Tumgik
fedgovwhistleblower · 3 years
Text
FLUX LINER Now Known As TR-3A TR-3B Mark McCandlish (United States Air Force) at the National Press Club One amazing revelations of the Disclosure Project in May, 2001 at the National Press Club Event in Washington, DC was the story told by Mark McCandlish about a technical illustration he made of a type of manmade faster than light flying disc craft called an “Alien Reproduction Vehicle” (ARV). McCandlish is an illustrator who works in the aerospace industry who made a technical drawing of a man-made flying disc that was exhibited at a presentation at an air show at Norton Air Force Base in November of 1988. The craft was called the “Flux Liner”. The presentation was not part of the main air show, but rather held in a hangar at the other end of the airfield away from the crowds and it was only for top military brass and a few select people. McCandlish did not attend the exhibit, personally, but it was attended by an associate, Brad Sorenson, who he’d known from college. Sorenson made a rough sketch with some technical notes and then McCandlish made a refined version of Sorenson’s sketch. A large blueprint of the refined illustration was shown at the National Press Club Event while McCandlish was recounting his witness testimony. Three Flying Discs at the Exhibit In the hangar at the presentation there were three ARVs that were floating off the floor by means of antigravity technology and with no visible means of support. The three discs were different sizes – the smallest, about 24 feet in diameter at the base, the next one, about 60 feet in diameter and the largest, about 120 to 130 feet in diameter. McCandlish verified that the event took place from the office of his congressman, Representative George E. Brown, Jr., who was the Chairman of the Committee on Science, Space and Technology at that time. A staff member in the congressman’s office confirmed that the event did take place and that there were, in fact, three discs at the exhibit. Technical Details on the McCandlish Illustration The smallest ARV had some of its outer panels removed to be able to see some of the inner parts of the craft. Sorenson’s illustration contained many hand-written callouts of some of the technical details of the craft that he had observed and was able to learn from the presentation. McCandlish went through the sketch and all of the information he had discussed with Sorenson and drafted the refined illustration. For example, Sorenson’s rough sketch described the coating of the craft as “Goopy” lead paint (on everything). Also, the notes on the McCandlish illustration states that the craft used “off the shelf” components such as the closed circuit cameras with clear covers, which were of the type that were used for surveillance in the Las Vegas casinos. Also, Sorenson’s rough sketch had a note that the access door was a “Submarine door”. The crew compartment of the smaller 24-foot craft was about 12 feet in diameter and was equipped with seating (ejection seats) for four occupants, mounted “back-to-back” in a circular arrangement around a central column. Among the notes, it was stated that The Flux Liner accessed “zero point” energy which caused mass cancellation of the structure of the craft and that it was capable of faster than light speed. U.S. Flying Disc Technology Since The 1960s At the 2001 National Press Club Event, McCandlish showed photos of an ARV taken in 1966 in Provo, Utah. It appears that this technology has been in use or under development by the U.S. Military Complex since the mid-1960s and probably even earlier in the late 1950s – for at least 40 or 45 years, now. Perhaps more details of additional man-made flying craft using zero-point energy, antigravity propulsion and having faster than light capability will be disclosed to the public – possibly developed by other countries and possibly dating back even earlier than the Flux Liner. With this discovery, there is the likelihood that some of the UFOs observed by people over the past 40 years were
actually terrestrial, man-made craft. This is an important development for UFO Disclosure. The probability that there are man-made flying discs flying around in the skies means that UFO researchers can give serious consideration to the source of these objects as being terrestrial as well as extraterrestrial. Hopefully, there will be a call from the public to make some of the science and technology available for the public good and to help alleviate the high cost of energy and the damage to the environment caused by conventional energy systems like oil, gas, coal and nuclear energy https://manmade-ufos.com/flux-liner A video of McCandlish’s story is shown below, which is a clip from the National Press Club Event that was conducted by Dr. Steven Greer and the Disclosure Project: Blueprint for a UFO - Mark McCandlish, US Air Force / Disclosure Project Witness Testimony Archive https://manmade-ufos.com/flux-liner A video of McCandlish’s story is shown below, which is a clip from the National Press Club Event that was conducted by Dr. Steven Greer and the Disclosure Project:
2 notes · View notes
fedgovwhistleblower · 3 years
Text
Global Alert: Hydrogen Peroxide, Humidifier and Water mixed 50 Percent used indoors will "Kill Covid 19". Fact that will save your "Life, Family and Friends". US President's, Vice and Congressman attack my integrity for attempting to save lives globally. Unbelievable, Honorable Discharged US Army Sgt not afraid to "Stand and Tell Truth's". Oath to "GOD" matters.
Hydrogen peroxide nebulizer are humidifier to treat Covid-19 infection The following is from Thomas Levy, M.D, J.D., a board certified cardiolosit and a prolific medical writer of 13 books and a international speaker.  Thomas is a good friend of mine and I trust him.  Dr. Frank Shallenberger is also an internationally well known doctor whom I trust as well.  Although I have not personally tested this, I will recommend to you just in case you need it.  This method makes scientific sense and is safe, most definitely worth trying, especially now at this global covid-19 crisis. -Richard Cheng, M.D., Ph.D.An At-Home Treatment That Can Cure Any Virus, Including CoronavirusOriginally Conceptualized, circa 1990, by Charles Farr, MD Subsequently Researched and Prescribed by Frank Shallenberger, MD Current Protocol Created by Thomas Levy, MD, JDAlthough COVID-19, aka coronavirus, is deadly in some select cases, and it can spread rapidly, there is a simple, very inexpensive, and highly effective treatment that can treat and rapidly resolve coronavirus and virtually any other respiratory virus. While different individuals can be expected to have variable degrees of positive response, this intervention can be anticipated to eliminate eventual fatal disease outcomes in all but the most advanced cases.
As I hope you will eventually experience, the treatment works for all acute viral infections, and especially well for flu viruses of any variety. In fact, although we are constantly conditioned to not believe in anything “too good to be true,” you will never have to worry about getting a cold or the flu again because you can cure it on your own.The key ingredient in this treatment is common household 3% hydrogen peroxide, and this is the same substance that can be purchased in a 32-ounce plastic bottle at Walmart, for 88 cents, or at Walgreens for under a $1.00. Perhaps you have never heard of hydrogen peroxide therapy, but since the treatment was first championed by Dr. Charles Farr in about 1990, thousands of doctors have used this therapy for decades to conquer infections in many thousands of patients throughout the world.
How and Why Hydrogen Peroxide WorksBecause hydrogen peroxide consists of a water molecule (H2O) with an extra oxygen atom (H2O2), it is this extra oxygen atom that makes it so deadly for viruses. In order to comprehend why H2O2 therapy works so well, you must first understand that viral infections are eradicated from the body not by killing the virus itself, but rather by killing the cells that produce them.Technically, viruses are not alive, and so it is not possible to kill them. But some agents can physically break down the viral structure and render them inactive. Viruses are actually pieces of genetic code that, in and of themselves, can neither survive nor reproduce. Therefore, in order to replicate, viruses need to infect cells, which means that in the interior of cell, a virus uses the cell’s own DNA and RNA in order to effectively reproduce. Essentially, therefore, the virus controls an infected cell and uses the cell to manufacture new viruses. Then, the new virus can exit the cell and proceed to infect other cells. As a result, the way to control any viral infection is not to kill the virus; rather, the infected cells that have been turned into viral factories must be killed.
This is the role of the extra oxygen atom in hydrogen peroxide.Under normal circumstances with a healthy immune system, one’s immune cells produce their own hydrogen peroxide to kill the infected cells that propagate viruses. When one’s immune cells are overwhelmed, such as the case with COVID-19, hydrogen peroxide therapy merely assists the immune cells in doing the job for which they were originally created.One Disadvantage of Dr. Farr’s Original H2O2 TherapyFrom a patient and consumer perspective, the single main drawback to Dr. Farr’s original therapy is/was that it is primarily an intravenous (IV) therapy. Under most circumstances, this means that you must either administer the IV needle yourself or depend upon another person to assist you. Unfortunately, this is beyond the logistical (and perhaps financial) capacity of most people, and it may be one reason why the original hydrogen peroxide therapy is not more widespread.
Nevertheless, it should be realized that the proper intravenous application of hydrogen peroxide exerts a powerful anti-viral and general anti-pathogen effect.Dr. Shallenberger’s Ingenious Use of a NebulizerThe great news is that there is a safe and simple way to avoid doctors and IV needles. This method developed by Dr. Frank Shallenberger is almost as effective as IV, can be performed at home, and is much less costly than IV.The treatment is known as nebulized hydrogen peroxide, and Dr. Shallenberger began using the technique some years ago when he had a patient who was taking asthma medication that her doctor had been administering in a nebulizer.
For those who are unfamiliar, a nebulizer is a device that is able to convert a liquid into tiny, microscopic bubbles. As a result, these extremely small bubbles, which appear as smoke escaping from the nebulizer, can be inhaled into the deepest regions of the lungs without any discomfort or irritation. Such a device has long been utilized for asthmatics to get medication to open their lungs, but Shallenberger further noticed that nebulizers have a systemic effect, which is delivery far beyond the lungs only. According to one of Dr. Shallenberger’s patients, the inhalation of her prescribed drug in the nebulizer was “unbelievably strong,” and “affected her entire body.”What Was Taking PlaceIt turns out that the tiny bubbles were not only providing medication to the patient’s lungs, but the drug was being delivered to her entire body through her lungs.
Based on Dr. Farr’s prior research, Shallenberger reasoned that perhaps H2O2 could be delivered to the entire body with a nebulizer. Dr. Shallenberger tried the nebulizer delivery system on himself, and he was delighted to discover that the treatment was extremely easy to administer, very comfortable like breathing extremely pure air, and the treatment was in no way irritating. Shallenberger’s first actually ill test subject was his wife who had developed the initial symptoms of flu. She immediately began 10-minute treatments every waking hour, and within 72 hours, (three days), the flu was fully cured. Shallenberger was predictably amazed in that even IV hydrogen peroxide cannot resolve flu in much less time.
Since Mrs. Shallenberger’s rapid recovery, Dr. Shallenberger has treated hundreds of cases of colds, flus, sinusitis, and bronchitis all with the same results. Indeed, Shallenberger has discovered that nebulizer treatments actually have an advantage over the IV therapy. Not only is the hydrogen peroxide disseminated into the entire body through the lungs, it is also going directly to the areas of the body that are most affected by viruses: the sinuses, throat, bronchial tract, and lungs. This is especially important since colds and flu viruses replicate to very high titers in these areas, serving to supply a continuous feed of virus to the rest of the body.
Effective hydrogen peroxide nebulization quite literally, “chops the head off of the snake,” and the virus present elsewhere in the body can then readily be mopped up when the new virus influx has been terminated.It should be kept in mind that hydrogen peroxide kills all pathogens very readily upon contact in an open wound. It should, therefore, be understandable why putting a fine mist of hydrogen peroxide in all the areas of maximal viral replication promptly puts the body on a pathway to rapid healing. Dr. Levy’s Simple, Inexpensive, and Extremely Effective H2O2 ProtocolEarly Onset and Treatment of VirusRegular off-the shelf 3% hydrogen peroxide can be utilized. Preparations of greater pharmacological purity can be obtained if desired.For most adults, the 3% concentration can be utilized in the nebulization chamber undiluted. This optimizes the degree and rapidity of anti-viral and anti-pathogen effect.When a runny nose or slightly sore throat is already present, it is recommended that 10-to 15-minute nebulization sessions be undertaken roughly four times daily or until a symptomatic relief is realized.
Many individuals report significant improvement only a few hours after the first one or two treatments. But it would be advisable to persist in these treatments several times daily for at least 24 to 48 hours after you feel everything is completely normal in your sinuses, nose, and throat.For some, the 3% concentration results in too much stinging/burning in the nose. Such individuals can dilute with water until they find their highest tolerable concentration. Nearly everybody can tolerate a 50/50 combination of the 3% hydrogen peroxide and water. However, still lower concentrations can be utilized with clearly beneficial effect.Prevention/MaintenanceAs it is a completely non-toxic therapy, nebulization can be administered as often as desired.
If done on a daily basis at least once, a very positive impact on bowel and gut function will often be realized as killing the chronic pathogen colonization present in most noses and throats stops the 24/7 swallowing of these pathogens and their associated toxins.If daily prevention is not a practical option, the effectiveness of this treatment is optimized when somebody sneezes in your face or you finally get off of the plane after a trans-Atlantic flight. Don’t wait for initial symptoms. Just nebulize at your first opportunity.
Final Note: This fact and protocol sheet does not contain a copyright, and a patent has not been applied for. Therefore, I encourage the reader to disseminate the contents far and wide to as many people as possible. Because you now have a simple, inexpensive, and effective way to conquer virtually all viral infections, you do not have to live in fear of COVID-19 or any other pandemic. "Please share as a Public Safety Alert" step 1. mix water and hydrogen peroxide 50/50 percent step 2. Pour mixture into a humidifier step 3. Turn humidifier on and breath in mist being released in any room in your home. Try to do this every day, be well. Hope this helps everyone, friend always. mlh.
Yours in good health,Thomas E. Levy, MD, JD www.PeakEnergy.com March 18, 2020
4 notes · View notes
fedgovwhistleblower · 3 years
Text
Reintroduce: Congressional Bills [H.R. 2977 Introduced in House (IH)] To preserve the cooperative, peaceful uses of space for the benefit of all humankind by permanently prohibiting the basing of weapons in space by the United States, and to require the President to take action to adopt and implement a world treaty banning space-based weapons.
A BILL
To preserve the cooperative, peaceful uses of space for the benefit of all humankind by permanently prohibiting the basing of weapons in space by the United States, and to require the President to take action to adopt and implement a world treaty banning space-based weapons. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE.
This Act may be cited as the ``Space Preservation Act of 2001''. SEC. 2. REAFFIRMATION OF POLICY ON THE PRESERVATION OF PEACE IN SPACE.
Congress reaffirms the policy expressed in section 102(a) of the National Aeronautics and Space Act of 1958 (42 U.S.C. 2451(a)), stating that it ``is the policy of the United States that activities in space should be devoted to peaceful purposes for the benefit of all mankind.''. SEC. 3. PERMANENT BAN ON BASING OF WEAPONS IN SPACE. The President shall-- (1) implement a permanent ban on space-based weapons of the United States and remove from space any existing space-based weapons of the United States; and (2) immediately order the permanent termination of research and development, testing, manufacturing, production, and deployment of all space-based weapons of the United States and their components. SEC. 4. WORLD AGREEMENT BANNING SPACE-BASED WEAPONS. The President shall direct the United States representatives to the United Nations and other international organizations to immediately work toward negotiating, adopting, and implementing a world agreement banning space-based weapons. SEC. 5. REPORT. The President shall submit to Congress not later than 90 days after the date of the enactment of this Act, and every 90 days thereafter, a report on-- (1) the implementation of the permanent ban on space-based weapons required by section 3; and (2) progress toward negotiating, adopting, and implementing the agreement described in section 4. SEC. 6. NON SPACE-BASED WEAPONS ACTIVITIES. Nothing in this Act may be construed as prohibiting the use of funds for-- (1) space exploration; (2) space research and development; (3) testing, manufacturing, or production that is not related to space-based weapons or systems; or (4) civil, commercial, or defense activities (including communications, navigation, surveillance, reconnaissance, early warning, or remote sensing) that are not related to space-based weapons or systems. SEC. 7. DEFINITIONS. In this Act: (1) The term ``space'' means all space extending upward from an altitude greater than 60 kilometers above the surface of the earth and any celestial body in such space. (2)(A) The terms ``weapon'' and ``weapons system'' mean a device capable of any of the following: (i) Damaging or destroying an object (whether in outer space, in the atmosphere, or on earth) by-- (I) firing one or more projectiles to collide with that object; (II) detonating one or more explosive devices in close proximity to that object; (III) directing a source of energy (including molecular or atomic energy, subatomic particle beams, electromagnetic radiation, plasma, or extremely low frequency (ELF) or ultra low frequency (ULF) energy radiation) against that object; or (IV) any other unacknowledged or as yet undeveloped means. (ii) Inflicting death or injury on, or damaging or destroying, a person (or the biological life, bodily health, mental health, or physical and economic well- being of a person)-- (I) through the use of any of the means described in clause (i) or subparagraph (B); (II) through the use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations for the purpose of information war, mood management, or mind control of such persons or populations; or (III) by expelling chemical or biologica agents in the vicinity of a person. (B) Such terms include exotic weapons systems such as-- (i) electronic, psychotronic, or information weapons; (ii) chemtrails; (iii) high altitude ultra low frequency weapons systems; (iv) plasma, electromagnetic, sonic, or ultrasonic weapons; (v) laser weapons systems;
(vi) strategic, theater, tactical, or extraterrestrial weapons; and (vii) chemical, biological, environmental, climate, or tectonic weapons. (C) The term ``exotic weapons systems'' includes weapons designed to damage space or natural ecosystems (such as the ionosphere and upper atmosphere) or climate, weather, and tectonic systems with the purpose of inducing damage or destruction upon a target population or region on earth or in space.
1 note · View note
fedgovwhistleblower · 4 years
Text
Disclosure: The Pandemic, the Awful Secret They’ve Been Hiding, an Intel Drop By Gordon Duff, Senior Editor - June 3, 2020 14 7104 The Senior Editor We have multiple confirmations that a vaccine for COVID 19 not only exists but has existed for some time, since 2019, perhaps as early as 2017. We are also told that COVID 19, as VT reported in March, was deployed against China, then Italy, then France, then Iran and Spain and then the US as a “fund raiser.” COVID 19 is the ultimate “sanction” and ultimate tool to bring about that “New World Order” we have been hearing about.  Now we see it as a reality. Let us remind, do note that Boris Johnson got it, and we believe that, but so many others have not and there is a reason for that, they got the “million dollar shot.” Check the record of COVID 19 in Israel. John Hankey reports that Trump and his inner circle were vaccinated in November 2019, only days after the virus was deployed against China. Months ago, VT traced the creation of the current versions of COVID 19/SARS COV 2 to a USAID-CIA funded and peer reviewed study done by the University of North Carolina by scientists closely aligned with America’s defense community. We questioned the history of this and other studies on Wuhan Horseshoe Bat Virus there, at Tbilisi and at other covert DOD-CIA funded facilities.  We noted published articles but we also noted funding for vaccine programs but nothing published on these. We knew the CIA funded programs were to develop a SARS related bio-weapon but we also knew that this would not be done without a vaccine and that vaccine programs would be highly classified.  You see, vaccines make this a weapon, not the disease itself. Targeting with a virus is impossible without vaccines and how they are given out or sold is what gives the power to those who control the vaccines.  Key to this was causing a massive pandemic in the US because the vaccine would be worthless if the disease were quickly controlled. Billions in black funding would be lost, something particularly painful in an election year when a mob owned president has failed miserably and made the US the laughing stock of the world. https://www.veteranstoday.com/2020/06/03/disclosure-the-pandemic-the-awful-secret-theyve-been-hiding-an-intel-drop/
1 note · View note
fedgovwhistleblower · 4 years
Video
youtube
Dec 28, 2019 US Continues to Commit Genocide By Spray Chemtrails Over American City's. The Spraying of Heavy Metals In Atmosphere, Autism, ADD & Illness Symptoms & conditions related to heavy metal toxicity • Fibromyalgia, chronic fatigue and all autoimmune diseases • Mood swings, depression, anxiety, schizophrenic-like behavior • Neurotransmitter dysfunction • Thyroid and adrenal dysfunction • Inflammatory brain conditions, autism, Parkinson’s and Alzheimer’s • Chronic infections, bacterial, viral and Candida • TMJ • ADD, lower IQ and learning problems • Anemia • Food allergies and sensitivities • Infertility and reproductive problems in both men and women • Genital malformation • Hypertension • Cancer • Brain fog, confusion, forgetfulness, memory loss, dementia • Hair loss, premature graying hair • Chronic muscle and tendon pain • Kidney and liver disease • Osteoporosis • Dizziness • Mineral and nutrient deficiencies • Insomnia • Digestive problems, IBS and gastrointestinal complaints • Migraines, headaches, visual disturbances • Respiratory, lung and heart problems • Nervous system malfunctions: burning extremities, numbness, tingling
1 note · View note
fedgovwhistleblower · 4 years
Video
youtube
CIA Whistleblower Exposes 9/11 Attack Secrets May 28, 2019 “The lies are so much deeper than you know.” (Editor’s Note): The attached video is a testimony from Susan Lindauer. It was filmed in 2011 and we at C-VINE are fascinated by her story because of information that has recently come to light. Susan worked as a CIA liaison and describes the world scene as it played out. She shares the conclusion that 9/11 involved BOTH airplane hijackings, and a deliberately controlled demolition scenario. The Deep State wants us to believe that Iraq is our External Enemy, when in fact, the Deep State players themselves, are our Internal Enemy. Her assertions have been fact checked, and the timelines she gives fall in line with the Military Tribunal Transcripts from the KSM et al pre-trials in process at Guantanamo Bay Cuba. (GITMO).
1 note · View note
fedgovwhistleblower · 4 years
Text
On March, 2012 the company’s application for an advanced mobile snooping technology suite was approved. The patent describes a Trojan-like program that can be secretly installed on mobile phones, allowing the attacker to monitor and record all communications incoming and outgoing, as well as manipulate the phone itself. Oceans’ Edge says that the tool is particularly useful because it allows law enforcement and corporations to work around mobile phone providers when they want to surveil someone’s phone and data activity. Instead of asking AT&T for a tap, in other words, the tool embeds itself inside your phone, turning your device against you. A former employee of Oceans’ Edge notes on his LinkedIn page that the company’s clients included the FBI, Drug Enforcement Agency, and other law enforcement. Oddly enough, Oceans’ Edge, Inc. describes itself as an information security company on its sparsely populated website. The “About Us" page reads: Oceans Edge Inc. (OE) is an engineering company founded in 2006 by wireless experts to design, build, deploy, and integrate Wireless Cyber Solutions. Our team is composed of subject matter experts in the following areas: Wireless Cyber Security Mobile Application Development Wireless Communication Protocols Wireless Network Implementation Lawful Intercept Technology With this expertise, we deliver engineering services and wireless technology solutions in critical mission areas for our government and commercial customers. But while the company may offer “cyber security” solutions to government and corporations, as the website claims, the firm only has one approved patent on file with the US Patent and Trademark Office. Remote mobile spying The patent is for a “Mobile device monitoring and control system.” The applicants summarize the technology thusly: Methods and apparatus, including computer program products, for surreptitiously installing, monitoring, and operating software on a remote computer controlled wireless communication device are described. In other words, the technology works to snoop on mobile phones by secretly installing itself on phone hardware. The targeted phone is thus compromised in two ways: first, the attacker can spy on all the contents of the phone; and second, the attacker can operate the phone from afar. That’s to say, it doesn’t just let the attacker read your text messages. It also potentially lets him write them. The summary goes on: One aspect includes a control system for communicating programming instructions and exchanging data with the remote computer controlled wireless communication device. The control system is configured to provide at least one element selected from the group consisting of: a computer implemented device controller; a module repository in electronic communication with the device controller; a control service in electronic communication with the device controller; an exfiltration data service in electronic communication with the device controller configured to receive, store, and manage data obtained surreptitiously from the remote computer controlled wireless communication device; a listen-only recording service in electronic communication with the device controller; and a WAP gateway in electronic communication with the remote computer controlled wireless communication device. The technology therefore also enables automated data storage of all of a phone’s activity in the attacker’s database. So if someone used this technology to spy on your phone, they would be able to use the Oceans’ Edge product to automatically store everything you do on it, to go back to later. In case you aren’t sure who would want this kind of spook technology or why, Oceans’ Edge explains in the patent application: A user’s employment of a mobile device, and the data stored within a mobile device, is often of interest to individuals and entities that desire to monitor and/or record the activities of a user or a mobile device. Some examples of such individuals and entities include law enforcement, corporate compliance officers, and security-related organizations. As more and more users use wireless and mobile devices, the need to monitor the usage of these devices grows as well. Monitoring a mobile device includes the collection of performance metrics, recording of keystrokes, data, files, and communications (e.g. voice, SMS (Short Message Service), network), collectively called herein “monitoring results”, in which the mobile device participates. The application goes on to explain that the tool is beneficial to law enforcement or other customers because it allows them to avoid dealing with pesky mobile phone providers when they want to covertly spy on people’s mobile communications. Instead of the FBI going to AT&T or T-Mobile to get access to your cell data, they can just surreptitiously install this bug on your phone. They’ll get all your data – and your phone company might never know. Mobile device monitoring can be performed using “over the air” (OTA) at the service provider, either stand-alone or by using a software agent in conjunction with network hardware such a telephone switch. Alternatively, mobile devices can be monitored by using a stand-alone agent on the device that communicates with external servers and applications. In some cases, mobile device monitoring can be performed with the full knowledge and cooperation of one of a plurality of mobile device users, the mobile device owner, and the wireless service provider. In other cases, the mobile device user or service provider may not be aware of the monitoring. In these cases, a monitoring application or software agent that monitors a mobile device can be manually installed on a mobile device to collect information about the operation of the mobile device and make said information available for later use. In some cases, this information is stored on the mobile device until it is manually accessed and retrieved. In other cases, the monitoring application delivers the information to a server or network device. In these cases, the installation, information collection, and retrieval of collected information are not performed covertly (i.e. without the knowledge of the party or parties with respect to whom the monitoring, data collection, or control, or any combination thereof, is desired, such as, but not limited to, the device user, the device owner, or the service provider). The use of “signing certificates” to authenticate software prior to installation can make covert installation of monitoring applications problematic. When software is not signed by a trusted authority, the software may not be installed, or the device user may be prompted for permission to install the software. In either case, the monitoring application is not installed covertly as required. Additionally, inspection of the mobile device can detect such a monitoring application and the monitoring application may be disabled by the device user. Alternatively, OTA message traffic may be captured using network hardware such as the telephone switch provided by a service provider. This requires explicit cooperation by the service provider, and provides covert monitoring that is limited to message information passed over the air. As a result, service provider-based monitoring schemes require expensive monitoring equipment, cooperation from the service provider, and are limited as to the types of information they can monitor. The applicants describe some of the challenges they had to overcome, which include: Additional challenges are present when the monitoring results are transmitted from a mobile device. First, many mobile devices are not configured to transmit and receive large amounts of information. In some instances, this is because the mobile device user has not subscribed to an appropriate data service from an information provider. In other instances, the mobile device has limited capabilities. In other words, make sure you get that unlimited data plan, or else it’ll be really hard for the FBI to spy on your mobile phone! It’ll take up so much of your data usage that you’ll notice and maybe even complain to your mobile provider! That would be awkward. Second, transmitting information often provides indications of mobile device activity (e.g. in the form of activity lights, battery usage, performance degradation). Bad battery performance that the geeks at the Apple genius bar can’t explain? Maybe your device has been compromised. Third, transmitting information wirelessly requires operation in areas of intermittent signal, with automated restart and retransmission of monitoring results if and when a signal becomes available. The monitoring program has got to be clever enough to stop and restart every time you go out of range of your cell network, or you turn the phone off. Fourth, many mobile devices are “pay as you go” or have detailed billing enabled at the service provider. The transmission of monitoring results can quickly use all the credit available on a pre-paid wireless plan, or result in detailed service records describing the transmission on a wireless customer’s billing statement. When the snoops steal your information, you might have to pay for the pleasure of being spied on. That’s because your mobile phone provider might read the spying activity as your activity. After all, it’s coming from your phone. Lastly, stored monitoring results can take up significant storage on a mobile device and the stored materials and the use of this storage can be observed by the device user. Is there a large chunk of space on your phone that seems full, but you can’t figure out why? Perhaps a snoop tool like that devised by Oceans’ Edge, Inc. is storing data on your phone that it plans to later capture. Given all of those potential problems, the technologists had a lot of work cut out for them. Here’s how they addressed those problems: From the foregoing, it will be appreciated that effective covert monitoring of a mobile device requires the combination of several technologies and techniques that hide, disguise, or otherwise mask at least one aspect of the monitoring processes: the covert identification of the mobile devices to be monitored, the covert installation and control of the monitoring applications, and the covert exfiltration of collected monitoring results. As used herein, “covert exfiltration” refers to a process of moving collected monitoring results from a mobile device while it is under the control of another without their knowledge or awareness. Thus covert exfiltration processes can be those using stealth, surprise, covert, or clandestine means to relay monitoring data. “Collected monitoring results” as used herein includes any or all materials returned from a monitored mobile device to other devices, using either mobile or fixed points-of-presence. Examples of collected monitoring results include one or more of the following: command results, call information and call details, including captured voice, images, message traffic (e.g. text messaging, SMS, email), and related items such as files, documents and materials stored on the monitored mobile device. These materials may include pictures, video clips, PIM information (e.g. calendar, task list, address and telephone book), other application information such as browsing history, and device status information (e.g. device presence, cell towers/wireless transmitters/points-of-presence used, SIM data, device settings, location, profiles, and other device information). Additionally, the capability to covertly utilize a mobile device as a covertly managed camera or microphone provides other unique challenges. Thus covert monitoring of a mobile device’s operation poses the significant technical challenges of hiding or masking the installation and operation of the monitoring application, its command and control sessions, hiding the collected monitoring results until they are exfiltrated, surreptitiously transmitting the results, and managing the billing for the related wireless services. The exemplary illustrative technology herein addresses these and other important needs. In short, Oceans’ Edge Inc., a company founded and operating in the heart of CIA country, says it has a technology that can secretly install itself on mobile phones and push all the contents of the devices to an external database, doing so entirely under the radar of both the target and the target’s mobile provider. It even boasts that the tool allows for covertly managing phone cameras and microphones. What kind of contracts does this company have, and with which government agencies? A cursory internet search didn’t turn up much, except for a couple of bids to work on a military information operations program and a cyber defense project. Neither one of those programs has an obvious link to the mobile snooping device described in the patent application. Since we don’t know which agencies are using this technology or how, it’s hard to say to what extent this kind of secret monitoring is taking place in the US. We have some evidence suggesting that the FBI and DEA are using this tool (thanks, Chris Soghoian, for the tip). If those agencies really are using this technology, they should get warrants before they compromise anyone’s phone. Is the government getting warrants to use this tool? We don’t know. Oceans’ Edge Inc., like many purveyors of surveillance products, claims that its technology is only deployed for “lawful interception,” but it makes no claims about what that actually means. There’s no mention of judicial oversight, warrants, or any kind of due process. As I’ve written elsewhere on this blog, given the state of the law concerning surveillance in the digital age, we shouldn’t let our guard down simply because a company claims its surveillance tools are used lawfully. That’s because we do not know how these tools are being deployed, and yet we know that the state of surveillance law in the US at present grants the government wide latitude to infringe on our privacy in ways that are often improper or even unconstitutional. In most cases (with a few notable exceptions), lawmakers haven’t worked to address this issue. As we can see, surveillance technologies are developing rapidly. It’s past time for our laws to catch up.
PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones
In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the company’s application for an advanced mobile snooping technology suite was approved.
The patent describes a Trojan-like program that can be secretly installed on mobile phones, allowing the attacker to monitor and record all communications incoming and outgoing, as well as manipulate the phone itself. Oceans’ Edge says that the tool is particularly useful because it allows law enforcement and corporations to work around mobile phone providers when they want to surveil someone’s phone and data activity. Instead of asking AT&T for a tap, in other words, the tool embeds itself inside your phone, turning your device against you.
A former employee of Oceans’ Edge notes on his LinkedIn page that the company’s clients included the FBI, Drug Enforcement Agency, and other law enforcement.
Oddly enough, Oceans’ Edge, Inc. describes itself as an information security company on its sparsely populated website. The “About Us" page reads:
Oceans Edge Inc. (OE) is an engineering company founded in 2006 by wireless experts to design, build, deploy, and integrate Wireless Cyber Solutions.
Our team is composed of subject matter experts in the following areas:
Wireless Cyber Security
Mobile Application Development
Wireless Communication Protocols
Wireless Network Implementation
Lawful Intercept Technology
With this expertise, we deliver engineering services and wireless technology solutions in critical mission areas for our government and commercial customers.
But while the company may offer "cyber security” solutions to government and corporations, as the website claims, the firm only has one approved patent on file with the US Patent and Trademark Office.
Remote mobile spying
The patent is for a “Mobile device monitoring and control system.” The applicants summarize the technology thusly:
Methods and apparatus, including computer program products, for surreptitiously installing, monitoring, and operating software on a remote computer controlled wireless communication device are described.
In other words, the technology works to snoop on mobile phones by secretly installing itself on phone hardware. The targeted phone is thus compromised in two ways: first, the attacker can spy on all the contents of the phone; and second, the attacker can operate the phone from afar. That’s to say, it doesn’t just let the attacker read your text messages. It also potentially lets him write them.
The summary goes on:
One aspect includes a control system for communicating programming instructions and exchanging data with the remote computer controlled wireless communication device. The control system is configured to provide at least one element selected from the group consisting of: a computer implemented device controller; a module repository in electronic communication with the device controller; a control service in electronic communication with the device controller; an exfiltration data service in electronic communication with the device controller configured to receive, store, and manage data obtained surreptitiously from the remote computer controlled wireless communication device; a listen-only recording service in electronic communication with the device controller; and a WAP gateway in electronic communication with the remote computer controlled wireless communication device.
The technology therefore also enables automated data storage of all of a phone’s activity in the attacker’s database. So if someone used this technology to spy on your phone, they would be able to use the Oceans’ Edge product to automatically store everything you do on it, to go back to later.
In case you aren’t sure who would want this kind of spook technology or why, Oceans’ Edge explains in the patent application:
A user’s employment of a mobile device, and the data stored within a mobile device, is often of interest to individuals and entities that desire to monitor and/or record the activities of a user or a mobile device. Some examples of such individuals and entities include law enforcement, corporate compliance officers, and security-related organizations. As more and more users use wireless and mobile devices, the need to monitor the usage of these devices grows as well. Monitoring a mobile device includes the collection of performance metrics, recording of keystrokes, data, files, and communications (e.g. voice, SMS (Short Message Service), network), collectively called herein “monitoring results”, in which the mobile device participates.
The application goes on to explain that the tool is beneficial to law enforcement or other customers because it allows them to avoid dealing with pesky mobile phone providers when they want to covertly spy on people’s mobile communications. Instead of the FBI going to AT&T or T-Mobile to get access to your cell data, they can just surreptitiously install this bug on your phone. They’ll get all your data – and your phone company might never know.
Mobile device monitoring can be performed using “over the air” (OTA) at the service provider, either stand-alone or by using a software agent in conjunction with network hardware such a telephone switch. Alternatively, mobile devices can be monitored by using a stand-alone agent on the device that communicates with external servers and applications. In some cases, mobile device monitoring can be performed with the full knowledge and cooperation of one of a plurality of mobile device users, the mobile device owner, and the wireless service provider. In other cases, the mobile device user or service provider may not be aware of the monitoring. In these cases, a monitoring application or software agent that monitors a mobile device can be manually installed on a mobile device to collect information about the operation of the mobile device and make said information available for later use. In some cases, this information is stored on the mobile device until it is manually accessed and retrieved. In other cases, the monitoring application delivers the information to a server or network device. In these cases, the installation, information collection, and retrieval of collected information are not performed covertly (i.e. without the knowledge of the party or parties with respect to whom the monitoring, data collection, or control, or any combination thereof, is desired, such as, but not limited to, the device user, the device owner, or the service provider). The use of “signing certificates” to authenticate software prior to installation can make covert installation of monitoring applications problematic. When software is not signed by a trusted authority, the software may not be installed, or the device user may be prompted for permission to install the software. In either case, the monitoring application is not installed covertly as required. Additionally, inspection of the mobile device can detect such a monitoring application and the monitoring application may be disabled by the device user. Alternatively, OTA message traffic may be captured using network hardware such as the telephone switch provided by a service provider. This requires explicit cooperation by the service provider, and provides covert monitoring that is limited to message information passed over the air. As a result, service provider-based monitoring schemes require expensive monitoring equipment, cooperation from the service provider, and are limited as to the types of information they can monitor.
The applicants describe some of the challenges they had to overcome, which include:
Additional challenges are present when the monitoring results are transmitted from a mobile device. First, many mobile devices are not configured to transmit and receive large amounts of information. In some instances, this is because the mobile device user has not subscribed to an appropriate data service from an information provider. In other instances, the mobile device has limited capabilities.
In other words, make sure you get that unlimited data plan, or else it’ll be really hard for the FBI to spy on your mobile phone! It’ll take up so much of your data usage that you’ll notice and maybe even complain to your mobile provider! That would be awkward.
Second, transmitting information often provides indications of mobile device activity (e.g. in the form of activity lights, battery usage, performance degradation).
Bad battery performance that the geeks at the Apple genius bar can’t explain? Maybe your device has been compromised.
Third, transmitting information wirelessly requires operation in areas of intermittent signal, with automated restart and retransmission of monitoring results if and when a signal becomes available.
The monitoring program has got to be clever enough to stop and restart every time you go out of range of your cell network, or you turn the phone off.
Fourth, many mobile devices are “pay as you go” or have detailed billing enabled at the service provider. The transmission of monitoring results can quickly use all the credit available on a pre-paid wireless plan, or result in detailed service records describing the transmission on a wireless customer’s billing statement.
When the snoops steal your information, you might have to pay for the pleasure of being spied on. That’s because your mobile phone provider might read the spying activity as your activity. After all, it’s coming from your phone.
Lastly, stored monitoring results can take up significant storage on a mobile device and the stored materials and the use of this storage can be observed by the device user.
Is there a large chunk of space on your phone that seems full, but you can’t figure out why? Perhaps a snoop tool like that devised by Oceans’ Edge, Inc. is storing data on your phone that it plans to later capture.
Given all of those potential problems, the technologists had a lot of work cut out for them. Here’s how they addressed those problems:
From the foregoing, it will be appreciated that effective covert monitoring of a mobile device requires the combination of several technologies and techniques that hide, disguise, or otherwise mask at least one aspect of the monitoring processes: the covert identification of the mobile devices to be monitored, the covert installation and control of the monitoring applications, and the covert exfiltration of collected monitoring results. As used herein, “covert exfiltration” refers to a process of moving collected monitoring results from a mobile device while it is under the control of another without their knowledge or awareness. Thus covert exfiltration processes can be those using stealth, surprise, covert, or clandestine means to relay monitoring data. “Collected monitoring results” as used herein includes any or all materials returned from a monitored mobile device to other devices, using either mobile or fixed points-of-presence. Examples of collected monitoring results include one or more of the following: command results, call information and call details, including captured voice, images, message traffic (e.g. text messaging, SMS, email), and related items such as files, documents and materials stored on the monitored mobile device. These materials may include pictures, video clips, PIM information (e.g. calendar, task list, address and telephone book), other application information such as browsing history, and device status information (e.g. device presence, cell towers/wireless transmitters/points-of-presence used, SIM data, device settings, location, profiles, and other device information). Additionally, the capability to covertly utilize a mobile device as a covertly managed camera or microphone provides other unique challenges. 
Thus covert monitoring of a mobile device’s operation poses the significant technical challenges of hiding or masking the installation and operation of the monitoring application, its command and control sessions, hiding the collected monitoring results until they are exfiltrated, surreptitiously transmitting the results, and managing the billing for the related wireless services. The exemplary illustrative technology herein addresses these and other important needs.
In short, Oceans’ Edge Inc., a company founded and operating in the heart of CIA country, says it has a technology that can secretly install itself on mobile phones and push all the contents of the devices to an external database, doing so entirely under the radar of both the target and the target’s mobile provider. It even boasts that the tool allows for covertly managing phone cameras and microphones.
What kind of contracts does this company have, and with which government agencies? A cursory internet search didn’t turn up much, except for a couple of bids to work on a military information operations program and a cyber defense project. Neither one of those programs has an obvious link to the mobile snooping device described in the patent application.
Since we don’t know which agencies are using this technology or how, it’s hard to say to what extent this kind of secret monitoring is taking place in the US. We have some evidence suggesting that the FBI and DEA are using this tool (thanks, Chris Soghoian, for the tip). If those agencies really are using this technology, they should get warrants before they compromise anyone’s phone.
Is the government getting warrants to use this tool? We don’t know.
Oceans’ Edge Inc., like many purveyors of surveillance products, claims that its technology is only deployed for “lawful interception,” but it makes no claims about what that actually means. There’s no mention of judicial oversight, warrants, or any kind of due process. As I’ve written elsewhere on this blog, given the state of the law concerning surveillance in the digital age, we shouldn’t let our guard down simply because a company claims its surveillance tools are used lawfully. That’s because we do not know how these tools are being deployed, and yet we know that the state of surveillance law in the US at present grants the government wide latitude to infringe on our privacy in ways that are often improper or even unconstitutional.
In most cases (with a few notable exceptions), lawmakers haven’t worked to address this issue.
As we can see, surveillance technologies are developing rapidly. It’s past time for our laws to catch up.
sosadmin’s blog
Original Article
5 notes · View notes
fedgovwhistleblower · 4 years
Video
youtube
1 note · View note
fedgovwhistleblower · 4 years
Video
youtube
Published on Jul 30, 2018 Am 22.10.2017 Huge Domestic Terrorists Attacks on Americans No Longer a Conspiracy Theory but Conspiracy FACT: On September 28, 2017, about 10 days before the Northern California Fires in Wine Country began, Fox News ADMITS to the government having Laser Technology or Directed Energy Weapons (DEW). ATHENA, (Advanced Test High Energy Asset), is one of the most exciting of these new American laser weapons. During recent testing with the U.S. Army's Space and Missile Defense Command at the Army's White Sands Missile Range in New Mexico, the 30-kilowatt weapon slayed five Outlaw drones. Not toy hobby sized drones, but drones with nearly 11 foot wingspans. Silent, invisible, deadly. The powerful ATHENA laser weapon can destroy enemy threats within seconds. For the United States, thanks to pioneering efforts of American companies like Lockheed Martin and the military, laser weapons are no longer the stuff of Star Wars and Star Trek. In near-term future battles, the U.S. military can choose to bring laser weapons mounted on vehicles, vessels, and more, to war. By comparison, the weapons of any enemy will look like bows and arrows. How does it work? On the most basic level, ATHENA destroys threats with heat. It is similar to when folks use a magnifying glass to start a fire while camping – but on an incredibly powerful level. ATHENA is what is called a fiber laser. Fiber lasers combine individual lasers to generate a single, intense laser beam. Each laser is generated by the weapon’s fiber optics. This approach means that the power can be easily adjusted by adding more individual lasers to the combined beam or reducing the number. Lockheed Martin’s beam control tech uses lenses, mirrors, windows and software algorithms to shape the energy into a focused beam. As the light travels through the mirrors, lenses and windows, the ATHENA system concentrates and modifies the laser’s energy. Threats can come from any direction. ATHENA’s beam director and turret are designed to match this so the weapons can fire 360 degrees. Battles will never be the same Lockheed Martin has been pioneering in laser weapon systems for more than four decades. ATHENA’s upgrades and remarkable recent performance of defeating 100 percent of the drones is the latest exciting news in their laser family. ATHENA’s sibling, ADAM, is another laser. During testing a few years ago, ADAM proved it could destroy fast attack military grade boats by burning through their hulls in less than 30 seconds – again from about a mile away. The company is further miniaturizing laser weapons for tactical U.S. Army and U.S. Marine Corps vehicles. For Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory, Lockheed Martin has worked on a prototype turret to mount laser weapons on aircraft. What’s next? In near term battles, the US military will have the option to unleash laser weapons on vehicles, vessels and possibly even aircraft. The precision of lasers like ATHENA is already remarkable. As the technology continues to advance at a rapid pace in the U.S., lasers like ATHENA will be able to strike farther and farther away. And destroy bigger and bigger targets. ----------------------------------------------------------------------------------------------------------- Sources: ATHENA laser weapon 'kills' 5 'outlaws' http://www.foxnews.com/tech/2017/09/2... ------------------------------------------------------------------------------------------------------------ FAIR USE NOTICE: This video may contain copyrighted material. Such material is made available for educational purposes only. This constitutes a 'fair use' of any such copyrighted material as provided for in Title 17 U.S.C. section 106A-117 of the U.S. Copyright Law. ---------------------------------------------------------------------------------------------------------http://www.chemtrail.de/?p=10191 + Die Maske fällt- Vizepräsident der EU-Kommission: „MONOKULTURELLE STAATEN AUSRADIEREN" «. http://www.chemtrail.de/?p=11242#more... + EU- MIGRATIONSKANÄLE: europa.eu/rapid/press-release_IP-16-2434_de.htm Weitere interessante Informationen (+FLYER, AUFKLEBER, BÜCHER, SONDERDRUCKE ÜBER WETTERKONTROLLE, DIE WAHRE (ELEKTRO-MAGNETISCHE /SKALARE) URSACHE DES TSCHERNOBYL-GAU;+ URANMUNITION- EINSATZ) finden Sie im Shop auf: http://www.chemtrail.de
1 note · View note
fedgovwhistleblower · 4 years
Link
Date: November 23, 2018 The United States President and Congress Passed Bill To Protect Corporations. To Allow Illegal Sharing of General Public's Personal Identifiable Information Without Their Consent Are Knowledge Between Governments and Private Sectors globally. The Bill Willfully Violates Every Americans US Constitution Civil Liberties, Civil Rights, Whistleblower Protections. A bill silently passed through Congress and to U.S. President Donald Trump’s desk that was signed right before Thanksgiving last week, which would re-designate the U.S. Department of Homeland Security’s National Protection and Programs Directorate (NPPD) into a new agency called the Cybersecurity and Infrastructure Security Agency (CISA.) A statement from President Trump was issued on the White House website: Every day, America’s adversaries are testing our cyber defenses. They attempt to gain access to our critical infrastructure, exploit our great companies, and undermine our entire way of life. And we can’t let that happen. This vital legislation will establish a new agency within the Department of Homeland Security to lead the federal government’s civilian response to these cyber threats against our nation. We’ve had many, many threats against our nation. Cyber is going to be the newest form. And the threats have taken place, and we’ve been doing pretty good in knocking them out, but now we’ll be — this will make us, I think, much more effective. We’re putting people that are the best in the world, in charge. And I think we’re going to have a whole different ballgame. Cyber is, to a large extent, where it’s at nowadays. The men and women of the new Cybersecurity and Infrastructure Security Agency will be on the front lines of our cyber defense. They will partner with the private sector, and all levels of government, to defend America’s power grids, banks, telecommunications, and other critical parts of our economy. The bill known as the Cybersecurity and Infrastructure Security Agency Act swiftly passed in Congress in October; and last week, H.R. 335 advanced through the House Of Representatives without any resistance and barely any media attention. Trump signed the bill into law almost immediately after the legislation passed the House. The NPPD was first established in 2007 and has been responsible over the past few years for handling almost all of the DHS’ cybersecurity issues and other projects. As part of the DHS, the NPPD was the government entity in charge of physical and cybersecurity of federal networks and critical infrastructure. The previous agency also oversaw the Federal Protective Service (FPS), the Office of Biometric Identity Management (OBIM), the Office of Cyber and Infrastructure Analysis (OCIA), the Office of Cybersecurity & Communications (OC&C), and the Office of Infrastructure Protection (OIP). Nothing is expected to change in day-to-day operations for the agency, but being reorganized as a federal agency, CISA will now benefit from an increased budget and more authority in imposing its directives. Although, CISA will still face oversight by the DHS at the end of the day. To put that into perspective for you, CISA now has the same power as the U.S. Secret Service or FEMA. CISA will be responsible for leading cybersecurity, critical infrastructure protection programs, developing associated policy, and coordinating with federal and private sector entities on security matters. CSA will also be responsible for performing DHS’ responsibilities in regards to anti-terrorism measures for chemical plants. In short, CISA will be held accountable for protecting the nation’s critical infrastructure from physical and cyber threats. According to US-CERT: (CISA) elevates the mission of the former Department of Homeland Security (DHS) National Protection and Programs Directorate (NPPD) and establishes the Cybersecurity and Infrastructure Security Agency (CISA). CISA is responsible for protecting the Nation’s critical infrastructure from physical and cyber threats, a mission that requires effective coordination and collaboration among a broad spectrum of government and private sector organizations. The DHS’s statement on the matter shows that the new agency will be “working with partners across all levels of government and in the private sector to secure against the evolving risks of tomorrow.” The new agency will have several divisions including a Cybersecurity Division, an Infrastructure Security Division, and an Emergency Communications Division. Christopher Krebs, the current NPPD Undersecretary, will be the first new director of the CISA agency.
1 note · View note
fedgovwhistleblower · 4 years
Link
First Twitter Disabled My Account, Then Claimed I Violated Their User Policy's.... Which Truly Is Unbelievable Since I'm Calling Out Mass Murders Who've Committed Biggest Acts Of Domestic Terrorism In The History Of The World..... This Article Validates My Claims Of Overt Discrimination, US Constitution Civil Liberties, Civil Rights Violations, Collusion, Corruption, Culpable, Tyranny and Treason. Nov. 27 (UPI) -- Twitter on Wednesday announced it plans to place an effort to remove inactive accounts from the site, as it works to accommodate the deceased. The social media company apologized for the "confusion and concerns" caused by reports it would delete accounts of users who have not signed in for an extended period of time. Twitter also clarified the scope of the effort and said it would work to find a way for users to designate accounts belonging to people who have died before carrying out the process. "We've heard you on the impact this would have on the accounts of the deceased. This was a miss on our part. We will not be removing any inactive accounts until we create a new way for people to memorialize accounts," Twitter Support wrote on Wednesday. The company also clarified its effort to delete inactive accounts currently only applies to the European Union due to local privacy regulations. https://www.upi.com/Top_News/US/2019/11/27/Twitter-pauses-plan-to-delete-inactive-accounts-to-work-on-memorial-feature/5741574894803/?sl=6
1 note · View note
fedgovwhistleblower · 5 years
Video
youtube
Huge Proof Beyond A Preponderance Of Evidence 9/11 Twin Tower Was A Domestic Terrorists Act By United States Highest Ranking Elected Federal Government Officials, Pentagon, Intelligence, Department Of Justice, Mainstream Media and Social Media. 9/11 Twin Towers, Pentagon and Six other buildings were attacked by US Military Advanced DEW, Missile And Drone plane.....Facts, No planes were Involved as claimed.....Which others and I have proven.
1 note · View note
fedgovwhistleblower · 5 years
Video
youtube
THE UNITED STATES AND FVEY, NINE, FOURTEEN ILLEGAL SPYING EYES ARE BEHIND EVERY UFO SIGHTING IN THE WORLD... ABUSING HIGHLY ADVANCED MILITARY SOLAR WARDEN, DIRECT ENERGY, TR-3B, TR-3A, TR6 TELOS TO PROMOTE LIES, FEAR, PANIC, CHAOTIC CONFUSION....WHILE KILLING MILLIONS AROUND THE WORLD FREE THINKERS. GOAL TO HAVE TOTAL CONTROLLED SLAVES GOVERNMENTS CAN MANIPULATE AT WILL. ASSASSINATE HALF OF MANKIND TO SUPPOSEDLY CREATE A BETTER WORLD ORDER AND STOP MINORITIES SHIFT IN GROW. BY 2042 https://www.pinterest.com/FedGovWhistleblower/ Nov 27, 2019 Proof of Overt Discrimination, Tyranny, Mass Genocide, Gross Waste, Fraud, Abuse, US Constitution Civil Liberties, Civil Rights Willful Violations, Whistleblower Protection Violations. Done to Americans and Disabled US Army Honorable Discharged Veteran Cybersecurity Global Whistleblower. Whistleblower complaint based on multiple incidents; watchdog won't disclose info Holt v. Veterans Administration, Volume II I-123 Docket Number ) SF-0752-11-0427-I-1...a must read. Published on October 9, 2016 https://www.linkedin.com/pulse/holt-v-veterans-administration-volume-ii-i-123-docket-michael-holt
1 note · View note
fedgovwhistleblower · 5 years
Video
youtube
Huge Proof Of United States Secret Space Program Solar Warden Advanced Antigravity Spacecraft Being Used In War And Possibly Domestically On Americans.
2 notes · View notes
fedgovwhistleblower · 5 years
Video
youtube
Nov 26, 2019 Proof Beyond A Preponderance US Military TR-3B anti gravity technology over the Middle East check this out. - Facts, Waste, Fraud, Abuse, Tyranny, Treason, Collusion, Culpable, Guilty
1 note · View note
fedgovwhistleblower · 5 years
Video
youtube
Nov 24, 2019 Proof Of United States Secret Antigravity Propulsion Systems-EXPOSING THE TRUTH !! - Promoting Aliens and UFO's? Costing Trillions of US Taxpayer Dollars? Truly Unbelievable
1 note · View note
fedgovwhistleblower · 5 years
Video
Nov 24, 2019 United States Solar Warden Secret Spacecraft TR-3B Astra which isn't a UFO Compilation. It Also Isn't Alien Technology Are Reversed Engineering, It's Based On Tesla's And German Designs.
1 note · View note