Guest Posting

If you wish to write and/or publish an article on Operation Disclosure all you need to do is send your entry to UniversalOm432Hz@gmail.com applying these following rules.


The subject of your email entry should be: "Entry Post | (Title of your post) | Operation Disclosure"

- Must be in text format
- Proper Grammar
- No foul language
- Your signature/name/username at the top

Send your entry and speak out today!

News Alerts

RV/INTELLIGENCE ALERT - February 21, 2018


All HAARP repeaters located in Wyoming were successfully destroyed.


The Cabal's attempt to set off Yellowstone Caldera was thwarted.


Several dark energy field emitters were also destroyed in the process near and around Yellowstone National Park.


Alliance Ghost Teams obtained further documents from one of the hidden underground Cabal outposts before they were all destroyed.


These documents revealed the location of another outpost under Torc Mountain, Ireland.


The documents also included construction plans of another portal gate at this outpost.


The Alliance have dispatched Ghost Teams to the location in Ireland.


The wild goose chase continues.


The collapse of the financial system remains imminent.


Whether the Cabal have been totally neutralized or not, the Alliance will release the RV if the financial system is about to collapse.


The finger is on the trigger for the RV release. Ready to replace the old financial system with the new quantum financial system at a moments notice.


---


FOR MORE INFORMATION ABOUT THE RV/GCR VISIT:


http://www.dinarchronicles.com/intel.html


---

Featured Post

Restored Republic via a GCR as of Feb. 21, 2018

Restored Republic via a GCR Update as of Feb. 21 2018 Compiled 12:01 am EDT 21 Feb. 2018 by Judy Byington, MSW, LCSW, ret, CEO, Child Abus...

Tuesday, March 7, 2017

Vault 7 Unveiled: Largest Publication of Confidential CIA Documents

Wikileaks Unveils 'Vault 7': "The Largest Ever Publication Of Confidential CIA Documents"; Another Snowden Emerges


Mar 7, 2017 7:56 AM

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA's Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:


Source: Zero Hedge | by Tyler Durden

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, "would rock the technology world", the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

"With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."

As Kim Dotcom summarizes this finding, "CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE"

Read More:

Receive News from Operation Disclosure via Email

Shoutbox Disclaimer

Please be advised that the Shoutbox is NOT moderated. Use it at your own will.