Anon has theory about how swamp within Intel communities were caught using STABLE SHADOW from previous post. Anon has had prior job in military with access to SCIF and classified networks. On most Classified networks, many different individual networks had switches installed as go between and WIN-T was on option on virtually EVERY COMPUTER installed on installation. If the good guys could install a scraper program to gain access to and funnel ALL DATA plans back to the good guys via Shadow program. After 9/11 Military got access to EVERYTHING SAP SAR remember according to Q Post? Military training command could be used using the students for funding and cover. 17th Training wing out of Goodfellow AFB would be a good lead if we speaking about numerical meaning and shit.