Interesting post number by Q, 1666
Everything has meaning
State department had their own comms layer as did the other participants in the conspiracy, ambassadors have special access and purposes. Creating a “feed” to them to take intel off the “grid” and using a coding system with pseudonyms and other language that would in many cases sail right by search engines or other “speed traps”
This takes me back to the core method, an algorithm that once understood discretely vectors information to an alternate target. Use of the alternate channel typically used by the State department and similar agencies in other countries flies under the radar. This is proved as even when HRC had her own server she was running the business on a private channel looped into the main feed when needed. This necessitated the “bleaching” and destruction of the device as all of the info on it I am willing to bet appears nowhere in standard government systems.
Now we get to the BIG picture, an International Conspiracy using the State Department layer globally for spying and coordination of activities. Cooperative “information sharing” (5 eyes) allowed for spying on a desired individual or group to be done by other countries subverting normal legal protections against it in the country of residence of the victim. Also used for coordination of story lines and other “activities” used other agencies to “take out the trash” and suppress alternate voices or singing birds
In short, a private channel used by DS globally and for the most part unseen to work their plans and co-ordinate across borders. But if you have the key, the algorithm and know a bit more you can sit on the wire and have copies of it all.
I am pretty sure JA helped in this, as well as others who paid with their lives