“You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.”
-R. Buckminster Fuller, Inventor of the geodesic dome
Introduction
When, in March 1999, Vice President Gore said, “During my service in the U.S. Congress, I took the initiative in creating the Internet,” comedians unleashed a fusillade of jokes, mocking him. Of course, the Internet was already in existence when Gore was first elected to Congress in 1977. In fairness, however, Gore promoted the use of computers in Congress and, as a Senator, promoted bills making the government a catalyst for the ‘information superhighway.’ Then, in 1991, he sponsored a law devoting over $1 billion to connecting computers to international networks linking universities, schools, and other institutions. The irony is, by then, the country was already connected by a sophisticated computer network, originating not with Congress but 30 years earlier in the depths of the dank and unforgiving jungles of Southeast Asia.
ARPA – The Quiet Americans
In the 1960s, the war in Vietnam posed a novel challenge. The American adversary employed guerilla tactics, often confounding the use of expensive, conventional ordinance and strategy. When, in 1957, a satellite the size of a volleyball was launched, the Pentagon was in a panic. The Soviet Sputnik demanded an American response. President Eisenhower approved a Congressional US Air Force appropriations bill, awarding $1 billion to the Pentagon for the creation of the Advanced Research Projects Agency (ARPA).
ARPA then launched two initiatives, Project Agile and Command and Control Research (CCR), which created the Internet. J. C. R. Licklider (Lick), a psychologist with an addiction to Coca-Cola, was put in charge of CCR in 1962.
“Vice President Gore said, “During my service in the U.S. Congress, I took the initiative in creating the Internet,” comedians unleashed a fusillade of jokes, mocking him. “
Silicon Valley
Lick was a visionary. He believed in a future world where a single, sophisticated computer network – capable of accessing unlimited information – could connect all intelligence, government, and military agencies. He funded interactive computing, artificial intelligence, and graphic interface design projects through his personal and professional networks. MIT, UC Berkeley, UCLA, Harvard, Carnegie Mellon University, Stanford, and the Rand Corporation rose to the call from ARPA, and Silicon Valley was born. At universities, Computer Science became a department of its own.
William Godel, a military intelligence officer, arrived in Saigon in 1961 in charge of Project Agile. The US was not officially in the war but had military advisers in Vietnam counseling the French on its war with North Vietnam. On August 10, 1961, an initial project launched a Sikorsky helicopter over the impenetrable jungle Kon Tum, spraying the experimental Agent Orange, a defoliant chemical. Observers said it smelled like perfume. Discovering that the Vietnamese culture had a large element of belief in vampires, the US military ordered soldiers to perforate adversary corpses to strike fear in their opposition.
ARPA’s technological ingenuity produced Project Igloo White, a computerized surveillance barrier. The initiative deposited thousands of radiocontrolled seismic sensors, microphones, and heat and urine detectors into the dense jungle. When anything moved in the area, an airstrike would shower the foliage with bombs and napalm. Initially, this ‘electronic fence’ technology was effective and, a few years later, was deployed along the Mexican border in the U.S. However, North Vietnam’s intelligence soon comprehended the system and retaliated with tape-recorded truck sounds, urine deployment, and other decoys. The Americans then bombed the empty jungles.
ARPA realized that this was an intelligent, adaptable adversary in an environment comfortable to it but alien to Americans. Graham Green’s book, The Quiet American, describes this situation well. Yasha Levine, in his outstanding Valley, reveals that, to William Godel, high-tech counterinsurgency was about more than just developing modern killing methods. It was about surveilling, studying, and understanding the people and cultures where the insurrection occurred. The idea was to understand what made them resist and fight and what it would take to change their minds. The movie Apocalypse Now dramatized this culturally centered counterinsurgency. ARPA, under Godel, generously funded a horde of social and behavioral scientists to produce a counterinsurgency weapon effective in any culture in the world. Godel directed the Rand Corporation in Santa Monica to manage anthropologists, political scientists, and sociologists to study Vietnamese peasants, captured North Vietnamese, and hill tribe rebels. The Rand scientists studied the Strategic Hamlet pacification project to determine why North Vietnamese soldiers were not defecting to the American side.
The Backlog
While the intelligence gathered was cogent and potentially helpful, it was mainly submitted on paper. The military budget was so generous that warehouses began filling up with reports on every aspect of the people of Vietnam. Unless this could be digitized, it was mostly outdated and useless by the time it was analyzed. So, at Command and Control Research, Lick was acknowledged as the essential key to the counterinsurgency program. The enormous influx of ARPA funding to CCR was the driver that eventually produced the supercomputers that made surveillance and control of populations feasible.
Once ARPA had developed a digital computer network capable of storing and assessing an infinite amount of information, coupled with a communication system linking that information to all intelligence, military, and government agencies and each other, the job was done. Email was just one of the innovations that revolutionized military communication.
The Convenant
It did not take a genius to realize that the counterinsurgency oversight network could also be used domestically. Thus, the government soon utilized the Internet to quietly monitor potential criminal activity within the US. What did take genius was to realize the system could be even more effective if American citizens were told about it and, indeed, agreed to it. Americans were offered liberating technology, instant, cheap communications, and access to all the world’s knowledge at their fingertips in exchange for their privacy—a small price to pay for such an inestimable bounty, free of charge.
“The government soon utilized the Internet to quietly monitor potential criminal activity within the US.”
The Matrix
During the 18th Century, the Austrian Empire had gained access to correspondence, passing through central Europe by providing the most efficient postal service throughout the Holy Roman Empire. Although the Austrian Empire was no longer, Prince Klemens von Metternich knew that control of the postal service was essential to the invigilation of Europe. Most of the mail of the former empire still passed through Austrian sorting offices. Metternich extended this in partnership with the patrician de Fischer family in Berne. Consequently, all mail between France, Germany, and Italy was accessible to Austrian police scrutiny. People knew there was a good chance their letters were being opened, read, and resealed, but they still used the Austrian post because it was cheaper and faster than others.
To comprehend the magnitude of the facility Metternich pioneered, look at the Memphis, Tennessee, FedEx hub and the Matrix. Half a million packages an hour arrive from more than 150 planes every night. The company serves 375 airports in 220 countries. The packages are sorted and reloaded within hours on planes that will take them close to their final destination. 7,000 employees work all night, and 3,500 work the day shift. In a separate building, crews process almost a million small packages, primarily documents, per night. The efficiency is impressive. FedEx has a 99.97% accuracy sorting rate.

A Passcode for Your Privacy
According to Wikipedia, “The Internet has no single centralized governance: each constituent network sets its own policies.” However, Wiki adds, “In the US, under the Communications Assistance for Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies.”
So, who does own or control the Internet? In 1989, commercial Internet service providers (ISPs) emerged, and ARPA decommissioned its service in 1990 to avoid the association of the Internet with a military organization. The hardware needed to process the billions of data every second is colossal. One data center can cost over $2 billion to build. Element Critical has a 280,000 sq. ft. installation on 14.5 acres near Tyson, VA. Equinix has a mammoth supercomputer data center at Tyson Corner, VA, another in Vienna, VA, and yet another in Ashburn, VA, one in Secaucus, NJ, and one in Miami. Other companies own similar data centers in Los Angeles, Chicago, New York, Atlanta, Kansas City, Las Vegas, Silicon Valley, and Phoenix. Equinix owns three more in Dallas.
In 2011, the US Army Corps of Engineers began constructing a $2 billion data center outside Salt Lake City, Utah, the desert home of the National Security Agency (NSA). The structure provides 1.5 million sq. ft. and employs hundreds of highly paid employees. This supercomputer edifice has an electric bill of $50 million a year.
Ironically, as with the Defense Department’s NSA installation, much of the Internet’s infrastructure, especially phone towers and cabling, was funded by taxpayer money before the privatization of the network. Now, very little of that infrastructure is publicly owned. Google and Facebook/Meta now are responsible for 70% of all Internet traffic. James Bamford, author of The Shadow Factory- The Ultra-Secret NSA from 9/11 to Eavesdropping on America, said the public has yet to grasp the significance of Utah’s data mining. “It’s basically a hard drive. It’s also a cloud, a warehouse. It‘ll be storing not just text and audio, but pictures and video.” In his book No Place to Hide, Glenn Greenwald showed that the NSA’s stated objective was to “Collect it All,” “Process it All,” “Exploit it All, “Partner it All,” “Sniff it All,” and “Know it All.”
Cyber Whistleblower
On June 21, 2013, the US government charged Edward Snowden with espionage. Two days later, he flew to Moscow and was granted asylum. Snowden had trained top military officers in Japan to defend their networks from Chinese hackers. Dissatisfied with the NSA’s omniscient surveillance of Americans, Snowden released NSA documents disclosing its multibillion-dollar budget and the extent of its domestic invigilation apparatus. He revealed, for example, that a secret court order required Verizon to hand the NSA millions of Americans’ phone records daily. The Guardian newspaper reported Snowden said, “ I, sitting at my desk, could wiretap anyone from you or your accountant to a federal judge or even the President if I had a personal email.”
The Pandemic
The origin of the COVID-19 virus is more obscure. Even with an estimated budget of over $80 billion annually, the US intelligence agencies could not determine where the virulent virus originated. The CIA claims it is a mystery. Now, it is unlikely that the Chinese government intentionally released a virus. It is not plausible that the government would first release a deadly agent on its own population. Controversy continues about whether the origin is a leak from the Wuhan Virology Institute or perhaps from a bat soup sold in an open-air market near that institute. It is well documented that, once again, US taxpayer dollars funded the experiments in the Institute through grants from Dr. Fauci. A portion of $3.7 million in grants between 2014 and 2019 by the US National Institute of Health (NIH) to EcoHealthAlliance (EHA) helped fund viral research in Wuhan, China. The circuitous funding route occurred because gain– of–function viral research was illegal in the USA. ”
Emergency Approval
Operation Warp Speed, a term from Star Trek’s fictional universe, was initiated by President Trump on May 15, 2020, headed by Moncef Slaoui. Congress approved $18 billion by October for 1.2 billion doses of vaccine. Because it acknowledged the vaccine’s possible side effects, the US government exempted the production companies from prosecution resulting from any injuries. The companies approved for emergency marketing were Johnson & Johnson, AstraZeneca, Moderna, Pfizer, Novavax, Merck, and Glaxo-Smith Kline. To date, there have been reports of serious side effects from the vaccines, but it is difficult to prove a relationship between a post-vaccine malady and the vaccine itself. Both champion tennis player Novak Djokovic and star New York Jets quarterback Aaron Rogers refused the vaccine. Megyn Kelly, a TV journalist, consulted New York’s top rheumatologist about side effects she attributed to the Covid vaccine. The doctor agreed and told her many other vaccinated had the same symptoms.
Although statistics for COVID-19 deaths were high, fortunately, no celebrities or important government officials died from the virus. Both President Trump and President Biden contracted symptoms for a couple of days but recovered quickly.
In his book, The Truth about Wuhan – the Biggest Lie in History, Dr. Andrew Huff reveals that EcoHealthAlliance (EHA) was also receiving millions from US government agencies to conduct global bio-surveillance while doing little to reduce disease or improve ecological health. EHA also received support from the Wellcome Trust, the Google Foundation, and the Rockefeller Foundation. Dr. Huff says the “first truth about Wuhan: there is no evidence that SARS-COV-2 naturally emerged.”

Computer Generated
The book The Contagion Myth by Dr. Tom Cowan and Sally Fallon Morell contains a novel approach to searching for the origin. These authors intelligently suggest that the reason the CIA cannot discover the source of the virus is that it does not exist. Dr. Cowan attempted to isolate a sample of COVID-19 without success. The co-authors analyze in scientific detail the journal articles claiming the isolation of the deadly virus and convincingly challenge each one. The authors consider the spread of 5G towers and the vaccine itself as more of a danger. The economic lockdowns over two years they consider a mistake. In support of this thesis, Michael Chossudovsky, in The Worldwide Corona Crisis, says there is no causal relationship between the virus and the economic variables and suggests the lockdown was political in nature. In addition, he claims that the DNA-modifying Polymerase Chain Reaction test (PCR) produced up to 97% proven false positives. It is true that the late Dr. Kary Mullis, who won the Nobel Prize in Chemistry for his development of the PCR test, said himself that the test was to amplify DNA samples but that it was not a test for the presence of a virus.
Test the Test
In the summer of 2020, the late president of Tanzania, a trained chemist, determined to confirm the accuracy of the PCR test. He labeled samples with the names of people and sent them to a lab. However, included were samples from animals and fruit. To his surprise, the sample from a goat tested positive, as did one from a papaya. The president declared non-observance of the COVID-19 pandemic throughout Tanzania.
Residual Toxicity
Now, apart from the concerns about the loss of freedom and privacy concerning the phenomena of the Internet and the Coronavirus, there are concerns about the physical toxic fallout. Fortunately, the health concerns may be more easily remedied than the political ones. Blue light, for example, is emitted from computers, television sets, and other electronic screens. Although beneficial by day, at night, the short wave light in the violet/ blue band can have many negative biological effects, namely on circadian rhythm and retinal health macular degeneration. This blue light hazard can also lead to sleeplessness, cancer, diabetes, heart disease, and obesity. Another fallout from the computer age is what Koreans have diagnosed as digital dementia. Digital addiction is another. The ubiquity of pornography on the internet has a host of negative consequences.
Even before the COVID-19 event, Dr. Stephanie Seneff became aware of a novel lung disease associated with e-cigarettes. Since the 2007 introduction of vaping to the US market, Dr. Seneff suspected glyphosate might be the cause. “Tobacco itself is a GMO Roundup-Ready crop, so this could be one source, but other potential sources specific to e-cigarettes are glycerin and propylene, glycol additives. Glycerin is a major waste product of biodiesel production, easily converted into propylene glycol. The increased biodiesel production has glutted the market with glycerin, making it inexpensive and widely available.” The symptoms of this novel lung disease mimic the symptoms of COVID-19—shortness of breath, cough, chest pain, gastrointestinal issues, and abdominal pain. Patients also had fever or upper respiratory symptoms. It is significant that Dr. Tom Cowan also suggests that diesel emissions could cause similar symptoms to those associated with COVID-19. But he also warns in The Contagion Myth that “The spread of ‘CoronaVirus’ cases in large cities has followed the rollout of 5G millimeter small-cell emitters in major cities across the world, first in Wuhan, China, then in Europe, then in New York and other major US cities.”
California first put a future ban on gas-powered cars. In addition, CARP wants, in 2025, all new diesel vehicles to be powered by ’clean fuel.’ While recognizing the danger of diesel that Dr. Cowan has pointed to, California has allowed the construction of the Tesla Supercharger Station in Coalinga. The mammoth installation has 98 charging bays and is the biggest in the world. However, the electricity injected into the EVs is produced by a diesel-powered generator adjacent to the Supercharger Station. For those interested in astute investment, both Blackrock, Inc. and Vanguard Group, Inc. are major shareholders in Equinix, Pfizer, FedEx, Tesla, and even Lick’s favorite beverage, Coca-Cola.
Toxic Dust
Heavy metals, cadmium, lead, mercury, hexavalent chromium, nickel, and flame retardants are essential in electronic devices. Hazardous chemicals, such as phthalates, can be released from these devices into the air and dust of the home or office. Dr. Devra Davis warns that wireless technologies can produce health risks. “Young children of parents who frequently use devices as a form of childcare can experience delays in speech acquisition and bonding, while older children report feelings of disappointment due to ‘technoference’ – parental distraction due to technology. Children who begin using devices early in life can become socially, psychologically, and physically addicted to the technology and experience withdrawal upon cessation.”
The Answer
So, what can be done to detoxify and remain immune from these tech-generated contaminants? The severity of the crisis really calls for a miraculous remedy. And there just may be one. Energy Medicine originated in a California workshop 100 years ago and began with private, not taxpayer, investment. Royal R. Rife opened a clinic that bathed patients’ cancer cells with electromagnetic emissions, adjusting the frequency to achieve remission. A special research committee oversaw his research during the 1930s, and independent physicians, utilizing his technologies, successfully treated as many as 40 people a day. His treatment of cancer, herpes, and tuberculosis was recorded in Science magazine and, later, in the Smithsonian Institution’s annual report. Barry Lynn’s book, The Cancer Cure That Worked, tells the story. Unfortunately, orthodox medicine conflicted with Rife’s discovery that coherent wave emission could restore health at the correct frequencies. Funding dried up, and Americans had to wait 40 years before the computer revolution stimulated research and technology in wave therapy. Today, a vast array of state-of-the-art Energy Medicine devices are available.
At Hippocrates Wellness, more than a dozen patented technologies support the mitigation of electrosmog, memory and recall enhancement, sleep support, peak concentration, pain reduction, bone regeneration, and overall balancing of the autonomic nervous system. Sound, crystal, infrared with oxygen, polarized light, pulsed electromagnetic (PEMF) therapies, hyperbaric therapy, and multi-radiance treatments are used daily to support guests in their quest for pain relief with a view to regain a balanced, healthy, and fulfilling life, protected from the negative and toxic intrusions of digital devices. All this without side effects. The Energy Medicine department has designed a specific upgrade to the Life Transformation Program called Regeneration X. This program is a regenerative health journey in rebalancing the body’s natural vibrational well-being to mitigate the nefarious and debilitating effects of EMF and microwave radiation. Hippocrates has also added the updated version of the Rife machine, a device containing more than 4 million frequencies that correct and reestablish cellular health and vibrancy.
