Receive News from Operation Disclosure via Email

Guest Posting

If you wish to write a post/article on Operation Disclosure all you need to do is send your entry to UniversalOm432Hz@gmail.com applying these following rules.

The subject of your email entry should be: "Entry Post | (Title of your post) | Operation Disclosure"

- Must be in text format
- Proper Grammar
- No foul language
- Your signature/name/username at the top

Send your entry and speak out today!

News Alerts

RV/INTELLIGENCE ALERT - August 22, 2017

[ WINNERS - SITREP - TUESDAY ]

FINAL ALGORITHMIC RATES LOCKED.

THE ELDERS HAVE WON. TRUMP, RYAN, TRN's, IMMIGRATION, MILITARY, GOLD, AND GESARA.

RYAN IS CONVENIENTLY BECOMING MORE PRESIDENTIAL BY THE DAY SINCE BEING CHOSEN AS INTERIM PRESIDENT IN OCTOBER OF 2015.


READ FULL SITREP


[ SHOWTIME - SITREP - TUESDAY ]

EMERGENCY BROADCAST SYSTEM TEST WENT OFF AT 1:41 AM EDT.

GLOBAL TEST RUN OF THE RV LAST NIGHT HENCE WHY EBS WENT OFF BEFORE 2 AM EDT.

MASSIVE ANNOUNCEMENT COMING IN SEPTEMBER RELATING TO GESARA.

FINANCIAL PORTION OF GESARA TO BE COMPLETED PRIOR TO THE ANNOUNCEMENT FOR SAFETY REASONS.

THE REPUBLIC IS SLOWLY BEING INTRODUCED TO THE PUBLIC.


READ FULL SITREP


---


FOR MORE INFORMATION ABOUT THE RV/GCR VISIT:


http://www.dinarchronicles.com/intel.html


---

Featured Post

Restored Republic via a GCR as of Aug. 23, 2017

Restored Republic via a GCR Update as of Aug. 23 2017 Compiled 12:28 am EDT 23 Aug. 2017 by Judy Byington, MSW, LCSW, ret, CEO, Child Abus...

Saturday, April 22, 2017

(Video) Wikileaks “Vault 7” Revelations Continue to Terrify



Source: Anitmedia | by Roqayah Chamseddine



Despite facing widespread international denunciation, Wikileaks has remained faithful in blowing the whistle on information that would have remained hidden from the public. These secrets have helped to expose many layers of the global state security apparatus and aided in shaping the discourse surrounding government and corporate transparency.

We're revolutionizing the news industry, but we need your help! Click here to get started.

On April 7, Wikileaks released 27 documents from the CIA's Grasshopper framework, a platform used by the agency to infect electronic devices such as phones, computers, and televisions for surveillance purposes. This information dump was part of a series known as "Vault 7," which targets the agency's covert hacking program. "This extraordinary collection," Wikileaks writes, "which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA."

According to the documents provided by Wikileaks, knowledge of the CIA's invasive surveillance tools wasn't confined to the agency, or even the National Security Agency. In fact, the details of these exploits were bought and shared by Britain's Government Communications Headquarters, as well as other intelligence agencies.

So what tools does the CIA have in its surveillance arsenal? Over 8,000 documents found in the "Vault 7" series reveal weaponized malware, trojans and viruses that could be used to spy on both domestic and foreign entities, impacting a variety of seemingly harmless household devices. Apple iPhones, Windows PCs and even Samsung TV sets can be used to conduct surveillance on anyone the CIA chooses to spy on. For example, one program named "Weeping Angel" details methods that can be used to hijack a Samsung F8000 TV in order to make it appear to be off when it is actually powered on.

The claim that your TV could be used to spy on you is no longer one of conspiracy. It is now our reality. "By hiding these security flaws from manufacturers like Apple and Google, the CIA ensures that it can hack everyone, at the expense of leaving everyone hackable," WikiLeaks says. And these, by all accounts, are just the tip of the iceberg.

The "Vault 7" series, which has been described as being the largest leak of its kind targeting the CIA, originated from an "isolated, high-security network" within the CIA's Center for Cyber Intelligence. The documents it contains were revealed to Wikileaks by way of an undisclosed source, though they've noted that their source could be a former U.S. government hacker or CIA contractor.

After the "Vault 7" series was first published, Trump administration spokesman Sean Spicer revealed the White House was concerned, and that "[a]nybody who leaks classified information will be held to the highest degree of law." Despite these threats, WikiLeaks continues to release classified documents, showing us at least some of the secrets behind the CIA's curtain.

Shoutbox Disclaimer

Please be advised that the Shoutbox is NOT moderated. Use it at your own will.