DEEP DIVES
30K subscribers
29K photos
2.16K videos
42 files
5.24K links
Deep Dive down the Rabbit Holes. Interactive channel for discussion of intel-past and present, Trump Comms, and The Q Key and maps.
Download Telegram
This article was written in 2013. ANONYMOUS and The “Alliance” were in full swing taking down the Federal Reserve Cartel, inflicting all kinds of pain to The Cabal.

Wilcox, the author of this article, discusses how ANONYMOUS and the White Hat hackers were able to shut down the Super Bowl 2013 right after Beyoncé, a known Cabal operative, left the stage after her performance.

They inflicted a monster-size financial hemorrhage to the advertisers of that Super Bowl.


This is a GREAT read!


https://divinecosmos.com/davids-blog/1145-us-military-fed/
👍5
Today’s 4 YEAR DELTA: May 11, 2018
Really think about what they are telling us here. Open for discussion.
4 Year Delta Drop (cont): May 11, 2018
As we discussed last Friday, Deep Mind and Deep Dream 2 were creations of Google through the assistance of DARPA (Defense Adanced Research Projects Agency)...that tracked every movement of our reality.
1🤬1
Facebook, too, was involved with “lifelogging” which basically tracked and decoded every aspect of our existence, through the use of algorithms.
🤬1
Mark Zuckerberg, the CEO of Facebook, was driven to find a way, with all the data collected on each of us, to break into HARDWARE and be competitive in this space with other companies like Apple, Microsoft, and Google.
With that background info, let’s now decode Q drop 1337.

In the Q drop they discuss “Building 8.”

In April 2016, Facebook announced the launch of Building 8, a research lab to develop hardware projects in the style of DARPA. Zuckerberg spent millions of dollars to recruit Regina Dunn, a highly acclaimed, and very successful Google Engineer and Executive, to oversee Building 8. Dunn was previously a former DARPA executive.
👍3
What was happening inside Building 8 was somewhat secretive and innovative.
👍1
Some of the teams that operated inside Building 8 were:

-Brain scanning technology,
-Cameras and Augmented Reality,
-Medical device innovation,
-Drone technology.
-Metadata collection
👍3
Q drop 1337 also mentions :
F9 algorithm.
To understand what a “F9 algorithm” was, I had to do a lot of digging.
In order to understand what a “F9 algorithm” is, we must do a little telecom review..
Your cell phone transmits and receives data from a cell tower.

Part of a “mobile communications protocol” is the encryption and decryption of data.

A5 is a stream cipher used to provide over-the-air communication privacy with mobile phones.

The latest version of the “A5”algorithm is called KASUMI or A5/5. As in, it is the 5th version.

A5/0 is no encryption
A5/1 is a little encryption
A5/2 even more encryption
A5/5 is fully encrypted.
👍2
This is where it gets scary…
Your phone will communicate with a cell tower, if the cell tower reaches out to your phone and says
“I want to talk to you now A5/0” (remember A5/0 is not encrypted).

Then your phone responds with “Okay".

This happens WITHOUT your knowledge (certainly without mine!).
One feature of the KASUMI / A5 algorithm is “an integrity check”...UNENCRYPTED data gets checked for data integrity, to make sure that the data received really is the data. This integrity check is called: F9.
This is where it gets even scarier…
The encryption algorithm is controlled by whoever is controlling the cell tower(s).

And, as you might guess, the cell tower your phone uses is MADE IN CHINA….