Anonymous ID: b19db2 Aug. 14, 2018, 5:30 p.m. No.2603261   🗄️.is 🔗kun   >>3298 >>3307 >>3352 >>3366 >>3558 >>3578 >>3619 >>3662 >>3685

>>2602749

GMAIL DRAFTS

>High level cabal members communicated by making e-mail drafts but never sending them, in this way they thought they could leave each other messages and NSA would never know, assuming NSA can only collect e-mails that have been sent

[GOOG SAFEGUARDED HIGHEST LEVEL [Access [3-GOOG] - SERVER ROUTING - NON US BASED]

>Google handled the communication lines to make sure things were secret and bad actors were protected

[Sample]

>Same of kinds of messages protected at highest levels

Wet Work?

>assassination

Human Trafficking?

 

Sharing of ICE/Border Patrol C-INTEL [schedules] to SAFEGUARD? EXIT/ENTRANCE?

>share intelligence to aid illegal immigration, border crossing, human/arms/drug trafficking

Sharing of FBI C-INTEL to SAFEGUARD PRIV-OPs?

>Share intelligence to protect black hat operations from white hats/rank and file

Sharing of DOJ 'Where We Stand' investigation(s) & Guide to OVERCOME-DISMISS-WIN?

>share classified DOJ data so black hats stay one step ahead and avoid investigation

Transfer of money instructions to LEFT ORGS>>>DOJ Settlements?

>Give leftist orgs insider info on how to extort money from the DOJ "Legally"? or simply fund left wing orgs off the books?

Off-book meetings?

 

Play dates?

>Pizza related hookups, l'm guessing

Stand down orders?

>secret chain of command orders to make police stand down from arresting/engaging antifa, ms-13 etc

Non-action orders?

>secret chain of command orders to not investigate terrorist cells, etc.

Muslim Brotherhood?

>Direct comms with MB

Cross coord w/ UK assets / O-PRO in SIS/UK-P?

>coordinate with UK black hats

Coord w/ foreign actors for payment/money disperse?

>Pay willing participants in other nations for cooperation

Coord w/ AID ORGS for [illegal] plans?

>Use bad actors in red cross and other orgs in haiti and other countries to obtain/trade data, move cash hidded in first aid, etc,

HAM radio instructions if remote-5?

>instruct HAM radio operators to send comms to actors unable to access internet or in a country firewalled from google etc

……………..

Why did ES make public NSA CLAS tools?

>give advantage to the C_A, entangle NSA in scandal, expose US INT gathering methods to the world

Think XKeyscore + PRISM specifically.

Was such tech kept from 'elected' officials?

Was such tech kept from 'elected' directors?

Why was NO SUCH AGENCY created?

Think SIGINT.

What ADVANTAGES exist to BIG TECH, other ABC off/on agencies, elected officials, CEOs, FOREIGN ADVERSARIES etc. if such information is learned?

>Track and spy on US military assets, vita fitbit etc, sell their tech overseas for big big money. Bigger than arms trade.

What price are you (the PUBLIC) willing to pay?

>1000$ for a smart phone that spies on you

Did you ever play HIDE-AND-SEEK?

>ready or not, here we come

Q

Anonymous ID: b19db2 Aug. 14, 2018, 5:52 p.m. No.2603709   🗄️.is 🔗kun

>>2603618

I'm convinced Omarosa is a "converted spy" or a "Doomed spy" someone who is brought in, given bad information to take back to her masters.

 

Art of war, chapter 13

  1. Hence the use of spies, of whom there are five classes: (1) Local spies; (2) inward spies; (3) converted spies; (4) doomed spies; (5) surviving spies.

 

 

  1. Having converted spies, getting hold of the enemy's spies and using them for our own purposes.

 

  1. Having doomed spies, doing certain things openly for purposes of deception, and allowing our spies to know of them and report them to the enemy.

 

 

  1. It is through the information brought by the converted spy that we are able to acquire and employ local and inward spies.

 

  1. It is owing to his information, again, that we can cause the doomed spy to carry false tidings to the enemy.