It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: RelSciHistItSufi
a reply to: crankyoldman
Also, regarding times of the posts, I'm wondering if the hours and minutes (12:34) could reflect bible verses?
The problem with this theory is that time zones affect the numbers - Qanonmap.github.io and Qanonposts.com seem to be in different time zones and therefore show different times for the same post?
originally posted by: IAMTAT
Re: BOOM BOOM BOOM BOOM
Good theory...makes sense:
www.youtube.com...
Per tradition a baby smiling gets 30% negative/abusive comments...
originally posted by: DiplorableMe
a reply to: RelSciHistItSufi
Keystone could be a reference to the pipeline.
My family is a direct testament to how Rotary builds bridges of international exchange and understanding. Today technology is multiplying those bridges exponentially, across every country, region, continent, and ocean.
It is theoretically possible to connect every human being on the planet to one other and to vast stores of knowledge and sources of assistance.
All it takes is seven billion smartphones, a relatively small order in a multitrillion-dollar world economy. Connections are wonderful in many ways. According to Steve Jobs, "Creativity is just connecting things." The great novelist E.M. Forster wrote, "Only connect." I have argued that in a networked world, connectedness is a measure of power.
"Power over" assumes that the power-wielder is at the top of a ladder and exercises power over those below. "Power with" assumes that the power-wielder is at the center of a web of relationships and can mobilize all her direct and indirect connections to solve a problem with the combined resources, energy, and talent across the web. More traditionally, "connections" have long been presumed to be the preserve of the powerful — connections to get a job, an audition, an interview, an opportunity.
Less conspiratorially, think about how Rotary clubs empower their members by bringing diverse individuals from across a community together.
originally posted by: RelSciHistItSufi
a reply to: DiplorableMe
Thanks, I'd forgotten about the pipeline.
As an aside... and this is tenuous... a search of keystone images comes up with a large amount shaped like this:
To me this shape of keystone looks like an owl!
originally posted by: burntheships
Has this been mentioned?
In times past, a mirror was referred to as a looking glass.
If we are talking looking glass, this could likely be
pointing to project looking glass.
Project Looking Glass
Anyone?
Herein is the lecture by D.C.Hammond, originally entitled "Hypnosis in MPD: Ritual Abuse," but now usually known as the "Greenbaum Speech," delivered at the Fourth Annual Eastern Regional Conference on Abuse and Multiple Personality, Thursday June 25, 1992, at the Radisson Plaza Hotel, Mark Center, Alexandria, Virginia.
Sponsored by the Center for Abuse Recovery & Empowerment, The Psychiatric Institute of Washington, D.C. Both a tape and a transcript were at one time available from Audio Transcripts of Alexandria, Virginia (800-338-2111). Tapes and transcripts of other sessions from the conference are still being sold but -- understandably -- not this one. The transcript below was made from a privately made tape of the original lecture.
The single most remarkable thing about this speech is how little one has heard of it in the two years since its original delivery. It is recommended that one reads far enough at least until one finds why it’s called "the Greenbaum speech."
originally posted by: MindBodySpiritComplex
a reply to: tiredoflooking
That and
China Finally Admits It Has Army of Hackers
CHINESE CYBER UNIT 61398
In 2013, American private security firm Mandiant published a 60-page report that detailed about the notorious Chinese hacking group 'Unit 61398', suspected of waging cyber warfare against American companies, organizations and government agencies from or near a 12-story building on the outskirts of Shanghai.
This Building Is Home to the Chinese Army Unit Hacking the US