Former intelligence contractor Edward Snowden has leaked the very first documentation that proves the existence of clandestine “black budget” operations. While many would argue the existence of black budget programs had already been established and we didn’t need any official documentation to prove it, surprisingly few people knew about these programs, so every bit of disclosure helps. The United States has had a history of harbouring secret government agencies for years. The National Security Agency (NSA), for instance, was founded in 1952, but its existence was hidden until the mid 1960s. Even more secretive is the National Reconnaissance Office, which was founded in 1960 but remained completely secret for 30 years.

We are talking about Special Access Programs (SAP). From these we have unacknowledged and waived SAPs. These programs do not exist publicly, but they do indeed exist. They are better known as “deep black programs.” A 1997 US Senate report described them as “so sensitive that they are exempt from standard reporting requirements to the Congress.”

--> Help Support CE: Become a member of CETV and get access to exclusive news and courses to help empower you to become an effective changemaker. Also, help us beat censorship! Click here to join.

According to the Washington Post, the “black-budget” documents reveal a staggering 52.6 billion dollars had been aside for operations in the fiscal year 2013. Although it’s great to have this type of documentation in the public domain to prove the existence of these black budget programs, the numbers seem to be off, at least according to some statements made by several prominent people within the defense sector. There is a lot of evidence to suggest that these programs are not using billions of dollars, but rather trillions of dollars, all of which are unaccounted for. Here is a statement given by Canadian former Minister of National Defence Paul Hellyer in 2008:

It is ironic that the U.S. would begin a devastating war, allegedly in search of weapons of mass destruction, when the most worrisome developments in this field are occurring in your own backyard. It is ironic that the U.S. should be fighting monstrously expensive wars in Iraq and Afghanistan, allegedly to bring democracy to those countries, when it itself can no longer claim to be called a democracy, when trillions, and I mean thousands of billions of dollars have been spent on projects about which both the Congress and the Commander in Chief have been kept deliberately in the dark. (source)

We are talking about large amounts of unaccounted-for money going into programs we know nothing about. There have been several congressional inquiries that have noted billions, and even trillions, of dollars going missing from the Federal Reserve system. On July 16, 2001, in front of the House Appropriations Committee, Secretary of Defense Donald Rumsfeld stated that “the financial systems of the department are so snarled up that we can’t account for some $2.6 trillion in transactions that exist, if that’s believable.”

We don’t really hear about black budget programs, or about people who have actually looked into them. However, the topic was discussed in 2010 by Washington Post journalists Dana Priest and William Arkin. Their investigation lasted approximately two years and concluded that America’s classified world has “become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.”

Another person was aviation journalist Bill Sweetman. He estimated that approximately 150 Special Access Programs existed within the Pentagon that weren’t even acknowledged. These programs are unknown to even the highest members of government and the highest ranking officials in the military. Sweetman determined that most of these programs were dominated by private contractors (Lockheed Martin, Boeing, etc.) and said he had no idea how these programs were funded (1)(2).

Former President Dwight Eisenhower, who was also a 5-star General, also warned us about secrecy and the acquisition of unwarranted influence within the department of defence in his farewell speech:

In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist. We must never let the weight of this combination endanger our liberties or democratic processes. . (source)

He warns us about the influence of the military-industrial complex. After Eisenhower, the next and only other president to blow the whistle on secrecy beyond the government was John F. Kennedy. He also refers to the military-industrial complex in one of his most famous speeches:

The very word “secrecy” is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. . . . And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment. . . . We are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence–on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations. Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed. (source)

The amount that the U.S. sets aside for sensitive operations each year cannot be disclosed to anyone outside of the intelligence community. But we are in an age where keeping sensitive information hidden is becoming increasingly difficult, and although there is an abundance of blatant information for the world to wake up to, that which is still kept under tight wraps has also become more transparent. Many phenomena previously labelled as merely “conspiracy theories” are now surfacing as true and verifiable day after day.

Could some of these black budget programs be dealing with UFOs? There is a large amount of evidence to suggest that they do, and possibly even extraterrestrials, too. Documents from the NSA prove that UFOs and extraterrestrials are of high interest to the agency (3)(4). In fact I would like to mention that there is an overwhelming amount of evidence to suggest that these black budget programs deal with matters beyond our world. Garry McKinnon has also shed light on this fact, as have thousands of previously classified documents and statements from high level government and military personnel.

The truth cannot stay hidden forever.

Worlds Within Worlds

Excerpt from the book A.D. After Disclosure, written by Richard Dolan and Bryce Zabel (8).

By now, the classified world has moved far beyond the reach of the public world, and far beyond in its power and capabilities. Consider the story of a former NSA scientist who spoke with the authors. According to this individual, the NSA was operating computers during the mid-1960s with a processing clock-speed of roughly 650 megahertz(MHZ). To put that in perspective, it took 35 years for personal computers in the consumer market to reach that speed. Indeed, in 1965 there were no personal computers at all. Immediately, the near-fatal Apollo 13 mission in 1971 comes to mind, with its reliance on slide-rulers by mission specialist to guide the damaged NASA spacecraft back to Earth. When presented with this image, the NSA scientist shrugged and stated that secret computational capabilities were too important to share with NASA. So in, in computing, the National Security Agency was an amazing 35 years ahead of the rest of the world. This leads one to wonder what its computational powers are today.

Another example was the U.S. air strike against Libya in 1986. The raid employed f-111 fighter aircraft. Left out of the mission, however, was the F-117A Nighthawk, better known as the stealth fighter. It had been operational since 1983, but was still classified in 1986. In a form of logic both perverse and rational, the F-117A was so radically advanced that keeping it secret was more important than using it for this military mission.

Given the mixture of a treasure chest of government money, and private connections, the likelihood exists that six decades later there is a clandestine group that possesses:

Technology that is vastly superior to that of the “mainstream” world.

The ability to explore areas of our world and surroundings presently unavailable to the rest of us.

Scientific and cosmological understandings that give them greater insights into the nature of our world

A significant “built off the grid” infrastructure, partially underground, that affords them a high degree of secrecy and independence of action

This might well qualify them as a separate civilization – one that has broken away from our own, in effect, a breakaway civilization. Still interacting with our own, its members probably move back and forth between the official reality of what we are supposed to believe, and the other reality which encompasses new truths and challenges.

Sources:

(1) Sweetman, Bill. “In Search of the Pentagon’s Billion Dollar Hidden Budgets: How the US Keeps Its R&D Spending Under Wraps.” Janes International Defence Reporter, Janurary 5, 2000

(2) Dolan, M. Richard and Zabel, Bryce. A.D. After Disclosure. New Page Books. 2012

(3)http://www.nsa.gov/public_info/_files/ufo/comint_part_j.pdf

(4)http://www.nsa.gov/public_info/_files/ufo/key_to_et_messages.pdf