Marine scientist: COVID-19 virus made in Chinese laboratory as a bat vaccine

A Marine Corps officer working with the Defense Advanced Research Projects Agency revealed in a memorandum in August last year that his study of the virus behind the COVID-19 pandemic concluded that it was produced as part of vaccine research at the Wuhan Institute of Virology, according to documents. published by a conservative investigation team.

May. Joseph P. Murphy informed the Pentagon Inspector General that his analysis of the virus’ origin concluded that the non-governmental organization EcoHealth Alliance, the National Institutes of Health and the Wuhan Institute of Virology produced the virus known as SARS-CoV-2 through controversial gain. -of-function research outlined in a Pentagon grant proposal.

“SARS-CoV-2 is a US-created recombinant bat vaccine or its precursor virus,” May said. Murphy in a note on August 13, 2021, published this week by Project Veritas. “It was created by an EcoHealth Alliance program at the Wuhan Institute of Virology (WIV), as suggested by the report on the laboratory leak hypothesis.”

Asked about the 24 pages of internal documents published by Project Veritas, DARPA spokesman Jared Adams told Inside the Ring in an email that federal rules prohibit the agency from commenting on DARPA programs or documents.

“We are precluded by the Federal Acquisition Regulations from discussing who may or may not have bid on a DARPA program, and we are unable to verify the authenticity of the documents published by Project Veritas,” wrote Mr. Adams.

May. Murphy and the Office of Naval Research did not immediately respond to a request for comment.

According to Project Veritas, May declined. Murphy to discuss the document, but told the group: “To those who seek answers, I offer encouragement. There are good people who strive for truth, work together in and outside the government, and they succeed.… Do not let a lie be ours legacy for posterity. ”

According to May. Murphy, now at the Office of Naval Research, had details of the program hidden since the pandemic began in Wuhan, China in December 2019. New facts were revealed by May. Murphy from a grant proposal submitted to DARPA by the New York-based EcoHealth Alliance in March 2018 and “not published,” he said.

The proposal was made in response to DARPA’s Project Defuse, which aimed to address what the agency called the threat of bat-borne coronavirus. SARS-CoV-2 is a bat coronavirus.

The proposal lists several U.S. researchers who would participate in the work and included the Wuhan Institute of Virology located in the city, which is considered to be the epicenter of the possible pandemic.

The Chinese government has denied that the virus was leaked from any of its laboratories, but has refused to provide information on the origin of the virus. Beijing has also accused the US military of launching the pandemic.

The $ 14 million grant proposal for DARPA was produced by Peter Daszak, president of the EcoHealth Alliance, who worked closely together on research into dangerous viruses at the Wuhan Institute of Virology. Mr. Daszak did not immediately respond to a request for comment.

DARPA rejected the grant as potentially dangerous virus work, despite Mr Daszak’s proposal in the proposal that the work would not violate US restrictions on gain-of-function research.

However, the National Institute of Allergy and Infectious Diseases, led by Anthony Fauci, approved a grant to the EcoHealth Alliance, and work on bat coronavirus continued until it was stopped by the federal government in April 2020.

Dr. Fauci has repeatedly denied during congressional testimony that the U.S. government funded any viral research in China.

In the 2018 proposal, Mr. Daszak that “we will intensively test bats in our field locations where we have identified high-risk SARSr-CoVs” – the term for bat coronavirus.

“We will sequence their spike protein, conversely construct them to perform binding assays and insert them into bat SARS-CoVs (WIV1, SHC014) backbone (these use bat-SARSr-CoV backbone, not SARS-CoV, and are excluded from dual problems of use and gain of function) to infect humanized mice and assess the capacity to cause SARS-like disease, ”said Mr. Daszak.

The work was aimed at developing a vaccine to be sprayed on bats that researchers thought would prevent another disease outbreak as the first SARS outbreak in China in 2003.

Mr. Daszak said the work would include Shi Zhengli, the Chinese virologist at the Wuhan Institute of Virology, who would lead research into infecting humanized mice with the laboratory-created bat vaccine. Ms. Shi has also denied that the laboratory has any role in the origin of COVID-19 or its spread among the locals.

US intelligence services concluded in a public assessment last year that the virus was caused by either a leak from a Chinese laboratory or from an infected animal. The Murphy memorandum reflects the views of a good portion of U.S. intelligence analysts who believe the virus came from the Wuhan Institute.

May. Murphy stated that his analysis is that the COVID virus probably appeared as a precursor, “deliberately virulent, humanized recombinant” virus, which was in turn manipulated into a live bat vaccine.

In terms of efforts to hide the work, May said. Murphy that Pentagon officials placed the unclassified EcoHealth Alliance proposal in a top-secret file at DARPA’s Biological Technology Office.

May. Murphy stated that the COVID virus is a synthetic “chimeric” or laboratory-produced virus that is designed to infect human cells. The virus is probably a live vaccine that escaped from the Chinese laboratory before it could be manipulated into a less dangerous condition, he added.

“It leaked and spread quickly because it was aerosolized so it could effectively infect bats in caves,” May said. Murphy and added that the first escape took place in August 2019. The virus was to be called “SARS-CoV-Wuhan,” May. said Murphy.

The document also reveals the identity of a U.S. government team of experts who first concluded that the virus came from a leak in the Wuhan laboratory. The group is called the decentralized radical search team that investigates COVID-19, or DRASTIC.

“This collection of scientists and scouts breaks the hypothesis of laboratory leakage into the mainstream and has separated the Chinese and World Health Organization (WHO) reports on the origin of SARS-CoV-2 in Wuhan,” he said.

Warning issued on Russian cyber threat

Amid heightened tensions over a possible second Russian invasion of Ukraine, federal security agencies warned this week that Moscow could carry out cyber attacks on critical U.S. infrastructure.

The National Security Agency, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) said in a statement issued Tuesday that state-sponsored Russian cyber attacks pose a threat. The three agencies stated that Russian intelligence services, the civilian SVR and military GRU, have formidable cyber-attack capabilities and have demonstrated their skill in the past.

Past victims include defense industry networks, healthcare providers, energy and telecommunications companies, and public networks.

Russian hackers hit “dozens” of state and local government and aviation networks from September 2020 to December 2020, compromising networks and stealing data from several victims. Russian-based hackers also launched a major intrusion into the energy sector from 2011 to 2018.

“These Russian state-sponsored … actors carried out a multi-stage intrusion campaign, gaining remote access to US and international energy sector networks, posted [industrial control system]-focused malware and collected and exfiltered enterprise and ICS-related data, “the report said.

Public authorities urged network operators, especially those tasked with defending critical infrastructure, to increase security and conduct “proactive threat hunting” in a search for Russian hacker intrusion.

Sophisticated Russian hackers use common but effective tactics to break into networks used by the 16 critical infrastructure systems considered, including computer systems connecting energy, communications, transportation, finance, manufacturing, water , the health and food sectors.

Among the types of cyberattacks that Russians could launch if the more than 100,000 Russian troops invade Ukraine are “spearphishing” emails, brute force log-in attempts and remote network control through known operating system vulnerabilities in the accounts of network administrators.

Initial access to the attacks can be attempted through several virtual private networks, Cisco routers, Oracle servers, Citrix software, Microsoft Exchange, and several other known attack paths.

“Russian state-sponsored [advanced persistent threat] actors have also demonstrated sophisticated craft and cyber capabilities by compromising third-party infrastructure, compromising third-party software, or developing and implementing customized malware, ”the warning reads.

Industrial control systems used to power the grid, dams and nuclear power plants can also be attacked by the Russians.

Previous industrial control attacks linked to Moscow have included Havex Trojan, which affected systems in the United States, Spain, France, Italy and Germany from 2014; and the cyber attacks in 2015 against Ukrainian power companies that caused power outages across the country.

Virus outbreaks in China threaten the Olympics

China’s anti-pandemic policy called “zero covid” is collapsing under the weight of fungal outbreaks of the omicron variant. Analysts say new eruptions in several places could derail the controversial upcoming Winter Olympics set for Beijing next month.

The regime announced in 2020 that it was experiencing questionable 4,600 deaths from the disease as part of its so-called zero COVID-19 policy.

However, Chinese propaganda businesses were forced to back up less credible claims that China was free of COVID-19 cases, and instead began claiming that the government had achieved “effectively zero COVID.”

With two major cities, Xian and Tianjin, recently closed due to new disease outbreaks, the Chinese media now describe official government policy as “zero COVID at a societal level.”

The verbal jiujitsu has made some analysts scratch their heads in wonder what it means because people get COVID-19, not society.

The latest shutdown in Tianjin will test whether the virus spreads to Beijing, which is about 30 minutes by train from Tianjin, and the host city for the Winter Games. Reports from a person in contact with several people in China indicate that the virus is spreading rapidly across the country.

Among the sites of new lockdowns by the authorities is Shaoxing, a city close to the megacity of Shanghai; in the north by Anyang, and the city of Shenzhen, a large city near Hong Kong.

Chinese authorities have already initiated draconian protocols for Olympic athletes, including a 14-day quarantine upon entry into the country and a very restrictive “bubble” imposed on athletes’ movements and accommodation during the Games.

Recent outbreaks are likely to provoke new calls from human rights activists, who are already in favor of a strict boycott of the Games in response to allegations of Chinese genocide against Uighurs in western China.

For more information, visit the Washington Times COVID-19 Resource Page.

Leave a Comment