>>19151328
When you read each Q Post ask yourself who the information is intended for and what is the information intended to accomplish. Among other things Q informed us that not all posts were meant for anons.
If a Q post reveals information similar to 'Patton has an army in England' or 'The landing will be at Pas-de-Calais' or 'We'll be on the beach on the next new moon', think about both the intended target of the information as well as the information's purpose. With information that reveals strategy, tactics, or deadlines the target of that information is the opposing force and the purpose is military deception.
In the writings of Q this is true of dates and/or hints of dates in particular. For example, 'D5' was a very successful illustration of a feint that caused the opposing force to take an unnecessary action.
"A feint is an offensive action involving contact with the adversary conducted for the purpose of deceiving the adversary as to the location and/or time of the actual main offensive action." (JP 3-13.4 I-9)
The 'D5' feint resulted in the GHWB funeral. The opposing force wasted 'ammunition' (Q#2553). The following objective was achieved:
"Causing the adversary to misallocate personnel, fiscal, and material resources in ways that were advantageous to the friendly force." (JP 3 - 13.4 I-6)
In the writings of Q '11.3' and '11.11.18' are examples of information that conveys multiple possible interpretations. Information like '11.3' and '11.11.18' is consistent with DISO, or Deception in Support of Operations Security. DISO:
"… protects friendly operations, personnel, programs, equipment, and other assets against foreign intelligence and security services (FISS) collection. The intent of a DISO is to create multiple false indicators to confuse or make friendly force intentions harder to interpret by FISS, limiting the ability of FISS to collect accurate intelligence on friendly forces. DISOs are general in nature, they are not specifically targeted against particular adversary military, paramilitary, or VEO decision makers, but are, instead, used to protect friendly operations and forces by obfuscating friendly capabilities, intent, or vulnerabilities. (JP 3-13.4 I-2)
CBTS and /qresearch were used as MILDEC conduits.
"Within MILDEC, conduits are information or intelligence gateways to the deception target. Conduits may be used to control flows of information to a deception target. It is rare that a deceptive message is sent directly to the deception target itself. Most often, deception messages are sent to intelligence collectors (conduits) with the expectation that the deceptive message will systematically make its way to the deception target." (JP 3-13.4 I-4)
Anons who interpreted and amplified 'D5', '11.11.18', etc. served a specific and positive purpose.
Not every Q post is intended to deceive. The conduit and the information source had to appear authentic and real information was shared along with information similar to the above examples.
Joint Chiefs of Staff Publication JP 3-13.4 explains further if you are interested: https://jfsc.ndu.edu/portals/72/documents/jc2ios/additional_reading/1c3-jp_3-13-4_mildec.pdf