Breakaway Civilization / Whistleblowers

Snowden Reveals First Ever Public Disclosure Of Secret Black Budget Programs

Reposted from: Earth. We are one | by Collective Evolution

Edward Snowden, a former intelligence contractor has leaked the very first documentation that proves the existence of clandestine black budget operations (1) (programs that are extremely classified dealing with technology, information and more.) Did we really need this leak in order to believe that black budget programs operate in secrecy?

No, many people will tell you that the existence of black budget programs was obvious and that we didn’t need any official documentation to prove it, but this still helps. The United States has a history of government agencies existing in secret for years. The National Security Agency (NSA) was founded in 1952, its existence was hidden until the mid 1960’s. Even more secretive is the National Reconnaissance Office, which was founded in 1960 but remained completely secret for 30 years.

We are talking about Special Access Programs (SAP). From these we have unacknowledged and waived SAPs. These programs do not exist publicly, but they do indeed exist. They are better known as ‘deep black programs.’ A 1997 US Senate report described them as “so sensitive that they are exempt from standard reporting requirements to the Congress.” (0) (8)

The Washington Post revealed that the “black-budget” documents report  a staggering 52.6 billion dollars that was set aside for operations in the fiscal year 2013. Although it’s great to have this type of documentation in the public domain proving the existence of  these black budget programs, the numbers seem to be off according to some statements made by some very prominent people who have been involved in the defense sector for years. There is a lot of evidence to suggest that these programs are not using billions of dollars, but trillions of dollars that are unaccounted for. Here is a statement given by Canada’s former Minister of National Defence, Paul Hellyer in 2008:

It is ironic that the U.S. would begin a devastating war, allegedly in search of weapons of mass destruction when the most worrisome developments in this field are occurring in your own backyard.  It is ironic that the U.S. should be fighting monstrously expensive wars  allegedly to bring democracy to those countries, when it itself can no longer claim to be called a democracy when trillions, and I mean thousands of billions of dollars have been spent on projects which both congress and the commander in chief no nothing about (2)

We are talking about large amounts of unaccounted-for money going into programs we know nothing about. There have been several congressional inquiries that have noted billions, and even trillions of dollars that have gone missing from the federal reserve system. On July 16, 2001, in front of the house appropriations committee, Secretary of Defense Donald Rumsfeld stated:

The financial systems of the department of defence are so snarled up that we can’t account for some $2.6 trillion in transactions that exist, if that’s believable (3)

We don’t really hear about black budget programs, or about people who have actually looked into them.  However, the topic was discussed in 2010 by Washington Post journalists Dana Priest and William Arkin. Their investigation lasted approximately two years and concluded that America’s classified world has:

Become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employes, how many programs exist within it or exactly how many agencies do the same work  (4)

Another person was aviation journalist Bill Sweetman. Within the Pentagon, he estimated that approximately 150 special access programs existed that weren’t even acknowledged. These programs are not known about by the highest members of government and the highest ranking officials in the military. He determined that most of these programs were dominated by private contractors (Lockheed Martin, Boeing, etc.) and that he had no idea as to how these programs were funded(5)(8).

Dwight Eisenhower, former 5 star U.S. general (highest possible rank) and President of the United States also warned us about  secrecy and the acquisition of unwarranted influence within the “department of defence” with his farewell speech:

In the council of government, we must guard against the acquisition of unwarranted influence whether sought or unsought, by the military industrial complex. The potential disaster of the rise of mis placed power exists, and will persist. We must never let the weight of this combination endanger our liberties or democratic processes (6)

He warns us about the influence of the military industrial complex, and the influence and power it’s capable of. After Eisenhower the next and only other president that blew the whistle on secrecy beyond the government was president John F. Kennedy in one of his most famous speeches, he is also referring to the military industrial complex:

The very word secrecy is repugnant, in a free and open society. And we are as a people inherently and historically opposed to secret societies, secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. Even today, there is little value in opposing the threat of a closed society by imitating its arbitrary restrictions. Even today, there is little value in insuring the survival of our nation if our traditions do not survive with it. And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment. That I do not intend to permit to the extent that it is in my control. We are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence. On Infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations. Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumour is printed, no secret is revealed (7)

The amount that the US sets aside for sensitive operations each year is not allowed to be published for eyes outside of the intelligence community. We are in an age where the US is having a difficult time keeping sensitive information under wraps, and although there is an abundance of blatant information for the world to wake up to, that which is still kept under tight wraps has also become more transparent. Many phenomena previously labelled as merely a “conspiracy theory” are now surfacing as true and verifiable day after day.

Could some of these black budget programs be dealing with UFOs? There is a large amount of evidence to suggest that they do, and possibly even extraterrestrials. Documents from the NSA prove that UFOs and extraterrestrials are of high interest to the agency(9)(10). In fact I would like to mention that there is an overwhelming amount of evidence to suggest that these black budget programs deal with matters beyond our world. Garry McKinnon has also shed light on this fact, as have thousands of previously classified documents and statements from high level government and military personnel. The world within our own world must be quite fascinating, the fact that we are living in the time of transparency must mean that the truth cannot stay hidden forever.

Worlds Within Worlds 

Excerpt from the book “A.D. After Disclosure” written by Richard Dolan and Bryce Zabel (8).

Richard Dolan’s Thoughts on the “Breakaway Civilization”

By now, the classified world has moved far beyond the reach of the public world, and far beyond in its power and capabilities. Consider the story of a former NSA scientist who spoke with the authors. According to this individual, the NSA was operating computers during the mid-1960s with a processing clock-speed of roughly 650 megahertz(MHZ). To put that in perspective, it took 35 years for personal computers in the consumer market to reach that speed. Indeed, in 1965 there were no personal computers at all. Immediately, the near-fatal Apollo 13 mission in 1971 comes to mind, with its reliance on slide-rulers by mission specialist to guide the damaged NASA spacecraft back to Earth. When presented with this image, the NSA scientist shrugged and stated that secret computational capabilities were too important to share with NASA. So in, in computing, the National Security Agency was an amazing 35 years ahead of the rest of the world. This leads one to wonder what its computational powers are today.

Another example was the U.S. air strike against Libya in 1986. The raid employed f-111 fighter aircraft. Left out of the mission, however, was the F-117A Nighthawk, better known as the stealth fighter. It had been operational since 1983, but was still classified in 1986. In a form of logic both perverse and rational, the F-117A was so radically advanced that keeping it secret was more important than using it for this military mission.

Given the mixture of a treasure chest of government money, and private connections, the likelihood exists that six decades later there is a clandestine group that possesses:

  • Technology that is vastly superior to that of the “mainstream” world.
  • The ability to explore areas of our world and surroundings presently unavailable to the rest of us.
  • Scientific and cosmological understandings that give them greater insights into the nature of our world
  • A significant “built off the grid” infrastructure, partially underground, that affords them a high degree of secrecy and independence of action

This might well qualify them as a separate civilization – one that has broken away from our own, in effect, a breakaway civilization. Still interacting with our own, its members probably move back and forth between the official reality of what we are supposed to believe, and the other reality which encompasses new truths and challenges.

Are you on “Tsu” yet? Its a new social media platform that pays you for creating and sharing content! Thousands of people have already joined. Its just like Facebook, it takes seconds to join, and even easier to use! And best of all you can reach 100% of your friends and audience, and NO Censorship. You can only join by Invite, and this is an invitation from us to youClick here to join! and be sure to Follow us too.




(2) Speech From Paul Hellyer



(5) Sweetman, Bill. “In Search of the Pentagon’s Billion Dollar Hidden Budgets: How the US Keeps Its R&D Spending Under Wraps.” Janes International Defence Reporter, Janurary  5, 2000

(6) Eisenhower’s farewell speech

(7) JFK Speech

(8) Dolan, M. Richard and Zabel, Bryce. A.D. After Disclosure. New Page Books. 2012




Snowden reveals US intelligence’s black budget: $52.6 billion on secret programs

From: RT

Former intelligence contractor Edward Snowden has leaked a new top-secret document that for the first time ever publically discloses how the United States spends tens of billions of dollars annually on clandestine spy programs.

The Washington Post revealed the so-called “black budget” on Thursday and reports that $52.6 billion was set aside for operations in fiscal year 2013.

Among the biggest priorities for the intelligence community, the Post reported, are “offensive cyber operations” and research devoted to decoding encrypted communications.

The Post’s Barton Gellman, Greg Miller and Julie Tate wrote Thursday that Mr. Snowden, the 30-year-old former Booz Allen Hamilton staffer who started leaking classified national security documents earlier this year, provided the paper with the never-before published summary of this year’s budget.

But although the Post reported that the document is 178 pages in length, they have at the same time elected to only make available one-tenth of the content, citing “concerns about the risk to intelligence sources and methods” brought up by US officials who were notified ahead of publication.

FY 2013 Congressional Budget Justification, provided by Washington Post

Sensitive details are so pervasive in the documents that the Post is publishing only summary tables and charts online,” the paper wrote in the article that accompanies the 17-page selection. The document is labeled “top secret” and warns that it is only to be accessed by US citizens with the proper security clearance.

Shrouded in secrecy, the amount that Uncle Sam sets aside for sensitive operations each year is not allowed to be published for eyes outside of the intelligence community and only for a portion of those briefed on its operations. The latest Snowden leak reveals that at $52.6 billion, the government is actually handing out 2.3 percent fewer than it did in fiscal year 2012 and, additionally, sequestration has caused the agencies to shed 1,241 positions, or around one percent of its workforce. Despite these setbacks, though, the budget, described by the Post as “a bureaucratic and operational landscape that has never been subject to public scrutiny,” includes billions of dollars towards operations that may not be funded if debated in the press.

In comparison, the Department of Homeland Security was allocated $55.4 billion in FY2013. The black budget comes in at a figure larger than the sums received by the Department of the Interior, the Department of Commerce and NASA this year combined.

Yet despite the hefty cost of operating the secret operations amid sequestration, excerpts from the summary leaked by Snowden show that the US still has significant setbacks keeping it from achieving its intelligence goals.

For one, the disclosure in and of itself demonstrates the intelligence community’s inability to prevent sensitive information from being leaked.

In FY2013, the budget summary says the government invested in ramping-up its counterintelligence operations at a time when budget cuts led to reductions in the community’s workforce, operations, long-term investments, infrastructure and information technology sectors.

To further safeguard our classified networks, we continue to strengthen insider threat detection capabilities across the community,” the document reads.

As the Post reported, however, the implementation of any insider threat program came too late to catch Snowden, who began mining for documents while employed as a contractor for Dell Inc in May 2012. Snowden began work at Dell in 2009 and it is not immediately clear what security clearance he had before or during the time he started scouring networks for documents, but the Post article claims “a major counterintelligence initiative” budgeted for FY2012 saw its own resources slashed after an “all-hands, emergency response” was ordered to deal with the disclosures then being published by the anti-secrecy group WikiLeaks.

The Post cites an excerpt from this year’s budget where it’s noted that programs are being implemented to “mitigate insider threats by trusted insiders who seek to exploit their authorized access to sensitive information to harm US interests.” Although Snowden’s disclosures — including this one — demonstrate that the $3.64 billion set aside to “integrate counterintelligence” in FY2013 could have likely benefited the intelligence community had it come sooner.

According to one graph included in the document, roughly 39 percent of this year’s black budget was set aside for providing strategic intelligence and warning, with around one-third going towards combating violent extremism. Counter weapons proliferation received 13 percent of total funding, and enhancing cybersecurity and integrating counterintelligence were allotted 8 and 7 percent, respectively.

More broadly speaking, Central Intelligence Agency programs were awarded 28 percent of the total $52.6 billion — or around $14.7 billion, with the Consolidated Cryptologic Program receiving the second most funding with roughly $11 billion. The Post reports that that program includes the National Security Agency on the division of the Air Force, Army, Navy and Marines that involves conducting surveillance and breaking and decrypting codes.

We are bolstering our support for clandestine SIGINT [signals intelligence] capabilities to collect against high priority targets, including foreign leadership targets,” DNI Clapper says in the summary. “Also, we are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic.”

Approached by the Post for comment before Thursday’s publication, Clapper said, “The United States has made a considerable investment in the Intelligence Community since the terror attacks of 9/11, a time which includes wars in Iraq and Afghanistan, the Arab Spring, the proliferation of weapons of mass destruction technology, and asymmetric threats in such areas as cyber-warfare.”

Our budgets are classified as they could provide insight for foreign intelligence services to discern our top national priorities, capabilities and sources and methods that allow us to obtain information to counter threats,” he added.

Through previous disclosures attributed to Snowden, though, the American public has learned that the NSA programs launched to collect foreign intelligence has allowed the federal government to sweep up personal and private information pertaining to Americans who are guaranteed constitution protection from such surveillance.

At the same time, the targeting of foreign persons of interest has apparently suffered significant losses as of late with regards to the intelligence community’s aspirations. The document claims that counterintelligence initiatives are being ramped up against “key targets” including China, Russia, Iran, Israel, Pakistan and Cuba, but the Post reported that five “critical” gaps currently exist keeping the US from collecting as much as it would like on North Korea.

Analysts know virtually nothing about the intentions of North Korean leader Kim Jong Un,” the Post reported, adding that those critical gaps have given America the inability to properly assess the nuclear and missile programs masterminded from Pyongyang.

Elsewhere, though, the reporters say that other parts of the budget suggest North Korea is anything but an active target.

A section on North Korea indicates that the United States has all but surrounded the nuclear-armed country with surveillance platforms,” the paper reported. “There are distant ground sensors to monitor seismic activity and scan the country for signs that might point to construction of new nuclear sites. US agencies seek to capture photos, air samples and infrared imagery ‘around the clock.’”

And for those nations of upmost interest, the intelligence community is investing heavily on “offensive cyber operations” launched by the CIA and NSA to hack foreign competitors, steal data and sabotage servers. The Post neglected to publish any excerpts from the summary detailing to what degree the intelligence community has been engaging in these strategic hacks, saying only that recently launched efforts are more “aggressive” than before. As RT has reported extensively in the past, the US government has been accused of being the biggest hackers on the planet at a time when, domestically, so-called cybercriminals are prosecuted at an alarming rate for comparably less harsh crimes.

Last week, RT reported that hacker and political activist Jeremy Hammond of Chicago, Illinois will soon be sentenced for his admitted role in aiding with malicious campaigns targeting the California Statewide Law Enforcement Association, computer servers used by various New York State police chiefs and a company that provides munitions used to gas protesters in Egypt, among others. According to a letter written by Hammond from a New York City jail cell, the US government used a confidential informant within the hacktivist groups Anonymous and LulzSec

to facilitate the hacking of targets of the government’s choosing – including numerous websites belonging to foreign governments.”

Why was the United States using us to infiltrate the private networks of foreign governments? What are they doing with the information we stole? And will anyone in our government ever be held accountable for these crimes?” Hammond asked.