Book Review: A.D. After Disclosure by Richard Dolan & Bryce Zabel | #SmartReads

AfterDisclosure.jpg
TheBreakaway | BreakawayConciousness
Zy Marquiez
May 17, 2017

A.D. After Disclosure – When The Government Finally Reveals The Truth About Alien Contact by Richard Dolan & Bryce Zabel is a book for tomorrow, a book for the future.  A.D. is a book that seeks to investigate the possible outcomes of what the nascent stages of a post-disclosure will look like.

The book is based on the following premise:

“Most people now reject the theory that all sightings can be explained away as weather balloons, swamp gas, flares, ball lighting, or mass hallucination.  Instead, they have settled on one conclusion:  Some UFOs appear to be intelligently controlled physical craft of some kind from some place that is not here.”[1]

With that premise firmly established, Dolan  & Zabel seek to answer the following questions:  Whenever secrecy on UFOs and alien contact ends, what will take place?  How will the world, and governments, react?  How will commerce, business, religions, et al, all react?

Countless scenarios and implications abound, and that is why a book like this was not only needed, but carried out.  Now, in attempt to prepare the world for what could ensue post-disclosure, the authors leave no stone unturned in the ramifications that will follow ‘the day’.  Sifting through everything from the possible events beginning in the initial day and forward, the authors bring about rather sensible and grounded speculations on what that process will be like.

Going back in time a bit, the authors also seek to reconstruct  how entire secrecy structure began, how it remains in place, and what the cover-up looks like.  From there, points for, and points against disclosure are analyzed by the authors as they attempt to engineer the mentality that those pulling the strings have on this trenchant issue.  Covered also are moments in UFOlogy where it seemed like truth waves might have been made, and possible disclosure could have ensued, but ultimately failed.  Thankfully, the book doesn’t just stop there.

More importantly, also ruminated upon are the who ‘they’ are, and the how.  Additionally, the Breakaway Civilization is examined in a couple of instances, as they are in large part somewhat responsible for this searing secrecy that’s taken place since the late 40’s and early 50’s.

The blaring blowback that’ll take place post-disclosure is covered from nigh every angle.  Everything from panic, fear, truth commissions, changes in the energy paradigm, legal issues, media, economics, psychology, pop culture, and more, are all given at least a cursory glance as to how they might integrate into the whole avalanche of issues that will develop.

One salient component examined is also the CIA and the mainstream media’s role in making sure true investigations and news doesn’t break to the masses.  Of course, this shouldn’t be surprising since the mainstream media has been in bed with the CIA, as per Operation Mockingbird.

The authors note that:

“Some of this information came out during the 1970s, when the CIA admitted to having paid relationships with more than 400 mainstream American journalists.  Consider the possibilities available to any person or group covertly employing 400 journalists.  Although the CIA claimed it ended such relationships, it tacitly acknowledged the need to cultivate them in cases of national security…Former CIA Chief William Colby, a cold man who made his mark during the murderous Project Phoenix, who rose to the top of the Agency during the 1970s, and whose life ended in a boating “accident” on Potomac in 1995, once told a confident that every major media was covered by the long reach of the CIA.”[2]

Such are some of the reasons why this information has never been given a fair shot.  Of course, denial and ridicule became the M.O. du jour of the establishment of anybody that even dared question the subject of UFOs and anything paranormal.

After Disclosure also covers what type of political instability will ensue post-disclosure given how governments all over the world will be facing the wrath of the populace for having covered up such a subject up for decades.  The fury won’t stop there, however.  Academicians who didn’t take the subject seriously and even ridiculed people, as well as psychologists who didn’t take individuals allegations of disturbing incidents will also have to contend with an angry populace once the truth comes out full throttle.

Whenever the day comes, an endless tsunami of questions that will result.  Especially given how very solid evidence has been declassified in the past shows the US Government is taking this situation very seriously, and has for decades.  Some of these include: 1949 FBI Memo, the 1954 Maxwell AFB Emergency Report, the 1947 Twining Memo, the 1966 Intrusion at Minot Air Force Base, the 1976 Tehran Encounter, the 1967 Malmstrom AFB Incident, and many more documents.  These are all public record.

As individuals can gather, this subject, regarding whomever is behind the phenomena, is being taken extremely serious, as it should.  The problem of the public is being told one thing, while behind the scenes something more ominous is manifesting.

That said, this book really extends the breadth and scope of the analysis of a post-disclosure world in salient ways.   It is a book that should be regarded seriously, just as the rest of Dolan’s work, if for no other reason than there is immense growing evidence that keeps suggesting something is amiss.  The odds that “nothing” is taking place keeps gravitating to zero with every new account from a reliable witness that comes forth. The world has no reason to think this is ever going to stop.  At least not anytime soon.

As humanity seeps again into space in the coming decades, more and more strange events will happen.  In fact, we can already see how much NASA loves to whitewash documents and talk nonsense once anything of note happens.   NASA will surely have to answer for a lot, especially if what individuals like Donna Hare, who was a former Disclosure Project witness, says is true.”

As Dolan notes in his Secret Space Program & Breakaway Civilization book:

“She had a secret clearance during the early 1970s for NASA subcontractor Philco Ford, and was shown a satellite image of a distinct UFO.  It was explained to her that this technician’s job was to airbrush any evidence of UFOs out of photographs for NASA before they were made public.  She also learned from other employees at the Johnson Space Center that some of the astronauts had seen extraterrestrial craft on the Moon. This was in the 1970s, after the moon landings had taken place.  In Hare’s words, “I believe there were three such craft on the Moon when they landed.”[3]

With such evidence amassing, the more complex this charged subject becomes.  Be that as it may, we mustn’t pretend that the comptrollers will just disclose for no reason.  As the authors state, their hand will have to be forced somehow.  There is no ‘right’ time.  But when it happens, be prepared.  But have no fear.

Sometime in the future, the day will come that some government will have to admit the truth in respects to extraterrestrial life being factual.  Whenever that day comes, hysteria, panic, and speculation will fill the airwaves of all media on the planet.  When that happens, do you want to know what to expect, or not?  If you do, get this book.  That way, whenever whatever incident takes place happens, you will at least be ahead of the curve, and prepared for some of the probable circumstances that will follow.  This is NOT said to cause fear, but to bring awareness of an issue that will change mankind forever.

More than anything, this book is a call to action, for everyone who has ever taken this subject seriously, or who has thought about it at length.  The transformation that will take place of the planet [culturally, geopolitically, psychologically, emotionally, etc.] is something that should be thoroughly ruminated upon and discussed at length, even if it goes beyond people’s comfort zones.

Whenever a paradigm shift is about to take place, most individuals can’t see, or come to terms with what’s about to happen.  Thankfully, according to some polls most people believe in life out there, so a massive paradigm shift of ‘life out there’ should come as no surprise to many.  Still, though, if humanity is to be a responsible race, and transition into the Space Age that is to come in the coming decades, it has to take subjects such as this seriously.  This book helps greatly in that effort, because all the evidence points to humans not being alone.

If you’ve ever had a curious bone in your body about this subject, ruminate deeply upon getting this book.  It really does provide the firmest ground upon which an individual may stand in such a tumultuous subject.  The sooner individuals prepare for what’s the come, the easier the transition will be.

______________________________________________________________________
Footnotes:

[1] Richard Dolan & Bryce Zabel, A.D. After Disclosure – When The Government Finally Reveals The Truth About Alien Contact, pp. 17-18.
[2] Ibid., p. 57.
[3] Richard Dolan, The Secret Space Program & Breakaway Civilization, pp. 13-14.

___________________________________________________________
This article is free and open source.  All individuals are encouraged to share this content and have permission to republish this article under a Creative Commons license with attribution to Zy Marquiez and TheBreakaway.wordpress.com.
___________________________________________________________
About The Author:

Zy Marquiez is an avid book reviewer, researcher, an open-minded skeptic, yogi, humanitarian, and freelance writer who studies and mirrors regularly subjects like Consciousness, Education, Creativity, The Individual, Ancient History & Ancient Civilizations, Forbidden Archaeology, Big Pharma, Alternative Health, Space, Geoengineering, Social Engineering, Propaganda, and much more.

His other blog, BreakawayConsciousnessBlog.wordpress.com features mainly his personal work, while TheBreakaway.wordpress.com serves as a media portal which mirrors vital information nigh always ignored by mainstream press, but still highly crucial to our individual understanding of various facets of the world.

US Presidents Can Grant Immunity To Snooping Spies

Sharyl Attkisson reports on methods of covert surveillance

FakeNews
Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
By: Jon Rappoport
April 16, 2017

Government agents can’t legally spy on a US citizen? Do the spying in a ship outside the three-mile limit, in international waters.

This is just one way of skirting the law.

Sharyl Attkisson, former CBS investigative reporter, recently spoke with “a small group of reliable, formerly high-placed intelligence officials.” They tipped her to surveillance tactics in the arsenal of intel agencies.

Attkisson: “U.S. Presidents have the power to issue secret presidential directives that can authorize otherwise illegal acts (theoretically in the country’s best interests). These directives may come with pre-planned cover stories to be used in the event the operation is exposed, and they come with indemnity for those involved, giving them permission to lie about the operation or their involvement without fear of prosecution… The public will rarely know about such presidential directives since most who see them must sign agreements that promise nondisclosure and consent to polygraphs.”

That’s a blockbuster revelation.

Guaranteed immunity for those involved in the spying/surveillance operation (and other types of operations).

Plus permission for agents to lie about being involved.

All in the interest of “national security.” Unless it isn’t. Unless a president wants to enact revenge on a personal enemy, or commit a financial crime, or win an election, or protect a friend, or serve his elite bosses, or advance a corporate goal, or…pretty much anything.

He can act like a king.

One of Attkisson’s intelligence sources told her the following: “If the work of targeting an individual cannot be accomplished by government intel officers, it can be contracted out to third parties or to foreign parties who aren’t bound by U.S. law.”

Here’s a complete shady five-step method for spying. Attkisson:

“1. Locate a foreign target already under CIA surveillance.”

“2. Have a government agent use the foreign target’s phone and/or computer to make it look like the foreigner contacted the U.S. citizen whose communications are sought. The contacts can be benign, but they establish a record that falsely implies a relationship exists between the U.S. citizen and the foreign target.”

“3. The government agent can also mimic a communication back from the U.S. citizen to the foreign target, creating an appearance that the U.S. citizen initiated contacts. This could be favorable to justifying a warrant on the U.S. citizen later.”

“4. The U.S. citizen is now tied to the foreign entity and is now an ‘incidental’ collection target that can be surveilled in a ‘masked’ format. Although ‘masked,’ the surveilling agency knows the U.S. citizen’s identity.”

“5. If the U.S. citizen does anything that can be construed as illegal or suspicious, it’s possible the intel agency can then receive approval to surveil him directly rather than only ‘incidentally’.”

All these crooked methods and approaches to spying on US citizens are, of course, accompanied by other legal methods. And permission to pursue even the legal avenues can be obtained by hoax and fraud and special favor. Then there is the NSA, which spies on Americans as if it were a natural law, like the sun rising and setting.

The war on terror? That’s just a pretext to allow universal surveillance.
Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Top Ten Reasons To Doubt Official Story On Assad Poison-Gas Attack

fakenews
Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
Jon Rappoport
April 13, 2017

The sarin-gas attack story prompted the US missile strike on a Syrian runway. Here are the top ten reasons for doubting that story, and instead calling it a convenient pretext:

ONE: Photos show rescue workers treating/decontaminating people injured or killed in the gas attack. The workers aren’t wearing gloves or protective gear. Only the clueless or crazy would expose themselves to sarin residue, which can be fatal.

TWO: MIT professor Thomas Postol told RT, “I believe it can be shown, without doubt, that the [US intelligence] document does not provide any evidence whatsoever that the US government has concrete knowledge that the government of Syria was the source of the chemical attack in Khan Shaykhun…Any competent analyst would have had questions about whether the debris in the crater was staged or real. No competent analyst would miss the fact that the alleged sarin canister was forcefully crushed from above, rather than exploded by a munition within it.” How would a canister purportedly dropped from an Assad-ordered plane incur “crushing from above?”

THREE: Why would President Assad, supported by Russia, scoring victory after victory against ISIS, moving closer to peace negotiations, suddenly risk all his gains by dropping sarin gas on his own people?

FOUR: In an interview with Scott Horton, ex-CIA officer Philip Giraldi states that his intelligence and military sources indicate Assad didn’t attack his own people with poison gas.

FIVE: Ex-CIA officer Ray McGovern states that his military sources report an Assad air strike did hit a chemical plant, and the fallout killed people, but the attack was not planned for that purpose. There was no knowledge the chemicals were lethal.

SIX: At consortiumnews.com, journalist Robert Parry writes, “There is a dark mystery behind the White House-released photo showing President Trump and more than a dozen advisers meeting at his estate in Mar-a-Lago after his decision to strike Syria with Tomahawk missiles: Where are CIA Director Mike Pompeo and other top intelligence officials?”

“Before the photo was released on Friday, a source told me that Pompeo had personally briefed Trump on April 6 about the CIA’s belief that Syrian President Bashar al-Assad was likely not responsible for the lethal poison-gas incident in northern Syria two days earlier — and thus Pompeo was excluded from the larger meeting as Trump reached a contrary decision.”

“After the attack, Secretary of State Tillerson, who is not an institutional intelligence official and has little experience with the subtleties of intelligence, was the one to claim that the U.S. intelligence community assessed with a ‘high degree of confidence’ that the Syrian government had dropped a poison gas bomb on civilians in Idlib province.”

“While Tillerson’s comment meshed with Official Washington’s hastily formed groupthink of Assad’s guilt, it is hard to believe that CIA analysts would have settled on such a firm conclusion so quickly, especially given the remote location of the incident and the fact that the initial information was coming from pro-rebel (or Al Qaeda) sources.”

“Thus, a serious question arises whether President Trump did receive that ‘high degree of confidence’ assessment from the intelligence community or whether he shunted Pompeo aside to eliminate an obstacle to his desire to launch the April 6 rocket attack.”

SEVEN: As soon as the Assad gas attack was reported, the stage was set for a US missile strike. No comprehensive investigation of the purported gas attack was undertaken.

EIGHT: There are, of course, precedents for US wars based on false evidence—the missing WMDs in Iraq, the claims of babies being pushed out of incubators in Kuwait, to name just two.

NINE: Who benefits from the sarin gas story? Assad? Or US neocons; the US military-industrial complex; Pentagon generals who want a huge increase in their military budget; Trump and his team, who are suddenly praised in the press, after a year of being pilloried at every turn; and ISIS?

TEN: For those who doubt that ISIS has ever used poison gas, see the NY Times (11/21/2016). While claiming that Assad has deployed chemical attacks, the article also states that ISIS has deployed chemical weapons 52 times since 2014.

I’m not claiming these ten reasons definitely and absolutely rule out the possibility of an Assad-ordered chemical attack. But they do add up to a far more believable conclusion than the quickly assembled “Assad-did-it” story.

These ten reasons starkly point to the lack of a rational and complete investigation of the “gas attack.”

And this lack throws a monkey wrench into Trump’s claim that he was ordering the missile strike based on “a high degree of confidence.”

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Everyone is Doing it: Injecting Micro-Chips is Cool!

microchipss
Source: TheDailyBell.com
April 12, 2017

The government isn’t quite ready to force microchip injections on citizens. But if you want to do it on your own, it just makes tracking you and your data that much easier!

You can be just like the cool kids who are having microchips injected in their hands in order to open locked doors and store payment information. A wave of the hand is all it will take to start your car, buy a latte, or share all your data with governments and corporations.

“I’m turning the internet of things into the internet of us,” said Jowan Osterlund in an interview with Recode. Osterlund is the founder of Biohax, a Swedish company that specializes in injecting small microchips, about the size of a grain of rice, under people’s skin.

The microchips, says Osterlund, can be programmed to speak to other networked devices, like coffee makers, speakers or doors with electronic locks. The idea is that it’s more convenient to wave your hand in front of the door than use a key card.

Inserted by a syringe into the skin between the thumb and the index finger, the chips communicate with other devices using Near Field Communication. It’s a wireless way of linking devices in close proximity to each other, similar to the way Bluetooth works. Contactless payment systems, like Apple Pay, also use NFC.

Last year, Microsoft invited Biohax to its TechDays conference in Sweden to implant some of the speakers at the conference, as well as a few Microsoft executives in attendance, according to Osterlund.

See it’s not scary or weird! Even hip Microsoft executives have it done. And they are on the front lines of technology! If they are doing it, maybe we all should.

The CIA Likes This Plan

And how could becoming a part of the internet of things ever pose any risks? When he was the Director of the CIA, General Petraeus was pretty excited about spying on you “through your dishwasher.”

Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”

All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.

“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said

Now the CIA might just get the opportunity to spy on you through the microchip embedded in the fleshy part of the hand between the thumb and index finger.

Right now, the chips going into employees only work in one direction, to send information, not receive it. And they do have to be scanned just inches away in order to give off any information, meaning they aren’t quite GPS chips just yet.

But while all RFID (Radio Frequency Identification) chips may look similar, they are not created equal. The CIA has actually invested in multiple companies which make RFID microchips, some significantly more advanced than the ones used to buy snacks and get into the building.

[The CIA] also likes companies that are working on making smaller batteries, like Qynergy, a New Mexico-based company working on radioisotope batteries, and Infinite Power Solutions, a Colorado developer of thin-film batteries that can power RFID (Radio Frequency Identification) tracking chips.

Speaking of RFID, In-Q-Tel seems to see potential there. In 2008 it invested in Massachusetts-based ThingMagic, a company that makes RFID chips that can “track anything.” The Florida State Attorney’s Office for West Palm Beach uses them to track felony case files, and Ford offered them up as an additional feature for pickup trucks. A contractor can put the tags on all of his tools, so that a quick scan of the truck bed with an RFID scanner will reveal everything in there. ThingMagic was acquired last month by GPS device maker Trimble Navigation for an undisclosed amount. In-Q-Tel has also invested in GainSpan, a company finding ways to make everything wi-fi-enabled, from refrigerators to health monitoring devices, for richer information on something than just its location.

And now we start seeing stories pop up in the media touting the benefits, convenience, and coolness factor of becoming micro-chipped. Dystopian images of the government forcing citizens to become implanted with microchips may, in fact, be overblown. People will do it to themselves, without coercion, just with a little mainstream media promotion.

But Micro-chipping is Convenient So…

A company in Sweden promotes the trend because it makes opening doors and buying smoothies so easy and convenient, and your coworkers will even throw a party for you once you take the plunge to become a cyborg.

The injections have become so popular that workers at Epicenter hold parties for those willing to get implanted.

“The biggest benefit I think is convenience,” said Patrick Mesterton, co-founder and CEO of Epicenter. As a demonstration, he unlocks a door by merely waving near it. “It basically replaces a lot of things you have, other communication devices, whether it be credit cards or keys.”

And that is all great, but your company will also be able to see when you get to work when you leave, how often you use the bathroom, what types of snacks you buy and at what time; basically any location or use data involved with the chip. And of course there are other corporations to think about; mining data is a huge industry.

Since most people are attached to their phones anyway, cell phone data can give a pretty good play by play of what people are doing. Microchips take that one step further so that literally every move you make could be tracked by your employer, other companies, and government agencies. They can map out your movements and activities with such precision and accuracy that they will know more about your habits than you do.

It is actually too bad that we don’t get to enjoy any cool technology because we know the government is just going to exploit it to spy on us. There are clearly benefits to RFID microchips, such as the ease of unlocking doors, starting cars, paying for things and so on.

But while the CIA has its hands in the venture, we, unfortunately, cannot trust that the data gathered from the use of embedded chips won’t be put to nefarious use.

Read More At: TheDailyBell.com

Deep State Battle – Trump, CIA & Cold War 2 – Professor Peter Dale Scott

Source: DarkJournalist
Daniel Liszt
April 7, 2017

The Real Deep State

In this exciting part 2 episode on Deep Politics, Dark Journalist, Daniel Liszt’s interview former Canadian diplomat, UC Berkeley professor and author, Peter Dale Scott. Scott coined the term “Deep State” and has been writing about it for 50 years. His works include ‘Deep Politics and the Death of JFK’, ‘The Road to 9/11’ and ‘American War Machine’. His latest book, ‘The American Deep State’ studies the unelected, unaccountable, shadow government of the US.

Professor Scott explains how the Mainstream Media is conducting a disinformation campaign to try to minimize his concept of the Deep State by characterizing it as a ‘conspiracy’ and denying his in-depth research on what he has described as a covert political system. According to Scott this system exists as a coalescence of interests that include private contractors for US intelligence agencies, media conglomerates, Wall Street forces and Big Oil funding, which work together to manufacture “Deep Events”, such as 9/11, the JFK assassination and their subsequent coverups, for motives of profit and control.

The Deep State and President Trump

The Deep State has looked at Trump with a weary eye since he becomes the Republican Nominee and have fought both his upset election and his smooth transition to the Presidency. This concerted effort has included unsubstantiated leaks about Trump’s personal life and conduct, damaging information about his high profile aides, and the concoction of bizarre narrative picked up by the media that President Trump is somehow in ‘collusion’ with Russia and its leader President Putin, even though they have provided zero evidence to support the wild accusation.

The CIA & Cold War II

Professor Scott opines that the real reason behind the Deep State’s efforts to bring down the Trump Administration may have to do with their deep desire, which became visible during the Obama Administration, to heat up a new Cold War II to ramp up some profits for the War Machine. He describes a program developed under Obama to ‘modernize’ America’s Nuclear Forces to the tune of One Trillion Dollars. This type of inflated budget will have a hard time being allocated without a Nuclear enemy in sight so these covert forces are busy developing an entire anti-Russia campaign with help from the media. He sees it as a dangerous game and makes the observation that since the time that President Kennedy resolved the Cuban Missile Crisis peacefully, there have been forces inside the Deep State that are willing to recklessly bring the world to the brink of Nuclear War!

Strange Patterns in Deep Events 9/11 and the JFK Assassination
In Professor Scott’s terminology, a ‘Deep Event’ like 9/11 is sometimes initiated by the Deep State to make a dramatic impact on public and foreign policy. Strange movements and price fluctuations of stocks and financial concerns prior to Deep Events like 9/11 and the JFK Assassination suggest foreknowledge by powerful covert groups of the impending historical tragedies to come. These patterns suggest that the hidden groups are interested in making a huge profit while initiating foreign wars and changing the very face of American society with an agenda that has not been voted upon or debated in any public forum.

The major changes put in place after 9/11 have given us warrantless detention and a state of emergency that has been renewed under every president since George W. Bush. This state of emergency puts an army division on American soil for the first time under Joint Special Operations Command to quell domestic unrest should it arise. This subverts the laws relating to Posse Comitatus in the United States that explicitly state that federal personnel shall not be used to enforce domestic policies. Professor Scott sees this as a great breach of Constitutional Authority and believes that a campaign should be waged that removes the State of Emergency now in place.

WikiLeaks Vault 7 Reveals CIA Can Disguise Hacks, Malware As Russian Or Chinese


Source: ActivistPost.com
Matt Agorist
March 31, 2017

Moments ago, WikiLeaks released another set of data from the Vault 7 CIA documents which, believe it or not, paints an even more ominous picture of the world’s most unscrupulous spy agency. The latest leak consists of 676 source code files from the CIA’s anti-forensic “Marble” framework — which allows the CIA to covertly create malware, trojans, and hacking attacks — while attributing them to foreign entities.

With each release from these Vault 7 leaks, it becomes more apparent that everything we thought the CIA might get in this 1984-esque world — they already have.

According to WikiLeaks, Marble is able to hide or cloak their virus signature by “by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivalent of a specialized CIA tool to place covers over the English language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.”

Marble is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.”

Over the course of the last 4 months, the deep state has claimed — without evidence — that Russia has interfered in US elections. With this technology, the CIA could theoretically present the evidence it needs to “prove” Russian meddling.

According to WikiLeaks, this blame game is possible due to the fact that the source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

According to Marble, the CIA could create a virus that would potentially devastate entire systems — and then blame it on anyone they want.

As Leak of Nations reports, in the second batch of ‘Vault 7’ documents, WikiLeaks released a user guide for Sonic Screwdriver – an implant on the Apple Thunderbolt-to-USB converter that allows code to be booted onto an attached device, even if the device is password-protected.

What this means is that the CIA can infect the firmware of Macs at the core of the system with a trojan horse. Having a proverbial ocean of computers to choose from, the CIA could then pick one of those infected computers, launch an attack, use Marble to cover it up and blame it on whomever they wish.

It is no wonder Ubuntu founder Mark Shuttleworth called this “a trojan horse of monumental proportions.”

For now, however, the only one to be caught hacking US elections is the Department of Homeland Security. As the Free Thought Project previously reported, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.

Prior to the hacks in Indiana, it was the State of Georgia to expose DHS meddling in their elections.

While these…

Read More At: ActivistPost.com

WikiLeaks Reveals “Marble”: Proof CIA Disguises Their Hacks As Russian, Chinese, Arabic…

Source: ZeroHedge.com
March 31, 2017

WikiLeaks’ latest Vault 7 release contains a batch of documents, named ‘Marble’, which detail CIA hacking tactics and how they can misdirect forensic investigators from attributing viruses, trojans and hacking attacks to their agency by inserted code fragments in foreign languages.  The tool was in use as recently as 2016.  Per the WikiLeaks release:

“The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.”

 

The latest release is said to potentially allow for ‘thousands‘ of cyber attacks to be attributed to the CIA which were originally blamed on foreign governments.

WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified. WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.

 

It’s “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer, according to the whistleblowing site.

 

The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.

 

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains, “But there are other possibilities, such as hiding fake error messages.”

 

The code also contains a ‘deobfuscator’ which allows the CIA text obfuscation to be reversed. “Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA.”

 

Previous Vault7 releases have referred to the CIA’s ability to mask its hacking fingerprints.

 

WikiLeaks claims the latest release will allow for thousands of viruses and hacking attacks to be attributed to the CIA.

And the rabbit hole just got even deeper.

* * *

Full release from WikiLeaks:

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.

Read More At: ZeroHedge..com