Anonymous ID: 86dc61 Aug. 7, 2018, 2:56 p.m. No.2500723   🗄️.is 🔗kun   >>0810 >>0914

Alright anons. I've been tinkering with various ways to mind map the q drops. The first few tries I attempted to map all of the drops from the start and branch out, but it got too big too fast. Pic related is the latest version. It focuses on a single marker and it's based on the theory that some of the markers are tracking events during the storm since NO MATTER WHAT HAPPENS THE enemy of the people fake news MEDIA WILL NOT PUSH THE TRUTH. The 'this is not a game marker' appears to be linked to attacks on allies. Most of these markers can be connected to news events. This falls under the category of 'news unlocking the map'. The next step would be to take other markers in these particular drops like 'The great awakening', 'Pray' or 'red october' and map them as they branch off and track related topics and provide background. build the map

 

>Plot to blow up Theresa May is foiled

Dec 5,2017

Daily Mail

https://www.dailymail.co.uk/news/article-5149425/Plot-blow-Theresa-foiled.html

 

>Secret Service finds gun on motorcade driver

February 19, 2018

https://www.foxnews.com/politics/2018/02/19/trump-motorcade-driver-detained-by-secret-service-after-gun-discovered.html

 

>Man dead after shooting himself near White House

Last Updated Mar 3, 2018 4:16 PM EST

 

>Person arrested outside of White House, Secret Service says

March 08, 2018 11:02 PM

 

>BREAKING: Nurse charged in death of ex-national security adviser H.R. McMaster's father at Philadelphia senior care facility. 11:01 AM - 10 May 2018 https://twitter.com/AP/status/994638654701260800

 

>PAYtriots attack on QResearch boards

May 12,2018

 

>Trump honors slain NYPD officer during DC memorial service

May 15, 2018 | 3:02pm

https://nypost.com/2018/05/15/trump-honors-slain-nypd-officer-during-dc-memorial-service/

 

>Skunkbay Missile launch

Michael Avenatti June10 Tweet

https://twitter.com/MichaelAvenatti/status/1006008288318668800

This week promises to be very interesting… Might want to follow my Insta handle - mjavenatti.

John Brennan tweet

https://twitter.com/JohnBrennan/status/1005778524773416960

 

>Kate or Christy??

Aug 2, 2018 2:44 pm ET

PA Man Wanted For Trump Threats Still On Run As Rally Nears

just 30 miles from the hometown of fugitive Shawn Christy. The FBI is offering a reward of $10,000 for any information leading to Christy's arrest. Christy, 26, of McAdoo, Pennsylvania, is facing federal charges for making social media threats against the president in June https://patch.com/pennsylvania/doylestown/pa-man-wanted-trump-threats-still-run-rally-nears

 

>Meet the Trump supporter who foiled an attempted assassination plot on our President and immediately led to an arrest Kate Mazz, a brave follower of QAnon, helped foil an assassination attempt against Donald Trump in Wilkes Barre, Pennsylvania on Thursday https://conservativepost.com/meet-the-trump-supporter-who-foiled-an-attempted-assassination-plot-on-our-president-and-immediately-led-to-an-arrest/

Anonymous ID: 86dc61 Aug. 7, 2018, 3:08 p.m. No.2500914   🗄️.is 🔗kun   >>1030

>>2500723

 

When you track the mockingbird marker with a similar approach, it appears to be tracking an operation from start to finish. Ending on jan 27 with a the term KILL_CHAIN in the same drop. No mockingbird mentions after this crumb.

 

Q !UW.yye1fxo No.69 📁

Jan 27 2018 12:34:38 (EST)

Chatter exploding.

Change of narrative will be required.

[-4][-5]

Public to awaken [mass-start].

Sleeping pill reject.

OP Mockingbird FAILURE.

FAKE>REAL.

BLIND>20/20.

KILL_CHAIN.

Where we go one, we go ALL>

Q

 

https://en.wikipedia.org/wiki/Kill_chain

>The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target.[1] Conversely, the idea of "breaking" an opponent's kill chain is a method of defense or preemptive action.[2] More recently, Lockheed Martin adapted this concept to information security, using it as a method for modeling intrusions on a computer network.[3] This model has seen some adoption in the information security community.[4] However, acceptance is not universal, with critics pointing to what they believe are fundamental flaws in the model.

 

F2T2EA

One military kill chain model is the "F2T2EA", which includes the following phases:

 

Find: Locate the target.

Fix: Fix their location; or make it difficult for them to move.

Track: Monitor their movement.

Target: Select an appropriate weapon or asset to use on the target to create desired effects.

Engage: Apply the weapon to the target.

Assess: Evaluate effects of the attack, including any intelligence gathered at the location.

 

This is an integrated, end-to-end process described as a "chain" because an interruption at any stage can interrupt the entire process

 

This drop looks like the assess stage of the KILL_CHAIN on the mockingbird marker