Anonymous ID: a83d36 March 4, 2018, 3:06 a.m. No.547023   🗄️.is 🔗kun   >>7031 >>7052 >>7061 >>7074 >>7085 >>7095 >>7131

Just some guesses. Does anyone have anything

on "CLAS?" I have several leads for PRIME

in the text below.

 

>Expand your thinking.

<Who >leaked Vault7 to WL?

WHO = White House Official? Vault7 were the CIA version

of Snowden's NSA leaks. Also, they contained no actual code.

>Who returned fire?

NYT published an article that blamed "muh Russians," but that

article got information from Rendition Infosec who claims to be

made up of "former NSA, DoD, and US Cyber Command operators."

Those should be white hats, right?

>OP Name: Fiddler

Fiddler is an HTTP proxy tool that can monitor web traffic.

It has a legitimate reason to be there, but what is to stop the clowns

from using this to monitor anyone, anywhere? Use the http information

from targeted machines?

>@Snowden

This is probably targeted AT Snowden. It is NSA striking back at Snow

for his release of the N_A tools. Note that Vault7 is C_A tools; Snow

released N_A tools. Tit for tat?

>Mission 1: Infiltrate

This pertains to the "Bigdata" people. Step 1 is to put your people in place.

How to do this? Easy, pick the winner by putting $100 million behind

your preferred company. Why did MySpace fail, yet Fakebook become

the #1 social company in no time? If you control the money, you pick

the winners and losers.

>Mission 2: Centralize

Do step one everywhere, and have them all report back to a central

command center. Where best for this? Giggle, of course.

>Mission 3: Secure

If I wanted to put something where I could get to it, and no one else

could easily get to it (digitally), it would be North Korea. No Internet

infrastructure except what I set up. This is what ES was doing there.

>Mission 4: Expose to HARM

Wikileaks has a "harm-minimization" ethic. They redact their releases

to help prevent harm to innocent parties. Is big data the opposite?

I can find no acronym beyond "High-speed Anti-Radiation Missile"

which is basically a missile to destroy targeting radars by attacking the

source of the radiation (that's the antenna, which is near the transmitter/

receiver).

>(Date)

The C_A release was almost exactly one year ago, today. Coincidence?

>(WH interference)

Nope.

>(WH directive)

My guess? Yep. Tit for tat. Snow gave up N_A tools, so they lose their

toys, too.

>Mission 5: Russia LINK

See above with NYT almost immediate "Muh Russians" article. The

link to Russia is their counter. It was probably aimed at Snowden, who

was reported to be in Russia but who is probably not.

>(2013 timeline of events)

The 2013 timeline are the releases of the N_A documents by Snow.

>(1/17/14)

Hussein gave a speech on tying N_A, N_A, N_A (never C_A) to

big data for "foreign surveillance." He more or less said "we're using

Fakebook and Giggle to watch everyone" but denied it would be

Americans in America. Red flag for me… If Hussein makes a point to

say "Not X," I'm thinking "Must be X." Has he ever told the truth?

>Think.

Trying

>Learn.

Still digging.

>Mission 6: Fiddler > Ghost-PRIME

Fiddler is discussed above; an HTTP monitoring program. Ghost-

PRIME: Privacy and Identity Management for Europe. I found this

link from JA's link dealing with BBG and the TOR project. TOR

is a C_A tool for privacy… PRIME is a European tool for privacy.

I think that Fiddler has been enhanced to a concealed (Ghost)

version of "privacy" with PRIME. The Prime project website is now

  1. It was www.prime-project.eu

Another possible lead is "Telos Ghost" which is supposed to be

secure, as well. Another C_A front?

Last, another possible point of research: www.fp7-prime.eu/home_page

Supposedly anti-terror…. maybe instead, MKUltra staging group?

>Mission 7: CLAS

I can find nothing definitive on this. My guess is it deals with setting up

cyber security certifications or similar for putting "agents" out there

to tell everyone they're safe (when they're not) such as PRIME or

TOR as shown above

>Mission 8: Whistle Blower traps - jobs C-3567k

Just another example of the above. We know that the C_A was

running the press traps, as shown by Q's "bravo!" on the Apache find.

>Mission 9: Censorship

Now that you know everyone through the corrupted "privacy" guards…

Remember, it is only folks like us who would use TOR, or be whistle-

blowers, or worry about our privacy… how better to find us malcontents

than to corrupt the tools we use to hide ourselves. GhostNET might also

this. Well, they know whom to target, because we are the ones trying

to hide.

>CLAS +relay

I really wish I had a lead on CLAS. It is key to this, but I am at a loss

>Q

Anonymous ID: a83d36 March 4, 2018, 3:28 a.m. No.547074   🗄️.is 🔗kun   >>7081

>>547031

>>547052

>>547061

>>547023

 

While I appreciate the applause, I would much prefer someone pointing out the holes so I can

improve it. I have links for most of what is said, but it is long enough already.

 

CLAS +relay makes no sense with "CLAS = classified." I can find no acronyms to help me

with this problem.

Anonymous ID: a83d36 March 4, 2018, 3:31 a.m. No.547082   🗄️.is 🔗kun

>>546818

I saw the marineanon, and I don't know if I believe he isn't a LARP. Sorry. Q spent a month

or more proving he is legit. I want the same vetting for any "helpers." Let Q vouch for them

if they are legit.

Anonymous ID: a83d36 March 4, 2018, 3:35 a.m. No.547093   🗄️.is 🔗kun   >>7097

>>547081

As with "Classified," I don't see how that can apply. I came across that acronym while digging,

but tossed it out. I had some luck with Cyber LAS, but the closest I came there was some

CESG Listed Adviser Scheme that certified

folks in cybersecurity… but even that doesn't

make sense in this context.

Anonymous ID: a83d36 March 4, 2018, 3:57 a.m. No.547133   🗄️.is 🔗kun

>>547114

>What I say a class action lawsuit?

 

I think this is where we need to dig. The grammar is fukked. Why? Q knows that is grammatically nonsense.

Anonymous ID: a83d36 March 4, 2018, 4:03 a.m. No.547147   🗄️.is 🔗kun

>>547131

>>547091

>www.telerik.com/blogs/capturing-traffic-from-.net-services-with-fiddler

Great find on that. I think

FiddlerGhost-PRIME means:

Fiddler became Ghost-PRIME, and that it is

an embed for being able to grab all IP addresses

a certain (any) user is visiting. Note that it says you can change the local IP to any user's IP….

Anonymous ID: a83d36 March 4, 2018, 4:14 a.m. No.547168   🗄️.is 🔗kun

IMO, what Q said is mostly straight-forward. He wants us to keep red-pilling via the platforms, in spite

of us being censored, shadow-banned, and otherwise blocked by the Cabal and their minions.