Posted on 03/07/2019 1:57:48 PM PST by ransomnote
“Trust The Plan” YouTube Where We Go 1 We Go All Qanon is 100% coming from the Trump Administration. - 6 min YouTube President Trump This Video Will Get Donald Trump Elected (The Plan) - 6 min Table tang-soo et. al. Q Boot Camp Quickest way to learn the basics about Q. YouTube Storm Is Upon Us Q - We Are The Plan - 6 min YouTube Dan Duval Discovering the Truth With Dan Duval-Part 3 -Excellent orientation to Q by Praying Medic YouTube Joe Masepoes Q - The Plan To Save The World - 13 min - popular introduction Also, Stormisuponus on Bitchute Threadreader Jason Wright Q Anon Is Real - Oct, Nov 2017 Q drops + commentary Paul Serran What is Q? - 31 point introduction Medium Martin Geddes WWG1WGA: The greatest communications event in history - 4 min - quick overview Pay Attention Thread Qmap.pub Q drops - created by Q, searchable by date or drop number, many additional features Thread Qanon.app Q drops - copied from Qs 8chan board Website We-go-all.net Q drops and research - includes extensive resources and links Website Qntmpkts.keybase.pub Q drops - copied from Qs 8chan board The Truth Is Spreading Thread Anonymous QProofs - compiled proofs that Q has trusted insider access to President Trump Thread Qmap.pub QProofs/Memes - compiled proofs and memes The Oracle Bagster The Oracle - warm and witty summaries of each day's thread Lexicon Swordmaker LexiQon - immense list of expanded acronyms and terms used by Q; invaluable reference Website Whitehouse Whitehouse.gov - President Trump's Executive Orders, Proclamations, Nominations, WH press briefings and news Website FBI vault.fbi.gov - new FOIA Library, containing 6,700 documents and other media Website State Dept. foia.state.gov - Virtual Reading Room Documents Search Table FReeQs Q Threads - Our prior Q threads on Free Republic Power to the People Sara Carter Fox News National Security/War Correspondent sometimes cited by Q John Solomon Award winning investigative journalist sometimes cited by Q Praying Medic Q-drop reactions. Also, YouTube, Vimeo, Podbean.com and ITunes YouTube Dustin Nemos Series of videos identifying Q content - Well reasoned; excellent. Also, @NemoV on GAB.AI Website Saul Montes-Bradley Non Q Commentary also hosting Rex, Brian Cates and Thomas Wictor YouTube X22 Report Investigative Q-drop reactions YouTube In Pursuit of Truth Brisk, lively drop analysis. Also on Gab.Ai Lisa Mei Crowley Includes Q-drop reactions. Also, @lisamei62 on GAB.AI Silent Majority No More Website White House Email the White House with your support and suggestions Website Congress Email Congress with your support and suggestions Thread Little Jeremiah Memes Thread Jim Robinson Board Owner's Rules for Posts on Free Republic Fight, Fight, Fight! YouTube President Reagan A Time for Choosing - 3 min - 1964 speech set to Matthew Worths images
Q drop #2999
Qv!!mG7VJxZNCI 7 Mar 2019 - 10:07:53 PM
https://twitter.com/SenBlumenthal/status/1103710332994887682
Glimpse of something much bigger to come?
Actions have consequences.
Remember, it goes both ways.
Nobody is safe.
Leak was plugged.
Q
:-D
This is the past bread q responding too in drop 2998
Tried to edit for bad language
+++++++++++++
Anons say he found the ‘keystone’
Keking out right now. Pretty sure I found something. Rip me apart if Im wrong though. So many shills on here. Youre missing crumbs. Look here, not [here]. Responding to post 2996 Q says, how is that possible for a supposed non_gov entity?
How is it possible that FB tracks data even when the app is deleted? In post 2993 (3/7/109) Q is calling out @Snowden. So I used the filter to find posts relating to WikiLeaks. Qs post from July 31, 2018 is a screenshot of the Wikileaks Vault 7 released MARCH 7. Sounds confusing just trying to show you my thought process, stay with me, it makes sense.
Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified. FROM VAULT 7
Links below that direct you to user forums on how to not leave a digital fingerprint that can be associated with the CIA, and how to construct an imitation fingerprint. Using Facebook as their fingerprint they are able to install malware on peoples phones, tablets, and computers which relay all data back to a central server using HIVE.
I suggest all anons who have given up life to research this shit like me should read this document to completion.
I noticed the enormous amount of comparisons between packets of data and bombs, dunno why probably just autistic. I looked back in the Qmap and on March 5, 2019 an anon posted how London Police called them bombs not suspicious packages Q responds in 2974 with Fire.
I went into Vault 7 Projects, search for fire .
Angelfire is an implant comprised of five components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system
F***ING KEYSTONE KEK
Keystone is part of the Wolfcreek implant and responsible for starting malicious user applications. Loaded implants never touch the file system, so there is very little forensic evidence that the process was ever ran. This makes post Q 381 much easier to understand
We Wont telegraph our moves to the ENEMY.
We will however light a FIRE to flush them out.
Q
Q is saying that they are using the Anglefire to predict the Deep States moves without being detected. In the user files it says a key must be used to open magicwand (keystone). In Q post 270 he says that ADM R/NSA (W&W) + POTUS/USMIL = Apply the Keystone. Paint the Picture. In post 167 Q says POTUS opened the door of all doors. Expand your thinking. What is the keystone? Now this could be confirmation bias but based off of what we just read we can now infer that Q was saying trump gave Admiral Rogers permission to use Keystone and Activate malware in order to collect data on DS. Furthermore who uses a magicwand? A wizard. (W&W)
So we can commence to exploring?
How is it possible that FB tracks data even when the app is deleted? In post 2993 (3/7/109) Q is calling out @Snowden. So I used the filter to find posts relating to WikiLeaks. Qs post from July 31, 2018 is a screenshot of the Wikileaks Vault 7 released MARCH 7. Sounds confusing just trying to show you my thought process, stay with me, it makes sense.
Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified. FROM VAULT 7
Links below that direct you to user forums on how to not leave a digital fingerprint that can be associated with the CIA, and how to construct an imitation fingerprint. Using Facebook as their fingerprint they are able to install malware on peoples phones, tablets, and computers which relay all data back to a central server using HIVE.
I suggest all anons who have given up life to research this stuff like me should read this document to completion.
I noticed the enormous amount of comparisons between packets of data and bombs, dunno why probably just autistic. I looked back in the Qmap and on March 5, 2019 an anon posted how London Police called them bombs not suspicious packages Q responds in 2974 with Fire.
I went into Vault 7 Projects, search for fire .
Angelfire is an implant comprised of five components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system
Freaking KEYSTONE KEK
Keystone is part of the Wolfcreek implant and responsible for starting malicious user applications. Loaded implants never touch the file system, so there is very little forensic evidence that the process was ever ran. This makes post Q 381 much easier to understand
We Wont telegraph our moves to the ENEMY.
We will however light a FIRE to flush them out.
Q
Q is saying that they are using the Anglefire to predict the Deep States moves without being detected. In the user files it says a key must be used to open magicwand (keystone). In Q post 270 he says that ADM R/NSA (W&W) + POTUS/USMIL = Apply the Keystone. Paint the Picture. In post 167 Q says POTUS opened the door of all doors. Expand your thinking. What is the keystone? Now this could be confirmation bias but based off of what we just read we can now infer that Q was saying trump gave Admiral Rogers permission to use Keystone and Activate malware in order to collect data on DS. Furthermore who uses a magicwand? A wizard. (W&W)
I tried to clean the langauge, but we are all adults. If I missed a word please just over look it.
LOL I posted same . We should have commed!
I'm not dumb either..
Want to understand....have many questions.
With just about everything...
Something real wrong is going on with our Gobment....
Thanks for helping...
I'm just confused with the Q stuff..
I'm an Okie....ex SoCal.
Leak was plugged.
But don't worry. Blumenthal DEMANDS ANSWERS.
Hahahaha.
New drop
3000
https://twitter.com/Davidwmiller91/status/1103826672762146817
Keep the calendar up-to-date, Patriot.
Check off and log.
Future proves past.
Q
Yep! That ‘s the picture!
Good job, defconw!
Lots of Q sent me comments on that thread!
Ah, thankQ!
I’d forgotten about that.
Great dig!
So...EWC..a collector of secrets...maybe Q Team too? "Esra Watkins Quohen?"
Thanks for the alert to new drop
Q drop #3000
Q !!mG7VJxZNCI 7 Mar 2019 - 10:14:19 PM
https://twitter.com/Davidwmiller91/status/1103826672762146817
Keep the calendar up-to-date, Patriot.
Check off and log.
Future proves past.
Q
I saw that today & thought ... DARK TO LIGHT!
GLORIOUS!
Now ... I forget his sentencing date - it’s in March.
That’s always been a major if not the event that needs to transpire here. My belief is that things are not all that they seem and the sting will then be revealed and that’s why it’s been continually postponed.
This change in twitter banner is another indicator that things are on the move!
DARK TO LIGHT!
WWG1WGA :)
I still don’t understand the lingo here....
I’m not dumb either..
Want to understand....have many questions.....
~ ~ ~ ~ ~ ~ ~
We all understand that one, OO!
for that purpose, Swordmaker led us in the creation of a LexiQon with many Q terms, abbreviations, and connections. It does not contain EVERYTHING, but it goes a way to help with orientation as you read!
http://www.freerepublic.com/~swordmaker/index
New drop 3001
https://www.scribd.com/document/401345263/Log-to-Ag-Barr-03-07-2019-Fisa#from_embed
House > Senate
Q
The post that Q said was “impressive”—
Keking out right now. Pretty sure I found something. Rip me apart if Im wrong though. So many shills on here. Youre missing crumbs. Look here, not [here]. Responding to post 2996 Q says, how is that possible for a supposed non_gov entity?
How is it possible that FB tracks data even when the app is deleted? In post 2993 (3/7/109) Q is calling out @Snowden. So I used the filter to find posts relating to WikiLeaks. Qs post from July 31, 2018 is a screenshot of the Wikileaks Vault 7
released MARCH 7. Sounds confusing just trying to show you my thought process, stay with me, it makes sense.
Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified. FROM VAULT 7
Links below that direct you to user forums on how to not leave a digital fingerprint that can be associated with the CIA, and how to construct an imitation fingerprint. Using Facebook as their fingerprint they are able to install malware on peoples phones, tablets, and computers which relay all data back to a central server using HIVE.
I suggest all anons who have given up life to research this shit like me should read this document to completion.
I noticed the enormous amount of comparisons between packets of data and bombs, dunno why probably just autistic. I looked back in the Qmap and on March 5, 2019 an anon posted how London Police called them bombs not suspicious packages Q responds in 2974 with Fire.
I went into Vault 7 Projects, search for fire
.
Angelfire is an implant comprised of five components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system
FUCKING KEYSTONE KEK
Keystone is part of the Wolfcreek implant and responsible for starting malicious user applications. Loaded implants never touch the file system, so there is very little forensic evidence that the process was ever ran. This makes post Q 381 much easier to understand
We Wont telegraph our moves to the ENEMY.
We will however light a FIRE to flush them out.
Q
Q is saying that they are using the Anglefire to predict the Deep States moves without being detected. In the user files it says a key must be used to open magicwand (keystone). In Q post 270 he says that ADM R/NSA (W&W) + POTUS/USMIL = Apply the Keystone. Paint the Picture. In post 167 Q says POTUS opened the door of all doors. Expand your thinking. What is the keystone? Now this could be confirmation bias but based off of what we just read we can now infer that Q was saying trump gave Admiral Rogers permission to use Keystone and Activate malware in order to collect data on DS. Furthermore who uses a magicwand? A wizard. (W&W)
still very interesting ... it was a different pen than the type we’ve seen before. I heard something BIG is about to DROP lol ;)
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.