Anonymous ID: 86155f Jan. 2, 2020, 3:32 p.m. No.7695662   🗄️.is 🔗kun   >>5677

Q drop # 3764 is odd. When put into word and centered, it forms a satellite shape.

Look at the yellow marked only for now.

Follow all [1] and see that there was only 1 person involved. To prove my point, why ONLY secure 1 persons comms before release? That makes NO SENSE because the info could be found by the second person so only securing 1 is useless!

"In Hand " (see pic 1A ) is defined as needing immediate attention.

Adm. Rogers took his findings to Dunford. Start vid at 41:31 and listen for about 2 mins ( although the entire vid is worth hearing when you have time ) https://themarketswork.com/2018/05/15/heroes-in-the-room/

Feeder can be a container ( see pic 2 A ) it has 1 next to it but the Podesta emails are different than the DNC emails Wikileaks dropped. The Podesta emails continued after the date of Seth Rich's death whereas the DNC emails ended a couple of weeks BEFORE Seth Rich was murdered. This indicates someone OTHER than Seth Rich took part, yet we have [1] next to everything.

If Seth Rich downloaded the DNC emails, he isn't responsible for the Podesta email dumps because he was already dead. Therefore this was not [1] entity/person downloading onsite (Seth Rich )

The person who downloaded both sets of emails is the same person who uploaded them! The speed of download for OUTSIDE the USA is slower than within the USA and would show foriegn involvement.

The reason to secure 1 persons comms is to secure the activity a single person was doing and not to secure who they were communicating with. The communication with others is irrelevant.

My conclusion is DNC AND Podesta were breached from INSIDE the USA and the one responsible for the breach is the same person who uploaded the files to the WikiLeak site. ( remember weird tweets of Assange that looked like a dead man key code?) That was probably the key code to upload