Tag: USAF

Did Hillary Clinton sell Secret Space Program technologies to China?

The anonymous group Q (aka QAnon), which has strong ties to the Trump administration and U.S. military intelligence, claims that former Secretary of State, Hillary Clinton, orchestrated a pay-to-play scheme where classified information was uploaded to her private servers, which were deliberately left susceptible to hacking from foreign entities. Among these entities was China which used the classified material from Special Access Programs and Sensitive Compartmented Information found on the Clinton servers to learn about advanced technologies deployed by the U.S. military in space.

There is documentary evidence that Clinton was granted access to classified information on space technologies, and this was a topic covered in her emails discussing a range of issues including a possible UFO disclosure initiative. According to the information provided by Q, Clinton’s ultimate goal was to sell classified information that would allow China to bridge the technological gap with a secret space program run by the U.S. Air Force, rather than genuinely disclosing the truth behind the UFO phenomenon.

Q has posted multiple times on Clinton selling America’s technological secrets to China during the period between January 21, 2009 and February 1, 2013 when she was US Secretary of State, and had access to advanced technology secrets including spy satellites and other space assets.

The most recent post was today, March 13 (post #3045). It is worth breaking down the post to distill what Q is communicating about Clinton’s access to Special Access Programs (SAPs) and Sensitive Compartmented Information [SCI]. Q communicates information by raising leading questions, which the reader is expected to research and answer using previous information reveald by Q:

HOW DID HRC [Clinton] OBTAIN SAP (SPECIAL ACCESS PROGRAMS) ON HER PERSONAL SERVER(S)?
ACCESS TO SAP/SCI IS RECORDED IN A LOCAL ACCESS REGISTER OR IN A COMPUTER DATABASE —- WHERE ARE THE RECORDS?
IDEN OF ‘SPECIFIC’ SAP/SCI ON THE SERVER PROVIDES A TARGET (ROADMAP) TO REVIEW ACCESS LOGS TO THAT SPECIFIC PROGRAM?
WHAT PROCESS AND/OR SEC CLEARANCE WOULD BE REQ TO WALK-AWAY [TERMINAL_CLEAR] W/ SAP/SCI MATERIAL ‘ELECTRONICALLY’?

Q is here explaining that Clinton made special arrangements within the Department of State in order to gain access to SAP/SCI material outside of normal security protocols. Her bypassing of established security protocols for digital information made it possible for foreign entities to hack into her private servers to gain access to the classified material according to Q:

Did a Foreign State gain access to the server?
Did a Foreign State gain access to the SAP/SCI material on the server?
https://thehill.com/policy/national-security/404192-fbi-denies-trump-claim-that-china-hacked-clintons-private-email

The link is to an article by The Hill debunking an August 28 tweet by President Donald Trump that China had hacked into Clinton’s private server.

The point Q is making by linking to the article by The Hill, which Q regards as a prominent part of the fake news establishment, is to identify China as the “Foreign State” that had gained “access to the SAP/SCI material on the server”, just as Trump had tweeted.

In an earlier September 4, 2018 post (#2077), Q makes it crystal clear that China had hacked into the Clinton servers, and this was part of a pay-to-play scheme:

Ex 1 – ‘Being Afraid’
Does HRC care about you?
If she cared about protecting you…
Would she sell out America’s secrets and Uranium to China/Russia [Ex 1]?

In yet another post, on February 22, 2018, Q says that Clinton [HRC] was operating with the CIA [Clowns] in selling technological secrets to China:

Clowns revealed in China/other.
2010.
[187]
Sold intel?
HRC open source server?
[Missing emails]
[CrowdStrike]
Granted access.
Betrayed.
Only the tip.
This will be made public [soon].
Q

Basically, Q is revealing that Clinton’s scheme of selling advanced technology secrets through susceptible private servers was sanctioned by the Deep State, which was betraying the US national interest.

It was determined by the Inspector General for the Intelligence Community, Charles McCullough, that included among the emails sent and stored on Clinton’s private servers was classified information concerning Special Access Programs (SAPs). In a letter dated January 14, 2016, Charles McCullough wrote:

To date, I have received two sworn declarations from one [intelligence community] element. These declarations cover several dozen emails containing classified information determined by the IC element to be at the CONFIDENTIAL, SECRET, and TOP SECRET/SAP levels. According to the declarant, these documents contain information derived from classified IC element sources.

Fox News, which was the first comment on McCullough’s letter, described its significance:

Intelligence from a “special access program,” or SAP, is even more sensitive than that designated as “top secret” – as were two emails identified last summer in a random sample pulled from Clinton’s private server she used as secretary of state. Access to a SAP is restricted to those with a “need-to-know” because exposure of the intelligence would likely reveal the source, putting a method of intelligence collection — or a human asset — at risk. Currently, some 1,340 emails designated “classified” have been found on Clinton’s server, though the Democratic presidential candidate insists the information was not classified at the time.

It’s worth emphasizing that the SAP information was found in only random sample of the Clinton emails, suggesting a great many more lay among the 1,340 classified emails that were sent and stored on the Clinton private server.

Declassified Freedom of Information Act documents confirm that Clinton has had an interest in UFOs dating back to 1995, and that during the 2016 election campaign, she and her campaign chief, John Podesta, had raised the UFO issue on several occasions. For example, on December 30, 2015, she said:

He [John Podesta] has made me personally pledge we are going to get the information out. One way or another. Maybe we could have, like, a task force to go to Area 51.

Clinton followed this up with a statement on Jimmy Kimmel Live in March 2016, where she discussed UFOs, or what she referred to now as “Unexplained Aerial Phenomenon” (UAP). She pledged to release any UFO/UAP files that were not classified for national security reasons:

I would like us to go into those files and hopefully make as much of that public as possible. If there’s nothing there, let’s tell people there’s nothing there. If there is something there, unless it’s a threat to national security, I think we ought to share it with the public.

Documents leaked by Wikileaks confirm that the Clinton and Podesta were doing more than simply making comments in support of declassifying UFO/UAP information. Podesta was involved in meetings discussing the testimony of Major General William McCasland and other insiders about their knowledge of the UFO topic, and strategizing over how the Clinton campaign could support a disclosure initiative to release this information to the US public.

Given her historical interest in UFOs and publicly disclosing this information, it is all but certain that some of Clinton’s emails discussing the UFO topic were stored on her private server, and this encroached on SAP/SCI material concerning advanced space technologies.

According to Q, the SAP/SCI information sold by Clinton was covertly raising slush funds for the Deep State (Eye of Ra) as revealed in a December 22, 2017 post [#228]:

2011 Shuttle Program terminated by Hussein [Obama].
US loses space dominance.
http://www.foxnews.com/opinion/2017/08/09/obama-administration-knew-about-north-koreas-miniaturized-nukes.html
IRAN Nuke deal.
NK Nuke/Missile Tech.
SpaceX.
NASA Tech to ?
HRC SAPs (private server).
Connected.
$$$,$$$,$$$.00 (pockets).
EYE OF RA.
Left eye [marker].
Symbolism.
EVIL.
STUPID.
JUSTICE.
Q

Significantly, Q was referring to North Korea as a recipient of NASA’s technology secrets and mentioned Elon Musk’s Space X as playing a role. Presumably, the Deep State was helping North Korea develop its ballistic missile capabilities with the latest rocket technologies developed by NASA and, incredibly, Space X.

To learn more about the kind of SAP information Clinton was including in her emails, we can turn to a Sensitive Compartmented Information [SCI] Nondisclosure Agreement she signed on January 12, 2009, which outlined her legal responsibilities. Importantly, her Nondisclosure Agreement reveals four SCI control systems (which cover material from multiple SAP’s) she would have access to.

Among the four SCI control systems accessed by Clinton was Talent Keyhole (TK) which is described as a “top-level control system” involving a number of surveillance platforms in very high altitudes and space:

TK covers space-based IMINT (Imagery intelligence), SIGINT (Signals intelligence), and MASINT (Measurement and signature intelligence) collection platforms; related processing and analysis techniques; and research, design, and operation of these platforms… The original TALENT compartment was created in the mid-1950s for the U-2. In 1960, it was broadened to cover all national aerial reconnaissance (to later include SR-71 sourced imagery) and the KEYHOLE compartment was created for satellite intelligence. [Source: Wikipedia]

Put simply, Talent Keyhole is surveillance data gained from America’s most highly classified space platforms, which allegedly only involves data from spy satellites the U.S. Air Force and its partners in the military intelligence community (National Reconnaissance Office, National Security Agency and Defense Intelligence Agency) has sent into space.

In reality, however, the USAF and its partners have secretly developed and deployed far more advanced technologies in space as acknowledged by Q in a post dated September 19, 2018 (2224) where they answered several questions raised on the 8chan forum:

Q,

Did NASA fake the moon landings? Have we been to the moon since then? Are there secret space programs? Is this why the Space Force was created?

False, moon landings are real.
Programs exist that are outside of public domain.
Q

Q was here acknowledging that secret space programs are real and the information is classified at a very high level “outside of public domain”. This refers to Special Access Programs that are associated with the Talent Keyhole control system that Clinton was granted “need to know” access to.

According to my research into secret space programs, the USAF has deployed manned space stations, along with orbital weapons platforms incorporating destructive technologies such as “Rods of Gods” and “Directed Energy Weapons”.

These are all part of a USAF run secret space program, which operates advanced antigravity craft from sensitive facilities such as Nevada’s Area 51, the Utah Test and Training Range, Kirtland Air Force Base in New Mexico, and Florida’s McDill Air Force Base, home of Special Operations Command.

In late 2017, different shaped antigravity platforms such as flying triangles, rectangles and cylindrical craft were photographed near McDill AFB in a disclosure initiative being conducted by USAF Special Operations, which encouraged a local resident to take the photos for public dissemination.

The conclusion that can be drawn from Q’s posts is that included among the SAP/SCI material that Clinton was storing on her servers, was Talent Keyhole level information about the surveillance capabilities of the USAF run secret space program. This highly sensitive information appears to have been sold off in an illicit intelligence market to major U.S. rivals such as China and North Korea with the support of the Deep State and the CIA.

It is possible that Clinton’s interest in UFO disclosure, was used as a cover to discuss Talent Keyhole material in emails that would be saved on her private servers, and eventually accessed by Chinese and other foreign hackers.

From the documents and evidence that has been made public so far, it is clear that Clinton had SAP/SCI material on her private servers, and this included Talent Keyhole level material which she had been granted “need to know” access. This makes Q’s claims that Clinton was selling off America’s advanced technology secrets to China and North Korea very plausible.

Consequently, the possibility that Clinton was part of a Deep State/CIA plan to funnel technological secrets, including information about a USAF run secret space program, to China, North Korea and other foreign entities, demands a serious investigation.

Indeed, some of the more than 80,000 sealed cases that have been identified in PACER judicial records, may involve charges of treason against Deep State officials involved in selling off America’s advanced technology secrets.

It can be hoped that as more information is released in anticipated criminal/military trials that Q contends are imminent, that these provide the opportunity for official disclosure of a USAF secret space program, and the release of advanced technologies that would greatly benefit the general public.

© Michael E. Salla, Ph.D. Copyright Notice

Further Reading

The Secret Navy behind the Ballistic Missile Attack on Hawaii

As information continues to emerge confirming that there was a ballistic missile attack against Hawaii that was intercepted on January 13, the investigation begins to shift from what happened, to who was responsible. In this article, I analyze various sources describing the attack, and identify the mysterious naval force that was most likely responsible for launching the ballistic missile, which presumably was nuclear armed.

In my January 17 article, I listed three alternative news sites referring to sources that all said that a ballistic missile was launched against Hawaii by a stealth submarine. The alternative news sources were radio host Dr. Dave Janda, Operation Disclosure (RV/Intelligence Alert), and the Public Intelligence Blog. The Operation Disclosure and Public Intelligence blog sites point to an Israeli submarine as responsible, while Dr. Janda said it was a submarine belonging to a rogue Chinese Navy faction.

Further corroboration for the ballistic missile attack explanation comes from former Forbes Magazine writer, Benjamin Fulford, who says that according to his insider sources, there was a submarine based attack:

One sign of this extreme tension came last week when “a missile from a cabal submarine was stopped from hitting Hawaii and the submarine was sunk,” Pentagon sources say.  Media outlets around the world have reported that Hawaiian residents all received the following warning on their mobile phones:  “BALLISTIC MISSILE THREAT INBOUND TO HAWAII, SEEK IMMEDIATE SHELTER, THIS IS NOT A DRILL,” but later this was reported to be a false alarm.  It was not—it was an attempt by “the cabal” to blame the attack on North Korea and use it as a trigger for their long-desired World War III, CIA sources say.

Both Fulford and the Public Intelligence claim that the ballistic missile was intended to simulate a North Korean attack suggesting the responsible submarine was in the vicinity of North Korea, either in the Sea of Japan or off the Japanese coastline.

In determining the type of missile attack against Hawaii, yet another source refers to a Hawaii tourist boat about 100 miles out at sea that saw what appeared to be a meteorite exploding in the air shortly before the Hawaii Emergency alert went out Saturday morning, January 13. The additional source appeared as an update to the original Public Intelligence blogsite article about the Hawaii missile attack:

Word here in Hawaii is that a group of tourists and tour guides were on a boat 100 miles off shore Saturday morning around 8 AM when they witnessed what they thought to be a meteor blowing up over the ocean. It was reported on Hawaiian channel 2 but then removed from their website. Rumor is the launch came from an Israel Dolphin 2 submarine. Some college basketball games had a red alert across the screen from US Pacific Command declaring a missile launch in the Pacific near Hawaii.

This additional Hawaii source is vital in understanding what happened since it reveals that the missile was coming down from the upper atmosphere following a ballistic trajectory similar to a meteor. This helps confirm that a ballistic missile was involved rather than another type of nuclear delivery system such as a cruise missile which fly much closer to ground and have a far more limited range.

Of the sources cited so far, aside from Dr. Janda, all believe a faction of the Israeli Navy was behind the attack using a dolphin class submarine supplied by Germany. The USS Liberty attack during the 1967 Arab Israeli war is often cited as an example of Israel launching a false flag attack against the U.S. to embroil it in wars against Israel’s regional enemies.

In a private email received on January 19, former CIA covert operative and Marine Intelligence Officer, Robert David Steele, says that the attack was a “Zionist submarine doing a USS Liberty on Hawaii”.

In considering the possibility of a rogue Israeli submarine being responsible, it’s important to review the armaments possessed by the class of submarines belonging to the Israeli Navy. In a news story describing Israel’s possession of Dolphin class submarines purchased from Germany, its armaments are described as follows:

The Dolphin boats are equipped with six 533mm standard torpedo tubes and four 650mm jumbo tubes and can carry 16 weapons. The smaller tubes can fire torpedoes and Harpoon anti-ship missiles as well as other conventional weaponry, but its larger tubes are what makes the Dolphin class so special. From them, frogmen, remotely operated vehicles and especially large cruise missiles capable of carrying nuclear payloads can be deployed.

Israel’s Dolphin Class submarines can carry cruise missiles which are well suited for Middle East operations, rather than ballistic missiles which are better suited for long distance targets thousands of miles away. Ballistic missiles require much larger “boomer submarines” to launch them, rather than the smaller Dolphin class submarines possessed by Israel.

The Dolphin 2 submarine is 69 meters (225 feet) in length, which is less than half the size of the Ohio class boomer submarines (170 meters/560 feet long) used by the US Navy to carry Trident ballistic nuclear missiles. Sea Launched Ballistic Missiles need vertical missile tubes as opposed to the more traditional horizontal torpedo tubes used for Sea Launched Cruise Missiles located at the front of the smaller Dolphin class submarine.

Consequently, it’s unlikely that a renegade faction of the Israeli Navy launched the ballistic missile attack since their Dolphin class submarines simply don’t have the capacity.

Furthermore, it’s hard to imagine how a U.S. war against North Korea and/or China would advance Israel’s national security interests, which are far more concerned about threats posed by major regional rivals such as Iran.

Dr. Janda describes a rogue faction of the Chinese Navy being responsible, and that after the missile had been intercepted and destroyed by the US. Missile defense system, the regular Chinese Navy destroyed the submarine.

This explanation is perhaps the scariest to consider since the US national security apparatus would almost certainly hold China responsible for such an attack despite any genuine factional divisions within the Chinese Navy.

The immediate U.S. response would have been, at the very least, a direct retaliatory nuclear attack against China’s main regional ally North Korea, which would have been scapegoated for a Hawaii attack. After destroying North Korea’s military infrastructure, the country would have then been subsequently overrun and occupied by the U.S. Military and its South Korean ally in an analogous way to Afghanistan after the 9/11 attack. 

China’s strategic interests would have been severely setback in such a scenario. It’s hard to imagine any Chinese military commander, rogue Navy faction or not, would risk a nuclear retaliatory strike by the U.S. that would set back China’s steady emergence into a global superpower over the next decade or so. Patience is a characteristic that China’s political leaders possess in abundance.

Consequently, I find it unlikely that a rogue faction of the Chinese Navy was behind the ballistic missile attack.

So who then launched the attack against Hawaii?

For an answer we need to consider legendary Hawaii Senator Daniel Inouye who in 1987 described the existence of a shadowy government within the U.S. with its own separate military assets.

There exists a shadowy Government with its own Air Force, its own Navy, its own fundraising mechanism, and the ability to pursue its own ideas of the national interest, free from all checks and balances, and free from the law itself.

Inouye was clearly convinced of a very highly classified U.S. agency that had the independent funding and wherewithal to develop its own Air Force and Navy outside the regular chain of military command.

In contrast to the assets of the regular U.S. Air Force and Navy, this covert fleet of ships and aircraft would be “dark”, in terms of its security classification. It would therefore be appropriate to call it the “Dark Fleet” which is what secret space program insider Corey Goode says it is called by the U.S. military according to his confidential sources [Skype Communication Jan 18). He says that it is separate to another “Dark Fleet” which is a Secret Space Program that operates in Deep Space.

I need to point out that in 2017, I personally met some of Goode’s confidential Earth Alliance sources. They provided many documents to prove they are deeply connected to NATO security operations and the European intelligence community. They have continued to provide Goode intelligence information since they consider him to be a genuine extraterrestrial contactee, and asset of a Secret Space Program Alliance known to exist by NATO officials.

What U.S. Government agency would have the ability to raise its own “Dark Fleet” outside the regular chain of military command and Presidential executive authority? The only U.S. agency capable of doing so is the Central Intelligence Agency (CIA). More specifically, we are talking about the CIA’s Directorate of Operations (formally Clandestine Service) which runs all its global covert operations, where a Dark Fleet would have been developed to meet operational requirements.

The 1949 CIA Act comprised additions to those sections of the 1947 National Security Act that dealt with the creation of CIA. The 1949 CIA Act gave a Congressional stamp of approval to the creation of a ‘black budget’ it could spend without recourse to U.S. law as the following section make clear:

… any other Government agency is authorized to transfer to or receive from the Agency such sums without regard to any provisions of law limiting or prohibiting transfers between appropriations [emphasis added]. Sums transferred to the Agency in accordance with this paragraph may be expended for the purposes and under the authority of sections 403a to 403s of this title without regard to limitations of appropriations from which transferred. [50 U.S.C. 403f(a)]

Essentially, this gave the CIA the power to generate large amounts of money through covert means and launder it however it wished through the Pentagon and the U.S. bureaucracy. The funding was used for an unofficial “black budget” that by 2001 was estimated to be as high as $1.7 trillion annually.

In addition to having the financial means, the CIA has long been developing its own covert Air Force. This began in the mid-1950’s when the CIA established Area 51, as the location to develop future fleets of spy planes with the aid of companies such as Lockheed, which today is the world’s largest defense contractor.

In the 1960’s the CIA began training personnel to develop skills necessary to operate its spy planes on U.S. aircraft carriers. CIA documents confirm that the U.S. Navy was training the CIA on how to operate spy planes on their carriers:

Source: Central Intelligence Agency Online Library

The above document went on to discuss how Kelly Johnson, Director of Lockheed’s Skunkworks, helped the CIA launch its U-2 spyplane from the USS Kitty Hawk

Another CIA document shows the Navy’s reluctance to allow the CIA to use its aircraft carriers to carry spy planes in trouble spots like the Mediterranean, thereby creating the operational necessity for the CIA to eventually acquire its own aircraft carrier to carry fleets of spy planes around the world.

Source: Central Intelligence Agency Online Library

These official CIA documents support the conclusion that by the 1970’s the CIA’s Directorate of Operations had its own squadrons of spy planes, and would have acquired its own aircraft carrier out of operational necessity that it could operate anywhere around the world without any kind of government oversight.

As far as the CIA having its own submarines, a Washington Times article from January 3, 1985 shows that two ballistic missile submarines, USS John Marshall and Sam Houston were handed over to a 2000 man Special Operations Force.

Source: Central Intelligence Agency Online Library

It can be guaranteed that the CIA’s Directorate of Operations would have similarly justified the acquisition of ballistic missile capable submarines for its own covert operations around the world.

With the CIA’s role in generating multiple black budgets, it could easily have diverted some of these funds to defense contractors for building ballistic missile capable submarines for exclusive use in clandestine operations. It’s worth noting that Lockheed Martin builds the Trident II ballistic missiles for the Ohio class submarines currently possessed for by U.S. Navy.

As noted earlier, the CIA and Lockheed have developed a long and close relationship since their joint efforts to develop Area 51 for spy planes and other advanced technologies in the 1950’s. Therefore it is very possible that the CIA’s Dark Fleet possesses Trident II ballistic nuclear missiles developed by Lockheed Martin.

Consequently, Inouye’s claims of a shadowy government possessing its own Air Force and Navy is very feasible given what we know about the CIA’s history, and official documents showing its military assets, training and close relationship with defense contractors such as Lockheed Martin.

The CIA had the independent funding to create squadrons of spy planes that could operate from an aircraft carrier with the necessary support craft that altogether constituted a CIA controlled aircraft carrier battle group that included nuclear submarines.

So was the CIA’s Dark Fleet behind the ballistic missile attack on Hawaii? I put this question to Corey Goode and he responded:

Yes, They DO have an Air Craft Carrier and destroyers and support vessels, a whole fleet….This stuff has been a part of recent briefings in the form of informed speculation as to what occurred in Hawaii/Japan. All are pretty convinced that a rogue CIA sub fired missiles and MIC SSP [USAF/NRO/DIA Secret Space Program] took the missiles out. We are all waiting for specifics and confirmation but these are “read in” General/Colonel types doing the speculating.[Skype Communication 1/19/18)

The CIA’s Directorate of Operations has long been the primary asset of what Inouye called the Shadow Government, but today is referred to as the “Deep State”. Due to President Trump’s December 21, 2017, Executive Order freezing the financial assets of all involved in human rights abuses and corruption,  Trump was not only declaring war against U.S. global elites involved, but also against the funding sources for the CIA’s covert operations.

The CIA’s black budget is made possible by human rights abuses and corruption around the planet that provides almost unlimited funds for its covert operations, including its Dark Fleet. Consequently, the CIA’s Dark Fleet had the means, motive and opportunity to attack Hawaii with a ballistic nuclear missile  that would embroil the Trump administration in a major regional war with North Korea and possibly China.

Significantly, on January 16, Japan’s major public broadcaster also warned the public about an incoming ballistic missile attack. Once again, a false alarm was issued shortly after by government authorities.

It’s quite possible that the same submarine responsible for the Hawaii attack, launched another missile attack, this time against Japan, presumably Tokyo. It was also brought down, probably by the same defense forces that tracked and destroyed the Hawaii bound missile. Again, the purpose would have been to simulate a North Korean attack thereby triggering a major regional war.

Such a war would distract the Trump administration and U.S. military from going after Deep State assets, and tie down the U.S. in a serious regional confrontation. Thankfully, the U.S. Navy and Air Force, along with the USAF run secret space program, were able to neutralize the attacks on Hawaii and Japan.

The multiple sources and documents cited above lead to a remarkable conclusion. A CIA created secret Navy launched ballistic missile attacks against Hawaii and Japan using a Dark Fleet created in the 1970’s to support covert operations around the world.

Consequently, neutralizing the “Dark Fleet” and reigning in the CIA’s Directorate of Operations must become a high priority goal for the Trump Administration and the Pentagon. A major step in doing so is for the truth to be officially released about ballistic missile attacks against Hawaii and Japan.

 

© Michael E. Salla, Ph.D. Copyright Notice

[Note: My thanks to Corey Goode for reading an earlier draft of this article and his helpful suggestions.]

Further Reading

NSA document supports whistleblower claim of alien UFO communication program

NSA leaked slide showing SENTRY EAGLE program where different DHS, DOD, and NSA clasified programs are hidden within less classified national programs. (NSA)
NSA leaked slide showing SENTRY EAGLE program where different DHS, DOD, and NSA clasified programs are hidden within less classified national programs. (NSA)

On October 10, Peter Maass and Laura Poitras writing for The Intercept, released more powerpoint slides from leaked NSA documents concerning highly classified programs that are hidden from public scrutiny. The documents, originally leaked by Edward Snowden, reveal that “Sentry Eagle” is used as an umbrella term for hiding the NSA’s most sensitive programs that are classified “Exceptionally Controlled Information” (ECI). Several powerpoint slides show how ECI programs are hidden beneath less classified programs as a cover. The leaked documents support claims made 16 years earlier by Dan Sherman, another NSA whistleblower, who revealed that he worked in a secret communications program with alien (extraterrestrial) entities that was hidden beneath less classified NSA programs as a cover.

The Intercept article discusses a 13 page “brief sheet” about “Sentry Eagle”:

“You are being indoctrinated on Sentry Eagle,” the 2004 document begins, before going on to list the most highly classified aspects of its various programs. It warns that the details of the Sentry Eagle programs are to be shared with only a “limited number” of people, and even then only with the approval of one of a handful of senior intelligence officials, including the NSA director.

Among the leaked power point slides is a set called “Core Secrets Slide Slices.” These slides (see slideshow) reveal how ECI programs are only made available to a few select individuals within the Intelligence Community with a strict need to know access. Two of the slides show how Sentry Eagle acts as an umbrella for hiding its most sensitive ECI programs under less classified programs. This supports the claims by Dan Sherman who worked for three years as an electronic intelligence specialist with the NSA.

Dan Sherman served with the US Air Force for twelve years (1982-1994), and received a number of awards including the Commendation Medal and the Achievement Medal. He revealed that he was recruited into a classified program, “Project Preserve Destiny” (PPD), that was conducted under the auspices of the National Security Agency (NSA). The training was for Sherman to become an “intuitive communicator” with extraterrestrial biological entities (EBEs). Essentially, Sherman would learn to telepathically interface with EBEs and pass on this information through a secure computer system to his handlers within the NSA. Sherman’s training for PPD was conducted at the same time while training for a conventional military career in electronic intelligence (ELINT), which itself was classified.

Sherman NSA Certificate
Dan Sherman’s NSA Certificate. Extracted from Above Black: Project Preserve Destiny, p. 69. (Dan Sherman)

Sherman described that his ELINT training acted as a cover for his participation in PPD that spanned a three year period (1991-1994). In his book, Above Black: Project Preserve Destiny – Insider Account of Alien Contact and Government Cover-Up (1998), Sherman revealed how he was recruited and trained in a way unknown to his normal ELINT military trainers. The training occurred over the same period as his normal training in ELINT. When he was subsequently assigned to the NSA, Sherman worked on a specially designed computer where he could perform both his normal ELINT work, and also work as an intuitive communicator with EBEs.

This is how Sherman describes, in his 1998 book, the rational for hiding deep black alien related projects under the umbrella of a less classified program:

When someone is assigned to an alien project they are also assigned to the collateral black mission (cover mission). One of the reason for this is if someone were to reveal any alien information, by extension, they would most likely reveal something about the cover project and it would be on this basis that someone would be prosecuted for divulging classified information. (p. IX)

Sherman’s claim of working within a deep black project hidden within a less classified NSA project has been corroborated by the leaked NSA documents. “Sentry Eagle” operates precisely in the way described by Sherman’s account of his time working in two classified programs for the NSA from 1991 to 1994.

The leaked NSA documents reveal that Sentry Eagle has six programs:

  • Sentry Hawk (for activities involving computer network exploitation, or spying),
  • Sentry Falcon (computer network defense),
  • Sentry Osprey (cooperation with the CIA and other intelligence agencies),
  • Sentry Raven (breaking encryption systems),
  • Sentry Condor (computer network operations and attacks),
  • Sentry Owl (collaborations with private companies).

Sherman’s claims that he was recruited from the USAF for the NSA alien program while training as an ELINT specialist with the USAF suggests that Project Preserve Destiny was likely part of the Sentry Osprey program that involved cooperation between the NSA and other intelligence agencies.

After officially retiring from the USAF and ending his classified work with the NSA, Dan Sherman went public with his 1998 book in which he supplied documentation of his training and work with the NSA as an electronic intelligence specialist. Sherman’s claim made 16 years ago that he worked in a highly classified (“above black”) program hidden within a less classified NSA “black” program has not been corroborated until now with the leaked Snowden documents. Sherman’s claims suggest that within one or more of the NSA’s Sentry Eagle six compartments, there are ongoing alien (extraterrestrial) projects that are hidden within less classified NSA cover programs.

 © Copyright 2014. Michael E. Salla, Ph.D. Exopolitics.org

  • 1
  • 2

Copyright © 2019 Exopolitics Institute News Service. All Rights Reserved.