Dr. Phil Exposes Elite Government Pedophile Ring On Mainstream TV


Ed. Note: Thank God for Dr Phil, who’s showing the courage and compassion to break this story on mainstream media. To expose the dark, rotten, evil underbelly of the ruling elite. This was difficult to watch, yet at the same time as i held sacred space for this woman to tell her story, it was also healing. I’m sure many victims of sex crimes like myself are finally breathing a sigh of relief in knowing that now it’s only a matter of time before the damn breaks loose and these horrific crimes are exposed to the world.

Women, men and children are living in terror and losing their lives every day at the hands of those who enslave humanity. It’s time…This disclosure is important, please help expose these criminals by sharing this woman’s  courageous testimony.

Namaste, {~A~}

“““““““““““““““““““`

March 23, 2017 Sean Adl-Tabatabai

dr-phil-elite-pedo-ring-678x381

Dr. Phil exposed the crimes of an elite government pedophile ring to millions of viewers across the United States on Tuesday, after interviewing a former child sex slave called ‘Kendall’. 

Kendall, who was repeatedly sexually abused as a young child, detailed her life growing up as a sex slave to an elite pedophile ring to a stunned audience.

As more and more Americans are beginning to wake up to the fact that high-level government officials routinely sexually abuse children, Dr. Phil helped bring the issue to the attention of an even bigger audience.

Thefreethoughtproject.com reports:

Kendall explains that she was born to be a sex slave, as her parents intentionally had her for the trafficker she calls her “owner.” Kendall says that her parents sold her at birth to an elite pedophile ring that serviced some of the world’s power elite, describing her first memories as being passed around groups of rich and prominent men and women for them to “take turns” with her for sadistic sexual pleasure.

Making her first public appearance after escaping from the man she calls her “owner,” Kendall describes being forced to participate in actions that shock the conscience. She explains that she was forced to rape children as young as 5- years-old, and even admits to having been forced to kill a baby by the human trafficker she describes as her “owner.”

Kendall says that she can tell the difference between kids born into sexual slavery and ones that have been kidnapped, as the ones born into it are more docile and less upset as it is the only reality they have ever known.

When Dr. Phil asks how old she thinks she was when she was first raped, Kendall explains that it was “before I could talk – I was used to it by the time I was 2.”

She says she doesn’t even know her actual age, as she has been a sex slave her entire life, being trafficked around the globe to be molested and raped by the societal elites – including high ranking law enforcement official, major sports franchise owners and even high level U.S. politicians.

She describes having birthed 3 children while in captivity, all of which have been taken from her by her owner/trafficker, and are believed by Kendall to now be child sex slaves themselves.

“I was allowed to get pregnant, because men paid for that,” Kendall said.

Kendall notes that the pedophiles she came into contact with over the years were extremely wealthy – often “pillars of the community” – with some even owning private islands or large pieces of land.

“They would buy us just to hunt us,” she said.

She recalls one of her most fearful memories was that of the pedophiles hosting a “hunting party” on one of their large private plots of lands, making numerous children run and hide in fear, as they were the “prey” to be hunted. The pedophiles would then hunt the children as they ran and hid in fear – raping and torturing them when they were captured.

The activities described by this woman are so profoundly disturbing they can be almost hard to believe, but Dr. Phil confirms that his team not only investigated Kendall’s case for four months, but also consulted with law enforcement experts who confirmed her story. Dr. Phil said he “100% believes” that she is telling the truth.

In a damning indictment of the power-elite, Kendall described how the pedophile politicians would adorn her in designer clothes, well groomed hair and makeup to give the appearance of class and sophistication. She explains that she and other children were often hung from cages suspended from the ceiling, and that they were often drugged before being transported in the darkness of night.

She claims that she was trafficked to pedophile politicians, and taken to political parties attended by high-level politicians who used her for their personal pleasure. The politicians always took great care to hide what they were doing, according to Kendall, who confirmed that there are many elite U.S. politicians that have been engaged in raping children for many years — a reality that has consistently been covered up and completely hidden from voters.

Perhaps the reason these crimes have been so steadfastly hidden from public view, is that high-level law enforcement officials have also been implicated as being part of the elite pedophile network.

This is just the latest case to emerge in what is now being called #PedoGate. #PedoGate refers to an international pedophile ring composed of politicians and other high profile societal elites.

http://yournewswire.com/dr-phil-elite-pedophile-rings/

Everything is Fake: Top 40 Pieces of Fakery in Our World!


Cover Image: The Truman Show

TheFreedomArticles| Everything is fake in our society today – or at least a great many things, are. Our world is filled with an extraordinary amount of lies, deception, disinformation, misinformation, fakery, fraud, facades, mirages, propaganda and brainwashing.

The good thing though is that once you awaken to the deception, you can use it as a tool for raising your consciousness. The idea that virtually everything is fake can be empowering rather than depressing.

Sure, we’ve all felt overwhelmed, sad, angry and impotent at times when we’ve seen just how easily our (mis)leaders can fool the masses with sophistry and empty rhetoric, but they’ve all been placed there to challenge us to wake up more quickly and fully, and reclaim our world.

Here’s my list of the top 40 pieces of fakery in our world today:

1. FAKE NEWS

Let’s begin with the MSM (Mainstream Media), better called the lamestream media, and their “news”, which is essentially corporate infotainment. The MSM waters down the news and makes it entertaining to further distract people from things of real significance.

There is nothing balanced, impartial or fair about MSM news. In the US, Australia and many other Western nations, the news is dominated by a handful of for-profit corporations who are legally bound to provide a return on investment to their shareholders.

This means running “news” pieces which either promote the agenda of the corporate owners (especially the military agenda) or censoring stories which would hurt political allies and advertisers (like Big Pharma, who is the biggest contributor of funds for advertising on MSM according to former US Senator Robert Kennedy Jr.).

Additionally, the news is literally fake – remember the CNN green screen stunt where they pretended they were being bombed in Saudi Arabia but were really in a studio? What about lying news anchos like Brian Williams and Bill O’Reilly (Bill O’Leilly)?

2. FAKE JOURNALISM

Alongside fake news, of course, comes equally fake journalism. MSM journalists today are not the true investigative reporters of yore. There are exceptions such as journalists who used to work for the MSM Big 6 and are now working independently (either leaving of their own volition or having been fired) such as Ben Swann and Sharyl Attkisson.

However, they are few and far between. Most journalists function as little more than parrots repeating the corporate party line, and are too scared to rock the boat for fear of losing their jobs.

The White House strictly controls who has “access” to the President and other officials. In general, if you want more access, you have to toe the line and ask easy, softball questions that make politicians look good.

Additionally, the Government admitted it made video news releases or prepackaged news for the MSM, which then broadcast these releases as “news” without disclosing to its viewers that the pieces were premade by the Government!

3. FAKE ENTERTAINMENT

On the topic of media, let’s turn our attention to Hollywood and the entertainment industry. If you’re looking for fakery and superficiality, look no further, because Hollywood and certain parts of southern California are about as shallow as it gets.

The dominating culture there dictates that it’s more important what you look like than who you are; more important who you hang out with (and are seen with) than what you know; and more important how big your Botox lips or silicone breasts are than how big your heart is; and more important, what you own and what’s in your bank account, than what gifts you’ve given to the world.

Hollywood’s film and music industries are imbued with Satanism. This is easily seen with its influence on heavy metal, rock, hip hop and these days even pop (take a look at the Illuminati symbology in the music and videos of Madonna or Katy Perry).

Actresses such as Rosanne Barr and many other Hollywood insiders have exposed how mind control, prostitution (turning up-and-coming stars into prostitutes or forcing them to have sex to “make” it) and pedophilia are rife throughout Hollywood.

Michael Jackson suffered from mind control and attempted to tell the world before he was killed. Many others such as Mariah Carey and Britney Spears show obvious signs of mind control.

4. FAKE CORPORATE PR AND ADVERTISING

Another aspect of visual media (TV) that makes you sick are these generic “we care” fake feel-good commercials made by slick marketing departments of the corporatocracy, trying to get you to associate them with happiness, caring, giving, equality or any other value they choose from a list. They use marketing as a kind of weaponized psychology.

Did you ever wonder why Big Pharma always shows beautiful models, happy, retired people, bouncing dogs or smiling babies to peddle its poisonous, side-effect laden drugs?

Corporations are soulless entities and legal persons – the epitome of fakery in many ways since they are fake persons with the rights of people and the responsibilities of none.

5. FAKE MEDICINE

Big Pharma is the force behind Western Medicine, and Rockefeller is the force behind both of them. With its smorgasbord of synthetic drugs, vaccines, surgery, chemotherapy and radiation, Western medicine or allopathy has earned the dubious honor of killing hundreds of thousands of people every year.

A 2000 study by Dr. Barbara Starfield, MD, found that allopathy kills 225,000 per year in the US, while a 2003 study by Dr. Gary Null, MD and others, found that allopathy kills 783,000 per year in the US. Starfield concluded that Western Medicine in America causes:

– 12,000 deaths from unnecessary surgeries;

– 7,000 deaths from medication errors in hospitals;

– 20,000 deaths from other errors in hospitals;

– 80,000 deaths from infections acquired in hospitals; and

– 106,000 deaths from FDA-approved correctly prescribed medicines.

Null et al concluded that Western Medicine causes:

– 37,136 deaths from unnecessary procedures;

– 32,000 deaths related to surgery;

– 98,000 deaths from medical error;

– 115,000 deaths from bedsores;

– 88,000 deaths from infection;

– 108,800 deaths from malnutrition;

– 199,000 deaths related to outpatients; and

– 106,000 deaths from adverse drug reactions.

Now, with its antibiotic drugs becoming more useless in the face of rising super bugs, you have to really question whether an entire medical system that is based on masking symptoms, “managing” illness, and getting patients on a hamster wheel of pill after pill after pill, can really constitute true healing – or whether it’s just more fakery.

6. FAKE SCIENTIFIC RESEARCH

Backing the Rockefeller’s Western medical Big Pharma cartel is a massive pile of fake scientific research. Like anything fake, the veneer looks shiny and leads you to believe what lies inside is trustworthy and reputable, when in reality it’s reams of biased and concocted research with a peer-reviewed stamp on it.

Former Big Pharma reps, esteemed medical journal editors and even insider governmental scientists have all confessed the shocking truth that a large amount of the published scientific data out there is fraudulent and simply can’t be trusted. Check out the top 10 tricks used by corporate junk science.

7. FAKE ACQUIRED IMMUNITY

Another piece of fakery is the idea that vaccine-induced immunity or acquired immunity could possibly be identical to natural immunity, which one receives after having successfully warded off a disease (e.g. like chickenpox).

Vaccine proponents even go so far as to insist that the unvaccinated are endangering the vaccinated by not getting their shots (the herd immunity argument) – which defies logic, since if vaccines really worked, there would be no need for the vaccinated to worry about catching anything from the unvaccinated.

In my article Herd Immunity vs. Viral Shedding: Who’s Infecting Whom? I discuss how the human immune system is vastly more complex and sophisticated than we understand, and is made up of specific and non-specific parts.

imHGPweMYqQCqWR_l3Gqp_754-1

A vaccine does not closely resemble natural immunity in many ways, including only engendering a specific response, having a completely different point of entry, not conferring lifelong immunity, etc.

Besides, vaccines are full of toxins and carcinogens, including fetal tissue. The elite have admitted vaccines are being used for depopulation.

Related: Bill Gates Admits Vaccines Are Used for Human Depopulation

The real issue is not herd immunity but rather viral shedding, whereby the vaccinated are infecting the unvaccinated. Vaccines are yet another example of supreme fakery in today’s fake world.

8. FAKE FOOD

True immunity is derived from lifestyle and diet, including what quality of exercise, sleep and nutrition you get. This brings us to the topic of food. Our food today has become so processed and packaged, so full of preservatives and plastics, that it has become fake food. It gets churned out of a factory rather than grown on a farm or field.

It’s full of artificial flavors and synthetic tastes – some of them even derived from aborted fetal tissue as Pepsi was forced to admit. Some of it is so refined and over-cooked it barely has more nutrition inside of it than a piece of cardboard.

When you add the monstrosity of GMOs (Genetically Modified Organisms) into the mix, you get a final product that Dr. Rima Laibow calls “phude” rather than “food”, because the final engineered, processed product is so far removed from what our ancestors knew as real food.

monsanto-gmo-pig

By the way, GMOs, in case you hadn’t heard, can lead to organ failure, infertility and cancer, and are genetically modifying you as GM proteins bypass digestion and go directly into your blood (as is their ultimate purpose).

GMOs by their very nature are engineered to withstand massive doses of chemical and hazardous pesticides. GMOs are basically a way for chemical companies like Monsanto and Dow to sell more chemicals, because people need them to grow Big Biotech’s fake food. The WHO recently declared Monsanto’s glyphosate and Dow’s 2-4, D pesticides as probably and possibly carcinogenic, respectively.

9. FAKE WATER

Just as we have fake food, we also have fake water. Real water is flowing and alive, as you can find in a river or mountain stream.

Unfortunately, most of our drinking water today is dead, having passed through 90° right angles in a pipe, having been treated with chlorine and fluoride (both toxins), and containing remnants of antibiotics, glyphosate and Big Pharma drugs. It may do just enough to keep us alive, but it’s not allowing us to thrive.

Water has memory and carries past information, as the pioneering research of Masaru Emoto showed. It absorbs what you are thinking and feeling, and changes its structure accordingly.

If we as a society keep using synthetic drugs and flushing them down the waterways, the water will remember that, and future drinkers of it will get the “memory information” of drugs in their system, regardless of whether they actually take pharmaceuticals or not.

Not all water is equal. How beneficial it is depends on how it is structured. It is heartening to see people promoting structured water, which returns the buoyancy to the hydrogen and oxygen atoms making up the water molecule. We are water.

Whatever we do to our water we do to ourselves. One way out of the deception and conspiracy is to take control of your water, and find a pure source, or ensure you both filter and structure your water to make it as life-giving as possible.

SEE: Experiment Proves That Thoughts & Intentions Can Alter Physical Reality

10. FAKE CHOICE

The US (and other Western nations) like to pride themselves on being free, open and offering so much choice to the average citizen. But do they really?

What kind of choice is it when you can choose from over 1000 channels on cable TV and 25 flavors of frozen yogurt, but when it comes to running society, all the major candidates for political office have identical policies on the things that count?

Illusion-of-free-choice

Is there any real choice when one US politician is slightly tougher on immigration, but both support the current parasitic monetary system (privately owned Rothschild central banks like the Federal Reserve), the continuation and expansion of the US Empire through constant war and military base acquisition, and crony capitalism where politicians reward corporations at the expense of ordinary people?

Real choice is the power to have a say in the direction of society, not what material variety you have as a consumer.

11. FAKE MONEY

A nation can never truly prosper as a free, fair and egalitarian society as long as it has a rigged monetary system. Today’s money is a privately-controlled creation.

The controllers, who own a government-sanctioned central bank in almost every country on earth, long ago convinced the government to adopt their funny money and rule that it be made legal tender.

This funny money, is fake money, because it carries no intrinsic value. It’s just pieces of paper with ink – and now, increasingly, just digits typed into a computer. It’s fiat currency.

hqdefault

The word fiat means “by Government decree”, so funny money gets its value just because the Government says it does!

The founder of the Rothschild empire, Mayer Amschel Rothschild, once said:

“Give me control of a nation’s money and I care not who makes its laws”.

His son, Nathan Rothschild, said:

“I care not what puppet is placed on the throne of England to rule the Empire. The man who controls Britain’s money supply controls the British Empire and I control the British money supply.”

Our world is unlikely to change until people realize the power of money creation, and demand to have it restored to public control, either under the Government or in another more decentralized way. The first step in all of this is for people to realize how fake our money is.

12. FAKE ECONOMY

Don’t you love the way US Presidents get up in their State-of-the-Union addresses and claim with a straight face that the state of the union and the economy are strong? Anyone who has looked at the rapid and almost hyperbolic rise of US debt and borrowing in the last 10 years knows the US is in deep trouble.

It owes a staggering $18 trillion, and many other nations worldwide (like the UK, Spain, Italy) are also in debt to the international banking cartel. What kind of economy relies on constantly borrowing money from tomorrow just to stay afloat today? I’ll tell you – a completely fake economy that is bound to crash sooner or later when the debt gets called in.

13. FAKE FREE MARKETS

The NWO elite love to talk about the importance of free markets – when it suits them, of course.

By free markets, they actually mean markets where they are unfettered by governmental regulation to exploit whomever and whatever they want, or conversely where they rely upon the Government to enforce something that ordinarily people would not choose.

Take for example California’s recent ruling of mandatory vaccinations, and the US Federal Government’s refusal to restrict GMOs or even allow GMO labeling.

The Government willingly destroys free markets around healthcare (Obamacare) and vaccines to benefit its Big Pharma masters, while simultaneously refusing to protect the public against the dangers it was created to guard against. We have convenient and fake free markets, not true ones.

14. FAKE FREE TRADE AGREEMENTS

Another aspect of fake free markets is the spate of “free trade” agreements which is more Orwellian doublespeak for restricted trade agreements – that is, restricted to anyone except giant corporations.

Just look at the fallout from NAFTA, CAFTA and other free trade agreements which outsourced middle-class jobs to China, India mad other developing nations and destroyed many American jobs. The latest round of secret treaties (the TPP, TTIP, and TISA) will be more of the same.

As I documented in “How the TPP is Going to Affect You“, the TPP, if passed, will result in consequences like the weakening of the minimum wage, more censorship, more copyright, less freedom of expression, private corporate courts like the ISDS which supplant national sovereignty, stronger patents, more control for Big Pharma and less environmental protection.

15. FAKE ACCOUNTING

Underpinning the fake economy, is fake accounting. Remember on September 10th, 2001, when then Secretary of Defense Donald Rumsfeld (the same guy who gave the sweet killer aspartame to the world) announced that $2.3 trillion was missing and unaccounted for.

That’s right – he couldn’t find $2.3 trillion! The public has a short memory, and the very next day (conveniently) we were hit with the mass ritual and false flag attack of 9/11, so it all got swept under the carpet.

Even that figure, as preposterously large as it is, doesn’t compare to the $9 trillion allegedly “missing”, as explored here by Alan Grayson, one of the few US Congressmen with any principle or backbone.

Of course, the digitalization of money allows for every greater amounts of fakery than just fiat paper currency … and massive amounts of money are being siphoned off for black military operations (black ops) and the Secret Space Program.

16. FAKE WELFARE

The elite owners of multinational corporations, many of whom are millionaires if not billionaires, like to complain about the US welfare system and programs like SNAP or food stamps as it is colloquially called.

Meanwhile, corporate welfare rakes in billions of dollars in governmental contracts, subsidies and tax cuts due to the corrupt and indue influence they wield (chiefly through lobbying). The point of welfare is to help the poorest and neediest – not the wealthiest.

The preponderance of corporate welfare and the power of corporatocracy is another sign that the US is a fascist society – fascist in Mussolini’s sense that the ruling class control affairs through the merging of State and Corporate power.

17. FAKE GOVERNMENT

The figurehead of all this fakery is Government, so it’s no surprise that Government itself is also an entirely fake creation. In the US, many legal documents such as the State Constitution of Arizona state that Government only exists ”… to protect the rights of the governed”, while documents such as the Declaration of Independence affirm that a Government only derives its powers with the consent of the governed.

Current Governments around the world are fake – they exist to exploit rather than protect the public. Governments are not de jure entities but are rather de facto. They secretly incorporated (such as the US Government incorporating itself in 1871) and are now, legally, corporations whose sole purpose is to maximize profit.

Appropriately, the fake Government is headed by fake leaders or rather misleaders, who with the exception of a rare few, are puppets whose souls have been bought and paid for by the true ruling force behind the scenes.

18. FAKE REPUBLIC

The US was set up to be a Republic, not a Democracy. What’s the difference?

The difference is that a republic contains protections of individual and minority rights, so that no matter who is in power, these basic rights can never be infringed, while a democracy runs on majority opinion, so that if a majority (whose emotions can easily be swayed by controllers who own the media and understand psychology) votes to impose its rule on the minority, that’s how it goes.

The US has been deliberately turned from a constitutional republic into a corporate democracy. It is a fake republic now.

19. FAKE DEMOCRACY

The above points about republics and democracies were talking about the technical or legal definition of those terms. In the broader sense, however, people use the word “democracy” to mean a system where the common people have a fair say in public affairs.

The US loves to boast how it is delivering democracy to the world, but most invaded countries see – and it’s a long list of aggression from the end of World War 2 until today, from Iran to Guatemala to Cuba to Chile to Panama to Kuwait to Libya to Iraq and many more – is not democracy but rather tanks, fighter jets, missiles, and bombs.

fake-democracy

True democracy has nothing to do with invading other sovereign nations and stealing their resources to please corporate puppeteers.

20. FAKE ELECTIONS

Elections in many societies have become a farce with the introduction of rigged electronic voting machines that leave no paper trail. If you can’t trust that your vote will be counted properly, how can you possibly think an average person could have any say at all in public affairs?

Stalin is rumored to have said that “the people who cast the votes decide nothing. The people who count the votes decide everything.” The situation has become so absurd that in the 2012 US presidential race, it was candidate Mitt Romney’s company who actually purchased voting machines!

The film Uncounted did a great job exposing how rigged and dysfunctional the Diebold voting machines are.

In addition to rigged voting machines, consider how the fake debates we get shown on MSM TV, where elite-favored candidates are fed softball questions while anyone challenging the establishment is sidelined, given less air time and hit with personal attacks, unfounded accusations or hard questions.

21. FAKE NATIONAL SECURITY

National security is the favorite justificatory term invoked by the elite to hide their documents and actions under the cloak of secrecy, while invading other sovereign nations abroad and taking away people’s rights domestically.

However, national security has nothing to do with making you more secure; it’s about making the elite more secure (by entrenching military secrecy and contracts) and you more insecure (by taking your rights and liberties away).

Think of the immense amount of information kept classified and under lock and key – everything from UFOs to ETs to cancer cures to free energy devices – which the public deserves to know and has the right to know, yet fake national security is preventing them from accessing it.

22. FAKE DEFENSE

In the US and Australia, it’s the Department of Defense/Defence. In the UK it’s the Ministry of Defence. In Canada, it’s the Department of National Defence. Israel has its IDF (Israeli Defense Force).

Pick your country, it doesn’t matter: the war departments always adopt the PR language of defense, since it’s so much easier to justify than attack. Yet take a close look at what these nations do. They routinely attack other nations on the flimiest of pretexts to gain more geopolitical influence, install puppet dictators, steal land and pillage natural resources.

Israel loves to talk about its right to defend itself, but when has Israel ever been under a real threat of attack – apart from in their own imagination? Perhaps they were worried that a few Palestinians with rocks and sticks might be able to penetrate their billion-dollar defenses, generously donated by US taxpayers.

When has the US ever been in real danger of being attacked? Never. Pearl Harbor was an inside job– they knew it was coming. It was an excuse to get the US into WW2.

Since then (and even before then too), the US military has always been about unbridled aggression, preemptive strikes and attack, thanks to the out-of-control military-industrial-intelligence complex. There’s nothing defensive about it.

Since then (and even before then too), the US military has always been about unbridled aggression, preemptive strikes and attack, thanks to the out-of-control military-industrial-intelligence complex. There’s nothing defensive about it.

23. FAKE EDUCATION

True education is the drawing out of the inherent beauty and talent inside of us. This makes sense, since etymologically, it is derived from the Latin words “e” or “ex” meaning “out of”, and “ducare” meaning to lead or draw. True education stands in stark contrast to indoctrination, which as the word suggests is all about putting dogma, belief systems or doctrines into someone’s mind.

Unfortunately, our education system today is one of fake education or indoctrination, having been set up the elite in the early 20th century.

They in turn based it on the earlier Prussian industrial school model which was designed to produce obedient citizens, workers and soldiers – not creative free thinkers who would challenge the system.

Many people such as Norman Dodd have exposed how powerful tax-exempt organizations, such as the Rockefeller, Carnegie and Ford Foundations, have hijacked the US Republic.

rockefellar-6

They especially focused their efforts on influencing the curriculum and using it to mold the minds of the impressionable young. John D. Rockefeller is widely quoted as saying, “I don’t want a nation of thinkers, I want a nation of workers.”

24. FAKE LAW

Just like many other aspects of our society, we are also surrounded by an entire system of fake law. Our legal system has been overtaken by admiralty jurisdiction or maritime jurisdiction, which was formerly used as the main commercial jurisdiction to adjudicate disputes among merchants sailing with goods on the seas between ports and countries.

However, the average man or woman is at a big disadvantage walking into commercial jurisdiction (rather than common law jurisdiction) where many rights don’t apply, because things are run on contract.

Much of today’s “law” is not true law but fake law: statutes, regulations, rules, policy, by-laws and codes. These are all commercial terms which only apply to commercial entities – such as your legal person or strawman, the capital letters name/version of yourself, which functions as the joinder or bridge to cross over from common law into commercial law.

The Government and Law Society rely upon deception to trick you into accepting their presumptions of law as facts of law. These presumptions become unrebutted facts unless you challenge them.

The truth is that all of these statutes do not apply to you unless you agree to be part of some society or organization, and this includes unwittingly admitting you are a citizen or resident of a country, which legally means you are a member/employee/franchisee of the United States Inc. or any other privately-incorporated Government. The same goes when you admit you a “taxpayer” to the IRS.

You can learn more about how to escape all of this trickery by educating yourself with sovereignty resources.

25. FAKE RIGHTS

We are all born free. We are all born with real, natural, unalienable, God-given, inherent human rights – choose whatever word you want to describe them – regardless of where you were born geographically.

Yet instead of honoring these inherent rights, governments like to give us fake rights instead, which are really just privileges in disguise.

The thing about privileges, of course, is that they can be revoked at any time by the governing authority. As I discussed in the article “We All Have Inherent Rights – Regardless of Whether a Nation’s “Authority” Recognizes It“, we have been given “civil rights” and UN “human rights” which are not the same thing as stand alone, inherent rights.

These fake rights have the effect of making us more like servant-slave, rather than master-creator, in relation to Government.

26. FAKE CONSENT

Just as we have been tricked with fake law and fake rights, we have also been tricked with fake consent. Many of the contracts we sign with Government or the big corporations are adhesion contracts, meaning a contract where one side is heavily favored by the terms and where the other party is severely restricted.

These include but are not limited to contracts with the DMV (driver’s licenses), IRS and SSA, as well as those concerning voter registration, bank accounts, and credit cards.

By law, to have a valid contract, all parties must enter knowingly, willfully, and voluntarily, with full disclosure of all of the terms; if not, then the contract is considered unconscionable and an act of fraud.

There are ways of revoking adhesion contracts, but most people don’t even realize they unwittingly gave consent in the first place.

27. FAKE MORALITY

I have already covered how utterly fake the MSM is in part 1 of this series. Yet, for all their fakery, they love to claim the high moral ground and pretend they are being ethical and proper, all the while deliberately deceiving you and lying to your face.

The MSM will happily condone the bombing of 3rd world countries and paint war in a good light at the behest of its military-corpoate owners, but will act all outraged because someone walked around naked or said the word “f*ck”.

It then goes to great lengths to censor certain words like this – f*ck – while going on it merry way, e.g. supporting the Zionist Israeli destruction of Palestine by pretending that Israel is not the aggressor or is in serious danger.

28. FAKE SPIRITUALITY

True spirituality, which is the awareness of one’s own divine nature and one’s own connection to the Infinite, has been usurped by organized religion, which has inserted its own set of middlemen (priests, pastors, rabbis, imams, etc.) between you and the Infinite, and started to charge you a fee for “divine translation services”.

fake religion

From one perspective you can say that all religions contain a kernel of truth, and that is true; however, from another perspective, you can say that all religions have become bogged down in dogma, doctrine, fantasy and ridiculous belief, are recycled Sun and Saturn worship, and are selling people down the garden path with a mixture of disempowering beliefs and Satanic elements.
David Icke, Jordan Maxwell, and others, have highlighted how religions have borrowed and stolen elements from previous versions, how the Middle East is a religion factory (see embedded video above) and how religion has ultimately been given to us to deceive us.

29. FAKE CLOUDS

As the geoengineering agenda races onward unabated, people are still in denial about the existence of chemtrails, preferring instead to believe the fake argument that they are contrails – despite the fact that experienced pilots have confirmed that contrails disappear in 10-12 seconds, while chemtrails linger for hours.

Fake clouds = chemtrails

These days geoengineering has changed its name multiple times (including SRM [Solar Radiation Management] and Climate Remediation), probably in an attempt to confuse people and cover up the horrific reality of its activities.

Sadly, today as you gaze up into the sky, there is no guarantee any more that you are seeing real clouds. With the intense amount of aerosol spraying and cloud seeding going on, there is always a good chance you are seeing the fake clouds of geoengineering, which continues to spray toxic sulfates and iodides of barium, strontium, aluminum, iron, and silver.

Geoengineeing has been implicated in the decline of the bee population. Meanwhile, Big Biotech owns the patents on aluminum-resistant GMO crops – which I’m sure is just a coincidence. Nothing to worry about; move along, please!

SEE: The United Nations Exposes Chemtrails 100% PROOF We Are Being Poisoned 

30. FAKE WAR ON TERROR

When it comes to fakery, the utterly fake War on Terror is close to the top of the list. As Aussie comedian Steve Hughes says, how can you have a war on something which is the consequence of war?

Terror is a consequence of war. Terrorism is one of the most deceptive and effective tools of the NWO (New World Order) to trick people into allowing centralization of control, and allowing Government to pass laws, encroach upon rights and grab power when it otherwise would not have been able to do so.

Look at the Patriot Act another horrendous piece of legislation which gutted the Bill of Rights, passed in haste because scared politicians wouldn’t stop to read it, and a scared population went along with it.

However, we were warned about fake terrorism. Recall Aaron Russo’s account of his meeting with Nick Rockefeller, who was trying to bring him into the inner folds of the NWO, and revealed to him that the elite were planning false flag attacks and a global war on terror way before 9/11 occurred.

Recall also Carol Rosin’s account, who learned from Nazi/NASA insider Werner von Braun who predicted that the game plan was to fool people with fake communism, fake terrorism, fake asteroids and a fake alien invasion.

31. FAKE LONE NUTTER KILLERS

This is another favorite tactic of the elite – kill game-changing activists and public figures who have the power to change the world (JFK, Bobby Kennedy, MLK, John Lennon, etc.) with mind-controlled patsies.

Then, control the MSM so that you can paint a false narrative about a random, unconnected, lone nutter who just happened to have a personal vengeance against the victim or was out of his mind. Lee Harvey Oswald, Sirhan Sirhan, James Earl Ray and Mark Chapman have all been exposed as innocent patsies and expendable victims who were unwittingly part of a grander conspiracy.

32. FAKE BOOGEYMEN

Finally, on a similar note to above, just as the elite controllers give us fake lone nutters to take the fall, they also provide us with fake boogeymen to scare us.

Some of these boogeymen have really scary beards and turbans, and are able to overcome the most advanced air defense (NORAD) of the most militarily sophisticated nation on Earth (the USA) from a cave in Afghanistan.

Cue Osama Bin Laden, close friend of the Bushes, one of America’s grandest criminal families.

Thanks to Prescott Bush (who traded with the Nazis), George Bush Sr. (former CIA head and US President involved in JFK’s death, serial rapist and pedophile, member of the Carlyle Group), George Bush Jr. (mentally impaired US President who presided over 9/11 and the fake War on Terror) and now candidate Jeb Bush, CIA-trained and funded Osama is in great company.

I suppose it’s just a coincidence that the Bin Ladens were having lunch with the Bushes the day before 9/11 occurred:

“According to the Washington Post, the Carlyle Group met at the Ritz Carlton Hotel in NYC one day before 9/11. In attendance at this meeting were former president George H. W. Bush and  Shafiq bin Laden, the brother of Osama …”

33. FAKE FALSE FLAG EVENTS

The rate of staged false flag operations, whether they be false flag shootings or false flag bombings, has been increasing. It almost seems like there’s one that goes by somewhere every month.

It’s Another Day, Another False Flag. Maybe this is due to how effectively the elite can fool the general population, and scare them into giving up their rights and supporting the centralization of power.

Yet, at the same time, there is also a growing awareness of a critical mass of people who see right through these events. After all, we have been exposed to a lot of them.

Boston-Marathon-false-flag-300x221

In the last 15 years, here is a brief and incomplete list of 21st century, false flag ops:

– 9/11 of 2001

– the Bali bombings in Indonesia of 2002

– 7/7 of 2005

– the Norway shooting of 2011

– the fake Sandy Hook (Sandy Hoax) shooting of 2012

– the Boston Marathon bombing of 2013

– the LAX shooting of 2013

– the Santa Barbara shooting of 2014

– the Malaysian Flight 17 of 2014 (falsely blamed on Russia)

– the “Sydney Siege” in Australia of 2014

– the French Charlie Hebdo shooting of 2015

– the Tunisia shooting of 2015

– the Charleston shooing of 2015

and so on. There are many more that didn’t make that list. Paul Watson of InfoWars pointed out a few years ago how even the military term false flag had begun to permeate in the mass consciousness and had cropped up way more as a search term online.

Remember how InfoWars reporter Dan Bidondi asked a Boston official, on live TV just as it was unfolding, whether the Boston Marathon bombing was a false flag event?

It would appear with the rising consciousness that the elite are going to be hard pressed to keep using false flag operations – unless they take it to a whole new level with perfect, undetectable holograms.

You can read concrete evidence about False Flags by following this link.

34. FAKE CRISIS ACTORS

Related to the fakery of false flag operations are the fake crisis actors used by the MSM to attempt to deceive you.

The alternative media has done a great job exposing the extent of fakery here, including exposing crisis actors at Sandy Hook, the Boston Marathon, the Charleston shooting and many other events.

On several occasions, the lying MSM even used the same crisis actors (see here and here) for different false flag events!

35. FAKE PANDEMICS

While the threat of bioweapons, including those that are constructed to target certain ethnicities, races or segments of society, is quite appealing to an elite cabal bent on depopulation, the fact remains that the recent pandemics we have witnessed, especially the ebola pandemic, are exaggerated and fake.

Kudos to Len Horowitz for his years of research in documenting the rise of bioweapons and fake pandemics, and also to Jon Rappoport who kept a cool head and questioned every aspect of the ebola psy-op, while many others were taken in by the propaganda.

Wasn’t it telling and almost surreal the way the ebola phenomenon just suddenly dropped off the map, after the US Government allegedly gave the order to the MSM to stop reporting on it?

36. FAKE MOON LANDING

The moon landing is another stunning piece of fakery that has gone down in the official history books as fact. Perhaps the best pieces on the issue are Jay Weinder’s analysis, Secrets of The Shining: Or How Faking the Moon Landings Nearly Cost Stanley Kubrick his Marriage and his Life and also in this interview.

Weidner presents a compelling argument that the elite convinced Stanley Kubrick to fake the moon landing in exchange for secrecy and future film budgeting.

Kubrick himself was very well acquainted with the Satanic underbelly of the New World Order, and produced one of the most striking films which ever exposed it (Eyes Wide Shut), with its famous scene of a Satanic ritual orgy and sacrifice in a mansion of the elite.

Kubrick died from a heart attack before the release of the film despite being reported to have been in good health with a strong heart – just another coincidence, I’m sure.

It is quite possible we went to the moon – just not in the way we were told. If you study the origins of NASA, you will realize it came out of the JPL (Jet Propulsion Laboratory) of Jack Parson, black magician and follower of Aleister Crowley.

Later, Nazi scientists joined NASA who were smuggled into the US under Operation Paperclip. Additionally, there are many Freemasons at NASA, including many of the astronauts on the 1960s and 1970s missions.

37. FAKE INTERNATIONAL SPACE STATION AND FAKE SPACE WALKS

The fakery about space is not limited to the moon landing. There are numerous videos regarding the ISS (International Space Station) which look obviously faked, including one where one of the astronaut Chris Cassidy slips up and admits they are shooting the video in a US town on the ground.

The Chinese also released a very suspect “space walk” where a bubble can be seen going past the astronauts’s head! There is another video showing someone with scuba gear aboard a supposed space craft. So what’s really going on in space? It’s hard to know, but these examples of fakery are easy to spot.

38. FAKE HISTORY

065d61782d3e4ff1031edf0fa4db4286

It has been said many times that history is written by the victors. If these victors have an agenda to dominate or set up a system of control with their newly won power to ensure they remain at the helm for many years to come, they can easily rewrite history or give us fake history in order to legitimize themselves.

George Orwell wisely observed that “Who controls the present controls the past; who controls the past controls the future.”

What he meant by that is that if you are currently in power, you have the means to censor information (e.g. internet firewalls, data deletion, book burning, etc.), and then, by controlling what people thought happened, you can shape the past in a favorable way so as to ensure you remain in power for the future.

An obvious example is the way the Zionist-dominated press reported on World War 2 and the events leading up to it.

This is why revisionist history is so important; we need people to actively reexamine our past and work out what happened, so we can see the patterns and learn from our mistakes. As George Santayana said, “those who cannot learn from history are doomed to repeat it”.

39. FAKE AUTHORITY

An overarching theme of all the fakery I have listed is that humanity has given it power all to fake authority. We have been tricked into giving over unquestioning obedience to authority, without stopping to think critically, question sources and biases, and make decisions for ourselves.

It’s all too easy for someone to don a black robe, white jacket or shiny badge and appear to be somehow above you.

Yes, some people have gone through a lot of hard work and training to become a judge, priest, scientist, doctor or cop, but they are still human. They still don’t know everything.

What if they just memorized a lot of facts and procedures themselves without ever truly questioning it or understanding it, then just repeated and parroted it over to you?

40. FAKE UNIVERSE

Finally, it seems the very universe in which we live is, also, not exactly “real”. The recent upsurge and popularity of the flat earth movement (who have highlighted many interesting anomalies that can’t be explained by the globe earth model) shows that we still have some investigation to do in determining exactly what kind of place we live on.

On a more fundamental level, however, we live in a fake universe in the sense that it’s a giant hologram or simulated reality.

People from all walks of life have hinted at this deep truth, whether it be ancient Hindu teachings that the world is maya (illusion), researchers such as the late Michael Talbot who wrote the great book The Holographic Universe, or cutting edge scientific studies trying to prove that the holographic model of reality fits the data better than the standard models of physics.

These days there are many Western scientists putting their energy into cracking the code of our holographic reality. Mainstream media outlets are exploring the fake universe topic too. Take a look at the following:

– A study by Nick Bostrom in 2003 which proposed “at least one of the following propositions is true: (1) the human species is very likely to go extinct before reaching a “posthuman” stage; (2) any posthuman civilization is extremely unlikely to run a significant number of simulations of their evolutionary history (or variations thereof); (3) we are almost certainly living in a computer simulation.

It follows that the belief that there is a significant chance that we will one day become posthumans who run ancestor-simulations is false, unless we are currently living in a simulation.”

– A study by theoretical physicist Juan Maldacena in 1997 proposed that “an audacious model of the Universe in which gravity arises from infinitesimally thin, vibrating strings could be reinterpreted in terms of well-established physics.

The mathematically intricate world of strings, which exist in nine dimensions of space plus one of time, would be merely a hologram: the real action would play out in a simpler, flatter cosmos where there is no gravity.”

– A study by Daniel Grumiller et al in 2014 proposing the holographic model of the Universe: “These field theories are the putative holographic duals to theories of gravity in three-dimensional asymptotically flat space times”

EVERYTHING IS FAKE!

Everything is fake! The sooner you wake up to the deception, the better.

Above all, remember that you can be real and true in the midst of all this. Don’t let it get you down; let it be a challenge to help you rise to your p

Above all, remember that you can be real and true in the midst of all this. Don’t let it get you down; let it be a challenge to help you rise to your p

 

“Age Regression used in Secret Space Programs confirmed as Scientifically Feasible” by Dr Michael Salla


age-regression-ssps-a

Due to recent breakthroughs in genetic research, the claims of three whistleblowers, who say they underwent an age-regression process in secret space programs, have become that much more plausible. The whistleblowers, Corey Goode, Randy Cramer and Michael Relfe, all say that they were age-regressed to become 20 years younger at the end of their respective tours of duty in secret space programs.

Recently, geneticists have identified the genes that control the aging process, and in stunning experiments, the results of which have been released in peer reviewed scientific journals, have demonstrated that they were able to reverse the aging process to varying degrees of success.

The results of these experiments make it plausible that the three whistleblowers did indeed undergo an age-regression process using classified medical technologies in secret space programs, as they claimed.

The lead genetic scientist in the publicly announced age reversal studies is Dr. David Sinclair, who discussed in an interview the results of his genetic experiments first conducted on mice:

We’ve discovered genes that control how the body fights against ageing and these genes, if you turn them on just the right way, they can have very powerful effects, even reversing ageing – at least in mice so far…  We fed them a molecule that’s called NMN and this reversed ageing completely within just a week of treatment in the muscle, and now we’re looking to reverse all aspects of ageing if possible.

He explained how this process could also be done safely for humans:

We’ve gone from mice into early human studies actually. There have been some clinical trials around the world, and we’re hoping in the next few years to know if this will actually work in people as well … They show that the molecules that extend lifespan in mice are safe in people.

Professor Sinclair went on to say in his interview that drugs based on the nicotinamide mononucleotide (NMN) molecule could be successfully developed “to restore youthfulness in human cells.”

Sinclair’s view that NMN based drugs will eventually be developed for safe use by humans is stunning in its implications. He may well be in the midst of developing the fabled elixir of life, which accounts for him quickly being elevated into the world’s 100 most influential people according to Time Magazine.

It’s important to point out that Sinclair’s pioneering genetic research is open source and unclassified. This means that is very likely, if not almost certain, that classified research in the field of age reversal/regression technology is far more advanced than anything achieved by Sinclair and his peers. READ MORE

Minnesota, Wisconsin and Wyoming have decided to eradicate wolves


Note: The only thing that will prevent this crime against the environment is public outrage, it’s time to SHAME your local Senator. Flood their offices with calls and PLEASE SHARE this information before it’s too late for wolves in Minnesota, Wisconsin and Wyoming. Mahalo

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 Wolf, wolves, Yellowstone, hunt, hunting

“War on Wolves Act” Senators from Midwest and Wyoming introduce bill to strip protections from endangered gray wolves

Senators from Minnesota, Wisconsin and Wyoming yesterday introduced the “War on Wolves Act,” a companion bill to legislation introduced last week in the House that would strip federal protections from wolves and allow trophy hunting and trapping of the species in four states.

If the legislation passes both chambers and gets signed by the president, it would hand the fate of wolves in Minnesota, Michigan, Wisconsin and Wyoming over to states whose management wolf plans two federal courts ruled inadequate to securing the species at legally required population levels in absence of Endangered Species Act protections.

In Wyoming, this would allow the state to resume a hostile management program that allowed for unlimited shoot-on-sight killing of wolves across 85 percent of the state. The legislation would further strip citizens of the right to challenge these lethal programs in court. The appeals process of two federal court decisions that restored federal protections to wolves in those four states are still underway. Decisions on those cases are expected any day.

The following is a statement from Marjorie Mulhall, Senior Legislative Counsel at Earthjustice:

“A new congress has resurfaced an old vendetta against imperiled wolves. If this legislation is signed into law, wolves in Wyoming will be subjected to unregulated killing across the vast majority of the state, and even on the borders of Yellowstone National Park numerous legal loopholes will authorize widespread wolf killing
.

Americans widely hailed the return of wolves to the Northern Rockies two decades ago as a triumph of the Endangered Species Act, but now this ‘War on Wolves Act’ would allow for the same unregulated killing that nearly wiped out the species in the first place.
Politicians should not meddle in the science-based listing status of a particular species at any stage, but now is an especially bad time as these cases are still playing out in the courts. We urge those who support the protection of wolves to call their senators and representatives and tell them to vote down this lethal legislation.”

Source

The System Is Normalizing Cannibalism ~ Truthstream Media


Ed. Note: Signs & Portents: Make no doubt about it, it’s not about a dystopian society spiraling out of control – this is a spiritual war against consciousness.

The End Game: A harvesting of souls….

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Not sure what else to say but I think I’m going to go outside and stare at a tree now, as my dad would say… Please support us on Patreon, read our bigger goals here: https://www.patreon.com/truthstreammedia

Truthstream Can Be Found Here:
Website: http://TruthstreamMedia.com
FB: http://Facebook.com/TruthstreamMedia
Twitter: @TruthstreamNews
DONATE: http://bit.ly/2aTBeeF
Amazon Affiliate Link (help support TSM with every Amazon purchase, no cost to you!): http://amzn.to/2aTARRx
Newsletter: http://eepurl.com/bbxcWX
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*­~*~*~*~*~

Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.

Linda Moulton Howe and Barbara Lamb – NEW Evidence of Galactic War? (CLE March 2017)


Linda Moulton Howe and Barbara Lamb sit down with Alexis Brooks to discuss the possibility of a galactic war. But is it happening above our heads or below our feet?

According to Linda, mysterious “BIG BOOMS” being reported by people worldwide have been happening since 2011 and the increase in these anomalous booms may be indicating a war taking place underground between humans and ET’s.

We discuss the scope of agendas certain ET races have toward humanity. Are their intentions good, bad, or a bit of both?

This episode was filmed on-location at the 15th Annual Conscious Life Expo in Los Angeles in February of 2017.

Visit the website of Linda Moulton Howe at: http://www.earthfiles.com

Visit the website of Barbara Lamb at: http://barbaralambmft.com/

Find ALL of our show archives at: http://www.higherjourneys.com/hjradio

*** Please support Higher Journeys at: http://www.higherjourneys.com/donate ***

“US Air Force Officials Investigate Claims of Secret Navy Space Program” by Dr Michael Salla


usaf-investigates-navy-ssp

Officials from a highly classified U.S. Air Force space program that operates a space surveillance system around the Earth, are seriously investigating whistleblower claims, especially those stating that the U.S. Navy has secretly developed a parallel space program with kilometers-long craft belonging to eight battle groups capable of deep space operations.

According to secret space program whistleblower, Corey Goode, a senior official from the Air Force program who he calls “Sigmund”, has been conducting “information exchanges” with Goode to learn about the alleged Navy space program and rumors of it cooperating with Nordic and other extraterrestrial groups,

Previously, Goode reported that he first encountered Sigmund in a series of military abductions that began in January 2016, when a triangular shaped antigravity spacecraft landed near his Texas home, and two Air Force personnel from the vehicle forcibly took him into the craft. Goode was subsequently interrogated and chemicals were injected into him to force him to reveal the source of his information.

After publicly emerging in March 2015, Goode’s claims had come to the attention of a highly classified Air Force Space Program, which closely cooperates with other U.S. military entities such as the National Reconnaissance Office, the National Security Agency and the Defense Intelligence Agency. Goode calls this interagency collaboration the Military Industrial Complex Secret Space Program (MIC SSP).

The MIC SSP is entirely separate to a more advanced Navy Space Program known as “Solar Warden”, which Goode says he served in during a “twenty year and back” tour of duty from 1987 to 2007. In previous reports, Goode has discussed at length the activities of Solar Warden and its interactions with visiting extraterrestrial civilizations.

During the initial abductions, Sigmund was trying to ascertain the source of Goode’s information which had revealed highly classified information about the MIC SSP. In earlier reports, Goode also described how Sigmund and his subordinates chemically forced Goode to out several operatives working for the Solar Warden program.

 

The nature of Sigmund’s interrogations of Goode began to significantly change when Sigmund determined that Goode’s information was, at least in part, accurate, and that he was not part of a disinformation program belonging to a rogue element of the MIC SSP.

Sigmund subsequently began an “information exchange” with Goode that first occurred in “meetings” during the latter part of 2016. Goode was given information about Antarctica and the intense power struggle within the U.S. national security system involving the 2016 Presidential election. Goode wrote a report about one of these information exchanges that was published on December 11, 2016. READ MORE

Secret Presidential Memorandum issued to Declassify Anti-aging & Free Energy Technologies by Dr Michael Salla o


 

trump-signs-memorandum1

According to secret space program whistleblower, Corey Goode, President Donald Trump issued a highly classified Memorandum soon after his January 20th inauguration ordering the release of group of classified patents concerning anti-aging and health, along with free energy technologies. The Top Secret Memorandum was sent to the Department of Defense and the Intelligence Community, and due to its classification status it will not be accessible to major media for reporting.

The information received from Goode comes from a senior official in an interagency secret space program comprising the USAF, NRO, NSA, DIA which he describes as the Military Industrial Complex Secret Space Program (MIC-SSP). The official, whom he calls “Sigmund”, is investigating Goode’s claims and conducting an “information exchange” with Goode in the process (see Part One).

On March 16, Goode briefed me about his ongoing meetings with Sigmund and/or his two subordinates. The information provided by Goode was originally slated for release in an article, “Endgame III”, as the sequel to the popular Endgame II article and video. However due to the urgency of releasing this information without delay, it was passed on to me to get it out now.

In one of his “meetings” with Sigmund (and/or his subordinates) in late January, Goode was told about Trump issuing a Presidential Memorandum to declassify over 1000 patents from a pool of over 5000. Most of the 1000 patents deal with anti-aging and health technologies, yet some deal with material science and biochemistry and a few involve free energy inventions.

These technologies are widely used in a number of secret space programs, and the patents dealing with these have been repressed under national security orders. The USPTO has issued Federal Regulations that govern when patents are classified on the grounds of national security, and subsequently withheld from the general public:

[W]henever the publication or disclosure of an invention by the publication of an application or by the granting of a patent is, in the opinion of the head of an interested Government agency, determined to be detrimental to national security, the  Commissioner for Patents at the United States Patent and Trademark Office (USPTO) must issue a secrecy order and withhold the grant of a patent for such period as the national interest requires. A patent will not be issued on the application as long as the secrecy order is in force. If a secrecy order is applied to an international application, the application will not be forwarded to the International Bureau as long as the secrecy order is in force.

When a Department of Defense entity or a member of the Intelligence Community consider a patent to be a threat to national security, then the Patents Commissioner will issue a secrecy order preventing the patent from being publicly released.

The current number of patents that have been classified are approximately 5700 according to the U.S. Patent and Trademark Office (USPTO), which matches the information given to Goode by Sigmund.

As the above table shows, the number of secret patents that are declassified each year has averaged roughly 0.5 percent annually.

Goode learned that the Pentagon and Intelligence agencies told Trump it would take 10 years to release them, but Trump told them to get it done within two to three years. READ MORE

MSM says “Secret Service Laptop Stolen” – Is This Attempt to Set Up a 3/22 False Flag? Destroying The Illusion


Ed. Note: We’re approaching the season of sacrifices…thru the first week of May there are several key dates they may be shooting for. Please share, lets keep calling them out on their shenanigans, on some levels our due diligence appears to be making a difference. Blessings, {~A~}

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

What kind of shenanigans are these Deep State fools up to now? Are they hiding their plans in plain sight? There are some interesting symbolic dates coming up…

CNN Secret Service Laptop article – https://goo.gl/gdRrQC
Stillness in the Storm blog post: “The 40-Day Season of Sacrifice: March (19th or 22nd) to May 1st | Manipulating the Collective Consciousness of Humanity Using Mass Black Magic Rituals” – https://goo.gl/Ipr1n9
What is the real meaning behind The Number 322 – to The Illuminati – https://goo.gl/IzaV7h


_______________________________________________

***SUPPORT MY DISCLOSURE AND TRUTH SHARING HERE***
– Thank you to all who do –
Patreon – https://www.patreon.com/jordansather
Paypal – https://www.paypal.me/JordanSather
.
Health Coaching website: http://bit.ly/2jcx1s8
eBooks:
Posturology – http://amzn.to/2h5ZVay
.
DTI Twitter: https://twitter.com/DestroyIllusion
DTI Facebook: https://www.facebook.com/destroyingth…

Geoengineering Watch Global Alert News, March 18, 2017 ( Dane Wigington GeoengineeringWatch.org )


http://GeoengineeringWatch.org
TO READ OR POST COMMENTS ON THIS VIDEO, PLEASE GO DIRECTLY TO THE ARTICLE http://www.geoengineeringwatch.org/ge…
The power structure’s all out assault on countless fronts continues to accelerate. Recent studies state that fully half the adults in America are chronically ill. US invasions of foreign nations continue unabated with troops now being sent into Syria. The US Navy is planning to dump 20,000 tons of heavy metals and explosives into our oceans. The Trump administration is attempting to dismantle any and all forms of environmental protection and monitoring, this is exactly what the geoengineers want. A recent report discloses that the oil industry is benefiting from 5.3 trillion in subsidies annually. The oceans are absorbing so much Co2 that the acidification of the seas is unparalleled over at least the last 300 million years. Massive marine ecosystem collapse is occurring all over the globe. If the oceans die, we die. NBC has just published the following headline, “Climate Engineering: Scary idea should be tried out” (as if the weather warfare assault has not already been going on for over 70 years.  Where is Mr. Trump? He has just made his 9th trip to one of his golf courses since taking office.
Many are beginning to awaken to the peril that is surrounding us from all sides. This being said, the pace of the wake-up must increase if we are to have any chance altering our trajectory before total societal collapse commences. The threats we face are existential, all are needed in the critical effort to sound the alarm. We will sink or swim together.
https://www.facebook.com/dane.wigingt…

Ralph Ring Teleportation and Esoteric Consciousness


Published on Aug 24, 2016 Ralph Ring has had an ongoing interest and participation in areas of Esoteric & Ether Knowledge and Technologies. After leaving the US Army in 1954, he began an ongoing search for answers to many questions concerning the Unknown. In brief, he worked for a US Government funded research facility in the areas of Magnetic’s, Levitation and Teleportation. His search eventually led him to the Realities and participations of Teleportation and Esoteric Consciousness.
.
Ralph is a Natural Scientist and a Creative Technician who in the early 1960’s worked together with Otis T. Carr (A Prodigy of Nikola Tesla)and a team of dedicated Scientists on Alternative Technologies, one of which was Teleportation. He was One of three to pilot a Man Made Spaceship, the OTC-X1. His Dream since birth has and is to produce Levitating Homes, Cities and Countries.

Janet Lessin and Sasha Lessin http://www.aquarianradio.com

 

Ralph Ring Flying the OTC-X1 Spacecraft

In a dramatic experiment, Ring co-piloted a 45 foot disk a distance of ten miles, arriving at their destination instantaneously. Published Dec 13, 2012

Anti-Gravity & Conscious Awareness | Ralph and Marsha Ring, Global BEM

How consciousness powers a free energy New Earth: Ralph & Marsha Ring with Host Patty Greer


“Everyone is everywhere” How non-local Love consciousness powers a free energy New Earth: Ralph & Marsha Ring with Host Patty Greer
By Alfred Lambremont Webre
WATCH VIDEO: https://youtu.be/0QpmIyyD-As
NewsInsideOut ARTICLE & LINKS
https://newsinsideout.com/2017/03/eve…
NewsInsideOut ARTICLE & LINKS

Visit Ralph & Marsha Ring’s website:

http://bluestarenterprise.com/

EXPOSE THE DOJ PEDOGATE COVER UP: MARCH ON D.C. 3/25/2017 ~ SGTreport.com


On November 4, 2016 Blackwater founder Erik Price told Bretibart News that the NYPD was ready to make arrests in the Anthony Weiner case and wanted to do a press conference announcing the warrants and the additional arrests they were making , but received “huge pushback” from the Justice Department. According to inside sources, the more than 500,000 emails found on Anthony Weiner’s computer implicate the Clintons and associates in child trafficking and worse. WHY more than FOUR MONTHS later have there been NO arrests? It’s time to march on Washington DC, this MARCH 25TH, to raise awareness of this miscarriage of justice.

Join us on March 25th at 11am: INVESTIGATE PIZZAGATE, A PEACEFUL Demonstration in DC at The White House/ Lafayette Park

Here’s the Go Fund Me page for this event:
https://www.gofundme.com/investigate-…

If you’d like to show SGT Report a little love, our Bitcoin address is: 1B34t2rydbgnXDokAw6cQGpi7MNx6PffL1

Copyright 2017 SGTreport.com *Do not re-upload in whole or in part.* Embedding is always welcome. Thanks!

For REAL news 24/7:
http://sgtreport.com/
http://thephaser.com/
http://thelibertymill.com/

MUSIC CREDITS:
Epidemic Sound: “Who’s There 1”, paid license for You Tube use

The content in my videos and on the SGTbull07 – SGTreport.com channel are provided for informational purposes only. Use the information found in these videos as a starting point for conducting your own research and conduct your own due diligence BEFORE making any significant investing decisions. SGTbull07 – SGTreport.com assumes all information to be truthful and reliable; however, I cannot and do not warrant or guarantee the accuracy of this information. Thank you.

BREAKING: A “Pedogate Coin” from the US Mint! (Bix Weir)


The US Mint has just released a commemorative coin honoring one of the largest pedophile coverups in US history! I feel sick to my stomach after making this but it has to get out there to END this sick game.

Max Igan: The Control Grid Continues And Nothing Has Changed


NASA/NWO HAS STARTED RE-WRITING HISTORY.


WERE HERE, HERE IT IS. THE CULT OF SPACE AND SCIENCE HAS STEPPED INTO THE ARENA WITH A KNOCKOUT BLOW. THEY ARE NOW NATURAL FUN EASY TO NAME “NEW” CLOUDS. TEACHING CHILDREN THAT ALL THE SHIT THEY ARE CLOGGING THE SKIES , KILLING THE BEES, KILLING THE TREES WITH ARE SIMPLY NATURAL, MAKING VIDEOS TRYING TO AWAKEN THE SHEEP, JUST GOT EVEN HARDER.
RICHIE FROM BOSTON, RFB NASA, CHEMTRAILS. LIES
http://scool.larc.nasa.gov/pdf/1-Page… NASA
https://www.youtube.com/watch?v=DE4-s… EYESPYs CHANNEL

HELP THIS CHANNEL GROW AND REACH MORE PEOPLE.
https://paypal.me/RichieFromBoston
I WILL NEVER COMPROMISE THE CHANNEL BY JOINING A NETWORK AND YOUR HELP WOULD BE APPRECIATED. TY
RFB

Disclaimer: All works by RichieFromBoston are criticism, comment, news reporting, teaching and research.
-All footage taken falls under ”fair use” of the Digital Millennium Copyright Act (1998). Therefore, no breach of privacy or copyright has been committed.
-FAIR USE STATEMENT
This video may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This material is being made available within this transformative or derivative work for the purpose of education, commentary and criticism, is being distributed without profit, and is believed to be “fair use” in accordance with Title 17 U.S.C. Section 107

David Wilcock | Corey Goode: The Antarctic Atlantis [MUST SEE LIVE DISCLOSURE!]


Are we about to hear that ancient ruins have been found in Antarctica? Is there an Alliance working to defeat the greatest threat humanity has ever faced on earth? Could the Antarctic Atlantis be part of a full or partial disclosure?

Join David Wilcock on a thrill ride of discovery, beginning with Part One where he presents data on the Secret Space Program and shares the stage with legendary insider Corey Goode. This is the best public summary David and Corey have done of this amazing story that has captivated the UFO community.

Part Two begins at the 53-minute mark, with David connecting the dots between intel from multiple insiders to arrive at a stunning conclusion — that we are on the verge of major new releases of information that will transform everything we thought we knew about life on earth.

A civilization of “Pre-Adamite” giants with elongated skulls appears to have crash-landed on a continent we now call Antarctica some 55,000 years ago.

Various groups we collectively call the Alliance are working to defeat the Cabal / Illuminati / New World Order, thus making the headlines crazier by the day.

If the Alliance succeeds, their plan is now to begin the disclosure process by telling us there was a civilization in Antarctica. We are already seeing multiple, compelling hints of this in corporate media.
Find out what the insiders are telling us and help spread the word!

This is a two-and-a-half-hour excerpt from David’s Friday and Saturday presentations at the Conscious Life Expo 2017. In their original form they run six hours. David also spoke for three hours on Monday, presenting an incredible new model of the Cosmos based on sacred geometry — and proving that the Sun is going to release a DNA-transforming burst of energy in our near future.

Go to http://consciouslifestream.com to order the complete nine-hour set of videos, known as the David Wilcock Trilogy Pass.

Reposting this video is stealing, so please share the link with your friends but do not re-upload it anywhere else. Our team does issue takedowns and it could lead to the loss of your channel.

Please help us by subscribing to this channel! And make sure to check out David on Gaia at http://gaia.com/davidwilcock. You can see everything he has on the network, along with 7000 other unique metaphysical and Seeking Truth titles, for 99 cents in the first month.

Lastly, sign up at http://dwilcock.com to be notified of new articles and videos upon release, and to get free gifts and Ascension updates from David as they become available.

Thank you for your support!

Hawaii Reacts To New Trump Executive Order (Mar. 6, 2017) Tulsi Gabbard


Note: Absolutely love Tulsi Gabbard, Hawaii’s pride and joy! IMO she’s someone to watch, would love to see her run for President. She has the heart, integrity, perseverance and intellect to lead America into the new paradigm.

Vault 7: CIA Hacking Tools Revealed


Ed. Note: Me thinks it’s time for the residents of the US wake-up and unite to entirely dismantle the CIA and re-purpose some of their tech for positive purposes. Like monitoring our public servants, corporate structures and military industrial complex to ensure they’re SERVING the public good. Blessings, {~A~}

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

 

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

 

Examples

 

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

 

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE. 

Frequently Asked Questions

 

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

 

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

 

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

 

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

 

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

 

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

 

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

 

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

 

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

 

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

 

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

 

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

 

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

https://wikileaks.org/ciav7p1/https://wikileaks.org/ciav7p1/