Immaculate Constellation

From Ikwipedia
Jump to navigation Jump to search

IMMACULATE CONSTELLATION, as described by journalist Michael Shellenberger, is an Unacknowledged Special Access Program (USAP) designed to collect high quality data on UAP. By using the government's equities, a chain of custody can be assured. The high quality nature of the sensor platforms also increase the quality of data collected. This could be visual, electromagnetic, thermal or any number of observables various sensor platforms and assets can collect. According to multiple whistleblowers, security surrounding this topic is extreme - even mentioning the program name outside a SCIF puts the speaker in the "danger zone." They went on to describe virtually automatic FISA 702 surveillance warrants being issued against those who mention this program. This is one way topics involving NHI/UFO are suppressed.

Man in the Middle[edit | edit source]

The program functions similarly to a MITM attack on cyber-information systems. IMMACULATE CONSTELLATION positions itself between the constellation of US intelligence collection assets and the rest of the mil/gov enterprise. By doing so, they get first pick at any data coming over the wires, thus preventing it from ever reaching the rest of the intelligence community. Because highly classified data (such as satellite derived intelligence, signals intelligence, etc) has to be transmitted in specific ways over very specific channels, programs like IMMACULATE CONSTELLATION can position themselves within these pathways (ie: channels) to collect, alter or outright suppress the information being reported.

Classification[edit | edit source]

Because IMMACULATE CONSTELLATION is an unacknowledged special access program, it can be inferred that materials collected under the auspices of this program are classified TOP SECRET SCI-SAP. In addition to high level vetting required to obtain a TS clearance, the individual being read into the program would need to satisfy any additional requirements specified by the program's security manager as well as have a demonstrated need to know.