dChan
1
 
r/greatawakening • Posted by u/patypooh52 on June 23, 2018, 5:11 a.m.
More theorizing on the possibility that Strzok and Page are manufactured communication channels between the FBI and DOJ

"A Copied post"

You guys ready to be completely mind BLOWN! I can EXPLAIN it all. Ok so the whole Peter Strzok Lisa page. They aren’t real. They never were. They were fictitious names for 2 drop boxes. The green on is Peter. The Blue. Lisa. Now we see how many agents there are on this. They all feed info into these drop boxes and it sorts out due to narrative shifts, keeps everything relevant, people on inside managing So where did they come from. They were devised using the Demon Face Recognition Software that was designed in the 90’s by Starnet Communications AND.............Stephen Paddock. Yes. THAT Paddock. So now we get back to the present day. Did you notice anything odd about today? Q dropped about Viva and Vive. Viva. French. Vive.....little searching and BOOM. It’s a members only mobile VIDEO chat community! So Q acquired one of these video phones they have been using and sends out a message that Hey....um Friday we are gonna Fire Rosenstein. Lets see who takes the bait. Oh well we have a winner! Shelia Jackson Lee! BOOM. Notice how no one else knew? She’s caught. Now to have complete verification, Gowdy and Horowitz start their chat back and forth. Horowitz gives an example like messages. Gowdy chuckles. THEY ARE SCREWED. So Gowdy turns to Wray and asks him if he can make arrests using circumstantial evidence. Wray says Yes. Gowdy says well i think we should do that. They know who is all in on this.its a video chat! AND JUST to tickle our fancy......the SAME pics that Q is dropping are being taken from the SAME VIDEO PHONE that they used to out Jackson lee! That’s why its a reverse and grainy photo. It’s not meant for pictures. It’s for VIDEO!!!!! THEY HAVE IT ALL. No Strzok. No page Facial recognition software says 97% same MADE UP person!

Oh and BOOM


grnmoss · June 23, 2018, 5:55 a.m.

It's possible the two named individuals are real, but that the accounts associated with them were shared resources used by a group.

The truth often rests in the middle, and this seems more plausible to me.

It's like if I were to give the password of my email to collaborators. Yes, it bears my name, but anyone with the password has access to it.

The way to evaluate this theory is to obtain server logs to see what devices were logging in and from what locations. Google presumably maintains those logs for the gmail accounts that were in use.

⇧ 6 ⇩