Friday, May 31, 2019

Kim Jong-Un Executes Four Officials Over Failed Trump Summit



Vatican appoints overseers for scandal-ridden Peruvian lay organization

Macron's Security Service Threatens French Journalists With Prison And Fines

France has been turning up the heat on journalists who expose government wrongdoing, according to AFP
The latest, Le Monde journalist Ariane Chemin, said was questioned by French security services for 45 minutes after she refused to reveal her sources for a report exposing alleged corruption and cronyism within President Emmanuel Macron's inner circle. 
"They asked me many questions on the manner in which I checked my information, which was an indirect way of asking me about my sources," said Chemin - who wrote a series of articles on Macron's former bodyguard Alexandre Benalla, who was fired after video emerged of Benalla roughing up a protester. The incident and Chemin's ongoing reporting resulted in a spate of resignations by government officials.
According to AFPLe Monde's managing director, Louis Dreyfus, was also questioned by the General Directorate for Internal Security (DGSI) on Wednesday. "Everything is done to make it intimidating," Dreyfus wrote in an editorial describing his own DGSI interrogation. 
"I explained that I never read the articles before they were published and that I was not meant to do so. And they kept telling me that the offense was punishable by five years in prison and a fine of €75,000.
In total, the French secret service has summoned eight reporters who have published negative stories on the government, including French arms being sold to Saudi Arabia and the UAE used in Yemen's civil war. Aside from Chemin, the others involved are Geoffrey LivolsiMathias Destal and Michel Despratx of the investigative news site Disclose; France Inter’s Benoît Collombat; and Valentine Oberti of the TV news show Quotidien along with a Quotidien cameraman and a Quotidien sound technician, according to Reporters Without Borders
DGSI interrogated the Disclose journalists earlier this month - threatening them with five-year prison sentences under a 2009 law prohibiting "attacks on national defense secrets" over the publication of a classified document suggesting that the French government was willingly violating a 2014 arms treaty. 

PEDOPHILE SIGNALING at the Golden Globes: HOLLYWOOD Doubles Down

Reality Check: Corey Goode in Denial

Trump Gives Attorney General Sweeping Power in Review of 2016 Campaign Inquiry

Malaysia Proposes Common Asian Gold-Backed Currency


Interesting and suggestive news out of Malaysia, which is proposing a gold-backed Asian "euro" for foreign trade, i.e., a two-tiered system

Thursday, May 30, 2019

Jerry Marzinsky - Solutions To Hearing Dark Voices

Kremlin Asks Specialists to Explain Putin's Falling Trust Ratings

Israel to host 'unprecedented' US-Russia security summit on Middle East

Deceptive System Of Control - ET Deception

Vatican omitted part of pope’s crucial quote about McCarrick

#BILDERBERG 2019: Annegret Kramp-Karrenbauer, Teilnehmerliste & Agenda

Bilderberg 2019 Meeting Details Revealed: Stacey Abrams, Jared Kushner To Attend

Two More Russians Charged for ‘Disrespecting’ Putin Under New Law

Wednesday, May 29, 2019

Americans' Life Savings Wiped Out In Mexican Bank Fraud Scheme

ZDF Heute Nachrichten TAKE ONE 29.05.2019

China-Israel Innovation Hub In Shanghai Established To Promote Global Cooperation

"Creepy" Joe Biden Tells 10-Year-Old Girl: "I'll Bet You're As Bright As You Are Good Looking"

Das kinderfressende System


Jo Conrad unterhält sich mit Simon Below - Autor des Buches "Das kinderfressende System" - über die schwerwiegenden Folgen des derzeitigen Umgangs mit Kindern, in dem in entscheidenden Entwicklungsphasen massiv eingegriffen wird, um die Menschen später steuerbarer zu machen, da sie natürliche Bindungen und Vertrauen nur schwer entwickeln können und daher für ein System besser funktionieren. Wenn man die Zusammenhänge versteht und möchte, daß die Kinder und Jugendlichen zu eigenverantwortlichen und freien Individuen heranwachsen, gibt es Vieles, das sowohl in den Familien als auch gesellschaftlich besser gemacht werden könnte. Original von

Epic Mushroom Stroganoff Bake | The Happy Pear

‘American Soil’ Is Increasingly Foreign Owned

UFOs exist and everyone needs to adjust to that fact

De-Occulting Memorial Day: The Sorcery, Physics, and Manipulation of Emotional Thought-Form

If DARPA Has Its Way, AI Will Rule the Wireless Spectrum

Priest says McCarrick admitted sharing bed with seminarians in letter to Vatican official

Russians Are Cutting Spending on Basic Goods, Survey Says

Eugene Bagashov: Birkeland Currents in Space – An Analysis | Space News

Tuesday, May 28, 2019

Schizophrenia Recovery without Medication—Hearing Voices

Russia, China Boycott US Driver Conference To End Israeli-Palestinian Conflict in Bahrain


Mac Slavo
May 21st, 2019

The dystopian future George Orwell warned us all about in his iconic novel, 1984 has quickly become our reality. Widespread facial surveillance in the “land of the free” is an “imminent reality.”
A tech privacy report, that has been swept under the rug by the mainstream media has declared that Americans are about to live through the very world Orwell wrote of. Georgetown researchers are warning Americans about a sophisticated real-time face surveillance system that’s about to become an “imminent reality” for millions of citizens across the country. Ground zero, though, appears to be Detroit.
The “America Under Watch” report is a warning that authorities in select U.S. cities may soon be able to pick you out from a crowd, identify you, and trace your movements via a secret network of cameras constantly capturing images of your face.  Mass surveillance of every single human being living in the U.S. has become a nightmarish dystopian reality.
DataWorks says it offers software which “provides continuous screening and monitoring of live video streams.” The system is also designed to operate on “not less than 100 concurrent video feeds.”
According to the research team’s report, live footage is captured by cameras installed around Detroit as part of Project Green Light, a public-private initiative to deter crime (and violate the privacy rights of everyone) which launched in 2016. The expanse of the police department’s facial recognition policy last summer, however, means the face recognition technology can now be connected to any live video, including security cameras, drone footage, and body-worn cams.
You’ve been warned.  This technology will not remain limited to Detroit. Illinois, meanwhile, is home to one of the most advanced biometric surveillance systems in the country. The report added that the Chicago Police Department (CPD) and the Chicago Transit Authority have had face surveillance capabilities since “at least 2016.”
Similar facial surveillance is now also, apparently on the horizon for other large cities, including New York City, Orlando, and Washington D.C. Oddly enough, San Francisco,  known for its authoritarian control of the public, became the first US city to ban facial recognition software used by police and other municipal agencies last week.
This report has prompted the authors, Clare Garvie, and Laura M. Moy, to call for a “complete moratorium on police use of face recognition” to give communities a chance to decide whether they always want to be monitored in their streets and neighborhoods.
The American mainstream media is also doing their “due diligence” by hiding this report and it’s obvious why they have done so.  The U.S. could very soon resemble communist China with the citizens having no rights and limited ability to even ask the government for permission, while the government does whatever they want with the power willingly handed to them by the ignorant masses.

‘Terrible mistake’: US govt. religious freedom watchdog slams Vatican’s deal with China

Vicious Cycle: The Pentagon Creates Tech Giants and Then Buys their Services

4 Russian Journalists Stabbed Over Refusal to Publish Stalin Article – Reports

Ich könnte kotzen - Österreichs Politik!

Reality Check Episode Eight David Wilcock: Way of the Weasel


In this episode of Reality Check, Jay Weidner and Groovie Bean (Yvonne Palermo) dissect David Wilcock’s famous Resignation letter and also his not-so-famous Apology letter to Gaia Inc. They will reveal the sheer hypocrisy on the part of Mr. Wilcock as he reveals that he can’t even comprehend the basic tenets of philosophy as he lumps anything that he doesn’t understand as ‘Luciferianism’. Wilcock’s ignorance on the subject of Gnosticism is astonishing.

"The Most Destructive Breach In History": Hackers Use NSA Code to Grind Baltimore to A Halt


The United States is no longer supplying its enemies only with conventional weapons – that list now also includes cyberweapons. While Baltimore has been struggling with an aggressive cyber-attack over the last three weeks, previously profiled here, it has now been revealed that a key component of the malware used by cyber-criminals was actually developed just a short drive from Baltimore - at the NSA, according to the New York Times. Learn More:

Saturday, May 25, 2019

Watch Cops Treat Flood Victims Like A Shit, Gives $500 Tickets To Man Who Lost Everything

The Veiled Threat of Freemasonry (Part 1): Blood Oaths, Bloodshed & Obstruction of Justice

The Government Is Serious About Creating Mind-Controlled Weapons

‘It’s Raining Plastic’: Researchers Find Microscopic Fibers in Colorado Rain Samples

How to Take Action Against 5G - Max Igan In Conversation With Ray Broomhall

Reality Check Episode Seven Corey Goode Falling from the Clif

"We're Being Played": Tucker Carlson Features Leaked Syria Chemical Attack Memo

Every Man for Himself: The Russian Regime Turns On Itself

Friday, May 24, 2019

Packt Eure Sachen zusammen

Prime minister Theresa May’s resignation speech in full

ZDF Heute Nachrichten TAKE ONE 24.05.2019



Investigative Authority Continues To Fight Misuse Of Vatican Financial Entities

The Most Cancer Suppressing Compounds Are Found In These Veggies

New research has linked a compound found in Brussels sprouts, broccoli, and other cruciferous vegetables to one of the body's most potent tumor-suppressing genes.

Experts estimate that there can be up to 100 times more enzymes in sprouts than uncooked fruits and vegetables. Enzymes are special types of proteins that act as catalysts for all your body’s functions. Extracting more vitamins, minerals, amino acids, and essential fatty acids from the foods you eat ensure that your body has the nutritional building blocks of life to ensure every process works more effectively.

The discovery that sulforaphane is a potent antibiotic was reported in 2002 at Johns Hopkins. Broccoli sprouts have a much higher concentration of sulforaphane than mature heads. Sulforaphane appears to trigger cells in the body, including in the gastrointestinal tract, to produce enzymes that protect against oxygen radicals, DNA-damaging chemicals, and inflammation that benefit osteoarthritis and cancer.

Sprouts are alkalizing to your body. Many illnesses including cancer have been linked to excess acidity in the body. Growth of cancer cells is initiated by a lack of oxygen and these cells, along with viruses and bacteria, cannot live in alkaline and oxygen-rich environment. Broccoli sprouts are especially effective at preventing gastritis, ulcers, stomach cancer, and even allergy and asthma.

The study says that the compound, called I3C, is involved in a complex chemical chain reaction that frees the tumor suppressor to do its job. The research also highlights the chemical warfare that goes on inside the body as it struggles to prevent tumors from developing even as tumors themselves fight to grow and spread.
The research comes out of the lab of Pier Paolo Pandolfi at Beth Israel Deaconess Medical Center's Cancer Center and Cancer Research Institute. Pandolfi, the Victor J. Aresty Professor of Medicine at Harvard Medical School, headed a team that explored the function of a cancer-suppressing gene called PTEN, which encodes a protein that controls cell growth. Pandolfi called PTEN "one of the most important tumor suppressors in the history of cancer genetics.
"The study's really exciting," he said. "I've been bombarded by journalists -- because of the broccoli connection, let's be honest. Forget what you think about the science, the fact that [we found] something that your grandma would say [is] good for you, it's appealing."

PTEN is regularly targeted by cancers, which seek to delete, mutate, or otherwise inactivate it. Pandolfi and his team, representing institutions in the U.S., Taiwan, China, Italy, Australia, and India, set out to discover how. Using human cells and mice bred to develop cancer, the researchers found that an enzyme known to promote cancer growth, called WWP1, played an important role in interfering with PTEN function.
The researchers analyzed and created a computer model of WWP1's physical structure, enabling them to search chemical libraries for a molecule that might bind to it and block its function. They discovered that a naturally occurring compound found in cruciferous vegetables -- indole-3-carbinol, or I3C -- did the trick, neutralizing the enzyme and restoring PTEN's tumor-suppressing powers in lab mice engineered to develop prostate cancer.
The work, published in the journal Science and supported by the National Institutes of Health may provide a way to help people suffering from a genetic PTEN deficiency, which in addition to making them prone to developing cancer also causes developmental defects that can result in intellectual disability or psychiatric illness.
PTEN is also known to affect health more broadly. Mice that produce surplus PTEN develop smaller than normal bodies -- likely because of PTEN's restraint on surplus cell division -- but are metabolically healthier than normal mice and live longer.
The PTEN-protecting compound, I3C, was already known to science and thought to have anti-cancer properties, though its precise mechanism was a mystery. It occurs naturally in the cruciferous vegetables that include broccoli, Brussels sprouts, arugula, cabbage, kale, and cauliflower. That group has been investigated in the past for its cancer-fighting properties, according to the National Cancer Institute, with promising results in animal studies, but mixed results in humans.
But for anyone encouraged by the results who wants to embark on a broccoli-eating binge, Pandolfi said there's a chore ahead. The doses effective in laboratory mice would be the human equivalent of eating more than six pounds of broccoli daily.
From a practical standpoint, that means the most likely approach would be to develop a pill form, Pandolfi said. I3C seems to be well-tolerated by humans and is actually on the market based on anti-cancer properties exhibited in preliminary studies. Its targets aren't limited to WWP1, so additional work is needed to investigate appropriate doses and unintended effects of I3C supplements, Pandolfi said.
An alternative, albeit one that will take time, would be to develop a more narrowly targeted molecule based on I3C's structure that zeroes in on WWP1. Pandolfi said his team's future research will likely move in those directions. 

Ole Dammegard & Andersson to Pedo-Orgs:"Do the Right Thing - Return Anna's Child to her"

Dane Jailed by Russia in Jehovah's Witnesses Crackdown Loses Appeal — Spokesman

Russian School Lowers Passing Grade for Boys, Sparking Outrage

Assange Indictment - DOJ's 17 New Charges

Wednesday, May 22, 2019

Darpa wants to genetically engineer soldiers’ skin bacteria to protect them from mosquitoes


Ancient Egyptian Killer Saints in Alps 3rd Century Switzerland of Roman Upper Egypt's Theban Legion

US Warns Assad Of "Quick Response" After New Chemical Attack Allegation

France threatens journalists with jail time for exposing use of French arms in Yemen

Reality Check Episode six Undeniable Proof that Corey Goode is Leading Doxxing Op

Russian Journalists Quit En Masse as Censorship Scandal Hits Kommersant

Kremlin Is Spending $43M to Renovate Imperial Mansion for Orthodox Patriarch, Media Reports

Tuesday, May 21, 2019

Research indicates the only defense against killer AI is not developing it

Such is our fate to wrestle with fallen techno-angels.

Why Is the Pentagon Interested in UFOs?

Database of Publicly Accused Priests in the United States

200 Russian Journalists Protest 'Clampdown on Free Speech' After Kommersant Firings

Soldiers Deploy to Mall in Jakarta - Radio Far Side


Due to threats of violence by members of the opposition party following the 17 April 2019 elections in Indonesia, the army and national police have been mobilized across the city. Tanks and concertina wire surround the KPU (General Election Commission). Almost an exact replay of the 2014 election aftermath, with the exact same loser. In this video, soldiers deploy to Mall FX in south-central Jakarta.

Why Is The Bilderberg 2019 Location Still a Secret?

Xi Sends Trump A Message: Rare-Earth Export Ban Is Coming

Saturday, May 18, 2019


Reality Check Episode Four: Infiltration into Ufology: Mirage Men


Anger More Harmful Than Sadness

Although constructive anger can aid intimate relationships, work interactions and social expressions, it may be more harmful to an older person's physical health than sadness, potentially increasing inflammation, which is associated with such chronic illnesses as heart disease, arthritis, and cancer, according to new research published by the American Psychological Association.

"As most people age, they simply cannot do the activities they once did, or they may experience the loss of a spouse or a decline in their physical mobility and they can become angry," said Meaghan A. Barlow, MA, of Concordia University, lead author of the study, which was published in Psychology and Aging. "Our study showed that anger can lead to the development of chronic illnesses, whereas sadness did not."
Barlow and her co-authors examined whether anger and sadness contributed to inflammation, an immune response by the body to perceived threats, such as infection or tissue damage. While inflammation, in general, helps protect the body and assists in healing, long-lasting inflammation can lead to chronic illnesses in old age, according to the authors.
The researchers collected and analyzed data from 226 older adults ages 59 to 93 from Montreal. They grouped participants as being in early old age, 59 to 79 years old, or advanced old age, 80 years old and older.
Over one week, participants completed short questionnaires about how angry or sad they felt. The authors also measured inflammation from blood samples and asked participants if they had any age-related chronic illnesses.
"We found that experiencing anger daily was related to higher levels of inflammation and chronic illness for people 80 years old and older, but not for younger seniors," said study co-author Carsten Wrosch, Ph.D., also of Concordia University. "Sadness, on the other hand, was not related to inflammation or chronic illness."
Sadness may help older seniors adjust to challenges such as age-related physical and cognitive declines because it can help them disengage from goals that are no longer attainable, said Barlow.
This study showed that not all negative emotions are inherently bad and can be beneficial under certain circumstances, she explained.
"Anger is an energizing emotion that can help motivate people to pursue life goals," said Barlow. "Younger seniors may be able to use that anger as fuel to overcome life's challenges and emerging age-related losses and that can keep them healthier. Anger becomes problematic for adults once they reach 80 years old, however, because that is when many experience irreversible losses and some of life's pleasures fall out of reach."
The authors suggested that education and therapy may help older adults reduce anger by regulating their emotions or by offering better-coping strategies to manage the inevitable changes that accompany aging.
"If we better understand which negative emotions are harmful, not harmful or even beneficial to older people, we can teach them how to cope with loss in a healthy way," said Barlow. "This may help them let go of their anger." 

Not The Onion: Pentagon Wanted US Taxpayers To Reimburse Taliban


A Stupid War with Iran and the Coming False Flag

Crack Pipe, IDs, And Badge Found In Hunter Biden Rental Car

A used crack pipe, two DC driver's licenses, multiple credit cards, a Delaware Attorney General badge, and a US Secret Service business card belonging to Hunter Biden were found in a rental car returned to an Arizona Hertz location in the middle of the night, days before the 2016 presidential election, according to Breitbartwhich obtained an exclusive copy of the police report.
Hunter, son of former Vice President and 2020 candidate Joe Biden, had rented the vehicle from a California location, intending to return it to the Prescott, Arizona location where it was discovered after being dropped off with the crack pipe and Hunter Biden's personal effects. 
Instead of returning the car keys to the drop box where after-hours returns are supposed to go, the car was returned—according to the police report—with the keys left in the gas tank compartment of the vehicle. Also found inside the vehicle, per the police report, were two drivers’ licenses both bearing Hunter Biden’s legal name Robert Biden, as well as “some credit cards with the same name,” “a secret service business card,” and an “Attorney General’s badge” all contained inside a wallet that Hertz rental employees discovered—along with a pipe that Hertz employees thought and police later confirmed was used to smoke illicit drugs, as well as “a white powdery substance in the arm rest of the vehicle.” -Breitbart
Of note, Hunter was discharged from the Navy after he tested positive for cocaine
The morning after the car was dropped off, a phone number belonging to a renowned local "Colon Hydrotherapist" called the Hertz. The caller identified himself as "Joseph McGee," who told the employees that the keys were located in the gas cap as opposed to the drop box. 
“McGee” informed the rental car company employee, according to police, that “his friend was feeling sick so they didn’t know what to do” when the car was returned. Police, according to a supplemental report filed by a Prescott Police Department detective, sought and obtained a subpoena to discover the source of the “Joseph McGee” phone call—and traced it to a phone number owned and operated by a renowned “Colon Hydrotherapist” in the region. -Breitbart
Police were unable to find and interview "Joseph McGee," as well as contact the younger Biden, however they were unsuccessful at reaching either. The report does say that the Secret Service had located Hunter and that he was "well." 

War With Iran? Count Us Out, Europe Says

Friday, May 17, 2019

Concept Of "They"


Ancient Satanic Temple of DEBOD, Duke's Tribulation Fallen Angel & Spanish King's Masonic Playground

Why Are Russians Clashing Over a New Cathedral in Yekaterinburg?

SWAT Team Raids Venezuelan Embassy In DC To Cheers Of Guaido Supporters

JA zum Kopftuchverbot!

US warships enter Persian Gulf without incident amid soaring Iran tensions

Cryptos Just Flash-Crashed

US Air Force Deploys 20 CHAMPs That Can Zap and Fry Building Electronics


The U.S. Air Force has deployed at least 20 missiles that could zap the military electronics of North Korea or Iran with high-power microwaves, rendering their military capabilities virtually useless without causing any fatalities, has learned exclusively. Known as the Counter-Electronics High Power Microwave Advanced Missile Project (CHAMP), the missiles were built by Boeing's Phantom Works for the U.S. Air Force Research Laboratory and tested successfully in 2012. They have not been operation until now. Learn More:

Thursday, May 16, 2019

Monsanto's Assassination Hitlist


Bayer finally admits what researchers like F. William Engdahl (Seeds of Destruction) and Marie-Monique Robin (The World According to Monsanto) told us years ago: Mon(ster)santo engaged in extraordinarily "sharp practice" to combat GMO opponents. Bayer admits that its newly acquired "Monsanto" division had a black ops component:

Matt Landman - Treason & The Climate Changers

Satanic Pentagrams on Knights Templar's Church

Reality Check Episode Three: Death Threat Groovie Spills the Beans

China's Huawei, 70 Affiliates Blacklisted By US Commerce Department

Reality Check Episode Two: Slander and Lies: Jay Weidner Was Not Fired

PG&E Fires | 5G Effects Declassified | Yellow Vest Slander | Fake News Apocalypse

Executive Order on Securing the Information and Communications Technology and Services Supply Chain

By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code,
I, DONALD J. TRUMP, President of the United States of America, find that foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services, which store and communicate vast amounts of sensitive information, facilitate the digital economy, and support critical infrastructure and vital emergency services, in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.  I further find that the unrestricted acquisition or use in the United States of information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of foreign adversaries augments the ability of foreign adversaries to create and exploit vulnerabilities in information and communications technology or services, with potentially catastrophic effects, and thereby constitutes an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States.  This threat exists both in the case of individual acquisitions or uses of such technology or services, and when acquisitions or uses of such technologies are considered as a class.  Although maintaining an open investment climate in information and communications technology, and in the United States economy more generally, is important for the overall growth and prosperity of the United States, such openness must be balanced by the need to protect our country against critical national security threats.  To deal with this threat, additional steps are required to protect the security, integrity, and reliability of information and communications technology and services provided and used in the United States.  In light of these findings, I hereby declare a national emergency with respect to this threat.
Accordingly, it is hereby ordered as follows:
Section 1.  Implementation.  (a)  The following actions are prohibited:  any acquisition, importation, transfer, installation, dealing in, or use of any information and communications technology or service (transaction) by any person, or with respect to any property, subject to the jurisdiction of the United States, where the transaction involves any property in which any foreign country or a national thereof has any interest (including through an interest in a contract for the provision of the technology or service), where the transaction was initiated, is pending, or will be completed after the date of this order, and where the Secretary of Commerce (Secretary), in consultation with the Secretary of the Treasury, the Secretary of State, the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, the United States Trade Representative, the Director of National Intelligence, the Administrator of General Services, the Chairman of the Federal Communications Commission, and, as appropriate, the heads of other executive departments and agencies (agencies), has determined that:
(i)   the transaction involves information and communications technology or services designed, developed, manufactured, or supplied, by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary; and
(ii)  the transaction:
(A)  poses an undue risk of sabotage to or subversion of the design, integrity, manufacturing, production, distribution, installation, operation, or maintenance of information and communications technology or services in the United States;
(B)  poses an undue risk of catastrophic effects on the security or resiliency of United States critical infrastructure or the digital economy of the United States; or
(C)  otherwise poses an unacceptable risk to the national security of the United States or the security and safety of United States persons.
(b)  The Secretary, in consultation with the heads of other agencies as appropriate, may at the Secretary’s discretion design or negotiate measures to mitigate concerns identified under section 1(a) of this order.  Such measures may serve as a precondition to the approval of a transaction or of a class of transactions that would otherwise be prohibited pursuant to this order.
(c)  The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted prior to the effective date of this order.
Sec2.  Authorities.  (a)  The Secretary, in consultation with, or upon referral of a particular transaction from, the heads of other agencies as appropriate, is hereby authorized to take such actions, including directing the timing and manner of the cessation of transactions prohibited pursuant to section 1 of this order, adopting appropriate rules and regulations, and employing all other powers granted to the President by IEEPA, as may be necessary to implement this order.  All agencies of the United States Government are directed to take all appropriate measures within their authority to carry out the provisions of this order.
(b)  Rules and regulations issued pursuant to this order may, among other things, determine that particular countries or persons are foreign adversaries for the purposes of this order; identify persons owned by, controlled by, or subject to the jurisdiction or direction of foreign adversaries for the purposes of this order; identify particular technologies or countries with respect to which transactions involving information and communications technology or services warrant particular scrutiny under the provisions of this order; establish procedures to license transactions otherwise prohibited pursuant to this order; establish criteria, consistent with section 1 of this order, by which particular technologies or particular participants in the market for information and communications technology or services may be recognized as categorically included in or as categorically excluded from the prohibitions established by this order; and identify a mechanism and relevant factors for the negotiation of agreements to mitigate concerns raised in connection with subsection 1(a) of this order.  Within 150 days of the date of this order, the Secretary, in consultation with the Secretary of the Treasury, Secretary of State, the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, the United States Trade Representative, the Director of National Intelligence, the Administrator of General Services, the Chairman of the Federal Communications Commission and, as appropriate, the heads of other agencies, shall publish rules or regulations implementing the authorities delegated to the Secretary by this order.
(c)  The Secretary may, consistent with applicable law, redelegate any of the authorities conferred on the Secretary pursuant to this section within the Department of Commerce.
Sec3.  Definitions.  For purposes of this order:
(a)the term “entity” means a partnership, association, trust, joint venture, corporation, group, subgroup, or other organization;
(b)the term “foreign adversary” means any foreign government or foreign non-government person engaged in a long‑term pattern or serious instances of conduct significantly adverse to the national security of the United States or security and safety of United States persons;
(c)the term “information and communications technology or services” means any hardware, software, or other product or service primarily intended to fulfill or enable the function of information or data processing, storage, retrieval, or communication by electronic means, including transmission, storage, and display;
(d)the term “person” means an individual or entity; and
(e)the term “United States person” means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.
Sec4.  Recurring and Final Reports to the Congress.  The Secretary, in consultation with the Secretary of State, is hereby authorized to submit recurring and final reports to the Congress on the national emergency declared in this order, consistent with section 401(c) of the NEA (50 U.S.C. 1641(c)) and section 204(c) of IEEPA (50 U.S.C. 1703(c)).
Sec5.  Assessments and Reports.  (a)  The Director of National Intelligence shall continue to assess threats to the United States and its people from information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary.  The Director of National Intelligence shall produce periodic written assessments of these threats in consultation with the heads of relevant agencies, and shall provide these assessments to the President, the Secretary for the Secretary’s use in connection with his responsibilities pursuant to this order, and the heads of other agencies as appropriate.  An initial assessment shall be completed within 40 days of the date of this order, and further assessments shall be completed at least annually, and shall include analysis of:
(i)  threats enabled by information and communications technologies or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary; and
(ii)  threats to the United States Government, United States critical infrastructure, and United States entities from information and communications technologies or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the influence of a foreign adversary.
(b)The Secretary of Homeland Security shall continue to assess and identify entities, hardware, software, and services that present vulnerabilities in the United States and that pose the greatest potential consequences to the national security of the United States.The Secretary of Homeland Security, in coordination with sector-specific agencies and coordinating councils as appropriate, shall produce a written assessment within 80 days of the date of this order, and annually thereafter.This assessment shall include an evaluation of hardware, software, or services that are relied upon by multiple information and communications technology or service providers, including the communication services relied upon by critical infrastructure entities identified pursuant to section 9 of Executive Order 13636 of February 12, 2013 (Improving Critical Infrastructure Cybersecurity).
(c)  Within 1 year of the date of this order, and annually thereafter, the Secretary, in consultation as appropriate with the Secretary of the Treasury, the Secretary of Homeland Security, Secretary of State, the Secretary of Defense, the Attorney General, the United States Trade Representative, the Director of National Intelligence, and the Chairman of the Federal Communications Commission, shall assess and report to the President whether the actions taken by the Secretary pursuant to this order are sufficient and continue to be necessary to mitigate the risks identified in, and pursuant to, this order.
Sec6.  General Provisions.  (a)  Nothing in this order shall be construed to impair or otherwise affect:
(i)   the authority granted by law to an executive department or agency, or the head thereof; or
(ii)  the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b)  This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c)  This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
May 15, 2019.