Guest Posting

If you wish to write and/or publish an article on Operation Disclosure all you need to do is send your entry to UniversalOm432Hz@gmail.com applying these following rules.


The subject of your email entry should be: "Entry Post | (Title of your post) | Operation Disclosure"

- Must be in text format
- Proper Grammar
- No foul language
- Your signature/name/username at the top

Send your entry and speak out today!

News Alerts

RV/INTELLIGENCE ALERT - January 21, 2018


The Alliance detects no signs of Cabal/MIC activity since Japan's false missile alert on Jan. 16.


5 days of silence on the war front.


The Alliance will continue to monitor the planet for unusual activity to ensure the Cabal/MIC do not succeed in another 9/11 type event.


The Cleanup of corruption in banking and politics is still in progress.


Once the corruption cleanup is complete and it is safe to proceed -- the Chinese Elders will receive the blessing to give the final authorization to the individual in charge of the final code sequence.


This individual will then enter the codes into the new financial system thus unlocking the funds required for the RV.


The Chinese Elders have informed White Hats that they expect finalization of the corruption cleanup within 2 weeks time.


It is Grandfather's blessing that the Chinese Elders must receive before giving the final authorization.


Grandfather is the mastermind behind the rehydration of the humanity.


---


FOR MORE INFORMATION ABOUT THE RV/GCR VISIT:


http://www.dinarchronicles.com/intel.html


---

Featured Post

Restored Republic via a GCR as of Jan. 21, 2018

Restored Republic via a GCR Update as of Jan. 21 2018 Compiled 1:00 am EDT 21 Jan. 2018 by Judy Byington, MSW, LCSW, ret, CEO, Child Abuse...

Tuesday, March 7, 2017

Vault 7 Unveiled: Largest Publication of Confidential CIA Documents

Wikileaks Unveils 'Vault 7': "The Largest Ever Publication Of Confidential CIA Documents"; Another Snowden Emerges


Mar 7, 2017 7:56 AM

WikiLeaks has published what it claims is the largest ever release of confidential documents on the CIA. It includes more than 8,000 documents as part of ‘Vault 7’, a series of leaks on the agency, which have allegedly emerged from the CIA's Center For Cyber Intelligence in Langley, and which can be seen on the org chart below, which Wikileaks also released:


Source: Zero Hedge | by Tyler Durden

A total of 8,761 documents have been published as part of ‘Year Zero’, the first in a series of leaks the whistleblower organization has dubbed ‘Vault 7.’ WikiLeaks said that ‘Year Zero’ revealed details of the CIA’s “global covert hacking program,” including “weaponized exploits” used against company products including “Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.”

WikiLeaks tweeted the leak, which it claims came from a network inside the CIA’s Center for Cyber Intelligence in Langley, Virginia.

Among the more notable disclosures which, if confirmed, "would rock the technology world", the CIA had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”

Another profound revelation is that the CIA can engage in "false flag" cyberattacks which portray Russia as the assailant. Discussing the CIA's Remote Devices Branch's UMBRAGE group, Wikileaks' source notes that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

"With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques."

As Kim Dotcom summarizes this finding, "CIA uses techniques to make cyber attacks look like they originated from enemy state. It turns DNC/Russia hack allegation by CIA into a JOKE"

Read More:

Receive News from Operation Disclosure via Email

Shoutbox Disclaimer

Please be advised that the Shoutbox is NOT moderated. Use it at your own will.