“US Air Force Officials Investigate Claims of Secret Navy Space Program” by Dr Michael Salla


usaf-investigates-navy-ssp

Officials from a highly classified U.S. Air Force space program that operates a space surveillance system around the Earth, are seriously investigating whistleblower claims, especially those stating that the U.S. Navy has secretly developed a parallel space program with kilometers-long craft belonging to eight battle groups capable of deep space operations.

According to secret space program whistleblower, Corey Goode, a senior official from the Air Force program who he calls “Sigmund”, has been conducting “information exchanges” with Goode to learn about the alleged Navy space program and rumors of it cooperating with Nordic and other extraterrestrial groups,

Previously, Goode reported that he first encountered Sigmund in a series of military abductions that began in January 2016, when a triangular shaped antigravity spacecraft landed near his Texas home, and two Air Force personnel from the vehicle forcibly took him into the craft. Goode was subsequently interrogated and chemicals were injected into him to force him to reveal the source of his information.

After publicly emerging in March 2015, Goode’s claims had come to the attention of a highly classified Air Force Space Program, which closely cooperates with other U.S. military entities such as the National Reconnaissance Office, the National Security Agency and the Defense Intelligence Agency. Goode calls this interagency collaboration the Military Industrial Complex Secret Space Program (MIC SSP).

The MIC SSP is entirely separate to a more advanced Navy Space Program known as “Solar Warden”, which Goode says he served in during a “twenty year and back” tour of duty from 1987 to 2007. In previous reports, Goode has discussed at length the activities of Solar Warden and its interactions with visiting extraterrestrial civilizations.

During the initial abductions, Sigmund was trying to ascertain the source of Goode’s information which had revealed highly classified information about the MIC SSP. In earlier reports, Goode also described how Sigmund and his subordinates chemically forced Goode to out several operatives working for the Solar Warden program.

 

The nature of Sigmund’s interrogations of Goode began to significantly change when Sigmund determined that Goode’s information was, at least in part, accurate, and that he was not part of a disinformation program belonging to a rogue element of the MIC SSP.

Sigmund subsequently began an “information exchange” with Goode that first occurred in “meetings” during the latter part of 2016. Goode was given information about Antarctica and the intense power struggle within the U.S. national security system involving the 2016 Presidential election. Goode wrote a report about one of these information exchanges that was published on December 11, 2016. READ MORE

Secret Presidential Memorandum issued to Declassify Anti-aging & Free Energy Technologies by Dr Michael Salla o


 

trump-signs-memorandum1

According to secret space program whistleblower, Corey Goode, President Donald Trump issued a highly classified Memorandum soon after his January 20th inauguration ordering the release of group of classified patents concerning anti-aging and health, along with free energy technologies. The Top Secret Memorandum was sent to the Department of Defense and the Intelligence Community, and due to its classification status it will not be accessible to major media for reporting.

The information received from Goode comes from a senior official in an interagency secret space program comprising the USAF, NRO, NSA, DIA which he describes as the Military Industrial Complex Secret Space Program (MIC-SSP). The official, whom he calls “Sigmund”, is investigating Goode’s claims and conducting an “information exchange” with Goode in the process (see Part One).

On March 16, Goode briefed me about his ongoing meetings with Sigmund and/or his two subordinates. The information provided by Goode was originally slated for release in an article, “Endgame III”, as the sequel to the popular Endgame II article and video. However due to the urgency of releasing this information without delay, it was passed on to me to get it out now.

In one of his “meetings” with Sigmund (and/or his subordinates) in late January, Goode was told about Trump issuing a Presidential Memorandum to declassify over 1000 patents from a pool of over 5000. Most of the 1000 patents deal with anti-aging and health technologies, yet some deal with material science and biochemistry and a few involve free energy inventions.

These technologies are widely used in a number of secret space programs, and the patents dealing with these have been repressed under national security orders. The USPTO has issued Federal Regulations that govern when patents are classified on the grounds of national security, and subsequently withheld from the general public:

[W]henever the publication or disclosure of an invention by the publication of an application or by the granting of a patent is, in the opinion of the head of an interested Government agency, determined to be detrimental to national security, the  Commissioner for Patents at the United States Patent and Trademark Office (USPTO) must issue a secrecy order and withhold the grant of a patent for such period as the national interest requires. A patent will not be issued on the application as long as the secrecy order is in force. If a secrecy order is applied to an international application, the application will not be forwarded to the International Bureau as long as the secrecy order is in force.

When a Department of Defense entity or a member of the Intelligence Community consider a patent to be a threat to national security, then the Patents Commissioner will issue a secrecy order preventing the patent from being publicly released.

The current number of patents that have been classified are approximately 5700 according to the U.S. Patent and Trademark Office (USPTO), which matches the information given to Goode by Sigmund.

As the above table shows, the number of secret patents that are declassified each year has averaged roughly 0.5 percent annually.

Goode learned that the Pentagon and Intelligence agencies told Trump it would take 10 years to release them, but Trump told them to get it done within two to three years. READ MORE

Ralph Ring Teleportation and Esoteric Consciousness


Published on Aug 24, 2016 Ralph Ring has had an ongoing interest and participation in areas of Esoteric & Ether Knowledge and Technologies. After leaving the US Army in 1954, he began an ongoing search for answers to many questions concerning the Unknown. In brief, he worked for a US Government funded research facility in the areas of Magnetic’s, Levitation and Teleportation. His search eventually led him to the Realities and participations of Teleportation and Esoteric Consciousness.
.
Ralph is a Natural Scientist and a Creative Technician who in the early 1960’s worked together with Otis T. Carr (A Prodigy of Nikola Tesla)and a team of dedicated Scientists on Alternative Technologies, one of which was Teleportation. He was One of three to pilot a Man Made Spaceship, the OTC-X1. His Dream since birth has and is to produce Levitating Homes, Cities and Countries.

Janet Lessin and Sasha Lessin http://www.aquarianradio.com

 

Ralph Ring Flying the OTC-X1 Spacecraft

In a dramatic experiment, Ring co-piloted a 45 foot disk a distance of ten miles, arriving at their destination instantaneously. Published Dec 13, 2012

Anti-Gravity & Conscious Awareness | Ralph and Marsha Ring, Global BEM

How consciousness powers a free energy New Earth: Ralph & Marsha Ring with Host Patty Greer


“Everyone is everywhere” How non-local Love consciousness powers a free energy New Earth: Ralph & Marsha Ring with Host Patty Greer
By Alfred Lambremont Webre
WATCH VIDEO: https://youtu.be/0QpmIyyD-As
NewsInsideOut ARTICLE & LINKS
https://newsinsideout.com/2017/03/eve…
NewsInsideOut ARTICLE & LINKS

Visit Ralph & Marsha Ring’s website:

http://bluestarenterprise.com/

Max Igan: The Control Grid Continues And Nothing Has Changed


Of Course Smart Devices Won’t Tell You If They’re Connected to the CIA ~ Truthstream Media


But really… why is this really a surprise to anyone?

Support us on Patreon! (Please!): https://www.patreon.com/truthstreammediaTruthstream Can Be Found Here:
Website: http://TruthstreamMedia.com
FB: http://Facebook.com/TruthstreamMedia
Twitter: @TruthstreamNews
DONATE: http://bit.ly/2aTBeeF
Amazon Affiliate Link (help support TSM with every Amazon purchase, no cost to you!): http://amzn.to/2aTARRx
Newsletter: http://eepurl.com/bbxcWX
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*­~*~*~*~*~

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

Vault 7: CIA Hacking Tools Revealed


Ed. Note: Me thinks it’s time for the residents of the US wake-up and unite to entirely dismantle the CIA and re-purpose some of their tech for positive purposes. Like monitoring our public servants, corporate structures and military industrial complex to ensure they’re SERVING the public good. Blessings, {~A~}

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

 

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

 

Examples

 

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

 

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE. 

Frequently Asked Questions

 

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

 

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

 

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

 

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

 

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

 

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

 

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

 

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

 

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

 

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

 

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

 

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

 

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/https://wikileaks.org/ciav7p1/

Hollywood Icon Robert De Niro Rushes To Trump After CIA Kills Top Autism Expert


Robert De Niro, became so “enraged/inflamed” after the 23 January suspected Central Intelligence Agency (CIA) murder of top autism journalist and researcher Dan Olmsted, this Hollywood icon quickly rushed to President Donald Trump’s side—and then, yesterday, joined with Trump’s pick to head his new “vaccine safety” commission, Robert F. Kennedy Jr., to stunningly offer $100,000 to anyone who could prove vaccines were safe.

from whatdoesitmean

dan-screenshot_1According to this report (and as we previously reported on), barely a fortnight prior to his taking the oath of office, then President-elect Trump shocked the entire US mainstream media with a direct assault on the vaccine-autism link conspiracy by his appointment of Robert F. Kennedy Jr. [the son and nephew of the slain American leaders Senator Robert F. Kennedy Sr. and President John F. Kennedy] to become his Chairman of the Golden Vaccine Safety Task Force—and who (Kennedy) was already reviled by these elite propagandists after his publishing a manifesto titled MERCURY & VACCINES linking childhood vaccines with autism.

After being sworn into office, this report continues, Robert F. Kennedy Jr. had scheduled a 24 January meeting at the White House where he intended to introduce President Trump to Dan Olmsted—who as a United Press International (UPI) investigative reporter exposed a massive cover-up of the US Army invented malaria drug Lariam that, literally, made its users “lose their minds” and turn them into murder lust killers.

Following Dan Olmsted’s exposing the massive US Army cover-up of their “murderous” malaria drug Lariam, this report details, this UPI investigative reporter then turned his skills towards the mysterious rise of a new 20th Century childhood disease called autism—and that in his first article about he wrote:

Where are the autistic Amish? Here in Lancaster County, heart of Pennsylvania Dutch country, there should be well over 100 with some form of the disorder.

I have come here to find them, but so far my mission has failed, and the very few I have identified raise some very interesting questions about some widely held views on autism.

The mainstream scientific consensus says autism is a complex genetic disorder, one that has been around for millennia at roughly the same prevalence. That prevalence is now considered to be 1 in every 166 children born in the United States.

Applying that model to Lancaster County, there ought to be 130 Amish men, women and children here with Autism Spectrum Disorder.

Well over 100, in rough terms.

Typically, half would harbor milder variants such as Asperger’s Disorder or the catch-all Pervasive Development Disorder, Not Otherwise Specified — PDD-NOS for short.

So let’s drop those from our calculation, even though “mild” is a relative term when it comes to autism.

That means upwards of 50 Amish people of all ages should be living in Lancaster County with full-syndrome autism, the “classic autism” first described in 1943 by child psychiatrist Leo Kanner at Johns Hopkins University.

The full-syndrome disorder is hard to miss, characterized by “markedly abnormal or impaired development in social interaction and communication and a markedly restricted repertoire of activities and interests,” according to the Diagnostic and Statistical Manual of Mental Disorders.

Why bother looking for them among the Amish? Because they could hold clues to the cause of autism.”

Important to note about Dan Olmsted’s UPI research articles on autism, this report explains, is that they are some of the most feared in the United States—so much so that the former Emmy award winning CBS News journalist-producer, Sharyl Attkisson, whom Olmsted had worked with on a television programme about the US Army’s Lariam cover-up, has personally archived them—and when Attkisson herself asked officials from the Centers for Disease Control (CDC) about the lack of autism in the unvaccinated Amish, they outrageously told her it was because these primitive religious farmers didn’t use electricity.

And so feared, in fact, are Dan Olmsted’s UPI research articles on autism, this report notes, Sharyl Attkisson had to archive them on a server the island kingdom of Tonga having them archived under the top-level country domain code of .to as all US search engines are programmed to delete them if found on .com or .org websites.

Not just were Dan Olmsted’s articles about autism feared either, this report continues, but, also, his very person—and as evidenced by just weeks prior to his own death, he began receiving anonymous warnings threatening his life if he dared to meet with President Trump—soon after followed by the mysterious death of his sister’s ex-husband—and that on the day prior to meeting Trump (as if he knew what was going to happen) he cryptically wrote his own death message ending it with these words:

“A P.S. for 2017: If you say what you think and stick to your guns and you are right, like my pediatrician and many of you who read AOA every week, sometimes even the president of the United States will come around to agreeing with you.”

Unfortunately, however, this report grimly records, the day prior to Dan Olmsted meeting with President Trump and being able to present his vaccine-autism link evidence, he was discovered dead in his Falls Church, Virginia, home—with officials declaring his death to be of “natural causes” without an autopsy, and then cremating his body within 7 hours—and not one single American mainstream media news organization bothering to even write about his remarkable career in the service of mankind and the thousands of lives he saved.

This report concludes with a Foreign Intelligence Service (SVR) addendum “suggesting/alluding” that Dan Olmstead’s death is directly linked to the CIA due to this spy agencies links to giant pharmaceutical companies that he was investigating prior to his death in order to prove that autism was just the “tip of the iceberg” of a mass conspiracy to control peoples minds, and bodies, with drugs in order to keep them docile, or like the Lariam drug did, make them murderous.

 

Source: https://theinternationalreporter.org/2017/02/17/hollywood-icon-robert-de-niro-rushes-to-trump-after-cia-kills-top-autism-expert/

The Deep State Goes Shallow. “Reality-TV Coup d’etat in Prime Time”


Trump 3

“In irony a man annihilates what he posits within one and the same act; he leads us to believe in order not to be believed; he affirms to deny and denies to affirm; he creates a positive object but it has no being other than its nothingness.”— Jean-Paul Sartre

It is well known that the United States is infamous for engineering coups against democratically elected governments worldwide.  Voters’ preferences are considered beside the point.  Iran and Mosaddegh in 1953, Arbenz in Guatemala in 1954, Indonesia and Sukarno in 1965-7, Allende in Chile in 1973, to name a few from the relatively distant past.  Recently the Obama administration worked their handiwork in Honduras and Ukraine.  It would not be hyperbolic to say that overthrowing democratic governments is as American as apple pie. It’s our “democratic” tradition – like waging war.

What is less well known is that elements within the U.S. ruling power elites have also overthrown democratically elected governments in the United States.  One U.S. president, John F. Kennedy, was assassinated because he had turned toward peace and opposed the forces of war within his own government. He is the lone example of a president who therefore was opposed by all the forces of imperial conquest within the ruling elites.

Others, despite their backing for the elite deep state’s imperial wars, were taken out for various reasons by competing factions within the shadow government.  Nixon waged the war against Vietnam for so long on behalf of the military-industrial complex, but he was still taken down by the CIA, contrary to popular mythology about Watergate.  Jimmy Carter was front man for the Tri-Lateral Commission’s deep-state faction, but was removed by the group represented by George H. Bush, William Casey, and Reagan through their traitorous actions involving the Iran hostages.  The emcee for the neo-liberal agenda, Bill Clinton, was rendered politically impotent via the Lewinsky affair, a matter never fully investigated by any media.

Obama, CIA groomed, was smoothly moved into power by the faction that felt Bush needed to be succeeded by a slick smiling assassin who symbolized “diversity,” could speak well, and played hoops. Hit them with the right hand; hit them with the left. Same coin: Take your pick – heads or tails.  Hillary Clinton was expected to complete the trinity.

But surprises happen, and now we have Trump, who is suffering the same fate – albeit at an exponentially faster rate – as his predecessors that failed to follow the complete script. The day after his surprise election, the interlocking circles of power that run the show in sun and shadows – what C. Wright Mills long ago termed the Power Elite – met to overthrow him, or at least to render him more controllable.  These efforts, run out of interconnected power centers, including the liberal corporate legal boardrooms that were the backers of Obama and Hillary Clinton, had no compunction in planning the overthrow of a legally elected president.  Soon they were joined by their conservative conspirators in doing the necessary work of “democracy” – making certain that only one of their hand-picked and anointed henchmen was at the helm of state.  Of course, the intelligence agencies coordinated their efforts and their media scribes wrote the cover stories.  The pink Pussyhats took to the streets.  The deep state was working overtime.

Trump, probably never having expected to win and as shocked as most people when he did, made some crucial mistakes before the election and before taking office.  Some of those mistakes have continued since his inauguration.  Not his derogatory remarks about minorities, immigrants, or women.  Not his promise to cut corporate taxes, support energy companies, oppose strict environmental standards.  Not his slogan to “make America great again.”  Not his promise to build a “wall” along the Mexican border and make Mexico pay for it. Not his vow to deport immigrants.  Not his anti-Muslim pledges.   Not his insistence that NATO countries contribute more to NATO’s “defense” of their own countries.  Not even his crude rantings and Tweets and his hypersensitive defensiveness.  Not his reality-TV celebrity status, his eponymous golden tower and palatial hotels and sundry real estate holdings.  Not his orange hair and often comical and disturbing demeanor, accentuated by his off the cuff speaking style.  Surely not his massive wealth.

While much of this was viewed with dismay, it was generally acceptable to the power elites who transcend party lines and run the country.  Offensive to hysterical liberal Democrats and traditional Republicans, all this about Trump could be tolerated, if only he would cooperate on the key issue.

Trump’s fatal mistake was saying that he wanted to get along with Russia, that Putin was a good leader, and that he wanted to end the war against Syria and pull the U.S. back from foreign wars.  This was verboten.  And when he said nuclear war was absurd and would only result in nuclear conflagration, he had crossed the Rubicon.  That sealed his fate.  Misogyny, racism, support for Republican conservative positions on a host of issues – all fine.  Opposing foreign wars, especially with Russia – not fine.

Now we have a reality-TV president and a reality-TV coup d’etat in prime time.  Hidden in plain sight, the deep-state has gone shallow.  What was once covert is now overt. Once it was necessary to blame a coup on a secretive “crazy lone assassin,” Lee Harvey Oswald.  But in this “post-modern” society of the spectacle, the manifest is latent; the obvious, non-obvious; what you see you don’t see.  Everyone knows those reality-TV shows aren’t real, right?  It may seem like it is a coup against Trump in plain sight, but these shows are tricky, aren’t they?  He’s the TV guy.  He runs the show.  He’s the sorcerer’s apprentice.   He wants you to believe in the illusion of the obvious. He’s the master media manipulator. You see it but don’t believe it because you are so astute, while he is so blatant. He’s brought it upon himself.  He’s bringing himself down. Everyone who knows, knows that.

I am reminded of being in a movie theatre in 1998, watching The Truman Show, about a guy who slowly “discovers” that he has been living in the bubble of a television show his whole life.  At the end of the film he makes his “escape” through a door in the constructed dome that is the studio set.  The liberal audience in a very liberal town stood up and applauded Truman’s dash to freedom.  I was startled since I had never before heard an audience applaud in a movie theatre – and a standing ovation at that.  I wondered what they were applauding.  I quickly realized they were applauding themselves, their knowingness, their insider astuteness that Truman had finally caught on to what they already thought they knew.  Now he would be free like they were. They couldn’t be taken in; now he couldn’t. Except, of course, they were applauding an illusion, a film about being trapped in a reality-TV world, a world in which they stood in that theatre – their world, their frame. Frames within frames. Truman escapes from one fake frame into another – the movie. The joke was on them. The film had done its magic as its obvious content concealed its deeper truth: the spectator and the spectacle were wed. McLuhan was here right: the medium was the message.

This is what George Trow in 1980 called “the context of no context.”  Candor as concealment, truth as lies, knowingness as stupidity.  Making reality unreal in the service of an agenda that is so obvious it isn’t, even as the cognoscenti applaud themselves for being so smart and in the know.

The more we hear about “the deep state” and begin to grasp its definition, the more we will have descended down the rabbit hole.  Soon this “deep state” will be offering courses on what it is, how it operates, and why it must stay hidden while it “exposes” itself.

Right-wing pundit Bill Krystal tweets: “Obviously [I] prefer normal democratic and constitutional politics.  But if it comes to it, [I] prefer the deep state to Trump state.”

Liberal CIA critic and JFK assassination researcher, Jefferson Morley, after defining the deep state, writes, “With a docile Republican majority in Congress and a demoralized Democratic Party in opposition, the leaders of the Deep State are the most – perhaps the only – credible check in Washington on what Senator Bob Corker (R-Tenn.) calls Trump’s “wrecking ball presidency.”

These are men who ostensibly share different ideologies, yet agree, and state it publically, that the “deep state” should take out Trump.  Both believe, without evidence, that the Russians intervened to try to get Trump elected. Therefore, both no doubt feel justified in openly espousing a coup d’etat. They match Trump’s blatancy with their own.  Nothing deep about this.

Liberals and conservatives are now publically allied in demonizing Putin and Russia, and supporting a very dangerous military confrontation initiated by Obama and championed by the defeated Hillary Clinton.  In the past these opposed political factions accepted that they would rotate their titular leaders into and out of the White House, and whenever the need arose to depose one or the other, that business would be left to deep state forces to effect in secret and everyone would play dumb.

Now the game has changed.  It’s all “obvious.”  The deep state has seemingly gone shallow. Its supporters say so.  All the smart people can see what’s happening.  Even when what’s happening isn’t really happening.

“Only the shallow know themselves,” said Oscar Wilde.

Max Igan ~ The World According to Trump


Max Igan – Surviving the Matrix – Episode 283 – American Voice Radio, Febuary 3rd, 2017 – http://thecrowhouse.com
Support The Crowhouse: https://www.patreon.com/maxigan?ty=h
Bitcoin: 1NPsKQ2d23aWqqwqQ2qfgMv19XyMPmYh7K
https://steemit.com/@maxigan

Universal Law/sovereign law trumps all others.

1. No man or woman, in or out of government shall initiate force, threat of force or fraud against my life and property and, any and all contracts Im a party to not giving full disclosure to me whether signed by me or not are void at my discretion.

2. I may use force in self-defense against anyone that violates Law

3. There shall be no exceptions to Law 1 and 2.

When the tyrant has disposed of foreign enemies by conquest or treaty and there is nothing to fear from them, then he is always stirring up some war or other, in order that the people may require a leader. – Plato

“I would rather have questions that can’t be answered than answers that can’t be questioned.” – Richard Feynman

CIA Whistleblower Speaks Out About Climate Engineering, Vaccination Dangers, and 911


http://GeoengineeringWatch.org
TO READ OR POST COMMENTS ON THIS VIDEO, PLEASE GO DIRECTLY TO THE ARTICLE http://www.geoengineeringwatch.org/ci…
Kevin Shipp was a decorated CIA officer who refused to look the other way in regard to government criminality and cover-up. At a very important public awareness event that was recently held in Northern California, Mr. Shipp gave an extremely informative and compelling presentation on numerous horrific ongoing government crimes. The subjects Kevin Shipp addressed included climate engineering, the 911 false flag inside job, vaccination dangers/cover-up, and the governments total persecution of anyone who dares to tell the truth about rampant government tyranny.
The paradigm we have all known has been built on deception and the dark agendas of the global power structure. The courage Kevin Shipp has shown by doing his best to expose government criminality and tyranny serves as a stellar example to all of us. We desperately need other individuals in government agencies and the US military to follow Kevin’s lead . If we have any chance of stopping the completely out of control criminal cabal that currently runs our country and much of the world, we must all make our voices heard, we must all join the battle for the greater good.
https://www.facebook.com/dane.wigingt…

This video is also subtitled in Spanish.

New CIA Docs Reveal Black Budget “Project Star Gate” To Study “Supernatural” Abilities


cia-docs-thumb

The CIA has published online nearly 13 million pages of declassified records, including papers in reference to the secret ‘Star Gate’ telepathy project.

 

Jay Syrmopoulos, The Free Thought Project
Waking Times Media

The CIA has published online nearly 13 million pages of declassified records, including papers on the US role in overthrowing foreign governments, but some of the most mind blowing information is in reference to the secret ‘Star Gate’ telepathy project.

The details of CIA’s “Project Star Gate” are riveting, and expose uncharted waters to be researched as far as there is virtually no mainstream science or pop culture awareness of the phenomena exposed in the project – and is often ridiculed as the stuff of science fiction.

The revelations come as part of a massive almost 13 million file dump of declassified reports – that are now available on the internet for the first time.

 

Project Star Gate, was the code name for a CIA project that attempted to harness what until now has been thought of as “supernatural” or psychic abilities for military and intelligence use – noting in some of the documents that the method was “passive,” “inexpensive,” and that there was “no known defense.”

The papers show how the CIA was attempting to harness these abilities in individuals to spy on people and alter important objects, amongst other abilities.

One of the processes described, called “Psychoenergetics,” described a “mental process” where a person can “view,” “communicate,” or alter objects that are located in different space or time away from the subject. It also describes things such as remote viewing, where people can see objects that are located in another place, as well as telekenisis, which is the ability for someone to move objects they are not physically in contact with.

The declassified files suggest that CIA officials in charge of Project Stargate believed that they had some success utilizing and harnessing these amazing extrasensory abilities, but noted perceived limitations. Reports reveal that remote viewing was to only be used to collect information in conjunction with other methods, and that intelligence gained through remote viewing “should not stand alone.”

Project Stargate was officially concluded in in 1995, when the existence of the program was declassified, with the CIA reporting that it hadn’t proven useful enough and that previous results that seemed to show the veracity of telepathic powers had been doctored.

The length of time the project was acknowledged to be in existence, nearly 20 year, suggests that it the results of the project were promising enough to keep funding it to the tune of hundreds of millions of dollars over two decades. The idea that the program simply became public in 1995, and was ended after 20 years, is a naïve proposition. There is great likelihood that the program was simply rolled over into another Special Access Black Budget Program (SAPs) – meaning that all of the information and findings within these programs remains secret and unknown to the mainstream world.

For the CIA to receive million of dollars in funding, to study these phenomena, suggests there was a level of initial and continued success that precipitated the continued money flow and nearly two decades of research — something you wouldn’t do for a tech without serious potential and promise. The explanation that they studied these abilities for almost 20 years then decided they didn’t work and cancelled the program, while possible, doesn’t really sound very credible.

Note that the military industrial complex has keenly studied this technology, while mainstream science and academia steadfastly refuse to fund research into this area of study — going so far as to shun and ridicule any legitimate academic that would dare attempt research into this discipline as a pseudoscientist.

The fact that these numerous telepathic abilities have been so intimately studied by our own government, in secret, while the public has been allowed to believe these types of abilities are akin to the realm of fantasy raises a very interesting question; If these powers exist, as evidenced by the research, then why has their existence been withheld from the general public?

As modern research has explored the mind/matter relationship, we have come to understand that consciousness, or factors associated with consciousness, actually have an observable effects on what we call the material world. These effects can be so small they are not even distinguishable by the human eye, but do exist on a quantum level.


This article (New CIA Docs Reveal Black Budget “Project Star Gate” To Study “Supernatural” Abilities) was originally created and published by The Free Thought Project and is re-posted here with permission. 

http://wakingtimesmedia.com/new-cia-docs-reveal-black-budget-project-star-gate-study-supernatural-abilities/?utm_source=Waking+Times+Newsletter&utm_campaign=49b0b46dec-RSS_EMAIL_CAMPAIGN&utm_medium=email&utm_term=0_25f1e048c1-49b0b46dec-24909009

James Gilliland on the As You Wish Talk Radio, 7.1.2017


As You Wish Talk Radio with James Gilliland and guest, Erica Luke. They discuss UFO anomalies, airplane pilot sightings, and strange events in and around Utah.

*Video created by me. Content belongs to James Gilliland, As you wish talk radio and the great artists who took part in all aspects of it. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.*

For more information have a look here:
– ECETI.org

Endgame Part II: The Antarctic Atlantis & Ancient Alien Ruins – Narrated by David Wilcock ~ SphereBeing Alliance


Narrated by David Wilcock
Video Produced for SBA by Emma Gold
Have recent discoveries of a “Pompeii on Ice” in Antarctica just proven the existence of Atlantis? Ancient Alien Ruins have been secretly excavated and the Elite are going on tours. Please read our latest update on the recent Intelligence surrounding this and other mysteries. David Wilcock and Corey Goode released a joint article that covers this suppressed discovery as well as other related topics.

Narrated by David Wilcock – DivineCosmos.com

Endgame Part II: The Antarctic Atlantis and Ancient Alien Ruins. – http://spherebeingalliance.com/blog/e…

ENDGAME I: Disclosure and the Final Defeat of the Cabal – http://divinecosmos.com/index.php/sta…

Previous Intel Update from Corey Goode:
Are We Navigating To Our Optimal Temporal Reality? – http://spherebeingalliance.com/blog/a…

Learn more of Corey’s experiences with 70+ episodes of “Cosmic Disclosure”, hosted by David Wilcock:
http://www.gaia.com/coreygoode
Watch the 1st EPISODE FREE! http://www.gaia.com/cosmic1
And the 2nd, too! http://www.gaia.com/cosmic2

Identified as an intuitive empath (IE), Corey Goode was recruited through one of the MILAB programs at the young age of six. (MILAB is a term coined for the military abduction of a person that indoctrinates and trains them for any number of military black ops programs.) Goode trained and served in the MILABprogram from 1976-1986/87. Toward the end of his time at MILAB he was assigned to fill an IE support role for a rotating Earth Delegate Seat (shared by secret earth government groups) in a “human-type” ET SuperFederation Council.

More from Corey Goode:
http://www.spherebeingalliance.com/
http://www.BlueAvians.com

#spherebeingalliance #cosmicdisclosure #goodevlog

Connect with Corey on,
Facebook: https://www.facebook.com/BlueAvians
YouTube: http://bit.ly/SphereBeingYouTube
Twitter: https://twitter.com/blueavians

Stay in direct touch with everything: http://bit.ly/CoreyGoodeNewsletter

FREE EPISODES on Gaia:
http://www.gaia.com/cosmic1
http://www.gaia.com/cosmic2
http://www.gaia.com/cosmic5

DOUGLAS DIETRICH – RE WORLD SCENE – OCCULT & HUMAN HISTORY Project Camelot


I will be talking with Douglas Dietrich about the occult backdrop to the death of Max Spiers and what’s going on in the global political scene. Douglas is an internationally recognized Military Historian and investigator who spent years working at the San Francisco PRESIDIO as a research librarian for the Dept. of Defense.

SHORT BIO:

Douglas Duane Dietrich is a Naturalized American Citizen, born the son of a Caucasian American Sailor, George Joseph Henry Dietrich (b.1919–d.2007) in the Nationalist R.O.C. (Republic of China), as Reestablished on The Island of Formosa (Taiwan). His father retired from the U.S. Navy after thirty years of Duty covering Gunboat Patrol in the twilight years of Warlord China (circa 1936–1941); the proactive phase of American belligerency in World War II (circa 1941–1945); through The Korean Conflict (circa 1951–1953 and well into the establishment of American involvement in The Vietnam Counter-insurgency (circa 1961–1966; George Joseph Henry Dietrich ultimately sported no less than a dozen medals on the uniform at the time of his burial.

Douglas was Department of Defense research librarian for a decade, responsible for incinerating highly classified materials on critical historical topics such as Pearl Harbor, Roswell, Vietnam, the different ethno-national holocausts, as well as documents exposing the reality behind vampires, zombies, Soviet psychic warfare, and other occult phenomena. Volumes of notes pertaining to Tesla, H.P. Lovecraft, L. Ron Hubbard, the Vatican and United Nations were destroyed, along with reams of reports detailing everything from military drug operations to CIA mind control. Records plundered from both allied and enemy governments articulated the hidden objectives of modern mass movements such as Nazism, Zionism, Islamicism, and other ideologies. Douglas’ post was the San Francisco Presidio, which was seething with Satanism, child abuse, and controversial human medical experimentation. An abortive assassination plot on presidential candidate Bill Clinton was even organized. Since base closure, Douglas’ technical background in military reference has led to startling professional insights into geopolitics, the current demographic apocalypse, and the Medical-Industrial Complex’s thanatizing our future. Deceptions unleashed generations ago by American elites have warped our perception of reality. “Now is the time for total disclosure.” — Douglas Dietrich

Richard Alan Miller – ESP Induction Through Forms of Self-Hypnosis on Provocative Enlightenment


Published on Oct 18, 2015

Dr. Richard Alan Miller is a pioneer in the annals of metaphysical and paranormal exploration. Miller began working in the “X-Files” world of Navy Intel (Seal Corp. and then MRU) in the late 60s. His public collaborations and research continue. As an original black ops team-member, Miller’s research in the field of paranormal began as a graduate physicist working 11 years with Navy Intel (Anesthesiology). During this period numerous foundational papers, including “A Holographic Concept of Reality” and “Embryonic Holography” were written.

POKEMON GO — CIA Elite Brainwashing; Skyaia Show #92 Aug 1 2016


Humanity is on a divergent track, one in which the masses are being purposefully diverted from their natural path of evolution in consciousness! Pokemon Go is a huge upgrade to intensifying the electronic Orwellian surveillance system of the CIA, NSA, and elite partners.

Max Igan – Free Your Mind Conference – 2016


Max Igan speaking at the 2016 Free Your Mind Conference. This was my first ever appearance in the United States, delivered directly on arriving in Philadelphia after 46 hours travel and 59 hours awake.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

2012 The Awakening is supported by donations and the generosity of readers who honor the “energetic exchange for value” principle. If you find value in the material posted here and are financially comfortable, will you consider pledging a small monthly sum to help keep this blog afloat? Currently I’m falling behind on my bills, have run up against unexpected expenses and am really struggling to make ends meet, so even the smallest donation are highly valued, appreciated and will go a long way toward helping. 

You can also lend your support by purchasing goods thru the merchant affiliate programs links provided below.

Also, I’d like to thank subscribers and everyone who’s ever donated in the past, to express my gratitude for your generosity, thoughtfulness & support!

Mahalo nui, Annette

If links are dead, please contact me at { ascendingstarseed at gmail dot com }.

AFFILIATE PROGRAMS

SD Bullion

  • Friday, June 30 Silver Prices Burst Through Critical Resistance
    Jumping Nearly 7%
  • Up over $2 in Two Days
  • Just Pennies From $20/oz
  • Buy silver rounds for 49cents over spot while sale and supply’s lasts

Learn more here: Get the best deals on clearance items while supplies last at SDBullion.com!

NuMANNA The Industry Standard in Storable Food:

  • Standard Buckets are GMO-Free
  • Contain no: Aspartame, High Fructose Corn Syrup, Autolyzed Yeast Extract, Chemical Preservatives or Soy.
  • No Gluten Buckets contain no Wheat ingredients.

Learn more here: numanna.com/awakening

 

AquaNui Home Water Distillers

  • AquaNui home water distillers are made for the family who wants to drink the purest water available.
  • With over 45 years of experience, we offer the best counter-top water distiller around.
  • Your AquaNui distiller for water will protect you and your family from harmful contaminants like arsenic, chlorine, lead, mercury, pesticides and nitrates. In addition to that, it removes bacteria, viruses and any biologicals.

www.MyAquaNui.com
Water Made Wonderful

The Droplet Blog

 

90,000 Secret CIA Files on Telepathy, Clairvoyance and MK-ULTRA Public


Found @ Stillness in the Storm

by Heathcliff
Tens of thousands of secret CIA files were made public after years of wrangling. These include more than 12,000 documents about the Stargate program, a research into remote viewing, which the intelligence service secretly conducted.

In the early seventies, the CIAsupported a program to examine a form of extrasensory perception called remote viewing utility could be useful for intelligence gathering.

US military intelligence service DIA labeled this program the Stargate. They tried to figure out what other countries did on clairvoyance. In addition, research was done to clairvoyance and psychics were used by the government.

 
Related CIA is Funding Companies that Specialize in Social Media Spying

Clairvoyance Clearly Demonstrated

The Psychics were educated on remote viewing, precognition (seeing the future) and telepathy. They had to include information on targets that could not be approached in a conventional manner.

Para Psychologist and Professor Jessica Utts of the University of California – Irvine concluded after her review of the project that clairvoyance was clearly demonstrated.

Related Disclosure: Bases 6 – Controlled Remote Viewing – Briefing by Paul O’Connor (Video) 

The study suggested according to her clairvoyance works just like our other five senses, namely by observing change. It is possible that clairvoyance is a sort of sensing the future to find significant changes, much like our eyes scan the area for visual change, says Utts.

“It makes little sense to continue with experiments designed to provide evidence, as there is little more can be offered to anyone who refuses to accept the current data,” the professor further said. You can download the files about the secret program Stargate here or view themhere.

 
 
MK-ULTRA

There are also many thousands of documents released on MK-ULTRA. In the fifties, the CIA secretly experimented on unwitting subjects with the aim of finding a way to brainwash people.

In 1974, the New York Times reported that the CIA between 1953 and 1963, and possibly longer, conducted under the headings Artichoke and MK-ULTRA had experimented on unsuspecting people. The newspaper discovered that the CIA developed brainwashing methods.

The then head of the CIA, Richard Helms, had the scandal already provided in 1973 and then burned all the evidence. A stack of documents, however, was misfiled and was found intact.

MK-ULTRA had branches in more than 150 sub-projects with experiments in more than 80 hospitals and universities. The documents on this secret program can be downloaded here or if you want to view them piece by piece click here. All together is about 90,000 documents.

On crowdfunding site Kickstarter there is launched a project to get the nearly 13 million pages of CIA documents public, that are currently still secret.

Related Declassified Documents Disclose CIA Mind Control Programs

Related Understanding Mind Control | The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave by Fritz Springmeier and Cisco Wheeler

View: Stargate Documents
View: MK-ULTRA Documents

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

2012 The Awakening is supported by donations and the generosity of readers who honor the “energetic exchange for value” principle. If you find value in the material posted here and are financially comfortable, will you consider pledging a small monthly sum to help keep this blog afloat? Currently I’m falling behind on my bills, have run up against unexpected expenses and am really struggling to make ends meet, so even the smallest donation are highly valued, appreciated and will go a long way toward helping. 

You can also lend your support by purchasing goods thru the merchant affiliate programs links provided below.

Also, I’d like to thank subscribers and everyone who’s ever donated in the past, to express my gratitude for your generosity, thoughtfulness & support!

Mahalo nui, Annette

If links are dead, please contact me at { ascendingstarseed at gmail dot com }.

AFFILIATE PROGRAMS

SD Bullion

  • Friday, June 30 Silver Prices Burst Through Critical Resistance
    Jumping Nearly 7%
  • Up over $2 in Two Days
  • Just Pennies From $20/oz
  • Buy silver rounds for 49cents over spot while sale and supply’s lasts

Learn more here: Get the best deals on clearance items while supplies last at SDBullion.com!

NuMANNA The Industry Standard in Storable Food:

  • Standard Buckets are GMO-Free
  • Contain no: Aspartame, High Fructose Corn Syrup, Autolyzed Yeast Extract, Chemical Preservatives or Soy.
  • No Gluten Buckets contain no Wheat ingredients.

Learn more here: numanna.com/awakening

 

AquaNui Home Water Distillers

  • AquaNui home water distillers are made for the family who wants to drink the purest water available.
  • With over 45 years of experience, we offer the best counter-top water distiller around.
  • Your AquaNui distiller for water will protect you and your family from harmful contaminants like arsenic, chlorine, lead, mercury, pesticides and nitrates. In addition to that, it removes bacteria, viruses and any biologicals.

www.MyAquaNui.com
Water Made Wonderful

The Droplet Blog