0:00
/
0:00
Transcript

The Origin of Q: A Deep Dive into the Military-Intelligence War Behind the Curtain

The Origin of Q: A Deep Dive into the Military-Intelligence War Behind the Curtain

This episode explores the origins of the enigmatic Q phenomenon—not as a starting point in 2017, but as a product of decades of infiltration, covert military operations, and a clash between rogue elements of the U.S. government and a faction of patriotic insiders.

Decentralized Media | Redpill Project is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

The Precursor to Q: Military Insiders Take Notice

While most associate Q with 4chan posts in late 2017, the roots go back much further. After Donald Trump’s election, several anonymous accounts on 4chan—FBI Anon, White House Insider, among others—started posting “insider” information. However, what caught attention were the “Q proofs”—the seemingly coordinated timestamps between Trump’s tweets and Q drops, the use of mirrored language, and references to classified military operations.

But the real story starts years earlier.

Subscribe To Our Substack & Get Access To All Our Premium Content

Get 20% off for 1 year

The Multi-Domain Battlefield: Psychological, Cyber, and Informational Warfare

The modern battlefield is not just kinetic; it's multi-dimensional—land, air, sea, cyber, and space—blending psychological warfare, misinformation, and information operations. This is the backdrop in which Q emerges, as a response to long-term infiltration into American institutions, going back to the mid-20th century.

Infiltration, the Deep State, and the Business Plot

The podcast traces deep state roots back to the early 1900s, with events like the “Business Plot,” in which wealthy financiers attempted to recruit Marine General Smedley Butler to overthrow FDR. That same network tied back to prominent names like Prescott Bush and George Walker. The implication? Powerful American families have historically been involved in plans to destabilize or control government structure for globalist ends.

Military Technology “Misplaced” – Coincidence or Coordinated Theft?

Two major incidents in 2006–2007 paint a troubling picture:

  1. Taiwan Incident – Four nuclear fuses were mysteriously mislabeled as helicopter batteries and sent to Taiwan. The contractor involved? EG&G, a defense giant with deep roots in black budget programs like the Manhattan Project and Area 51.

  2. Bent Spear Incident – Six nuclear-armed cruise missiles were “mistakenly” mounted onto a B-52 bomber without authorization or detection. They vanished from radar for 36 hours.

These incidents strongly suggest the covert movement of sensitive U.S. military technology—possibly part of a larger plan to leak or sell classified tech to foreign nations. Some allege this was part of an organized deep state operation within the military-industrial complex.

Sullivan, Jaden X, and Family Ties

Lieutenant General Kevin J. Sullivan, linked directly to the Defense Logistics Agency during one of these incidents, is the adoptive father of John Sullivan (aka Jaden X), who famously captured key video footage of the January 6th Capitol breach—footage later used in impeachment proceedings and by CNN. This odd coincidence suggests possible generational ties within covert networks.

The Rise of the Q Group Inside the NSA

In the aftermath of these events, a group of patriotic generals and intelligence insiders allegedly formed a special access program outside of congressional oversight. Operating from within the NSA, they started tracking deep state operatives leaking secrets. This group was known internally as the “Q Group.”

They couldn’t prosecute the individuals because the intelligence was gathered via non-sanctioned means. So instead, they leaked breadcrumbs to trusted journalists like Andrew Breitbart and Michael Hastings. The result? Journalists started dropping bombshells, only to later die under suspicious circumstances—suspected targeted assassinations by intelligence agencies using exotic tech like remote vehicle control.

Hillary’s Emails and Special Access Programs (SAPs)

Hillary Clinton’s email scandal wasn’t just about carelessness. According to insider testimony, those emails contained top-secret SAP materials—among the most classified in government. These included research on advanced technologies and possibly extraterrestrial-related projects.

The emails, when forwarded or replied to, triggered a hidden script that carbon-copied them to a Gmail address accessed in China. This formed the heart of a pipeline: SAP data → U.S. universities → Chinese military. Barack Obama’s educational exchange programs allegedly provided the legal framework for these transfers.

Enter Donald Trump: The Counter-Move

Insiders, including Lt. Gen. Michael Flynn and Admiral Mike Rogers, allegedly recruited Donald Trump to run for president to disrupt this infiltration. Trump’s presidency initiated a military-led counteroffensive. He canceled the educational exchanges, launched the “China Initiative,” and had dozens of professors with DARPA, DOE, or military funding arrested for covert tech transfers.

One of the key figures brought in by Trump? Lt. Gen. Dan Kane—head of all special access programs at the Pentagon. As a 9/11 witness and battlefield commander, Kane held the authority to create or read any SAP program. Allegedly, he helped launch a second phase of the Q-led operation during the Trump years.

The Real Target: The Deep State’s Global Infrastructure

The strategy wasn’t just about uncovering tech theft. It aimed to dismantle a deep-rooted network of money laundering, espionage, and proxy war funding. This included the Clinton Foundation, pay-for-play speaking deals, NGOs as laundering vehicles, and collusion with foreign intelligence services.

Why Q Was Born

When legal methods failed, the only option left was public dissemination. That’s what Q was—a proxy board to ignite curiosity, direct citizen-researchers toward key intel leaks, and expose the corruption in a decentralized, open-source way.

From Pizzagate to Fast & Furious, Uranium One to John Brennan’s shadow programs, the Q movement was never meant to give all the answers—it was meant to provoke the right questions. Whether you believe in the validity of every breadcrumb or not, the patterns it highlighted are disturbingly real, and the implications are far-reaching.

Discussion about this video