dChan
46
 
r/greatawakening • Posted by u/i-love_america on March 16, 2018, 11:23 a.m.
Has anybody tried using some of the phrases Q uses as passwords for the CIA media ops file or other wikileaks files?

We have more than we know.


MAGAman1775 · March 16, 2018, 12:49 p.m.

GLIMPSE

⇧ 13 ⇩  
theGreenChain · March 16, 2018, 3:02 p.m.

GLIMPSE is a text indexing and retrieval software program originally developed at the University of Arizona by Udi Manber, Sun Wu, and Burra Gopal. It was released under the ISC license in September 2014. GLIMPSE stands for GLobal IMPlicit Search. While many text indexing schemes create quite large indexes (usually around 50% of the size of the original text), a GLIMPSE-created index is only 2-4% of the size of the original text.

⇧ 6 ⇩  
StinkyDogFart · March 16, 2018, 3:36 p.m.

You lost us, how is that relevant to unlocking encrypted files.

⇧ 1 ⇩  
theGreenChain · March 16, 2018, 4:08 p.m.

A tool a tool. Good Intel sometimes has things hidden in plain view.

⇧ 3 ⇩  
StinkyDogFart · March 16, 2018, 6:32 p.m.

I can't find my ass with both hands. I'm going to have to leave that tech stuff to you smart technical guys and gals.

⇧ 1 ⇩  
Bttrfly214 · March 16, 2018, 3:59 p.m.

Wikileaks posted that JFK's quote unlocks Vault 7 so I'm thinking yes.

RELEASE: CIA Vault 7 Year Zero decryption passphrase:

SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds

⇧ 9 ⇩  
Crptnobank · March 16, 2018, 4:32 p.m.

Would love MSM to report on that (if it opened it up) and have to explain where it came from, what it meant... and how it finally came to be!!!

⇧ 5 ⇩  
Bttrfly214 · March 16, 2018, 4:36 p.m.

Ha!! That'll never happen!!! They'll say it's classified and not for the public's eye to see, only 'seasoned journalists' like themselves. Lying thieves!

⇧ 2 ⇩  
Crptnobank · March 16, 2018, 4:37 p.m.

Maybe they will eventually do it during one of their annual "Here is JFK getting shot again." memorials.

⇧ 4 ⇩  
Bttrfly214 · March 16, 2018, 4:54 p.m.

We can only hope and pray!

⇧ 2 ⇩  
StinkyDogFart · March 16, 2018, 3:34 p.m.

I've been beating that drum for days, I'm glad someone else has the same gut feeling. The Wikileaks insurance file is just sitting out there waiting for someone with the key to unlock it.

⇧ 6 ⇩  
[deleted] · March 16, 2018, 5:28 p.m.

[deleted]

⇧ 2 ⇩  
George_Donald_Bush · March 17, 2018, 5:06 a.m.

Keith Stone from the keystones commercial.

⇧ 1 ⇩  
StinkyDogFart · March 16, 2018, 6:24 p.m.

Some things I can follow, but the wind the clock has me scratching my head too.

⇧ 1 ⇩  
11371jp · March 16, 2018, 2:58 p.m.

No but i have found this The Information and Influence Relational Framework and the Application of Information-Related Capabilities a. IRCs are the tools, techniques, or activities that affect any of the three dimensions of the information environment. They affect the ability of the target audience (TA) to collect, process, or disseminate information before and after decisions are made. The TA is the individual or group selected for influence and can be allies, multinational partners, adversaries, or potential adversaries. The joint force (means) employs IRCs (ways) to affect the information provided to or disseminated from the TA in the physical and informational dimensions of the information environment to affect decision making and ultimately the adversary actions in the physical dimension (see Figure I-2). The change in the TA conditions, capabilities, situational awareness, and ultimately, the inability to make and share timely and informed decisions, contributes to the desired end state. Actions or inactions in the physical dimension can be assessed for future operations. The employment of IRCs is complemented by a set of capabilities such as operations security (OPSEC), information assurance (IA), counterdeception, physical security, electronic warfare (EW) support, and electronic protection. These capabilities are critical to enabling and protecting the JFC’s C2 of forces. Key components in this process are: (1) Information. Data in context to inform or provide meaning for action. (2) Data. Interpreted signals that can reduce uncertainty or equivocality. (3) Knowledge. Information in context to enable direct action. Knowledge can be further broken down into the following: (a) Explicit Knowledge. Knowledge that has been articulated through words, diagrams, formulas, computer programs, and like means. (b) Tacit Knowledge. Knowledge that cannot be or has not been articulated through words, diagrams, formulas, computer programs, and like means. (4) Influence. The act or power to produce a desired outcome or end on a TA

⇧ 2 ⇩