The Truth: Nevada Indictments (not!)


 

 

Note: Wow! This lady does her homework! I’ve been smelling rats in the woodpile on some of this indictment stuff…saw the alleged Nevada indictments  doc yesterday and noticed that it wasn’t signed, had no seal, the language that wasn’t legaleaze et al. Denise knocks this one out of the ball park!
While it appears things are going down, we have to be very careful to avoid all the disinformation and hype circulating the alternative. We’re in treacherous, deep state waters, extreme discernment is advised. Nothing is ever as it seems behind the Wizards Curtain, hopefully what we’re witnessing is the curtains being town down on the Grand Illusion and the bad actors are being escorted off the stage.
Reading suppressed news (?!?) from original documents in Nevada filed Dec. 22, 2017. (Original FALSE documents, that is, designed to embarrass and discredit the gullible, being promoted by liars.)
Truth starts here.
~~~~~ Discussion of tactics being used against US citizens: https://youtu.be/8Tdkawt5FNU
~~~~~ Truth found here: https://youtu.be/ASbxCV_phgs
Article about Nevada “unsealed indictments” that started the fake-news: http://m.beforeitsnews.com/alternativ…
Site that published pdf: https://docdroid.net/zmVDhA4
Military source for meme warfare info: https://publicaccess.dtic.mil/psm/api…
Meme Warfare (related to LARP) https://youtu.be/KEzm5CjFzNE
~~~~~~~~ A livestream from Quinn’s hospital room: https://youtu.be/42UmICCHej0 ~~~~~~ Quinn’s hospital fundraising, his own channels: https://paypal.me/rahulaclub https://patreon.com/rahulaclub
~~~~~ Quinn and Jason showing the cryptomining machines just before Quinn’s spontaneous lung collapse: https://youtu.be/E6e4HvOdDIY
Quinn’s video Q=Tyler https://youtu.be/eGPjk2Y2sKg
~~~~~~~~ My playlists *as each series goes on, later uploads are available only through the playlists* When The Dam Breaks: True Story Of Tiffany Jenks: https://www.youtube.com/playlist?list…
Satanic Cult History (true story of the rise of the Clinton Cult told through journals and letters): https://www.youtube.com/playlist?list… T
The Abomination That Causes Desolation: Art Today: https://www.youtube.com/playlist?list… Truth Convoy: https://www.youtube.com/playlist?list…
~~~~~~~ DRAIN THE SWAMP song https://youtu.be/hZ9yypf7eqQ My funding source: January goal is 1 donation of $50, 5 donations of $20, 10 donations of $10 towards 2017-18 goal of $2,500 ($1360 so far TY) https://gofundme.com/new-computer-pod… Thank you to all my supporters!
Advertisements

US CUSTOMS & BORDER PROTECTION SHUTDOWN- JFK, LAX EFFECTED….. TRAVEL TRAVESTY | IRAN EXODUS ~ Anti-School


 

 

Fishy stuff going on all around the world re: airplanes. #TheStorm

Support me! http://PayPal.me/desirousclothingco http://Patreon.com/antischool Litecoin wallet LP2nxrDvMD9zxoVWrpnaG6xBabshhJAUYD Bitcoin wallet 16um11zTTuitMhgkNo1xJoEhEjZHUFn1Rm Ethereum wallet 0xBf579f55d4D262c99B92fad7ACD87a33eDa3A4f6

https://www.washingtonpost.com/news/a…

http://abc7.com/travel/tokyo-bound-fl…

https://www.macfound.org/press/press-…

https://www.snopes.com/has-tony-podes…

https://www.macfound.org/about/people…

http://www.nydailynews.com/entertainm…

ROBERT DAVID STEELE INTERVIEW ON PODESTA BROS: https://www.youtube.com/watch?v=Pi3dc…

CONAN SKETCH ON EATING BABIES: https://www.youtube.com/watch?v=buqD8…

REDDIT: https://www.reddit.com/r/CBTS_Stream/

EXECUTIVE ORDER: https://www.whitehouse.gov/presidenti…

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations


 

 

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on fourclassifiedGCHQdocuments presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

Documents referenced in this article:

Source URL: https://theintercept.com/2014/02/24/jtrig-manipulation/

Coast To Coast AM – November 21, 2017 UFOs & JFK with Linda Moulton Howe


 

 

In the first hour, UFO researcher and experiencer Darryl Anka discussed two UFO sightings that he says led to his channeling of the extraterrestrial entity known as ‘’Bashar.” Investigative reporter Linda Moulton Howe of Earthfiles discussed the release of JFK records. She described the background of the CIA head Allen Dulles, who was fired by Kennedy in November of 1961. She said that Dulles was also the head of the secretive MJ-12 group, which reportedly had control of all UFO information, including public disinformation as well as back-engineering of captured alien technology.

Coast To Coast AM – November 21, 2017 UFOs & JFK with Linda Moulton Howe

Trump Saw A Disturbing Video, Then He Shut Down The CIA’s Covert Syria Program ~ ZeroHedge


 

Tyler Durden's picture

While we’ve carefully documented the dynamics in play behind Trump’s decision to end the CIA’s covert Syria program, as well as the corresponding fury this immediately unleashed among the usual hawkish DC policy wonks, new information on what specifically impacted the president’s thinking has emerged.

Thomas Joscelyn, a Middle East analyst for the Foundation for Defense of Democracies, explains in the August edition of The Weekly Standard:

Earlier this year, President Donald Trump was shown a disturbing video of Syrian rebels beheading a child near the city of Aleppo. It had caused a minor stir in the press as the fighters belonged to the Nour al-Din al-Zenki Movement, a group that had been supported by the CIA as part of its rebel aid program.

 

The footage is haunting. Five bearded men smirk as they surround a boy in the back of a pickup truck. One of them holds the boy’s head with a tight grip on his hair while another mockingly slaps his face. Then, one of them uses a knife to saw the child’s head off and holds it up in the air like a trophy. It is a scene reminiscent of the Islamic State’s snuff videos, except this wasn’t the work of Abu Bakr al-Baghdadi’s men. The murderers were supposed to be the good guys: our allies.

Trump pressed his most senior intelligence advisers, asking the basic question of how the CIA could have a relationship with a group that beheads a child and then uploads the video to the internet. He wasn’t satisfied with any of the responses:

Trump wanted to know why the United States had backed Zenki if its members are extremists. The issue was discussed at length with senior intelligence officials, and no good answers were forthcoming, according to people familiar with the conversations. After learning more worrisome details about the CIA’s ghost war in Syria—including that U.S.-backed rebels had often fought alongside extremists, among them al Qaeda’s arm in the country—the president decided to end the program altogether.


Screenshot of the horrific video of a CIA-backed Syrian group beheading a boy named Abdullah Issa.

At the time the beheading video surfaced (July 2016), many in the American public naturally wanted answers, but the story never really picked up much momentum in the media. As Joscelyn describes, it caused nothing more than “a minor stir in the press.” The State Department seemed merely satisfied that the group responsible, Harakat Nour al-Din al-Zenki, claimed to have arrested the men that committed the gruesome crime, though nothing more was known. Absurdly, a US government spokesperson expressed hope that the child-beheading group would “comply with obligations under the law of armed conflict.”

The only press agencies that publicly and consistently challenged the State Department at the time were RT News and the Associated Press, yet even these attempts didn’t get picked up beyond the confines of the State Department’s daily briefing. When the AP’s Matt Lee initially questioned spokesman Mark Toner as to whether Zenki would continue to receive any level of US assistance, Toner casually replied “it would give us pause” – which left Lee taken aback.

Meanwhile, it wasn’t just the US government which had aided Zenki, but as fighting in Aleppo raged it became a favored group among both the mainstream media and prominent think tank pundits. One of the UK’s major broadcasters (Channel 4) even went so far as to attempt to delete and hide its prior online content which sought to normalize the beheaders as “moderate” and heroic once news of the video got out.

Among think tankers, Zenki’s most prominent public supporter, frequently presenting the terror group as actually representative of Syria’s “secular” and supposedly democracy-promoting armed opposition (even after the beheading video emerged), was Charles Lister. Lister was finally confronted not by mainstream media, but by AlterNet’s Max Blumenthal at a DC event held by the (largely Gulf funded) Atlantic Council.

Only by the time of this January 2017 public forum, and after being persistently questioned, did Lister awkwardly back off his previous enthusiastic promotion of Zenki:

We can imagine that Trump saw other things beyond the shocking Zenki beheading video which made him fully realize the utter criminality of the CIA program (Thomas Joscelyn further emphasizes that Trump came to understand the full scope of CIA cooperation with al-Qaeda in Syria).

The only question that remains is who in the CIA or Obama-era State Department should be prosecuted first?

 

http://www.zerohedge.com/news/2017-07-31/trump-saw-disturbing-video-then-he-shut-down-cias-covert-syria-program

The Saudi Purge is a Global Crisis ~ James Corbett


 

 

The House of Saud is in crisis as MBS consolidates his hold on the kingdom and prepares to transform Saudi Arabia in his image. But what is behind the purge, and how does it relate to the future of the world monetary system. Join James for a classic Corbett Report debriefing on the Saudi purge and the rise of the petroyuan.

SHOW NOTES AND MP3: https://www.corbettreport.com/?p=25008

Tom DeLonge Opens UFO Investigation Company? – To The Stars Academy


 

 

UFO Seekers received unending questions about Tom DeLonge’s supposed UFO Investigation Company, To the Stars Academy. George Knapp announced that that Tom DeLonge’s brand new company was completed dedicated to researching and investigating UFOs which sent the UFO community into an uproar. We decided to source the George Knapp story, yet could not find any evidence whatsoever to back up Knapp’s announcement made on TV. We also received questions about investing in To The Stars Academy, so we dig into the SEC Filings and financials. What we find, is crazy!

http://www.ToTheStarsAcademy.com http://www.ToTheStars.media

To The Stars Academy SEC FILING: https://www.sec.gov/Archives/edgar/da…

CORPORATION WIKI: https://www.corporationwiki.com/Calif…

Links to news stories in video:

http://www.lasvegasnow.com/news/i-tea…

http://www.openminds.tv/tom-delonges-…

http://www.fox5vegas.com/story/365772…

ABOUT US: UFO Investigators in the field sky-watching 365 days a year. UFO Seekers investigates UFO sightings, aliens, black projects, and military installations in an attempt to document UFO evidence. Our exclusive content is posted through this YouTube channel. We publish 100% unique content filmed by us. We are 100% self-funded. No actors, no film crew, no re-takes, and no setup scenarios. Tim Doyle – Investigator Tracey Sue – Researcher Submit your UFO SIGHTING video/pictures: http://ufoseekers.com/submit Visit our website to see more: WEBSITE: http://www.ufoseekers.com OFFICIAL STORE: http://www.ufoseekers.com/shop

Ole Dammegard | The Vegas Shooting: Inconsistencies & Strange Symbolism


In a rush this week, we have Ole Dammegard back to break down the latest tragedy, the Route 91 Harvest Festival shooting. Of course, because of Ole’s continued work dissecting false flags and terror events, he is one of the first to recognize elements at play that seem to follow the same template – a template that suggests these are highly planned and coordinated events, rather than the work of random, unmotivated, lone attackers. Our deepest sympathies to anyone who has experienced pain and loss due to such an event. To me, digging deeper into things that seem suspicious and inconsistent with media reports, is the best and most honorable thing we can do, short of going back in time. I know if I died in one of these situations, the last thing I’d want is for it to be a false flag situation that isn’t properly investigated. That said, what you’re getting here is a conversation about elements that don’t seem to add up, or contain strange symbolism/foreshadowing. We also discuss the major alternative theories and motivations. This is largely a synthesis of what we’re seeing so far, all alleged, and not everything can be fully vetted at this time. All we can do is examine it, and try our best to seek the truth. This isn’t fear porn. This isn’t capitalizing on a tragedy. Ole’s website: https://www.lightonconspiracies.com/

On internet privacy, be very afraid


‘Surveillance is the business model of the internet,’ Berkman and Belfer fellow says

August 24, 2017
071117_Schneier_2835_605

In the internet era, consumers seem increasingly resigned to giving up fundamental aspects of their privacy for convenience in using their phones and computers, and have grudgingly accepted that being monitored by corporations and even governments is just a fact of modern life.

In fact, internet users in the United States have fewer privacy protections than those in other countries. In April, Congress voted to allow internet service providers to collect and sell their customers’ browsing data. By contrast, the European Union hit Google this summer with a $2.7 billion antitrust fine.

To assess the internet landscape, the Gazette interviewed cybersecurity expert Bruce Schneier, a fellow with the Berkman Klein Center for Internet & Society and the Belfer Center for Science and International Affairs at Harvard Kennedy School. Schneier talked about government and corporate surveillance, and about what concerned users can do to protect their privacy.

GAZETTE: After whistleblower Edward Snowden’s revelations concerning the National Security Agency’s (NSA) mass surveillance operation in 2013, how much has the government landscape in this field changed?

SCHNEIER: Snowden’s revelations made people aware of what was happening, but little changed as a result. The USA Freedom Act resulted in some minor changes in one particular government data-collection program. The NSA’s data collection hasn’t changed; the laws limiting what the NSA can do haven’t changed; the technology that permits them to do it hasn’t changed. It’s pretty much the same.

GAZETTE: Should consumers be alarmed by this?

SCHNEIER: People should be alarmed, both as consumers and as citizens. But today, what we care about is very dependent on what is in the news at the moment, and right now surveillance is not in the news. It was not an issue in the 2016 election, and by and large isn’t something that legislators are willing to make a stand on. Snowden told his story, Congress passed a new law in response, and people moved on.

Graphic by Rebecca Coleman/Harvard Staff

GAZETTE: What about corporate surveillance? How pervasive is it?

SCHNEIER: Surveillance is the business model of the internet. Everyone is under constant surveillance by many companies, ranging from social networks like Facebook to cellphone providers. This data is collected, compiled, analyzed, and used to try to sell us stuff. Personalized advertising is how these companies make money, and is why so much of the internet is free to users. We’re the product, not the customer.

GAZETTE: Should they be stopped?

SCHNEIER: That’s a philosophical question. Personally, I think that in many cases the answer is yes. It’s a question of how much manipulation we allow in our society. Right now, the answer is basically anything goes. It wasn’t always this way. In the 1970s, Congress passed a law to make a particular form of subliminal advertising illegal because it was believed to be morally wrong. That advertising technique is child’s play compared to the kind of personalized manipulation that companies do today. The legal question is whether this kind of cyber-manipulation is an unfair and deceptive business practice, and, if so, can the Federal Trade Commission step in and prohibit a lot of these practices.

GAZETTE: Why doesn’t the commission do that? Why is this intrusion happening, and nobody does anything about it?

SCHNEIER: We’re living in a world of low government effectiveness, and there the prevailing neo-liberal idea is that companies should be free to do what they want. Our system is optimized for companies that do everything that is legal to maximize profits, with little nod to morality. Shoshana Zuboff, professor at the Harvard Business School, invented the term “surveillance capitalism” to describe what’s happening. It’s very profitable, and it feeds off the natural property of computers to produce data about what they are doing. For example, cellphones need to know where everyone is so they can deliver phone calls. As a result, they are ubiquitous surveillance devices beyond the wildest dreams of Cold War East Germany.

GAZETTE: But Google and Facebook face more restrictions in Europe than in the United States. Why is that?

SCHNEIER: Europe has more stringent privacy regulations than the United States. In general, Americans tend to mistrust government and trust corporations. Europeans tend to trust government and mistrust corporations. The result is that there are more controls over government surveillance in the U.S. than in Europe. On the other hand, Europe constrains its corporations to a much greater degree than the U.S. does. U.S. law has a hands-off way of treating internet companies. Computerized systems, for example, are exempt from many normal product-liability laws. This was originally done out of the fear of stifling innovation.

“Google knows quite a lot about all of us. No one ever lies to a search engine. I used to say that Google knows more about me than my wife does, but that doesn’t go far enough. Google knows me even better, because Google has perfect memory in a way that people don’t.”
               —Bruce Schneier,cybersecurity expert

GAZETTE: It seems that U.S. customers are resigned to the idea of giving up their privacy in exchange for using Google and Facebook for free. What’s your view on this?

SCHNEIER: The survey data is mixed. Consumers are concerned about their privacy and don’t like companies knowing their intimate secrets. But they feel powerless and are often resigned to the privacy invasions because they don’t have any real choice. People need to own credit cards, carry cellphones, and have email addresses and social media accounts. That’s what it takes to be a fully functioning human being in the early 21st century. This is why we need the government to step in.

GAZETTE: You’re one of the most well-known cybersecurity experts in the world. What do you do to protect your privacy online?

SCHNEIER: I don’t have any secret techniques. I do the same things everyone else does, and I make the same tradeoffs that everybody else does. I bank online. I shop online. I carry a cellphone, and it’s always turned on. I use credit cards and have airline frequent flier accounts. Perhaps the weirdest thing about my internet behavior is that I’m not on any social media platforms. That might make me a freak, but honestly it’s good for my productivity. In general, security experts aren’t paranoid; we just have a better understanding of the trade-offs we’re doing. Like everybody else, we regularly give up privacy for convenience. We just do it knowingly and consciously.

GAZETTE: What else do you do to protect your privacy online? Do you use encryption for your email?

SCHNEIER: I have come to the conclusion that email is fundamentally insecurable. If I want to have a secure online conversation, I use an encrypted chat application like Signal. By and large, email security is out of our control. For example, I don’t use Gmail because I don’t want Google having all my email. But last time I checked, Google has half of my email because you all use Gmail.

GAZETTE: What does Google know about you?

SCHNEIER: Google’s not saying because they know it would freak people out. But think about it, Google knows quite a lot about all of us. No one ever lies to a search engine. I used to say that Google knows more about me than my wife does, but that doesn’t go far enough. Google knows me even better, because Google has perfect memory in a way that people don’t.

GAZETTE: Is Google the “Big Brother?”

SCHNEIER: “Big Brother” in the Orwellian sense meant big government. That’s not Google, and that’s not even the NSA. What we have is many “Little Brothers”: Google, Facebook, Verizon, etc. They have enormous amounts of data on everybody, and they want to monetize it. They don’t want to respect your privacy.

GAZETTE: In your book “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World,” you recommend a few strategies for people to protect their privacy online. Which one is the most effective?

SCHNEIER: Unfortunately, we live in a world where most of our data is out of our control. It’s in the cloud, stored by companies that may not have our best interests at heart. So, while there are technical strategies people can employ to protect their privacy, they’re mostly around the edges. The best recommendation I have for people is to get involved in the political process. The best thing we can do as consumers and citizens is to make this a political issue. Force our legislators to change the rules.

Opting out doesn’t work. It’s nonsense to tell people not to carry a credit card or not to have an email address. And “buyer beware” is putting too much onus on the individual. People don’t test their food for pathogens or their airlines for safety. The government does it. But the government has failed in protecting consumers from internet companies and social media giants. But this will come around. The only effective way to control big corporations is through big government. My hope is that technologists also get involved in the political process — in government, in think-tanks, universities, and so on. That’s where the real change will happen. I tend to be short-term pessimistic and long-term optimistic. I don’t think this will do society in. This is not the first time we’ve seen technological changes that threaten to undermine society, and it won’t be the last.

This interview has been edited for length and clarity.

 

https://news.harvard.edu/gazette/story/2017/08/when-it-comes-to-internet-privacy-be-very-afraid-analyst-suggests/

Max Igan: Why We Are Seeing So Much Chaos in the World


Max Igan – Surviving the Matrix – Episode 297 – American Voice Radio, June 16th, 2017 – http://thecrowhouse.com
Support The Crowhouse: https://www.patreon.com/maxigan?ty=h
Bitcoin: 1NPsKQ2d23aWqqwqQ2qfgMv19XyMPmYh7K
https://steemit.com/@maxigan

Liz Crokin Interview
https://www.youtube.com/watch?v=hQVlK…

Cherry Blossom: How the CIA can hack into your internet router


Sputnik

© Pixabay

Wi-Fi routers typically sit in dusty corners of homes and offices, quietly transmitting internet accessibility to computers, tablets and phones in its immediate vicinity. However, these unpretentious devices are a goldmine for hackers – and were specifically targeted by the US Central Intelligence Agency, the latest Wikileaks release has revealed.

The release is the latest instalment of Wikileaks’ “Vault7” series, which the group has been drip-feeding to the public since March. Previous trickles have revealed CIA attempts to hack office computers, televisions and phones, among many other shock exposures.

This time, the documents contain detailed information on the CIA’s router hacking “toolkit” — and how the Agency sought to leverage common vulnerabilities in routers sold by companies such as D-Link and Linksys. The techniques range from hacking network passwords to rewriting device firmware to remotely monitor traffic flowing across a target’s network.

While few may have stopped to consider a router’s attractiveness to a hacker, in truth the devices are an obviously attractive entry point — routers typically aren’t equipped with interfaces beyond on/off and reset buttons, and have no means of alerting users they have been compromised.

A router could be hacked for years, with a user’s every online action tracked and recorded, without anyone being any the wiser.

The CIA’s router-hacking approach begins with a tool — “Claymore” — which scans a network to identify devices and then launches two exploiters — “Tomato” and “Surfside” — the former is noted to target vulnerabilities in at least two routers sold by D-Link and Linksys, and steals those devices’ administrative passwords. Moreover, the documents state at least two other routers sold by Linksys could be targeted with “Tomato” after a mere few weeks of development.

“Surfside” is left largely unexplained, though the documents hint it may abuse a protocol called Universal Plug and Play. Oft dubbed UPNP, and embedded in around 7,000 different devices — including routers, printers, media players and smart TVs — tech security experts have long-warned it poses a potential risk.

As the documents date back to early 2016, it’s unclear whether D-Link or Linksys have identified and/or rectified these vulnerabilities — however, routers are difficult to manually update, and given their ubiquity, providers are reluctant to dispatch professional staff to do so, instead obliging consumers to do so themselves. Any vulnerability in a router can be left to smolder for years before correction, if at all — and the aforementioned lack of a “warning” system alerting users to threats, ala antivirus software, means users may never discover if their device is vulnerable.

Another means of access mentioned in the papers is the failure of users to change default admin passwords — often, individuals are simply unaware there is an admin password, and it can be amended. This likewise offers unbridled access to the contents of an individual’s router — after access, a hacker or CIA agent could then install custom firmware (the CIA’s is called Flytrap) on the router monitor a target’s browsing, strip SSL encryption from webpages visited, and even inject other exploits into their traffic, designed to offer access directly to the target’s PC or phone. Yet another piece of software, CherryTree, serves as a command-and-control system, allowing operators to monitor and update infected network devices from a browser-based interface called CherryWeb.

Nonetheless, while acknowledging the exposures are “alarming,” Matthew Hickey, Founder of Hacker House, isn’t shocked the CIA would target routers.

“The information security community has been warning about this risk since 2005, if not before. Still, while technically adept users likely won’t be impacted by the technique, it does potentially mean the CIA can access millions of web histories — and there’s the prospect of it easily being misused and abused in surveillance operations. The only Godsend is the CIA wouldn’t be able to do this remotely or in bulk — they need to be in the nearby vicinity of a router network to access it, from a car or van or similar,” Mr. Hickey told Sputnik.

Ultimately, given the evident insecurities ingrained in average Wi-Fi routers, it’s perhaps unsurprising the world’s most well-financed spying group has exploited them — and maybe still does. Wikileaks’ latest revelations serve as a palpable reminder to net users to update their routers regularly, and change their default admin passwords. Otherwise, potentially no private, internet-equipped home is safe from US surveillance.

INFILTRATION: CIA Assets Planted in Mass Media ~ FADE to BLACK FADERNIGHT w/ Jon Rappoport : NMFNR Open Lines


Another Thursday…another Fadernight with Jon Rappoport and his No More Fake News Room Live…and tonight he tackles MK Ultra and Project Mockingbird, the CIA and how they are still running today…followed by open lines…

Air date: June 15, 2017

The Weaponization of Information in the War of Terror ~ Corbett Report


TRANSCRIPT AND SOURCES: https://www.corbettreport.com/?p=22963

If terrorist incidents are always tied back to shadowy groups linked to Al Qaeda or ISIS, an online, independent media might connect those dots to show how Al Qaeda and ISIS were literally created, fostered, funded, trained and equipped by the UK government, the US government and their allies across the world as a tool in their quest of dominance of the Middle East and control of their domestic population. But such a story can only be told on a free and open internet, where independent voices continue to reach the masses and inform them of the truth about these terror groups.

This Creepy Patent Proves They Can Remotely Hijack Your Nervous System ~ Truthstream Media


Ed. Note:  IMPORTANT: Think you’re impervious to A.I.? Do you beLIEve you can’t be subjected to mind control? Think again. Look around, there are a lot of people blindly following memes and movements, while completely ignoring major Red Flags arising ‘with the story’.

 
Right now there are way too many people on the tracks, with blindfolds on and their fingers in their ears singing “lalalalalalalalala” while a freight train bears down on them. They remind me of people who get hit by cars while crossing the street because they’re engrossed in their cell phone and not paying attention to the world around them.
 
Here’s some exceptional investigative reporting from Truthstream exposing the patent that allows technology to synchronize the human energy field with artificial intelligence…
 
THIS is important, please listen-up – this is how our favorite talking heads get corrupted and controlled by AI driven, information tech. Then once you’re entrained to the material, you’re next…Ever notice how some information has an addictive quality to it. 
Blessings, {~A~}

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Support us on Patreon! https://www.patreon.com/truthstreammedia

Sources
https://docs.google.com/viewer?url=pa…

www.topsecretwriters.com/2015/11/the-mysterious-hendricus-loos-and-his-nervous-system-manipulation-devices/

https://web.archive.org/web/200502042…

Videodrome: http://amzn.to/2s4W07V

Truthstream Can Be Found Here:
Website: http://TruthstreamMedia.com
FB: http://Facebook.com/TruthstreamMedia
Twitter: @TruthstreamNews
DONATE: http://bit.ly/2aTBeeF
Amazon Affiliate Link (help support TSM with every Amazon purchase, no cost to you!): http://amzn.to/2aTARRx
Newsletter: http://eepurl.com/bbxcWX
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*­~*~*~*~*~

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

Why Strange Ancient Artifacts are Stored in a Heavily Guarded US Govt Warehouse [FULL VIDEO]


These ancient artifacts have the ability to rock the foundations of civilisation, religion and history to their very core. The strange and amazing secrets of the past are just a heavily guarded government vault away. This is a detailed study of how and why government agencies have, for decades, taken a clandestine and profound interest in numerous archaeological, historical and religious puzzles.

Investigates the abiding interest of American (and British) military and civilian intelligence agencies in anomalous ancient artefacts and megalithic sites representing exotic technology that can be utilized, primarily, for military purposes, and which may threaten with rewriting history as we know it. Needless to emphasize, an equal measure of attention has been devoted to certain researchers and their hypotheses.

What We Didn’t Learn At Bilderberg 2017 ~ Corbett Report


SHOW NOTES: https://www.corbettreport.com/?p=22955

What do we know about the secret, behind-closed-door globalist soiree that was Bilderberg 2017 in Chantilly, Virginia? Only what the Bilderbergers told us, and we know they’re lying to us about who is in attendance so why should we trust them about anything? This year James breaks down what we were and weren’t told about what was happening at Bilderberg, and what other globalist conferences might be worth keeping our eye on.

Mass Hypnosis and Trigger Words ~ Truthstream Media


We’re almost done with our first feature-length documentary, support this channel, read our goals here! https://www.patreon.com/truthstreammedia

Truthstream Can Be Found Here:
Website: http://TruthstreamMedia.com
FB: http://Facebook.com/TruthstreamMedia
Twitter: @TruthstreamNews
DONATE: http://bit.ly/2aTBeeF
Amazon Affiliate Link (help support TSM with every Amazon purchase, no cost to you!): http://amzn.to/2aTARRx
Newsletter: http://eepurl.com/bbxcWX
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*­~*~*~*~*~

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

Corey Goode Responds to Claims Made by Bill Ryan


Ed. Note: Last week when the attacks against Corey Goode from Bill Ryan and Randy Maugins hit the internet, I spent virtually an entire day attempting to keep balance to the conversation in FB Galactic History Discussion Group, where I’m senior moderator for the forum. Below this intro are my comments in response to Ryan’s accusations, from my perspective as a former Project Avalon member and what I determined while researching Corey’s background in 2015.
Last week Corey hadn’t released his response to Ryan when I made my comments, so I had no idea the agent Ryan quoted was Shane from the Ruiner. Over the years as a blogger, I’ve called very few people out as being double agents or pathological liars – Shane happens to be one of those people. I had quite a few discussions on the Galactic History page on his lack of credibility and transparency. I also dove into The Runier’s material when I was researching Corey’s background and found that Shane was nothing less than a pathological liar, aside from blantant lies in interviews and on his blog – his frequency was drenched in deceit and dishonesty, it was extremely uncomfortable listening to him.
Not only was he spreading lies about Corey, he was also using Corey’s material to fabricate his own story’s about working with giants.  His blog “The Ruiner” was packed full of half-truths and outright lies, then when he disappeared from the scene – so did his blog.
That said…the following comments were posted in response to Ryans comments by myself in the GH group on FB. I’m also not a fan of Randy Maugins either, both appear to be operating in Service to Self and are basically projecting their own issues on Corey. The Monster in the Machine looking back at you – is always YOUR SHADOW. These two would be well served by time spent in honest self-reflection to see what’s coming up for healing within themselves.
I’m more than satisfied with Corey’s immediate response to Ryan’s accusations and description of the Project Avalon environment. To say the attacks were/are venomous is highly accurate. The attacks were so fierce, they took the joy out of my birthday in 2011. It was then that I decided it wasn’t worth it and left the forum for good.  Here are my comments on GH last week:
First comment: “Back in 2014 when I was researching Corey’s background to get a better feel of who he is and whether or not he was disseminating truth, or if he was being controlled by milab/mic handlers & programs, I spent quite a bit of time at Project Avalon reading peoples “opinions” on CG. Keep in mind, I was one of the original members of the PA forum back in 2009-2010, absolutely LOVED participating in the forum. There were some amazing souls learning to stand in their power that populated the membership. We were also privy to a lot of hard to find, insider information that made excellent blog posts.
Then in late 2010 or so there was a sudden influx of disinfo AGENTS and trolls that totally infiltrated the forum. In an attempt to clear out the “gremlins” Bill Ryan put PA thru a purging of members, we all had re-join…but it didn’t work. By late 2011 I left the forum because the attacks on my posts and comments were too much…it was really bad, Bill lost most of his original members by 2012.
After then, PA was repopulated with a “less aware” group of people, but the infiltrators didn’t disappear. They found back doors in. That said, in 2015 when I was researching CG bkgrd on PA, what I found was a nest of PROFESSIONAL disinfo artists that had woven a thick web of darkness that still hangs over PA. Most of the comments on CG appeared to be linked to these individuals. I absolutely LOVE and RESPECT BIll and feel his heart is in the right place, but it’s also clear that PA has been totally compromised – along with Bill’s perspective. Being surrounded by so many “agents of deception” over the last 7yrs in his forum has been a subtle a form of mind control…therefore his “perceptions” of CG have been corrupted as well. This SSP stuff goes much deeper and is far more complicated than is being revealed atm…we are only just now getting the first layers of info. It’s wise to keep an open mind…Just sharing my observations and pov. In La Kech”
Second comment: “With Randy Maugins and Bill Ryan attacking CG simultaneously, especially if you take into consideration Bill and Randy are friends, it’s quite obvious this was an “orchestrated attack”. Now other popular alaternative news sites have picked this “story” up and are running with it. These media attacks were predicted by Corey at least a couple months ago.
Have also noticed Pattie Broussard recently joined the attack campaign too. Now everyone who hasn’t been following the Cosmic Disclosure narrative, and many who can’t think for themselves are actually beLIEving rumors from the gossipmongers. The uninformed are the ones jumping on the “CG Bashing” bandwagon. I personally haven’t talked to anyone who’s been watching CD that believes Corey is lying. Whatever happened to discernment, critical thinking and sacred neutral perspective? face palm, shake head.” 
In the end, I don’t believe these character attacks will have much of an impact on Corey’s audience. It’s really a sad stare of affairs to learn that trusted members of the alternative news community are still operating at the level of the cabal. That said, it’s to be expected from highly targeted individuals. Fortunately they’re exposing themselves for they who they really are.
It’s all part of the Unveiling process. Since all this began, I’ve learned a few things about Bill Ryan that are quite disappointing and would’ve changed the nature of my comment above, to a tone that was not quite so positive in regards to who he’s allied with behind the scenes. Enough said.
Blessings, {~A~}
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Tuesday, May 2, 2017

by Justin Deschamps

Bill Ryan wrote an article last week entitled, The Truth About Corey Goode, wherein he asserted that the Secret Space Program whistleblower was compromised and inauthentic. Days later, Stillness in the Storm produced an analysis of that article, concluding that what Ryan asserted and presented as evidence was not conclusive and the claims were unsupportable. Goode contacted me and offered to respond to the claims made by Ryan, in an effort to clear the air.

In law, the accused always has the right to respond to their accuser’s because it provides onlookers, usually a jury of peers, the ability to have at least two points of view on the facts at hand. This is important because if one doesn’t respond, only the accuser’s version of events are heard.

We’re living in a reality based on information and knowledge. To manipulate common knowledge—what a person thinks everyone else believes—is to control the masses; this is primarily what propaganda and social engineering is designed to do. This is how the powers that be so skillfully manipulate the unthinking masses, by appealing to their desire to fit in and feel accepted.

A person’s reputation or social image is very important in a world where most people can’t tell image from substance. If people were highly discerning and thought critically, rumors and slander (unsupportable claims stated as fact) wouldn’t be a problem. But in our world, such things can mean the difference between life and death. Most people won’t even entertain an idea if they question the character of the person sharing it—which in and of it self is a problem.

Related As Corey Goode Secret Space Program Claims go Viral Critics Step up Attacks

By responding to these claims, Goode has an opportunity to clear the air, and restore his reputation and continue to do the work he came here to do.

Goode Responds to Ryan

What follows are Ryan’s claims presented to Goode as series of questions. Additionally, Goode has some closing commentary.

1. Ryan claims that, in 2014-2015 you sent him a series of messages one evening, and the next morning denied that you sent them. Ryan claims you were “split-minded” or under some kind of mind influence. He further claims that the messages were on each of your computers, which he apparently confirmed later. He asserts that all of this is an indication you are untrustworthy. How do you respond?

Goode: I do not remember this incident with the details provided. There was quite a lot of extreme drama on that Forum that lead [sic] up to me closing my account. It would be easy to verify where emails came from by tracing the Host Header of the Email’s [sic] in question. I would need more details about his claims to respond fully.

2. Ryan claims that you lied about when you came forward after leaving Project Avalon, saying that it was being outed by Ryan and Kerry Cassidy that ended your IT career. Ryan asserts that you were not employed during the Christine interview that took place in late 2014; therefore, you misrepresented yourself to the public by saying you lost your career. How do you respond?

Goode: I never claimed that I was fired due to Bill Ryan (BR) or Kerry Cassidy (KC). I was already going through a workers comp injury that involved 3 surgeries. I was fired illegally from that job after the injury. It was not a career ending injury and I was receiving dozens of job offers while going through surgeries.


I told Kerry Cassidy repeatedly that I would only provide information anonymously. After it was clear I would not do an interview she posted my name on her website and several times in one of her YouTube videos. She then refused to remove my name from both locations. I was in a panic for the safety of my family and my career. Finally, I was forced to send all of the Skype and Email conversations to YouTube/Google’s complaint department. She was receiving her third strike with YouTube (Which would close her channel) and emailed me asking me to remove my complaint agreeing to remove my name from her website and video. I removed the complaint and we have kept this out of the public until now. All of this is documented. 

I have all of the documentation to backup the fact that I was outed on Project Camelot by Kerry’s “executive decision.” Not only did this put my family in extreme danger, but then made it almost impossible for me to be hired in the IT field. Before these companies let you anywhere near their data or infrastructure, they do background checks and social media searches. If you claim to talk to non-terrestrials… They are not letting you near their Billion Dollar Data!

3. Ryan claims that while you were participating in the Project Avalon forums, you were counseling various MILAB whistleblowers, apparently without permission from the moderators. Ryan feels this was a grave breach of trust on your part and is evidence, in his mind, that you have nefarious intentions. Were you asked not to do this? How do you respond? 
Goode: Not at all true. I never counseled a single MILAB. I only listened to their information and referred them to a regression therapist. I spoke to BR and his wife at the time, Christine, about assisting the MILABs that began to reach out after my first interview. BR and the moderators began to let people in this confidential group willy nilly without any real vetting. I had no hand in bringing MILABs to this group.

My first interview was being used to draw in MILABs and the way things were handled, it made the Forum feel like a “honey pot” to draw in these people. This group became infiltrated very quickly and the normal “Forum Drama” began to occur. Some of these MILABs began to reach out to me personally with concerns about how the Forum group was being handled. This all turned into one of many disagreements between BR and myself.

 
4. Ryan claims that your wife, Stacy, made a false accusation that Ryan was a member of the Church of Scientology. And that in the subsequent scuttlebutt, Stacy revealed in her commentary that you, Goode, where asked to produce a dossier on Ryan by “high authorities,” a senior member of the church. Ryan contends that this is evidence you are working as an agent for an insidious group. How do you respond? 

Goode: No one from any Scientology “like” organizations contacted me. Ever! No one from that organization asked me to produce a dossier on BR. 

[BR on Scientology]
The way the forum members responded to the situation was typical of internet forums and a lesson to anyone to stay away from them. They are highly infiltrated by agents as well as a platform for narcissistic and sociopathic individuals. All you have to do is read some of the posts and feel the venomous energy behind them. The one recently posted on me is an obvious example of that forums history.
5. Ryan claims that you were given access to an FBI database, and told Ryan as much in a skype message. He asserts this is further evidence you are an agent. How do you respond?

Goode: So, if anyone that is investigating a topic or a person in this field is given access to government documents that makes them an agent? Wouldn’t that make every researcher in this field an agent by that standard? 

If you look at my LinkedIn profile you will see that I received FEMA certifications when in the Texas State Guard. 

Image Source.

While in those training sessions we rubbed shoulders with FEMA, FBI and other federal and local law enforcement and disaster response agencies. I was also a member of the FBI’s “Infraguard” program. People should join and see what that is for themselves. I actually believed I was getting much more access than was available. It is a place to report cyber crimes and monitor them in real time. This tool is used for corporations to report or review reports of real-time hacking attacks and how to mitigate them.  

I was not given access to any database other than the real-time hacking and malware data coming from the Infraguard website. I was provided pieces of files and a couple redacted files on certain individuals that were coming together to attack me. There were a number of people from this forum that were pointed out to me as being extremely compromised. I have received files and data from contacts I made. 

I have had no access to the FBI Database… Ever. No matter what other doctored or misquoted communications BR posts. 

6. Ryan claims that you started a blog after leaving the Project Avalon forums and were attempting to smear him and others there. How do you respond? 

Goode: After the attacks on my wife and I, I was triggered and posted a lot of true and verified information about BR and his business practices and people that he has had business relations within South America (companies he has started etc…). I believe these pages are still available on Google archives if anyone wants to track them down. I did post that information during the height of the “Forum Wars of 2015” on my blog and them removed them a few months later after I cooled off. There were a lot of threads that I posted that others followed up on. I suggest people look into more of BR’s past that is available online for anyone to find.
  
7. Ryan claims that your story changed when you began speaking to David Wilcock, that it was “more polished” than the testimony you gave to Christine in 2014, which they took to mean, you concocted your story. How do you respond?

Goode: How did it “change”? When Christine came to my house to do the first interview, I had just had the “entity attachment” release that was causing me to have anxiety attacks or verbally stammer while trying to talk about these experiences. Interestingly enough, it was a disagreement over removing entity attachments that triggered BR and caused our final disagreement. Christine captured my first attempt to speak openly about all of this. It can be found on my SBA YouTube Channel. My testimony has evolved and been expounded upon in Cosmic Disclosure.

8. Ryan claims that an unnamed intelligence agent contacted him saying that he has video footage of a conversation between you and your wife Stacey, wherein you were formulating the plan to deceive David Wilcock, captured via webcam activation. Ryan did not supply this footage. How do you respond? 

Goode: Un-named intelligence agent = Shane Bales AKA “The Ruiner” who was exposed as a pathological liar and caught on many occasions making things up about myself and David Wilcock. He is not an intel agent by any stretch of the imagination. BR avoided using this “agents” name for a reason. The screen shot of a skype conversation, clearly edited, was from Shane. BR himself (along w/his forum) came out against this person as being untrustworthy. This usually happens with anyone that falls out of BR’s good graces, but he was correct on this occasion. If this guy is a super hacker that infiltrated my network and turned on my laptop mic and video camera, then why trust any of the screen shots or other information that he provided BR and the Forum in question? 

This is one more unfounded accusation (disinformation) and BR knows it. I have never had a conversation remotely like that with Stacy. I say post the video! Show it! Put up or shut up… This is Shane Bales we are talking about. 

Again I say, post that alleged video footage. It doesn’t exist. If this footage was lied about, how can anyone trust any of BR’s other accusations against me? Or others for that matter. Think about it. 

[You can review Kerry Cassidy’s opinion on this matter here, where she disagree’s with some of Ryan’s claims about whistle blowers.]  

9. Ryan further claims that the same intelligence agent contact sent a screenshot of a skype conversation between the agent and yourself, wherein you said “you are now on the payroll… so am I.. it is what it is.” Since the original release of Ryan’s article, some have come forward refuting the screenshot as a forgery, saying your chat messages were altered. Did you actually send this message and is what appears the image your words? If so, how do you explain what these mean? How do you respond?

Goode: I did speak w/Shane in skype until DW and I caught him in a number of fabrications. The conversation in question was edited somehow, but some of the terms were used. We were talking about how we thought we [sic] were done with all of these programs. Being forced “back on the payroll” is a way of saying that I was being forced back into working with these groups again in an [sic] professional like status. This was taken and made to look like I was being paid by the powers that be. I have never been paid to be in the SSP “Programs,” nor am I now. I have never received any payments from the powers that be. This statement was taken out of context to purposely make me look like an agent by either Shane or BR.

It was reported to me that BR has also told people that he had an investigator look into me and found that I was receiving payments from “government sources”. BR cannot back up any of his accusations with evidence that stands up.

10. Ryan claims that the bulk of your testimony is a “carbon copy” of other whistle blowers, and that your claims are just too wild to believe, thus, in his mind, you can’t be authentic. How do you respond?

Goode: Once my information violated BR’s UFO religion, things went south very quickly. This is easy to verify by looking at Forum records (unless deleted or edited once more) his forum is controlled like a small totalitarian country. You either tow the line or you [sic] are either pushed out by other loyal forum members or are “un-subscribed” from the forum. If you do not believe me, open up an account there and speak your mind for a few weeks. You will wish you hadn’t. This is what occurred in 2015. 

He and others in that Forum have claimed I data mine and steal other people’s testimony. This was claimed about William Tompkins as well. Even though my info came out prior. You really have to look into these people and see their venomous attacks on a number of people other than myself. If you do the research you will see a clear pattern of behavior and accusations. This group seems to follow this pattern in an unbroken cycle. That is one reason I have warned people about hanging out in forums.

11. Ryan claims that if you were an authentic whistle blower, you would have never been allowed to continue talking. He seems to imply that you have had no problems with various authorities in sharing your testimony, that it has been 100% “approved” by high-level players in the programs. Is this implication true? How do you respond?

Goode: By Bill’s logic, William Tompkins, Clifford Stone, Pete Peterson, etc, are all liars or agents since they are still alive after coming forward. Does Bill believe that Steven Greer and his list of whistleblowers who testified in 2001 are also liars or agents since they are all alive? What about all of the people they interviewed on Project Camelot? They would all be liars or agents according to this logic. 

As William Tompkins has testified a faction of the US Navy is now wanting all of this disclosed. They gave him the green light to report on the same programs I was involved in. He had direct approval to release his information. Being that I was in these programs, I was given more protection when it came to being a whistle-blower. 

I have had an attempt to poison me at the airport, have had Chinooks flying over my house (I’m nowhere near an airbase) and have had multiple targeting lasers from sniper rifles appear on my chest while outside with my children. Most recently I ended up in the emergency room from an attack. 

Sadly, most of the most threatening attacks occurred when some of these forum members began to find out where I lived. I had a number of these forum members stalking me online. The line was drawn for me when some of them began to show up around my home and began to harass my family. We moved and took security precautions very quickly after a few incidents around my house.

BR himself had told me that I needed to come out in a big way to ensure the safety of my family. He asserted that if I was public, if the powers that be killed me it would just validate my testimony. This is also what Gaia told me and what made me to agree to Cosmic Disclosure.

I have not recycled anyone’s information.

12. Ryan claims that you are a conscious deceiver, that you know your story is untrue and are promoting it anyway. How do you respond?

Goode: He claims that I’m not really an IT professional as well. I invite people to check my references from my Linkedin Profile as well as verify my MCSE and A+ Certifications. I was in the IT Field for over 20 years and this is easily provable.

[An article written by Corey Goode from 2003, protesting IT jobs moving to India, suggesting he did work as an IT professional: Outsourcing to India: Offshore Debate Rages.]

As far as being a conscious deceiver. What is he basing this on? His opinion? The collective opinion of his forum? He certainly isn’t basing this accusation off of the reverse speech analysis that showed no deception. Or the recent video of people studying my body language where they also concluded “Corey believes what he is saying”?

Closing Comments from Goode

These are just more unfounded accusations made by this group.

Out of over 300,000 fans, there are less than 50 detractors on Avalon. To call this a noisy minority would be an understatement.

Since this has occurred I have had many emails forwarded to me by individuals that had originated from Bill Ryan (BR), campaigning against me. Not only has he been on an email campaign to try to discredit me but has also worked behind the scenes with others to co-ordinate attacks. This is more like the behavior of an agent than anything I have done.

BR told me that a close friend that was a private investigator was looking into me. What did he find? Nothing! BR needs to back up his claims with something other than his opinion, referencing mysterious evidence he cannot share or speculation. These types of accusations require proof! Not doctored “proof” from his forum.

All I can say is do some research on this forum and all involved with its forum leader. Once you read their energy and see what drama has occurred in that forum you can “consider the source” and move on like everyone else does.

All of the above accusations are either completely fabricated by BR or others from the forum or were once facts that have been twisted to a point of being unrecognizable. The forum post by BR “the Truth About Corey Goode” is a clear dis-info campaign. Remember, people tend to accuse you of what they would do in the exact situation. When they accuse you of something, pay close attention, you will learn much about your attacker.

My policy has been not to respond to these individuals. It just gives a wider audience to their feeding frenzy energy. These attacks pop up on the RADAR and quickly disappear, usually backfiring on the attacker. I expect this one will be no different. This is a very small forum with a very dubious history and is highly infiltrated. These attacks have occurred in cycles and they change them up trying to find something that sticks.

I have received quite a lot of information about how some of these people are coordinating in the background. Some of them even plan on attending Contact in the Desert to stir up problems between Dr. Greer and myself as well as do some ambush videos of them making scenes during presentations. How does this bring unity to the community? Divide and conquer is a Cabal tactic.

I will end my final response to these attacks by saying, research these people. Take a close look at their language and energy, and the evidence used to support their claims, then consider the source. There is nothing to their accusations but speculation and deceitful assertions.

We are trying to bring a bit of “Unity in the Community” so we can focus the energy of those who want to work together on disclosure. We are trying to organize people under the idea that none of us knows the entire truth. We can put aside the differences in our belief systems (reality bubbles) and work together for full disclosure. We will have to weed out those who only want division or have professional jealousy issues if we ever want disclosure.

In my opinion these people are self-identifying and are minimizing their selves in this field even further than they have with previous actions.

Corey Goode

Closing Remarks

I reached out to Bill Ryan and asked if he would like to respond, with the goal of settling the controversy so we can get back to fixing the planet. He has yet to reply, but should he, I will produce an update.

I want to raise one last point with respect to discernment, in order to determine if a claim is true, it must be judged on its merits and compared to reality. If this comparison can’t take place, then we can’t definitively discern what’s going on, we can only guess and wait for more information. It’s important that we avoid forming our beliefs only our our guesses.

Sometimes verifying a claim is easy, like looking outside can confirm or deny a prediction about the weather. But in other cases, discernment is not so simple. When we can’t access evidence ourselves, first hand, then we need to learn how to navigate uncertainty.

For example, Ryan’s claim that Goode deceived David Wilcock was based on another claim by someone who said they had footage of the event in question. In discerning this claim, first we need to properly understand what is being said and what is cited as evidence in support. In this case, the claim of Goode’s deceptiveness with respect to Wilcock rests on another claim that footage of the event exists. The footage itself would need to be produced so that the all claims can be verified. But since we have no such evidence, then the claim cannot be verified and it remains unconfirmed.

In other words, Ryan claims he was told footage exists showing Goode and his wife planning to deceive David Wilcock.  Unless the video is produced, this claim is unverified and therefore cannot be considered as evidence.

At this point, no definitive judgement or discernment can take place; the only thing that can be done is to speculate on what might have happened based on the evidence one does have. What tends to happen in this situation is people unconsciously assume that lack a of evidence is evidence of something else—this is a logical fallacy. Claims require evidence. When there is no evidence, a credibility assessment can give us a guess, but that’s all it is.

Assessing credibility allows us to gauge how likely people are to be telling the truth based on how truthful they have been in the past. And contrary to popular belief, while credibility can be a useful guide it still doesn’t mean they can be believed without question. Credible people may say things that are not true. People lacking in credibility may say things that are true.

As was just described, personal verification of actual evidence trumps credibility. Credibility is only a guess whereas personal verification examines the actual data, comparing it to reality, which gives the individual a detailed comprehension of what is happening. What this means is that we don’t have to rely only on credibility when we’ve investigated something first hand. We don’t need to trust the weather man when we can see the weather ourselves.

In this case, we don’t know if the footage exists or not. But based on the credibility of Ryan with respect to the evidence used to support his claims about Goode, or lack there of, it can be asserted that Goode has more credibility than Ryan. Goode is more objective while Ryan is nonobjective with respect to his stated beliefs. And therefore, Ryan’s claim that Goode and his wife Stacey deceived Wilcock is likely untrue. But again, this is just a argument based on credibility and has little weight to it. Such an exercise of assessing credibility is valuable for its ability to guide our consciousness through an exploration, providing new insights along the way.

Learning to navigate uncertainty is very useful. Especially since it is likely that the vast majority of our beliefs and assumptions were never verified with evidence. They may not even be our own beliefs. If we aren’t careful, we will fall into the trap of assuming our beliefs should not be questioned, which means we will not re-evaluate them, missing an opportunity to grow.
This episode between Ryan and Goode presented us, the outsiders, with a good opportunity to test our discernment skills, and learn how to evaluate claims objectively. And it’s helping to ferret out any potential disagreements as the need for unity increases with each passing day.

Although discussions like this may be unpleasant, we need to be able to talk freely and openly, especially about the difficult things. For the truth must shine brightly in order to set the mind free.

Justin


The preceding text is a Stillness in the Storm original creation. Please share freely.

About The Author

Justin Deschamps is a truth seeker inspired by philosophy and the love of wisdom in all its forms. He was formally trained in physics and psychology, later discovering the spiritual basis of reality and the interconnected nature of all things. He strives to find the path of truth while also walking it himself, sharing what he knows with others so as to facilitate cooperative change for a better future. He is a student of all and a teacher to some. Follow on Twitter @sitsshow, Facebook Stillness in the Storm, and steemit @justin-sits.

Like our work? Support this site with a contribution via Paypal.

This article appeared first on Stillness in the Storm.

This article (Corey Goode Responds to Claims Made by Bill Ryan) by Justin Deschamps originally appeared on StillnessintheStorm.com and is free and open source. You have permission to share or republish this article in full so long as attribution to the author and stillnessinthestorm.com are provided. If you spot a typo, email sitsshow@gmail.com.

http://sitsshow.blogspot.com/2017/05/corey-goode-responds-to-claims-made-by-bill-ryan.html

JOHN LEAR REVISITED – PART ONE OF THREE ~ Project Camelot


I went back to interview John Lear who has been an old favorite interview of Project Camelot’s audience. He has had some health issues but is still going strong and wanted to talk all night! This is the first of three parts…

Brief Bio: John Lear is a retired airline captain and former CIA pilot, as well as the son of the famous inventor of the Lear Jet. He is a former Lockheed L-1011 Captain and is highly regarded in aviation circles. He has flown over 150 aircraft and has earned every certificate granted by the Federal Aviation Administration. John also held 18 world speed records and has worked for 28 different Aircraft Corporations. During the late 1980s and early 1990s, John began coming forward with some startling revelations concerning the subject of aerial phenomena and Unidentified Flying Objects.

Go here to John’s site for the best bio:
http://www.thelivingmoon.com/47john_l…

KERRY CASSIDY
PROJECT CAMELOT
http://projectcamelotportal.com

The Cold Noir Ep01: “Something in the Air” ~ Truthstream Media


Get first watch of Episode 2 up now for Patreons: https://www.patreon.com/truthstreammedia AND THANK YOU TO ALL OUR PATREONS! It means the world to us.

When a man gets a knock at the door, he is sent down a rabbit hole where he finds out how far some people would go…

Truthstream Can Be Found Here:
Website: http://TruthstreamMedia.com
FB: http://Facebook.com/TruthstreamMedia
Twitter: @TruthstreamNews
DONATE: http://bit.ly/2aTBeeF
Amazon Affiliate Link (help support TSM with every Amazon purchase, no cost to you!): http://amzn.to/2aTARRx
Newsletter: http://eepurl.com/bbxcWX
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*­~*~*~*~*~

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

%d bloggers like this: