ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

John Podesta, #pizzagate, and Why You Should Care About Hillary Clinton's Pre-Election E-Mail Scandal

Updated on January 26, 2019
Looks like a police sketch of Anthony Weiner to me ...
Looks like a police sketch of Anthony Weiner to me ... | Source

Update: In case you don't follow alt-news, a scandal has been circulating for about a month regarding a pizza joint in Washington, D.C., Comet Ping Pong Pizza.

When Wikileaks released more e-mails prior to the election, the same people who normally scour the contents of the (mostly dull) e-mails came across something disturbing: e-mails between John Podesta, Hillary Clinton’s campaign chairman, and several other people. These e-mails strongly suggest that they are involved in a child sex trafficking ring.

Is this the information that was uncovered on Weiner's laptop? Why did Comey choose to drop his investigation against Clinton? Is Comey himself involved in the Comet Ping Pong scandal?

My discussion of the manner in which this information could have been shared is still valid ... but the new question is: How bad was that information? Anthony Weiner strongly resembles a sketch of a rape suspect in an overseas case ... was there evidence on his laptop that could indict him?

This scandal involves the elite of Washington, D.C., and they won't go down without a fight. It's only showing up on Facebook now, so let's see how it plays out over the next month.

On Friday, the FBI announced that it was reopening the investigation into Hillary Clinton's e-mail scandal. They cited evidence found on a laptop that Huma Abedin shared with her creep husband, former New York Congressman Anthony Weiner.

This morning, a few of my friends posted a link to an article that boldly declared that the new FBI e-mail investigation doesn't matter because whatever the FBI found on that laptop - which could be e-mails, photos, screen shots, Word documents ... you name it - didn't come from Hillary's server.

First: We're going to ignore that this information was found on a shared laptop, because it sounds absurd that a powerful and well-connected person like Huma Abedin wouldn't have her very own laptop. Yes, I am asking you to ignore that the woman who is the assistant and close personal confidante to the Democratic Party's Presidential Nominee was sharing her computer with a man who destroyed his life because he couldn't keep it in his pants. And continued not keeping it in his pants.

Suspending Reality in T minus 10 seconds.

Hillary Clinton desperately waves to her ever-diminishing fan base.
Hillary Clinton desperately waves to her ever-diminishing fan base. | Source

Secret Love

And let's address that big grey animal over there.

Why don't people take the rumors of a Huma/Hillary love affair more seriously? They're both married to terrible men that they should have left years ago. On the one hand, Hillary supporters celebrate the LBGTQ community; on the other, HILLARY COULD NOT POSSIBLY BE A LESBIAN (said in a clear and concise tone with a hint of offense). It's widely know that liberal darling Eleanor Roosevelt was a lesbian, so is it that far of a stretch to think Huma and Hillary have a "thing?" And would it really be that bad?

Cuz, see ... I hate Hillary, but not because she's possibly a closet lesbian. Let's be honest: It would explain a lot.

And here's the thing: It doesn't matter if they're having an affair, except in the context of scandals like the FBI finding secret e-mails on Huma's laptop. Because a secret lover would go to great lengths to carefully guard the secrets of her beloved.

It's Not Hard To Be Sneaky

I'm no expert at computers; I'm somewhere between the grandparents that have to be reminded not to open the e-mails from Nigerian princes or send their SSN to the "IRS," and the teenager that knows about a new app or social network 10 seconds after it hits the internet.

But I do know there are ways to share information between devices and across the web without getting caught. And it's neither difficult nor illegal.

People talk about using the Dark Net, but if you're some regular schmo whose darkest thoughts involve buying pot or renting a hooker, you probably have no idea how to access the Dark Net. That is, accessing it without getting caught. So I'll stick to technologies that allow people to communicate in completely normal, legal ways.

If I can figure this stuff out, people like Hillary Clinton and Huma Abedin, with their armies of paid advisors, can certainly figure it out.

You Have How Many E-mail Accounts?

Google It: Anyone can set up as many e-mail accounts as they want. Back in the early days of the internet, it was a lot harder to set up an e-mail address; back in the day, your e-mail was tied to your home phone number (am I showing my age yet?). But nowadays, most providers allow you to set up numerous accounts under one name. You don't have to provide any proof of who you are, but you usually have to supply a phone number. And a big whoop-dee-doo to that; the number to a throwaway phone is acceptable. It would take one low, Millennial staffer to set up numerous e-mail accounts for HRC (not in her name, of course), hand over the account names and passwords, and forget it ever happened. Hillary could have been sharing God Knows What for years and no one would have been the wiser.

The only person dumb enough to share a laptop with Anthony Weiner is someone who is trying to hide something they don't want anyone else to see.
The only person dumb enough to share a laptop with Anthony Weiner is someone who is trying to hide something they don't want anyone else to see. | Source

Drug Dealer Phones

Throwaway Phones: It's not only drug dealers that want to avoid jail time. Hillary Clinton's aides admitted to smashing up her mobile devices with hammers; any info on these phones would have been lost. Hillary could have sent thousands of e-mails or texts to Huma's shared laptop from those throwaway phones, knowing full well that short of Weiner sending photos of his weiner to a 15 year old, no one would ever find those e-mails.

You understand what I'm saying, right? I'm saying Huma shared that laptop on purpose, so she could claim it wasn't hers, if the feds came a' knockin'. Only her husband is kind of an idiot, so ...

Kinda Like a Walkie Talkie

Device Sharing Apps: Apple allows users to send information from one device to another through an app called AirDrop. That information doesn't go through the internet. Hillary could have taken photos of documents or screen shotted e-mails, then dropped them onto another device. And I don't think it is a wild assumption to think that if the wrong people were in the right place at the right time, they could have intercepted those drops, no problem.

Send Me A Link

Online Sharing: Dropbox, iCloud, and even photo sharing sites like Flickr or Photobucket allow users to upload huge amounts of data. Flickr allows people to upload a terabyte of data for free. Hillary could have uploaded countless gigabytes of data to any online sharing site, then sent Huma links to access the files. I'm not saying that this is what the FBI found on Huma's laptop, but it is a possibility.

Old School

Memory Cards and Memory Sticks: Yes, they still exist, and you can still transfer data from one device to another using old school memory devices. But when you're done with them, you have to smash them to bits with a hammer.

Again, I'm no computer expert, and neither is Hillary. But do you really think that Hillary doesn't have the money or power to hire someone who is an expert, someone who could hide information from the FBI, and show her how to do the same? Someone who could show her how to share data without using the internet, without a trace.

I don't understand Hillary followers' blind allegiance to her cult of personality; she is not an enigmatic character. She's no Mussolini, with his screaming tirades. She's no Stalin, with his steely, paternal gazes. She's just that chick who has put up with a whole lot, and has come too far to let anything get in her way now. She is the worst kind of relentless opportunist, going to any length to claw her way to the top.


    0 of 8192 characters used
    Post Comment
    • Brynn Thorssen profile imageAUTHOR

      Carrie Peterson 

      3 years ago from Colorado Springs, CO

    • Shyron E Shenko profile image

      Shyron E Shenko 

      3 years ago from Texas

      What makes you think there was anything in the e-mail on mr. weiner's computer? What makes you think it was a valid e-mail and not something the little weiner said was on the laptop to get even with Huma because she dumped his sorry bun?

      This brought to mind the limerick:

      There once was a man from Calcutta

      Who went to a fancy dress ball

      He went just for fun

      Dressed as a bun

      And a dog ate him-up in the hall.

      Have a good day.

    • FitnezzJim profile image


      3 years ago from Fredericksburg, Virginia

      Can you share the link to the source that says "They (FBI?) cited evidence found on a laptop that Huma Abedin shared with her husband, former New York Congressman Anthony Weiner."?



    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)