Conspiracies & False Flags
Alternative Info on Potential Ebola Cure Tags: depopulation globalist agenda health freedom natural health

[While this ebola outbreak and deliberate spreading is clearly engineered, it may pose a very real threat at some point. The article below is informational and should be taken in accordingly as we monitor these unfolding events. Reliable informational sources will be scant so keep this arrow in your quiver as we watch and see what unfolds ahead of us. - Zen]

by Clif High Contributor HalfPastHuman

EBOLA CURE: Solid info herein. Chyawanprash (ayurveda product) is huge source of Vitamin C: Do NOT rely on collodial silver. It does not get past saliva/stomach.

This is a lengthy article, DO NOT SURFACE READ. The actual treatment for ebola which will virtually eliminate fatalities, as revealed by a doctor who has worked with ebola, is below.

Consider this: The elite would never release a plague without an easy cure, and along with this ebola outbreak an American biowarfare firm has been working in Sierra Leon for the last five years. Google that. Sierra Leon has actually identified them as the perpetrators of this outbreak and kicked them out of the country. There is absolutely no doubt this outbreak was intentionally caused by the U.S. war department.

And if it is intentional, a cure is known. There would simply be no other way to do business.

Here is the treatment, complete with MOA. This is a treatment and not a cure, your immune system wipes out the virus, and the treatment gives your immune system time to do it. Here is what Ebola does that is fatal: It causes the complete removal of all vitamin C from the body. No one actually knows what mechanism is involved in doing this, other than a malfunction that is not permanently destructive to whatever is triggered to remove all vitamin C. All the researchers know is that vitamin C drops to zero and all the symptoms of ebola are consistent with a complete loss of vitamin C.

How do I know this? A doctor who has remained anonymous and has worked with ebola victims has discovered this and sent it to this web site, at last check this cannot be googled which confirms this doctor did not just copy paste, SO POST IT EVERYWHERE; GET THIS OUT THERE, THE TREATMENT FOR EBOLA WHICH WILL PREVENT DEATH IS KNOWN AND THIS IS AN EMERGENCY REQUEST FOR MY READERS TO SPREAD THIS INFO AND STOP THIS EBOLA ATTACK IN ITS TRACKS.

From an anonymous doctor:

Summary:

“The very first symptoms of ebola are exactly the same as scurvy, which is caused by inadequate vitamin C. Though scurvy is seldom fatal as a primary condition, scurvy also represents only a partial deficiency of vitamin C, the body still has a LOT of vitamin C compared to zero, which ebola causes. Absent ANY vitamin C, blood vessels become very weak and start to lose blood, and platelets become ineffective and unable to trigger clots. So death by ebola is caused by massive internal bleeding and loss of blood, which can be stopped simply by taking enormous doses of vitamin C until the immune system succeeds in killing off the virus.”

Begin text:

Ebola is probably the best known of a class of viruses known as hemorrhagic fever viruses. In fact, Ebola virus was initially recognized in 1976. Other less known but related viral syndromes include yellow fever, dengue hemorrhagic fever, Rift Valley fever, Crimean-Congo hemorrhagic fever, Kyasanur Forest disease, Omsk hemorrhagic fever, hemorrhagic fever with renal syndrome, Hantavirus pulmonary syndrome, Venezuelan hemorrhagic fever, Brazilian hemorrhagic fever, Argentine hemorrhagic fever, Bolivian hemorrhagic fever, and Lassa fever. The Ebola virus infection, also known as African hemorrhagic fever, has the distinction of having the highest case-fatality rate of the viral infections noted above, ranging from 53% to 88%.

These viral hemorrhagic fever syndromes share certain clinical features. The Cecil Textbook of Medicine notes that these diseases are characterized by capillary fragility, which translates to easy bleeding, that can frequently lead to severe shock and death. These diseases also tend to consume and/or destroy the platelets, which play an integral role in blood clotting. The clinical presentation of these viral diseases is similar to scurvy, which is also characterized by capillary fragility and a tendency to bleed easily. Characteristic skin lesions develop, which are actually multiple tiny areas of bleeding into the skin that surround the hair follicles. some cases even include bleeding into already healed scars.

In the classic form of scurvy that evolves very slowly from the gradual depletion of vitamin C body stores, the immune system will be sufficiently compromised for infection to claim the patient’s life before the extensive hemorrhage that occurs after all vitamin C stores have been completely exhausted. Ebola virus and the other viral hemorrhagic fevers are much more likely to cause hemorrhaging before any other fatal infection has a chance to become established. This is because the virus so rapidly and totally metabolizes and consumes all available vitamin C in the bodies of the victims that an advanced stage of scurvy is literally produced after only a few days of the disease.

The scurvy is so complete that the blood vessels generally cannot keep from hemorrhaging long enough to allow an infective complication to develop. Also, the viral hemorrhagic fevers typically only take hold and reach epidemic proportions in those populations that would already be expected to have low body stores of vitamin C, such as is found in many of the severely malnourished Africans. In such individuals, an infecting hemorrhagic virus will often wipe out any remaining vitamin C stores before the immune systems can get the upper hand and initiate recovery. When the vitamin C stores are rapidly depleted by large infecting doses of an aggressive virus, the immune system gets similarly depleted and compromised. However, this point is largely academic after hemorrhaging throughout the body has begun.

To date, no viral infection has been demonstrated to be resistant to the proper dosing of vitamin C as classically demonstrated by Klenner. However, not all viruses have been treated with Klenner-sized vitamin C doses, or at least the results have not been published. Ebola viral infection and the other acute viral hemorrhagic fevers appear to be diseases that fall into this category. Because of the seemingly exceptional ability of these viruses to rapidly deplete vitamin C stores, even larger doses of vitamin C would likely be required in order to effectively reverse and eventually cure infections caused by these viruses.

Cathcart (1981), who introduced the concept of bowel tolerance to vitamin C discussed earlier, hypothesized that Ebola and the other acute viral hemorrhagic fevers may well require 500,000 mg of vitamin C daily to reach bowel tolerance! Whether this estimate is accurate, it seems clear as evidenced by the scurvy-like clinical manifestations of these infections that vitamin C dosing must be vigorous and given in extremely high doses. If the disease seems to be winning, then even more vitamin C should be given until symptoms begin to lessen. Obviously, these are viral diseases that would absolutely require high doses of vitamin C intravenously as the initial therapy. The oral administration should begin simultaneously, but the intravenous route should not be abandoned until the clinical response is complete. Death occurs too quickly with the hemorrhagic fevers to be conservative when dosing the vitamin C. (from Vitamin C, Infectious Diseases, and Toxins:Curing the Incurable by Thomas E. Levy MD JD)

MY COMMENT: I may not be a doctor, but I am awful good with medical topics, and this rings 100 percent true, IT IS THE MOA which if combined with some of my medical knowledge, such as the fact that Broccoli is absolutely excellent for assisting the clotting of blood, that the active component of Noni (which is in pineapple juice) is strongly anti viral, and that cures such as colloidal silver, while good for bacterial infections does nothing for viruses, combine some real knowledge with what this doctor says and it is highly probable that Ebola can be shrugged off as a mild case of scurvy.

Beware the current Colloidal Silver psy op, the actual cure for Ebola has been given to this web site.

Colloidal silver is great stuff, and I have made gallons from a 1 ounce silver bar myself. It works great for curing BACTERIAL infections and making water safe to drink without the nasty taste of iodine. HOWEVER, COLLOIDAL SILVER WILL DO NOTHING AGAINST VIRUSES, AND HUGE LIES ARE BEING HATCHED RIGHT NOW TO MISGUIDE PEOPLE TO A FALSE EBOLA CURE AND THE ALTERNATIVE MEDIA IS LAPPING IT UP

All curative agents have a mode of action, or MOA. And if anyone posting medical cures does not know the MOA, they have no idea what they are talking about. Colloidal silver has an MOA that has been known for many decades, yet recently Google has been rigged to bury it with only articles stating “the MOA is being explored and we think it is ___(then disinfo)” and there has to be a reason why this is being done right now, at this point in time with Ebola running amok.

MORE>>

+++

ZenGardner.com

 

Visit the Wrong Website, and the FBI Could End Up in Your Computer
us-spy

 Getty

Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.

Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.

The approach has borne fruit—over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result. But it’s also engendering controversy, with charges that the Justice Department has glossed over the bulk-hacking technique when describing it to judges, while concealing its use from defendants. Critics also worry about mission creep, the weakening of a technology relied on by human rights workers and activists, and the potential for innocent parties to wind up infected with government malware because they visited the wrong website. “This is such a big leap, there should have been congressional hearings about this,” says ACLU technologist Chris Soghoian, an expert on law enforcement’s use of hacking tools. “If Congress decides this is a technique that’s perfectly appropriate, maybe that’s OK. But let’s have an informed debate about it.”

The FBI’s use of malware is not new. The bureau calls the method an NIT, for “network investigative technique,” and the FBI has been using it since at least 2002in cases ranging from computer hacking to bomb threats, child porn to extortion. Depending on the deployment, an NIT can be a bulky full-featured backdoor program that gives the government access to your files, location, web history and webcam for a month at a time, or a slim, fleeting wisp of code that sends the FBI your computer’s name and address, and then evaporates.

What’s changed is the way the FBI uses its malware capability, deploying it as a driftnet instead of a fishing line. And the shift is a direct response to Tor, the powerful anonymity system endorsed by Edward Snowden and the State Department alike.

Tor is free, open-source software that lets you surf the web anonymously. It achieves that by accepting connections from the public Internet—the “clearnet”—encrypting the traffic and bouncing it through a winding series of computers before dumping it back on the web through any of over 1,100 “exit nodes.”

The system also supports so-called hidden services—special websites, with addresses ending in .onion, whose physical locations are theoretically untraceable. Reachable only over the Tor network, hidden services are used by organizations that want to evade surveillance or protect users’ privacy to an extraordinary degree. Some users of such service have legitimate and even noble purposes—including human rights groups and journalists. But hidden services are also a mainstay of the nefarious activities carried out on the so-called Dark Net: the home of drug markets, child porn, murder for hire, and a site that does nothing but stream pirated My Little Pony episodes.

Law enforcement and intelligence agencies have a love-hate relationship with Tor. They use it themselves, but when their targets hide behind the system, it poses a serious obstacle. Last month, Russia’s government offered a $111,000 bounty for a method to crack Tor.

The FBI debuted its own solution in 2012, in an investigation dubbed “Operation Torpedo,” whose contours are only now becoming visible through court filings.

Operation Torpedo began with an investigation in the Netherlands in August 2011. Agents at the National High Tech Crime Unit of the Netherlands’ national police force had decided to crack down on online child porn, according to an FBI affidavit. To that end, they wrote a web crawler that scoured the Dark Net, collecting all the Tor onion addresses it could find.

The NHTCU agents systematically visited each of the sites and made a list of those dedicated to child pornography. Then, armed with a search warrant from the Court of Rotterdam, the agents set out to determine where the sites were located.

That, in theory, is a daunting task—Tor hidden services mask their locations behind layers of routing. But when the agents got to a site called “Pedoboard,” they discovered that the owner had foolishly left the administrative account open with no password. They logged in and began poking around, eventually finding the server’s real Internet IP address in Bellevue, Nebraska.

They provided the information to the FBI, who traced the IP address to 31-year-old Aaron McGrath. It turned out McGrath was hosting not one, but two child porn sites at the server farm where he worked, and a third one at home.

Instead of going for the easy bust, the FBI spent a solid year surveilling McGrath, while working with Justice Department lawyers on the legal framework for what would become Operation Torpedo. Finally, on November 2012, the feds swooped in on McGrath, seized his servers and spirited them away to an FBI office in Omaha.

A federal magistrate signed three separate search warrants: one for each of the three hidden services. The warrants authorized the FBI to modify the code on the servers to deliver the NIT to any computers that accessed the sites. The judge also allowed the FBI to delay notification to the targets for 30 days.

Operation Torpedo search warrant

The FBI’s drive-by malware search warrants name all “computers that access the website” as targets.

This NIT was purpose-built to identify the computer, and do nothing else—it didn’t collect keystrokes or siphon files off to the bureau. And it evidently did its job well. In a two-week period, the FBI collected IP addresses, hardware MAC addresses (a unique hardware identifier for the computer’s network or Wi-Fi card) and Windows hostnames on at least 25 visitors to the sites. Subpoenas to ISPs produced home addresses and subscriber names, and in April 2013, five months after the NIT deployment, the bureau staged coordinated raids around the country.

Today, with 14 of the suspects headed toward trial in Omaha, the FBI is being forced to defend its use of the drive-by download for the first time. Defense attorneys have urged the Nebraska court to throw out the spyware evidence, on the grounds that the bureau concealed its use of the NIT beyond the 30-day blackout period allowed in the search warrant. Some defendants didn’t learn about the hack until a year after the fact. “Normally someone who is subject to a search warrant is told virtually immediately,” says defense lawyer Joseph Gross Jr. “What I think you have here is an egregious violation of the Fourth Amendment.”

But last week U.S. Magistrate Judge Thomas Thalken rejected the defense motion, and any implication that the government acted in bad faith. “The affidavits and warrants were not prepared by some rogue federal agent,” Thalken wrote, “but with the assistance of legal counsel at various levels of the Department of Justice.” The matter will next be considered by U.S. District Judge Joseph Bataillon for a final ruling.

The ACLU’s Soghoian says a child porn sting is probably the best possible use of the FBI’s drive-by download capability. “It’s tough to imagine a legitimate excuse to visit one of those forums: the mere act of looking at child pornography is a crime,” he notes. His primary worry is that Operation Torpedo is the first step to the FBI using the tactic much more broadly, skipping any public debate over the possible unintended consequences. “You could easily imagine them using this same technology on everyone who visits a jihadi forum, for example,” he says. “And there are lots of legitimate reasons for someone to visit a jihadi forum: research, journalism, lawyers defending a case. ACLU attorneys read Inspire Magazine, not because we are particularly interested in the material, but we need to cite stuff in briefs.”

Soghoian is also concerned that the judges who considered NIT applications don’t fully understand that they’re being asked to permit the use of hacking software that takes advantage of software vulnerabilities to breach a machine’s defenses. The Operation Torpedo search warrant application, for example, never uses the words “hack,” “malware,” or “exploit.” Instead, the NIT comes across as something you’d be happy to spend 99 cents for in the App Store. “Under the NIT authorized by this warrant, the website would augment [its] content with some additional computer instructions,” the warrant reads.

From the perspective of experts in computer security and privacy, the NIT is malware, pure and simple. That was demonstrated last August, when, perhaps buoyed by the success of Operation Torpedo, the FBI launched a second deployment of the NIT targeting more Tor hidden services.

This one—still unacknowledged by the bureau—traveled across the servers of Freedom Hosting, an anonymous provider of turnkey Tor hidden service sites that, by some estimates, powered half of the Dark Net.

The payload for the Tor Browser Bundle malware is hidden in a variable called “magneto”.

The payload for the Tor Browser Bundle malware is hidden in a variable called “magneto”.

This attack had its roots in the July 2013 arrest of Freedom Hosting’s alleged operator, one Eric Eoin Marques, in Ireland. Marques faces U.S. charges of facilitating child porn—Freedom Hosting long had a reputation for tolerating child pornography.

Working with French authorities, the FBI got control of Marques’ servers at a hosting company in France, according to testimony in Marques’ case. Then the bureau appears to have relocated them—or cloned them—in Maryland, where the Marques investigation was centered.

On August 1, 2013, some savvy Tor users began noticing that the Freedom Hosting sites were serving a hidden “iframe”—a kind of website within a website. The iframe contained Javascript code that used a Firefox vulnerability to execute instructions on the victim’s computer. The code specifically targeted the version of Firefox used in the Tor Browser Bundle—the easiest way to use Tor.

This was the first Tor browser exploit found in the wild, and it was an alarming development to the Tor community. When security researchers analyzed the code, they found a tiny Windows program hidden in a variable named “Magneto.” The code gathered the target’s MAC address and the Windows hostname, and then sent it to a server in Virginia in a way that exposed the user’s real IP address. In short, the program nullified the anonymity that the Tor browser was designed to enable.

As they dug further, researchers discovered that the security hole the program exploited was already a known vulnerability called CVE-2013-1690—one that had theoretically been patched in Firefox and Tor updates about a month earlier. But there was a problem: Because the Tor browser bundle has no auto-update mechanism, only users who had manually installed the patched version were safe from the attack. “It was really impressive how quickly they took this vulnerability in Firefox and extrapolated it to the Tor browser and planted it on a hidden service,” says Andrew Lewman, executive director of the nonprofit Tor Project, which maintains the code.

The Freedom Hosting drive-by has had a lasting impact on the Tor Project, which is now working to engineer a safe, private way for Tor users to automatically install the latest security patches as soon as they’re available—a move that would make life more difficult for anyone working to subvert the anonymity system, with or without a court order.

Unlike with Operation Torpedo, the details of the Freedom Hosting drive-by operation remain a mystery a year later, and the FBI has repeatedly declined to comment on the attack, including when contacted by WIRED for this story. Only one arrest can be clearly tied to the incident—that of a Vermont man named Grant Klein who, according to court records, was raided in November based on an NIT on a child porn site that was installed on July 31, 2013. Klein pleaded guilty to a single count of possession of child pornography in May and is set for sentencing this October.

But according to reports at the time, the malware was seen, not just on criminal sites, but on legitimate hidden services that happened to be hosted by Freedom Hosting, including the privacy protecting webmail service Tormail. If true, the FBI’s drive-by strategy is already gathering data on innocent victims.

Despite the unanswered questions, it’s clear that the Justice Department wants to scale up its use of the drive-by download. It’s now asking the Judicial Conference of the United States to tweak the rules governing when and how federal judges issue search warrants. The revision would explicitly allow for warrants to “use remote access to search electronic storage media and to seize or copy electronically stored information” regardless of jurisdiction.

The revision, a conference committee concluded last May (.pdf), is the only way to confront the use of anonymization software like Tor, “because the target of the search has deliberately disguised the location of the media or information to be searched.”

Such dragnet searching needs more scrutiny, Soghoian says. “What needs to happen is a public debate about the use of this technology, and the use of these techniques,” he says. “And whether the criminal statutes that the government relies on even permit this kind of searching. It’s one thing to say we’re going to search a particular computer. It’s another thing to say we’re going to search every computer that visits this website, without knowing how many there are going to be, without knowing what city, state or countries they’re coming from.”

“Unfortunately,” he says, “we’ve tiptoed into this area, because the government never gave notice that they were going to start using this technique.”

Source

"Ukrainian junta prepares heinous attacks." Briefing, I.Strelkov and V.Antyufeev July 31, 2014, Donetsk

"Ukrainian junta prepares heinous attacks." Briefing, I.Strelkov and V.Antyufeev July 31, 2014, Donetsk

https://www.youtube.com/watch?v=e13SPFFIVkM

Video is not translated, see below transcription:

The Donetsk People's Republic (DPR) Minister of defense Igor Strelkov held a special briefing where he reported that according to DPR’s intelligence Ukraine punitive operation forces are planning monstrous acts of terrorism on the territory of Donbass.


On this extra meeting the deputy Prime Minister of the Donetsk People's Republic Vladimir Antyufeev took part in by asking the questions he had foreseen: “The first. V.V.Putin didn’t telephone me, and I have never met him. The second. My colleagues and me are not FSB members. The third. The forces of Donetsk People’s Republic did not shoot down the boeing, and Russia didn’t either. The forth. Neither me nor Igor Ivanovich have never met or known anyone from Presidential Administration of Russian Federation.
Do we expect help of Russia? – Yes, we do expect. And we are getting this help, mostly political help.
How do we suppose to deal with the current situation? – We count upon Russia’s help.”

After this DPR Minister of defense Igor Ivanovich Strelkov reported that Ukraine punitive operation forces are planning large-scale provocation.

"The intelligence of the Ministry of Defense of People's Republic of Donetsk has informed me that the contender Ukrainian chastener troops prepare big provocation which should result in declaration of DPR as a terrorist organization. They want to blame us in terrorism and killing the civilian population," – Strelkov said. "The idea is so monstrous that it is probably hard to believe, especially it is hard to believe for those who hasn't seen the bombardment of populated areas by phosphorous bombs; who hasn’t seen people injured by chemical weapon; who hasn’t seen how howitzers were shooting at the city center, where the militia headquarters was located, who hasn’t seen how mines and missiles were falling in a few meters from our headquarters and soon after Ukrainian mass media telling that we were shooting at ourselves. Shameless continuous, I would even say phantasmagoric lies, which is spreaded by Ukranian mass media, and cruel barbaric actions of the Ukraine punitive operation forces show us that nothing is sacred to them. " - he said

"According to the data we have got (acknowledged data) – Strelkov said – three rockets to be launched with the aid of ballistic missile “Scarab B” (“Tochka-U”) were delivered to the airfield Kramatorsk. These missiles are now undergoing maintenance and are prepared for launching. Their aims are Donetsk and Lugansk treatment facilities. For information, the treatment plants possess 120 and 160 tons of chlorine, consequently. The spare goal is Gorlovka "Styrene" mill with a great deal of ammonia. It is assumed that before the missiles launch, propaganda campaign would be carried out to accuse the militias in preparing attacks on chemical plants in Donetsk and Lugansk. "

According to Strelkov, knowing all that acts made by Ukrainian troops in Donbass, we are made to believe whatever information, “The consequences can be appalling. Depending on the wind, chlorine vapor can reach out of Donetsk to Volnovakha. Everything will be killed in this area. People and animal stock will die. Victims may be tens of thousands. They may be much more numerous depending on direction the pollution plum spread,” – said Igor Strelkov.

He also accentuated that “militia forces of Donetsk People's Republic and militia forces of Lugansk People's Republic don’t take any terrorist actions against people of Ukraine and republic people all the more”. “We don’t even fire at the enemy if there is a risk of affecting the civilians. But military forces of Ukraine are hiding, shielding themselves with civilians, doing what they accuse us in”, he said.

DPR Defense Minister hopes his statement would prevent the use of such barbaric methods of punitive operation.

RSS
Search a Blog

October 2014 (10)
September 2014 (688)
August 2014 (661)
July 2014 (654)
June 2014 (607)
May 2014 (659)
April 2014 (776)
March 2014 (692)
February 2014 (747)
January 2014 (962)
December 2013 (852)
November 2013 (858)
October 2013 (851)
Blog Categories

WHO IS ONLINE
Focusing On Real Values

Get Your Gold Out Of Dodge can help you today protect your international gold holdings. Still stacking stateside? Internationalize today and sleep that much better.

A great way to a new standard.

Gold in small units, also one gram at time

Need a real unique gift for your big love? Get your "Love-Gold-Card" in our shop.

Gold, a secure future.

Register and become a partner

HERE

Short YouTube Film explain

HERE

Products for your Wellness

Important: For all products chose at the top of the page the  language (English or German) and currency!

 click HERE to reach all products

TATWellness deliver worldwide.

Support B.O.L.E.

Your support to have the B.O.L.E. (incl.all articles) open and free for everyone is much appreciated.

In Your Service

B.O.L.E.

 

 

This website is powered by Spruz

Live Support