Freedom of The Press or Freedom to Suppress [PART 1 & 2]


PART 1: The echo chamber effect is at an all time high as the new world media conglomerate pushes back against those who are waking up. The echo chamber effect is the relentless “propping up” of your own beliefs with the goal to perpetually disunite the masses and prevent us from seeing the powers that be behind the curtain.

It is no coincidence that the corptocracy pushes world culture towards its own ends. In furtherance of its agenda of total control – we now live in a time where propaganda of US citizens is legal – what news is real?

So many events have serious questions surrounding them – from mass shootings to pizzagate – how can we place faith in the corproratocracy’s cultural media machine?

 

PART2: The 25 Goals of the Illuminati refer to the construction of the one world government and the subjudication of the global citizenry through corruption, immorality, and total control. We know the unholy alliance between the government and the world’s largest financial institutions have created the corptocracy – is there an even darker agenda than just global control?

The evidence of depopulation, the control of the media, and the abuse of youth by the elite – is the fake news phenomena a counter attack to the recent investigations into the global social control paradigm and the evil its leaders do?

This 1967 CIA Memo Is Still Used to Discredit Conspiracy Theorists Today ~ Truthstream Media


Become our Patreon, read our goals here: https://www.patreon.com/truthstreammedia

Document source: http://www.maryferrell.org/showDoc.ht…

Truthstream Can Be Found Here:
Website: http://TruthstreamMedia.com
FB: http://Facebook.com/TruthstreamMedia
Twitter: @TruthstreamNews
DONATE: http://bit.ly/2aTBeeF
Amazon Affiliate Link (help support TSM with every Amazon purchase, no cost to you!): http://amzn.to/2aTARRx
Newsletter: http://eepurl.com/bbxcWX
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*­~*~*~*~*~

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

Gaia Podcast: Cosmic Disclosure w/David Wilcock & Corey Goode – Law of One and the SSP


Watch this episode on Gaia.com:
http://bit.ly/YTLawofOneSSP

Join Gaia.com for $0.99:
http://bit.ly/GaiaPlanSelection

The Law of One material is such critical information for the secret space programs that it has become required reading for many members. To find out why, Corey Goode and David Wilcock examine certain passages, which were once thought to be too outrageous to include in the original release. Despite being forbidden to read the Law of One material, what Corey has learned through his years of experience within the secret space programs confirms what Ra conveyed through Carla Rueckert in the 1981 channeling sessions. This interview with David Wilcock was originally webcast November 1, 2016.

Enjoy some FREE CONTENT on Gaia.com:
The Truth Behind Roswell – http://bit.ly/FREETruthHunter
Connecting to Universal Consciousness – http://bit.ly/FREEConsciounessMovie
Deep Space: Episode 1 – http://bit.ly/FREEDeepSpace1stEpisode
A Naturopathic Approach to Cancer – http://bit.ly/YTNaturopathicApproach
Spring Astrological Forecast – http://bit.ly/YTSpringAstroCast2017

Watch this episode on Gaia.com:
http://bit.ly/YTLawofOneSSP

Join Gaia.com for $0.99:
http://bit.ly/GaiaPlanSelection

Gaia Inc
Boulder, CO
866-284-8058
http://www.gaia.com

Join our email list for FREE articles: http://bit.ly/gaiaemails

Connect with us on Social:
Facebook: http://www.facebook.com/Gaia
Facebook: http://www.facebook.com/yogaongaia
YouTube: https://www.youtube.com/c/GaiaVideo
Twitter: http://www.twitter.com/YogaOnGaia
Twitter: http://www.twitter.com/JoinGaia
Instagram: @wearegaia @yogaongaia

#Gaia #Gaiapodcast #UFOs #Meditation #FlyingSaucers #Yoga #Transformation

MICHAEL SALLA – GRAND WORLD SPACE HISTORY – SACRED MATRIX


Ancient Antarctica Builder Race Technology , Corporate Reptilian ET Alliance, Nordic Disclosure
Para-Perception TV

US Air Force Officials Investigate Claims of Secret Navy Space Program ~ ExoNews TV


Officials from a highly classified U.S. Air Force space program that operates a space surveillance system around the Earth, are seriously investigating whistleblower claims, especially those stating that the U.S. Navy has secretly developed a parallel space program with kilometers-long craft belonging to eight battle groups capable of deep space operations.

Many thanks to Corey Goode and his Video Production Team for supplying the graphics and video assistance in Producing this ExoNews TV episode.

For Article with links and references, go to: http://exopolitics.org/us-air-force-o…
For Part 2 go to: https://www.youtube.com/watch?v=vJr4q…
For Part 3 go to: https://www.youtube.com/watch?v=Tzoxy…

Secret Space Program Update – United States Air Force Space Command & Organizational Changes Publicly Announced  


April 8, 2017
AscensionWithEarth.com

I have communicated with Dr. Michael Salla, of Exopolitics.org, today about these major changes to the USA Air Force Space Command (AFSC) and space enterprise programs.  Dr. Salla said he is working on this story and will release more information as soon as he finds out the real agenda about these changes within the Air Force Space Command.

You may want to review the following press release that discloses the Air Force changes in their space command and organization structure as it may relate to the coming announcements to the secret space program.

Here is the link to the press release by the Secretary of the Air Force Public Affairs which was publicly announced on April 4, 2017.

http://www.saffm.hq.af.mil/News/Article-Display/Article/1140695/af-announces-major-changes-to-space-enterprise/

In this press release by the Acting Secretary of the Air Force, Lisa Disbrow, mentions five major changes taking place within the Air Force Space Command/Enterprise.  Here is a list that I have extracted from the press briefing that specifies the major changes within the (AFSC) .

  • A new three-star deputy chief of staff for space, known as the ‘A-11′
  • Air Force is reforming the space acquisition programs approval process
  • Air Force Space Command has developed a Space War-fighting Construct (SWC)
  • Air Force Space Command is developing the Space Concept Of Operations (CONOPS)
  • Air Force and Office of the Joint Chiefs of Staff will embed space professionals at every stage of decision making

Reading this press release from USA Air Force suggests that there is anticipation and possibly even ongoing conflicts taking place in the “theater of space” between many different and competing factions.  A lot of the wording within the press release seems to relate to warfare in space and protecting space assets.  Many questions come to mind.

Is the USA Air Force admitting that space wars are occurring in our solar system and these major organizational changes are to control the current disclosures taking place publicly about the Air Force’s secret space programs?

How do these changes in the Air Force Space Command effect the disclosure of the coming secret space programs talked about by Corey Goode and David Wilcock?

What is the Space War-fighting Construct (SWC) and what technologies are they using?  Is the SWC the “lower” secret space program that the infamous commander “Sigmund” is part of?

If you recall “Sigmund” interrogated Corey Goode last year in 2016 to try to confirm if Goode was telling the truth about multiple secret space programs. Here is an excerpt from Michael Salla’s report entitled “Partial Disclosure and Competing Secret Space Programs” which discusses this encounter.

On October 26, Goode was abducted for a third time by this MIC-SSP, which he states is not advanced as the U.S. Navy’s “Solar Warden”, and other secret space programs he has previously described in interviews and reports.

He claims that the senior USAF officer in charge of the vehicle he was taken to, which he dubbed “Sigmund”, revealed that analysis of data from the two prior abductions has led to the conclusion that Goode is telling the truth after all. Source: exopolitics.org

I look forward to Michael Salla’s analysis and research about these major changes currently taking place within the Air Force Space Command.

AscensionWithEarth.com will inform readers if and when Dr. Salla releases his report about this topic.

http://www.ascensionwithearth.com/2017/04/secret-space-program-update-united.html?spref=fb

Secret Space Programs, Aliens, Inner Earth Civilizations & Atlantis – CLE 2017 Corey Goode


 

Corey Goode: Full Presentation at the 2017 Conscious Life Expo in LA. He speaks of his time in the MILAB & SSP Programs as well as interactions with Non-Terrestrial and Inner Earth Beings.

Watch Corey Goode on Cosmic Disclosure, Gaia TV – www.BlueAvians.com

Return of the Guardians
www.ComicDisclosure.com
www.SphereBeingAlliance.com

 

US Air Force Officials Investigate Claims of Secret Navy Space Program ~ ExoNews TV


Officials from a highly classified U.S. Air Force space program that operates a space surveillance system around the Earth, are seriously investigating whistleblower claims, especially those stating that the U.S. Navy has secretly developed a parallel space program with kilometers-long craft belonging to eight battle groups capable of deep space operations.

Many thanks to Corey Goode and his Video Production Team for supplying the graphics and video assistance in Producing this ExoNews TV episode.

For Article with links and references, go to: http://exopolitics.org/us-air-force-o…

For Part 2 go to: https://www.youtube.com/watch?v=vJr4q…

Antarctic Ice Shelf Destabilized as Race for Ancient Alien Artifacts & New Weapons Heats Up ~ Dr Michael Salla


 

antartic-alien-artifacts1

By Dr Michael Salla and Corey Goode

A multinational effort to excavate key regions of Antarctica in search of artifacts from a flash frozen alien civilization created by refugees is destabilizing the continent’s massive ice shelves, according to secret space program whistleblower Corey Goode. He furthermore reveals that secret military bases in Antarctica are using some of the artifacts for weapons development in violation of the 1959 Antarctic Treaty, which stipulates that the continent’s resources will be only used for scientific purposes.

This article is the third in a series [click for Part One and Part Two]. Corey’s written contribution to this final installment has led to it being our first collaborative writing venture. To identify who is writing for the reader, I [Michael Salla] will take the role of the narrator and distinguish when Corey is directly contributing in his own words, as opposed to me paraphrasing his briefing material.

Disclosure of the Antarctica ruins is still imminent, Corey reports, as a number of key variables impact on when and how much is to be revealed to the world about the discoveries while maintaining secrecy about the ongoing military programs to weaponize alien artifacts.

In a detailed briefing given to me on March 16, 2017, Corey shared additional details about the “Pre-Adamite” civilization supplementing the data he previously put out. This new information was originally slated for release in an article, “Endgame III”, as the sequel to the popular Endgame II article and video which focused on secret Antarctica excavations.

Corey said earlier that the extraterrestrial civilization, identified by him as Pre-Adamites, first arrived 55,000 to 60,000 years ago and established outposts all over Antarctica which notably has a land mass almost twice the size of the contiguous United States. He described them as standing approximately 12-14 feet in height and possessing elongated skulls.

Corey also described how they created a hybrid species, Homo Capensis according to anthropological classification, which became ruling elites, or demigods, in ancient South American, Asian and European societies.

In the March 16 briefing, Corey began by explaining that the Pre-Adamites had established their main base right over “Ancient Builder Race” technology, which included a “stargate” or “wormhole” device very similar to that depicted in the popular Science Fiction show, Stargate SG-1.

Corey said that this show was an example of a soft disclosure in which the U.S. Air Force took the lead in revealing key elements of the technologies developed by the Ancient Builder Race, who had established a travel grid throughout the galaxy using traversable wormholes hundreds of millions, if not billions, of years ago.

When the Pre-Adamites first arrived in Antarctica, they quickly asserted control through their advanced technologies over this area populated by human settlements at the time.

With their advanced medical technologies, the Pre-Adamites then began many genetic experiments, and created hybrids that became a servant class. Corey previously released his description of the flash frozen bodies of the bioengineered hybrids (Homo Capensis) during his latest visit to Antarctica in early January of this year.

Corey explained that the Pre-Adamite programs interrupted 22 genetic experiments being run by human-looking extraterrestrials first established 500 thousand years ago. In a prior report, Corey elaborated that a “Super Federation” comprising 40-60 of these races had established competing genetic engineering programs with surface humanity.

Corey also described how the Pre-Adamites engaged in conflict with the human-looking ETs running their 22 genetic experiments, as well as Reptilians doing likewise, for global influence.

Given that the Pre-Adamites had established a physical presence on Earth, this gave them an advantage in establishing ruling bloodlines over the Americas, Asia and Europe, as explained in a previous article.

At the same time, humans who had escaped into the Earth’s interior to avoid multiple surface catastrophes monitored how the different extraterrestrial races competed against each other for influence and power over surface humanity who was still recovering from global catastrophes.

One of the Inner Earth races that pride themselves on their pure human bloodlines, the Anshar, had a historic connection to the human settlements in Antarctica. However, the Anshar did not cooperate with the Pre-Adamites because they considered them to be sociopaths in terms of their treatment of the native Antarctica population and other regions of surface humanity where they had established colonies.

Corey said that the Pre-Adamites treated humans in antiquity in a similar manner to how modern humans treat dogs in terms of cross-breeding for multiple purposes. The Pre-Adamites, along with the Reptilians, were a big problem for all humanity.

The Anshar were part of a confederation of worlds that sought to make things better on the planet by providing knowledge and technological assistance as described in Sumerian cuneiform texts.

In a previous article, I discussed how the Anunnaki (as described by Zecharia Sitchin in his Earth Chronicles series) involved the Anshar and other off world groups, according to Corey’s sources. To help clarify this point, Corey adds:

Anunnaki was a generic term that meant ET or those that come from heaven. This definition will upset some people, so be aware… The Reptilians, the Nordics, The Ebens and the Anshar were interacting with the ancient Sumerians to assist them in the recovery of their civilization after the great catastrophe that destroyed Atlantis. The Anunnaki were indeed the Reptilians, but the other groups that interacted with them were also referred to by this same name (according to my info in the programs).

Corey said that a small number of Pre-Adamites survived the catastrophe that flash froze Antarctic regions by going inside stasis chambers located in the largest of their three motherships. These ships are miles long, and not 30 miles long as reported earlier.

The additional information released by Corey suggests there are many risks in waking up the Pre-Adamites who would likely attempt to reassert their authority by utilizing their advanced technologies, including the little understood “Builder race technology”. Here, Corey adds:

The groups in charge of these excavated locations are taking precautions, i.e. Mini-Nukes with “deadman’s Triggers”, in case these beings become hostile (for reference, see the movie Prometheus).

This leads us directly to the secret excavations currently underway of the Pre-Adamites’ bases and ships.

Secret Antarctica Excavations

Corey disclosed that excavations are occurring in multiple places in Antarctica by different nations, which in some cases are in direct competition to get the most advanced technologies. The goal is to eventually disclose some of these, but many technologies, especially those that are clearly extraterrestrial in origin will be not be released, at least to begin with.

Corey said that all the nations involved in the Antarctica excavations are capable of making a disclosure announcement on their own, but they are all participating in negotiations to do so in a coordinated manner.

Corey thinks the Antarctica disclosures will begin in tandem with prosecutions of the elites involved in pedophilia, human trafficking and other crimes, which includes the blackmailing of leading politicians, academics, industrialists and military officials. He says that the recent Trump administration action to sack 46 District Attorneys was due to their inaction in moving forward with such prosecutions.

Alternatively, the Russians, the Chinese, or smaller nations could begin the Antarctica announcements, if negotiations drag out and the U.S. fails to move forward. The former nations are part of what Corey describes as the Earth Alliance. This group has rapidly grown in prominence with economic power mounting in Asia as global Cabal/Illuminati’s power centers in Europe and North America continue to gradually wane.

This is best illustrated by a battle that took place over Antarctica skies in early 2016. It began when Teardrop-shaped ships came out of the sea in the Ross Ice Shelf area and sought to escape into deep space. These ships flew out of bases belonging to a corporate run space program called the “Interplanetary Corporate Conglomerate”.

The ships in turn belonged to the Cabal/Illuminati, who are allied to another program called the “Dark Fleet”. They were filled with global elites seeking to escape anticipated global chaos caused by upcoming Solar events. Read More Here

SEAN BOND, YVONNE PALERMO, SPENCER ESKRIDGE: MKULTRA HEALING & WHATNOTS…


Disclaimer:: Any guest and or topic listener discretion is advised. Each person Needs to discern for themselves the validity of guest claims.
Intuitive Art Reading: http://www.grooviebean.com
Sean Bond: sn_bond@yahoo.com
Spencer Eskridge: https://www.youtube.com/channel/UCv0G…

“US Air Force Officials Investigate Claims of Secret Navy Space Program” by Dr Michael Salla


usaf-investigates-navy-ssp

Officials from a highly classified U.S. Air Force space program that operates a space surveillance system around the Earth, are seriously investigating whistleblower claims, especially those stating that the U.S. Navy has secretly developed a parallel space program with kilometers-long craft belonging to eight battle groups capable of deep space operations.

According to secret space program whistleblower, Corey Goode, a senior official from the Air Force program who he calls “Sigmund”, has been conducting “information exchanges” with Goode to learn about the alleged Navy space program and rumors of it cooperating with Nordic and other extraterrestrial groups,

Previously, Goode reported that he first encountered Sigmund in a series of military abductions that began in January 2016, when a triangular shaped antigravity spacecraft landed near his Texas home, and two Air Force personnel from the vehicle forcibly took him into the craft. Goode was subsequently interrogated and chemicals were injected into him to force him to reveal the source of his information.

After publicly emerging in March 2015, Goode’s claims had come to the attention of a highly classified Air Force Space Program, which closely cooperates with other U.S. military entities such as the National Reconnaissance Office, the National Security Agency and the Defense Intelligence Agency. Goode calls this interagency collaboration the Military Industrial Complex Secret Space Program (MIC SSP).

The MIC SSP is entirely separate to a more advanced Navy Space Program known as “Solar Warden”, which Goode says he served in during a “twenty year and back” tour of duty from 1987 to 2007. In previous reports, Goode has discussed at length the activities of Solar Warden and its interactions with visiting extraterrestrial civilizations.

During the initial abductions, Sigmund was trying to ascertain the source of Goode’s information which had revealed highly classified information about the MIC SSP. In earlier reports, Goode also described how Sigmund and his subordinates chemically forced Goode to out several operatives working for the Solar Warden program.

 

The nature of Sigmund’s interrogations of Goode began to significantly change when Sigmund determined that Goode’s information was, at least in part, accurate, and that he was not part of a disinformation program belonging to a rogue element of the MIC SSP.

Sigmund subsequently began an “information exchange” with Goode that first occurred in “meetings” during the latter part of 2016. Goode was given information about Antarctica and the intense power struggle within the U.S. national security system involving the 2016 Presidential election. Goode wrote a report about one of these information exchanges that was published on December 11, 2016. READ MORE

Secret Presidential Memorandum issued to Declassify Anti-aging & Free Energy Technologies by Dr Michael Salla o


 

trump-signs-memorandum1

According to secret space program whistleblower, Corey Goode, President Donald Trump issued a highly classified Memorandum soon after his January 20th inauguration ordering the release of group of classified patents concerning anti-aging and health, along with free energy technologies. The Top Secret Memorandum was sent to the Department of Defense and the Intelligence Community, and due to its classification status it will not be accessible to major media for reporting.

The information received from Goode comes from a senior official in an interagency secret space program comprising the USAF, NRO, NSA, DIA which he describes as the Military Industrial Complex Secret Space Program (MIC-SSP). The official, whom he calls “Sigmund”, is investigating Goode’s claims and conducting an “information exchange” with Goode in the process (see Part One).

On March 16, Goode briefed me about his ongoing meetings with Sigmund and/or his two subordinates. The information provided by Goode was originally slated for release in an article, “Endgame III”, as the sequel to the popular Endgame II article and video. However due to the urgency of releasing this information without delay, it was passed on to me to get it out now.

In one of his “meetings” with Sigmund (and/or his subordinates) in late January, Goode was told about Trump issuing a Presidential Memorandum to declassify over 1000 patents from a pool of over 5000. Most of the 1000 patents deal with anti-aging and health technologies, yet some deal with material science and biochemistry and a few involve free energy inventions.

These technologies are widely used in a number of secret space programs, and the patents dealing with these have been repressed under national security orders. The USPTO has issued Federal Regulations that govern when patents are classified on the grounds of national security, and subsequently withheld from the general public:

[W]henever the publication or disclosure of an invention by the publication of an application or by the granting of a patent is, in the opinion of the head of an interested Government agency, determined to be detrimental to national security, the  Commissioner for Patents at the United States Patent and Trademark Office (USPTO) must issue a secrecy order and withhold the grant of a patent for such period as the national interest requires. A patent will not be issued on the application as long as the secrecy order is in force. If a secrecy order is applied to an international application, the application will not be forwarded to the International Bureau as long as the secrecy order is in force.

When a Department of Defense entity or a member of the Intelligence Community consider a patent to be a threat to national security, then the Patents Commissioner will issue a secrecy order preventing the patent from being publicly released.

The current number of patents that have been classified are approximately 5700 according to the U.S. Patent and Trademark Office (USPTO), which matches the information given to Goode by Sigmund.

As the above table shows, the number of secret patents that are declassified each year has averaged roughly 0.5 percent annually.

Goode learned that the Pentagon and Intelligence agencies told Trump it would take 10 years to release them, but Trump told them to get it done within two to three years. READ MORE

Ralph Ring Teleportation and Esoteric Consciousness


Published on Aug 24, 2016 Ralph Ring has had an ongoing interest and participation in areas of Esoteric & Ether Knowledge and Technologies. After leaving the US Army in 1954, he began an ongoing search for answers to many questions concerning the Unknown. In brief, he worked for a US Government funded research facility in the areas of Magnetic’s, Levitation and Teleportation. His search eventually led him to the Realities and participations of Teleportation and Esoteric Consciousness.
.
Ralph is a Natural Scientist and a Creative Technician who in the early 1960’s worked together with Otis T. Carr (A Prodigy of Nikola Tesla)and a team of dedicated Scientists on Alternative Technologies, one of which was Teleportation. He was One of three to pilot a Man Made Spaceship, the OTC-X1. His Dream since birth has and is to produce Levitating Homes, Cities and Countries.

Janet Lessin and Sasha Lessin http://www.aquarianradio.com

 

Ralph Ring Flying the OTC-X1 Spacecraft

In a dramatic experiment, Ring co-piloted a 45 foot disk a distance of ten miles, arriving at their destination instantaneously. Published Dec 13, 2012

Anti-Gravity & Conscious Awareness | Ralph and Marsha Ring, Global BEM

How consciousness powers a free energy New Earth: Ralph & Marsha Ring with Host Patty Greer


“Everyone is everywhere” How non-local Love consciousness powers a free energy New Earth: Ralph & Marsha Ring with Host Patty Greer
By Alfred Lambremont Webre
WATCH VIDEO: https://youtu.be/0QpmIyyD-As
NewsInsideOut ARTICLE & LINKS
https://newsinsideout.com/2017/03/eve…
NewsInsideOut ARTICLE & LINKS

Visit Ralph & Marsha Ring’s website:

http://bluestarenterprise.com/

Max Igan: The Control Grid Continues And Nothing Has Changed


Of Course Smart Devices Won’t Tell You If They’re Connected to the CIA ~ Truthstream Media


But really… why is this really a surprise to anyone?

Support us on Patreon! (Please!): https://www.patreon.com/truthstreammediaTruthstream Can Be Found Here:
Website: http://TruthstreamMedia.com
FB: http://Facebook.com/TruthstreamMedia
Twitter: @TruthstreamNews
DONATE: http://bit.ly/2aTBeeF
Amazon Affiliate Link (help support TSM with every Amazon purchase, no cost to you!): http://amzn.to/2aTARRx
Newsletter: http://eepurl.com/bbxcWX
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*­~*~*~*~*~

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

Vault 7: CIA Hacking Tools Revealed


Ed. Note: Me thinks it’s time for the residents of the US wake-up and unite to entirely dismantle the CIA and re-purpose some of their tech for positive purposes. Like monitoring our public servants, corporate structures and military industrial complex to ensure they’re SERVING the public good. Blessings, {~A~}

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

 

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

 

Examples

 

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

 

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE. 

Frequently Asked Questions

 

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

 

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

 

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

 

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

 

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

 

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

 

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

 

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

 

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

 

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

 

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

 

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

 

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/https://wikileaks.org/ciav7p1/

Corey Goode On Coast to Coast AM – February 24, 2017 – ET Contacts & Antarctica (Audio)


ET Contacts & Antarctica  

https://i0.wp.com/spherebeingalliance.com/media/img/800x0/2016-11/1_Corey_Goode.jpg
Date Friday – February 24, 2017
Host Jimmy Church
Guests Corey Goode,  Open Lines

Filling in for George, Jimmy Church (email), welcomed intuitive empath, ET contactee, and whistleblower Corey Goode for a discussion on the discovery of an ancient alien civilization in Antarctica, his current information on our planet, and intel tied to the partial disclosure narrative. Goode, who claims to be in direct contact with different extraterrestrial groups and shares a delegate seat in a human-ET super federation council, revealed a message he received from the Blue Avians. “It’s for people to deal with their karma… to forgive themselves and forgive others, and to move on with their lives,” he said.

According to Goode, high-level academics have been studying the ruins of an ancient civilization in Antarctica for the last 12 years. “I’m not being put in a position to where I can come back with photos or video of some of this stuff, especially like what’s going on in Antarctica,” he disclosed. This information will be announced at a certain point, he explained, noting two clandestine groups, the Illuminati and the Earth Alliance, have been debating about how to unfold this disclosure to the general public.

Goode asserted to have personally toured the Antarctic dig site located deep underground in an immense ice cavern and been shown the remains of strange spindly bodies between 12-14 feet tall. These beings are called pre-Adamites and were on Earth genetically engineering humanity before the historical Adam, he reported. Goode also recounted his trip to an ice-covered library where metal scrolls with indecipherable laser-etched symbols were being removed ahead of a major excavation. They’ve also found the ruins of three massive spaceships which apparently brought the pre-Adamites to Earth, he continued, adding they are jokingly referred to as the Niña, Pinta, and Santa Maria.

Goode suggested disclosure of the Antarctica discovery will be staged in order to distract from other shadow government-related plans. They have been removing any non-human artifacts from the Antarctic dig site so they can claim it is an ancient HUMAN civilization buried beneath the ice, he divulged. Next, they will disclose information about a secret space program, how ancient alien ruins have been found on other planets, and finally the ET connection to the Antarctic site, he announced.

Open Lines followed in the final hour of the program.

Stream Audio and Support Coast to Coast AM at the following Link: http://www.coasttocoastam.com/show/2017/02/24  

http://www.ascensionwithearth.com/2017/02/corey-goode-on-coast-to-coast-am.html?spref=fb

Disruptive Technology and Free Energy Under Donald Trump? ~ WeAreChange


In this Luke Rudkowski interviews an expert on disruptive technology and creator of the Thrive documentary Foster Gamble. Many rumors have circulated about Donald Trump releasing new technologies that the U.S government has kept secret and in this video we give you some context on this very important issue.


To find out more about Foster Gamble check out http://www.thrivemovement.com/about_us

Visit our MAIN SITE for more breaking news http://wearechange.org/

PATREON https://www.patreon.com/WeAreChange?a…
SNAPCHAT: LukeWeAreChange
FACEBOOK: https://facebook.com/LukeWeAreChange
TWITTER: https://twitter.com/Lukewearechange
INSTAGRAM: http://instagram.com/lukewearechange
STEEMIT: https://steemit.com/@lukewearechange

OH YEAH since we are not corporate or government WHORES help us out http://wearechange.org/donate

We take BITCOIN too
12HdLgeeuA87t2JU8m4tbRo247Yj5u2TVP

Hollywood Icon Robert De Niro Rushes To Trump After CIA Kills Top Autism Expert


Robert De Niro, became so “enraged/inflamed” after the 23 January suspected Central Intelligence Agency (CIA) murder of top autism journalist and researcher Dan Olmsted, this Hollywood icon quickly rushed to President Donald Trump’s side—and then, yesterday, joined with Trump’s pick to head his new “vaccine safety” commission, Robert F. Kennedy Jr., to stunningly offer $100,000 to anyone who could prove vaccines were safe.

from whatdoesitmean

dan-screenshot_1According to this report (and as we previously reported on), barely a fortnight prior to his taking the oath of office, then President-elect Trump shocked the entire US mainstream media with a direct assault on the vaccine-autism link conspiracy by his appointment of Robert F. Kennedy Jr. [the son and nephew of the slain American leaders Senator Robert F. Kennedy Sr. and President John F. Kennedy] to become his Chairman of the Golden Vaccine Safety Task Force—and who (Kennedy) was already reviled by these elite propagandists after his publishing a manifesto titled MERCURY & VACCINES linking childhood vaccines with autism.

After being sworn into office, this report continues, Robert F. Kennedy Jr. had scheduled a 24 January meeting at the White House where he intended to introduce President Trump to Dan Olmsted—who as a United Press International (UPI) investigative reporter exposed a massive cover-up of the US Army invented malaria drug Lariam that, literally, made its users “lose their minds” and turn them into murder lust killers.

Following Dan Olmsted’s exposing the massive US Army cover-up of their “murderous” malaria drug Lariam, this report details, this UPI investigative reporter then turned his skills towards the mysterious rise of a new 20th Century childhood disease called autism—and that in his first article about he wrote:

Where are the autistic Amish? Here in Lancaster County, heart of Pennsylvania Dutch country, there should be well over 100 with some form of the disorder.

I have come here to find them, but so far my mission has failed, and the very few I have identified raise some very interesting questions about some widely held views on autism.

The mainstream scientific consensus says autism is a complex genetic disorder, one that has been around for millennia at roughly the same prevalence. That prevalence is now considered to be 1 in every 166 children born in the United States.

Applying that model to Lancaster County, there ought to be 130 Amish men, women and children here with Autism Spectrum Disorder.

Well over 100, in rough terms.

Typically, half would harbor milder variants such as Asperger’s Disorder or the catch-all Pervasive Development Disorder, Not Otherwise Specified — PDD-NOS for short.

So let’s drop those from our calculation, even though “mild” is a relative term when it comes to autism.

That means upwards of 50 Amish people of all ages should be living in Lancaster County with full-syndrome autism, the “classic autism” first described in 1943 by child psychiatrist Leo Kanner at Johns Hopkins University.

The full-syndrome disorder is hard to miss, characterized by “markedly abnormal or impaired development in social interaction and communication and a markedly restricted repertoire of activities and interests,” according to the Diagnostic and Statistical Manual of Mental Disorders.

Why bother looking for them among the Amish? Because they could hold clues to the cause of autism.”

Important to note about Dan Olmsted’s UPI research articles on autism, this report explains, is that they are some of the most feared in the United States—so much so that the former Emmy award winning CBS News journalist-producer, Sharyl Attkisson, whom Olmsted had worked with on a television programme about the US Army’s Lariam cover-up, has personally archived them—and when Attkisson herself asked officials from the Centers for Disease Control (CDC) about the lack of autism in the unvaccinated Amish, they outrageously told her it was because these primitive religious farmers didn’t use electricity.

And so feared, in fact, are Dan Olmsted’s UPI research articles on autism, this report notes, Sharyl Attkisson had to archive them on a server the island kingdom of Tonga having them archived under the top-level country domain code of .to as all US search engines are programmed to delete them if found on .com or .org websites.

Not just were Dan Olmsted’s articles about autism feared either, this report continues, but, also, his very person—and as evidenced by just weeks prior to his own death, he began receiving anonymous warnings threatening his life if he dared to meet with President Trump—soon after followed by the mysterious death of his sister’s ex-husband—and that on the day prior to meeting Trump (as if he knew what was going to happen) he cryptically wrote his own death message ending it with these words:

“A P.S. for 2017: If you say what you think and stick to your guns and you are right, like my pediatrician and many of you who read AOA every week, sometimes even the president of the United States will come around to agreeing with you.”

Unfortunately, however, this report grimly records, the day prior to Dan Olmsted meeting with President Trump and being able to present his vaccine-autism link evidence, he was discovered dead in his Falls Church, Virginia, home—with officials declaring his death to be of “natural causes” without an autopsy, and then cremating his body within 7 hours—and not one single American mainstream media news organization bothering to even write about his remarkable career in the service of mankind and the thousands of lives he saved.

This report concludes with a Foreign Intelligence Service (SVR) addendum “suggesting/alluding” that Dan Olmstead’s death is directly linked to the CIA due to this spy agencies links to giant pharmaceutical companies that he was investigating prior to his death in order to prove that autism was just the “tip of the iceberg” of a mass conspiracy to control peoples minds, and bodies, with drugs in order to keep them docile, or like the Lariam drug did, make them murderous.

 

Source: https://theinternationalreporter.org/2017/02/17/hollywood-icon-robert-de-niro-rushes-to-trump-after-cia-kills-top-autism-expert/