Anonymous ID: 31469b Aug. 29, 2018, 3:09 p.m. No.2788478   🗄️.is 🔗kun   >>8507 >>8540 >>8776

So Q asked a rather important question:

 

>WHY WAS THE INFORMATION ON WEINER'S LAPTOP IN THE FIRST PLACE?

 

A bit of structured analysis and examination of critical assumptions is in order for sure, but let's try ABDUCTION (evidence in search of hypothesis).

 

The Event, E, is that what seems to be a copy of Clinton's server or at least the emails in question somehow found their way on to AW's personal laptop. One hopes there is E* (evidence and a chain of custody) to back that up, but let's concentrate on finding H, a hypothesis that explains it. Use imaginative analysis, as Teguchi would say.

 

Well, it's pretty clear where it could have come from – a shared gmail folder anyone? But where was it going to? That's where it gets interesting.

 

AW is is in the Knights of Pythias with CS – hey isn't that special. Both under Vatican control (and we now know, [P] = Payseur control, and the sedevacant Vatican sings the 13 Bloodlines' tune or something like that).

 

We also have event E2 – that CS sold out America. Let's play Occam.

 

The parsimonious hypothesis, is that AW gave the CS the files, who transferred them either through an intermediate or a cutout to China. E3 … we know that China received the info, in a pay for play scheme. E3* forthcoming in in a military court near you….

 

What is not yet in view is that the 13 bloodlines actually report to China. (Not mentioned even once!) So the likely path of the data is:

 

GOOG -AW -> CS -> [P] -> China

 

amirite?

Anonymous ID: 31469b Aug. 29, 2018, 3:24 p.m. No.2788642   🗄️.is 🔗kun

>>2788540

 

Well, the thing about 'insurance policy' is it is also a term used by the FBI OP. So, it seems a bit of a stretch that it wouldn't be proof that correspondence about that was on the laptop.

Anonymous ID: 31469b Aug. 29, 2018, 3:28 p.m. No.2788703   🗄️.is 🔗kun   >>8752

>>2788507

 

Could be. Then you have Q's question – how did he get the files?

 

We all know that divorces are ugly and spouses sneak around one another, so there is a lot of 'confirmation bias' that Carlos Danger is just a slime ball.

 

But he's a worse slime ball for betraying his country.

 

Anyway, critical assumptions. The data got there somehow.

 

  • it is the same data that was on a server in a SCIF (which had RAID replicas?)

 

  • did someone just walk into the SCIF with that laptop and make a copy? Use a USB stick?

 

  • was the server in the bathroom and anyone could make copies of anything when they were taking a crap?

 

  • why would the Chinese like to pay for play and then pick up the goods by implicating themselves undeniablly? Really?

 

  • and if the transfer was done somehow and hey looky here I see a somehow, doesn't Occam suggest that was the means of transfer?

 

  • How does a marriage work when one party works for MB/Pakis and the other for Vatican pedos, anyway?

Anonymous ID: 31469b Aug. 29, 2018, 3:32 p.m. No.2788752   🗄️.is 🔗kun

>>2788703

 

It could, of course, be as simple as the Li family bloodline. A little too simple for my taste, but it's there as an alternative hypothesis.