4280
May 18, 2020 1:59:49 PM EDT
Q !!Hs1Jq13jV6 ID: df912a No. 9226447
EX_n8QGWkAET_r1.jpg
https://twitter.com/CBS_Herridge/status/1262441478019842048
"I have today." - Barr
FISA = START
Q
4280
May 18, 2020 1:59:49 PM EDT
Q !!Hs1Jq13jV6 ID: df912a No. 9226447
EX_n8QGWkAET_r1.jpg
https://twitter.com/CBS_Herridge/status/1262441478019842048
"I have today." - Barr
FISA = START
Q
4279
May 18, 2020 3:53:30 AM EDT
Q !!Hs1Jq13jV6 ID: 2e36cf No. 9221502
For_Easton.png
Mike Rogers is employed as a Senior Fellow for the National Defense University in support of the Pinnacle, Capstone, and Keystone programs.
Admiral Rogers retired from the U.S. Navy in 2018 after nearly 37 years of naval service rising to the rank of four-star admiral. He culminated his career with a four-year tour as Commander, U.S. Cyber Command and Director, National Security Agency – creating the DoD’s newest combatant command and running the U.S. government’s largest intelligence organization. In those roles he worked with the leadership of the U.S. government, the DoD and the U.S. Intelligence community as well as their international counterparts in the conduct of cyber and intelligence activity across the globe. He also assisted in the development of national and international policy with respect to cyber, intelligence and technology – including extensive work with corporate leadership in the Finance, IT, Telecommunications and Technology sectors.
During his broader service in uniform, Admiral Rogers held positions afloat and ashore around the globe focusing on cyber, intelligence, maritime operations and national security. His joint service was extensive including duty with the Chairman of the Joint Chiefs of Staff, U.S. Indo Pacific Command and U.S. Atlantic Command. In addition, Admiral Rogers commanded at the unit, Numbered Fleet and service component levels in the Navy.
Admiral Rogers is a graduate of Auburn University and also holds a Masters of Science in National Security. He is a distinguished graduate of the National War College and a graduate of highest distinction from the Naval War College. He is also an MIT Seminar XXI fellow and a Harvard Senior Executive in National Security alum.
Admiral Rogers is currently supporting companies in the private sector, serving as a member of various Boards or acting as a Senior Advisor. He also speaks globally to various business and academic groups and is working internationally in the cyber and national security arenas. He is a Senior Fellow and Adjunct Professor with Northwestern University’s Kellogg School of Managements’ Public Private Initiative and a member of the advisory board of the Australian American Leadership Dialogue and NATO’s Cooperative Cyber Defence Center of Excellence. He is also a member of the United States Naval Institute Board of Directors.
https://capstone.ndu.edu/Senior-Fellows/Article-View/Article/1897573/rogers-michael/
2998
Q !!mG7VJxZNCI 03/07/2019 22:59:58 ID: f9e971
Archive Bread/Post Links: 5567908 / 5568629
Direct Link: 5568629
Anonymous 03/07/2019 19:31:08 ID:9a6a8f
Archive Bread/Post Links: 5564880 / 5565314
Direct Link: 5565314
Keking out right now. Pretty sure I found something. Rip me apart if I'm wrong though. So many shills on here. You're missing crumbs. Look here, not [here]. Responding to post 2996 Q says, "how is that possible for a 'supposed' non_gov entity?"
How is it possible that FB tracks data even when the app is deleted? In post 2993 (3/7/109) Q is calling out @Snowden. So I used the filter to find posts relating to WikiLeaks. Q's post from July 31, 2018 is a screenshot of the Wikileaks vault 7… released MARCH 7. Sounds confusing just trying to show you my thought process, stay with me, it makes sense.
"Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified." FROM vault 7
Links below that direct you to user forums on how to not leave a digital fingerprint that can be associated with the CIA, and how to construct an imitation fingerprint. Using Facebook as their 'fingerprint' they are able to install malware on peoples' phones, tablets, and computers which relay all data back to a central server using HIVE.
I suggest all anons who have given up life to research this shit like me should read this document to completion.
I noticed the enormous amount of comparisons between "packets of data" and "bombs", dunno why probably just autistic. I looked back in the Qmap and on March 5, 2019 an anon posted how London Police "called them bombs not suspicious packages" Q responds in 2974 with "Fire".
I went into vault 7 Projects, search for "fire"….
"Angelfire is an implant comprised of five components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system"
FUCKING KEYSTONE KEK
"Keystone is part of the Wolfcreek implant and responsible for starting malicious user applications. Loaded implants never touch the file system, so there is very little forensic evidence that the process was ever ran." This makes post Q 381 much easier to understand
"We Won't telegraph our moves to the ENEMY.
We will however light a FIRE to flush them out."
Q
Q is saying that they are using the Anglefire to predict the Deep State's moves without being detected. In the user files it says a key must be used to open magicwand (keystone). In Q post 270 he says that ADM R/NSA (W&W) + POTUS/USMIL = Apply the Keystone. Paint the Picture. In post 167 Q says POTUS opened the door of all doors. Expand your thinking. What is the keystone? Now this could be confirmation bias but based off of what we just read we can now infer that Q was saying trump gave Admiral Rogers permission to use Keystone and Activate malware in order to collect data on DS. Furthermore who uses a magicwand? A wizard. (W&W)
Why Does The NSA Keep An EGOTISTICALGIRAFFE? It's Top Secret
November 10, 20137:35 AM ET
What do the following words have in common?
SHARKFINN
KEYSTONE
DISHFIRE
TWISTEDPATH
The answer? They're all NSA code words.
Edward Snowden, the former NSA contractor, leaked thousands of documents about some of the most secretive programs run by the U.S. government. So secret, they're all given classified names.
You may have heard of PRISM, the name of the secret NSA program that vacuums up Internet communications. Turns out just about everything else at the world's biggest spy agency has its own code word.
"There's MESSIAH, there's PINWALE," says Bill Arkin, who served in Army intelligence and has written several books about the spy world. "There's BLAZINGSADDLES. These are all NSA code words."
Even the NSA budget is assigned a code word, says Arkin.
"There are tens of thousands, describing operations, exercises, weapons activities, programs, pieces of equipment, spying things," he says. "No one really has one, single, super-duper database on all of them."
There are some conventions when coming up with code words. The CIA typically uses metals or a stone, like Ruby or Greystone. NSA code words are always one word, uppercase. Some may sound like two words — like the program EGOTISTICALGIRAFFE — but are written as one.
That custom may have its roots in World War II, when the Allies broke the encryption codes of their enemies and described the stolen information by a single word.
Like MAGIC: the intelligence gained from decrypted Japanese diplomatic cables. Or ULTRA: the name of the intelligence obtained from Nazi communications.
Back then, a committee or even a national leader — like Churchill — would decide on a code word. By the 1960s, the job fell to a woman sitting in a small room at NSA headquarters.
"Anytime they needed a new code word she would just pull it out of a computer," says James Bamford, who has written extensively about the NSA. "She'd just take the next one in line."
Bamford thinks the names are still generated by computers. He says some of the projects are so sensitive, even the code word itself is classified. When it's compromised, NSA immediately comes up with a new one.
"They think if somebody finds out what it is, they'll find out what the meaning of that is," he says.
Well, not always. Not Bill Arkin's favorite code word: NEVERSHAKEABABY.
"I don't know what it is," he says, "but I know it exists and I know it's NSA."
Arkin says he's seen it on documents. And of course, it's written as one word.
https://www.npr.org/2013/11/10/244240199/why-does-the-nsa-keep-an-egotisticalgiraffe-its-top-secret
@DeptofDefense
Special delivery!
@USArmy
paratroopers fire M119 Howitzers during gunnery training at the Yukon Training Area, Alaska.
6:00 AM · May 18, 2021
https://twitter.com/DeptofDefense/status/1394593612021866501