Posted on 11/21/2018 10:09:57 PM PST by ransomnote
“Trust The Plan”
YouTube President Trump This Video Will Get Donald Trump Elected (The Plan) - 6 min
YouTube Storm Is Upon Us Q - We Are The Plan - 6 min
YouTube Joe Masepoes Q - The Plan To Save The World - 13 min - popular introduction Also, Stormisuponus on Bitchute
Threadreader Jason Wright Q Anon Is Real - Oct, Nov 2017 Q drops + commentary
Paul Serran What is Q? - 31 point introduction
Medium Martin Geddes WWG1WGA: The greatest communications event in history - 4 min - quick overview
“Pay Attention”
Thread Qmap.pub Q drops - created by Q, searchable by date or drop number, many additional features
Thread Qanon.app Q drops - copied from Qs 8chan board
Thread Qanonposts.com Q drops - copied from Qs 8chan board
Website We-go-all.net Q drops and research - includes extensive resources and links
Website Qntmpkts.keybase.pub Q drops - copied from Q’s 8chan board
“The Truth Is Spreading”
Thread Anonymous QProofs - compiled “proofs” that Q has trusted insider access to President Trump
Oracles Bagster Oracle - warm and witty summaries of each day's thread Lexicon Swordmaker LexiQon - immense list of expanded acronyms and terms used by Q; invaluable reference
Website Whitehouse Whitehouse.gov - President Trump's Executive Orders, Proclamations, Nominations, WH press briefings and news
Website FBI vault.fbi.gov - new FOIA Library, containing 6,700 documents and other media
Website State Dept. foia.state.gov - Virtual Reading Room Documents Search
Table FReeQs Q Threads - Our prior Q threads on Free Republic
“Power to the People”
Vimeo Praying Medic Series of videos explaining Q-drops. Also, his own website, ITunes and Podbean.com
Praying Medic Immediate reactions to Q-drop. Also, his own website YouTube Dustin Nemos Series of videos identifying Q content - Well reasoned; excellent. Also, @NemoV on GAB.AI
ImperatorRex New Twitter account name MAGAREX. Also on Gab.ai
Neonrevolt Includes highly detailed, investigative Q-drop reactionsAlso,@NeonRevolt on GAB.AI
GAB.AI Thomas_Wictor Includes excellent analysis of the Swamp
Lisa Mei Crowley Includes Q-drop reactions. Also, @lisamei62 on GAB.AI
Thread SkyPilot Story of Q - collection of Q information “Silent Majority No More”
Website White House Email the White House with your support and suggestions Website Congress Email Congress with your support and suggestions Website roserambles.org Q Cards Thread Little Jeremiah Memes “Fight, Fight, Fight!” YouTube President Reagan A Time for Choosing - 3 min - 1964 speech set to Matthew Worth’s images YouTube President Kennedy The President and the Press - 20 min - 1961 speech on secret societies
Or it has to do with Australia and the Five Eyes.
...used to be when a country was invaded, using lethal force to repel the invaders was just common sense (and effective).
Thoughts on CLAS 9?
no idea what Koala means, sorry...
the :) was to take the bite out of the shouted question..
Lord, God Almightyplease be with all the people of good heart in the Ukraine. Prevent evil at their expense. In Jesus Name, Amen.
*****************
AMEN.
Koala has to be some agreement with the Aussies.
I'm not so sure of that.
WHEN the upper ranks of the DIMRATS are ALL arrested/prosecuted, found guilty of horrific satanic child sex abuse and/or HIGH TREASON . . . AND horrific corruption--the remaining DIMRATS MAY BE DOING CIRCLES OF BACK-FLIPS TRYING TO DEMONSTRATE THAT *THEY* are very different from the perpetrators. . . . or from the other perpetrators.
Not sure. But there were 20 redacted pages that POTUS/Nunes have mentioned that they want unredacted and released. This is part of the DECLAS. There were hints that FVEYs involvement may be mentioned in there. My very uneducated guess would be perhaps that is on page 9...?
Just hoping...
Energetic Bear, the name CrowdStrike has given the attack group, is also known as Crouching Yeti by Kaspersky, Koala Team by iSIGHT Partners, and Dragonfly by Symantec. This group focuses on aviation, defense, energy, industrial controls systems (ICS), and petroleum pipeline operators. Spear phishing and watering hole attacks are also its initial vectors.
In the context of that post, which references repairing relations with former Allied intelligence agencies, it would refer to Australia’s intelligence agency in some way. Perhaps their reference to spying on Trump was Operation Koala. Perhaps, the CIA’s operatons in connection with Australia were referred to with Koala. It is something that we, and the anons, cannot know, but which the people who were involved will know, they will know that we know, and they will understand the message that is being sent.
“The US millitary has deployed Hillary to secure the boarder by just being so creepy they choose to leave. It appears to be working.”
*******************
And their new slogan will be “I’m with her”.
Those children do not appear to be related to that lady.
Maybe Shatz should ask if the famous photo of big momma dragging the 2 kids out of the riverbed thru the tear gas might be staged. I find it funny they ran through the sewage muck just feet behind them and the childrens feet are so squeaky clean with not a dab of mud on them. Maybe they levitated or maybe the photo is so staged it’s funny.
ANOTHER Q DROP!
And their new slogan will be Im with her.
*************
or “I’m with stupid!”
Was Trump prophetic or what, when he said Mexico would be paying for the wall. What’s happening at the border might actually motivate them to do it!
Since Russias cyber-attacks on the former Soviet state of Estonia in 2007, government analysts and security researchers have kept watch on Russian cyber-operations. In 2013, security firm Kaspersky Lab detailed a five-year operation, attributed to Russia and known as Red October. In 2014, three other major operations came to lightUroburos, Energetic Bear and APT28
For each espionage operation, Recorded Future collected the names by which the campaigns were identified, the names of the tools used in each attack and how the attacks were delivered.
Even a simple issue such as the name of an operation is made more complex because security firms typically label each operation differently. For example, Energetic Bear, a named coined by security services firm Crowdstrike, is known as Crouching Yeti by Kaspersky, Koala Team by iSight Partners, and Dragonfly by Symantec. The sheer variety of names used for each operation has complicated analyses, Ahlberg said.
http://www.eweek.com/security/cyber-threats-ascribed-to-russia-crafted-to-hunt-specific-data
Border Security = National Security.
FY 2019 Defense Spending Bill
https://dod.defense.gov/News/SpecialReports/Budget2019.aspx
📁
>>Budget Overview
Budget Reconciliation
https://www.countable.us/bills/hr7073-115
📁
What if the House fails prior to majority change?
What vested auth does the Constitution grant a sitting President re: matters of NAT SEC?
Thank you, Mr. Soros.
Q
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.