Guest Posting

If you wish to write and/or publish an article on Operation Disclosure all you need to do is send your entry to applying these following rules.

The subject of your email entry should be: "Entry Post | (Title of your post) | Operation Disclosure"

- Must be in text format
- Proper Grammar
- No foul language
- Your signature/name/username at the top

Send your entry and speak out today!

News Alerts


A Cabal-MIC hidden underground facility was discovered under Sugarloaf Mountain in West Cork.

This facility was discovered after the interrogation of a Cabal-MIC agent that was recently apprehended.

Construction of another CERN portal was discovered at the facility. Two giant Tesla capacitors and a super computer were also found at the facility which were designed to operate the CERN portal.

This time, the CERN portal was to be used for the Cabal to escape off-planet.

The Alliance destroyed the facility along with all of it's contents.

(Note: The search for hidden underground facilities does not hinder the timing of the RV in any way. These operations will still continue Post-RV and Post-GESARA.)

The RV window opened as of yesterday, the 17th.

Banks were receiving back screen rates from the new financial system as a test.

The new financial system will cause a major correction in the stock market which is planned to begin before the 26th.

The RV will be released before the major correction occurs.

The longer it takes, the smoother the transition. The transition was never supposed to be easy. It was originally going to be rough. The Alliance have been working hard to soften the blow of the transition process as much as possible. Their goal is to make it a smooth transition.




Featured Post

Restored Republic via a GCR as of March 19, 2018

Restored Republic via a GCR Update as of March 19 2018 Compiled 12:01 am EDT 19 March 2018 by Judy Byington, MSW, LCSW, ret. CEO, Child Ab...

Saturday, March 25, 2017

#Vault7: Wikileaks Release Shows CIA Infected Apple

Source: We Are Change | by Cheryl Yurkowski


Included in these documents are projects such as "Sonic Screwdriver", among others. Explained by the CIA, this project is a "mechanism for executing code on peripheral devices while a mac laptop or desktop is booting" allowing an attacker to boot its attack software, as an example, from a USB stick, "even when a firmware password is enabled". The Sonic Screwdriver infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.


"DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants.


Documents included on the "Triton" MacOSX malware, it's infector "Dark mallet" and it's EFI-persistent version "DerStake" can also be found in this release. DerStake1.4 manual released today dates to 2013, other Vault 7 documents display that as of 2016 the CIA is continuing to rely on and update these systems. The production of DerStake2.0 is currently taking place.


The release also contains the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool", for the Apple iPhone. Note that NightSkies reached 1.2 by 2008 and is expressly designed to be physically installed onto factory restored phones. The iPhone supply chain is targeted and has been infected by the CIA since 2008.

While in the custody of a target, CIA assets are sometimes used to physically infect systems. It is very likely that many CIA physical access attacks have infected the targeted organization's supply chain by interdicting mail orders and other shipments. Meaning to open, infect and resend which then leaves the United States or otherwise.

Receive News from Operation Disclosure via Email

Shoutbox Disclaimer

Please be advised that the Shoutbox is NOT moderated. Use it at your own will.