Technique used to identify the opposition, lure, compromise, corrupt, waste resources, catch or neutralize (there are more ways than one to defenestrate a cat) a particular adversary, group or organized groups (tightly or loosely working together), thereby further concentrating and controlling the activity of individuals (the one you don't have to eliminate to neutralize) and groups antithetical (that means diametrically opposed, bubble) to one's own.
Now, if it were a Q_Operation_Trust, it would not used it to lure those adversarial (that means hostile or opposed, bubble) to your goal for the purposes generally outlined above. The goal would be to identify the aligned (morally, philosophically, by nature or inclination), draw them to together in the manner of a fasces, encourage and strengthen conviction and resolve, facilitate further dissemination of the core messages and mantras Q promotes.
In the process, wheat and chaff are separated.
At the risk of mod griefing or violating any other sidebar rules, you are piece of chaff.
Do you recognize information warfare (a component of psychological operations) techniques in the above example. If not, allow me to refresh you memory...
For those may have gone ahead an (re)read my posts and comments, unlike bubble here, you may recall or have run across certain statements about "The Trusted Build", the name of the upgrade ordered by the Colorado Secretary of State. While technically a term of art in the computer world, double meanings exist.
Operation Trust = Q Operation Trust = The Trusted Build
As I have seen your contributions in the past I am inclined to give you the benefit of doubt, so, I will give you one more chance to explain clearly, directly and succinctly what you meant by:
In the process of The Trusted Build Q information operation, wheat and chaff are separated.
At the risk of mod griefing or violating any other sidebar rules, you, bubble, are piece of chaff.
so it begins:
https://youtu.be/QwF1ec4Ji7Y (7 min, 30 sec)
Number forty-two.
The oldest information warfare trick in the book.
https://en.wikipedia.org/wiki/Operation_Trust
Technique used to identify the opposition, lure, compromise, corrupt, waste resources, catch or neutralize (there are more ways than one to defenestrate a cat) a particular adversary, group or organized groups (tightly or loosely working together), thereby further concentrating and controlling the activity of individuals (the one you don't have to eliminate to neutralize) and groups antithetical (that means diametrically opposed, bubble) to one's own.
Now, if it were a Q_Operation_Trust, it would not used it to lure those adversarial (that means hostile or opposed, bubble) to your goal for the purposes generally outlined above. The goal would be to identify the aligned (morally, philosophically, by nature or inclination), draw them to together in the manner of a fasces, encourage and strengthen conviction and resolve, facilitate further dissemination of the core messages and mantras Q promotes.
In the process, wheat and chaff are separated.
At the risk of mod griefing or violating any other sidebar rules, you are piece of chaff.
Do you recognize information warfare (a component of psychological operations) techniques in the above example. If not, allow me to refresh you memory...
https://youtu.be/VA4e0NqyYMw
And the latest installment...
https://qaggregator.news/truthimages/1da9ccc37a8c3017.mp4
For those may have gone ahead an (re)read my posts and comments, unlike bubble here, you may recall or have run across certain statements about "The Trusted Build", the name of the upgrade ordered by the Colorado Secretary of State. While technically a term of art in the computer world, double meanings exist.
Operation Trust = Q Operation Trust = The Trusted Build
Expand your thinking.
It was over before it started.
Patriots have always been in control.
https://en.wikipedia.org/wiki/Jena_Griswold
https://www.eac.gov/what-trusted-build-and-why-it-used
https://www.lawinsider.com/dictionary/trusted-build
https://www.coloradopolitics.com/opinion/sengenberger-what-happens-in-the-trusted-build/article_7cba341e-83af-11ec-9e0f-8fd9f817b027.html
https://denvergazette.com/opinion/columns/column-mesa-county-clerk-tina-peters-must-resign/article_94ae7f47-c875-583d-bf89-b2adec39f12a.html
https://en.wikipedia.org/wiki/Trusted_Platform_Module
https://www.wikihow.com/Build-Trust
https://en.wikipedia.org/wiki/Fasces
And as for you, bubble head...
As I have seen your contributions in the past I am inclined to give you the benefit of doubt, so, I will give you one more chance to explain clearly, directly and succinctly what you meant by:
In the process of The Trusted Build Q information operation, wheat and chaff are separated.
At the risk of mod griefing or violating any other sidebar rules, you, bubble, are piece of chaff.
"Dynasties may come and go..."
https://youtu.be/L5jZanNyuS4 (2 min, 9 sec)
https://youtu.be/xHhzMVIR0k8?t=21 (timestamp)
We all see you.
Appreciate your showing us your true nature.
You now have a choice.
Publicly apologize for abusing your controlling and commanding position as a moderator...
Or ban me.