It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Jake56
a reply to: BigDave-AR
Hah hah funny funny. You can always find an covert OP when they never answer the question. You have been made fool
originally posted by: gernblan
So the article say that the document has been downloaded and people keep claiming to have read it yet I can't seem to find it available anywhere. Maybe it's me but I would really appreciate it if somebody would maybe post a link as to where we can download and read this ourselves. Thank you.
He signed his name beneath the words: “Innocent Indefinitely Incarcerated Inmate #79471-054.”
originally posted by: Cauliflower
a reply to: gernblan
You can read the Wiki article concerning "Vault 7" on your own, its aimed at the same audience as popular movies such as "the Net" and "hackers" but doesn't delve into the earlier roots of the CIA.
He signed his name beneath the words: “Innocent Indefinitely Incarcerated Inmate #79471-054.”
The National Security Act of 1947 officially established the US CIA, however there were secret agencies such as the Army Signals Corps from the 1920's that used vaults to keep government and diplomatic communications secret.
There were "hand ciphers" used for the Kryptos sculpture at the old CIA building dedicated in the 1990's.
The plaintext revealed in the puzzle including the Howard Carter exploit of the Great Pyramid in 1921 is much older.
If your searching for clues in the 1920-1930's you wouldn't find any pornography even with pizza gate as a key word.
Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs,[1] web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA),[2][3][4] and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux.
In 2017, federal law enforcement identified CIA software engineer Joshua Adam Schulte as a suspected source of Vault 7, though no formal charges concerning this case have been brought against him.
And THIS crap, is why the internal process for blowing the whistle is dysfunctional and not fit for purpose.
It IS appropriate for those tasked with protecting nations, to be accountable, immediately and without the slightest ability to prevent it, for ANY remote violation of the standards that the people expect from them. That can only be made possible, if the route by which a person within the intelligence community is to get redress for grievances and concerns about the intelligence agencies, reports to someone OUTSIDE those agencies. Its as simple as that.
originally posted by: Cauliflower
a reply to: Boadicea
Wikipedia is family friendly (like ATS) so even prepubescent children that are not interested in pornography can learn about how covert shadow agencies work, what it means when president Trump talks about "choices", and how even people like "Q" that work for a covert agency can still maintain integrity while teaching independent thinking.
Sorry for the wall of run on text.