Brazil President Suggesting CCP Virus Created to Wage ‘Biological Warfare’
May 7, 2021 8:05 pm
Tags: Americas, Bolsonaro, Brazil, CCP Virus, China, Chinese Regime, COVID-19, INSIDE CHINA, International, pandemic, Pandemic Ties to CCP, World, Wuhan, Wuhan Institute of Virology
Categories: Americas Bolsonaro Brazil CCP Virus China Chinese Regime COVID-19 Epoch Times INSIDE CHINA International JoshWho News pandemic Pandemic Ties to CCP World Wuhan Wuhan Institute of Virology
“It’s a new virus. Nobody knows whether it was born in a laboratory or because a human ate some animal they shouldn’t have,” he said in a speech on May 5.
“But the military knows all about chemical, biological and radiological warfare. Could we be fighting a new war? I wonder. Which country’s GDP has grown the most?”
Bolsonaro, a frequent China critic, did not name any specific countries in his comments. But China was the only major world economy that saw any economic growth during 2020 as other industrial powers struggled with lockdowns and virus resurgence.
Beijing has vehemently denied any suggestions to link the CCP (Chinese Communist Party) virus origin with the Wuhan Institute of Virology (WIV), the facility at the center of the controversy that was only miles away from the seafood market where the first clusters of COVID-19 patients emerged.
Yet the regime’s guarded approach with the lab has failed to avert scrutiny from critics, including past and current U.S. officials.
The State Department, in a fact sheet released during the final days of the Trump administration, said it “has reason to believe” that several WIV researchers fell sick in autumn 2019, with symptoms that resemble COVID-19, the disease the CCP virus causes.
Robert Redfield, who formerly served as director of the Centers for Disease Control and Prevention (CDC), said that the virus most likely escaped from a Wuhan lab, although not necessarily intentionally.
“I still think the most likely etiology of this pathology in Wuhan was from a laboratory—you know, escaped,” he said in a CNN interview in March, weighing in for the first time on the issue after leaving the CDC.
“Other people don’t believe that. That’s fine. Science will eventually figure it out,” he added.
While World Health Organization scientists sent to Wuhan for a virus probe ruled out the lab leak theory as “extremely unlikely,” one of the team’s investigators complained about the difficulty in getting raw data from Chinese authorities. At least two of the foreign experts on the team also have past work or financial ties with the Chinese regime, which raised conflicts of interest issues.
The WIV has the only P4 lab—the highest biosafety level lab—in China. Despite the Chinese regime stating it had no relationship with the military, the institute worked for years with military leaders on a state-sponsored project conducting laboratory animal experiments.
Major General Chen Wei, Beijing’s top biowarfare specialist, took over command of the lab weeks after the outbreak in Wuhan, Chinese media reported at the time. The report said the move was meant to give the public “peace of mind” amid rising “controversies and rumors” around the lab, and with the goal of developing a vaccine against the virus.
- Global Wages Take A Hit As Inflation Eats Into Paychecks December 5, 2022
- Putin Signs Into Law Sweeping Ban On “LGBT Propaganda” December 5, 2022
- Two Great Months For US Stocks Promise Too Much for Own Good December 5, 2022
- The Bubble Economy’s Credit-Asset Death Spiral December 5, 2022
- Musk Tells Millions In Twitter Spaces That Apple Ads “Fully Resumed” After Spat December 5, 2022
- All About That Base, No Trouble December 5, 2022
- FBI Warned Twitter Of ‘Hack-And-Leak’ Operation Before Hunter Biden Story Censored December 5, 2022
- US Economic “Malaise Spreading” – Services PMI Signals Q4 Economic Contraction December 5, 2022
- EU NatGas Prices Jump As Cold Blast Draws Down On Fuel Storage December 5, 2022
- Oil Rises After OPEC+ Keeps Production Unchanged After Launch Of Russia Price Cap December 5, 2022
- Gunfire On Two NC Substations Plunges Tens of Thousands Into Darkness And Cold December 5, 2022
- EU Is Erecting Russian War Crimes Tribunal: “Russia Must Pay” December 5, 2022
- China Operating Illegal Police Stations Worldwide December 4, 2022
- Parents Catch FBI In Plot To Force Mentally Ill Son To Be A Right Wing Terrorist – This is how they been doing it for years December 4, 2022
- “Utterly False”: Musk Blasts New York Times For Hate Speech Report On Twitter December 4, 2022
- Six Degrees From James Baker: A Familiar Figure Reemerges With Release Of Twitter Files December 4, 2022
- Nonprofit Blood Donation Service Starts Matching Unvaccinated Patients With Donors December 4, 2022
- Poll: Near Majority of Republicans Want Less Foreign Aid as Congress Poised to Grant Ukraine $37 Billion December 4, 2022
- Wokeism Is Costume Elites Wear To ‘Signal Virtue’ And ‘Hide Greed, Corruption’: Former Levi’s Executive December 4, 2022
- California, a Free State Since 1850, May Pay $233k in Reparations per Slavery Descendant December 4, 2022
- Not Acxiom (unverified) - 51,730,831 breached accounts November 22, 2022In 2020, a corpus of data containing almost a quarter of a billion records spanning over 400 different fields was misattributed to database marketing company Acxiom and subsequently circulated within the hacking community. On review, Acxiom concluded that "the claims are indeed false and that the data, which has been readily available across multiple environments, […]
- GGCorp - 2,376,330 breached accounts November 8, 2022In August 2022, the MMORPG website GGCorp suffered a data breach that exposed almost 2.4M unique email addresses. The data also included IP addresses, usernames and MD5 password hashes.
- Lolzteam - 398,011 breached accounts November 6, 2022In May 2018, the Russian hacking forum Lolzteam suffered a data breach that exposed 400k members. The impacted data included usernames and email addresses which were later redistributed via another hacking forum. The data was provided to HIBP by a source who requested it be attributed to "ZAN @ BF".
- Doomworld - 34,478 breached accounts October 24, 2022In October 2022, the Doomworld fourm suffered a data breach that exposed 34k member records. The data included email and IP addresses, usernames and bcrypt password hashes.
- E-Pal - 108,887 breached accounts October 24, 2022In October 2022, the service dedicated to finding friends on Discord known as E-Pal disclosed a data breach. The compromised data included over 100k unique email addresses and usernames spanning approximately 1M orders. The data was subsequently distributed via a popular hacking forum.
- Wakanim - 6,706,951 breached accounts October 6, 2022In August 2022, the European streaming service Wakanim suffered a data breach which was subsequently advertised and sold on a popular hacking forum. The breach exposed 6.7M customer records including email, IP and physical addresses, names and usernames.
- Bhinneka - 1,274,340 breached accounts October 6, 2022In early 2020, the Indonesian consumer electronics website Bhinneka suffered a data breach that exposed almost 1.3M customer records. The data included email and physical addresses, names, genders, dates of birth, phone numbers and salted password hashes.
- TAP Air Portugal - 5,067,990 breached accounts September 23, 2022In August 2022, the Portuguese airline TAP Air Portugal was the target of a ransomware attack perpetrated by the Ragnar Locker gang who later leaked the compromised data via a public dark web site. Over 5M unique email addresses were exposed alongside other personal data including names, genders, DoBs, phone numbers and physical addresses.
- Brand New Tube - 349,627 breached accounts September 8, 2022In August 2022, the streaming website Brand New Tube suffered a data breach that exposed the personal information of almost 350k subscribers. The impacted data included email and IP addresses, usernames, genders, passwords stored as unsalted SHA-1 hashes and private messages.
- START - 7,455,386 breached accounts August 30, 2022In August 2022, news broke of an attack against the Russian streaming service "START". The incident led to the exposure of 44M records containing 7.4M unique email addresses. The impacted data also included the subscriber's country and password hash. START subsequently acknowledged the incident in a Telegram post and stated that the data dated back […]