Author Topic: JULIAN ASSANGE ISN’T DONE WITH HILLARY, REVEALS HIDDEN HUMAN TRAFFICKING NETWORK  (Read 2259 times)

0 Members and 1 Guest are viewing this topic.

Offline SirLinksALot

  • Hero Member
  • *****
  • Posts: 4,417
  • Gender: Male
SOURCE: CONSERVATIVE DAILY POST

URL: https://conservativedailypost.com/julian-assange-isnt-done-with-hillary-reveals-hidden-human-trafficking-network/

Posted by Elliot Bougis



I have been reporting for weeks now about the D.C.-based “pizza pedophilia” ring that is being exposed based on thousands of “Podesta emails” released by Wikileaks in the past month or two.

As of last week, the case became even more explosive.

Quote
@lovaliten **ANON FINDS ENCRYPTED DATA IN PODESTA EMAIL PHOTOS** #PizzaGate #DrainTheSwamphttps://t.co/YyFr5uZJyW pic.twitter.com/E7Umdt6XM4

— Thomas Bernpaine (@ThomasBernpaine) November 11, 2016

Now, don’t get nervous because it looks like computer mumbo-jumbo. You only need to remember two things.

1 – Every picture file is actually a code/pattern of numbers that our computers “translate” into images on the screen.

2 – Some “extra” information has been discovered in at least one picture code/pattern from a Wikileaks email.



I reported weeks ago about this “pedo ring” something called “photo steganography,” which is just the fancy term for the two points I explained just now.

The image (.jpg) of the two girls eating pizza was discovered as an attachment in the Podesta emails by Wikileaks. Data can be hidden in a .jpg file. In that image, a zipped directory (PK) was hidden inside. That doesn’t happen by accident. The directory likely contains illegal imagery and/or discussion. It is highly suggestive of illegal activity connected to child pornography, child exploitation, and child abuse.

Some have objected that the pizza.jpg file size is simply too small to contain any useful data (like an image, a link, a message, etc.), but the point is this: all the file would have to “smuggle” is a short password to open a secret website or .zip file. The hidden data could literally just be a few bits of information but it could open up thousands of gigabytes of data in the right website or compressed file. That’s how the users would access the dirty pictures, videos, messages, etc.

So, from a technical angle, this method is very possible, and it makes sense of why the Podesta emails include so many strange photo attachments. Are all those attachments little “Trojan ponies” for sharing images, videos, passwords, payment resources, etc.?

WATCH (Language/NSFW Warning):

CLICK ABOVE LINK FOR THE VIDEO...

Let me be honest:

I have researched corruption cases like this for many years, whether in current events or from historical records. So, I believe I have a somewhat thick skin when it comes to facing human sinfulness and evil like this.

Last Friday night, however, I won’t lie: I totally lost it.

All of a sudden, too many lightbulbs went off at once, too many connections hit me at once, too many implications dawned on me at once–and I just went into a kind of panic attack about how massive this whole cartel is, how well protected it is, and how truly destructive it is in real children’s lives.

If you want to get an idea of what set me off, let me show you three images.

BUT I WARN YOU: When you understand the context, these images are EXTREMELY DISTURBING.

First, here is a photo of Tony Podesta’s favorite work of art in his home:



Tony Podesta is a big fan of “The Arch of Hysteria”

Next, here is an ad from Ping Pong Pizza, a restaurant in D.C. that has numerous, very disturbing connections to pedophilia and D.C. elites like the Podestas.



Next we come to a police photo from the Jeffrey Dahmer case.

VIEWER DISCRETION ADVISED:



I wonder if Tony Podesta would also like this “arch of hysteria”…

Finally, here is the logo for Comet Pizza, another D.C. restaurant with deep connections to Ping Pong Pizza and the Podestas.



Worse, in terms of how protected this satanic ring of perverts is, I recently reported that even the DOJ is compromised.



A man named Arun Rao has shown a disturbing interest in some sexually “creepy” images and expressions that are connected to the Podestas and this pedo ring. The problem is that Rao is an Assistant U.S. Attorney in the DOJ.

Specifically, Rao is Supervisor of the Southern (“Greenbelt”) Division office for the DOJ’s District of Maryland in Chevy Chase, Maryland. This means that Rao’s district is virtually on top of the area in D.C. where Besta Pizza operates. In addition, Besta Pizza and two other associated properties are directly over abandoned underground tunnels, many of which could easily connect to Chevy Chase.

On top of his social and geographical proximity to Alefantis, Rao’s DOJ division handles cases that seem tailor-made for busting—or covering up—the dark circles that sex traffickers hide in: federal racketeering, conspiracy, national and international fraud and corruption, immigration violations, counterfeiting, and—wait for it—child pornography.

In closing I will leave you with three “infographics.”

They are very complicated and “dense” so I don’t expect everyone to examine them.

However, even if you don’t look into the details yourself, I want you to be aware of how vast this whole network of evil is, and, therefore, of how many hands and prayers we need on deck to expose it and bring it down.

(NOTE: You don’t have to download these images to view them. You can just right-click open them in a separate internet browser tab, and click “+” to zoom in.)

Quote
**IMPORTANT** Connection Map in #PizzaGate https://t.co/rPjB8mregF#DrainTheSwamp #BringDownTheRing #ElitePedophilia #FeelTheBern #MAGA

— Thomas Bernpaine (@ThomasBernpaine) November 11, 2016

First, a diagram of “key players” in the pizza restaurant side of the pedo ring. You can see the diagram for yourself here.



Second, a much larger diagram of how this pizza-pedo ring connects to international kidnapping (esp. the Madeleine McCann case) and other DNC allies like “spirit cooker” Marina Abramovic.



Finally, a truly massive diagram of connections that implicate nations and leaders around the world, and put the sex trafficking cartel in the context of a global network of drug dealers, slave traders, murderers, and media elites.



This is an ongoing investigation so stay tuned for more.
« Last Edit: November 17, 2016, 04:43:06 pm by SirLinksALot »

Offline SirLinksALot

  • Hero Member
  • *****
  • Posts: 4,417
  • Gender: Male
Also related:

from r/The_Donald

https://www.reddit.com/r/The_Donald/comments/5dfltq/woman_who_was_investigating_clinton_foundation/

TITLE: WOMAN WHO WAS INVESTIGATING CLINTON FOUNDATION FOR HUMAN TRAFFICKING FOUND DEAD

EXCERPT:


Monica Petersen was in Haiti working for the Human Trafficking Center and also previously worked for the Colorado Human Trafficking Council’s Data & Research Task Force.

She died a few days ago under suspicious circumstances. Her friends on Facebook are looking for answers. Several close friends have made mentions on various FB posts that friends and family have no clear understanding of what happened to Monica except that she died on Sunday.

Earlier this year a FB friend of Monica re-shared a post by Monica where Monica linked to a blog post critical of Hillary Clinton's dealings in Haiti!! SHE WAS ONTO SOMETHING, very likely between now and then she found out about #PIZZAGATE! The linked post was:

http://thehaitianblogger.blogspot.com/2015/03/hillary-clintons-scandalous-conduct-in.html

Search FB for Monica Petersen Haiti. This is a compilation of screenshots where I edited out other people's names but they can still be found via FB search:


http://imgur.com/TmiB2gU

CLICK ABOVE LINK FOR THE REST....

Offline EC

  • Shanghaied Editor
  • Hero Member
  • *****
  • Posts: 23,804
  • Gender: Male
  • Cats rule. Dogs drool.
Can someone with a bit of time translate this into sanespeak please?
The universe doesn't hate you. Unless your name is Tsutomu Yamaguchi

Avatar courtesy of Oceander

I've got a website now: Smoke and Ink

Offline Sanguine

  • Hero Member
  • *****
  • Posts: 35,986
  • Gender: Female
  • Ex-member
For later.  Maybe.

Offline Free Vulcan

  • Technical
  • *****
  • Posts: 23,741
  • Gender: Male
  • Ah, the air is so much fresher here...
If unrefutable proof existed about these high profilers being involved in pedophile rings, and I were rich and not a Christian, every one would be disappeared till they were all gone.
The Republic is lost.

Offline SirLinksALot

  • Hero Member
  • *****
  • Posts: 4,417
  • Gender: Male
Can someone with a bit of time translate this into sanespeak please?

OK, let me take a shot at it....

Connections are being made between the Clinton Foundation (CF) and human (child/sex) trafficking, particularly in Haiti, related to the CF’s Clinton Health Access Initiative (CHAI).

These non-MSM sites are now tying it, granted still tenous, to the pedophile ring they’ve uncovered operating out of Comet Ping Pong Pizza in Washington DC.

Comet Ping Pong is owned/operated by David Brock’s former gay lover, James Alefantis.

Who is Brock you might ask?

He is the head of Correct the Record, the Clinton-tied PAC.

Podesta has been tied to pedophilia, “spirit cooking,” etc. Podesta’s brother, Tony, has also been tied to this.

Tony is the creep (see article above) who has photos (”art”) of naked children throughout his home in VA, and that horrible sculpture of a naked person in the same contorted position in which Jeffrey Dahmer posed his victims.

The loose ends still have to be tied and there is still no smoking gun directly pointing at Bill and Hillary, I'll grant that.

Offline EC

  • Shanghaied Editor
  • Hero Member
  • *****
  • Posts: 23,804
  • Gender: Male
  • Cats rule. Dogs drool.
Thank you.  :laugh:

The universe doesn't hate you. Unless your name is Tsutomu Yamaguchi

Avatar courtesy of Oceander

I've got a website now: Smoke and Ink

Offline Sanguine

  • Hero Member
  • *****
  • Posts: 35,986
  • Gender: Female
  • Ex-member
That was helpful, @SirLinksALot.

Oceander

  • Guest
As an aside, steganography is an interesting topic in itself.  It can be accomplished not only by "hiding" one file inside another (which isn't limited to image files) but also by changing the values of certain pixel data within the image itself to encode the message.  Images like jpg files are particularly useful for this because the images are typically compressed using a lossy compression algorithm (meaning some of the original data cannot be recovered from the compressed file) and because the images are essentially analog (i.e., many shades of color, not just a limited palette, like in gif images); as a result, the additional noise introduced by encoding a message using altered pixel values generally won't be noticeable upon visual inspection of the image.  There are also other techniques that can be used. For example, the jpg file specification allows a thumbnail image to be included in the file along with the main image. That is typically a smaller scale image with less detail.  It can be used for encoding purposes and the altered pixels are even less obvious from a visual inspection of the file.  Also, jpg files can contain a lot of metadata about the image itself; this is so-called exif data because of the file specification it is based on. Most of the data fields are specified in the specification, which is open source; however, the specification allows camera makers to include additional fields that are in a proprietary format that can only be understood using the manufacturers own software (typically, the firmware in the camera itself).  Most camera makers include this additional info.  Since it is by nature proprietary, it would be possible to conceal additional data within this section of the exif data.  Although it would appear corrupted to the manufacturers own hardware, the exif specification requires exif readers to ignore corrupted data, so hidden data in this section would either not be noticed, or would be flagged as corrupted, even by the camera makers own software.  As a result, a casual inspection of the jpg file, even using the makers own software, would probably not reveal the hidden data (but somebody who was already suspicious of the image might decide that apparently corrupted data required further investigation).

Other files can also be used.  For example, pdf files can be used quite easily, particularly if it's a PDF that is (a) a high enough version that it can be edited (editing usually leaves the edited-out information orphaned within the file itself unless the file has been optimized to remove old data that is no longer actively used to build the document that is visible), and (b) uses encryption.  Again, unless one already suspects the file of containing hidden data, the hidden data may not be found.  PDF files have been used to carry malware (they are really tiny programs), so antivirus software will scan them, but unless the antivirus is set to exclude all files containing any data that isn't used to build the visible file, the antivirus software probably wouldn't flag the file as suspicious so long as the hidden data didn't match any of the malware signatures antivirus software uses to identify suspicious files.

Steganography can be quite fun. 

Offline SirLinksALot

  • Hero Member
  • *****
  • Posts: 4,417
  • Gender: Male
Steganography (US Listeni/ˌstɛ.ɡəˈnɔː.ɡrə.fi/, UK /ˌstɛɡ.əˈnɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing".

Oceander

  • Guest
P.s., if you want to see something surprising, find an old PDF file, typically version 1.4, and open it with a simple text editor, like MS Notepad (MS Word won't work, generally).

Offline The_Reader_David

  • Hero Member
  • *****
  • Posts: 2,297
Perhaps everyone should pause to read Umberto Eco's Foucault's Pendulum before exerting any more mental effort in pursuit of this.
And when they behead your own people in the wars which are to come, then you will know what this was all about.