John Podesta, #pizzagate, and Why You Should Care About Hillary Clinton's Pre-Election E-Mail Scandal
Update: In case you don't follow alt-news, a scandal has been circulating for about a month regarding a pizza joint in Washington, D.C., Comet Ping Pong Pizza.
When Wikileaks released more e-mails prior to the election, the same people who normally scour the contents of the (mostly dull) e-mails came across something disturbing: e-mails between John Podesta, Hillary Clinton’s campaign chairman, and several other people. These e-mails strongly suggest that they are involved in a child sex trafficking ring.
Is this the information that was uncovered on Weiner's laptop? Why did Comey choose to drop his investigation against Clinton? Is Comey himself involved in the Comet Ping Pong scandal?
My discussion of the manner in which this information could have been shared is still valid ... but the new question is: How bad was that information? Anthony Weiner strongly resembles a sketch of a rape suspect in an overseas case ... was there evidence on his laptop that could indict him?
This scandal involves the elite of Washington, D.C., and they won't go down without a fight. It's only showing up on Facebook now, so let's see how it plays out over the next month.
- Pizza Gate Exposed in 14 Minutes (Code, Symbols, Death of Breitbart) - YouTube
Please Subscribe: Kristan T. Harris goes over the history of Pizza Gate in 13 minutes including: Emails, Codes, Symbolism, FBI research, Wikileaks, Breitbart...
On Friday, the FBI announced that it was reopening the investigation into Hillary Clinton's e-mail scandal. They cited evidence found on a laptop that Huma Abedin shared with her creep husband, former New York Congressman Anthony Weiner.
This morning, a few of my friends posted a link to an article that boldly declared that the new FBI e-mail investigation doesn't matter because whatever the FBI found on that laptop - which could be e-mails, photos, screen shots, Word documents ... you name it - didn't come from Hillary's server.
First: We're going to ignore that this information was found on a shared laptop, because it sounds absurd that a powerful and well-connected person like Huma Abedin wouldn't have her very own laptop. Yes, I am asking you to ignore that the woman who is the assistant and close personal confidante to the Democratic Party's Presidential Nominee was sharing her computer with a man who destroyed his life because he couldn't keep it in his pants. And continued not keeping it in his pants.
Suspending Reality in T minus 10 seconds.
And let's address that big grey animal over there.
Why don't people take the rumors of a Huma/Hillary love affair more seriously? They're both married to terrible men that they should have left years ago. On the one hand, Hillary supporters celebrate the LBGTQ community; on the other, HILLARY COULD NOT POSSIBLY BE A LESBIAN (said in a clear and concise tone with a hint of offense). It's widely know that liberal darling Eleanor Roosevelt was a lesbian, so is it that far of a stretch to think Huma and Hillary have a "thing?" And would it really be that bad?
Cuz, see ... I hate Hillary, but not because she's possibly a closet lesbian. Let's be honest: It would explain a lot.
And here's the thing: It doesn't matter if they're having an affair, except in the context of scandals like the FBI finding secret e-mails on Huma's laptop. Because a secret lover would go to great lengths to carefully guard the secrets of her beloved.
It's Not Hard To Be Sneaky
I'm no expert at computers; I'm somewhere between the grandparents that have to be reminded not to open the e-mails from Nigerian princes or send their SSN to the "IRS," and the teenager that knows about a new app or social network 10 seconds after it hits the internet.
But I do know there are ways to share information between devices and across the web without getting caught. And it's neither difficult nor illegal.
People talk about using the Dark Net, but if you're some regular schmo whose darkest thoughts involve buying pot or renting a hooker, you probably have no idea how to access the Dark Net. That is, accessing it without getting caught. So I'll stick to technologies that allow people to communicate in completely normal, legal ways.
If I can figure this stuff out, people like Hillary Clinton and Huma Abedin, with their armies of paid advisors, can certainly figure it out.
You Have How Many E-mail Accounts?
Google It: Anyone can set up as many e-mail accounts as they want. Back in the early days of the internet, it was a lot harder to set up an e-mail address; back in the day, your e-mail was tied to your home phone number (am I showing my age yet?). But nowadays, most providers allow you to set up numerous accounts under one name. You don't have to provide any proof of who you are, but you usually have to supply a phone number. And a big whoop-dee-doo to that; the number to a throwaway phone is acceptable. It would take one low, Millennial staffer to set up numerous e-mail accounts for HRC (not in her name, of course), hand over the account names and passwords, and forget it ever happened. Hillary could have been sharing God Knows What for years and no one would have been the wiser.
Drug Dealer Phones
Throwaway Phones: It's not only drug dealers that want to avoid jail time. Hillary Clinton's aides admitted to smashing up her mobile devices with hammers; any info on these phones would have been lost. Hillary could have sent thousands of e-mails or texts to Huma's shared laptop from those throwaway phones, knowing full well that short of Weiner sending photos of his weiner to a 15 year old, no one would ever find those e-mails.
You understand what I'm saying, right? I'm saying Huma shared that laptop on purpose, so she could claim it wasn't hers, if the feds came a' knockin'. Only her husband is kind of an idiot, so ...
Kinda Like a Walkie Talkie
Device Sharing Apps: Apple allows users to send information from one device to another through an app called AirDrop. That information doesn't go through the internet. Hillary could have taken photos of documents or screen shotted e-mails, then dropped them onto another device. And I don't think it is a wild assumption to think that if the wrong people were in the right place at the right time, they could have intercepted those drops, no problem.
Send Me A Link
Online Sharing: Dropbox, iCloud, and even photo sharing sites like Flickr or Photobucket allow users to upload huge amounts of data. Flickr allows people to upload a terabyte of data for free. Hillary could have uploaded countless gigabytes of data to any online sharing site, then sent Huma links to access the files. I'm not saying that this is what the FBI found on Huma's laptop, but it is a possibility.
Memory Cards and Memory Sticks: Yes, they still exist, and you can still transfer data from one device to another using old school memory devices. But when you're done with them, you have to smash them to bits with a hammer.
Again, I'm no computer expert, and neither is Hillary. But do you really think that Hillary doesn't have the money or power to hire someone who is an expert, someone who could hide information from the FBI, and show her how to do the same? Someone who could show her how to share data without using the internet, without a trace.
I don't understand Hillary followers' blind allegiance to her cult of personality; she is not an enigmatic character. She's no Mussolini, with his screaming tirades. She's no Stalin, with his steely, paternal gazes. She's just that chick who has put up with a whole lot, and has come too far to let anything get in her way now. She is the worst kind of relentless opportunist, going to any length to claw her way to the top.