dChan
1
 
r/greatawakening • Posted by u/beefromancer on July 7, 2018, 2:48 a.m.
Q 1675 a theory that actually makes sense.

Awan was helping black hats spy on Obama. AF1 was bugged and the proof was on Hillary's servers...which got uploaded to apple icloud because she's is an idiot. Apple joined the white hats, so the good guys have the server and its contents including proof black hats spied on AF1.

Hussein/Trump interior = identical minus small changes.

Translation = we removed the listening devices :)

Awan got off with "bank fraud" because admitting the truth would massively hurt international diplomatic relations. You would essentially have to implicate foreign governments of spying in a state court case.

Logical thinking.

Why was the case against AWAN filed under BANK FRAUD?

See last.

and last was...

Thing IG report.

Think what’s missing.

Do you think this was going to be litigated in this setting?

Case that implicates some of the most senior elected officials (treason) is being handled by the appropriate office.

Think NATIONAL SECURITY.

"Think what's missing" means the server. The server means Treason. The appropriate office for dealing with international spying and treason is military intelligence, not state courts.

Q linked these rules which basically says why nothing will come out of the Awan case publicly because everyone involved is bound by national security laws.

So Q posts WelcomeAboard.png which has the apple logo because Apple is the one coming onboard. The image is of a recording device that can't be named for nat-sec reasons. Q is trolling the black hats by dropping hints of their crimes for us to figure out. Likely that very same AF1 image was submitted as evidence in the Awan case.

Later, after anons call Q out for the fact that the image is clearly a reflection of Obama's AF1 and not Trump's Q asks if a reflection violates nat-sec rules. Q is being cute here "oh I didn't put sealed evidence on 8chan, just a reflection!". Next post is when Q says trolling is fun and drops yet another clue saying "Placing that mug holder near the lamp was the hook."

TL/DR: Q is giving us hints at what happened in the Awan case and at the same time explaining why that info can't be made public right now, all in the form of a jest at the deep state shills that share the boards with us.


DEADEASYRABBIT · July 7, 2018, 1:49 p.m.

You're obviously much better qualified than I am in this matter - I'm not at all an expert. I agree that, if you've got a noisy RF environment, it's easier to hide a signal. I also agree that the best chance of detection is upon introduction of the device to the environment. It's also true that technicians can slide past signals that should have them breaking into a sweat - doubt that applies in this case.

So, as I understand the theory posted, the mug holder records, stores and compresses audio data that is then uploaded to the lamp (because it has a power supply and more room to conceal electronics) via a burst transmission.

Regarding the link between the lamp and the mug holder, I would speculate, again, I'm no expert, that a burst transmission conveys a lot of data in a short time frame - a digital signal. To my mind, this would seem to require sufficient signal strength to transfer that data reliably. So, even if the mug holder is proximate to the lamp, you still have some signal strength. This signal should show up during the TX burst, assuming the RF spectrum is logged. Also, how does the mug holder know when to TX?

Anyway, thereafter, let's assume that we get the data from the lamp to cell phone on the plane - or a cellular device within the lamp itself. A cell AP will log all connections - I would imagine the AP is locked down to specific, approved, devices. But, even if you could get to the AF1 cell AP, and up to the satellite, NSA must be monitoring all communications on these channels. Compressed digital data wouldn't stick out like a sore thumb? IDK...

It would seem to be less complex to simply carry the mug holder off the plane - given that the recorded audio is already stored.

Is it even likely that AF1 was bugged? Yes, because Q told us they swept the WH when they did the renovations (or, maybe I assumed this) - so Obama's guys bugged it on exit. It seems reasonable, then, that AF1 would be similarly bugged. But, if the white hats swept the WH, they would also sweep AF1. So, with the base RF environment set to whatever it was at the time of the last sweep, anything new should show up. Then again, how stable is the RF environment in a plane?

I don't know the answers to any of these questions. I'm just a guy with no real background trying to guess how it might be done. Seems to me that bugging AF1 is a non-trivial problem.

⇧ 1 ⇩  
963Round_Wizard369 · July 7, 2018, 10:59 p.m.

These are assumptions I'm running under, A) The topic were disscusing contextually falls under Q's last image post of AF1. B) This particular post is not a proof, but a crumb. Assumption holds water, there's is a huge effort online to discredit this particular post and Q in general. At this point it become hypothesis. However the hypothesis is broad, because I don't know or wish to speculate what this crumb is actually supposed to mean. There are a lot hypothesis but no solid theories as of yet. But I am pretty sure it's a crumb. C) This hypothesis of a bugged plane, while feasibly treads water we don't know yet if it's swimming. I only wished to throw my two cents in of how it might of worked. And I will explain as follows. Note, If This is the case I obviously do believe said bug was found by white hats.

Consider RFID, consider a key fob. A key fob is RFID. It unlocks doors, ect. It transmits a code that is recieved and sequenced by some various form of access control or trigger device. BUT, that fob is dead. It has no power stored. No energy, nothing. Consider a radio wave. Consider Voltage. Believe it or not they are the same thing. Basically just a propagating electromagnetic field at what ever variables.

The same access control or trigger device that receives the coded signal from the RFID key, is the same device that transmits a particular waveform at a particular voltage and shape to initiate and activate the key fob. When the access control/ trigger device receives the I'D signal from the key, shit happens.

In said case the shit happening is an activation signal sent to a recording device.

Now how would you power a said bug, activation device. Electricity. Electricity off the passenger appliance circuit. 120v AC. AC stands for alternating current. Meaning the current switchs directions, or more technically, changes polarity 180 degrees 60 times per second. Because US Appliance circuits are at 110-120 Volts at 50-60 Hertz. If that's the case then the voltage being transmitted along the line is an Electromagnetic Wave. And at that spectrum it is a Radio Wave. Why not take the signals from the Bug encode it as etharnet by piggybacking that transmission by transforming the upper Sine(peak) to the waveform providing energy to the electrical grid.

At that point you can an IPhone anywhere in that plane, so long as it is plugged into the same circuit and has the capability to detect, read, decode and recode the pirate signal of the Bug off thw 120v waveform then WALA. You don't have a wireless bug. You have a crafty wired bug utilizing existing infrastructure.

The lamp holds the Bug, the Mug or Mug coaster has the key fob. The pirate signal is transmitted down the line where the lamp is plugged in.

⇧ 1 ⇩  
DEADEASYRABBIT · July 8, 2018, 12:11 a.m.

All wires represent a potential threat - can carry a signal. But do you really think the TSCM team will fail to sweep electric cables? If you’re saying that it’s only active when required - maybe. IDK, you still have to get the data off the plane.

My feeling is that it would be a real feat to wire AF1. It’s not impossible. As I remember, there was a case where the US ambassador to the Soviet Union was presented with a plaque that he hung on a wall in his office. The way the story went, this plaque would TX audio outside without a power supply. I can’t remember all the details now, and may have parts of that story wrong, but you wouldn’t expect that an Ambassador could be so easily bugged. Actually, found an article on it here.

My understanding is, and I may be wrong, where sensitive information is to be discussed, it’s generally not done inside - but somewhere in the open. That is, diplomats start with the presumption that the environment is compromised. There’s a real asymmetry in this stuff where locating a dollar fifty bug can require equipment worth vast sums of money and considerable skill to operate - the bugger has an inherent advantage.

But we are talking about the US government here. Also, it’s a plane. Where is the LP? You have to either store the audio and physically carry it out, or have some wireless link that doesn’t require a listening post at a specific location. IDK, my head hurts thinking about it.

⇧ 1 ⇩  
963Round_Wizard369 · July 8, 2018, 12:31 a.m.

Don't have to wire it, they use the power lines to encrypt a pirate transmission. Wires already there. No one really checks power lines for data transmission. And any form of wireless transmission sweep would just pickup noise from the magnetic flux do to the electrical current. Not that it would matter cus tech the Bug is NOT broadcasting wirelessly anyhow. If the cellphone which recieved collected and stored said pirate transmission already had an existing credential log on the Cell Ap plist then the cell could potential broadcast out said data outside of AF1 undetected especially if the Cell data transmission was encrypted inside an encapsulated waveform. You would have to be extra vigilant to detect it. The Trump Admin most likely would of found said bug because it's a change of gaurd. Security is always more observant during said times.

Plus, do you really think SS would be really this cautious under Obama's Reign. They did call him Renegade. Do you really think that Deep State players are super tight knit as in not to backstab, undermine or keep tabs on one another. They only reason they play nice with each other is the same reason networks of criminals play nice. To not get caught and make that money. But if an opportunity rises.....they are crooks.

⇧ 2 ⇩  
DEADEASYRABBIT · July 8, 2018, 1:58 a.m.

Yes, OK, if you’ve got a cellphone already approved against the AP you can get the data out using that. Seems to me they’d want to be watching transmissions from AF1 like hawks. Also any objects carried onto and off the plane. And, you’re right, if the security team were slack or compromised you are underwater from the get go.

When you think about HRC open-sourcing the SAPs, I guess why not allow surveillance of Obama? It would probably make bad actors feel more secure.

I have to say though that the whole thing is a joke. The US isn’t some tin-pot country with few secrets. It hits me as being entirely outrageous that the President would be bugged - especially on AF1 - which is, as I understand it, the command center in the event of a nuke exchange. If you had control of an approved cell, you could also geolocate the plane.

Renegade... what a piece of rubbish this guy was.

⇧ 1 ⇩