Breakdown of Q Post #1876

Q !!mG7VJxZNCI ID: ab9df5 No.2602749

Aug 14 2018 19:02:45 (EST) GMAIL DRAFTS

[GOOG SAFEGUARDED HIGHEST LEVEL [Access [3-GOOG] – SERVER ROUTING – NON US BASED] [Sample] Wet Work?

Human Trafficking?

Sharing of ICE/Border Patrol C-INTEL [schedules] to SAFEGUARD? EXIT/ENTRANCE?

Sharing of FBI C-INTEL to SAFEGUARD PRIV-OPs?

Sharing of DOJ ‘Where We Stand’ investigation(s) & Guide to OVERCOME-DISMISS-WIN?

Transfer of money instructions to LEFT ORGS>>>DOJ Settlements?

Off-book meetings?

Play dates?

Stand down orders?

Non-action orders?

Muslim Brotherhood?

Cross coord w/ UK assets / O-PRO in SIS/UK-P?

Coord w/ foreign actors for payment/money disperse?

Coord w/ AID ORGS for [illegal] plans?

HAM radio instructions if remote-5?

……………..

Why did ES make public NSA CLAS tools?

Think XKeyscore + PRISM specifically.

Was such tech kept from ‘elected’ officials?

Was such tech kept from ‘elected’ directors?

Why was NO SUCH AGENCY created?

Think SIGINT.

What ADVANTAGES exist to BIG TECH, other ABC off/on agencies, elected officials, CEOs, FOREIGN ADVERSARIES etc. if such information is learned?

What price are you (the PUBLIC) willing to pay?

Did you ever play HIDE-AND-SEEK?

Q

The following breakdown should answer many of the questions Q has posed in this post. If there’s anything you would like answered or feel something needs to be discussed further, please leave a comment below. Let’s get on with the bread-making.

Part 1: Deep State Communications

GMAIL DRAFTS

[GOOG SAFEGUARDED HIGHEST LEVEL [Access [3-GOOG] – SERVER ROUTING – NON US BASED]

The Gmail Drafts are referencing the Google accounts the Deep State black-hats were using to communicate with each other. They thought nobody would find out because Google was safeguarding them at the highest-level by routing their communications through private Google servers abroad, like North Korea. But they were wrong. Every piece of communication goes through the NSA first. Remember Snowden’s drops regarding PRISM, the surveillance program? For those that don’t remember,

PRISM collects stored internet communications based on demands made to internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle, among other things.

The worrying part of all this is NSA can eavesdrop traffic in Real Time.

[Sample]

The following is a sample of communication contents that Q and the NSA have in possession.

Wet Work?

Wet Work is code name for murder/hit. This reference can be found on WikiLeaks in John Podesta’s emails just days before Justice Antonin Scalia’s death: “Didn’t think wet works meant pool parties at the Vineyard.”. Of course we can only assume what was meant within these emails, but some anons have reported that the location of Scalias murder was secluded and had a vineyard near by, among other “coincidences”.



Human Trafficking?

Q has communications involving the trafficking of humans.

Sharing of ICE/Border Patrol C-INTEL [schedules] to SAFEGUARD? EXIT/ENTRANCE?

Sharing of FBI C-INTEL to SAFEGUARD PRIV-OPs?

Sharing of DOJ ‘Where We Stand’ investigation(s) & Guide to OVERCOME-DISMISS-WIN?

Q has communications that show rogue elements within ICE/FBI/DOJ operating shell-games in order to monetize and maintain systems of corruption. ICE/Border Patrol agents communicating classified schedules of operations in order to plan ahead and let human/drug traffickers pour through our borders. FBI sharing classified intel to safeguard private operations so they can get ahead of known investigations. And the DOJ help guide criminal elements within these institutions to operate discretely.

Shell Games are a psychological trick to convince potential “players” of the legitimacy of the “game” – for example, by using shills or by allowing a player to win a few times before beginning the scam. Think about the Clinton Foundation/Polaris and the Human Trafficking Hotline. When calling them up, who do you think you’re really reporting criminal activity to? The criminals themselves.

Transfer of money instructions to LEFT ORGS>>>DOJ Settlements?

Off-book meetings?

Q has communications that show money and instructions being transferred over to left-wing organizations that are used to pay off and bribe those in the DOJ to settle any ongoing/future investigations. Q knows about all those “off-book” meetings that took place and who attended them. There are plenty of Q drops that highlight this. See drops 541, 1100, 959, 771, 451, and 153.

Play dates?

Stand down orders?

Non-action orders?

Q has communications that show black-hats organizing “play-dates” that possibly involve trafficked victims such as kids. They’ve been getting away with this because rogue elements from the highest levels of our government institutions gave stand-down and non-action orders to those that were supposed to investigate these matters.

Muslim Brotherhood?

There exists communications of rogue elements within our government colluding with the Muslim Brotherhood. There are even documents found by the FBI in 2004 that show an Islamist organization operating in the United States whose purpose is to undermine our culture and laws from within by infiltrating every segment of society, and Hussein’s White House was full of them.

Cross coord w/ UK assets / O-PRO in SIS/UK-P?

Communications exist showing cross-coordination between UK assets, the UK Intelligence Community and all FVEY (five eyes) partners in the UK.

Coord w/ foreign actors for payment/money disperse?

Communications show coordination between domestic and foreign actors engaging in the transfer of payments/money to pay off those involved in the spying of Trump.

Coord w/ AID ORGS for [illegal] plans?

Q has communications that show coordinated efforts by the deep state and aid organizations like Red Cross, USAID, and others with planning and executing illegal operations. Think money laundering, weapons/drugs/human trafficking, and more.



HAM radio instructions if remote-5?

There’s communications with instructions that explain how to bypass online-network communications by using HAM radios, which is still the most efficient way to communicate covertly.

Part 2: The Fight For Data

Why did ES make public NSA CLAS tools?

Think XKeyscore + PRISM specifically.

Q is asking why Edward Snowden made NSA classified tools public, tools like XKeyscore and PRISM. You see, rogue elements of the ClA were in a race to take out the NSA as they were in direct competition with them in regards to domestic surveillance capabilities. In order to maintain their deep-state operations, they needed to take over the NSA’s role, and in order to do that, they had set out a plan to destroy the NSA by revealing to the public their methods of spying through Snowden. You see, for those that don’t know, Snowden was originally a CIA operative that later worked for the NSA and was the person used to execute this operation. But it failed.

Was such tech kept from ‘elected’ officials?

Was such tech kept from ‘elected’ directors?

Such tech was not kept from “elected” officials as we do know from this NY Times article that

Hussein expanded XKEYSCORE access to all 17 intelligence agencies in this list.

What this means is that even low-level analysts at the CIA and FBI, or even at the Treasury could go back in time and read your communications between you, your family, and friends. Hussein essentially RECREATED a situation where someone like Bradley / Chelsea Manning is able to download all the diplomatic cables and give them to Wikileaks, but this time it’s not just government secrets, this time it is full access to the secrets of all American citizens and companies operating in the U.S. and in foreign countries. This covers anyone in the world using any type of digital communication.

Why was NO SUCH AGENCY created?

Think SIGINT.

The NSA was created to help with communications/signals intelligence and to help protect our communications from foreign actors.

What ADVANTAGES exist to BIG TECH, other ABC off/on agencies, elected officials, CEOs, FOREIGN ADVERSARIES etc. if such information is learned?

If anyone had such information, they would be used to blackmail anyone. Think leverage. Think politicians – both local and federal level – creating policy based on the puppet masters’ requirements. Think about manipulation of the population through compromised puppets in the media/news/hollywood with manufactured narratives and story lines. Think stock manipulation. Think weapons dealing to foreign terrorists. Think about those in banking (Fed Reserve, IMF, ECB, etc..) blackmailed and made to manipulate the interest rates of debt. Let your imagination run wild.

What price are you (the PUBLIC) willing to pay?

Did you ever play HIDE-AND-SEEK?

Q

Are you willing to give up privacy for a false sense of “security”? At what price? Towards the end of Romes Empire, citizens traded their privacy for a false sense of security because they moved away from being a Republic, into a “Democracy”, which eventually led them to an all-out rule by an Oligarchy. This lead to the collapse of the Roman empire. Again, at what price are you willing to pay? Did you ever play Hide-and-Seek? Who is being hunted? It’s time to Prey/Pray. PAIN.

And as always, God bless America and long live the republic. Where we go one, we go all.

⠀⠀⠀⠀⠀⠀⠀⠀

⠀ . ╚⊙ ⊙╝⠀⠀⠀⠀⠀⠀⠀⠀⠀

..╚═(███)═╝⠀⠀⠀⠀⠀⠀⠀⠀⠀

.╚═(███)═╝⠀⠀⠀⠀⠀⠀⠀⠀⠀

╚═(███)═╝⠀⠀⠀⠀⠀⠀⠀⠀⠀

.╚═(███)═╝⠀⠀⠀⠀⠀⠀⠀⠀⠀

..╚═(███)═╝