1. Breaking down drop 4620. I’m telling you now, this is a deep dive. No click bait here, just hard work and incredible conclusion. This decode will explain and inspire, beyond imagination. You will discover the skill, cunning and strategy of Donald Trump and Q team.
2. When General Flynn said he had an army of digital soldiers, he wasn’t kidding. I am approaching this decode with the idea that everything is integral on this drop. That paid off instantly. #4620 is the drop number. 4/6/20 = DFT, also known as, Discrete Fourier Transform.
3. For those of you not familiar with digital signal analysis, DFT is a complex calculation of frequency waveforms and their behavior. And, the results can be used to identify a "digital fingerprint" of comm systems, messaging apps, and or the actual signal of a specific device.
4. In the industry I work in, DFT is used to detect extremely small deficiencies in electrical generation systems. Harmonics and anomalies are isolated and the exact point of frequency deviation and exact point of frequency realignment can be discovered. It's very advanced stuff.
5. I believe this drop is directly related to the use of DFT tech.

"[infiltration]
Only those who could[can] be controlled [via blackmail or like-beliefs] were installed in critical leadership positions across all political and non-political Control and Command Positions [CCP]."
6. "CCP' - Command or Control Positions are controlled via blackmail or by fundamental beliefs (Islam?).

"CCP [necessary] to ensure protective blanket [insurance]."

CCP were filled with rogue assets in order to protect the deep state, it's actors and its assets.
7. "Traitors everywhere."

A warning that many command and control positions are occupied by compromised individuals. And, a reminder if why just going out and arresting someone can be difficult.

"[D] leadership in joint ops w/ China [CCP] in effort to regain power?"
8. Drops or fragments posed as a question should always be treated with suspicion. Are Democrats in league with China's own command and control positions in order to regain power? Conclusion…democrats have lost their power and China MAY be the ones holding the blackmail dirt.
9. "It was never about the virus."

The CV19 is not what it seems, it's only a means to an end.

"Sequence of events.
Flynn 1st strike designed to 1. cripple"

Trump chose Flynn as his National Security Advisor because he's a damn good General and he's a true PATRIOT.
10. However, before Flynn could even get started, he was targeted heavily, smeared, attacked via abusive law enforcement and, even the vice president of the United States, dishonestly assaulted Flynn’s credibility.

I asked Pence about this, no answer. https://twitter.com/40_head/status/1289247380575903744?s=20
11. "2. prevent exposure of illegal acts [Hussein WH CoC] through NAT SEC [intel] discovery"

Flynn knows where the bodies are buried. By forcing him out of Trump’s team and severely attacking his reputation, the deep state was able to render him untrustworthy in the public eye.
12. Hard to be a credible witness when the FBI accuses you of lying. And, everything Flynn knows is most likely compartmentalized so, he cannot share or dig or access certain intel while under investigation. His security clearance would be suspended while he’s on trial as well.
13. "3. Install ‘controlled’ replacement [rogue1_McMaster]."

McMaster wasn't being considered by Trump to replace General Flynn.

Senator Tom Cotton is the one that personally recommended McMaster to Trump’s team. I asked Cotton about that. No answer. https://twitter.com/40_head/status/1289241473234292737?s=20
14. As you know, Cotton is highly favored by Trump and often supported and touted during Trump's rallies. No doubt, one of Cotton's recommendations would probably go a long way as it did with McMaster who Trump decided to nominate to become his next national security advisor.
15. It would literally prove to be McMaster's undoing, but did Trump know that betrayal was coming? This is where the discussion about DFT starts to come in, but we’ll come back to that in a bit.

"McMaster removal of ‘loyalist’ intel community_NAT SEC
Install ‘controlled’"
16. This is where things start to become clear. McMaster came in and removed some very important people from Trump’s National Security team, key players that were hand picked by Trump, Flynn and Q team. They were to assist in taking down the Deep State as fast as possible.
17. One thing for certain, when you see a plant like McMaster come in and immediately start removing people from Trump's staff that have no apparent disciplinary action problems, etc, it should be a tremendously massive red flag that you’re watching deep State antics in action.
18. Not only are the removals of specific Patriots important, the people who are used to replace those Patriots should be noted. If a true Patriot is removed because of the danger they pose to criminals, we need to know who's been trusted by those criminals to take their place.
19. "[rogue2_Coats_DNI] prevent DECLAS [House-Senate blockade]."

This is another strange situation, DNI Coats was one of the people we suspected of being Deep State but, because he appeared to be in a trusted position, many of us tried to reason he must be a white hat.
20. But, the aggression between Coats and Trump became highly visible and his departure of from the IC was inevitable. What shocked most of us was to see vice president Mike Pence literally beg Coats to stay at his post. You must take a step back and ask yourself, why?
21. Q gave us the information on what Coats was doing. He was blocking the declassification of documents and evidence that was being requested by GOP investigators from the Senate. Those committees in the Senate were working to uncover and expose the ObamaGate scandal.
22. Dan Coats refusal to release and or declassify the materials they requested posed a significant time delay and stall to the Senate investigatory committees. Knowing that, why in God’s name would Mike Pence beg Coats to stay in his position?

Trump was pretty pissed.
23. "Pre_Install [rogue3-6] >

Q ends up saying there's a total of 7 Rogue controlled assets that were either introduced to the Trump Administration or previously installed so that when Trump took over, he would immediately have defectors and traitors in his midst.
24. Then, when some of the previous administration holdovers were removed, some of those rogue assets were recommended into future positions, like McMasters. Or so it seems?

Don't forget the DFT phenomena. Start thinking about it now as you continue to read.

Digital fingerprint
25. "referral(s) to POTUS re: McMaster_Coats_Wray_Bolton_+++"

We need to know exactly who recommended these rogue Deep State assets to Trump. I already verified Cotton recommended McMaster.

Wray was recommended to Trump by Rod Rosenstein.

(This is not the last post...)
26. "Install ‘controlled’ [rogue7_Bolton]"

Bolton had been considered for the National Security advisor position over a year before he was actually chosen by Trump. He had been interviewed along with Rex Tillerson for the cabinet spot but Tillerson was chosen instead.
27. One day after Bolton started, he went head hunting through the National Security team. Bolton then merged the White House National Security Council with the Department of Homeland Security. One has to ask themselves, why? These are two independent teams.
28. Homeland Security Advisor Tom Bossert resigned at Bolton's request. In his 1st week Bolton obtained the resignations of multiple National Security Council (NSC) employees including NSC spokesman Michael Anton, Deputy National Security Adviser Nadia Schadlow and Deputy...
29. ...National Security Adviser Ricky L. Waddell.

"Bolton removal of ‘loyalists’ intel community_NAT SEC"
Intel community [NAT SEC_WH] essential to control [infiltration] to prevent DECLAS_public exposure of true events [illegal surv [R] candidates 1&2, House members 1-x,...
30. ...Senate members 1-x , Journalists 1-x , Amb 1-x] + CLAS 1-99 events."

The illegal surveillance was not just against Trump but also against Ted Cruz, multiple members of both the House and the Senate. It looks like journalists and even an ambassador we're being targeted.
31. One of the tasks of the National security team in the white house is SUPPOSED to be to prevent infiltration into the administration or the government by rogue assets. And yet, it was the nat sec team itself that was infiltrated.

Or, was there something more going on here?
32. "Mueller installed [Comey termination_loss of power][POTUS inside of a box][prevent counter-attack]."

After Comey was fired the deep state was temporarily without a power player asset with their hands on the Crossfire Hurricane data. So, Rod Rosenstein appoints Mueller.
33. Mueller takes over the ObamaGate Crossfire Hurricane investigation.

By resurrecting the investigation into Trump, it made any pursuit of justice by Trump’s administration appear to be political in mature...another delay, another stall.
34. "Impeachment installed [Mueller termination _loss of power][POTUS inside of box][prevent counter-attack]."

When Mueller couldn’t recommend chargesA against Trump due he ended his investigation. Within days Adam Schiff announced he was going after Trump for impeachment.
35. "C19 insurance plan _above fail
C19 installed [Impeachmeprosecuted7nt termination _loss of power][POTUS inside of box][prevent counter-attack]."

When the impeachment process failed, the deep state needed another urgent issue to delay Trump’s pursuit of justice.

COVID-19.
36. "C19 _stage 1: Inform POTUS [intel + CDC + WHO + S_advisor(s)] _nothing to fear _do not close travel _do nothing [the political ‘set up’]"

The plan was to tell POTUS there was nothing to fear…still, Trump banned travel from China…a move the DeepState wasn’t expecting.
37. "C19 _stage 2: Inform POTUS of Dooms Day ‘inaccurate’ scenarios [models] predicting death count 1mm+ [the political ‘force’] _lock down [wipe economic and unemployment gains]"

Then, the same “experts” tell Trump 1 million Americans will die and he MUST shut down the nation.
38. Their goal? Destroy the economic gains Trump’s administration had made the previous 3 years.

"C19 _stage 3: Activate ‘controlled’ [D] GOVS to ‘spike’ death count + project statewide fear by presenting ‘alarming’ on-ground conditions [hospital [care-supplies] projections]."
39. Rogue democrat assets were put in place for the sole purpose of inflating COVID-19 numbers. By doing this they hoped to build questions about Trump’s ability to lead and they tried to cast doubt on his decision-making processes. They attempted to make him look compromised.
40. "C19 _stage 4: Push testing, testing, testing to spike ‘infected’ rate incline due to daily testing inc [the political ‘set up’] _controlled MSDNC failure to report death count [rates] proportional to ‘infected’ rate _deliberate miscounting of infected numbers [%] _change...
41. ...non_positive to positive _label death of non_C19 as C19 _etc."

By incorporating increased testing they had the ability to embellish increased number of positive cases and raise the number of deaths. Without increased testing this would've looked too suspicious.
42. "C19 _stage 5: Eliminate / censor any opposing views [anti-narrative]
[Ready when needed] Activate 4-year BLM narrative 4x power [use as division + [2020] C19 infect rates to justify close-limit until Nov 3]."

The BLM card.
43. Much like other terrorist organizations throughout the world the Deep State have controlled, the black lives matter movement was activated in an effort to assert and disrupt the country's bounce back from CV19. Dems now have an anti-police, fear mongering player on the board.
44. "C19 calculated [D] political gain:
1. Eliminate record economic gains
2. Eliminate record unemployment gains
3. Shelter Biden from public appearances _limit public exposure of mental condition
4. Shelter Biden from Ukraine exposure _narrative change _media focus C19
45. 5. Shelter Biden from P_debates [requested demands due to C19]
6. Delay [D] convention _strategic take-over of nominee post conf
7. Eliminate_delay POTUS rallies _term energy
8. Eliminate ability for people to gather _ divide
9. Eliminate ability to find peace – ...
46. ...strength in time of need [strict Church closures].
10. Promote mail-in-voting as only ‘safe’ method _bypass NSA election security [installed midterms +1].
11. Push state-bailout stimulus [CA][NY] + wish list items
12. Increase national debt [place China into controlling...
47. ...debt position _regain leverage]
13. Test conditional limits of public acceptance [obey]
14. Test conditional limits of public non_acceptance
15. Test conditional limits of State authority [Gov-mayor]
16. Test conditional limits of Media [social] censorship"
48. All these were victories obtained or expected to be obtained by the Deep State and the Democrat Party by infiltrating the US government in Trump’s Administration specifically. The downfall of America was their effort and expected conclusion.

Knowingly.
Knowingly.
Knowingly.
49. "Who benefits the most?
[D]?
China [CCP]?"

So who does benefit the most? Democrats? China? Satan?

"Russia is the enemy.
China is our friend.
[MSDNC [social media] programming]
All assets deployed."

Fake accounts and box and trolls have been assigned to social media.
50. Their goal people is make people think that Russia is our enemy and that China is our friend. If you’ll notice, Trump is almost the opposite with this. He has said that we need to fix relations with Russia and we need to hold China accountable for their attacks against us.
51. "Everything seen yesterday, today, and tomorrow = calculated political moves/events designed and launched by [D] party in coordination with other domestic and foreign entities in an attempt to regain power over you. Prevent accountability.
SHADOW PRESIDENCY [HUSSEIN]
52. SHADOW GOVERNMENT
INFORMATION WARFARE
INSURGENCY"

This program they have instituted, these tactics they have employed, mean something very specific. We have the power and they are trying to take it back. Four years ago, that was not the case.
53. Four years ago they had the power, or they made us think they did, and they were trying to keep it. That should be an inspiration to us all, we took our power back!

"...of and for the People!"

However, they still have assets to deploy and they still have operators in play.
54. They are doing all within their means to prevent accountability for crimes committed against this nation and against mankind.

"Your voice and your vote matters.
Patriots stand united.
Welcome to the Revolution.

Q"
55. We’ve reached the end of the drop and it is important to understand your voice and your vote are critical. We proved that in November of 2016 and and took our country back. We are Patriots and we are united and what you have just been shown is the product of our Revolution.
56. Because we were effective and because we stood together and because we helped in exposing the evil that is out there, our enemies had to refer to these tactics and employ these defenses. But I know many of you are asking, why was all of this allowed to happen?
57. Why were certain assets from the Deep State like McMaster, Wray and Bolton allowed to infiltrate, block and delay processes needed for the healing of this nation? Why were rogue assets allowed to divide our National Security Council and disrupt the processes for justice?
58. Back to the DFT. It’s very important that not only do we see justice served but also that we terminate their abilities to continue to commit those acts. What does "We have it all" mean? Do we have every device, every rogue player, every weapon and every criminal in custody?
59. What we have is the data needed to prove treason and crimes against the nation. But we still.have to capture the materials. When you look at the DFT and what it’s used for, it can actually identify a so-called fingerprints in the waveform of electrical signals.
60. If a rogue asset wants to communicate with another rogue asset or with their handler, but they’re not working in a position that deems that necessary or enables it, then you will never discover the waveform or the signature of that digital transmission for that device.
61. You have to allow someone who knows the damn thing exists in the first place, who was also trusted enough by the Deep state to use it, and allow them or even place them into positions where they will end up using that device, exposing that digital waveform.
62. That fingerprint will become an identifiable means of communication. So, why do you allow people into certain positions? Because they’re going to try to do damage. If there are hidden devices and communication systems and digital fingerprints that are reserved only for the...
63. ...communication by these rogue actors and their handlers, then you have to put someone in play so they can be used. Only once they’ve been used can you identify, locate and destroy them.

You all may remember early drops about dangerous devices capable of very real harm...
64. ...were discovered inside the white house, left to hurt or spy on Trump’s team and family by the previous administration. If devices can be left inside the White House, one of the most secure locations in the world, where else could similar devices also be hidden and stored?
65. How many other means of communication need to be discovered and destroyed? How many court cases and justice department indictments can be written by proving that communication equipment verified by DFT calculations were used to traffic children, call in terrorist attacks...
66. ....organize drug deals, sell guns to Mexico, launder money to Iran, participate in Mafia dealings, arrange for murders and abductions? There are so many crimes that must be prosecuted and so many guilty people that must face Justice. But, evidence and proof is needed.
67. And, we need to STOP it all! Also, the NSA has been tracking the frequency and digital signature of every device for years. By analyzing those devices and those signatures, it’s the same as putting DNA into a database to see if it matches any unsolved crimes.
68. Something as specific as a digital signature created by a communication or electrical device that can be imprinted into a record and used to identify who was using it, when they used it, who they communicated with it, and what events transpired immediately after use.
69. It can also be used to identify what messages and emails and phone calls belong to which person. I told you, this thread was a deep dig. And, it delves into the very real science that can be used to identify the people who have hurt this country the most.
70. Imagine if you could prove that a certain individual had a specific device on their person and used it for criminal purposes? Imagine the ability to go to a court of law and present a case with absolute certainty that the criminal sitting in front of you is absolutely guilty.
71. Not only that, are we safe before all of these devices are removed? Are we truly safe before all of these servers and comm links and rogue assets are removed? There was a purpose to allowing certain people into certain spots and giving certain authorities.
72. Did they all take the bait? There’s a record now, evidence and material and proof has been obtained. Notice, each person was only allowed to serve in a capacity for a certain period of time and then they were removed.
73. Early in the Q drops we were told Admiral Rogers scrubbed every person Tump put into a position of power and trust. If someone made it into a position, like Coats or Wray, and enabled bad things to happen, then we must believe that Admiral Rogers did this as part of the plan.
74. If it WAS all part of the plan, then yes, PATRIOTS ARE IN CONTROL.

Thank you for sticking through and reading the thread. I hope it has informed you or at least given you things to think about.

God bless you all and have a great day!

#WWG1WGA

-End
You can follow @40_head.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: