Guest Posting

If you wish to write and/or publish an article on Operation Disclosure all you need to do is send your entry to applying these following rules.

The subject of your email entry should be: "Entry Post | (Title of your post) | Operation Disclosure"

- Must be in text format
- Proper Grammar
- No foul language
- Your signature/name/username at the top

Send your entry and speak out today!

News Alerts

RV/INTELLIGENCE ALERT - February 19, 2018

Alliance Ghost Operatives uncovered blueprints for prototype weapons from the Cabal-MIC D.U.M.B. located near Sawtooth Range before destroying it.

Attached to the blueprints were documents revealing plans for a particular prototype weapon being constructed at a hidden underground outpost located under Gannett Peak, Wyoming.

This particular prototype weapon is a long range, low frequency repeater which amplifies and re-routes standard HAARP signals.

This was a major concern for the Alliance due to the fact Gannett Peak is close to Yellowstone Caldera.

The Alliance have located this outpost and deployed Ghost Operative Teams to neutralize and destroy it as of 12:39 PM EST today.

The D.U.M.B. at Sawtooth Range was the last "recorded" Cabal-MIC D.U.M.B. that was built.

Cabal-MIC hidden underground outposts may still remain.

Note: These hidden underground outposts are not classified as D.U.M.B's.

All threats must be neutralized prior to bringing in the new financial system (RV/GCR) and beginning the transition event into Nova Earth.

The Alliance are racing against time as the window of opportunity to begin the transition event this month is closing fast.




Featured Post

Restored Republic via a GCR as of Feb. 19, 2018

Restored Republic via a GCR Update as of Feb. 19 2018 Compiled 12:01 am EDT 19 Feb. 2018 by Judy Byington, MSW, LCSW, ret, CEO, Child Abus...

Friday, March 10, 2017

Wikileaks Reveals that the CIA are Spying on People Through their Smart TV's

Source: Truth Theory | by Jess Murray

Wikileaks just unveiled the largest ever publication of confidential CIA documents, which has been named "Vault 7". The recent publication consists of 8,761 documents which Wikileaks' Founder Julian Assange has claimed embodies, "the entire hacking capacity of the CIA." The anonymous source of Wikileaks has said in a statement that they would like to spur a public debate regarding the "security, creation, use, proliferation and democratic control of cyberweapons."

Wikileaks released part one on Tuesday March 7, 2017, which is part of a series of leaks on the US Central Intelligence Agency (CIA), which is titled "Year Zero". In their initial Vault 7 Press Statement they state exactly how the documents got into their hands: "Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive."

Reports claim that the CIA has been receiving priority from the US government over the NSA since 2001, which has given the CIA the financial freedom to create its own group of hackers. By the end of 2016, the CIA's hacking operations department had more than 5,000 registered users with more than a thousand hacking systems and viruses.

The Year Zero files contain information about the CIA's global covert hacking system, including "weaponized exploits" used against company products including "Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones." The CIA also has the capability to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram. Reports state that government hackers can even hack into Android phones and collect "audio and message traffic before encryption is applied."

Vault 7 is also said to expose that the CIA have the ability to engage in false flag cyberattacks that make it look like Russia is the assailant. Wikileaks' source states that it "collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation." Another program that the reports uncover is "Weeping Angel", which is designed by the CIA's Embedded Devices Branch (EDB), and essentially turns smart TVs into their own personal microphones.

The project has the ability to put the TV into a "fake off" mode, so that the TV looks like it's off when it's really on. The purpose of putting a TV in "fake off" mode it so that it can act as a bug, which records conversations and spies on people, before sending that information over the internet to a CIA server.

The release of this information by Wikileaks is just the beginning, as they have confirmed that this is merely "part one". According to Assange, "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade."

IMAGE CREDIT:dolgachov / 123RF Stock Photo


Receive News from Operation Disclosure via Email

Shoutbox Disclaimer

Please be advised that the Shoutbox is NOT moderated. Use it at your own will.