ADA369136
Publicly Released
Nov-99
21st Century Defense Technology Strategiesโ€“Volume I (1999 Summer Study)
ADA433941
Publicly Released
Dec-99
Globalization and Security
ADA371887
Publicly Released
Feb-00
Tactical Battlefield Communications
ADA373829
Publicly Released
Feb-00
Human Resources Strategy
ADA374767
Publicly Released
May-00
The Creation & Dissemination of All Forms of Information in Support of Psychological Operations (PSYOP) in Time of Military Conflict (1999 Summer Study)
ADA382535
Publicly Released
Jun-00
Technical Capabilities of Non-DoD Providers
ADA380423
Publicly Released
Aug-00
Letter Report on DoD Science and Technology Program
ADA387244
Publicly Released
Oct-00
DoD Supercomputing Needs
ADA383826
Publicly Released
Nov-00
Defense Software
ADA385923
Publicly Released
Nov-00
DoD Frequency Spectrum Issues, \”Coping with Change: Managing RF Spectrum to Meet DoD Needs\”
ADA386136
Publicly Released
Dec-00
Test and Evaluation Capabilities
ADB263785 (CAC Required)
CUI, Distro C

Page 3 of 3 pages”

Snapshot Description: Final section of the Excel spreadsheet, covering reports from mid-1997 to 2000, including topics like DoD Responses to Transnational Threats, Defense Software, and The Creation & Dissemination of All Forms of Information in Support of Psychological Operations (PSYOP).

๐Ÿ” OFFICIAL INTELLIGENCE SOURCES

๐Ÿ‡ฌ๐Ÿ‡ง English

๐Ÿ‡ฉ๐Ÿ‡ช Deutsch

๐Ÿ‡ช๐Ÿ‡ธ Espaรฑol

๐Ÿ‡ฎ๐Ÿ‡น Italiano

๐Ÿ’ฐ SUPPORT OPTIONS

Monero QR

๐Ÿ” Monero (XMR)

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๐ŸŽ—๏ธ Patreon

patreon.com/berndpulch

๐Ÿ” [SUPPORT ACKNOWLEDGED]

Your contribution fuels global truth preservation.๐Ÿ” ACCESS EXCLUSIVE CONTENT

โœŒAboveTopSecretXXL Intelligence Report FBI vs Oppenheimer


“The Weight of Discovery: When Science Faces Scrutiny.”

FBI Memo re Oppenheimer

Read all only at

https://www.patreon.com/posts/fbi-memo-re-121577843?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link

AboveTopSecretXXL Intelligence Report

The FBI File on Oppenheimer: Secrets, Surveillance & Subversion

Introduction: The Man Who Built the Bomb โ€“ And the State That Feared Him

J. Robert Oppenheimer, the father of the atomic bomb, was the driving force behind the Manhattan Project, yet by the 1950s, he became one of the most scrutinized men in America. Declassified FBI documents expose decades of surveillance, political maneuvering, and a targeted campaign that ultimately led to his downfall.

This report uncovers the most critical details from Oppenheimerโ€™s FBI file, revealing how the government monitored, manipulated, and ultimately discredited the man who gave the U.S. its nuclear dominance.

Key Findings from the FBI Report

1. Decades-Long Surveillance & Communist Allegations

  • The FBI began monitoring Oppenheimer in the 1940s, citing his alleged connections to the Communist Party USA (CPUSA).
  • He was suspected of associating with known communists, including his wife Katherine “Kitty” Oppenheimer and his brother Frank Oppenheimer, both of whom were linked to CPUSA-affiliated circles.
  • The Venona Project, which decrypted Soviet communications, did not conclusively link Oppenheimer to espionage, yet the FBI continued its relentless pursuit.

2. Wiretaps, Informants, and Internal Betrayals

  • The FBI placed wiretaps on Oppenheimerโ€™s phones and intercepted his mail throughout the late 1940s and early 1950s.
  • Informants, including colleagues from Los Alamos and Princeton, were recruited to report on his political leanings and scientific discussions.
  • Secret “loyalty hearings” were held against him, with former alliesโ€”such as Edward Tellerโ€”testifying against him.

3. The Security Clearance Revocation: A Political Assassination

  • Despite Oppenheimerโ€™s contributions to U.S. national security, the Atomic Energy Commission (AEC) held hearings in 1954 to determine whether he posed a “security risk.”
  • FBI memos reveal behind-the-scenes pressure from J. Edgar Hoover and powerful anti-communist figures to ensure Oppenheimerโ€™s downfall.
  • Oppenheimerโ€™s clearance was revoked, effectively exiling him from U.S. nuclear policy despite no solid evidence of espionage.

4. The Aftermath: The Man Who Knew Too Much

  • After losing his security clearance, Oppenheimer retreated from public life, giving veiled warnings about nuclear policy and Cold War politics.
  • He later suggested that the nuclear arms race was driven more by fear and political manipulation than scientific necessityโ€”a claim the FBI viewed as subversive.
  • FBI surveillance continued into the 1960s, even as Oppenheimer remained largely removed from government affairs.

Conclusion: The Real Threat Wasnโ€™t Oppenheimerโ€”It Was the FBIโ€™s Political Machine

The FBIโ€™s declassified files reveal a systematic effort to dismantle Oppenheimerโ€™s influence, not because he was a spy, but because he was a scientist who challenged the military-industrial complex. His case was a blueprint for future political purges, proving that even Americaโ€™s greatest minds were not immune to state-driven paranoia.

For those following AboveTopSecretXXL, this report is a stark reminder: Truth is often the first casualty of secrecy.

Exclusive Access & Full FBI File

For full declassified documents and intelligence breakdowns, subscribe to Patreon.com/BerndPulch or visit BerndPulch.org/donation to support independent intelligence research.

Stay vigilant. Stay informed. Stay ahead of the narrative.

Attachments

fbi-memo-re-oppenheimer-1952.pdf

Tags

Original Document

Robert j oppenheimer

bernd pulch

fbi

Posted on Feb 5, 2025 – 5:27 PMEdit postShare postEdit pricePin postDelete post

Related Posts

Skip navigation

Bernd Pulch

FBI Memo re Oppenheimer

New

Just now

AboveTopSecretXXL Intelligence Report

The FBI File on Oppenheimer: Secrets, Surveillance & Subversion

Introduction: The Man Who Built the Bomb โ€“ And the State That Feared Him

J. Robert Oppenheimer, the father of the atomic bomb, was the driving force behind the Manhattan Project, yet by the 1950s, he became one of the most scrutinized men in America. Declassified FBI documents expose decades of surveillance, political maneuvering, and a targeted campaign that ultimately led to his downfall.

This report uncovers the most critical details from Oppenheimerโ€™s FBI file, revealing how the government monitored, manipulated, and ultimately discredited the man who gave the U.S. its nuclear dominance.

Key Findings from the FBI Report

1. Decades-Long Surveillance & Communist Allegations

  • The FBI began monitoring Oppenheimer in the 1940s, citing his alleged connections to the Communist Party USA (CPUSA).
  • He was suspected of associating with known communists, including his wife Katherine “Kitty” Oppenheimer and his brother Frank Oppenheimer, both of whom were linked to CPUSA-affiliated circles.
  • The Venona Project, which decrypted Soviet communications, did not conclusively link Oppenheimer to espionage, yet the FBI continued its relentless pursuit.

2. Wiretaps, Informants, and Internal Betrayals

  • The FBI placed wiretaps on Oppenheimerโ€™s phones and intercepted his mail throughout the late 1940s and early 1950s.
  • Informants, including colleagues from Los Alamos and Princeton, were recruited to report on his political leanings and scientific discussions.
  • Secret “loyalty hearings” were held against him, with former alliesโ€”such as Edward Tellerโ€”testifying against him.

3. The Security Clearance Revocation: A Political Assassination

  • Despite Oppenheimerโ€™s contributions to U.S. national security, the Atomic Energy Commission (AEC) held hearings in 1954 to determine whether he posed a “security risk.”
  • FBI memos reveal behind-the-scenes pressure from J. Edgar Hoover and powerful anti-communist figures to ensure Oppenheimerโ€™s downfall.
  • Oppenheimerโ€™s clearance was revoked, effectively exiling him from U.S. nuclear policy despite no solid evidence of espionage.

4. The Aftermath: The Man Who Knew Too Much

  • After losing his security clearance, Oppenheimer retreated from public life, giving veiled warnings about nuclear policy and Cold War politics.
  • He later suggested that the nuclear arms race was driven more by fear and political manipulation than scientific necessityโ€”a claim the FBI viewed as subversive.
  • FBI surveillance continued into the 1960s, even as Oppenheimer remained largely removed from government affairs.

Conclusion: The Real Threat Wasnโ€™t Oppenheimerโ€”It Was the FBIโ€™s Political Machine

The FBIโ€™s declassified files reveal a systematic effort to dismantle Oppenheimerโ€™s influence, not because he was a spy, but because he was a scientist who challenged the military-industrial complex. His case was a blueprint for future political purges, proving that even Americaโ€™s greatest minds were not immune to state-driven paranoia.

For those following AboveTopSecretXXL, this report is a stark reminder: Truth is often the first casualty of secrecy.

Exclusive Access & Full FBI File

For full declassified documents and intelligence breakdowns, subscribe to Patreon.com/BerndPulch or visit BerndPulch.org/donation to support independent intelligence research.

Stay vigilant. Stay informed. Stay ahead of the narrative.

Attachments

fbi-memo-re-oppenheimer-1952.pdf

Tags

Original Document

Robert j oppenheimer

bernd pulch

fbi

Posted on Feb 5, 2025 – 5:27 PMEdit postShare postEdit pricePin postDelete post

Related Posts

Bernd Pulch

FBI Memo re Oppenheimer

New

Just now

AboveTopSecretXXL Intelligence Report

The FBI File on Oppenheimer: Secrets, Surveillance & Subversion

Introduction: The Man Who Built the Bomb โ€“ And the State That Feared Him

J. Robert Oppenheimer, the father of the atomic bomb, was the driving force behind the Manhattan Project, yet by the 1950s, he became one of the most scrutinized men in America. Declassified FBI documents expose decades of surveillance, political maneuvering, and a targeted campaign that ultimately led to his downfall.

This report uncovers the most critical details from Oppenheimerโ€™s FBI file, revealing how the government monitored, manipulated, and ultimately discredited the man who gave the U.S. its nuclear dominance.

Key Findings from the FBI Report

1. Decades-Long Surveillance & Communist Allegations

  • The FBI began monitoring Oppenheimer in the 1940s, citing his alleged connections to the Communist Party USA (CPUSA).
  • He was suspected of associating with known communists, including his wife Katherine “Kitty” Oppenheimer and his brother Frank Oppenheimer, both of whom were linked to CPUSA-affiliated circles.
  • The Venona Project, which decrypted Soviet communications, did not conclusively link Oppenheimer to espionage, yet the FBI continued its relentless pursuit.

2. Wiretaps, Informants, and Internal Betrayals

  • The FBI placed wiretaps on Oppenheimerโ€™s phones and intercepted his mail throughout the late 1940s and early 1950s.
  • Informants, including colleagues from Los Alamos and Princeton, were recruited to report on his political leanings and scientific discussions.
  • Secret “loyalty hearings” were held against him, with former alliesโ€”such as Edward Tellerโ€”testifying against him.

3. The Security Clearance Revocation: A Political Assassination

  • Despite Oppenheimerโ€™s contributions to U.S. national security, the Atomic Energy Commission (AEC) held hearings in 1954 to determine whether he posed a “security risk.”
  • FBI memos reveal behind-the-scenes pressure from J. Edgar Hoover and powerful anti-communist figures to ensure Oppenheimerโ€™s downfall.
  • Oppenheimerโ€™s clearance was revoked, effectively exiling him from U.S. nuclear policy despite no solid evidence of espionage.

4. The Aftermath: The Man Who Knew Too Much

  • After losing his security clearance, Oppenheimer retreated from public life, giving veiled warnings about nuclear policy and Cold War politics.
  • He later suggested that the nuclear arms race was driven more by fear and political manipulation than scientific necessityโ€”a claim the FBI viewed as subversive.
  • FBI surveillance continued into the 1960s, even as Oppenheimer remained largely removed from government affairs.

Conclusion: The Real Threat Wasnโ€™t Oppenheimerโ€”It Was the FBIโ€™s Political Machine

The FBIโ€™s declassified files reveal a systematic effort to dismantle Oppenheimerโ€™s influence, not because he was a spy, but because he was a scientist who challenged the military-industrial complex. His case was a blueprint for future political purges, proving that even Americaโ€™s greatest minds were not immune to state-driven paranoia.

For those following AboveTopSecretXXL, this report is a stark reminder: Truth is often the first casualty of secrecy.

Exclusive Access & Full FBI File

For full declassified documents and intelligence breakdowns, subscribe to Patreon.com/BerndPulch or visit BerndPulch.org/donation to support independent intelligence research.

Stay vigilant. Stay informed. Stay ahead of the narrative.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™

Tags

Original Document

Robert j oppenheimer

bernd pulch

fbi

Posted onย Feb 5, 2025ย –ย 5:27 PMEdit postShare postEdit pricePin postDelete post

Related Posts

โœŒTop 100 Emerging Technologies

“Top 10 Emerging Technologies That Will Shape the Future (and How They Could Be Weaponized) โ€“ With Investment Recommendations”


Overview

This ranking will explore the most groundbreaking emerging technologies, their potential to transform society, and the darker side of how they could be weaponized or misused. Each entry will include a brief explanation of the technology, its applications, the risks it poses, and investment recommendations for those looking to capitalize on these innovations.


Ranking Structure

1. Quantum Computing

  • Potential: Revolutionize cryptography, drug discovery, and AI.
  • Risks: Breaking encryption, destabilizing financial systems, and enabling cyber warfare.
  • Investment Recommendations:
  • Companies: IBM, Google (Alphabet), D-Wave, Rigetti Computing.
  • ETFs: Defiance Quantum ETF (QTUM).
  • Cryptocurrencies: Quantum Resistant Ledger (QRL), Qubit (QBT).

2. Artificial Intelligence (AI)

  • Potential: Enhance healthcare, automate industries, and solve complex problems.
  • Risks: Autonomous weapons, mass surveillance, and job displacement.
  • Investment Recommendations:
  • Companies: NVIDIA, OpenAI (via Microsoft), Tesla, Palantir.
  • ETFs: Global X Robotics & Artificial Intelligence ETF (BOTZ).
  • Startups: Look for AI-focused startups in healthcare, logistics, and cybersecurity.

3. Biotechnology and Genetic Engineering

  • Potential: Cure diseases, extend human lifespan, and create sustainable food sources.
  • Risks: Bioweapons, genetic discrimination, and ethical dilemmas.
  • Investment Recommendations:
  • Companies: CRISPR Therapeutics, Moderna, Illumina, Editas Medicine.
  • ETFs: ARK Genomic Revolution ETF (ARKG).
  • Startups: Invest in gene-editing and synthetic biology startups.

4. Nanotechnology

  • Potential: Revolutionize medicine, energy, and materials science.
  • Risks: Nano-weapons, environmental damage, and health risks.
  • Investment Recommendations:
  • Companies: Nanosys, Nantero, Applied Materials.
  • ETFs: None specific, but consider tech and materials ETFs.
  • Startups: Focus on nanomedicine and energy storage startups.

5. Hypersonic Weapons

  • Potential: Redefine military strategy with unmatched speed and precision.
  • Risks: Escalating arms races, destabilizing global security, and accidental conflicts.
  • Investment Recommendations:
  • Companies: Lockheed Martin, Raytheon Technologies, Northrop Grumman.
  • ETFs: iShares U.S. Aerospace & Defense ETF (ITA).
  • Startups: Look for defense contractors specializing in hypersonic technology.

6. Brain-Computer Interfaces (BCIs)

  • Potential: Enhance human cognition, treat neurological disorders, and enable direct brain-to-machine communication.
  • Risks: Mind control, privacy violations, and hacking of neural data.
  • Investment Recommendations:
  • Companies: Neuralink (via Elon Muskโ€™s ventures), Synchron, Kernel.
  • ETFs: ARK Innovation ETF (ARKK) (includes BCI-related companies).
  • Startups: Invest in neurotech startups focused on medical applications.

7. Autonomous Vehicles and Drones

  • Potential: Transform transportation, logistics, and delivery services.
  • Risks: Weaponized drones, accidents due to system failures, and job losses in driving industries.
  • Investment Recommendations:
  • Companies: Tesla, Waymo (Alphabet), DJI, Nuro.
  • ETFs: Global X Autonomous & Electric Vehicles ETF (DRIV).
  • Startups: Look for drone delivery and autonomous vehicle startups.

8. Advanced Robotics

  • Potential: Revolutionize manufacturing, healthcare, and disaster response.
  • Risks: Job displacement, autonomous combat robots, and ethical concerns.
  • Investment Recommendations:
  • Companies: Boston Dynamics, iRobot, ABB Ltd., Fanuc.
  • ETFs: ROBO Global Robotics & Automation Index ETF (ROBO).
  • Startups: Invest in robotics startups focused on healthcare and industrial automation.

9. Space Technology

  • Potential: Enable space exploration, asteroid mining, and satellite-based services.
  • Risks: Space weapons, orbital debris, and geopolitical tensions over space resources.
  • Investment Recommendations:
  • Companies: SpaceX (private), Blue Origin (private), Rocket Lab, Virgin Galactic.
  • ETFs: ARK Space Exploration & Innovation ETF (ARKX).
  • Startups: Focus on satellite technology and space infrastructure startups.

10. Synthetic Biology

  • Potential: Create new organisms for medicine, energy, and environmental cleanup.
  • Risks: Biohacking, synthetic pathogens, and ecological disruption.
  • Investment Recommendations:
  • Companies: Ginkgo Bioworks, Zymergen, Amyris.
  • ETFs: None specific, but consider biotech ETFs.
  • Startups: Invest in synthetic biology startups focused on sustainability and healthcare.


Top 100 Emerging Technologies That Will Shape the Future

1-10: Quantum Technologies

  1. Quantum Computing
  • Potential: Breakthroughs in cryptography, drug discovery, and AI.
  • Risks: Breaking encryption, destabilizing financial systems.
  • Investments: IBM, Google, D-Wave, Rigetti Computing, Quantum Resistant Ledger (QRL).
  1. Quantum Cryptography
  • Potential: Unhackable communication networks.
  • Risks: High implementation costs.
  • Investments: ID Quantique, QuintessenceLabs.
  1. Quantum Sensors
  • Potential: Ultra-precise measurements for healthcare and defense.
  • Risks: Limited commercial applications.
  • Investments: Qnami, Q-CTRL.
  1. Quantum Internet
  • Potential: Secure global communication.
  • Risks: Requires massive infrastructure.
  • Investments: Governments and tech giants like Google and IBM.
  1. Quantum Simulation
  • Potential: Modeling complex systems like climate and molecules.
  • Risks: High computational costs.
  • Investments: Research institutions and startups.
  1. Quantum Machine Learning
  • Potential: Accelerating AI development.
  • Risks: Ethical concerns.
  • Investments: Zapata Computing, Xanadu.
  1. Quantum Materials
  • Potential: Revolutionizing electronics and energy storage.
  • Risks: High R&D costs.
  • Investments: Materials science companies and startups.
  1. Quantum Imaging
  • Potential: Advanced medical imaging and security.
  • Risks: Limited market adoption.
  • Investments: Quantum Imaging startups.
  1. Quantum Communication Satellites
  • Potential: Secure global communication.
  • Risks: High launch costs.
  • Investments: Governments and space agencies.
  1. Quantum Key Distribution (QKD)
  • Potential: Unhackable encryption.
  • Risks: Limited scalability.
  • Investments: Toshiba, ID Quantique.

11-20: Artificial Intelligence (AI)

  1. Generative AI
  • Potential: Content creation, design, and entertainment.
  • Risks: Misinformation and deepfakes.
  • Investments: OpenAI, Stability AI, Jasper AI.
  1. Autonomous AI Systems
  • Potential: Self-driving cars, drones, and robots.
  • Risks: Ethical and safety concerns.
  • Investments: Tesla, Waymo, NVIDIA.
  1. AI in Healthcare
  • Potential: Disease diagnosis and drug discovery.
  • Risks: Data privacy issues.
  • Investments: PathAI, Tempus, DeepMind.
  1. AI in Finance
  • Potential: Fraud detection and algorithmic trading.
  • Risks: Market manipulation.
  • Investments: Palantir, Upstart, Affirm.
  1. AI in Education
  • Potential: Personalized learning and tutoring.
  • Risks: Data privacy and bias.
  • Investments: Duolingo, Coursera, Khan Academy.
  1. AI in Agriculture
  • Potential: Precision farming and crop monitoring.
  • Risks: Job displacement.
  • Investments: John Deere, Farmers Edge, Indigo Ag.
  1. AI in Cybersecurity
  • Potential: Threat detection and prevention.
  • Risks: Over-reliance on AI.
  • Investments: CrowdStrike, Darktrace, Palo Alto Networks.
  1. AI in Retail
  • Potential: Personalized shopping experiences.
  • Risks: Privacy concerns.
  • Investments: Amazon, Shopify, Alibaba.
  1. AI in Manufacturing
  • Potential: Automation and predictive maintenance.
  • Risks: Job losses.
  • Investments: Siemens, General Electric, Rockwell Automation.
  1. AI in Energy
  • Potential: Smart grids and energy optimization.
  • Risks: Cybersecurity threats.
  • Investments: Tesla, Enphase Energy, NextEra Energy.

21-30: Biotechnology and Genetic Engineering

  1. CRISPR Gene Editing
  • Potential: Cure genetic diseases and improve crops.
  • Risks: Ethical concerns and unintended consequences.
  • Investments: CRISPR Therapeutics, Editas Medicine, Intellia Therapeutics.
  1. Synthetic Biology
  • Potential: Create new organisms for medicine and energy.
  • Risks: Biohacking and ecological disruption.
  • Investments: Ginkgo Bioworks, Zymergen, Amyris.
  1. Personalized Medicine
  • Potential: Tailored treatments based on genetics.
  • Risks: High costs and data privacy.
  • Investments: 23andMe, Foundation Medicine, Illumina.
  1. Lab-Grown Meat
  • Potential: Sustainable food production.
  • Risks: High production costs.
  • Investments: Beyond Meat, Impossible Foods, Memphis Meats.
  1. Biodegradable Plastics
  • Potential: Reduce plastic pollution.
  • Risks: Limited scalability.
  • Investments: Danimer Scientific, NatureWorks, TotalEnergies Corbion.
  1. Stem Cell Therapy
  • Potential: Regenerate damaged tissues and organs.
  • Risks: Ethical concerns and high costs.
  • Investments: Mesoblast, Pluristem Therapeutics, Athersys.
  1. Gene Therapy
  • Potential: Cure genetic disorders.
  • Risks: High costs and safety concerns.
  • Investments: Spark Therapeutics, Bluebird Bio, BioMarin Pharmaceutical.
  1. Microbiome Therapeutics
  • Potential: Treat diseases by targeting gut bacteria.
  • Risks: Limited understanding of microbiome.
  • Investments: Seres Therapeutics, Vedanta Biosciences, Finch Therapeutics.
  1. Wearable Health Tech
  • Potential: Monitor health in real-time.
  • Risks: Data privacy issues.
  • Investments: Apple, Fitbit, Whoop.
  1. 3D Bioprinting
  • Potential: Print organs and tissues for transplants.
  • Risks: Ethical concerns and high costs.
  • Investments: Organovo, CELLINK, Aspect Biosystems.

31-40: Nanotechnology

  1. Nanomedicine
  • Potential: Targeted drug delivery and cancer treatment.
  • Risks: Toxicity and regulatory hurdles.
  • Investments: Nanobiotix, Arrowhead Pharmaceuticals, Nanosys.
  1. Nanoelectronics
  • Potential: Smaller, faster, and more efficient devices.
  • Risks: High R&D costs.
  • Investments: Intel, Samsung, TSMC.
  1. Nanomaterials
  • Potential: Stronger, lighter, and more durable materials.
  • Risks: Environmental and health risks.
  • Investments: Nantero, Applied Materials, BASF.
  1. Nanorobotics
  • Potential: Medical procedures and environmental cleanup.
  • Risks: Ethical concerns and safety issues.
  • Investments: Research institutions and startups.
  1. Nanofilters
  • Potential: Water purification and air filtration.
  • Risks: High production costs.
  • Investments: Nanostone Water, SUEZ, Pall Corporation.
  1. Nanoenergy
  • Potential: Efficient energy storage and generation.
  • Risks: Limited scalability.
  • Investments: Tesla, Panasonic, LG Chem.
  1. Nanosensors
  • Potential: Detect pollutants and pathogens.
  • Risks: High costs and limited applications.
  • Investments: Research institutions and startups.
  1. Nanocoatings
  • Potential: Anti-corrosion and self-cleaning surfaces.
  • Risks: Environmental impact.
  • Investments: PPG Industries, AkzoNobel, Sherwin-Williams.
  1. Nanophotonics
  • Potential: Advanced optical devices and communication.
  • Risks: High R&D costs.
  • Investments: Intel, IBM, research institutions.
  1. Nanofabrication
  • Potential: Precision manufacturing at the nanoscale.
  • Risks: High costs and technical challenges.
  • Investments: ASML, Applied Materials, research institutions.

Continuing from where we left off, hereโ€™s the expanded list of emerging technologies from 41 to 100, with their potential, risks, and investment recommendations.


41-50: Space Technology

  1. Space Tourism
  • Potential: Commercial space travel for civilians.
  • Risks: High costs and safety concerns.
  • Investments: SpaceX, Blue Origin, Virgin Galactic.
  1. Asteroid Mining
  • Potential: Extract rare minerals and metals from asteroids.
  • Risks: High costs and technical challenges.
  • Investments: Planetary Resources, Deep Space Industries.
  1. Satellite Internet
  • Potential: Global high-speed internet coverage.
  • Risks: Space debris and regulatory hurdles.
  • Investments: SpaceX (Starlink), OneWeb, Amazon (Project Kuiper).
  1. Lunar Exploration
  • Potential: Establish a sustainable presence on the Moon.
  • Risks: High costs and technical challenges.
  • Investments: NASA, ESA, private space companies.
  1. Mars Colonization
  • Potential: Establish human settlements on Mars.
  • Risks: High costs and life support challenges.
  • Investments: SpaceX, NASA, Mars Society.
  1. Space-Based Solar Power
  • Potential: Harvest solar energy in space and transmit it to Earth.
  • Risks: High costs and technical challenges.
  • Investments: Research institutions and space agencies.
  1. Space Debris Cleanup
  • Potential: Remove orbital debris to ensure safe space travel.
  • Risks: High costs and technical challenges.
  • Investments: Astroscale, ClearSpace, governments.
  1. Space Manufacturing
  • Potential: Produce materials in microgravity for unique properties.
  • Risks: High costs and limited applications.
  • Investments: Made In Space, Space Tango.
  1. Space-Based Telescopes
  • Potential: Advanced astronomical observations.
  • Risks: High costs and technical challenges.
  • Investments: NASA, ESA, private space companies.
  1. Space Habitats
  • Potential: Create livable environments in space.
  • Risks: High costs and life support challenges.
  • Investments: Bigelow Aerospace, NASA, ESA.

51-60: Energy and Sustainability

  1. Fusion Energy
  • Potential: Unlimited clean energy.
  • Risks: High costs and technical challenges.
  • Investments: ITER, Commonwealth Fusion Systems, Helion Energy.
  1. Hydrogen Fuel Cells
  • Potential: Clean energy for transportation and industry.
  • Risks: High production costs.
  • Investments: Plug Power, Ballard Power Systems, Toyota.
  1. Advanced Nuclear Reactors
  • Potential: Safer and more efficient nuclear power.
  • Risks: Public opposition and high costs.
  • Investments: TerraPower, NuScale Power, Rolls-Royce.
  1. Carbon Capture and Storage (CCS)
  • Potential: Reduce greenhouse gas emissions.
  • Risks: High costs and limited scalability.
  • Investments: Climeworks, Carbon Engineering, Occidental Petroleum.
  1. Renewable Energy Storage
  • Potential: Store solar and wind energy for later use.
  • Risks: High costs and technical challenges.
  • Investments: Tesla, Fluence, Form Energy.
  1. Smart Grids
  • Potential: Optimize energy distribution and reduce waste.
  • Risks: Cybersecurity threats.
  • Investments: Siemens, General Electric, Schneider Electric.
  1. Vertical Farming
  • Potential: Sustainable agriculture in urban areas.
  • Risks: High energy costs.
  • Investments: AeroFarms, Plenty, Bowery Farming.
  1. Algae Biofuels
  • Potential: Sustainable alternative to fossil fuels.
  • Risks: High production costs.
  • Investments: Algenol, Solazyme, Sapphire Energy.
  1. Wave and Tidal Energy
  • Potential: Harness ocean energy for electricity.
  • Risks: High costs and environmental impact.
  • Investments: Ocean Power Technologies, Orbital Marine Power.
  1. Geothermal Energy
  • Potential: Reliable and sustainable energy source.
  • Risks: Limited geographical availability.
  • Investments: Ormat Technologies, Enel Green Power.

61-70: Advanced Robotics

  1. Humanoid Robots
  • Potential: Assist in healthcare, manufacturing, and households.
  • Risks: Ethical concerns and job displacement.
  • Investments: Boston Dynamics, SoftBank Robotics, Tesla (Optimus).
  1. Swarm Robotics
  • Potential: Collaborative robots for agriculture and disaster response.
  • Risks: Technical challenges and ethical concerns.
  • Investments: Research institutions and startups.
  1. Exoskeletons
  • Potential: Enhance human strength and mobility.
  • Risks: High costs and limited applications.
  • Investments: Ekso Bionics, ReWalk Robotics, Sarcos Robotics.
  1. Soft Robotics
  • Potential: Safe interaction with humans and delicate objects.
  • Risks: Limited durability.
  • Investments: Soft Robotics Inc., Festo, research institutions.
  1. Agricultural Robots
  • Potential: Automate farming tasks like planting and harvesting.
  • Risks: Job displacement.
  • Investments: John Deere, Agrobot, Naio Technologies.
  1. Medical Robots
  • Potential: Assist in surgeries and patient care.
  • Risks: High costs and safety concerns.
  • Investments: Intuitive Surgical, Medtronic, Stryker.
  1. Autonomous Drones
  • Potential: Deliver goods, monitor crops, and inspect infrastructure.
  • Risks: Privacy concerns and regulatory hurdles.
  • Investments: DJI, Zipline, Skydio.
  1. Robotic Process Automation (RPA)
  • Potential: Automate repetitive tasks in industries.
  • Risks: Job displacement.
  • Investments: UiPath, Automation Anywhere, Blue Prism.
  1. Robotic Companions
  • Potential: Assist the elderly and disabled.
  • Risks: High costs and ethical concerns.
  • Investments: SoftBank Robotics, Intuition Robotics.
  1. Underwater Robots
  • Potential: Explore oceans and perform underwater tasks.
  • Risks: High costs and technical challenges.
  • Investments: Oceaneering International, Saab Seaeye.

71-80: Transportation and Mobility

  1. Hyperloop
  • Potential: High-speed transportation in vacuum tubes.
  • Risks: High costs and technical challenges.
  • Investments: Virgin Hyperloop, Hyperloop Transportation Technologies.
  1. Flying Cars
  • Potential: Urban air mobility to reduce traffic congestion.
  • Risks: Safety concerns and regulatory hurdles.
  • Investments: Joby Aviation, Lilium, EHang.
  1. Autonomous Ships
  • Potential: Reduce shipping costs and improve efficiency.
  • Risks: Cybersecurity threats.
  • Investments: Rolls-Royce, Kongsberg Gruppen, Wรคrtsilรค.
  1. Electric Aircraft
  • Potential: Reduce emissions in aviation.
  • Risks: Limited range and high costs.
  • Investments: Eviation, Heart Aerospace, Airbus.
  1. Smart Highways
  • Potential: Improve traffic flow and reduce accidents.
  • Risks: High infrastructure costs.
  • Investments: Siemens, Cisco, governments.
  1. Autonomous Trains
  • Potential: Improve efficiency and safety in rail transport.
  • Risks: High costs and technical challenges.
  • Investments: Alstom, Siemens, Hitachi Rail.
  1. Electric Bikes and Scooters
  • Potential: Sustainable urban mobility.
  • Risks: Safety concerns and regulatory hurdles.
  • Investments: Lime, Bird, VanMoof.
  1. Autonomous Trucks
  • Potential: Reduce shipping costs and improve logistics.
  • Risks: Job displacement and safety concerns.
  • Investments: TuSimple, Embark Trucks, Waymo.
  1. Personal Rapid Transit (PRT)
  • Potential: On-demand urban transportation.
  • Risks: High infrastructure costs.
  • Investments: Governments and startups.
  1. Magnetic Levitation (Maglev) Trains
  • Potential: High-speed, energy-efficient rail transport.
  • Risks: High costs and limited routes.
  • Investments: CRRC, Siemens, governments.

81-90: Cybersecurity and Privacy

  1. Quantum Cryptography
  • Potential: Unhackable communication networks.
  • Risks: High implementation costs.
  • Investments: ID Quantique, QuintessenceLabs.
  1. Zero-Trust Security
  • Potential: Prevent unauthorized access to systems.
  • Risks: Complex implementation.
  • Investments: Palo Alto Networks, Zscaler, CrowdStrike.
  1. Homomorphic Encryption
  • Potential: Perform computations on encrypted data.
  • Risks: High computational costs.
  • Investments: IBM, Microsoft, Duality Technologies.
  1. Blockchain for Security
  • Potential: Secure transactions and data storage.
  • Risks: Scalability issues.
  • Investments: Ethereum, Chainlink, Ripple.
  1. AI-Powered Cybersecurity
  • Potential: Detect and prevent cyber threats in real-time.
  • Risks: Over-reliance on AI.
  • Investments: Darktrace, Cylance, SentinelOne.
  1. Biometric Authentication
  • Potential: Secure access using fingerprints, facial recognition, etc.
  • Risks: Privacy concerns.
  • Investments: Apple, Samsung, IDEMIA.
  1. Decentralized Identity
  • Potential: Give users control over their digital identities.
  • Risks: Limited adoption.
  • Investments: Microsoft, Sovrin, Civic.
  1. Post-Quantum Cryptography
  • Potential: Secure systems against quantum attacks.
  • Risks: High implementation costs.
  • Investments: Governments and tech companies.
  1. Cybersecurity for IoT
  • Potential: Protect connected devices from cyber threats.
  • Risks: High complexity.
  • Investments: Palo Alto Networks, Fortinet, Cisco.
  1. Privacy-Enhancing Technologies
  • Potential: Protect user data while enabling data sharing.
  • Risks: Limited adoption.
  • Investments: Oasis Labs, Enveil, Inpher.

91-100: Miscellaneous Innovations

  1. Smart Cities
  • Potential: Improve urban living through technology.
  • Risks: High costs and privacy concerns.
  • Investments: Siemens, Cisco, governments.
  1. Digital Twins
  • Potential: Simulate and optimize real-world systems.
  • Risks: High costs and complexity.
  • Investments: GE Digital, Siemens, Microsoft.
  1. Holographic Displays
  • Potential: Immersive experiences for entertainment and education.
  • Risks: High costs and limited applications.
  • Investments: Magic Leap, Microsoft (HoloLens), Looking Glass.
  1. Brain-Computer Interfaces (BCIs)
  • Potential: Enable direct brain-to-machine communication.
  • Risks: Ethical concerns and privacy issues.
  • Investments: Neuralink, Synchron, Kernel.
  1. Advanced Materials
  • Potential: Create stronger, lighter, and more durable materials.
  • Risks: High R&D costs.
  • Investments: Graphene companies, nanomaterials startups.
  1. Wearable Tech
  • Potential: Monitor health and enhance productivity.
  • Risks: Privacy concerns.
  • Investments: Apple, Fitbit, Whoop.
  1. 3D Printing
  • Potential: Revolutionize manufacturing and healthcare.
  • Risks: High costs and limited scalability.
  • Investments: Stratasys, 3D Systems, Desktop Metal.
  1. Augmented Reality (AR)
  • Potential: Enhance real-world experiences with digital overlays.
  • Risks: Privacy concerns and high costs.
  • Investments: Microsoft (HoloLens), Magic Leap, Apple.
  1. Virtual Reality (VR)
  • Potential: Immersive experiences for gaming, training, and therapy.
  • Risks: High costs and limited adoption.
  • Investments: Meta (Oculus), HTC Vive, Sony.
  1. Smart Fabrics
  • Potential: Integrate technology into clothing for health monitoring and more.
  • Risks: High costs and limited durability.
  • Investments: Google (Project Jacquard), Hexoskin, Myant.

Conclusion

This list of 100 emerging technologies highlights the transformative potential of innovation across various fields, from quantum computing to smart fabrics. Each technology comes with its own set of opportunities and risks, making it essential for investors, policymakers, and the public to stay informed and engaged.

Call to Action: For more in-depth analyses of emerging technologies and their implications, support our work by donating at berndpulch.org/donations or joining our Patreon community at patreon.com/berndpulch. Together, we can uncover the truth behind the worldโ€™s most powerful technologies and trends.


Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of BerndPulch.org. The information provided is for educational and informational purposes only and should not be construed as financial or investment advice. Always seek the advice of a qualified professional with any questions you may have regarding investments or financial decisions.

Why This Ranking?

This ranking aligns with BerndPulch.orgโ€™s focus on uncovering hidden truths and exploring the intersection of technology, security, and global power dynamics. By including investment recommendations, it provides actionable insights for readers looking to capitalize on these emerging technologies while understanding their risks.


Call to Action

The future is being shaped by these technologies, and understanding their implications is crucial. At BerndPulch.org, we are committed to providing in-depth analysis and cutting-edge insights into the forces shaping our world.

Support our mission to uncover the truth and empower informed decision-making:

  • Patreon: Join our community of supporters at Patreon.com/BerndPulch for exclusive content and early access to articles.
  • Donations: Make a direct contribution at BerndPulch.org/Donations to help us continue delivering high-quality investigative journalism.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๐Ÿ™GOD BLESS YOU๐Ÿ™

General Tags:
– futuristic 
– technology 
– innovation 
– cutting-edge 
– sci-fi 
– advanced tech 
– future city 
– global connectivity 
– artificial intelligence 
– robotics 
– biotechnology 
– quantum computing 
– renewable energy 
– nanotechnology 
– holograms 
– augmented reality 
– virtual reality 
– neural interfaces 
– smart infrastructure 
– sustainable future 

Visual Style Tags:
– photorealistic 
– surreal 
– neon colors 
– glowing effects 
– holographic 
– cyberpunk 
– modern aesthetic 
– ultra-high detail 
– vibrant colors 
– cosmic background 
– futuristic lighting 
– sleek design 

Scene Elements Tags:
– futuristic cityscape 
– flying vehicles 
– vertical gardens 
– solar panels 
– drones 
– humanoid robots 
– scientists 
– engineers 
– doctors 
– wearable tech 
– data analytics 
– autonomous systems 
– global network 
– light beams 
– interconnected icons 
– cosmic Earth view 
– stars and galaxies 

Mood/Theme Tags:
– inspiring 
– optimistic 
– awe-inspiring 
– progressive 
– transformative 
– hopeful 
– visionary 
– groundbreaking 
– collaborative


โœŒThe Hidden World of Quantum Computing: How It Could Revolutionizeโ€”or Destroyโ€”Cryptocurrencies


“Navigating the Quantum Leap: The Future of Cryptocurrencies in a World of Superposition and Security Challenges.”

Quantum computing is no longer the stuff of science fiction. Itโ€™s a rapidly advancing field that promises to revolutionize industries, solve complex problems, and redefine the limits of technology. But for the world of cryptocurrencies, quantum computing is a double-edged sword. While it holds the potential to enhance blockchain technology, it also poses an existential threat to the cryptographic systems that underpin most cryptocurrencies today.

In this article, weโ€™ll explore the hidden world of quantum computing, its implications for cryptocurrencies, and what the future might hold for this groundbreaking technology.


What is Quantum Computing?

Quantum computing leverages the principles of quantum mechanics to perform calculations at speeds unimaginable with classical computers. Unlike classical bits, which can be either 0 or 1, quantum bits (qubits) can exist in a state of superposition, meaning they can be both 0 and 1 simultaneously. This allows quantum computers to process vast amounts of data in parallel, solving problems that would take classical computers millennia to crack.

Key concepts in quantum computing include:

  • Superposition: The ability of qubits to exist in multiple states at once.
  • Entanglement: A phenomenon where qubits become interconnected, allowing for instantaneous communication regardless of distance.
  • Quantum Supremacy: The point at which a quantum computer can solve a problem that a classical computer cannot.

The Threat to Cryptocurrencies

Cryptocurrencies like Bitcoin and Ethereum rely on cryptographic algorithms to secure transactions and protect user data. These algorithms, such as RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography), are considered secure against classical computers. However, quantum computers could theoretically break these systems in a matter of seconds.

Hereโ€™s how:

  1. Breaking Private Keys: Quantum computers could use Shorโ€™s algorithm to factor large numbers exponentially faster than classical computers, rendering private keys vulnerable.
  2. Compromising Blockchain Security: Quantum computers could forge digital signatures, allowing attackers to impersonate users and manipulate transactions.
  3. Disrupting Consensus Mechanisms: Proof-of-work (PoW) and proof-of-stake (PoS) systems could be undermined by quantum attacks, destabilizing entire blockchain networks.

The implications are staggering. If quantum computers become powerful enough, they could compromise the security of billions of dollars worth of cryptocurrency assets, erode trust in blockchain technology, and destabilize the global financial system.


Quantum-Resistant Cryptocurrencies

Recognizing the threat, several projects are working to develop quantum-resistant cryptocurrencies. These projects aim to replace traditional cryptographic algorithms with quantum-resistant alternatives, ensuring that blockchain networks remain secure in a post-quantum world.

Notable examples include:

  1. Qubit (QBT): A cryptocurrency designed to be resistant to quantum attacks, using advanced cryptographic techniques to secure its network.
  2. IOTA: Utilizes a quantum-resistant hash-based signature scheme called Winternitz One-Time Signatures (WOTS).
  3. Quantum Resistant Ledger (QRL): Built from the ground up to be quantum-resistant, using hash-based cryptography to protect its blockchain.

While these projects are promising, their success depends on widespread adoption and the continued development of quantum-resistant technologies.


The Race for Quantum Supremacy

The development of quantum computing is a global race, with countries and corporations vying for dominance. Companies like IBM, Google, and D-Wave are making significant strides, while governments are investing heavily in quantum research to gain a strategic edge.

In 2019, Google claimed to have achieved quantum supremacy with its Sycamore processor, which performed a calculation in 200 seconds that would have taken the worldโ€™s fastest supercomputer 10,000 years. While this milestone is impressive, practical quantum computers capable of breaking cryptographic systems are still yearsโ€”or even decadesโ€”away.


Broader Implications for Global Security

The impact of quantum computing extends far beyond cryptocurrencies. It has the potential to disrupt global financial systems, military encryption, and data privacy. Governments and organizations are already preparing for a quantum future, investing in quantum-resistant technologies and developing strategies to mitigate the risks.

The geopolitical implications are equally significant. The nation or corporation that achieves quantum supremacy could gain unprecedented power, reshaping the global balance of power and challenging existing security frameworks.


What Can Crypto Investors Do?

For cryptocurrency investors, the rise of quantum computing is both a challenge and an opportunity. Here are some steps you can take to prepare:

  1. Stay Informed: Keep up with developments in quantum computing and quantum-resistant technologies.
  2. Diversify Your Portfolio: Consider investing in quantum-resistant cryptocurrencies like Qubit, IOTA, or QRL.
  3. Support Innovation: Advocate for the adoption of quantum-resistant technologies in the crypto space.
  4. Protect Your Assets: Use hardware wallets and other secure storage solutions to safeguard your crypto holdings.

Call to Action

The rise of quantum computing is a critical issue that demands attention from both the crypto community and the general public. At BerndPulch.org, we are committed to providing in-depth analysis and cutting-edge insights into emerging technologies and their implications.

Support our mission to uncover the truth and empower informed decision-making:

  • Patreon: Join our community of supporters at Patreon.com/BerndPulch for exclusive content and early access to articles.
  • Donations: Make a direct contribution at BerndPulch.org/Donations to help us continue delivering high-quality investigative journalism.

Conclusion

Quantum computing is a game-changer, with the potential to revolutionizeโ€”or destroyโ€”the world of cryptocurrencies. While the technology is still in its infancy, its implications are profound. By staying informed, supporting innovation, and preparing for the future, we can navigate the challenges and opportunities of a quantum world.


Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of BerndPulch.org. The information provided is for educational and informational purposes only and should not be construed as financial or investment advice. Always seek the advice of a qualified professional with any questions you may have regarding investments or financial decisions.

โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™


General Tags

  • #QuantumComputing
  • #Cryptocurrency
  • #BlockchainTechnology
  • #QuantumThreat
  • #CryptoSecurity
  • #QuantumResistance
  • #FutureOfCrypto
  • #TechInnovation
  • #GlobalSecurity
  • #EmergingTechnologies

Key Figures and Organizations

  • #IBM
  • #Google
  • #DWave
  • #QubitCrypto
  • #IOTA
  • #QuantumResistantLedger
  • #Bitcoin
  • #Ethereum
  • #QuantumSupremacy
  • #SycamoreProcessor

Specific Topics

  • #QuantumMechanics
  • #CryptographicAlgorithms
  • #ShorsAlgorithm
  • #QuantumResistantCryptography
  • #BlockchainSecurity
  • #QuantumBreakthroughs
  • #QuantumThreats
  • #PostQuantumCryptography
  • #QuantumRace
  • #QuantumImpact

Themes and Issues

  • #TechRevolution
  • #CryptoSafety
  • #QuantumRisk
  • #FinancialSecurity
  • #DataPrivacy
  • #MilitaryEncryption
  • #GeopoliticalImplications
  • #TechDisruption
  • #InnovationAndRisk
  • #FutureTech

Action-Oriented Tags

  • #StayInformed
  • #ProtectYourCrypto
  • #InvestInInnovation
  • #SupportQuantumResistance
  • #PrepareForTheFuture
  • #TechAwareness
  • #SecureYourAssets
  • #AdvocateForChange
  • #TechEducation
  • #FutureProofing

Platform-Specific Tags

  • #BerndPulch
  • #BerndPulchOrg
  • #PatreonSupport
  • #DonateForTruth
  • #IndependentMedia
  • #InvestigativeJournalism
  • #TechInsights
  • #CuttingEdgeAnalysis
  • #InDepthReporting
  • #TechAndSecurity

Symbolism and Imagery

  • #QuantumLeap
  • #TechFrontiers
  • #FutureChallenges
  • #InnovationUnleashed
  • #SecureTheFuture
  • #TechEvolution
  • #QuantumHorizons
  • #CryptoRevolution
  • #TechAndSociety
  • #NextGenTech

Community and Engagement

  • #CryptoCommunity
  • #TechEnthusiasts
  • #QuantumResearchers
  • #BlockchainExperts
  • #FutureThinkers
  • #TechAdvocates
  • #InnovationLeaders
  • #SecurityExperts
  • #CryptoInvestors
  • #TechVisionaries

These tags can be used across blog posts, social media updates, videos, and other content to help reach a broader audience and connect with individuals interested in quantum computing, cryptocurrency, and emerging technologies. Always ensure that the content is handled sensitively and responsibly, given the technical and speculative nature of the topics discussed.

โœŒElisabeth Kรผbler-Ross: Revolutionizing the Understanding of Grief and Death


“Dr. Elisabeth Kรผbler-Ross: A pioneer in understanding grief, her groundbreaking work on the five stages of grief reshaped how we view loss, healing, and the human spirit.”

Elisabeth Kรผbler-Ross: Revolutionizing the Understanding of Grief and Death

Dr. Elisabeth Kรผbler-Ross (1926-2004) was a Swiss-American psychiatrist whose pioneering work on the emotional stages of grief has made a lasting impact on psychology, medicine, and palliative care. Born in Zurich, Switzerland, she became one of the most influential figures in the study of death, dying, and bereavement. Her landmark work began in the 1960s, when she introduced the Five Stages of Grief in her 1969 book On Death and Dying.

The Five Stages of Grief: Denial, Anger, Bargaining, Depression, and Acceptance

Kรผbler-Ross developed her famous model of the Five Stages of Grief after years of research and direct interviews with terminally ill patients. She observed that individuals who were facing death went through a series of emotional responses as they came to terms with their condition. The stages are:

  1. Denial: The individual denies the reality of their situation, often reacting with shock and disbelief.
  2. Anger: As reality sets in, frustration and resentment arise, often directed at others or even oneself.
  3. Bargaining: Individuals try to make deals with a higher power, seeking ways to delay or avoid the inevitable.
  4. Depression: As the reality becomes undeniable, sadness, regret, and fear of loss take over.
  5. Acceptance: Finally, the individual comes to terms with their condition and achieves a sense of peace.

While these stages are not linear and may vary between individuals, Kรผbler-Ross’s work laid the foundation for understanding grief as a complex, multifaceted experience.

Expanding the Model and Legacy in Palliative Care

Kรผbler-Rossโ€™s work challenged conventional thinking about death and dying. Before her contributions, society often shied away from discussing death, and medical professionals were trained to focus solely on curing diseases rather than providing comfort for the dying. Her book and subsequent lectures helped normalize conversations about death and dying, allowing patients to experience more compassionate and humane care.

Kรผbler-Ross also advocated for better palliative care and the importance of emotional and psychological support for those facing terminal illnesses. Her research inspired a global movement toward hospice care, and she became an advocate for the terminally ill, working to improve the quality of life for those at the end of their journey.

Criticism and Evolution of the Stages Model

Though Kรผbler-Ross’s work was revolutionary, her model was not without criticism. Some critics argue that the stages are too rigid or deterministic, while others point out that not everyone who is grieving follows the same trajectory. Over time, the model has been adapted and expanded to reflect the variety of experiences people face when dealing with grief. Nonetheless, Kรผbler-Rossโ€™s framework remains one of the most influential and widely discussed theories in grief psychology.

Final Years and Lasting Impact

Later in her life, Kรผbler-Ross became more focused on spiritual and holistic approaches to care. She continued to write and lecture about death and afterlife, seeking to integrate the psychological, emotional, and spiritual aspects of human experience. Her legacy endures through the Elisabeth Kรผbler-Ross Foundation, which continues to provide resources and education on end-of-life care, grief, and bereavement.

Dr. Elisabeth Kรผbler-Rossโ€™s contributions have made a profound difference in how we view death, offering comfort, understanding, and compassion to individuals and families facing lifeโ€™s greatest challenges. Her work remains a cornerstone of modern psychological and medical care.


โŒยฉBERNDPULCH.ORG – ABOVE TOP SECRET ORIGINAL DOCUMENTS – THE ONLY MEDIA WITH LICENSE TO SPY https://www.berndpulch.org
https://googlefirst.org

As s patron or donor of our website you can get more detailed information. Act now before its too late…

MY BIO:

FAQ:

FAQ

@Copyright Bernd Pulch

CRYPTO WALLET  for

Bitcoin:

0xdaa3b887f885fd7725d4d35d428bd3b402d616bb

ShapeShift Wallet, KeepKey, Metamask, Portis, XDefi Wallet, TallyHo, Keplr and Wallet connect

0x271588b52701Ae34dA9D4B31716Df2669237AC7f

Crypto Wallet for Binance Smart Chain-, Ethereum-, Polygon-Networks

bmp

0xd3cce3e8e214f1979423032e5a8c57ed137c518b

Monero

41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh

๏™GOD BLESS YOU๏™


Tags:

  • Elisabeth Kรผbler-Ross
  • Grief Stages
  • Death and Dying
  • Palliative Care
  • End-of-Life Care
  • Psychology of Grief
  • Terminal Illness
  • Hospice Care
  • Death and Bereavement
  • Psychological Research

Artificial Intelligence in Bio Science – Congress Original Document

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

Read all at

https://t.me/ABOVETOPSECRETXXL/31712

US & China Science and Technology Cooperation Agreement – Congress Original Document

Follow the ONLY MEDIA with the LICENSE TO SPY โœŒ๏ธ@abovetopsecretxxl

Read all at

https://t.me/ABOVETOPSECRETXXL/31623

Creating Life from Rocks and ElectricityโœŒ@abovetopsecretxxl

Dr. Martin:”Science was hijacked!”โœŒ๏ธ@abovetopsecretxxl

Thank you for sharing ๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡Covid-19 was an act of biological warfare perpetrated on the human race. It was a financial heist. Nature was hijacked. Science was hijacked.Join @DrDavidMartinโœŒ๏ธ@abovetopsecretxxl

The Wet Dream Of The Transhuman Aficionados

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

NASA: THE LUNAR LANDING RESEARCH VEHICLE – ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

๐Ÿšจ FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

Continue reading “NASA: THE LUNAR LANDING RESEARCH VEHICLE – ORIGINAL DOCUMENT”

No More Jabs – Ivermectin Against Covid19 Will Be Available In The EU October 20th 2021

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

The answer likely lies in the 10-letter โ€œI-wordโ€ that you are not allowed to mention on social media, ivermectin.

In India Ivermectin has already been very successfull:

“The Undeniable Ivermectin Miracle in Indiaโ€™s 240m Populated Largest State, Uttar Pradesh โ€“ Horowitz”

https://newsrescue.com/the-undeniable-ivermectin-miracle-indias-240m-populated-largest-state-uttar-pradesh-horowitz/

All vaccines will no longer be justified as of 10/20/2021: information checked. The European Union has approved 5 therapies (https://ec.europa.eu/commission/presscorner/detail/fr/ip_21_3299) that will be available in all hospitals in the Member States for the treatment of Covid. These therapies are approved by decree of the European Council (European Parliament) and will be operational from 1/10, so they will gradually be distributed around the 20/10. The vaccines were approved on a “preliminary trial basis”. However, since these 5 new drugs are required to be prescribed by decree, the use of the vaccine will be discontinued. Hence we understand why all states said “between September it is necessary that โ€ฆ”. You already knew everything. You have to be patient. Don’t accept blackmail. Be patient. Now that ivermectin is approved again, there is no need for a vaccine. Great news. The Pasteur Institute recognizes the effectiveness of ivermectin. A single ingestion could wipe out all of the SARS covid-19 genetic material in some people.

Continue reading “No More Jabs – Ivermectin Against Covid19 Will Be Available In The EU October 20th 2021”

UK Professor Who Helped Beat AIDS Virus Says COVID-19 HAS To Be Man-Made

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Study About Herd Immunity Against Covid19 In Sweden – Original Preprint Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Herd immunity - Wikipedia

Continue reading “Study About Herd Immunity Against Covid19 In Sweden – Original Preprint Document”

First Commercially Viable Quantum Computer Close To Becoming Reality

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The worldโ€™s first commercially viable quantum computer is one step closer to becoming a reality. Australian Jeremy O’ Brienโ€™s startup PsiQuantum has received $611 million in funding from investors to construct the technical marvel.

The machine will be able to solve problems millions of times faster than any traditional computer and will work on fields including energy, climate and life sciences. The project is expected to be up and running by the middle of the decade.

IBA To Prosecute Bill & Melinda Gates Foundation, Fauci, WHO Chiefs et al. – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Continue reading “IBA To Prosecute Bill & Melinda Gates Foundation, Fauci, WHO Chiefs et al. – Original Document”

Exclusive – Satellite Photos Show Cover Up Actions At The Wuhan Lab – Original Images

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Page 1 of Wuhan
Continue reading “Exclusive – Satellite Photos Show Cover Up Actions At The Wuhan Lab – Original Images”

“Why Should Anyone Believe Anything Dr. Fauci Says?”: GOP Rep Pushes “Fire Fauci” Act

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Alongside other GOP lawmakers, Rep. Mo Brooks (R-AL) pushed for the firing of Dr. Anthony Fauci.

“Talk Spezial” โ€“ Interview With John Ioannidis – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

“Talk Spezial” – Interview with Prof. John Ioannidis – long version (English OT) in the #ServusMediathek: https://www.servustv.com/videos/aa-28… “Talk Spezial” – Interview with Prof. John Ioannidis – Long version (German) in the #ServusMediathek: https://www.servustv.com/videos/aa-28… “Talk Spezial” with John Ioannidis: Michael Fleischhacker in a conversation with the scientist. OT-Version without Voiceover. Further Information: https://www.servustv.com/videos/aa-28…








Congressman Comer Discusses Dr. Fauci’s Failure To Appear Before Congress

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Must See Video – FAUCI’S FREUDIAN SLIP

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Preliminary US Government Report About UFO’s & Aliens – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

UFOs kรถnnten fรผr die USA eine "nationale Bedrohung" sein | kurier.at
Continue reading “Preliminary US Government Report About UFO’s & Aliens – Original Document”

Video – Sharri Markson, A Journalist Uncovers Chinese Documents That Could Reveal Covid Intentions.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs โ€“ Conspiracy Practice โ€“ Original Documents โ€“ Series 4

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs โ€“ Conspiracy Practice โ€“ Original Documents โ€“ Series 4”

Video – Peter Mcollough Speaks To FOX NEWS

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sharri Markson – Official 2011 Chinese Government Submission Discusses โ€˜Weaponising Specific Viruses To Target Racesโ€™

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

An official Chinese government document โ€“ submitted to the United Nationโ€™s Biological Weapons Convention in 2011 โ€“ discusses โ€œweaponising specific viruses to target races,โ€ according to Sky News host Sharri Markson.

โ€œIt is a shocking and grotesque area of bioresearch,โ€ Ms Markson said. She said it was part of the warning which was included in the governmentโ€™s formal submission to the United Nationโ€™s Biological Weapons Convention in 2011.

Ms Markson said the documents show that the Chinese government took concerns about a potential lab leak extremely seriously. โ€œSo seriously they said a lab leak involving virus research could place the whole of mankind in great dangerโ€. โ€œChina even says that biotechnology research means there are difficulties complying with the biological weapons conventionโ€. โ€œThere is no evidence that COVID-19 was a biological weapon, nor that China has carried out a biological attack,โ€ Ms Markson said.

โ€œThe significance of this is that the Chinese government included a discussion about these threats in its official submission to the United Nations Biological Weapons Convention as relevant issues that could impact on compliance with the Convention moving forwardโ€. โ€œNothing in this document is more significant than China’ serious concerns about a laboratory accident and the threat that this could pose to mankind. โ€œChina and its cronies have repeatedly insisted over the past 19 months that the possibility of a lab leak in Wuhan is a conspiracy theory. This is a lie.โ€ Ms Markson spoke to the former lead investigator who spearheaded a taskforce for the US government into the origins of COVID-19 โ€“ David Asher โ€“ about the developments.

Video – Die Wahrheit รผber den Ursprung von COVID und die Laborlecktheorie

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

COVID Origin und die Lab-Leak-Theorie Jon Stewart war gerade spรคtabends mit Stephen Colbert zusammen, und seine Interpretation der Laborlecktheorie von COVID รผberraschte das Publikum. Natรผrlich ist es wichtig, wie COVID entstanden ist, da die Antwort zur Prรคvention zukรผnftiger Pandemien beitragen kann. Aber Jon Stewart sagte etwas, das ich fรผr รผbertrieben halte. COVID Origin und die Zeitstempel der Lab-Leak-Theorie 00:00 รœber Doktor Mike Hansen 00:21 Reaktion auf das Jon Stewart Reaction Statement zur Stephen Colbert Show 02:33 Der Ursprung von COVID 04:08 Wohnquartiere schlieรŸen – Mensch und Tier 04:55 SARS-COV-2s nรคchster Verwandter 05:31 Die LAB LEAK-Theorie von COVID 06:33 Die Zeitleiste von COVID 07:40 Der Prรคzedenzfall fรผr LAB-Unfรคlle 09:32 Genmanipulation 12:17 Wurde das COVID-Virus biologisch manipuliert? Mai 2021 wies Prรคsident Biden die US-Geheimdienste an, ihre Ermittlungsbemรผhungen zum Ursprung der Covid-Pandemie zu verstรคrken und in 90 Tagen Bericht zu erstatten. Darรผber hinaus haben Australien, die Europรคische Union und Japan den Wunsch geรคuรŸert, konzertiertere Anstrengungen zu unternehmen, um den Ursprung der Covid-Infektion zu bestimmen. SchlieรŸlich forderten prominente Wissenschaftler am 4. Mรคrz 2021 in einem offenen Brief an die WHO eine umfassende und uneingeschrรคnkte Untersuchung. Warum das plรถtzliche Interesse? In einem kรผrzlich verรถffentlichten US-Geheimdienstbericht heiรŸt es, dass im November 2019 mehrere Forscher des chinesischen WIV erkrankten und ins Krankenhaus eingeliefert werden mussten. Und erst heute gab es eine Studie, die Beweise dafรผr zeigte, dass Menschen in den USA im Dezember 2019 Antikรถrper hatten. Die Laborlecktheorie Hat sich ein Mitarbeiter des Wuhan-Virologielabors versehentlich infiziert und das Virus dann verbreitet, insbesondere wenn die Erstkontakte asymptomatisch waren? Die grรถรŸte Sammlung von Fledermausproben, insbesondere solche, die Fledermaus-Coronaviren enthalten, befindet sich im Wuhan Institute of Virology. Kรถnnten schlechte Labortechniken durch unzureichend ausgebildete Techniker es dem Virus ermรถglichen, zu entkommen? Kรถnnten Forscher des Wuhan Institute of Virology das Virus virulenter und รผbertragbarer gemacht haben, indem sie mit einem Gewinn an Funktionsmutationen experimentierten? Diese Mutationen sollen den Evolutionsprozess beschleunigen, damit Wissenschaftler auf zukรผnftige Pandemien vorbereitet sein kรถnnen. Diese Theorie ist umstrittener als die Theorie, dass das Virus auf natรผrliche Weise รผbertragen wurde. Sie ist stรคrker politisch aufgeladen und hat wirtschaftliche, soziale und politische Auswirkungen. Leider wurde diese Theorie im WHO-Bericht nur kurz erwรคhnt. Nur 4 der 313 Seiten des Berichts waren ihm gewidmet. Die Zeitleiste Mehrere Forscher des Wuhan Institute of Virology erkrankten im Herbst 2019 an Symptomen, die mit COVID oder der saisonalen Grippe vereinbar waren. Dann, im November 2019, wurden drei der WIV-Forscher krank genug, um sich in ein Krankenhaus zu begeben. Dr. Robert Redfield glaubt, dass die aktuelle Pandemie in Wuhan als lokalisierter Ausbruch im September-Oktober 2019 begann. Vor allem, weil dieses Virus gut an menschliche ACE2-Rezeptoren angepasst ist. Dieses Virus hat im Wesentlichen den Boden unter den FรผรŸen. Das Programm zur รœberwachung neu auftretender Krankheiten hat die USA bis zum 31. Dezember 2019 nicht offiziell รผber die Patientengruppe mit Lungenentzรผndung informiert. Dr. Robert Kadlac sagte, dass China diese Vorlaufzeit von 30 Tagen nutzte, um Vorrรคte zu kaufen. Dr. Redfield sprach mit seinem chinesischen Amtskollegen Dr. George Gao, der verstรถrt war, dass viele mit COVID infizierte Menschen nicht auf dem nassen Markt waren. Der Prรคzedenzfall fรผr Laborunfรคlle Laborunfรคlle haben frรผhere Infektionsausbrรผche in China und anderswo verursacht. In Peking, China, zum Beispiel infizierte ein Ausbruch neun Menschen und tรถtete einen. Darรผber hinaus kam es 1978 im Vereinigten Kรถnigreich zu einem Pocken-Laborleck und 2014 zu einem Milzbrand-Laborleck in den USA. Darรผber hinaus hat Dr. Shi Zhengli, auch bekannt als Batwoman, zugegeben, dass die Coronavirus-Forschung in Laboren mit Biosicherheitsstufe 2 und nicht mit der strengeren Biosicherheitsstufe 4 durchgefรผhrt wurde. In einem Labor der Biosicherheitsstufe 2 tragen Forscher weiรŸe Kittel und Handschuhe, keine Schutzhandschuhe Ausrรผstung. Beamte der US-Botschaft รคuรŸerten im Jahr 2018 Bedenken hinsichtlich der Laborsicherheit von WIV. Chinesische Experten haben auch Bedenken hinsichtlich der Laborsicherheit in ihrem eigenen Land geรคuรŸert und beklagt, dass “Labormรผll vom Menschen verursachte Viren, Bakterien oder Mikroben enthalten kann” und dass “einige Forscher Labormaterialien nach Experimenten ohne einen spezifischen biologischen Entsorgungsmechanismus in die Kanalisation leiten. ” Doktor Mike Hansen, MD Innere Medizin | Lungenerkrankung | Intensivmedizin




Video – Researchers Find Evidence Of Coronavirus Epidemic 20,000 Years Ago

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Researchers have found evidence that a coronavirus epidemic swept through East Asia some 20,000 years ago. Devastating enough to leave an evolutionary imprint on the DNA of people alive today โ€“ scientists saw those genes could be crucial to unlocking todayโ€™s pandemic.



Australia – โ€˜Shocking Revelationsโ€™ On Gain-Of-Function Research โ€˜Raise Questionsโ€™ About CSIRO

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Greg Hunt โ€œis rightโ€ to order a review into gain-of-function research in Australia after the โ€œshocking revelationsโ€ about CSIRO and Australian universities, according to the IPAโ€™s Evan Mulholland. It comes after it was revealed CSIRO and Australian universities have participated in at least ten joint projects with the Wuhan Institute of virology over the last decade. Sharri Markson also revealed CSIRO researchers have previously undertaken research on live bats with the Wuhan institute. Mr Mulholland said the revelations โ€œraise questionsโ€ about the trustworthiness of institutions like CSIRO. โ€œBut also, weโ€™ve seen so many of our โ€“ particularly our media commentariat โ€“ dismiss a lot of the journalism that Sharri has done, but it has been incredible to see what sheโ€™s uncovered,โ€ he told Sky News host Peta Credlin.

Wuhan Bat Video Shows Much Of Pandemic Origin Information Was โ€˜Chinese Disinformationโ€™

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sky News host Sharri Markson says exclusive footage she revealed which proves live bats were kept at the Wuhan Institute of Virology shows much of what the world has been told about the origin of the pandemic was โ€œChinese disinformationโ€.

Ms Markson told Fox News in the interview that Beijingโ€™s disinformation was then โ€œpropagatedโ€ by many who were โ€œcompromisedโ€. โ€œIt shows that much of what weโ€™ve been told about the origin of the pandemic from the very beginning was Chinese disinformation which was then propagated by many people who had been working in conjunction with the Wuhan Institute of Virology who are compromised, who had extreme conflicts of interest,โ€ she said.

Ms Markson scorched the WHO team which visited Wuhan earlier this year to investigate the origin of the pandemic. โ€œPeople like Peter Daszak insisted that it was a conspiracy theory โ€“ he used the term in a tweet from December 2020 โ€“ that it was a conspiracy theory to say that there were bats in the lab,โ€ she said.

โ€œHeโ€™s an official WHO, World Health Organisation, investigator who went into Wuhan to supposedly investigate the origins of the virus earlier this year and it was completely false. โ€œThis new footage shows that there were bets being kept in the Wuhan Institute of Virology and itโ€™s something Peter Daszak has had to admit, has had to correct just this month.

โ€œThereโ€™s so much that he didnโ€™t and the WHO team didnโ€™t ask when they went into Wuhan.โ€ Ms Markson said the WHO team failed to even ask what happened to a colossal database of coronaviruses at the lab. โ€œThey didnโ€™t ask if there were bats at the laboratory, they didnโ€™t ask where the virus database was, this is such a crucial thing, the virus database with some 15,000 or 17,000 bat samples suddenly disappeared from the internet in September 2019 just prior to the outbreak of COVID-19,โ€ she said.

โ€œPeople like Peter Daszak who went into to supposedly investigate this were riddled with conflicts. โ€œAnthony Fauci, as well, should not be advising the president on the origin of coronavirus given it was his organisation that funnelled money through a subgrant through to the Wuhan Institute of Virology. โ€œHe can issue all the denials that he likes. The scientific papers say that they were funded with NIH.โ€

Video – Sharri Markson – Lab Leak or Natural Emergence: What Really Happened in Wuhan?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Sharri Markson joins Gerard Henderson and The Sydney Institute members to discuss her new book What Really Happened in Wuhan?

Sky News – Sharri Markson Has “Uncovered The Greatest Scientific Scandall Of All Time”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Nationals Senator Matt Canavan says he thinks Sharri Markson has “uncovered the greatest scientific scandal of all time”. Mr Canavan reflected on some of the recent work Sky News host Sharri Markson has been undertaking in investigating and revealing details relating to the origins of COVID-19. “Millions of people have died and they deserve, their families deserve, answers about how this happened and how can we make sure this does not happen again,” Mr Canavan said. “We need answers here, we need to get to the bottom of what happened here,” Mr Canavan told Sky News host Paul Murray.

Highlights – How Fauci Tricked And Framed The Investigation To Avoid The Lab Made Origin Theory Of Covid19 – Original Emails

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Did America's NIAID fund 'COVID' research in China's Wuhan? Dr Fauci says  'preposterous'

  • February 5-6, 2020 (000239) โ€“ Fauci asked to recommend names for WHO group with the broad mission to โ€œlook at the origins and evolution of 2019n-CoV.โ€  Fauci responds by seeking to reframe the mission in a manner that would only look for natural and not lab made origin.  He does this by restating the mission one to โ€œexamine the evolutionary origin of the 2019-nCoVโ€ and later that day as the โ€œcoronavirus evolution working group.โ€
  • February 7, 2020 (000189) – Fauci sent an internal NIAID communication reflecting that it was unlikely that the SARS-CoV-2 virus originated in a wet market.
Continue reading “Highlights – How Fauci Tricked And Framed The Investigation To Avoid The Lab Made Origin Theory Of Covid19 – Original Emails”

WORLD EXCLUSIVE Video – Footage Proves Bats Were Kept In Wuhan Lab

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Wuhan Institute of Virology kept live bats in cages, new footage from inside the facility has revealed, disproving denials from World Health Organisation investigators who claimed the suggestion was a โ€œconspiracyโ€.

An official Chinese Academy of Sciences video to mark the launch of the new biosafety level 4 laboratory in May 2017 speaks about the security precautions that are in place if โ€œan accidentโ€ occurs and reveals there had been โ€œintense clashesโ€ with the French Government during the construction of the laboratory.

The video shows bats being held in a cage at the Wuhan Institute of Virology, along with vision of a scientist feeding a bat with a worm. The 10 minute video is titled โ€œThe construction and research team of Wuhan P4 laboratory of Wuhan Institute of Virology, Chinese Academy of Sciencesโ€ and features interviews with its leading scientists.

The World Health Organisation report investigating the origin of the pandemic failed to mention that any bats had been kept at the Wuhan Institute of Virology and only its annex referred to animals being housed there. โ€œThe animal room in the P4 facility can handle a variety of species, including primate work with SARS-CoV-2,โ€ it states.

A member of the World Health Organisation team investigating the origin of the pandemic in Wuhan, zoologist Peter Daszak said it was a conspiracy to suggest bats were held at the Wuhan Institute of Virology. In one tweet dated December, 2020 he said: โ€œNo BATS were sent to Wuhan lab for genetic analysis of viruses collected in the field. Thatโ€™s now how this science works. We collect bat samples, send them to the lab. We RELEASE bats where we catch them!โ€ In another tweet, dated December 11, 2020, he said: โ€œThis is a widely circulated conspiracy theory. This piece describes work Iโ€™m the lead on and labs Iโ€™ve collaborated with for 15 years. They DO NOT have live or dead bats in them. There is no evidence anywhere that this happened. Itโ€™s an error I hope will be corrected.โ€

This month, Daszak appeared to retract his earlier denials and admitted the Wuhan Institute of Virology may have housed bats but admitted he had not asked them. The Chinese Academy of Sciences video was discovered by researchers investigating the origin of the pandemic who call themselves DRASTIC. Digital archivist โ€œJesseโ€ found the Chinese Academy of Sciences Video while the group’s co-ordinator, who goes by a pseudonym of โ€œBilly Bosticksonโ€ for safety reasons, has long complained evidence bats were housed in the Wuhan laboratories. The video forms part of the investigation for the book โ€œWhat Really Happened in Wuhanโ€ which is available for pre-order at Amazon and Booktopia. Mr Daszak has not responded to requests for comment.

Video – Kayleigh McEnany Has A Big Question For Fauci

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Kayleigh McEnany says Fauci was ‘publicly dismissing this’ despite receiving emails speculating a lab origin #FoxBusinessTonight #FoxBusiness

Corona Ausschuss -Sitzung 57: Unter Druck

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Der Corona Ausschuss wurde von vier RechtsanwรคltInnen gegrรผndet. Er fรผhrt eine Beweisaufnahme zur Corona-Krise und den MaรŸnahmen durch. 

Video Proof – Fauci Told Newt Gingrich That Wuhan Lab Leak Was Conspiracy Theory

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Fauci Lied when he claimed that he did not deliberately suppress the Wuhan Lab Leak evidence. In this Podcast with Newt Gingrich and Peter Daszak, Fauci clearly claims that the Wuhan Lab Leak is a Conspiracy Theory not based on science. Apparently Fauci doesn’t believe that Geography is a Science!

US-Republikaner Fordern Entlassung Von Corona – Fauci | AFP – News Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Politico – Greene And Other GOP Leaders Push For Fauci To Be Fired

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Video – Republicans Introduce โ€˜Fire Fauci Actโ€™ To Oust The โ€˜Political Scientistโ€™ From His Top Job

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Several Republicans โ€“ led by congresswoman Marjorie Taylor Greene โ€“ have introduced the โ€œFire Fauci Actโ€ to oust embattled Dr Anthony Fauci from his job as chief medical adviser to the president.

โ€œHeโ€™s a political scientist, he is not a scientist,โ€ said Republican Thomas Massie. โ€œHeโ€™s admitted that he fudged his own answers about what level would constitute herd immunity.โ€ Mr Massie said the US needed to โ€œfireโ€ Dr Fauci and called for an investigation into the National Institute of Allergy and Infectious Diseases.

The act would reduce Dr Fauciโ€™s annual salary as NIAID director to zero. Dr Fauci has been in the firing line for his decisions during the COVID-19 pandemic and has been accused of downplaying the origins of coronavirus.

โ€œFrom his emails and much more we can see the extend of these mandates were unnecessary and not in the best interest of the American people,โ€ said Republican Mary Miller. โ€œAmericans deserve to know and fully understand how COVID came to be and make sure this never happens again.โ€

Exclusive Video – Former CDC Director Believes COVID-19 Came From Wuhan Lab

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Former CDC Director Robert Redfield sits down for an exclusive interview with Fox News’ Dr. Marc Siegel to discuss his belief that COVID-19 ‘evolved’ from a Wuhan lab.

Video – “Dr. Fauci Must Be Made Responsible” – GOP Sen. Tears Into Fauci Over Money Sent To Wuhan Via EcoHealth

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

More Than 8.738 OFFICIAL Deaths In EMA Database Because Of Covid19 Vaccination – Mehr als 8.738 OFFIZIELLE Todesfรคlle in der EMA-Datenbank wegen Covid19-Impfung

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “More Than 8.738 OFFICIAL Deaths In EMA Database Because Of Covid19 Vaccination – Mehr als 8.738 OFFIZIELLE Todesfรคlle in der EMA-Datenbank wegen Covid19-Impfung”

Video – Jim Jordan Faces Off With Dr. Fauci In Explosive Hearing – U.S. Senatoren Verlangen Faucis Rรผcktritt

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The House Select Subcommittee on the Coronavirus Crisis holds a hearing on ‘Reaching the Light at the End of the Tunnel: Ending COVID-19.’

Tagesschau Removes Sahin Ugur (CEO Biontech) Interview About Corona Vaccination – Tagesschau Entfernt Sahin Ugur Biontech Interview – “No Vax For Me”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

“Of course I would love to be vaccinated too. We just have to see that we follow the legal requirements. We will have to produce over 1.3 billion vaccine doses in the next twelve months. It is important that no employees are absent and accordingly, we think about finding the possibility that legally allows us to protect our employees โ€ฆ “

Continue reading “Tagesschau Removes Sahin Ugur (CEO Biontech) Interview About Corona Vaccination – Tagesschau Entfernt Sahin Ugur Biontech Interview – “No Vax For Me””

Wissenschaft Steht Auf Video – Prof. Dr. Peter Mc Cullough

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Kardiologe und stellvertretender Chefarzt fรผr Medizin am Baylor University Medical Center, Dallas, TX.

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Video – Texan MD, Peter McCullough Gives Call For Courage!

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Michael Thiessen and MD Peter McCullough speak about our civil liberties and why its so important to stand up and take courage in a broken world. All the ways you can tap into LCC and share our content/messages:

Gab: gab.com/libertycoalitioncanada
Telegram: https://t.me/libertycoalitioncanadanews
Instagram: http://www.instagram.com/libertycoalitioncanada/
Facebook: http://www.facebook.com/LibertyCoalitionCanada
Twitter: @LibertyCCanada
YouTube: https://www.youtube.com/channel/UCj_5
LIBERTY DISPATCH PODCAST: PodBean- libertydispatch.podbean.com You can also find Liberty Coalition Canada on Spotify & Itunes!

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Corona Ausschuss Sitzung 56 – Ausweichkanal – Peter Mc Cullough – “Wohl 50.000 Tote In Den USA WG Vaccination”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs โ€“ Conspiracy Practice โ€“ Original Documents โ€“ Series 3

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Fauci funded 'bat-human interface' research in China to avoid an outbreak  in the US | Sky News Australia
Continue reading “Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs โ€“ Conspiracy Practice โ€“ Original Documents โ€“ Series 3”

Video – “Hiding In Plain Sight”: Ron Johnson Ties Fauci To Gain Of Function Research Funding

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Video – China Funding Human-Animal Hybrids

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Tammy Bruce warns that Democrats blocked measure to prohibit funding of chimera experiments.

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

“Declassify It”: GOP Senators Demand Wuhan Virology Lab Information Be Released – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

In a Senate GOP press conference yesterday, Republicans demanded that information into the Wuhan Institute of Virology and gain of function research be declassified.

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Unveiled The GOP-Congress Letter To Fauci – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Continue reading “Unveiled The GOP-Congress Letter To Fauci – Original Document”

Video – Laura Ingraham: Fauci ‘Routinely’ Acted Against Science

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Sen. Kennedy – “Fauci Needs To Cut The Crap, This Isn’t About His Feelings” – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

SKY TV – Dr Anthony Fauci Has Been โ€˜Found Out On A Million Frontsโ€™

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Americaโ€™s most senior infectious disease expert Dr Anthony Fauci has now been โ€œfound out on a million fronts,โ€ according to Sky News host Alan Jones. โ€œHe (Fauci) was told early, way back in February 2020, that there was fairly good evidence that this virus had been engineered,โ€ Mr Jones said.

โ€œFunds made available by the agency which Fauci heads โ€ฆ to the tune of $600,000 went to this Wuhan Institute of Virology. โ€œThis is the mob, remember, involved in gain-of-function research.โ€ Mr Jones questioned why Fauci would continue to argue coronavirus was transmitted from an animal to humans โ€œin spite of advice to the contraryโ€.

โ€œIt is only now that the emails have been leaked that he has had to admit that he is not convinced that the virus developed naturally,โ€ he said. โ€œThe truth in all this from day one has not been shared with us. โ€œThere can be no greater contempt for the people than to deny the truth.โ€

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Rand Paul: “More Children Have Died From Suicide Than From COVID”

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

At a town hall on COVID-19 policy in Kentucky, Sen. Rand Paul (R-KY) condemned “one-size-fits-all” lockdown policies, and pointed to the effects of school closures on children.

Stay Connected Forbes on Facebook: http://fb.com/forbes

Forbes Video on Twitter: http://www.twitter.com/forbes

Forbes Video on Instagram: http://instagram.com/forbes

More From Forbes: http://forbes.com

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Dr. David Evans – Is The Western Climate Establishment Corrupt ?

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

The Climate-Corruption Connection - Harvard Political Review
Continue reading “Dr. David Evans – Is The Western Climate Establishment Corrupt ?”

Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs โ€“ Conspiracy Practice โ€“ Original Documents โ€“ Series 2

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

These Savvy Humans Are Saving Bats From Human COVID
Continue reading “Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs โ€“ Conspiracy Practice โ€“ Original Documents โ€“ Series 2”

Sharri Markson – Bombshell Emails About What Fauci Knew – Fauci Funded Bat-Human Interface Research in China – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Lawsuit – Florida Governor Ron DeSantis Unleashes On Dr. Fauci – Video

Become a Patron!
True Information is the most valuable resource and we ask you to give back

At press conferences Gov. Ron DeSantis (R-FL) took aim at Dr. Anthony Fauci over his tenure as director of the U.S. National Institute of Allergy and Infectious Diseases during the COVID-19 pandemic. Stay Connected

Forbes on Facebook: http://fb.com/forbes

Forbes Video on Twitter: http://www.twitter.com/forbes

Forbes Video on Instagram: http://instagram.com/forbes

More From Forbes: http://forbes.com

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Sky News Australia – ‘Secular Saint’ Fauci Is Not A Pandemic Hero

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Anthony Fauci has been feted as a “secular saint” during the COVID-19 pandemic however released emails show America’s most senior infectious disease expert said one thing in public and another in private, according to Sky News host James Morrow.

The emails were first secured by BuzzFeed through a Freedom of Information Act request. Buzzfeed published in excess of 3,200 pages of emails from Dr Fauci’s inbox, over the course of January to June 2020. Dr Fauci was informed as early as February 2020 that COVID-19 could have been engineered in a lab in Wuhan and accidentally unleashed upon the world.

“According to the emails, Americaโ€™s top medical adviser took the advice seriously, despite downplaying the lab leak theory in public, instead insisting COVID-19 likely originated organically from nature,” Mr Morrow said. “Remember how back in May of last year, Dr Fauci said there was ‘no evidence’ the coronavirus could have been made in a lab? “Well it turns out from the very beginning of the pandemic, Dr Fauci’s aides were telling him that actually, it may very well have been engineered.”

Mr Morrow said in the early stages of the pandemic, Dr Fauci turned science “into a religion.” “Anthony Fauci became, of course, a secular saint among the American left who, over the last year and a half, turned science into a religion, and who, as in Australia, became addicted to alarmism, lockdowns, and giving the power of elected officials over to unelected health bureaucrats โ€“ a doctrine that I like to call, Fauchism,” he said. He said the released emails indicate that when future generations look back at the COVID-19 pandemic โ€“ which has claimed over three million lives and devastated the livelihoods of millions more โ€“ Dr Fauci will not be remembered a hero, rather “something far less flattering”.

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs – Conspiracy Practice – Original Documents – Series 1

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Dr Fauci now 'not convinced' COVID-19 developed naturally; calls for origin  to be probed
The links of Fauci to China are exposed in his emails and actions as well as those of Bill Gates in his donation of $ 7,772,000 already in 2012 to the Chinese Ministry of Health as we have shown in his financial documents here on this website already. This seems to be conspiracy practice.

The following issues are of critical concern:

  • Secret science: What research is NIH funding or suppressing?
  • Oversight: Why are Americans learning about these Covid controversies only through FOIA? Are there no checks and balances on individuals and agencies that have such a profound effect on our lives?
  • Central control with no accountability: NIH “guidelines” are being used to deny treatment with long-approved drugs including hydroxychloroquine and ivermectin to thousands of Americans. This therapeutic nihilism is likely the cause of more than 100,000 preventable deathsโ€”but the policymakers have no liability.
  • Conflicts of interest: What interest groups are determining NIH policy? Foreign governments? The pharmaceutical/vaccine industry? Big tech? Non-governmental organizations such as the Bill and Melinda Gates Foundation?
  • Genetic engineering: The SARS-CoV-2 virus may be genetically engineered. If so, for what purpose? The only NIH-touted response other than lockdowns and masks are genetically engineered products. Not themselves vaccines by the previous definition, they introduce genetic instructions for the recipient to make genetically modified proteins to stimulate an immune response. The long-term consequences cannot be known.
  • Trust: Should we hand over control of our lives and medical treatment to Dr. Fauci and the agency he heads? Do they have our welfare at heart, or only their own power and a political agenda?
Continue reading “Fauci Emails & Actions Expose Very Close Ties Of Fauci To Wuhan Covid19 Labs – Conspiracy Practice – Original Documents – Series 1”

Video – “Gain-Of-Function Godfather” -Bombshell Emails Link Dr Fauci To Wuhan Lab Leak Theory

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Sky News host Sharri Markson says Anthony Fauci is considered “the Godfather” of Gain-of-Function research after she uncovered a 2012 scientific paper of his that said the benefits of the research were worth the risk of a pandemic.

Top US Medical Adviser Dr Anthony Fauci was informed in Feb 2020, COVID-19 exhibited characteristics that suggested it could have been genetically altered in a lab, according to bombshell emails published.

“It is an extraordinary acknowledgement; it is incomprehensible for a public health official, charged with protecting public health to take this position, but that’s what he has done,” she said.

“These emails show that in the very early stages of the pandemic – in early 2020 – he became concerned that the finding for gain-of-function research in the US had flown to Wuhan. “And we see there’s a flurry of emails where he’s trying to find out whether he could be responsible or whether the NIH could be responsible for funding the research that might have created the virus that has leaked.”

Ms Markson said it was “a real possibility” American funding under Anthony Fauci “funded a virus that might have leaked that has resulted in this global pandemic”. “This is why we’ve seen such a cover-up from people like Anthony Fauci,” she said.

Go back

Your message has been sent

Warning
Warning
Warning
Warning.

“Das Aktuelle Ausbruchs- und Infektionsgeschehen In Schulen Und An Arbeitsplรคtzen” Von Ursula Berger, Jana GauรŸ, Gรถran Kauermann Helmut Kรผchenhoff – LMU – Lockdown Studie – Original Dokument

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Continue reading ““Das Aktuelle Ausbruchs- und Infektionsgeschehen In Schulen Und An Arbeitsplรคtzen” Von Ursula Berger, Jana GauรŸ, Gรถran Kauermann Helmut Kรผchenhoff – LMU – Lockdown Studie – Original Dokument”

WO2020060606 – CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA BY MICROSOFT – ORIGINAL DOCUMENT

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Microsoft Patents Cutting Edge Human-Powered Crypto Mining System |  Blockchain News

 

front page image
Continue reading “WO2020060606 – CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA BY MICROSOFT – ORIGINAL DOCUMENT”

TOP SECRET – Defense Intelligence Study About Invisibility

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

TOP SECRET – Defense Intelligence Study About Invisibility

 

The idea of invisibility has fascinated people for millennia, inspiring many myths, novels, and films. Invisibility cloaking has recently become a subject of science and technology. This paper describes the important current theoretical and experimental developments and tries to project into the future.

Camouflage

Invisibility may be achieved through three principal methods: camouflage, transparency, and cloaking. Many animals and some plants use camouflage to disguise themselves from predators-for example, by assuming the shapes and colors of objects in their surroundings. The military has long used forms of camouflage; a recent military application of camouflage is stealth technology.

Stealth planes have aerodynamically unusual, edgy shapes and are coated with a special material. Both features serve the same purpose: to make the plane โ€œinvisibleโ€ to radar. How does it work? In radar, electromagnetic microwaves are emitted by a source, and their reflection by an object-an airplane, for example-is detected. From the direction and the time delay of the reflected waves, the direction and distance of the object are inferred. If the object does not reflect the electromagnetic microwaves back to the source, it will not appear on the radar. This is precisely what stealth technology achieves. Owing to the edgy shape of the stealth plane, most of the incident electromagnetic waves are reflected in different directions; the coating of the plane absorbs the rest. In this way, the stealth plane has become completely black in the spectral range of radar. As for radar waves, the sky is black, not blue, and the plane has assumed the color of the background: the stealth plane is camouflaged.

โ€ฆ

โ€ฆ

Optical Metamaterials

As light is simply an electromagnetic wave with shorter wavelengths than microwave radiation, one could imagine an optical cloaking device as the microwave cloak but with much smaller cells, fitted to the smaller wavelength. However, this simple idea is too simple, for two different reasons. One is that metals like the copper of the circuit board or the gold of ruby glass are more electrically resistant to currents oscillating with the frequency of visible light than to currents in the microwave range of the spectrum. Second, and more important, the cells of a metamaterial also emit electromagnetic radiation in an incoherent way, not just as a coherent response to the incoming electromagnetic wave, similar to the spontaneous emission of light by atoms and molecules. The spontaneous emission is significantly stronger in the optical range of the spectrum. In short, metamaterials do not scale; they must be designed differently for visible light, and the loss of light by absorption and incoherent scattering usually is greater for visible light than for microwaves. Figure 13 below illustrates the idea 19 for an optical cloaking metamaterial. Instead of split-ring resonators, nano-scale metal wires are embedded in a transparent host material, for example glass. The wires replace the split-ring resonators on the circuit board of the microwave-cloaking device. They act similarly to the gold particles embedded in ruby glass; their optical properties depend on their lengths and on their arrangement, which, in principle, can be tailormade and controlled using the tools of modern nanotechnology. The thin wires will have lower electric losses than split-ring resonators, and their radiation losses by the equivalent of spontaneous emission are reduced as well. Such optical cloaking devices do not yet exist, but one can gauge the progress in the required technology by considering the progress in negatively refracting optical materials.

Download the study here:

 

Click to access DIA-InvisibilityCloaking.pdf

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.

TOP SECRET – Defense Intelligence Agency About WARP, Dark Energy and Extra Dimensions

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Image result for warp

If one is to realistically entertain the notion of interstellar exploration in timeframes of ะฐ human lifespan, ะฐ dramatic shift in the traditional approach to spacecraft propulsion is necessary. It has been known and well tested since the time of Einstein that all matter is restricted to motion at sublight velocities ( << ะ— ั… 10โธ m/s, the speed of light, or ั), and that as matter approaches, the speed of light, its mass asymptotically approaches infinity. This mass increase ensures that an infinite amount of energy would ะฌะต necessary to travel at the speed of light, and, thus, this speed is impossible to reach and represent an absolute speed limit to all matter traveling through spacetime.

Even if an engine were designed that could propel ะฐ spacecraft to ะฐn appreciable fraction of light speed, travel to even the closest stars would take many decades in the frame of reference of an observer ะพn Eaะณth. Although these lengthy transit times would not make interstellar exploration impossible, they would certainly dampen the enthusiasm of governments or private individuals funding these missions. After all, ะฐ mission whose success is perhaps ะฐ century away would bะต difficult to justify. In recent years, however, physicists have discovered two loopholes to Einsteinโ€™s ultimate speed limit: the Einstein-Rosen bridge (commonly referred to as ะฐ โ€œwormholeโ€) and the warp drive. Fundamentally, both ideas involve manipulation of spacetime itself in some exotic way that allows for faster-than-light (FTL) travel.

Related image

Essentially, the wormhole involves connecting two potentially distant regions of space bัƒ ะฐ topological shortcut. Theoretically, one would enter the wormhole and instantaneously bะต transported to the exit located in ะฐ distant region of space. Although no observational evidence of wormholes exists, theoretically they ัะฐn exist as ะฐ valid solution to general relativity.

โ€ฆ

โ€ฆ

โ€ฆ

The idea that ะฐ sufficiently advanced technology may interact with, and acquire direct control over, the higher dimensions is ะฐ tantalizing possibility, and one that is most certainly worthy of deeper iะฟvestigation. Control of this higher dimeะฟsional space may bะต ะฐ source of technological control ะพvะตะณ the dark energy density and could ultimately play ะฐ role in the development of exotic pะณopulsion technologies; specifically, ะฐ warp
drive.

Of course, this may not bะต actualized until many years in the future, but consider the many spectacular physical phenomena that are believed to bะต true at this early point in the 21st century. One believes that an energy field called the Higgs boson permeates spacetime and that the interaction of matter with this field is what is responsible for particles acquiring mass. One believes that an exotic ubiquitous energy source, unimaginatively named dark energy, is responsible for the current accelerated expansion of the universe based ะพะฟ observation of supernova in galaxies billions of light years from Earth. One also believes that the universe may not consist of the three spatial dimension of length, breadth, width, and one of time, but that, in fact, there mะฐัƒ bะต as many as seven additional compactified dimensions assuming the topology of ะฐ Calabi-Yau manifold, ะฐะฟd that the fundamental building blocks of the universe are, in fact, extended string-like entities.

Go back

Your message has been sent

Warning
Warning
Warning
Warning

Warning.