Skip to content

Corey Goode of Sphere-Being Alliance: Dark Alliance in Panic Mode

August 19, 2017

“Threatens my family, David Wilcock’s life, and legal entrapments”


* FADE to BLACK Jimmy Church w/ David Wilcock : The Dark Alliance  


Death threats… by phone and in writing. Blackmail efforts for over a million dollars. Possible attempted murder by sabotaging car brakes. Anonymous calls to Child Protective Services saying my children are in imminent danger. All worldly possessions of a fellow insider, Pete Peterson, being illegally seized and sent to the dump – causing losses in the millions. Armed policemen, protecting the crime, with the homeowner guaranteed 90 days in jail if he comes within a mile of the operation. Simultaneous seizure of his truck, leaving him with no transportation.

This might sound like the plot for an invigorating thriller film. I wish that’s all it was – but this is my life as it stands today.

I am sharing information that, while hard to believe for many people, would utterly transform our society if it were true. Why would these increasingly severe, if not potentially lethal attacks be happening to me, to the people I love and to the people who support me if I were somehow making this all up – as the critics invariably suggest?

I am currently in McCloud, California, with a portion of the Full Disclosure Project Team. The rest of us should arrive late tonight. I have been on a three-week trek from Dallas, Texas through the Boulder, CO area to look at rental houses. Then we drove to the gorgeous Mt. Shasta area for our upcoming Eclipse of Disclosure conference.

We have been driving through beautiful and desolate geography, and I have been mostly unplugged from the Internet. On August 5th, I received a newsletter notification that David Wilcock had published a new article on his website Divine Cosmos. I was unable to read the article at the time due to all the driving. I did not realize yet that David had taken steps to defend himself against severe attacks against him and me that have been ongoing for all of 2017.

When I woke up the next morning, I noticed that David had sent me a few emails and Skype messages. He was describing the “hack attacks” that were occurring on his website after publishing his article. He stated that a person had left a comment on that article claiming responsibility for these aggressive and damaging hacks. The person threatened to release a “data dump” that would “ruin us both” if David did not make a grandiose, public “dumping” of me – cutting all personal and professional ties.

David had already privately informed me about being threatened in an extremely similar fashion through one of his once-trusted insiders on the phone, as of July 3rd. Some of the same phrases were used in both threats. This showed that the JackSmith message was related to the threat David had received by phone. This formerly-trusted insider told David that a major campaign was underway to “take Corey Goode to the slaughterhouse.”

David was told that his career would be spared if he would reject me in a public way. He was also told that if he did this, he would be rewarded with rapid career and wealth growth. This incident shocked David very hard, as he had established a friendly rapport with this individual over a number of years.

This insider stated that the information I was releasing about the Military Industrial Complex Research and Development bases in Antarctica had to be discredited. The R&D that is being carried out in these locations is said to be of the highest security clearances and most sensitive domains in terrestrial matters.

It was clearly communicated that the Lost Antarctic Ancient Civilization narrative was not only acceptable to report on, it was highly encouraged.

On Tuesday, August 8th, just three days after David’s article went live, I found a strange email in my personal inbox. In this email, the sender identified himself as “JackSmith.” By this point, everyone knew this was the alleged hacker of David’s website.

He was now claiming that he wanted to come forward as a whistleblower and expose the full nature of the operation that he was involved in conducting against us, on behalf of a powerful group. This group obviously appeared to be what we have called the Cabal. He said this information-sharing would be very dangerous for him to do, and that he wanted us to sign a non-disclosure agreement (NDA) for his protection.

He wouldn’t even reveal his identity until we signed, but he said we would be very surprised by the prominence of his family once we did. He also said that he wanted us to pay him back by promoting something for him later on. He gave no indication of what he intended us to advertise. This, of course, is attempted blackmail. He was actively hacking us, threatening us that it would continue, and saying that he wouldn’t tell us what he was doing unless we paid him for it.

I have made the full email available in its entirety, other than redacting a few names and pieces of personal information. The full email is available to legitimate researchers who want to investigate these matters.

I checked the Email’s “Host Header” for IP information that may provide information on where this individual was emailing me from. It was obvious that they had used a Virtual Private Network to hide their location. This was not unexpected from someone who claimed to be responsible for hacking a website.

I skeptically replied to the email, requesting more information. I received a fairly quick reply stating that they were a part of an organization that had been working to foment a civil war within the Ufology community. This team claims to have focused an attack campaign on me since the beginning of the year.

Early this year, I announced in updates and on Cosmic Disclosure that I had been briefed on a major operation against our community. The goal was to discredit anyone that was not pushing the accepted narrative on disclosing the Secret Space Program. I was told that we would all come under a heavy attack that would be extremely organized and convincing. This, of course, did begin in earnest immediately after Contact in the Desert and included targeting of the MUFON symposium “The Case for a Secret Space Program”

My team and I weathered the attacks. In fact, we ended up being even more dedicated to each other and to the mission than we had been before. It appears that this group had not only underestimated my team members, but had also based much of their attack on a personality profile of me from two years ago. Anyone who knows me or watches Cosmic Disclosure on a regular basis understands that I am a completely different person now than I was then.

We have been pleasantly surprised to see a large number of people approaching us to work with them once the nature of these organized, highly negative attacks became obvious. We are already receiving apologies from people who fell victim to the recent coordinated smear campaign – people who are ready to forgive, forget and unify.

I forwarded the email chain to David and asked his opinion. In the meantime I was waiting to hear back from JackSmith with some proof that his claims were true. He had discussed a well-coordinated plan to start a civil war in Ufology. He discussed the use of drone accounts in social media to inspire others to join in on these attacks, without realizing how they were being organized and manipulated.

JackSmith forwarded me one of the emails that had been sent to a prominent researcher. I had already seen a copy of this exact email from one of my sources, without it ever being made public, so I knew it to be genuine. The person who had hacked David’s website was now asking us to sign an NDA before he would share any further information.

In addition Jordan Sather of Destroying the illusion immediately received email threats directly after Contact in the Desert. This email was sent from the same email address mentioned in Jack Smith’s 2nd email.

David has quite a lot of experience with contracts and immediately found a number of booby traps that were added to the NDA. This person wanted to pass along data to us as “Confidential Information” for us to then leak to the public. He also wanted a legal guarantee that he could withdraw this information at any moment after he had already passed it along. As you know, once information appears online it is virtually impossible to take it down.

We would have to agree to be subject to the courts in Denmark and agree to pay over a million US dollars per person in penalties (900,000 Euros each) if we could not get the information removed. He himself could easily own one of the websites that would then refuse to take the information down. Thanks to the sophistication of his hacking skills, we would never be able to prove it was him.

Section Eight indicated that even 900 thousand Euros might not be enough to satisfy him if we could not remove the information. It would have forced us to agree that the damages we might pay to this man were potentially “unlimited.” That could extend into our property and anything and everything we owned. The nine hundred thousand Euros alone could have us both indebted and severely impoverished for the rest of our lives.

Additionally, Section Five of the NDA said that any data he captured from us via “automated” procedures was not subject to the legal protection in the non-disclosure agreement. Here is where David informed me of this via Skype text:

Download the PDF of the NDA

[8/10/17, 1:29:27 PM] David Wilcock: Okay. Number 5 could definitely be interpreted as indicating that if he talks to us on Skype, and has an “automatic electronic archiving system” recording our conversations (which anyone like him would have,) it “shall not be deemed to be a breach of the terms of this Agreement.”

That means he could record us and release it and it would not be a breach of the confidentiality agreement.


Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: