Please Don't Send Me Bomb-Making Instructions. QAnon is a Peaceful Movement.

File this post under Classes For Patriots: Plausibility 101.

First, the background.

Yesterday, I got into a great discussion with Gail Combs, which began by her pointing out the suicide of a Charlottesville “tiki torch” participant, Andrew Dotson.

I will just warn you that the link provided, which makes a good point about not letting the Alinsky left ISOLATE patriots (loosely defined), is on an arguably neo-Nazi site, the Daily Stormer, and the article is at least in part by a guy who is well-known as a rabid antisemite, and is either a real Nazi or a fake one used to gin up a casus belli for the left. Either way, I feel a bit unclean just letting the site be in my browser.

LINK: https://wqth.wordpress.com/2020/01/16/dear-kag-20200116-open-thread/comment-page-1/#comment-365865

I had a very complex response to this, over two posts, because one cannot talk about anything connected to Charlottesville without dragging in the subject of controlled opposition.

Link 1: Dupes and Suicide. https://wqth.wordpress.com/2020/01/16/dear-kag-20200116-open-thread/comment-page-1/#comment-365929

Link 2: Controlled Opposition and Set-Ups. https://wqth.wordpress.com/2020/01/16/dear-kag-20200116-open-thread/comment-page-1/#comment-365998

The bottom line here is that I was REMINDED by this discussion of some nasty incidents, where I – much like Mr. Dodson – was set up and used. While our circumstances were quite dissimilar in many ways, they were almost identical in the CALLOUS ABUSE of us as individuals in the name of some hidden, self-justified, communist “good” – an “end justifying all means” – a rationalization that allows communists to use people – both allies and enemies – up to and including the point of DEATH.

The biggest difference BEGAN where I refused to take the easy escape route of suicide, but instead bided my time – waiting patiently – LEARNING what I needed – to figure out what in the hell really happened.

Within the larger communist conspiracy in the United States, there thus existed a smaller yet still very large scandal, which I refer to as the Conspiracy to Advance Affirmative Action, or as I typically refer to it in my own shorthand, CA3. It is important to note that I entered this conspiracy as a willing, eager, helpful DUPE. We wanted affirmative action to SUCCEED. We wanted to make sure it did not fail. The problem was, I was also a scientist. I still had certain allegiances to TRUTH PER SE. Not as I wanted it, but as it WAS. So I could not help but note that – when affirmative action showed a HUGE, serious problem – there would need to be a fix. I even had an idea for the fix, based on my own experiences at a different university – where the FIX WORKED (not on Affirmative Action, but on a similar problem of under-prepared students suddenly facing a college environment).

Stupid, stupid me – believing that the EVIL LEFT actually cared about things that were merely their COVER ACTIONS for GAINING CONTROL, POWER AND MONEY.

Well, somebody above me in the conspiracy – the REAL conspiracy – decided that the simplest fix was to get rid of both me and the student who caused the problem. And they had an extremely ingenious way of doing it, too. It all depended on THEM having information which we at the time didn’t realize they had.

It took me quite a while to figure out how all of this worked. But as Q says, FUTURE PROVES PAST.

Much of what led me to understand the larger conspiracy is what happened AFTERWARDS, when people tried to CLEAN UP. I was very fortunate, in that I got a MASSIVE TIP on what was happening, in the form of a failed drugged/hypnotic induction and debriefing which I accidentally remembered, and kept secret. This allowed me to be a step ahead of the MANY people who tried to gather information on CA3 during the next two decades.

LINK: https://wqth.wordpress.com/2019/01/18/deja-woo/

AND THAT, dear friends, is how we are led to the TITLE of this post.

Please Don’t Send Me Bomb-Making Instructions. QAnon is a Peaceful Movement.

Allow me to explain.


In real life, I still have contact or potential contact with MANY of the people who were involved with CA3. That includes people who were involved in ALL phases – the original dupe conspiracy, the larger conspiracy, the “botched take-out”, the “cover-up”, the “information gathering” and the “attempted clean-up” phases. If anybody talks about “events”, they ONLY talk about the “socially acceptable” and publicly known cover aspects of the whole thing. It’s like an iceberg. Ninety percent of what was going on – much of which is covered by NDAs or known/presumed governmental secrecy – not to mention the 50% or greater aspects which are more or less CRIMINAL – dare not be spoken of.

It’s a complicated business. And most of it is UNDERGROUND – where everyone prefers it would STAY BURIED.

Anyway, I was very surprised, recently, to receive an email from one of the more inscrutable players in this drama. You are probably guessing from the title what that email might have contained.

This player is a bit of a geek, and in many ways reminds me of our good friend and fellow patriot cthulhu – somebody with a good education, many interests, vast knowledge, and a quirky sense of humor because of all of the preceding qualities.

The problem with THAT is that it is impossible to tell when this player is serious, joking, or even BEING SPOOFED.

At this point, a further digression is required.

I have received spoofed emails and text messages for YEARS. These are typically ALLEGEDLY from family members and friends. These are not just phishing from people pretending to be banks, credit card companies, and organizations. These are highly sophisticated attempts to manipulate me in one way or another – ways that require a “personal touch”.

I would also add into this, a very interesting pedo entrapment scheme, back during the Clinton years. So I’m familiar with a lot of different Deep State discreditation tricks that involve impersonation.

Sometimes – particularly in “borderline plausible” cases – I will validate (presumably) that this spoofed communication is in fact a spoof. In lawyer-like fashion, I rarely ask that question unless I already know the answer. And I may yet learn something new, even when I DO ask the known question with a known answer.

Sometimes I DON’T ask the question, even when I know the answer.

Are you following me? It’s a complicated business, if you want to stay ahead in the game.

Back to the story.

Imagine my surprise when this person sends me an email which appears (from the preview) to be a scholarly article about the synthesis of the jihadist-beloved explosive, TATP, which is either triacetone triperoxide, or tetraacetone tetraperoxide, depending upon one’s sources and nomenclature preferences. And I don’t really want to get into the science of this stuff, for reasons that will appear shortly. But the bottom line, is that I got an email about making TATP.

Yeah. This is well within the plausibility limits of the quirky sense of humor of this person. They send me all sorts of stuff, contradictory and counter-intuitive, contrarian to the max. Sending me a link RAILING about jihadists – and then sending me something like this – is COMPLETELY plausible.

And yet, something BUGGED ME about this email. And I mean REALLY bugged me.

Could it have been a spoof? Maybe. I wouldn’t really know unless I asked. Which meant, I would be asking a question I didn’t at least half-way know the answer to. And I don’t like to do that in dangerous cases. And CA3 is a VERY dangerous case.

I chose not to open the email, and not to call, but instead to wait for some kind of inspiration.

Gail’s comment gave it to me. But I needed to sleep on it.


Last night, I had a dream. It was a complex dream with many moving and changing parts – some familiar, others not. One part of the dream was very interesting. In the dream I traveled somewhere, possibly by plane, or possibly by car or truck. I was in a hotel room. I was sorting through the contents of my large backpack. It was a big pack, suitable for hiking, camping, or other kinds of adventurous outdoor sports (Hi, Gail!). I was concerned about what was in the backpack. As I sorted the contents out onto the bed in the room, one object came out that I had never actually seen in my life. It RESEMBLED an alleged alien folding display device from old, pre-Silicon-Valley UFOlogy. But closer inspection showed it was not that device. It was something else.

The object was about the size of a thick paperback book. It was something which had been folded up. It consisted of many rectangular panes of a kind of extremely hard plastic, all joined strongly together at the edges with something like a clear, resilient joint similar to tape. It unfolded into a much larger rectangle – a bit like a map.

I tried to understand WTF this thing was. And then it dawned on me.

It was a PORTABLE BLAST SHIELD of some kind. The kind that might be useful for working with explosives outside of a laboratory. Since I had no idea what it was, until I figured it out IN THE DREAM, it had obviously been PLANTED in my pack. And yet, I was now discredited by this thing, which may have even passed through TSA.

At that point, EVERYTHING connected, and I woke up. I understood that I, personally, was now PLAUSIBLY CONNECTED to terrorist explosives.


The other side – and that includes a significant part of the Deep State – is DESPERATE to label the QAnon movement as violent. We are already “discredited” by the Trump campaign itself. Let’s talk about ALINSKY ISOLATION right there.

Whether or not this person intentionally or merely incidentally sent this information about making TATP to me – whether it was well-intended or not – doesn’t really matter.

The fact is, this information is now sitting right there in GOOGLE MAIL. No matter what this person might say to me, there is now a COMPLEX POLYGON OF PLAUSIBILITY which links “manufacture of explosives” to ME, PERSONALLY – and in a way that allows GOOGLE – and we are talking CROWDSTRIKE GOOGLE – to control that information.

Were I to get on a plane – much worse to visit the person in question – and there was an incident of some kind involving TATP – TWO of the primary witnesses most useful to the WHITE HATS in the CA3 matter would be connected to the incident, or worse yet – GONE, GONE, GONE. But that’s not all. The entire Q movement would be immediately discredited as VIOLENT. The enemies of America would suddenly have LEVERAGE they did not have before.

So what is a poor Wolf to do?

Why, this post is what.

So here is the message:

I don’t care who you are – I don’t care what you want. I do not want you to either SEND ME or POST ON THIS SITE any kind of bomb-making information. It is important to protect the reputation of the QAnon movement as NON-VIOLENT.

We love our guns and Bibles, and some of us even love fireworks. Some of us who have actually lived through explosions – like our dogs – may have somewhat less love for fireworks, but we still love our Star Spangled Banner – maybe even more than most, because we understand the PRICE PAID in seared and torn-up flesh to hold up that beautiful Flag.

But we are NOT TERRORISTS, and we are NOT BOMBERS, and we are NOT VIOLENT. We do not want our beautiful movement to be TAINTED with this sort of stuff. So TAKE CARE what you SEND or POST, because WE CARE.

Are we good?

HELL YES, WE’RE GOOD. BECAUSE WE’RE THE GOOD GUYS. AND GIRLS.

W

/THE_END

Tracking Down Possible IC False Flag Recruitment on Gab

This is GOLDEN stuff.  I knew that we would find this someday.

But it’s SLICKER than it appears on the surface. You’re about to see how.

This happened within a short time after the Tree of Life Synagogue shooting.

Do the MATH. Whoops. I mean PSYCHOLOGY.

Before I even begin, let me say that I’m PINNING THIS ON an unknown intelligence agency.  You will see why.  I am NOT pinning this on the university that seems to have served as a conduit for the bad guys.  There may be players there, but I now realize that many – possibly ALL of the university people are CHUMPS in the scheme.

I know a little bit about that, actually.

Rob Monster started the investigation, but I really moved it along, and unearthed what appears to me to be a Russia-related intelligence link to recruitment of Gab proto-Nazis via a New York university psychology department (shades of Dr. Blasey-Ford).  Further research will likely bear this out.  Others with more talent than me are invited to pick up the trail.  I have not hit the mother lode, but I definitely struck pay dirt.

Start HERE, where Rob spotted what looked like FAKE NAZIS. 

Note that I have sworn repeatedly that I’ve encountered fake antisemites on Gab.  Real antisemites have certain tells that the fakes don’t have, and vice versa.  But the fakes work hard, and working together, gin up paltry bias into a small crowd, and thus a real foil for the leftists.

Remember what they did to Roy Moore. HOAXING is a leftist VIRTUE.

Well, the fake Nazis needed an identity, so I set out to find it.  I can’t be sure of who they really are, but I think I’ve got a very good idea now.  And it is NOT who I suspected at first – the CHUMPS.

https://gab.com/epik/posts/42595943

Repeating his words for clarity:

Call me crazy but I am a bit suspect of this brand new Gab account.
Of note, the phone number listed on their signup form apparently belongs to a SUNY faculty member specializing in Psychology:
https://www.geneseo.edu/~duffy/
Seems like yet another fake Liberal account to be used as a prop in some media hit job.  Hope an admin can check their IPs.

Rob Monster, on Gab, December 3, 2018

Here is an image of Rob’s post:

Here is a closer look at the sketchy Nazi page:

Several posters at Gab spotted minor tells that this wasn’t “real” Nazis or “alt-right”, backing up Rob’s evidence on the phone number.  Rob did not publish the name associated with the phone number, although you can see a last name in the URL of the place he found it.

I took up the phone number search myself, simply using the number (716)-245-5235 and various search engines.  As for the URL that Rob found:

Note that shortly AFTER Rob made his post, BOTH Gab accounts connected to the post (master and shill) were DELETED, and so was the university web page that Rob found, linked to the phone number.  It was very fast, which tells me it was very professional.

Here is a CACHED copy of the page from Google.

Further research by me showed that all information about Professor Duffy, an emeritus professor (VERY important – part of her ultimate exoneration), had been removed from the Department of Psychology website. 

This, despite the presence of information about OTHER emeritus professors STILL THERE.

This, despite the fact that Prof. Duffy seems to have been one of the Department’s MOST illustrious professors (see below).

These small but crucial facts are important when dealing with COVER-UP.  Leaving those LOGICAL but not EVIDENTIARY loose ends is typical.

But COVER-UP does not mean CRIME or GUILT in HALPER-WORLD.

Are you with me?  Cover-up is an INDUCED BEHAVIOR IN CHUMPS.

That is how WATERGATE worked. That is how MUH RUSSIA was supposed to work.

It’s PSYCHOLOGY. And it even works on PSYCHOLOGISTS.

This is the psychology of university cover-up – something I actually know something about.

It is likely that the department is embarrassed by this little kerfuffle, because other investigators and journalists began looking into it and calling (to say nothing of trolls, angry Gabbers, and who knows – maybe even real neo-Nazis).  Academics are VERY typical this way – they are petrified of scandal and conflict, and this behavior is indeed quite useful for goading them.  Such predictability is very useful to INTELLIGENCE AGENCIES. And, by extension, to the political entities controlling those agencies.

Communists in particular – who require nearly perfect cover – are quite aware of this embarrassment, and use it to advantage.  It is a way of making other people cover up FOR THEM – cutting off channels of investigation (ask Lisa Page and her co-conspirators about this – not that they will answer). 

So, we could be dealing with an INTELLIGENCE AGENCY or COMMUNISTS working THROUGH the Geneseo State University Psychology Department using instructors, adjuncts, students, visitors, and other sketchy players as bit-player operatives, and PHONE SHENANIGANS to redirect comms.  Also remember that intelligence agencies have access to phone data. Even calls to DEAD NUMBERS are theirs.

Are you with me? GOOD.

Dr. Blasey-Ford is an excellent example of an on-site player with IC connections and sketchy whereabouts, connected to a university psychology department.  Doesn’t mean the whole place is a nest of reds. But a university provides a great FRONT. Many open-area phones.

I’m presuming that both Professors Duffy and Kirsh (see below) were innocent victims here – they are likely USEFUL PAWNS in an intelligence patsy recruitment game.  They’re lefties, no doubt, but probably “fellow travelers”.  Not hoaxers or psycho-pushers.  Using sympathetic people as chumps is – if you think about it – very useful.  They tend not to inform, if they discover that they were used, and they will assist in a cover-up for multiple reasons. They “Stockholm in”, so to speak, if they become too aware.

How do you think I know this stuff?

That’s a Q question. Kinda like rhetorical, only with more awakening.

Now – it is VERY important that we distinguish between JOURNALISM and DOXXING.

I’m doing JOURNALISM. Maybe badly, but I’m trying.

I am presuming that there may be an explanation here, such as an intelligence agency which has followed Prof. Duffy and used her to attach their operatives.  You will see why shortly.

So WHO is this woman, Professor Duffy?  She is quite accomplished as an expert in COMMUNITY PSYCHOLOGY, and has authored a number of books, a large number of publications, and some definitive academic textbooks.  She traveled in EXTREMELY liberal circles and worked with left-leaning groups and people her whole life.  PERFECT COVER for left-wing operatives to stay close to her. BUT that does not make her a plotter – VERY unlikely.  She is USEFUL.

Possibly useful for community organizing.

If Professor Duffy knew Richard Cloward, Frances Piven, or Bill Ayers during her active career, then I will take all this exoneration back. Otherwise, I  believe she is only distantly related to the PEOPLE who are actually behind incitement and recruitment on Gab, and she may not even know them, or know that they are IC operatives.  Why do I say this?  Follow along.

I believe that (716) 245-5235 – which was her old (1997-ish) FAX number, was kept at the exchange and suffix level in the department and reassigned to a NEWER FAX NUMBER with a newly created area code which includes the university.

If this is starting to sound like telecom spycraft, all I can say is BINGO.  Much of spycraft IS telecom.

All the department’s phone numbers that I saw are now in a NEW area code, (585), rather than (716).  Area code (585) was created by a SPLIT of area code (716) in the year 2001. Speaking from university experience here, when a new exchange or area code is introduced, there is usually an attempt by phone companies and the national system to conserve phone numbers and ring-through on dialing of an old number to the maximum extent possible, so that old numbers continue to work, and minimal headaches ensue.

Are you with me on that? This is why a theoretically dead number that WORKS is cover.

And there are even MORE tricks, but let’s not get into those quite yet. I hope you realize why IC is always neck deep in university telecom. They are watching EVERYTHING.

If we follow the same exchange and suffix (245-5235) to the new area code, then we find that the number goes to a younger colleague of Prof. Duffy’s in the same department, who is not only an expert on media-induced violence, but even more importantly, has authored several publications and books WITH Professor Duffy.

So what I’m saying is that the old phone connection and number survived as the new one with a different area code.

This is listed as a fax number, but many faxes include phones and answering machines, or ring through to them (which is an excellent way of hiding a somewhat unlisted phone number behind a fax).  A fax is plausibly deniable if investigated – very important.  Faxes are also readily hacked, and can do interesting things with phone calls.

Again – perfect for SPYCRAFT.  The phone calls were potentially being REROUTED.  And, of course, this is perfect for cutting off the connections in case of discovery.

Think collapsing tunnel.

Again – I am not so concerned about this professor, the colleague of Professor Duffy, because ANYBODY could be using the fax number phone for this fake Nazi group study, including TAs, post-docs, instructors, etc.  In fact, it is very likely to be somebody OTHER than the professor, so that if discovered, focus will divert to the wrong person. 

Professor Kirsh seems like a PLAUSIBLE person to be doing this, and thus he provides extremely good cover.  Again – very important.

In other words, Professor Kirsh is FAR more likely to be a red herrring, than a red.  His honest objection will cut off inquiry.  That is the way these folks work.  IN THE SHADOWS, using good people as fronts.

Click. The phone goes dead. End of story.

NOW – it is VERY helpful to read the biographies of both Professor Duffy and Professor Kirsh, from one of their coauthored books.  This explains WHY they became fronts. Read both biographies CAREFULLY and to the very end, particularly in the case of Professor Duffy.  (LARGER TEXT BELOW)

About the Author

Karen Duffy is a Distinguished Service Professor–emerita, at the State University of New York College at Geneseo. She received her Ph.D. in social and personality psychology from Michigan State University. Dr. Duffy served as a family mediator for the New York Unified Court System. She has also served on the executive committee and as the chief instructor for the training institute for the New York State Employee Assistance Program (EAP), as well as on the board of directors for a shelter for domestic violence and on an educational committee for a family planning agency. She has consulted to a variety of work settings on stress management, EAPs, and other work issues. She is a member of the American Psychological Society. Dr. Duffy has written several other books, including Community Mediation: A Handbook for Practitioners and Researchers and Community Psychology. She also edits several hard-copy and web-based annual editions for another publisher, on topics including psychology of personality, social psychology, introductory psychology, and adjustment. She has held two Fulbright Fellowships to St. Petersburg State University, St. Petersburg, Russia. While in Russia, she worked with AIDS International, several children’s shelters, and other community agencies. More recently, she completed a hu-manitarian aid trip to Mongolia.
 
Steven J. Kirsh is a Professor of Psychology at The State University of New York at Geneseo. Dr. Kirsh’s primary areas of research focus on the influence of violent media on emo-tion recognition and social information processing. He has published Children, Adolescents, and Media Violence: A Critical Look at the Research (2006) and Media and Youth: A Developmental Perspective (2010) as well as numerous scientific articles and book chapters.

Amazon Editorial Reviews

Professor Duffy’s background of extensive contact and project implementation with “community organizers”, and FAR more importantly her travels to Russia and Mongolia, lead me to believe that she at one time served as an unwitting conduit for whoever is behind this, allowing that group to get a foothold in her department.  I believe that this group is an intelligence agency.

There is NO WAY – absolutely NO WAY – that this woman has not been approached, attached to, manipulated, or used by at least ONE intelligence agency, and possibly more.  We should not presume, however, which one it is, based on “Russia”.

Professor Kirsh’s background makes his work of extreme interest to intelligence agencies in terms of handling what I call “useful psychos”.  Prof. Kirsh is very unlikely to have anything to do with anything bad – it is his RESEARCH that is useful, and his SUBJECTS even more so, when accessed surreptitiously (see Nikolas Cruz).  Prof. Kirch would be very usefully spied upon. I have no doubt that intelligence agencies watch every bit of data coming into and out of his offices.

Are you seeing where I’m going?

Having a DEEP spying operation in a university department of ANY USEFUL KIND (from nuclear to psych) is very advantageous to any intelligence agency.  At the same time, routing dirty operations through a place of “clean hands” – useful pawns (we can’t really call these people idiots!) is also advantageous.

I think we caught some clowns in action, and I suspect that a similar operation may have been in place for a certain man who attacked a synagogue.

In fact, I suspect that the PHONE RECORDS of the Tree of Life synagogue shooter may be extremely enlightening. Maybe even what looks like a WRONG NUMBER.

And yes – it really IS complicated. That’s why they get away with it.

People on our side need to think in terms of asymmetric warfare. Because the communists DO think that deeply.

Information warfare IS asymmetric warfare.

And that is why they keep using it to try to take down Trump and stop MAGA.

Just DO THE MATH PSYCHOLOGY.

W

“What can I say, folks?  Complicated business!”

PS: There is a reason the leftists are STILL after Gab.