Anonymous ID: 15e88d March 28, 2022, 10:43 a.m. No.10666   🗄️.is 🔗kun   >>0667

"And that's how we do it." is an admission that this was all completely fucking staged to distract from Gas prices, Hunter Biden Laptop, and Ukraine Biolabs.

 

It's incredible how blatant and pathetic their attempts to the 3-card Monty the world is becoming.

Anonymous ID: 15e88d March 29, 2022, 12:12 p.m. No.10767   🗄️.is 🔗kun   >>0772

>>10756

I wonder to myself if the morans in DC really realize what will happen if they attempt to arrest DJT. They'll need a lot more national guard to protect them.

Anonymous ID: 15e88d March 29, 2022, 12:25 p.m. No.10768   🗄️.is 🔗kun

I did a massive dig on Kolomoiskey like 2 years ago. All of his US based companies laid out, Privatbank. Wonder if I could go through the archives and find it all. Now he wants Russia to pay Ukraine $100 Billion.. so he can steal it all from his puppet Zelensky.

Anonymous ID: 15e88d March 29, 2022, 1:42 p.m. No.10773   🗄️.is 🔗kun   >>0774

>>10772

No, they have to try to take him out of the game. Whether it be disqualification or other process. Whether there is merit to their claims is irrelevant in DC. If there is anything they can even frame him for, they would without hesitation, even if they knew he could walk. So long as it tied him up past '24.

Anonymous ID: 15e88d March 29, 2022, 7:11 p.m. No.10798   🗄️.is 🔗kun

TSQ just sent us on a quest to find a translator for a language that less 3 percent of the worlds population speak.

Anonymous ID: 15e88d March 30, 2022, 6:04 a.m. No.10839   🗄️.is 🔗kun   >>0840

That post by TSQ most likely means more than just the message. I would keep an eye on any news involving the New Zealand area for a few days.

Anonymous ID: 15e88d March 30, 2022, 9:23 a.m. No.10861   🗄️.is 🔗kun   >>0865

>>10859

Let's be honest, I'll probably get booted off any way because I am 100% certain Q was heavily talking about the Jew World Order, and I am not good and being PC.

Anonymous ID: 15e88d March 30, 2022, 5:44 p.m. No.10908   🗄️.is 🔗kun   >>0910 >>0914

>>10906

If 8kun goes down, it will be Jim that takes it down. Once Ron is BTFO, and he will be, Jim no longer needs Ron For Congress 2022 (formerly QResearch).

 

Sad thing is, I still like Ron, even though I believe his papa is a POS.

Anonymous ID: 15e88d March 30, 2022, 6:21 p.m. No.10912   🗄️.is 🔗kun   >>0913 >>1294 >>1339 >>1365

https://www.washingtonpost.com/technology/2022/03/30/hunter-biden-laptop-data-examined

 

Here’s how The Post analyzed Hunter Biden’s laptop

 

 

The vast majority of the data — and most of the nearly 129,000 emails it contained — could not be verified by either of the two security experts who reviewed the data for The Post. Neither found clear evidence of tampering in their examinations, but some of the records that might have helped verify contents were not available for analysis, they said. The Post was able in some instances to find documents from other sources that matched content on the laptop that the experts were not able to assess.

 

Among the reasons for the inconclusive findings was sloppy handling of the data, which damaged some records. The experts found the data had been repeatedly accessed and copied by people other than Hunter Biden over nearly three years. The MacBook itself is now in the hands of the FBI, which is investigating whether Hunter Biden properly reported income from business dealings.

 

Most of the data obtained by The Post lacks cryptographic features that would help experts make a reliable determination of authenticity, especially in a case where the original computer and its hard drive are not available for forensic examination. Other factors, such as emails that were only partially downloaded, also stymied the security experts’ efforts to verify content.

 

The contents of Hunter Biden’s laptop computer have sparked debate and controversy since the New York Post and other news organizations in the closing month of the 2020 presidential campaign reported stories based on data purportedly taken from it.

 

Many Republicans have portrayed this data as offering evidence of misbehavior by Hunter Biden that implicated his father in scandal, while Democrats have dismissed it as probable disinformation, perhaps pushed by Russian operatives acting in a well-documented effort to undermine the elder Biden. Facebook and Twitter in 2020 restricted distribution of stories about the drive’s contents out of concern that the revelations might have resulted from a nefarious hacking campaign intended to upend the election, much as Russian hacks of sensitive Democratic Party emails shaped the trajectory of the 2016 election.

 

The Washington Post’s forensic findings are unlikely to resolve that debate, offering instead only the limited revelation that some of the data on the portable drive appears to be authentic. The security experts who examined the data for The Post struggled to reach definitive conclusions about the contents as a whole, including whether all of it originated from a single computer or could have been assembled from files from multiple computers and put on the portable drive.

 

At The Post’s request, Matt Green, a Johns Hopkins University security researcher who specializes in cryptography, and Jake Williams, a forensics expert and former National Security Agency operative who once hacked the computers of foreign adversaries, separately examined two copies The Post made of the portable drive Maxey provided.

 

The portable drive provided to The Post contains 286,000 individual user files, including documents, photos, videos and chat logs. Of those, Green and Williams concluded that nearly 22,000 emails among those files carried cryptographic signatures that could be verified using technology that would be difficult for even the most sophisticated hackers to fake.

 

Such signatures are a way for the company that handles the email — in the case of most of these, Google — to provide proof that the message came from a verified account and has not been altered in some way. Alterations made to an email after it has been sent cause the cryptographic signatures to become unverifiable.

 

The verified emails cover a time period from 2009 to 2019, when Hunter Biden was acting as a consultant to companies from China and Ukraine, and exploring opportunities in several other countries. His father was vice president from 2009 to 2017.

 

Many of the nearly 22,000 verified emails were routine messages, such as political newsletters, fundraising appeals, hotel receipts, news alerts, product ads, real estate listings and notifications related to his daughters’ schools or sports teams. There was also a large number of bank notifications, with about 1,200 emails from Wells Fargo alone.

 

Other emails contained exchanges with Hunter Biden’s business partners, personal assistants or members of his family. Some of these emails appear to offer insights into deals he developed and money he was paid for business activities that opponents of his father’s bid for the presidency sought to make a campaign issue in 2020.

 

In particular, there are verified emails illuminating a deal Hunter Biden developed with a fast-growing Chinese energy conglomerate, CEFC China Energy, for which he was paid nearly $5 million, and other business relationships. Those business dealings are the subject of a separate Washington Post story published at the same time as this one on the forensic examinations of the drive.

 

The drive also includes some verified emails from Hunter Biden’s work with Burisma, the Ukrainian energy company for which he was a board member. President Donald Trump’s efforts to tie Joe Biden to the removal of a Ukrainian prosecutor investigating Burisma led to Trump’s first impeachment trial, which ended in acquittal in February 2020.

 

The Post’s review of these emails found that most were routine communications that provided little new insight into Hunter Biden’s work for the company.

 

The laptop’s journey begins

 

John Paul Mac Isaac, the owner of the Wilmington repair shop, has said he received the 13-inch MacBook Pro on April 12, 2019, when Hunter Biden asked him to recover data from the computer because it had been damaged by liquid.

 

According to Mac Isaac’s attorney, Brian Della Rocca, recovering the data was challenging for Mac Isaac.

 

“He would boot the computer and transfer as much as he could before the computer shut down. Then, he would boot up the computer again, verify what was copied, and then transfer more data until the computer shut down again. This process repeated several times,” Della Rocca said in a prepared statement.

 

When his work was completed, Della Rocca said, Mac Isaac repeatedly attempted to contact Hunter Biden, who had signed a repair authorization, to advise him the laptop was ready to be picked up, but Hunter never responded. Della Rocca added that Mac Isaac finally came to regard the MacBook as abandoned property.

 

In July 2019, when news of Hunter Biden’s business dealings with Ukraine was gaining attention — largely because Trump’s private attorney, Rudy Giuliani, was making public allegations of wrongdoing — Mac Isaac contacted the FBI about the MacBook.

 

On Dec. 9, 2019, FBI agents from the Wilmington field office served a subpoena on Mac Isaac for the laptop, the hard drive and all related paperwork.

 

“He willingly gave it to the FBI and was happy to see it go,” Della Rocca said.

 

He added that Mac Isaac, before turning over the computer, made a copy of its hard drive “in case he was ever thrown under the bus as a result of what he knew.”

 

By then, Trump’s first impeachment trial, which ran from Jan. 16 to Feb. 5, 2020, was underway and Mac Isaac attempted to contact several members of Congress, none of whom replied.

 

He later contacted Giuliani, whose attorney, Robert Costello, responded almost immediately.

 

In an email with the subject line “Why is it so difficult to be a whistleblower when you are on the right?” written on Aug. 26, 2020, Mac Isaac told Costello that he had copies of the hard drive from Hunter Biden’s laptop.

 

“For my protection I made sevral copies and I have been trying quietly to bring it to peoples attention. I am reaching out to you for assistance and making sure the people that need to know about this do.”

 

Costello said he received a copy of the laptop’s hard drive from Mac Isaac. Giuliani has said he provided that data to the New York Post.

 

After the New York Post began publishing reports on the contents of the laptop in October 2020, The Washington Post repeatedly asked Giuliani and Republican strategist Stephen K. Bannon for a copy of the data to review, but the requests were rebuffed or ignored.

 

In June 2021, Maxey, who previously worked as a researcher for Bannon’s “War Room” podcast, delivered to The Washington Post a portable hard drive that he said contained the data. He said he had obtained it from Giuliani.

 

Responding to findings from news organizations that some material on the drive could be corroborated, Mac Isaac said in a statement: “I am relieved that finally, after 18 months of being persecuted and attacked for my actions, the rest of the country is starting to open their eyes.”

 

What the experts found

 

In their examinations, Green and Williams found evidence that people other than Hunter Biden had accessed the drive and written files to it, both before and after the initial stories in the New York Post and long after the laptop itself had been turned over to the FBI.

 

Maxey had alerted The Washington Post to this issue in advance, saying that others had accessed the data to examine its contents and make copies of files. But the lack of what experts call a “clean chain of custody” undermined Green’s and Williams’s ability to determine the authenticity of most of the drive’s contents.

 

“The drive is a mess,” Green said.

 

He compared the portable drive he received from The Post to a crime scene in which detectives arrive to find Big Mac wrappers carelessly left behind by police officers who were there before them, contaminating the evidence.

 

That assessment was echoed by Williams.

 

“From a forensics standpoint, it’s a disaster,” Williams said. (The Post is paying Williams for the professional services he provided. Green declined payment.)

 

But both Green and Williams agreed on the authenticity of the emails that carried cryptographic signatures, though there was variation in which emails Green and Williams were able to verify using their forensic tools. The most reliable cryptographic signatures, they said, came from leading technology companies such as Google, which alone accounted for more than 16,000 of the verified emails.

 

Neither expert reported finding evidence that individual emails or other files had been manipulated by hackers, but neither was able to rule out that possibility.

 

They also noted that while cryptographic signatures can verify that an email was sent from a particular account, they cannot verify who controlled that account when the email was sent. Hackers sometimes create fake email accounts or gain access to authentic ones as part of disinformation campaigns — a possibility that cannot be ruled out with regard to the email files on Hunter Biden’s laptop.

 

Williams wrote in his technical report that timestamps on a sampling of documents and operating system indexes he examined were consistent with each other, suggesting the authenticity of at least some of the files that lacked cryptographic signatures. But he and Green agreed that sophisticated hackers could have altered the drive’s contents, including timestamps, in a way difficult and perhaps impossible to detect through forensic examination alone.

 

Analysis was made significantly more difficult, both experts said, because the data had been handled repeatedly in a manner that deleted logs and other files that forensic experts use to establish a file’s authenticity.

 

“No evidence of tampering was discovered, but as noted throughout, several key pieces of evidence useful in discovering tampering were not available,” Williams’ reports concluded.

 

Some contents matched data from other sources

 

Out of the drive’s 217 gigabytes of data, there are 4.3 gigabytes of email files.

 

Green, working with two graduate students, verified 1,828 emails — less than 2 percent of the total — but struggled with others that had technical flaws they could not resolve. He said the most common problems resulted from alterations caused when the MacBook’s mail-handling software downloaded files with attachments in a way that made cryptographic verification of those messages difficult.

 

Williams verified a larger number of emails, nearly 22,000 in total — which included almost all of the ones Green had verified — after overcoming that problem by using software to correct alterations in the files. But he encountered obstacles with other emails that were only partially downloaded onto the drive, creating incomplete files that could not be verified cryptographically. Most of these files, he said, were probably just snippets of emails that would allow a user to preview the messages without downloading the full files.

 

The cryptographic verification techniques worked only on incoming emails, not ones that were sent from Hunter Biden’s accounts. Because the purpose of these signatures is to verify the identity of senders, only the records of an incoming email would contain signatures.

 

In addition to emails, the drive includes hundreds of thousands of other documents, including more than 36,000 images, more than 36,000 iMessage chat entries, more than 5,000 text files and more than 1,300 videos, according to tallies made by Williams, who, like Green, could not definitively verify any of them. In a small number of cases, The Post was able to establish the veracity of some of these files, such as bank documents, by obtaining copies from other sources.

 

Among the emails verified by Williams and Green were a batch of messages from Vadym Pozharskyi, an adviser to the board of Burisma, the Ukrainian gas company for which Hunter Biden was a board member. Most of these emails were reminders of board meetings, confirmation of travel, or notifications that his monthly payment had been sent.

 

Both Green and Williams said the Burisma emails they verified cryptographically were likely to be authentic, but they cautioned that if the company was hacked, it would be possible to fake cryptographic signatures — something much less likely to happen with Google.

 

One of the verified emails from Pozharskyi, which was the focus of one of the initial stories from the New York Post, was written on April 17, 2015. It thanked Hunter Biden “for inviting me to DC and giving me an opportunity to meet your father and spent [sic] some time together.”

 

When the email first emerged in the New York Post about three weeks before the 2020 election, the Biden campaign and Hunter Biden’s lawyer both denied that Pozharskyi had ever met with Joe Biden. Asked recently about the email, the White House pointed to the previous denials, which The Post has examined in detail.

 

Some other emails on the drive that have been the foundation for previous news reports could not be verified because the messages lacked verifiable cryptographic signatures. One such email was widely described as referring to Joe Biden as “the big guy” and suggesting the elder Biden would receive a cut of a business deal. One of the recipients of that email has vouched publicly for its authenticity but President Biden has denied being involved in any business arrangements.

 

New folders created on drive given to The Post

 

The Post spent months reviewing the data on the portable drive in its entirety and seeking forensic verification of its contents. It made two new copies of the portable drive provided by Maxey so the experts could analyze them.

 

Green examined the drive first and, based on his initial findings, urged The Post to seek a second review to verify more of its contents. The Post then hired Williams, who has conducted forensic analyses for Fortune 100 financial services companies and also did similar work during his time at the NSA. He is now on the faculty of the information security research group IANS.

 

Many questions about the drive remained impossible to answer definitively. That includes what happened during a nearly year-long period of apparent inactivity from September 2019 — about five months after Hunter Biden reportedly dropped off the laptop at the repair shop — until August 2020, when the presidential campaign involving his father was entering its final months.

 

Soon after that period of inactivity — and months after the laptop itself had been taken into FBI custody — three new folders were created on the drive. Dated Sept. 1 and 2, 2020, they bore the names “Desktop Documents,” “Biden Burisma” and “Hunter. Burisma Documents.”

 

Williams also found records on the drive that indicated someone may have accessed the drive from a West Coast location in October 2020, little more than a week after the first New York Post stories on Hunter Biden’s laptop appeared.

 

Over the next few days, somebody created three additional folders on the drive, titled, “Mail,” “Salacious Pics Package” and “Big Guy File” — an apparent reference to Joe Biden.

 

Attempts to verify the emails relied mainly on a technology called DKIM, which stands for DomainKeys Identified Mail. DKIM is a cryptographic technology used by Google and some other email services to verify the identities of senders.

 

Williams also used a second cryptographic technology called ARC, for Authenticated Received Chain. It was created to make cryptographic verification possible even when email moves through multiple services.

 

Williams said ARC, though slightly less reliable than DKIM, was a worthy alternative for emails for which DKIM verification was not possible. Overall, his list of emails included 16,425 verified by DKIM and 5,521 verified by ARC.

 

There are limits to cryptographic verification of emails, both experts said. Not all email services provide cryptographic signatures, and among those that did, not all did so with the care of Google, which is regarded within the technology industry as having strong security protocols. Green and Williams said the only realistic way to fake Google’s DKIM signatures would be to hack the company’s own secure servers and steal private cryptographic keys — something they considered unlikely even for nation-state-level hackers using the most advanced techniques.

Anonymous ID: 15e88d March 31, 2022, 5:50 p.m. No.10966   🗄️.is 🔗kun   >>1295 >>1339 >>1365

https://www.rt.com/russia/553067-ukraine-biolabs-hunter-biden-documents/

 

Russia presents new evidence on Ukraine biolabs, comments on links to Biden and US

 

 

Documents detail fate of US-funded deadly pathogens that may have been tested on Ukrainians

 

The Russian military has presented documents showing Ukraine’s interest in using drones to deliver weaponized pathogens developed in US-funded biolabs. Names of US officials involved in the biolabs projects, and the role the current US president’s son played in the program, were also made public during the special briefing on Thursday.

 

One of the key pieces of evidence was a letter from the Ukrainian company Motor Sich to the Turkish drone manufacturer Baykar Makina – makers of the Bayraktar TB2 and Akinci UAVs – dated December 15, 2021. The Ukrainians specifically asked if the drones could carry 20 liters of aerosolized payload to a range of 300 kilometers – putting them in range of a dozen major Russian cities and almost all of Belarus.

 

“We are talking about the development by the Kiev regime of technical means of delivery and use of biological weapons with the possibility of their use against the Russian Federation,” said Lieutenant General Igor Kirillov, commander of the Russian Nuclear, Biological and Chemical Protection Forces.

 

Kirillov also referenced a US patent (No. 8,967,029) for a mechanism to deploy aerosolized pathogens from a drone. The US response to a 2018 Russian inquiry about this patent did not deny its existence, but claimed that it technically did not violate Washington’s obligations under the treaties banning chemical and biological weapons, he pointed out.

 

Kirillov showed signed contracts between US government agencies – Defense Threat Reduction Agency (DTRA), the Pentagon, the Department of State – and the Ukrainian Ministry of Health, as well as the specific facilities inside Ukraine. The Pentagon spent more than $30 million for biological research at just one Ukrainian facility, the Public Health Center of the Ministry of Health, according to the Russian military.

Russia makes new allegations about US-funded biolabs in Ukraine

 

DTRA official Robert Pope was “one of the key figures” in the program, and “the author of the idea of creating a central depository of especially dangerous microorganisms in Kiev,” Kirillov said. The Pentagon’s biological projects in Ukraine were coordinated by Joanna Wintrol, head of the DTRA office in Kiev, until she left in August 2020. She directly supervised projects UP-4, UP-6, and UP-8 to study deadly pathogens, including anthrax, the Congo-Crimean fever, and leptospirosis, according to Kirillov.

 

The US agency’s point of contact was Ukraine’s Health Minister (2016-2019) Ulyana Suprun, herself a US citizen, Kirillov noted, while a major go-between was the private contractor Black and Veatch, whose Kiev office was headed by Lance Lippencott. Another Pentagon contractor, Metabiota, also had a role in the project.

 

Kirillov said that Hunter Biden – son of the current US President Joe Biden – played “an important role in creating a financial opportunity to work with pathogens on the territory of Ukraine,” pointing to several emails between him and executives of Metabiota and Black and Veatch. In particular, he described the Metabiota VP as “a confidant of Hunter Biden,” based on their correspondence. According to the general, the “Western media” has confirmed the authenticity of these emails – presumably a reference to materials published last week by the British newspaper the Daily Mail.

 

Even Kiev was concerned about the biolabs, according to a memo Kirillov showed. A 2017 letter from the Kherson department of the Ukrainian Security Service (SBU) said that DTRA and Black and Veach intend to “establish control over the functioning of microbiological laboratories in Ukraine conducting research on pathogens of particularly dangerous infections that can be used to create or modernize new types of biological weapons.”

 

Pointing to a June 2019 document from the Public Health Center of the Ministry of Health of Ukraine, Kirillov wondered why it insisted on secrecy and required that “serious” incidents “including the death of the subjects” had to be reported to the US bioethics authorities within 24 hours – when other documents about that specific program only reference standard blood sampling work.

Russia presents new evidence from US-funded Ukraine biolabs

 

“We do not exclude that the official research program is only the ‘visible part of the iceberg’, while in practice, volunteers were infected with the Congo–Crimean fever virus, hantaviruses and the causative agent of leptospirosis,” the general said, accusing the US of “a dismissive attitude towards the citizens of Ukraine,” and treating them as guinea pigs for biological and medical experimentation.

 

The US has long claimed that allegations about Pentagon-funded biolaboratories in Ukraine were “Russian disinformation.” Earlier this month, however, US diplomat Victoria Nuland testified before the Senate that “biological research laboratories in Ukraine” did exist, and that Washington was working with Kiev “to ensure that the materials of biological research do not fall into the hands of Russian forces.”

 

According to Kirillov, all pathogenic biomaterials stored in Ukraine were “transported by military transport aircraft to the United States via Odessa,” in early February 2022. On February 24, as Russian troops entered Ukraine, the ministry of health in Kiev ordered the remaining strains to be destroyed, the general said.

 

Kirillov said that the Russian intervention halted activities at five Ukrainian biolabs that had been working with anthrax, tularemia, brucellosis, cholera, leptospirosis, and African swine fever.

Anonymous ID: 15e88d March 31, 2022, 5:56 p.m. No.10973   🗄️.is 🔗kun   >>1295 >>1339 >>1365

https://www.rt.com/russia/551617-bat-coronavirus-us-funded-labs-ukraine/

 

US-funded labs in Ukraine dealt with bat coronavirus, Moscow claims

 

 

Russia’s Ministry of Defense cited documents it claims it captured at the facilities, while the US denies developing bioweapons

 

US-funded laboratories in Ukraine captured by Russian forces last week were conducting experiments with bat coronavirus and other dangerous pathogens, Moscow claimed on Thursday, citing documents seized at the facilities. There were allegedly plans to move on to African swine fever virus and to anthrax.

 

Igor Konashenkov, spokesperson for Russia’s Ministry of Defense, said that “experiments with samples of bat coronavirus were being carried out in the bio-laboratories, created and funded [by the US] in Ukraine, as documents show.” The Russian official went on to claim that in 2022 the US was intending to “work on bird, bat and reptile pathogens,” with plans to move on to research into whether those animals can “transmit African swine fever virus and anthrax.”

 

According to Konashenkov, the scientists were looking into, among other things, the possibility of pathogen transmission by wild birds migrating between Russia, Ukraine and other neighboring countries.

Moscow calls for strengthening bioweapons treaty

 

On Sunday, Russia announced that it had captured several laboratories in Ukraine. If Moscow officials are to be believed, staff at some of the facilities told Russian troops that particularly dangerous pathogens, including plague and anthrax, had been destroyed following the start of Moscow’s military offensive against Ukraine on February 24.

 

Konashenkov surmised that the Pentagon feared that its “secret biological experiments” would be uncovered, ordering Ukrainian authorities to dispose of evidence pointing to such research.

 

Responding to the allegations voiced by Russia on Wednesday, Ned Price, spokesperson for the US Department of State, accused Moscow of “intentionally spreading outright lies.” According to Price, similar claims made previously by Russia “have been debunked conclusively and repeatedly over many years.” The US official proceeded to suggest that the latest pathogen allegations were nothing more than a pretext invented by the Kremlin “in an attempt to justify its own horrific actions in Ukraine.”

 

Washington insisted that the “United States does not own or operate any chemical or biological laboratories in Ukraine, it is in full compliance with its obligations under the Chemical Weapons Convention and Biological Weapons Convention.” The US Department of State pointed the finger at Moscow instead, accusing it of having “active chemical and biological weapons programs.”

 

Ukraine, too, has denied the presence of any facilities developing biological weapons on its territory.

 

The American embassy in Kiev confirmed that the US Department of Defense “collaborates with partner countries,” but only to “counter the threat of outbreaks.”

 

China, however, has made it clear that it is not entirely convinced by America’s explanations, and urged Washington to disclose relevant data “as soon as possible.”

 

Speaking to journalists on Tuesday, its Foreign Ministry spokesman Zhao Lijian said that Beijing had information indicating that the said laboratories in Ukraine were just the “tip of an iceberg.” Zhao went on to claim that the Pentagon “controls 336 biological laboratories in 30 countries around the world,” with the secret program operating under the guise of efforts to “reduce biosecurity risks” and to strengthen “global public health.”

Anonymous ID: 15e88d March 31, 2022, 5:57 p.m. No.10974   🗄️.is 🔗kun   >>1295 >>1339 >>1365

https://www.rt.com/russia/552177-ukraine-biolabs-weapons-military/

 

Russia presents new evidence from US-funded Ukraine biolabs - Pt. 2

 

 

Pentagon-backed facilities made “biological weapons components” and tried to cover it up, Russian military says

 

Moscow believes that laboratories in Ukraine funded by the US military were making biological weapons components, but that local staff was being kept in the dark about their research, a senior Russian general said on Thursday.

 

Lieutenant-General Igor Kirillov, who commands the Nuclear, Biological and Chemical Protection Forces of Russia, presented documents and imagery showing why the military has come to such a conclusion.

 

“We believe that components of biological weapons were being made on the territory of Ukraine,” said Kirillov.

 

He noted that the documents he was presenting “have the signatures of real officials and are certified by the seals of organizations,” for those journalists and experts in the West doubting their veracity.

 

One document, dated March 6, 2015 confirms the “direct participation of the Pentagon in the financing of military biological projects in Ukraine,” Kirillov said. The US officially funded the projects through the Ukrainian Ministry of Health, according to the Agreement on Joint Biological Activities. However, the evidence shows that the real recipients of some $32 million in funds were Ukrainian Defense Ministry laboratories in Kiev, Odessa, Lvov and Kharkov.

Russia promises more disclosures on Ukraine biolabs

 

These facilities were chosen by the US Department of Defense’s Threat Reduction Administration (DTRA), and the contractor Black and Veatch, to carry out the U-P-8 project, aimed at studying the pathogens of Crimea-Congo hemorrhagic fever, leptospirosis, and hantaviruses, Kirillov said, pointing to a slide with the Pentagon’s request.

 

“From our point of view, the interest of US military biologists is due to the fact that these pathogens have natural foci both in Ukraine and in Russia, and their use can be disguised as natural disease outbreaks,” the general said.

 

According to the evidence, the labs isolated three bacterial pathogens (causing plague, brucellosis and leptospirosis) and six families of viruses, including coronaviruses, all of which were drug-resistant and spread rapidly from animals to humans. A number of documents confirmed the samples taken in Ukraine to other countries – Georgia, Germany, and the UK.

 

Kirillov showed official documents confirming the transfer of 5,000 samples of blood serum taken from Ukrainian citizens to the Pentagon-backed Richard Lugar center in Tbilisi, Georgia. Another 773 biological assays were transferred to the UK, while an agreement was signed for the transfer of “unlimited quantities” of infectious materials to the Friedrich Loeffler Institute, Germany’s leading center for animal diseases.

US-funded labs in Ukraine dealt with bat coronavirus, Moscow claims

 

However, the analysis of the obtained evidence suggests that Ukrainian specialists were not aware of the potential risks of transferring these materials, and may have been kept in the dark about the true goal of the ongoing research, Kirillov noted.

 

Documents from Project P-781, a study of ways of transmitting diseases to humans through bats, showed it was carried out by the Kharkov laboratory and the Lugar Center in Georgia, but Ukraine received most of the $1.6 million grant for the project. Kirillov said that “systematic” research in this area has been carried out since 2009, under the supervision of US specialists – referencing projects P-382, P-444 and P-568.

 

As one of the key people involved, Kirillov named the head of the DTRA office at the US Embassy in Kiev, Joanna Wintrol.

 

“Maybe she’s worth talking to, journalists?” he said.

 

Wintrol left Kiev in August 2020. In her parting interview, she insisted no US scientists worked in Ukrainian biolabs and accused Russia of spreading “false information” about the program.

 

Kirillov pointed to mass outbreaks of avian flu in Russia and the EU in 2021, causing billions in damages, while the Kharkov Institute of Veterinary Medicine was studying wild birds as transmission vectors and assessing conditions under which the spread could cause economic damage and food insecurity. Evidence now shows the institute collected strains of avian flu capable of jumping species, Kirillov said, calling for an international investigation into the matter.

Russia claims Ukraine destroying evidence of US-funded bioweapons program

 

Some of the documents at the Kherson laboratory appear to be missing and may have been destroyed, Kirillov said, suggesting it was related to the 2018 outbreak of a mosquito-borne parasitic disease in that region, and a possible cover-up.

 

Four cases of dirofilariasis were detected in February that year, which is not typical for mosquito life cycles, the general said. Pentagon representatives visited the local hospitals in April, collecting medical records and getting briefed on the epidemiological investigation. However, “no documentary evidence regarding this outbreak has been found in the Kherson laboratory,” leading the Russian military to believe that “the urgency of destroying such documentary evidence is explained by the desire to prevent access to them by Russian specialists.”

 

There was also an outbreak of drug-resistant tuberculosis in 2018, among the citizens of the Donetsk and Lugansk People’s Republics, with 70 cases detected around the village of Pesky – on the frontline with Ukrainian troops – alone.

 

“This may indicate a deliberate infection, or an accidental leakage of the pathogen from one of the biological laboratories located on the territory of Ukraine,” Kirillov said.

 

The Russian general brought up the long history of US conducting banned biological research in other countries, noting as an example that in 2010 Washington apologized for syphilis experiments in Guatemala.

 

“We will continue to examine the evidence and inform the global community about the illegal activities of the Pentagon and other US government agencies in Ukraine,” Kirillov said.