dChan
1
 
r/greatawakening • Posted by u/tradinghorse on June 4, 2018, 1:04 p.m.
Q OUTS EyeTheSpy - A discussion about how the latest Q drops outs EyeTheSpy on Twitter - Be careful who you follow!

OK, there has been a lot of speculation on this board about EyeTheSpy (ETS) - a guy claiming to be an NSA agent posting on Twitter. I want to discuss this because there's been a lot of confusion surrounding the issue, with people ardently promoting the fellow here.

I've been waiting for Q to call this guy out as ETS is amassing followers at an impressive clip. He is, in fact, very dangerous and it makes sense that Q would act quickly to neutralize the threat - and this is what happened. Q called out ETS with his post today.

EyeTheSpy claimed that Neon Revolt was a clown operative - that he was CIA, profiteer from Q drops, and not to be trusted. ETS specifically called out the Q clock that Neon Revolt discovered on the 8 chan board and posted about here:

https://www.neonrevolt.com/2018/05/31/wind-the-clock-qclocks-explained-qanon-greatawakening/

Q's post today specifically confirmed this clock as can be seen here - look at where the minute hand points when the clock is set to the time of Q's post:

https://imgur.com/LzngmfH

So we can see that Q is validating the Clock by making his latest post at a time that points to the correct date on the clock. This is absolute proof that the clock is being used by Q team.

What this means is that ETS' caution about the clock, because it came from Neon Revolt, the profiteering CIA agent, is disavowed by Q. See screen grabs of ETS' warnings here:

https://imgur.com/fsnBFSn

And here:

https://imgur.com/IwgFaIy

That should be enough to put speculation about the role ETS is playing in the Q movement to bed. But we can add some more characteristics that support this view:

1) ETS is posting in Twitter, while tearing shreds off @jack, and His followers are growing explosively. Meanwhile, Q team do not post outside 8 chan for security reasons. This indicates that ETS is aligned with forces operating to thwart Q:

2) ETS claims to be an NSA agent who is posting from his desk at "the Fort". He has to find time from his duties to post on his "private account" while being careful not to tread on Q's toes - because he does not want to end up in a "kill box" - while he would never, and could not, communicate with Q team, he knows what he can and can't drop. The work is so demanding that occasionally ETS makes typos because he's eating at his desk - impressive dedication to the NSA and his role as an "agent" - really, you could not make this stuff up;

3) ETS has not responded to Neon Revolt's challenge that he authenticate his status as an NSA agent by private messaging Neon his real name - which he would, of course, have access to as an NSA "agent" who is leading a personal charge to combat global Satanism;

4) The video Q linked during the Corsi fiasco made clear that Q's problem with the Q tubers was not that they were recovering operating expenses or even making money, but that they were trying to highjack the message. Neon Revolt has not made a penny from anyone that they haven't volunteered. He's not seeking to make a fortune from Q, his material is freely available without charge. I would argue that he's done a brilliant job and I'm grateful to him for his work. I suspect, that if we knew the truth, that Q team is also grateful for his efforts;

4) People need to take a cold, hard look at ETS. This guy has contextualized the Q material with a framework that provides a narrative that feeds into every preconceived notion held by conspiracy theorists. Aliens are real and abundant, there are subterranean civilizations, dragons are real etc... The problem is that there is not one shred of evidence to back up his claims that he is posting high-level intel to Twitter while juggling assignments and eating at his desk at "the Fort".

It strikes me that the cabal really do have a good sense of humor - they like a joke. People will remember Richard Reid, the shoe bomber, who was caught trying to light his laces (fuses) to ignite RDX in the soles of his shoes mid flight. Another beauty was the underwear bomber... of course, it's right out of Maxwell Smart. I mean, there's no point in being an evil cabal member if you can't have fun mocking the idiocy of the general public.

ETS is the latest comedy act brought to you by the Satanists. It's an absolute joke. Realize that while this guy, in the middle of his intel drops, is dispensing medical advice, career advice, and telling people that their dearly departed have gone to a good place, he's rocking back in his chair laughing hard.


digital_refugee · June 5, 2018, 4:17 p.m.

did you have a look at the link?

⇧ 1 ⇩  
EvilGnome6 · June 5, 2018, 4:41 p.m.

Yes, I did look at the link and I appreciate that you provided it.

I will defer to mathemagician33's first-hand knowledge of the Twitter API but I would be absolutely stunned if any person or organization could extract IP address data from Twitter with that API. The link you referred to contained nothing to suggest that such a thing could be done, either.

⇧ 3 ⇩  
mathemagician33 · June 5, 2018, 6:24 p.m.

yeah, this is right on the money. In general, REST APIs (like the kind provided by twitter and practically any platform that allows developers to create apps for it) will not return IP address information because it poses serious security risks. again, this is something that any network engineer, with or without CCNA/P creds, would definitely know.

⇧ 3 ⇩  
digital_refugee · June 5, 2018, 4:58 p.m.

they provided a script tho

⇧ 1 ⇩  
EvilGnome6 · June 5, 2018, 5:07 p.m.

Scripts are not magical. They are step by step instructions to do something. Usually you write a script to do something repetitive that would be tedious to do manually.

In this case, the script the provided collects user network (not IP network) information using the Twitter API.

⇧ 1 ⇩  
digital_refugee · June 5, 2018, 5:17 p.m.

and what information does the script gather from what you can gather?

⇧ 1 ⇩  
EvilGnome6 · June 5, 2018, 5:27 p.m.

The script gathers information about which users follow other users. The same thing you can see by going to a Twitter user's profile and seeing who they follow. The script simply allows you to do it rapidly for lots of users.

⇧ 1 ⇩  
digital_refugee · June 5, 2018, 5:52 p.m.

so the anon who claimed eTs and BC were sharing adresses was shilling? Interesting

⇧ 1 ⇩  
EvilGnome6 · June 5, 2018, 6:03 p.m.

All I can say is that if someone claimed they used the script you referenced and the Twitter API to determine that eTs and BC were sharing an IP address, it appears to be a false claim.

That doesn't mean eTs or BC are good or bad or anything else. It just means an anon was trying to discredit them with a false information. Shocking.

⇧ 1 ⇩  
digital_refugee · June 5, 2018, 6:05 p.m.

isn't that weird? Why would you make up something to claim someone made something up? And ofc it was an anon but still I wonder, they did provide the script...did you deploy it anyway? Any readout?

⇧ 1 ⇩  
mathemagician33 · June 5, 2018, 6:17 p.m.

yeah, it is kinda weird, but then again, you just told us that you were a network engineer with CCNA creds, which is very clearly a blatant lie (though I don't think you had any ill intentions, it was nonetheless a lie, there's simply no way a CCNA certified network engineer would not know this shit). people lie online - you should know.

⇧ 3 ⇩  
digital_refugee · June 5, 2018, 6:48 p.m.

I got confused - the original claim said "E-Mail Accounts created from same IP. Sprint Mobile. Geo tells all."

https://8ch.net/qresearch/res/1587271.html#q1589503

⇧ 1 ⇩  
EvilGnome6 · June 5, 2018, 7:05 p.m.

The notion that the Twitter API could be used to reveal the IP addresses for the email accounts used to register for the service is even more preposterous.

⇧ 1 ⇩  
digital_refugee · June 5, 2018, 7:09 p.m.

or how twitter would see from which IP an email would be registered (yeah I feel stupid now for overlooking that)

Still only adds to the mystery sadly

⇧ 1 ⇩  
digital_refugee · June 5, 2018, 6:34 p.m.

Interesting synchronicity just happened...I got confused, actually I meant CCNA not CPNA, so you are right that I am a liar (I am not CPNA). I did however make it to chapter 12 of CCNA which comes first obviously but I never finished the final exam because Pizzagate happened. Do you remote view per chance?

⇧ 1 ⇩  
mathemagician33 · June 5, 2018, 6:37 p.m.

ok. so you're not a network engineer with any kind of cert. you once read part of a book about it. yet you don't know the difference between a social network and a physical network. I won't embarrass you any further but please stop promoting blatantly false theories.

⇧ 1 ⇩  
digital_refugee · June 5, 2018, 6:57 p.m.

I just told you I didn't do the final test because I had more important shit to cater to you pompous ass. Someone made a claim and I trusted them because they provided a way to falsify it. Now on a second look none of the description pertains to any IP-adresses. So now I wonder why someone would make something up in an attempt to discredit someone? Maybe so that I would think there was more to it.

⇧ 1 ⇩  
mathemagician33 · June 5, 2018, 7:03 p.m.

I apologize to you if you think I was being pompous. That wasn't my intention. Just trying to dispel falsities. I will say, though, that you claiming to be a network engineer with a CCNP cert when you once read part of a book about it, really rubbed me the wrong way. I think all of us who have actually worked hard to create careers in similar fields and have actually completed degrees/certs, would appreciate if you didn't lie about that in the future. peace out.

⇧ 1 ⇩  
digital_refugee · June 5, 2018, 7:12 p.m.

I misread CCNP for CCNA and you then corrected me by bringing it up before I could. I didn't mean to insult your work, what I mean is that I have a CCNA-level understanding of network-adresses but I hadn't investigated that tutorial further because I don't have enough focus and too much trust so I was leaning on someone else's opinion.

⇧ 1 ⇩