Anonymous ID: 645274 March 13, 2019, 12:52 a.m. No.5656416   🗄️.is 🔗kun

>>5656377

Ya could be, prior to 2016, would a General have privilege to grant SAP access? I'm seeing only select ppl have that authority which leads me to thinks a DoD puppet

Anonymous ID: 645274 March 13, 2019, 1:09 a.m. No.5656511   🗄️.is 🔗kun

>>5656384

A "Bomb Cyclone" aka bombogenesis is a storm expecting to rapidly intensify! Here we go Q Patriots! Pray for peace and safety. Comfy af not givin af about whatever cabal or alien assets are under there.

Anonymous ID: 645274 March 13, 2019, 1:15 a.m. No.5656552   🗄️.is 🔗kun   >>6600 >>6606 >>6631

>>5656493

My man! Nice digs. McRaven was SOCOM from '11-14 so the timeline is there. Imo too early, and it seems all 3 here were focussed on Syria and Greater Israel Project so others would be assigned for coordinating with China to give them the go-ahead to access the SAP info with military & satellite tech info

Anonymous ID: 645274 March 13, 2019, 1:32 a.m. No.5656639   🗄️.is 🔗kun

>>5656600

I'd say a dig on Palantir to make connection with analyst meeting with Mattis and McRaven to make notables.

 

Yes, because the story is that China hacked that sensitive info (military + satellite tech which would make us defenseless to EMP attack), but really the Clinton camp sold it…they just needed the access first and whoever they paid off/threatened to get it from. I could totally see it being either military guise ur digging btw, but I'm thinking "defense/satellite" person

Anonymous ID: 645274 March 13, 2019, 1:57 a.m. No.5656757   🗄️.is 🔗kun

>>5656600

"The document confirms that Palantir is employed by multiple US Government agencies. One of the company’s first contracts was with the Joint IED Defeat Organization in 2006. From 2007-2009 Palantir’s work in Washington expanded from eight pilots to more than 50 programs.

 

As of 2013, Palantir was used by at least 12 groups within the US Government including the CIA, DHS, NSA, FBI, the CDC, the Marine Corps, the Air Force, Special Operations Command, West Point, the Joint IED-defeat organization and Allies, the Recovery Accountability and Transparency Board and the National Center for Missing and Exploited Children. The Centers for Medicaid and Medicare Services were planning on pilot testing the use of Palantir in 2013 to investigate tips received through a hotline. A second test was run by the same organization to identify potentially fraudulent medical providers in the Southern region of the US.

 

However, as of 2013, not all parts of the military used Palantir. The U.S. Army developed its own data analysis tool called the Distributed Common Ground System at a cost of $2.3 billion, but it is believed that it is not very popular. The leaked document cites a 2012 study where 96% of the surveyed war fighters in Afghanistan recommended Palantir.

 

The prospectus holds that the US military used Palantir with great success. The Pentagon used the software to track patterns in roadside bomb deployment and was able to conclude that garage-door openers were being used as remote detonators. With Palantir, the Marines are now able to upload DNA samples from remote locations and tap into information gathered from years of collecting fingerprints and DNA evidence. The results are returned almost immediately. Without Palantir, the suspects would have already moved onto a different location by the time the field agents received the results."

 

Moar at https://techcrunch.com/2015/01/11/leaked-palantir-doc-reveals-uses-specific-functions-and-key-clients/