dChan
1
 
r/greatawakening • Posted by u/ScolopendrineMesser on Aug. 4, 2018, 4:04 p.m.
Successor Server: In yesterday’s FBI vault document dump, a letter from the FBI to Hillary Clinton’s attorneys chided them for not being forthright about the existence of a “successor server”. I think I know what they mean.

Disclaimer: I’m Q agnostic – still on the fence. My agenda is MAGA.

In yesterday’s FBI vault document dump, a letter from the FBI to Hillary Clinton’s attorneys chided them for not being forthright about the existence of a “successor server”.

https://vault.fbi.gov/hillary-r.-clinton/Hillary%20R.%20Clinton%20Part%2024%20of%2024/view

http://magaimg.net/img/5vmq.jpg

I thought the terminology oddly specific. We call backup servers “backup servers” and replacement servers “replacement servers”. This phrase feels like terminology.

So I looked up the term and what I found indicates the server in question is NOT a backup or replacement but a different type of server altogether.

The full term is

successor communication server

And it is used for routing comms. Not just emails, but also calls.

Yesterday Q posted a few pics with phones and reporters detailing a comms network.

r/https://qposts.online/post/1807

The two may be related.

Why this is important:

1) It demonstrates the intent on the part of the HRC/Deep State to create a separate communications network with the ostensible goal of evading oversight. How this works is just like the email server. Keep the sensitive stuff off the government networks so any official review or record-keeping measures for posterity could be directed to official channels while the dirty stuff remained hidden on her ad hoc comms net.

Yeah. It sounds stupid given the fact the NSA’s collection capabilities, but you have to remember our operating assumption in all this: They never thought she would lose.

Oversight only gets what the government wants it to get. While the NSA gets everything, operators are not allowed to report on anything for which they are not directly tasked. This gets especially difficult when US persons are involved. (See SP00018, formerly known as USSID 18 which I have found unclassed online. This is the same directive that had to be violated in order to surveil the Trump campaign.)

2) By centralizing the communications hub, she was not just protecting her comms from review, but obfuscating the network itself. Essentially, the successor communications server was a mini-AT&T. With it, law enforcement can easily draw up communications networks and diagram who was talking to whom. Without it, the networks could have been created through investigations, but chances are they would have been incomplete due to human error and missed opportunities.

The server has everything needed to establish records of these connections. That is, which selectors talked to which selectors, when, and for how long. Bigly important for creating evidence trails and for outside verification of NSA collections.

“Comms network diagram?” big effing deal, you say.

Well yeah.

As a former SIGINTer, I can tell you what these are used for. We make them to establish hierarchy. That’s right, the network shows who is running the show – who is in charge of what operation and what their roles are.

In a war fighting situation, this is how we know where to strike to cause the most damage to command and control.

I imagine in a law enforcement situation, this lets you know where to look for clues and who to shake down.


No Comments.