NeonRevolt had an interesting theory about Lee’s leak, and the two pics of 45 that Q posted:
The firing of RR news was bait. The information was leaked by 45 himself - from his iPhone. The iPhone was compromised, known to be compromised, and he used it to trace the information through the network to find out where it would come out.
It makes sense out of the recent posts regarding ‘How would she know?’
Speaking of which, what do you call a sitting US Senator who not only OWNS a ring fashioned into a symbol known to be widely used in the child trafficking and pedophilia, but WEARS IT during official Senate business in front of cameras?
Some one who never dreamed anyone would catch her, and if they did, would do anything about it.
(Yes, Sheila Jackson Lee was wearing a huge pyramid pedophile ring during a Senate hearing.)
I read where his phone was compromised...smart way of finding out who was listening...course Ms. Lee is as dumb as a fallen bird’s nest...so there is that...
Except for the fact she was NOT wearing that ring yesterday..
I think something has happened to the Neon Revolt guy..
Sad to say but having basic facts wrong and a pretty farfetched theory is not what I would expect from him.
Trump and the Canary Trap July 10, 2017
https://www.americanthinker.com/articles/2017/07/trump_and_the_canary_trap_.html
Any “official” who has been leaking should be concerned, and here’s why. One method the Trump administration is likely using to identify these leakers is called “the canary trap,” a term coined by Tom Clancy in his novel Patriot Games. The canary trap is a method for organizations (including many intelligence agencies and private businesses) to determine who is improperly providing information to those not eligible to receive it. They do this by “leaking” certain information, often false, and then following it to see who ends up with it and how they did so.
The method cited in Patriot Games applies to documents. Each copy of a sensitive document is printed with slightly different punctuation, word usage, etc. to make it unique. If a reporter quoted certain parts of the document, that uniqueness would identify the document and the one person who had given it to the reporter. This process can be partly automated now by use of computer synonym generators.
Although coined by Tom Clancy, the technique has a long history in intelligence circles. When U.S. forces were attempting to determine when and where the next Japanese attack would take place in the Pacific, a group of Navy codebreakers under Captain James Rochefort who in turn worked for Admiral Chester Nimitz used a different version of the technique to determine that the Japanese Navy’s next target was Midway.
At the risk of being a pedant, she's a congresswoman not a senator. Now the coil of her ring goes the opposite direction, so maybe she isn't a pedophile who likes little boys....who knows. I will say, she's a whack job.
Woooooooaaaaaahhhhhh there! She ain’t no Texas Senator. Congresscritter is all. Bad enough though.
How did Durbin know about POTUS 2nd iPHone ?
...not a senator; not intelligent life.