Posted on 09/30/2025 9:00:00 PM PDT by ransomnote
Many come here to read dispatches from the War between Good and Evil, to red-pill and encourage.....and to pray and give thanks to the God who fights for us.
Q has reminded us repeatedly that together, we are strong. As the false "narrative" is destroyed and the divisive machinery put in place by the Deep State fails, the fact that patriotism has no skin color or political party is exposed for all to see.
3038 Mar 12, 2019 2:55:14 PM EDT
Q !!mG7VJxZNCI ID: 4fe510 No. 5643022>Decide for yourself (be free from outside opinion).
>Decide for yourself (be objective in your conclusions).
>Decide for yourself (be true in your own beliefs).
>Decide for yourself (be open to following the facts).
>Decide for yourself (be strong in defending your beliefs).
>Decide for yourself (be resistant to blindly accepting fact-less statements).
>Decide for yourself (be free)
Those who attack you.
Those who mock you.
Those who cull you.
Those who control you.
Those who label you.
Do they represent you?
Or, do they represent themselves (in some form)?
Mental Enslavement.
The Great Awakening ('Freedom of Thought’), was designed and created not only as a backchannel to the public (away from the longstanding ‘mind’ control of the corrupt & heavily biased media) to endure future events through transparency and regeneration of individual thought (breaking the chains of ‘group-think’), but, more importantly, aid in the construction of a vehicle (a ‘ship’) that provides the scattered (‘free thinkers’) with a ‘starter’ new social-networking platform which allows for freedom of thought, expression, and patriotism or national pride (the feeling of love, devotion and sense of attachment to a homeland and alliance with other citizens who share the same sentiment).
When ‘non-dogmatic’ information becomes FREE & TRANSPARENT it becomes a threat to those who attempt to control the narrative and/or the stable.
When you are awake, you stand on the outside of the stable (‘group-think’ collective), and have ‘free thought’.
"Free thought" is a philosophical viewpoint which holds that positions regarding truth should be formed on the basis of logic, reason, and empiricism, rather than authority, tradition, revelation, or dogma.
When you are awake, you are able to clearly see.
The choice is yours, and yours alone.
Trust and put faith in yourself.
You are not alone and you are not in the minority.
Difficult truths will soon see the light of day.
WWG1WGA!!!Q
In the battle between those who strip us our constitutional rights, we can't afford to let false divisions separate us any longer. We, and our country, will be forever made stronger by diligently seeking the truth, independence and freedom of thought.
Where We Go 1, We Go All
The interesting thing about that thread.. It’s fun to go back through it again every once in awhile.
Also, you can see the rebuilding of the VK/ZoT.. and the couple of people that were totally against it, and were trolling the VK thread, lol.
At least 1 is still here.
ransomnote: I provided GROK with a theoretical scenario and asked if Bondi/Kash acquired evidence that Hillary sold the intel or SAP access on her computer, what charges could result, and if the statute of limitations had run out. The following is an excerpt which portrays what people in government who engage selling information like that found on Hillary's server could expect as charges.### Greatest Risks Involved in Hillary Clinton's Email Server Mishandling
The greatest risks from the mishandling of TOP SECRET/Special Access Program (SAP) materials on Hillary Clinton's private email server centered on potential exposure of U.S. nuclear intelligence, foreign hacks compromising national security, details of weapons programs, and missile launch data, which could endanger U.S. assets, reveal sources/methods, and aid adversaries in evading defenses.
- **Nuclear Issues and Weapons Programs**: Emails contained TOP SECRET/SAP intelligence on North Korea's nuclear weapons program, including missile launches and tests, potentially revealing U.S. surveillance capabilities and enabling North Korea to advance its arsenal undetected.
- **Hacks and Compromises**: The unsecure server faced hacking attempts from China and Russia, with suspicious activity logs suggesting possible intrusions; Russian intelligence reports referenced in unexamined evidence discussed email deletions and potential exfiltration of classified data.
- **Missile Launches and Defenses**: Discussions included U.S. warnings to "ring China with missile defense" if it failed to curb North Korea's threats, as well as SAP details on drone weapons programs in Pakistan, risking exposure of operational tactics.
- **Foreign Nations Involved**: North Korea (nuclear/missile intel), China (hacks and missile defense threats), Russia (intel reports on deletions and hacks), Pakistan (drone operations).
- **Financial Transactions Involved**: Russian-language foreign intelligence reports on thumb drives (ignored by FBI) referenced Clinton Foundation probes, implying potential links to financial dealings but unconfirmed in declassified materials.
- **Foreign Contacts**: Hacks attributed to Chinese actors embedded in a U.S. company, and Russian intel discussing Clinton's staff and DNC emails; no direct contacts confirmed, but risks from exposure.
- **Inappropriate Domestic Contacts**: Unexamined thumb drives contained Obama emails and references to Attorney General Loretta Lynch contacts, dismissed by FBI despite draft memos recommending pursuit, raising concerns of improper coordination.### Normal Handling of Confidential Materials
Under U.S. law and protocols (e.g., Executive Order 13526), TOP SECRET/SAP materials like nuclear intelligence or drone programs must be handled in secure, compartmented environments to prevent unauthorized access or compromise.
- **Secure Systems**: Transmitted only via government-approved classified networks (e.g., SIPRNet, JWICS), not private servers or unencrypted email.
- **Access Controls**: Requires "need-to-know" clearances, special "read-in" for SAPs, and storage in Secure Compartmented Information Facilities (SCIFs).
- **Marking and Transmission**: Must be clearly marked as classified; no forwarding to unsecure systems, with mandatory reporting of spills.
- **Audits and Oversight**: Regular IAEA/Intelligence Community inspections; violations lead to administrative or criminal reviews under 18 U.S.C. § 793.### Criticisms from Senators Grassley, Johnson, Nunes, and Others on DOJ's Handling
Information derived solely from critics like Senators Chuck Grassley, Ron Johnson, Devin Nunes, and administration figures highlights perceived DOJ/FBI failures in the Clinton server probe, including ignored evidence and bias.
- **Senator Chuck Grassley**: In July 2025, Grassley released declassified DOJ IG annexes showing FBI "cut corners" and exhibited "extreme lack of effort" by failing to fully search thumb drives with exfiltrated SAP data, Obama emails, and Russian intel on deletions; criticized Comey's probe for dismissing leads on hacks and Clinton Foundation ties.
- **Senator Ron Johnson**: Co-led 2019 bipartisan probes with Grassley revealing State efforts to downplay classified emails and suspicious intrusions; in older statements (2016–2018), questioned FBI's no-charge decision and sought reviews of procedural frustrations in Clinton email scandal.
- **Devin Nunes**: In 2016, released FBI files showing State attempts to reverse classifications and unusual FOIA handling; accused Clinton of leaving classified info vulnerable (e.g., China hotel incident); launched 2017 probes into uranium deals tied to Clinton, criticizing FBI for soft-pedaling.
- **Others in Administration Critical of DOJ**: Rep. Eric Crawford (2025) joined Grassley in calling on FBI Director Kash Patel to review ignored thumb drives; DNI releases (2025) uncovered Obama-directed false narratives tied to Clinton emails.
Original Investigator Date Investigation Began Specific Aspects Investigated (Server/SAP/Emails) Current Administration Investigators (2025) Names and Positions I. Charles McCullough III (ICIG) January 2016 Emails with TOP SECRET/SAP info (e.g., drone programs, nuclear intel); requested DOJ inquiry into mishandling. Pam Bondi (Attorney General), Kash Patel (FBI Director) James Comey (FBI Director) July 2015 (formal probe) 110 classified emails, including 7 SAP chains on server; extreme carelessness but no charges. Pam Bondi (Attorney General), Kash Patel (FBI Director) Devin Nunes (House Intelligence Chairman) October 2016 FBI files on classification reversals, FOIA anomalies; uranium deals linked to Clinton server. Pam Bondi (Attorney General), Kash Patel (FBI Director) Michael Horowitz (DOJ IG) January 2017 FBI procedural errors in email probe, including SAP assessment; no systemic bias found. Pam Bondi (Attorney General), Kash Patel (FBI Director) Chuck Grassley & Ron Johnson (Senate Chairmen) August 2019 ICIG interviews on downplayed classifications, possible intrusions; 91 security violations. Pam Bondi (Attorney General), Kash Patel (FBI Director) ### Confirmation on Pam Bondi and Kash Patel's Active Investigation Role
Pam Bondi (Attorney General) and Kash Patel (FBI Director) are actively involved in ongoing investigations and declassifications related to Hillary Clinton's email server as of October 14, 2025, beyond holding nominal DOJ/FBI positions. Their roles include directing the release of previously classified documents exposing alleged FBI shortcomings in the original 2016 probe, responding to congressional requests for accountability on mishandling, and facilitating renewed scrutiny into potential security breaches. This is not routine administrative work but targeted actions tied to partisan oversight of Clinton-era issues. For instance:
- In July 2025, Bondi authorized DOJ declassifications of a Durham report annex and other documents transmitted to Senator Chuck Grassley, highlighting FBI failures to fully investigate thumb drives with exfiltrated classified data from Clinton's server.
- Patel, as FBI Director, collaborated on these releases and has been urged by Grassley to review unevaluated materials, including Russian intelligence reports on deletions, indicating active FBI oversight rather than passive leadership.
- No October 2025 updates shift this, but their July actions build on prior criticisms of "extreme lack of effort" in the Comey-era probe, showing sustained involvement.
ransomnote: Lesser charges related to Hillary's server require evidence that Hillary Clinton continued to sell such information after the date range involved, which I haven't seen asserted. Without follow up involvement on Hillary's part, then charges (e.g., 'gross negligence') would likely have expired.Espionage – Transmitting National Defense Information to Aid a Foreign Government (18 U.S.C. § 794(a)) (Theoretical Sale of Classified Information)
This felony, part of the Espionage Act, applies to intentionally transmitting or delivering national defense information (e.g., SAPs on nuclear or drone programs) to a foreign government or agent with intent or reason to believe it will harm the U.S. or aid the foreign entity, punishable by up to life in prison or death.
- Statute of Limitations: None for capital offenses (e.g., espionage during wartime or aiding a foreign government with grave harm potential). If non-capital, 10 years.
- SOL Status in 2025: Not expired if capital (e.g., aiding a hostile nation like North Korea or China with nuclear data). If non-capital, expired by 2023 for 2009–2013 acts.
- Potential for Prosecution: Yes, if new evidence shows Clinton sold SAP information (e.g., to China or Russia via server hacks or deliberate leaks). The FBI’s 2016 probe found no evidence of intentional transmission, but unexamined thumb drives (declassified 2025) reference Russian intel on deletions, which could theoretically support this if linked to sales. Requires proof of intent, which is absent in current records.
Nite, lj
If RICO is used as a vehicle, and if there were any more recent acts in furtherance of the activity (e.g. obstruction), wouldn’t that reset the clock?
Wonder if Congress’ recent subpoenas of various persons plays into this?
I think someone posted to the Q thread or the forum about a supermarket with a 'slow lane' checkout, where people wait patiently in line as each shopper gets a chance to laugh and smile and chat for that social contact. The photo I saw featured people standing in line at a discreet distance without looking frustrated as the prior customer talked to the clerk. Must be a necessary as food and water.
In the General/Chat forum, on a thread titled Q ~ Trust Trump's Plan ~ 10/01/2025 Vol.512, Q Day 2896, HombreSecreto wrote: If RICO is used as a vehicle, and if there were any more recent acts in furtherance of the activity (e.g. obstruction), wouldn’t that reset the clock?
Wonder if Congress’ recent subpoenas of various persons plays into this?
Good point! I forgot about that, even after Devin Nunes repeated the line 2 or 3 times, "There are no statutes of limitions on conspiracy."
I believe RICO is how they are working around expired statutes for the Epstein case - Kash said the statute of limitations expired so President Trump bravely brought new charges. And RICO is accurate - it was a tightly knit network.
Oh, now I like your suggestion even more (see quote below):
[10:28 min/sec into the video]
Nunes says that in addition to that, John Ratcliff talked about conspiracy. With conspiracy, there is no statute of limitations. He thinks people need to remember that all of these hoaxes that happened were done by the same people in many cases, and one led to the other.
I just wasn't tying it together. They keep saying the same 2 dozen or so people moved through the series of hoaxes aimed at destroying Trump. SO they are saying the fact that the cast of characters usually didn't change much demonstrates non-random behavior. It would be a conspiracy, otherwise the group membership would change for each hoax.
Sauce for my prior post to you: https://freerepublic.com/focus/f-chat/4344913/posts
Thanks MQD!
I’ll be honest...I am a Toyota fan. Before I bought my 2010, used of course, I owned a 1990 Camry which got stolen and damaged in 2012 so I bought the Corolla. I had the Camry for over 20 years and now the Corolla for 14 years.
Ideally I would like an older Toyota 4-runner or Rav4 but like me, people like to hold on to Toyotas.
Posting photos is a skill that I have not learned yet.
You are or You’re....just sayin’...
>>>>> President Trump POSTS on Truth Social. <<<<<
Time Magazine wrote a relatively good story about me, but the picture may be the Worst of All Time. They “disappeared” my hair, and then had something floating on top of my head that looked like a floating crown, but an extremely small one. Really weird! I never liked taking pictures from underneath angles, but this is a super bad picture, and deserves to be called out. What are they doing, and why?
https://truthsocial.com/@realDonaldTrump/115370899456605514
noit
From the info, capital offenses are “aiding a foreign government with grave harm potential”
If illary’s storing TS/SCI info on that unsecure server allowed access by a foreign government, it would cause “grave damage to national security”.
That’s what I remember the verbiage saying in the briefings for that TS/SCI level of clearance; release of info would cause “grave damage”.
Illary could be looking at a capital offense.
All your base are belong to us
Make your time
I remember that one.
With or without connections to Kenya I doubt they would take him. He is toxic wherever he goes. I sincerely hope he and the Clintons become unwelcome anywhere. I like to envision them on that cartoon island with one palm tree.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.