Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ransomnote
1025

Apr 04 2018 21:19:55
Q
!xowAT4Z3VQ
898990

We are sincerely appreciative for your kind words and appreciation. Means more than you know. Each one read in full. We are in this together. WWG1WGA.
2018 will be glorious!!
God bless,
Q

163 posted on 04/04/2018 7:45:22 PM PDT by bagster (Even bad men love their mamas.)
[ Post Reply | Private Reply | To 158 | View Replies ]


To: bagster

Below is some research I did looking for ‘SIG’ but ended up on a different subject.
If anyone has any more info or corrections let me know. Sorry for the length.
Q post#
#3 - ‘Priority to clean out the bad actors to unite people behind the America First Agenda.’

#15 - ‘A deep cleaning is occurring and the prevention and defense of pure evil is occurring on a daily basis.’

#16 - ‘POTUS knows he must clean house (gov’t) in order to ‘free up’ and demonstrate who has authority in order to pass important legislation. This was always the priority.’

POTUS knew removing criminal rogue elements as a first step was essential to unite the public behind an America First agenda.

Then Q says the CIA was broken up and the Operations picked up by NSA

#129 - ‘[C]los[I]ng [A]ct: Dismantled. Impossible to clean
Operations —> [N]o [S]uch [A]gency ‘

But then we have:
#431 - ‘We are moving fast.
Remember, not all within the C-A, D-J, F-I are bad apples.
House cleaning (TOP).
Restructuring (1 to 2).
Operations 24/7.
Speed.’

Notice the letters I, O, and B missing. I.O.B = Intelligence Oversight Board.
The NSA releases redacted quarterly reports to the President’s Intelligence Oversight Board for review. Executive Order 12333 (Reagan) requires Intelligence Community elements to report to the IOB intelligence activities they have reason to believe may be unlawful. Pres. Reagan signed this Ex. Order to give the CIA more power to surveil Russia during the cold war.

G.W. Bush added to EO 12333 (after 911) the ‘President’s Surveillance Program’ (PSP).
The PSP’s legal justification was provided by a still highly classified document that Bush signed on October 4, 2001, entitled “Authorization for specified electronic surveillance activities to detect and prevent acts of terrorism within the United States.
The authorization has never been published or declassified.

In 2013 Snowden flew to Hong Kong and revealed thousands of classified NSA documents.

In 2014 the Obama administration released a 74-page redacted memo (Pres. Policy Dir. 28), however, contain this noteworthy section:
“The President has inherent constitutional authority as Commander in Chief and sole organ for the nation in foreign affairs to conduct warrantless surveillance of enemy forces for intelligence purposes to detect and disrupt armed attacks on the United States. Congress does not have the power to restrict the President’s exercise of this authority.”

Under an Obama Adm. program code named ‘MYSTIC,’ the U.S. engaged in the bulk collection every phone call to or from the United States. ‘XKeyscore’ is another secret computer system used by NSA for searching and analyzing global Internet data, which it collects on a daily basis. ‘PRISM’ is a code name for a program under which NSA collects internet communications from various U.S. internet companies. The program is also known by the ‘SIGAD’. ‘Dishfire’ is a covert global surveillance collection system run by NSA that collects hundreds of millions of text messages on a daily basis from around the world, also known as ’Prefer’.

With all these surveillance programs in place on Jan. 12 2017, the Obama administration’s parting gift was to expanded the power of NSA to share globally intercepted personal communications with the government’s 16 other intelligence agencies before applying privacy protections. This multiplied the number of intelligence analysts who have access to NSA surveillance, which is captured in large quantities and often isn’t subject to warrant requirements.
Now the good news, our POTUS has all the above mentioned programs in place to go after all the bad actors. They never expected for it to be used against them!

#794 - CLEAN ACTION APPROVED. HIGHEST AUTHORITY
#968 - Operation. Window. Clean
#970 - Done in 30. House cleaning.


185 posted on 04/04/2018 8:06:36 PM PDT by slag (reelect nobody)
[ Post Reply | Private Reply | To 163 | View Replies ]

To: bagster
This is Bagster's response to this portion of a Q drop. I'm trying to go in order. These are just my educated guesses based on following Q for a while now. I'm sure I don't have them all right, but discussion will help us all arrive at the truth. Feel free to correct my misinterpretations or just plain ignorance.

No investigation into WL receipt of information?
Nobody investigated WikiLeaks. Nobody interviewed Assange. Why? Duh, the didn't want the answers and would rather write their own fake Russian Hacker narrative.

No pull down of NSA metadata trace/C to WL?
Same reason. Snowden involved. Can't put CIA agent on record for trying to take down another US govt. agency. So CIA cuts him loose in public and calls him traitor. NSA calls him traitor, because he is. CIA laughs.

No pull down of NSA metadata period?
What does "pull down" mean. Haha. Oh, wait. So Snowden releases NSA metadata and CIA lets it hang there, doing damage to NSA. They wanted to kill NSA via Snowden?

Nothing transferred across web?
Nothing transferred across web because WikiLeaks drops were an "inside job". Data collected by Seth Rich and Snowden by hand and transferred out. Not hacked at all. Hack is a lie.

Direct-to-Direct bypass dump?
Don't know what this means. Sounds like what I just described. Rather than a "hack" from outside, a direct snatch from some in house computer guy. ?

No 'direct' investigation into DNC computer/software?
They wanted to call it a Russian hack rather than Seth Rich hack. They didn't want to provide motive for murder.

No 'direct' investigation into CS?
Same reason. Not sure who Crowdstrike is. Is that the organization that supposedly "investigated" the breach? Bogus, of course. Not sure on this one.

FBI/SC/DOJ/FED G simply TRUST CS's report on data breach?
Yea. Again, wanted to wash the whole thing so they could claim Russian hack and sweep Seth Rich under the rug. Big fat lying liars.

HUSSEIN block?
Obama blocked all the real investigations. HUSSEIN control?
Obama controlled all the investigations. HUSSEIN "STATE SECRETS" WH NAT SEC ARTICLES 1-9 - BURIED?What are these articles. Why buried???

Awan attached?
Are the Awans attached to these breaches as well as the Congressional breaches. Very likely so, but ni have no evidence. Just all dirty birds with similar skill sets working for the same set of other dirty birds are likely connected in some way.

AMERICA FOR SALE.
Wasn't that a book by...Corsi? Or that Indian fellow that I like? Forget his name. What in that book applies to this theme? Cheatin' Obama.
Q's new nickname must apply here, along with his attempt to rig the election by planting dirty people in the Trump campaign, electronic spying, digging up fake dirty dossiers, and other assorted lies and dirty tricks. Yes, cheatin Obama applies nicely.

Trust the plan.
I do. APRIL SHOWERS.
A hard rain's gopnna' fall.

Q

195 posted on 04/04/2018 8:15:55 PM PDT by bagster (Even bad men love their mamas.)
[ Post Reply | Private Reply | To 163 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson