Anonymous ID: 8e352d Nov. 28, 2020, 7:57 a.m. No.11818520   🗄️.is 🔗kun

>>11818130

 

KILL_CHAIN was in a post yesterday.

 

>>11803044 (lb)

 

System of Control.

Assault on America.

WIN BY ANY MEANS NECESSARY.

Regulation or KILL-stop?

SHOCKED.

T: B, F, J, 1,5,11-20 ^

20180428_190945

 

I started digging on the drop & a string search led me to this SEC filing doc for Appleton Funds. Not much of a coder, so I thought the embedded data w/in the <spantags were intriguing.

 

Did a bit of a dig on Appleton Funds... not sure if it's anything or nothing. FWIW.

 

https://www.sec.gov/Archives/edgar/data/1127451/000089418915006102/0000894189-15-006102.txt

 

Just as an afterthought, I looked up

>190945

with "SEC"

 

Got some hits on Acacia Communications & Cisco merger... from July 2020 (in preparation for election?)

 

>SAMR oversight: China

 

"SAN JOSE, Calif. and MAYNARD, Mass. — July 22, 2020 — Cisco Systems, Inc. (NASDAQ: CSCO) and Acacia Communications, Inc. (NASDAQ: ACIA) today issued a joint statement on the status of the ongoing regulatory review for the pending acquisition of Acacia by Cisco that is being conducted by the State Administration for Market Regulation of the People’s Republic of China (“SAMR”). Cisco and Acacia remain actively engaged with SAMR and expect the acquisition to receive regulatory clearance."

 

https://newsroom.cisco.com/press-release-content?articleId=2088251

 

Kill switch pertaining to all the companies that provided internet services (cloud, connection, cable, etc.) utilized during live election fraud by foreign & domestic bad actors??

 

https://www.sec.gov/Archives/edgar/data/1651235/000119312519190945/d773715dex991.htm

 

https://acacia-inc.com/applications/

Anonymous ID: 8e352d Nov. 28, 2020, 8:05 a.m. No.11818596   🗄️.is 🔗kun

>>11818130

 

the word regulate is in yesterday's post and is part of the phrase in the SAMR (State Administration for Market Regulation of the People’s Republic of China (“SAMR”))

 

KILL_SWITCH (from wikipedia):

 

The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target.[1] Conversely, the idea of "breaking" an opponent's kill chain is a method of defense or preemptive action.[2] More recently, Lockheed Martin adapted this concept to information security, using it as a method for modeling intrusions on a computer network.[3] The cyber kill chain model has seen some adoption in the information security community.[4] However, acceptance is not universal, with critics pointing to what they believe are fundamental flaws in the model.[5]