Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Yo-Yo
Finally, many of you know someone who has handled highly classified information, worked in SCIFs, and communicated securely in a professional context. I urge you to seek their wisdom in this matter, to evaluate to feasibility of Q’s claims. I also urge you to study the National Industrial Security Program Operating Manual (NISPOM), which covers handling and protection of national security information in exhaustive detail, then contrast its instructions with what “Q” is doing.

Good advice...its hard to see how anyone with a real background in intelligence, as Q purports, would fail to keep their comms secure.

-btw the flag posted by the person who hacked Qanon and left that message is known as a 'yellow jack' and serves as an international maritime symbol signifying quarantine.


96 posted on 08/11/2018 12:13:36 PM PDT by mac_truck (aide toi et dieu t'aidera)
[ Post Reply | Private Reply | To 10 | View Replies ]


To: mac_truck

> “Good advice...its hard to see how anyone with a real background in intelligence, as Q purports, would fail to keep their comms secure.”

Very simple to understand, very much part of cyberwarfare. You set trap doors, you leave certain backdoors open.

When a hacker enters a backdoor, they leave a trace behind them. Sophisticated hackers can clean up before leaving but real-time recordings capture their info before they wipe it.

They can also be tagged with ‘beacons’ that transmit where they are, what location they are returning to or originated from.

A full list of available cyber tools and weapons are not in the public domain. How do I know this? Contacts related to five eyes doing cybersecurity and custom IT jobs. I knew a relative of a retired PM who was still influential. I participated in seeking contracts for the group.

Secondly, and easy to understand, Q is not going to be using top security to communicate with Anons because Anons have to have account access; giving them high level security accounts is not going to happen.

Thirdly, Q has now been doing this for almost a year with very few incidents and quick response when incidents do occur. It’s not like break-ins are going to penetrate national security infrastructure.

I can put up a spare server not linked to my network, completely unlinked in any way, and I can let hackers try all they want to break in. In so doing, I can test and evaluate security prototypes, patches, countermeasures, monitoring and tracking capabilities.

If I invite a group to chat with me via my server, I can put out keywords that will attract cyber snoops and then proceed to put them through a test program to see how my tools work. My security is faulty by design to see how hackers act and react to what I allow them to do.


114 posted on 08/11/2018 1:13:22 PM PDT by Hostage (Article V (Proud Member of the Deranged Q Fringe))
[ Post Reply | Private Reply | To 96 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson