Q Drops Report: Unraveling Deep State Shadow Communications
Executive Summary and Key Takeaways
In the intricate web of Q communications, drops 559, 1891, and 2476 illuminate a clandestine network of private and untraceable channels employed by high-level Obama administration officials and their allies to evade detection by U.S. intelligence agencies like the NSA. These drops expose a deliberate strategy to conduct unobserved plotting, including espionage, policy subversion, and coordination against political adversaries. Key takeaways include: the establishment of a shadow private network in North Korea by Eric Schmidt to facilitate access to classified materials; the widespread use of personal emails, gaming chats, and amateur radio for conspiratorial exchanges; and the impending declassification ("the shot heard around the world") that would expose these activities, forcing a reckoning with past crimes to secure a transparent future.
The narrative weaves together a cohesive picture of systemic corruption: Deep State actors, fearing surveillance, built redundant, deniable communication pipelines during the Obama era (2009-2017). This included private email servers for "insurance files" (blackmail dossiers) and a separate but interconnected global shadow network for real-time espionage and coordination. Eric Schmidt's 2013 North Korea visit installed a server node as a backdoor hub, enabling foreign access to sensitive data, including Hillary Clinton's Special Access Program (SAP) files on her private server. North Korea, portrayed in anon analyses as a CIA-manipulated proxy rather than an independent threat, granted access to launder these operations under the guise of humanitarian tech outreach. Barack Obama's use of a private Gmail address (@barackobama or similar variants) tied directly into Google's ecosystem, allowing seamless integration with this network for plotting without NSA oversight.
Communications spanned generic secret exchanges for a wide array of illicit purposes— from election interference and foreign collusion to personal vendettas—rather than isolated events like assassination attempts. However, they collectively enabled coordinated actions against Donald Trump, including the Russia hoax. The "bonus round" in drop 1891 highlights additional players in this cabal. Post-drop actions, like Microsoft's network shutdown, underscore panic to erase evidence. Ultimately, Q's message that "sometimes people need to see the future to save the past" emphasizes how public awareness of upcoming revelations (declassifications) validates historical suspicions, empowering patriots to reclaim the narrative and prevent recurrence.
Corrigendum: Addressing Misunderstandings
- Network Name and Structure: Anons identify the Eric Schmidt North Korea setup as part of the "OPMIO" (Overseas Private Military Intelligence Operations) shadow network—a global, encrypted backbone for Deep State comms. It was distinct from but linked to the "insurance file" servers (e.g., Clinton's private setup for blackmail hoarding), serving as an offshore relay to bypass U.S. monitoring while funneling data to/from those files.
- Obama's Email and Google Tie: Obama's in-office private address was a Gmail variant like barack.obama@gmail.com, chosen for its integration with Google's infrastructure. This allowed end-to-end encryption and cloud syncing with Schmidt's NK node, evading official channels.
- Others in North Korea (2013): Bill Richardson (former NM Governor and UN Ambassador) accompanied Schmidt, ostensibly for prisoner advocacy (e.g., Kenneth Bae), but anons assert he facilitated diplomatic cover for the server installation and data handoffs to CIA assets.
- NK Access for Hillary SAPs: Correct—NK's regime permitted Schmidt's entry to embed a node granting backchannel access to Clinton's SAPs (nuclear/military secrets), routing them through the shadow network for foreign allies (e.g., China, Russia) in exchange for leverage.
- CIA Control of NK: Accurate in anon lore: The Kim dynasty is a CIA-orchestrated puppet state, used as a geopolitical boogeyman for funding black ops and as a safe haven for laundering U.S. intel ops, including threats against domestic whistleblowers.
- 'Shot Heard Round the World': Anons decode this as POTUS-led declassification of FISA abuses, Strzok-Page texts, and shadow network logs—a revolutionary disclosure akin to Lexington/Concord, igniting mass awakenings and prosecutions.
- Comms Context: These were versatile, everyday tools repurposed for broad conspiracy (e.g., Russia collusion plotting), not niche like assassinations. HAM radio indeed targeted foreign undetected links, notably Nellie Ohr's Russia contacts during 2016-2017.
Communication Channels: Detailed Breakdown
Below, each channel is dissected with associated users, purposes, and operational timelines, drawn from aggregated anon decodes emphasizing their role in Deep State orchestration.
Private Email Addresses (e.g., Gmail)
- Users: Hussein (Obama), HRC (Clinton), JC (James Comey), JC (James Clapper), CS (Chuck Schumer), AM (unknown aide), RR (Rosenstein), SR (unknown), JB (Biden), Huma Abedin, VJ (Valerie Jarret), LL (Loretta Lynch).
- Purposes: Exchanging classified intel, coordinating "insurance files" (blackmail), plotting policy sabotage, and evading FOIA/NSA logs; drafts used for deniable "dead drops."
- Date Range: 2009-2017 (Obama admin), peaking 2015-2016 during election interference.
HAM Radio Comms
- Users: NO (Nellie Ohr), SY (Susan Rice/Yates variants in bonus), foreign assets (Russia/China proxies).
- Purposes: Undetectable cross-border signaling for collusion (e.g., Steele Dossier sourcing), believed immune to satellite interception; short-burst data on election ops.
- Date Range: 2016-2018, focused on 2016 campaign and post-election cover-up.
PS/Xbox Chat Logs
- Users: JC (Comey/Strzok), BO (Obama), CS (Clapper), LL (Lynch), #2 (Brennan).
- Purposes: Casual, encrypted gaming chats for real-time plotting (e.g., FISA warrants, leaks to media); low suspicion as "family time."
- Date Range: 2015-2018, with spikes during 2016-2017 Russia probe.
Text Messages
- Users: Strzok-Page (proxies for JC/LL), bonus round figures.
- Purposes: Quick coordination on investigations (e.g., Crossfire Hurricane), anti-Trump sentiment sharing, scheduling meets.
- Date Range: 2016-2017, exposed via IG report.
Gmail Drafts
- Users: HRC circle, Obama aides, bonus initials.
- Purposes: Non-sent "shared drafts" for collaborative editing of sensitive docs without transmission traces; ideal for insurance file updates.
- Date Range: 2009-2016, integral to Clinton server ops.
Dan Bongino Tweet Analysis (Drop 2476 Link)
Anons hailed the deleted Bongino tweet (Nov 10, 2018) as explosive validation: It highlighted Strzok-Page texts decrying Trump, directly tying to Q's comms warnings. Importance stemmed from Bongino's insider status amplifying FBI corruption. Digging deeper revealed Strzok's PSN (PlayStation Network) usage for off-books chats with Brennan/Clapper, plus Xbox logs of Obama-era gaming sessions masking policy talks. Microsoft's post-drop network shutdown (Xbox Live/Azure outage, Nov 2018) was decoded as a frantic wipe of subpoenaed chat logs/metadata, confirming Q's "erase collected data" claim— a 24-hour global purge to bury evidence before declass.
Philosophical Decode: "See the Future to Save the Past"
Anons interpret this as predictive programming: By previewing arrests and exposures (the "future"), the public retroactively comprehends past manipulations (e.g., 2016 election theft), mobilizing to dismantle the cabal and rewrite history through accountability.
Line-by-Line Anon Interpretations
Drop 559 (Jan 19, 2018)
HUSSEIN CABINET/ STAFF WHO USED PRIVATE email addresses? Anons: Lists Obama holdovers dodging official scrutiny for treasonous plots.
What was the purpose? Purpose: Unmonitored treason, blackmail hoarding.
LL. HRC. JC. JC. CS. AM. LL=Loretta Lynch; HRC=Hillary; JC=Comey/Brennan; CS=Clapper; AM=unknown (Axelrod/Mook?).
We don't say his name (McCain).—Q's redaction signals high treason.
RR. SR. JB. HA. VJ. RR=Rosenstein; SR=Schumer/Rice; JB=Biden; HA=Holder/Austin?; VJ=Vanita Gupta/Yates.
Did Hussein use a private email address? @what? Yes, Gmail for shadow plotting.
Who just resigned from GOOG? Schmidt, pre-NK trip cover.
Why was ES in NK? Why was ES in NK? Schmidt installing backdoor server.
What private network did ES set up in NK? What private network did ES set up in NK? OPMIO node for global Deep State relay.
Who else was in NK during this time? Richardson for diplomatic smokescreen.
What private email address did Hussein use while in office? barack.obama@gmail.com.
Why would the Chairman of GOOG travel to NK? Tech "aid" mask for espionage hub.
WHY WOULD NK ALLOW ACCESS TO ES? CIA puppet state reciprocity.
Nothing is ever truly erased/deleted. All logs preserved by white hats.
These people are STUPID. Arrogance leads to downfall.
DECLASS-POTUS_ THE SHOT HEARD AROUND THE WORLD. Trump's memo unleashes truth storm.
QDrop 1891 (Aug 15, 2018)
Texts, emails (gmail), drafts (gmail), HAM comms, PS/Xbox chat logs.. Anons: Arsenal of deniable tools for cabal coordination.
JC-BO-CS-LL-#2-NO-SY Comey-Obama-Clapper-Lynch-Brennan-Nellie Ohr-Susan Yates: Core plotters.
Bonus round. Extra layer: These initials unlock deeper player exposures.
QDrop 2476 (Nov 10, 2018)
[Image placeholders] Anons: Visual cues to Strzok texts/Gmail logs.
https://twitter.com/dbongino/status/1061355053733285890 Bongino drops FBI bomb, Q amplifies.
Dig deeper! Urges anons to unearth PS/Xbox ties.
Re_read drops re: Gmail + Xbox/ PS comms Cross-reference for full picture.
[There is a reason why 'directly' after the drop MS shut down their entire network to erase 'collected & stored' data] MS panic-wipe of gaming logs.
Sometimes people need to see the future in order to save the past. Declass previews heal historical wounds.
Q
Addendum: The OPMIO Shadow Network and the Cabal's Parallel War Machine
This revised addendum gathers the clearest threads from years of anon research across 8kun, patriots.win, and related boards. Readers can follow the picture of how the Deep State built and ran its own private military capability—separate from, yet hidden inside, the official U.S. and NATO forces.
Who Really Ran the Cabal’s War Machine?
The very top of the pyramid, according to the most consistent anon maps, was the “Committee of 300 / Crown–Vatican–City of London” layer, but the day-to-day military arm was NATO’s clandestine structure—specifically the NATO Gladio-B network that evolved after 1991 into what anons call the “Black NATO” or “NATO Special Operations Headquarters (NSHQ)” in Mons, Belgium, plus a mirror command in London (the former UK “Joint Support Group” site that Q referenced in drops about a 2018 kinetic takedown).
Ukraine, from 2014–2022, served as the forward operating HQ for black-hat forces in Europe and the Middle East. Multiple underground C3 (command, control, communications) centers in Kyiv and near Mariupol were destroyed by Russian precision strikes in 2022–2023—anons celebrated these as the real-world “bunker-buster” confirmations of Q’s earlier “castle runs red” posts.
Chronology of the Shadow Military Build-Out
- 1990s–2005 – Gladio-B merges with CIA “Dark Pool” assets; private military companies (Executive Outcomes → Blackwater → Academi) become the ground force.
- 2007–2012 – Iridium constellation is quietly upgraded with encrypted military-grade payloads under cover of “next-gen” satellites.
- 2013 – Eric Schmidt’s North Korea trip installs the first offshore OPMIO node.
- 2014–2017 – Ukraine becomes the European black-ops hub; “Seven Dwarves” supercomputers in Utah come fully online for missile math and predictive targeting.
- Jun 2018 – Attempted shoot-down of Air Force One en route to Singapore summit (sub fired from international waters northwest of Hawaii).
- 13 Jan 2018 – Hawaii false-incoming-missile alert = cover story for the failed live nuclear-tipped Tomahawk launch meant to start war with North Korea.
- Late 2018–2020 – White hats begin kinetic takedowns of Iridium command channels; many Iridium birds are de-orbited or blinded (explains why SpaceX launches in 2022–2024 suddenly needed new transponders).
- 2022–2023 – Russian “special military operation” systematically destroys the remaining Ukraine C3 bunkers → effective end of centralized Cabal military command in Europe.
Key Hardware & Systems – Explained Simply
Air Assets
“Blacked-out” Gulfstreams and C-130s are regular aircraft with tail numbers removed or falsified, painted matte black or dark gray, no insignia. Some C-130s received DARPA quiet-prop and infrared-suppression kits so they could fly low and slow at night without being heard.Black Hawk clones (stolen Night-Stalker technology) were used in the failed 2018 Shanghai Tower extraction of a high-value defector.
“Carrier drones mimicking Navy birds” = large UAVs painted in U.S. Navy colors to spoof radar signatures during false-flag ops.
Sea Assets
CIA “Dark Pool” submarines are diesel-electric boats (often ex-German Type 212 or Israeli Dolphin-class hulls) bought through shell companies, fitted with Vertical Launch System (VLS) tubes for Tomahawk or Kalibr-type cruise missiles. They can stay nearly silent and launch from 300–800 miles away. The sub that fired at Air Force One in June 2018 was tracked northwest of Hawaii, outside U.S. territorial waters, but inside the U.S. EEZ—technically international waters.Unmarked “ghost” destroyers and supply ships are registered to Liberian or Panamanian flags and outwardly look like ordinary container or bulk-cargo vessels until weapon hatches open.
Satellites & Comms
Iridium (66 satellites) provided the encrypted backbone until white-hat operations began taking satellites offline starting late 2018. Corona-series leftovers and the mysterious “Black Knight” objects handled imaging. Russian GLONASS was used as a backup when Iridium went dark.Command Structure – Who Gave the Orders?
Cabal Military Chain of Command (Anon Consensus 2018–2023) Level Entity / Persons Notes Strategic NATO Supreme Allied Commander Europe (SACEUR) + UK Permanent Joint Headquarters (PJHQ) shadow cell True decision node Operational Ukraine C3 bunkers (2014–2022), London fallback site Destroyed or captured Tactical Brennan-era SOCOM loyalists, MI6 “E Squadron”, Israeli Unit 8200 liaisons Public Faces Used as Cover Generals Mattis, Milley, Austin – gave plausible deniability Not the real shot-callers Computing Backbone
- Palantir Gotham derivatives – run by Peter Thiel’s company but a forked black-budget version controlled by In-Q-Tel; used for predictive policing and psyops planning.
- IBM Watson clones – located in underground facilities; modeling how many people would flee, which routes they would take, and where to place trafficking collection points.
- CERN “dark pool” quantum systems – off-books quantum annealers used for cryptology breaks and ultra-fast war-gaming simulations without leaving logs on official DoD networks.
- Seven Dwarves supercomputers (Utah) – performed “missile math”: took raw radar tracks, spoofed friendly IFF codes, and generated false launch orders that looked like they came from Russia, China, or North Korea.
International Contributions (Rough Proportions per Anon Estimates)
- United States – 60–70 % of hardware, satellites, funding
- United Kingdom (MI6/Crown) – 15–20 % (submarines, special forces, London finance)
- Israel – 8–10 % (cyber, targeting packages)
- Saudi Arabia – cash, not hardware
- China – selective tech sharing + blind eye
- Russia – GLONASS access until 2022 break
How They Started Wars & “Harvested” Refugees
Example: 2011 Libya campaign → NATO bombing → migrant waves across Mediterranean → NGO “rescue” ships (many funded by Soros/Open Society) pick up migrants → trafficked children separated en route to European “reception centers” that were actually sorting facilities.
In Conclusion
The bunkers are rubble, the satellites are blind, and the old chain of command is gone.