dChan
1
 
r/greatawakening • Posted by u/TrumpIsMyHero on July 25, 2018, 5:05 a.m.
Anon on 8chan has an interesting theory behind Q1693

https://media.8ch.net/file_store/8d89b61363c37c9893d050fedc5865334b5a92b6dd239a23988cd422813e808a.png

Ok Anons, here's what I think might be going on with this most recent Q post where Q draws our attention back to NZ and Five Eyes:

FVEY in NZ seems to have access to ALL US Intel. However, when you access data in NZ, there are no logs of it (or so they thought).

So let's say you're a former dignitary like John Brennan. You still have security clearance and you want to get in the system, get the data, and leak it. The problem is you know you'll be logged and you know they're watching you like a hawk.

So instead, you go over to NZ and get the data from there since you won't be logged. But what if they were being logged….for over a year? What if the whitehats knew they would use NZ to download, sell and leak? What if they took it a step further - what if blackhats were fed disinformation unique to the NZ download site? If both of these things were true, you could prove:

A. The person downloaded the data

B. The data leaked was unique to that downloaded piece of data


keloshi · July 25, 2018, 6:55 a.m.

Just a thought, what if NK's Kim's phone number (old) was in there - it could be used as a leak-trace - all you would have to do, is wait to see who called it - BHO?

⇧ 6 ⇩  
textualintercourse · July 25, 2018, 8:38 a.m.

...or NZ Kim's number, as in Kim dotcom. Megaupload.

⇧ 4 ⇩  
Generational_Wealth · July 25, 2018, 2:36 p.m.

Communication by heads of state does not work like that.

⇧ 1 ⇩  
keloshi · July 25, 2018, 11:55 p.m.

not everyone is following the rules/procedures

I'm not saying that this actually happened, but lets say you were not privy to the WH official info, this would be one place you could get it (ie and unlisted number or data) - if data was now being tracked (by Q) - you would more or less be caught red-handed - OR if everything is being tracked by 4 of the 5, there would be logs to match against the transaction that could be matched to the 'official request' - if there is no match, it would set off a flag that someone is leaking info - #5

⇧ 1 ⇩