🔥 An email from Sir Jeremy Farrar, director of the Wellcome Trust, to Dr Anthony Fauci and Dr Francis Collins of the US NIH on Feb 2 2020 said that “a likely explanation” was that Covid had rapidly evolved from a Sars-like virus inside human tissue
in a low-security lab. Such evolution may have “accidentally created a virus primed for rapid transmission between humans”.
Professor Mike Farzan of Scripps Research, the expert who discovered how the original Sars virus binds to human cells, was bothered by the furin site
2/n
and had a hard time to explain that as an event outside the lab, though there’re possible ways in nature but highly unlikely.
Bob Garry of University of Texas was unconvinced that Covid-19 emerged naturally: “I just can’t figure out how this gets accomplished in nature.”
3/n
Professor Andrew Rambaut, of University of Edinburgh, also said that furin cleavage site “strikes me as unusual”, and that “I think the only people with sufficient information or access to samples to address it would be the teams working in Wuhan.”
But Dutch virologist
4/n
Ron Fouchier told Sir Jeremy in an email that “further debate would do unnecessary harm to science in general and science in China in particular”.
Dr Collins, former director of US NIH, warned it could damage “international harmony”.
These emails were sent in response to
5/n
a teleconference between 12 scientists including Sir Patrick Vallance, the UK Government's chief scientific adviser, on Feb 1.
The new details came to light after members of the US Republican House Oversight Committee were granted access to the documents, after complaining
6/n
that their content had been heavily redacted when released under Freedom of Information requests. Institutions which held the emails have repeatedly resisted efforts to publish their content.
The emails show that by Feb 2, 2020 scientists were already trying to shut down
7/n
the debate into the lab leak theory.
🚨 What’s highly puzzling and also disturbing was that someone like former NIH Director Francis Collins, who’s supposed to be a scientist, had prioritized “international harmony” over truth and science.
8/n
🔻 the unredacted emails released by the US Republican House Oversight Committee
documentary series, “Everyday Eileen,” is already online, and Tencent is distributing it in China. Her roster of sponsors — glittering for an Olympic rookie — includes Victoria’s Secret, Apple-owned Beats by Dre, Bank of China and China Mobile. Chinese media reports have
2/n
lauded Gu’s skill in everything from piano and ballet to rock climbing. 🇨🇳 state media CCTV has called her “the perfect child next door.”
Gu can significantly boost China’s typically modest Winter Games medal haul by herself.
🇨🇳 Yealink doesn’t have the name recognition of Huawei but its phones are widely installed across the US including in government agencies. Yealink phones exchange encrypted messages with Chinese-based Alibaba Cloud multiple
Yealink’s service agreement requires users to accept China’s laws, while “a related set of service terms allows the active monitoring of users when required by the ‘national interest’ (of China).”
🚨 Are Yealink phones installed in Five Eyes, Quad, NATO, etc?
2/n
In a letter dated Sep 28, 2021, Senator Chris Van Hollen asked Commerce Secretary Gina Raimondo whether her agency was aware of the report by Chain Security, a Virginia-based company that analyzes electronics for security.
For Beijing, Eritrea represents a strategic opportunity. It borders Djibouti where China has a military base; it has a long coastline that offers access to the Red Sea; it has large deposits of precious minerals such as gold, silver, copper and zinc.
🚨 Bidding documents and contracts for over 300 Chinese government projects since the beginning of 2020 include orders for software designed to collect data on foreign targets from sources such as Twitter, Facebook and other Western social media.
The documents also show that agencies including state media, propaganda departments, police, military and cyber regulators are purchasing new or more sophisticated systems to gather data.
These surveillance dragnets are part of a wider drive by Beijing to refine its
2/n
foreign propaganda efforts through big data and artificial intelligence.
They also form a network of warning systems designed to sound real-time alarms for trends that undermine Beijing’s interests.
Some of the Chinese government’s budgeting includes buying and
3/n