Advertisement
lotus777

Qanon Deep Dive Rabbit Hole Drop Report #8

Jul 1st, 2018
1,620
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.86 KB | None | 0 0
  1. https://steemit.com/qanon/@j1337/qanon-rabbit-hole-drop-deep-dark-dive-report-8
  2.  
  3. What is Sea Dragon?
  4. The PLA Navy’s commando team is the “Jiaolong,” which means “Sea Dragon.” Equipped with black uniforms, this unit’s first publicly known mission was to accompany three Chinese warships in protecting and escorting commercial ships against Somali pirates in December 2008, in cooperation with other nations as part of a UN mandate. Since then, the unit has participated in anti-piracy missions in the Gulf of Eden for over 300 days. Chinese hackers had compromised the computers of a Navy contractor and stolen 614 gigabytes of data. The stolen data pertained to the Navy’s Naval Undersea Warfare Center, which conducts research and development on submarine systems. The stolen data includes, “signals and sensor data, submarine radio room information relating to cryptographic systems, and the Navy submarine development unit’s electronic warfare library.” The missile is based upon “an existing weapon system” that it’s most likely supersonic.
  5.  
  6. What is the EMP Blackout?
  7. EMP Commission report said that the threat is real, jeopardizes “modern civilization,” and would set back living conditions to those last seen in the 1800s. Millions would likely die, according to the report titled “Assessing the Threat from Electromagnetic Pulse (EMP),” from the recently re-established Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack. A nationwide blackout of the electric power grid and grid-dependent critical infrastructures -- communications, transportation, sanitation, food and water supply -- could plausibly last a year or longer. Many of the systems designed to provide renewable, stand-alone power in case of an emergency, such as generators, uninterruptible power supplies, and renewable energy grid components, are also vulnerable to EMP attack. A long-term outage owing to EMP could disable most critical supply chains, leaving the U.S. population living in conditions similar to centuries past, prior to the advent of electric power. President Trump’s withdrawal from the bogus Iran nuclear deal, and his determination to denuclearize North Korea, are all the more important because even a single nuclear weapon possessed by these rogue states would pose an existential threat to North America by EMP attack.
  8.  
  9.  
  10. What is the 7th floor group?
  11. The 7th Floor Group was a group of US State Department officials who met regularly on the 7th floor of the Harry S. Truman Building in Washington, DC, that was exposed in Autumn 2016. The FBI referred to the group as a "shadow government" inside the State Department, which briefly attracted the attention of commercially-controlled media. The group appears to have formed around Hillary Clinton, although no direct evidence has yet emerged to tie her to the group. The group appears to have been disbanded by Donald Trump's administration. On 17 February 2017, CBS reported that "Much of seventh-floor staff, who work for the Deputy Secretary of State for Management and Resources and the Counselor offices, were told today that their services were no longer needed. The group was first exposed on 17 October 2016 by a reference in an FBI investigation report arising from the Hillary Clinton email controversy. Interest has been heightened by the fact that FBI documents refer to it as a "shadow government" inside the US State Department. By November 2016, another suspected reference to the group was in the public record, an email on Wikileaks by Roberta S. Jacobson to her "7th floor colleagues.
  12.  
  13. What is the Special Counsel?
  14. The United States Office of Special Counsel (OSC) is a permanent independent federal investigative and prosecutorial agency whose basic legislative authority comes from four federal statutes: the Civil Service Reform Act, the Whistleblower Protection Act, the Hatch Act, and the Uniformed Services Employment and Reemployment Rights Act (USERRA). OSC's primary mission is the safeguarding of the merit system in federal employment by protecting employees and applicants from prohibited personnel practices (PPPs), especially reprisal for "whistleblowing." The agency also operates a secure channel for federal whistleblower disclosures of violations of law, rule, or regulation; gross mismanagement; gross waste of funds; abuse of authority; and substantial and specific danger to public health and safety. In addition, OSC issues advice on the Hatch Act and enforces its restrictions on partisan political activity by government employees. Finally, OSC protects the civilian employment and reemployment rights of military service members under USERRA. OSC has around 120 staff, and the Special Counsel is an ex officio member of Council of Inspectors General on Integrity and Efficiency (CIGIE), an association of Inspectors General charged with the regulation of good governance within the federal government.
  15.  
  16. What is Prey?
  17. It is defined as an animal hunted or seized for food, especially by a carnivorous animal. It can mean a person or thing that is the victim of an enemy, a swindler, a disease. It can be also the action or habit of preying much like an animal.
  18.  
  19. What is Pray?
  20. It is an address a solemn request or expression of thanks to a deity or other object of worship. It is also used as a preface to polite requests or instructions.
  21. The most basic definition of prayer is “talking to God.” Prayer is not meditation or passive reflection; it is direct address to God. It is the communication of the human soul with the Lord who created the soul. Prayer is the primary way for the believer in Jesus Christ to communicate his emotions and desires with God and to fellowship with God.
  22.  
  23. What was the NXIVM Hack?
  24. The computer of the late Edgar M. Bronfman Sr., a billionaire businessman and former president of the World Jewish Congress, was allegedly hacked by officials with NXIVM, which has been described by one expert as an "exreme cult. Clare Bronfman, pictured here in 2011, has been accused by a former NXIVM associate of implanting a virus on her late father's computer. The virus, called a key-stroke logger, was allegedly used by NXIVM officials to secretly monitor the emails of Edgar Bronfman, Sr. Kristin Keeffe has made allegations that NXIVM officials engaged in computer hacking and plotted to have adversaries lured to Mexico and thrown in prison. Keeffe left NXIVM in February 2014 and was part of the inner circle of Keith Raniere, NXIVM's founder. Barbara J. Bouchey left NXIVM in 2009. She is fighting criminal charges alleging she and three other people gained unauthorized access to NXIVM's social website. Keeffe said In the three and a half years leading up to where I left, I was a spy. Keeffe claimed Clare Bronfman's initial attempt to hack into her father's email account failed after she sent him an email that had a digital photo of a bear attached and which contained a computer-hacking virus. The photo was meaningful because Clare Bronfman's father called her "Clare-bear" as a nickname, Keeffe said. The digital photo of the bear held a key-logger virus that would have infiltrated Edgar Bronfman's computer if he opened it, Keeffe added. Key-loggers are used to monitor the keystrokes of a computer, enabling someone other than the computer user to access personal account information, including passwords. He never opened the picture, Keeffe said in the telephone call with Bouchey. So she went down to his office and met with him, and specifically said, 'I want to show you this picture' and went on his email with him and downloaded the virus onto his computer herself.
  25.  
  26.  
  27. What is a Sniffer?
  28. A network sniffer is just as it sounds; a software tool that monitors, or sniffs out the data flowing over computer network links in real time. It can be a self-contained software program or a hardware device with the appropriate software or firmware. Network sniffers can take snapshot copies of the data without redirecting or altering it. Some sniffers work only with TCP/IP packets, but the more sophisticated tools can work with many other network protocols and at lower levels, including Ethernet frames.Years ago, sniffers were tools used exclusively by professional network engineers. Nowadays, however, with software applications available for free on the web, they are also popular with internet hackers and people just curious about networking.
  29. Network sniffers are sometimes referred to as network probes, wireless sniffers, Ethernet sniffers, packet sniffers, packet analyzers, or simply snoops.
  30.  
  31. What is the SITE intelligence group?
  32. SITE Intelligence Group is an American company that tracks online activity of white supremacist and jihadist organizations. It is based in Bethesda, Maryland. From 2002 to 2008, SITE Intelligence Group was known as the Search for International Terrorist Entities (SITE) Institute. SITE is led by the Israeli analyst Rita Katz. In order to view many of the contents of their website, a person, government or company must subscribe to SITE Intelligence Group. On September 2, 2014, SITE sent the video of Steven Sotloff's apparent beheading to its subscribers before the Islamic State of Iraq and the Levant released the video
  33.  
  34. What is DACA?
  35. Deferred Action for Childhood Arrivals (DACA) is an American immigration policy that allows some individuals who were brought to the United States illegally as children to receive a renewable two-year period of deferred action from deportation and become eligible for a work permit in the U.S. Unlike the proposed DREAM Act, DACA does not provide a path to citizenship for recipients. The policy was announced by President Barack Obama on June 15, 2012, and U.S. Citizenship and Immigration Services (USCIS) began accepting applications for the program on August 15, 2012. In November 2014, Obama announced his intention to expand DACA to cover additional undocumented immigrants. Although multiple states immediately sued to prevent the expansion, their attempt was ultimately blocked by the courts. The United States Department of Homeland Security rescinded the expansion on June 16, 2017, while continuing to review the existence of the DACA program as a whole. Plans to phase out DACA were initiated by the Trump Administration on September 5, 2017, allowing Congress six months to pass the Dream Act, which would provide the path to citizenship for Dreamers under DACA that Congress had originally intended. Research has shown that DACA increased the wages and labor force participation of DACA-eligible immigrants and reduced the number of unauthorized immigrant households living in poverty. Studies have also shown that DACA increased the mental health outcomes for DACA-eligible immigrants and their children. There are no known major adverse impacts from DACA on native-born workers' employment, and most economists say that DACA benefits the U.S. economy. To be eligible for the program, recipients cannot have felonies or serious misdemeanors on their records. There is no evidence that individuals covered by DACA are more likely to commit crimes than the general population of the United States.
  36.  
  37.  
  38. What is IRON EAGLE?
  39. An Iron Eagle is an American military officer who has attained the rank of Colonel but will not be promoted to the rank of General. The term refers to the rank insignia a colonel wears, which resembles an eagle. There are several reasons an officer may become an Iron Eagle. Administratively, certain occupational specialists are not structured to permit promotion to General without changing to a different career path. Other officers, for political or disciplinary reasons, shall never be promoted to General. Such officers sometimes retire, but others remain in the military for the full thirty years, until the service limitations of their current rank force their retirement.
  40.  
  41. What is a Ponzi Scheme?
  42. A Ponzi scheme is a fraudulent investing scam promising high rates of return with little risk to investors. The Ponzi scheme generates returns for older investors by acquiring new investors. This is similar to a pyramid scheme in that both are based on using new investors' funds to pay the earlier backers.
  43.  
  44. What is Mainstream Media?
  45. Mainstream media (MSM) is a term and abbreviation used to refer collectively to the various large mass news media that influence a large number of people, and both reflect and shape prevailing currents of thought. The term is used to contrast with alternative media which may contain content with more dissenting thought at variance with the prevailing views of mainstream sources. The term is often used for large news conglomerates, including newspapers and broadcast media, that underwent successive mergers in many countries. The concentration of media ownership has raised concerns of a homogenization of viewpoints presented to news consumers. Consequently, the term mainstream media has been widely used in conversation and the blogosphere, often in oppositional, pejorative, or dismissive senses, in discussion of the mass media and media bias.
  46.  
  47. What is Soros Bots?
  48. According to Jerome Corsi, of Infowars, it’s apparent that there are powerful endeavors via a Soros Coalition of bots which are running both retweets, upvotes, and outright propaganda pushing to try to demonize the Net Neutrality reversals that are planned when the FCC Commission meets on December 14th, which has already begun on social media. In fact, Infowars unraveled those plans this past summer and exposed them during the efforts at that time as well. Those bots flooded the FCC with complaints in massive numbers in an effort to transform the idea that the public doesn’t support the change in rules. That’s simply not true. People are fed up with the Leftist Tech and their nonstop shutting down of conservative and far right views. This is America, and we should be allowed free speech. While Net Neutrality doesn’t cover this, it’s definitely a blow to those companies who on one hand shut down the right and in the other hand beg that these rulings from Obama’s FCC Chair stay in place.
  49.  
  50. What is Chain of Command?
  51. The order in which authority and power in an organization is wielded and delegated from top management to every employee at every level of the organization. Instructions flow downward along the chain of command and accountability flows upward.
  52. According to its proponent Henri Fayol (1841-1925), the more clear cut the chain of command, the more effective the decision making process and greater the efficiency. Military forces are an example of straight chain of command that extends in unbroken line from the top brass to ranks. Also called line of command.
  53.  
  54. What is Xkeyscore?
  55. XKeyscore (XKS) is the search engine interface that interacts with all NSA federated databases for the collected Internet traffic, communicated data and phone metadata of private citizens. XKS is used to search the big data collection.
  56.  
  57. What is STATEROOM?
  58. STATEROOM is the code name of a highly secretive signals intelligence collection program involving the interception of international radio, telecommunications and internet traffic. It is operated out of the diplomatic missions of the signatories to the UKUSA Agreement and the members of the ECHELON network including Australia, New Zealand, United Kingdom, Canada and the United States. In almost a hundred U.S. embassies and consulates worldwide, Stateroom operations are conducted by the Special Collection Service (SCS), a unit that is jointly operated by the Central Intelligence Agency (CIA) and the National Security Agency (NSA). According to documents leaked by Edward Snowden, the true mission of Stateroom personnel is generally not revealed to the rest of the diplomatic staff at the facilities where they are assigned
  59.  
  60. What is Loop Capital?
  61. Loop Capital is a full-service investment bank, brokerage and advisory firm that provides creative capital solutions for corporate, governmental and institutional entities across the globe.
  62.  
  63. Why does Future Prove past?
  64. The flood is coming and it's heading towards you.
  65.  
  66. What is Epstien Island?
  67. Little Saint James is an island of the United States Virgin Islands, located off the east end of St. Thomas. The island is privately owned by American financier and convicted sex offender Jeffrey Epstein. Stories of Clinton's visiting the place a few times is noted.
  68.  
  69. What is Lucifers Temple?
  70. Under the vatican is a secret archive which is hidden for the most part Within one of the room's they have Lucifer painted on the wall.
  71.  
  72. What is a keystone?
  73. A keystone (also known as capstone) is the wedge-shaped stone piece at the apex of a masonry arch, or the generally round one at the apex of a vault. In both cases it is the final piece placed during construction and locks all the stones into position, allowing the arch or vault to bear weight.
  74.  
  75. Who are the puppet masters?
  76. The true powers guiding government we call them Puppet Masters but others use such terms as Wall Street, or President Eisenhower’s term The Military Industrial Complex or even The Secret Team help enable and thereby control top candidates from both the Republican and Democratic Parties. The hidden oligarchs are always in control of government no matter how an election turns out. The mainstream media are unwitting accomplices for the most part. They focus on manufactured events like the president’s annual speech, not on the goals of billionaires who are shaping both public policy and news coverage.
  77.  
  78. What is Sons of Liberty?
  79. The Sons of Liberty was an organization that was created in the Thirteen American Colonies. The secret society was formed to protect the rights of the colonists and to fight taxation by the British government. They played a major role in most colonies in battling the Stamp Act in 1765. The group officially disbanded after the Stamp Act was repealed. However, the name was applied to other local separatist groups during the years preceding the American Revolution. In the popular imagination, the Sons of Liberty was a formal underground organization with recognized members and leaders. More likely, the name was an underground term for any men resisting new Crown taxes and laws. The well-known label allowed organizers to make or create anonymous summons to a Liberty Tree, "Liberty Pole", or other public meeting-place. Furthermore, a unifying name helped to promote inter-Colonial efforts against Parliament and the Crown's actions. Their motto became "No taxation without representation.
  80.  
  81. What is 4am talking points?
  82. 4am is when the mockingbird sings and when media looks for breaking stories. A talking point in discourse is a succinct statement designed to support persuasively one side taken on an issue. Such statements can either be free standing or created as retorts to the opposition's talking points and are frequently used in public relations, particularly in areas heavy in debate such as politics and marketing. The framing of political discourse in terms of simple talking points has been criticized by media personalities such as comedian Jon Stewart for being a superficial examination of issues.
  83.  
  84. What is foxm1?
  85. FOXM1 is the NATO pilot call sign for a semi-active radar guided missile launch.
  86.  
  87. Is Q real?
  88. All we know is that there is this website showing what they call Proofs. Qproofs.com
  89.  
  90. Who rules the world?
  91. TPP, TTIP and TISA
  92.  
  93. Are you Spoofed?
  94. Wikileaks Vault 7 exposed the software that makes it possible to leave 'false fingerprints" implicating others for your own hacking.
  95.  
  96. What is breadcrums?
  97. A breadcrumb or breadcrumb trail is a graphical control element frequently used as a navigational aid in user interfaces and on web pages. It allows users to keep track and maintain awareness of their locations within programs, documents, or websites.
  98.  
  99. What is the Space Force?
  100. A space force is a military branch that conducts space warfare. Currently, one country has previously had an independent space force. The Russian Space Forces was an independent organization that existed from 1992 to 1997 and from 2001 to 2011; it was reestablished in 2015 as a branch of the Russian Aerospace Forces, similar to how Air Force Space Command is a component of the U.S. Air Force. A space force is almost always a part of the air force, which may function as an air and space force or as an aerospace force, as the United States Air Force does.
  101.  
  102. What is Convar?
  103. CVAR and ConVar are abbreviations for Console Variable. Depending on the context in which the term is found, it may also stand for Client Variable, or Configuration Variable. This is a type of variable used in many computer games and computer 3D simulation engines that can be manipulated by a text based command line interface within the game or engine, often called a console. They commonly hold configuration parameters, but can be used for anything that may potentially be accessed and/or modified by the console. The most common usage of CVARs is by server operators to customize their online game servers.
  104.  
  105. What is NLP?
  106. Neuro-linguistic programming (NLP) is an approach to communication, personal development, and psychotherapy created by Richard Bandler and John Grinder in California, United States in the 1970s. NLP's creators claim there is a connection between neurological processes (neuro-), language (linguistic) and behavioral patterns learned through experience (programming), and that these can be changed to achieve specific goals in life. Bandler and Grinder also claim that NLP methodology can "model" the skills of exceptional people, allowing anyone to acquire those skills. They claim as well that, often in a single session, NLP can treat problems such as phobias, depression, tic disorders, psychosomatic illnesses, near-sightedness, allergy, common cold, and learning disorders. NLP has since been discredited scientifically, but continues to be marketed by some hypnotherapists and by some companies that organize seminars and workshops on management training for businesses. There is no scientific evidence supporting the claims made by NLP advocates and it has been discredited as a pseudoscience by experts. Scientific reviews state that NLP is based on outdated metaphors of how the brain works that are inconsistent with current neurological theory and contain numerous factual errors. Reviews also found that all of the supportive research on NLP contained significant methodological flaws and that there were three times as many studies of a much higher quality that failed to reproduce the "extraordinary claims" made by Bandler, Grinder, and other NLP practitioners. Even so, NLP has been adopted by some hypnotherapists and also by companies that run seminars marketed as leadership training to businesses and government agencies.
  107.  
  108. What is Lucis Trust?
  109. The Lucis Trust is a nonprofit service organization incorporated in the United States in 1922 by Alice Bailey and her husband Foster Bailey, to act as a fiduciary trust for the publishing of twenty-four books of esoteric philosophy published under Alice Bailey's name, and to fund and administer activities concerned with the establishment of "right human relations". These include the Arcane School, a school for esoteric training, World Goodwill, Triangles, a lending library, The Beacon magazine, as well as the publishing company. The objectives of the Lucis Trust as stated in its charter are: "To encourage the study of comparative religion, philosophy, science and art; to encourage every line of thought tending to the broadening of human sympathies and interests, and the expansion of ethical religious and educational literature; to assist or to engage in activities for the relief of suffering and for human betterment; and, in general, to further worthy efforts for humanitarian and educational ends." The Lucis Trust's publishing company was founded in the early 1920s as the Lucifer Publishing Company. The Lucis Trust says that the name was probably chosen to honor Lucifer. The name was changed in 1925 to the Lucis Publishing Company. In Latin lucem ferre means "to bear light" and lucis means of light. The company has headquarters in New York City, London, and Geneva.
  110.  
  111.  
  112. Dev Note: Reserving only some TERMS to LIONCUBE for now on and removing some.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement