Category Archives: Wikileaks

Trump Fights Back on 3 Fronts: against Antifa, Democrats & Russian conspiracy theory

According to Joey Millar of Jews News, Aug. 17, 2017, Tony Schwartz, the ghost-writer of Donald Trump’s best-selling memoir The Art of the Deal, said President Trump could resign in a matter of weeks in exchange for immunity in the investigation into Russia’s alleged interfering with last November’s presidential election.

Schwartz, who has been a fierce critic of Trump throughout the first seven months of his presidency, said the situation is reaching boiling:

“The circle is closing at blinding speed. Trump is going to resign and declare victory before Mueller and Congress leave him no choice. Trump’s presidency is effectively over. Would be amazed if he survives till the end of the year. More likely resigns by fall, if not sooner. He has gone over the line of acceptability so far there is no return. The Russia stuff will be huge. He doesn’t want to go to jail.”

Really, Schwartz?

Instead of resigning, President Trump is fighting back.

Two days ago, Sean Hannity sent out a series of intriguing tweets:

“3 different fronts”? Um . . . .

Here are three possibilities.

Front #1: Trump DOJ declares war on Antifa

DisruptJ20, a coalition of Antifa groups, was among the communist organizations that planned activities, including terrorist activities, to disrupt the presidential inauguration of Donald Trump on January 20, 2017. (See “Video evidence of the Left’s terrorist plans for Trump inauguration”)

DreamHost, headquartered in Los Angeles, CA, is the firm that hosts DisruptJ20’s website, disruptj20.org.

The Trump administration’s Department of Justice (DOJ) has formally requested that DreamHost turn over 1.3 million IP addresses and other information to “unmask” disruptj20’s subscribers, as part of the investigation into crimes committed on and around January 20 by rioters. 

On July 12, 2017, the DOJ served DreamHost a warrant, ordering the web-host “to assist” law enforcement’s search of its electronic files because the DOJ “has probable cause to believe that in the premises controlled by DreamHost Inc., there is now being concealed property, namely stored electronic communications including but not limited to digital files, records, messages and photographs” that are “in violation of D.C. Code § 22-1322 [on rioting or inciting to riot] involving the individuals who participated, planed, organized, or incited the January 20 riot”.

The warrant specifies that the property to be searched is any “information associated with http://www.disruptj20.org that is stored at premises owned, maintained, controlled, or operated by DreamHost”, including:

“all information in the possession of DreamHost that might identify the subscribers related to those accounts or identifiers, including names, addresses, telephone numbers…, e-mail addresses, business information, the length of service (including start date), means and source of payment for services (including any credit card or bank account numbers), and information about any domain name registration….”

DreamHost is challenging the DOJ warrant, on the grounds that the scope of data requested violates the first and fourth amendments because it is too broad. Interestingly, Goldman Sachs is a major investor in DreamHost. (ZeroHedge)

Front #2: GOP Meets with Wikileaks Julian Assange

On Wednesday, August 16, 2017, WikiLeaks founder Julian Assange met with a U.S. government official for the first time.

GOP Congressman Dana Rohrabacher met with Julian Assange in the Ecuadorian Embassy in London where Assange has been living in political asylum for the past 5 years. The meeting was reportedly set up by conservative journalist Charles C. Johnson, who claimed that Rohrabacher “would be the envoy in charge of bringing back a deal to the Trump White House.”

Rohrabacher said that in the meeting, Assange “reaffirmed his aggressive denial that the Russians had anything to do with the hacking of the DNC during the election. He has given us a lot of information. He said there’s more to come. We don’t have the entire picture yet.”

Rohrabacher said the information he received from Assange would have “an earth-shattering political impact” and that “It wouldn’t be so important if Democrats hadn’t focused so inordinately on the Russians. Democrats are creating a total upheaval over this. I have some information to give the president before I give information to anyone else.” (Breitbart)

That suggests to me that the “earth-shattering” information Assange gave Rohrabacher has to do with iron-clad evidence that, contrary to what the Democrats and their MSM mouthpieces keep insisting, Russia did not hack into the DNC emails nor interfered in the 2016 presidential election.

Rohrabacher is recommending that Assange be pardoned. He told The Daily Caller in an exclusive interview yesterday that Assange is hoping to leave the Ecuadorian embassy and that during the meeting they explored “what might be necessary to get him out.” Rohrabacher said: “if [Assange] is going to give us a big favor, he would obviously have to be pardoned to leave the Ecuadorian embassy.”

Front #3: Imran Awan Indicted

Yesterday, August 17, 2017, Imran Awan, 37, a former IT aide of former DNC chair Debbie Wasserman Schultz, was indicted by a grand jury on four counts including bank fraud and making false statements.

The indictment also includes Awan’s wife Hina Alvi.

Fox News reports that the grand jury decision in U.S. District Court for the District of Columbia comes roughly a month after Awan was arrested at Dulles airport in Virginia trying to flee the U.S. by boarding a plane to his native Pakistan.

Awan and other IT aides for House Democrats have been on investigators’ radar for months over concerns of possible double-billing, alleged equipment theft, and access to sensitive computer systems. Most lawmakers fired Awan in February, but Schultz had kept him on even after Awan had been barred from the House IT network.

The indictment addresses separate allegations that Awan and his wife engaged in a conspiracy to obtain home equity lines of credit from the Congressional Federal Credit Union by giving false information about two properties – and then sending the proceeds to individuals in Pakistan.

Awan and other family members for years had a lucrative arrangement for IT-related work on Capitol Hill for House Democrats, from which the Awan family had made at least $4 million since 2009, according to The Daily Caller.

In a recent interview published in the Sun Sentinel, Wasserman Schultz blamed the “right-wing media circus fringe” for the attention on Awan, and that it’s all part of an effort to distract from the investigation of Russian meddling in the 2016 campaign and possible ties to President Trump’s team.

Her colleagues in Congress, though, say there are serious security implications in her former staffer’s case. “We have to investigate how our systems may have been compromised,” Rep. Ron DeSantis, R-Fla., recently told “Fox & Friends.”

In his IT work in Congress, Awan had access to all kinds of sensitive information. Expect him to sing like canary so as to cut a deal with prosecutors for a lesser sentence.

~Eowyn

Advertisements

CyberBerkut publishes email of Democrat plot to blame Russia for hacking 2016 election

CyberBerkut, founded around 2014, is a Ukrainian nationalist and pro-Russian group of anonymous hacktivists who, as described by Wikipedia, became known for a series of denial-of-service (DDoS) attacks on the pro-West (NATO and the U.S.) Ukrainian government, and on western and Ukrainian corporate websites.

Its name, CyberBerkut or Berkut online, is a reference to Berkut — a special police within Ukraine’s Ministry of Internal Affairs. After the 2014 Ukrainian revolution — in which the Obama State Department was covertly involved — the new pro-West Ukrainian government dissolved Berkut, blaming the special police for most of the nearly 100 civilian deaths. Berkut’s unit in Crimea, which broke away from Ukraine, defected to the Russian Ministry of Internal Affairs and kept its old name.

Indeed, CyberBerkut’s emblem is almost identical to that of Berkut:

CyberBerkut’s activities include:

  • Attacks on NATO websites.
  • Attacks on U.S. private military companies.
  • Publication of correspondence with the United States Embassy in Ukraine and United States foundations (e.g., Clinton Foundation).

In response to CyberBerkut’s hacktivism, the group’s Facebook page is repeatedly blocked, and its website repeatedly disrupted. Indeed, when I tried to assess CyberBerkut’s website this morning, I got the message:

“The site is under attack. Service is temporarily unavailable.”

Yesterday, WikiLeaks sent out a tweet informing us that CyberBerkut just published a batch of emails between Ukraine and Hillary Clinton/Clinton Foundation, with a link to the CyberBerkut webpage.

When you go on the CyberBerkut page, the most intriguing thing comes at the end — an email on January 8, 2017, i.e., after Hillary Clinton had lost the presidential election to Donald Trump, showing the Democrats plotting to manufacture the phony story that Russia had hacked the election.

CyberBerkut claims they were given the email by a “whistleblower” and that the names of the email sender and receiver are blacked out to protect the identity of the whistleblower.

Below is the text of the email, followed by a screenshot of the email:

1/8/2017 10:03 PM

From _____
Subject Re. Elections 2016
To _____

Dear ______

We all agree there is a need to provide technical details on Russian hacking.
____ urges you and _____ to bring up again the issue with _____. It’s quite important, especially as we approach the hearings. If there are no technical details we have to find some by all means. I am sure his guys can do it. We are short of time.

Regards,
_______

Sent from my iPhone

CyberBerkut notes that:

“Our whistleblowers gave us information that Russia was going to face great provocation. The Americans intend to manufacture false evidence of the Russian security services’ involvement in cyber attacks during the U.S. presidential elections 2016.

We cover the names of the provocation facilitators in order not to expose our sources. It is worth saying, a famous American politician and major financier took part in the plot.”

Is the “famous American politician” Hillary Clinton, and the “major financier” George Soros?

See also:

~Eowyn

Fake news CNN unlawfully threatens maker of Trump wrestling GIF; Alt-Media vows revenge

On Sunday morning, July 2, 2017, President Trump tweeted a photoshopped GIF of him downing a wrestler whose face bore the CNN logo.

That’s CNN — the peddler of fake news, whose producer recently admitted on Project Veritas’ hidden camera that the network’s Trump-Russia story is ‘bullshit’ fake news, and contemptuously describes American voters as “Stupid as shit”.

Thin-skinned CNN went on the war path to track down the source of the Trump wrestler GIF to a Reddit poster, rumored to be a 15-year-old teen, who calls himself HanAssholeSolo (HAS). The network’s investigative KFile team then uncovered HAS’s real identity by using identifying information of key biographical details HAS had posted on Reddit and a Facebook search.

On July 4, two days after Trump’s tweet, CNN published an article written by Andrew Kaczynski, the head of CNN’s KFile team — “How CNN found the Reddit user behind the Trump wrestling GIF“.  In the article, Kaczynski describes how his KFile team uncovered HAS’s real identity and contacted HAS, after which HAS publicly apologized for the GIF and confirmed his identity.

Kaczynski writes:

“In the interview [with CNN], ‘HanA**holeSolo’ sounded nervous about his identity being revealed and asked to not be named out of fear for his personal safety and for the public embarrassment it would bring to him and his family.”

Despite the fact that HAS apologized to CNN for the GIF — which HAS is under no obligation to do, as he was simply exercising his Constitutional First Amendment right of free speech when he made the GIF — CNN (via Kacsynski) still threatens to dox (publicly reveal the identity) HAS if he does not behave properly in the future:

“CNN is not publishing ‘HanA**holeSolo’s’ name because he is a private citizen who has issued an extensive statement of apology, showed his remorse by saying he has taken down all his offending posts, and because he said he is not going to repeat this ugly behavior on social media again. In addition, he said his statement could serve as an example to others not to do the same.

CNN reserves the right to publish his identity should any of that change.

Kacsynski also claims that HansAssholeSolo is not 15 but a middle-aged man — which may or may not be true, as there is no way for us to verify the claim, unless HAS actually comes forth and reveals his age and identity.

Kacsynski’s threat was followed by an official statement from CNN:

As WikiLeaks founder Julian Assange points out, CNN and Kacsynski’s standing threat to dox HansAssholeSolo if he ever so much as make fun of CNN again is illegal. According to New York Penal Law §135.60, CNN’s threat is coercion in the second degree and a class A misdemeanor. PEN §135.60 states:

A person is guilty of coercion in the second degree when he or she compels or induces a person to engage in conduct which the latter has a legal right to abstain from engaging in, or to abstain from engaging in conduct in which he or she has a legal right to engage, or compels or induces a person to join a group, organization or criminal enterprise which such latter person has a right to abstain from joining, by means of instilling in him or her a fear that, if the demand is not complied with, the actor or another will:

1. Cause physical injury to a person;  or

2. Cause damage to property;  or

3. Engage in other conduct constituting a crime;  or

4. Accuse some person of a crime or cause criminal charges to be instituted against him or her;  or

5. Expose a secret or publicize an asserted fact, whether true or false, tending to subject some person to hatred, contempt or ridicule;  or

6. Cause a strike, boycott or other collective labor group action injurious to some person’s business;  except that such a threat shall not be deemed coercive when the act or omission compelled is for the benefit of the group in whose interest the actor purports to act;  or

7. Testify or provide information or withhold testimony or information with respect to another’s legal claim or defense;  or

8. Use or abuse his or her position as a public servant by performing some act within or related to his or her official duties, or by failing or refusing to perform an official duty, in such manner as to affect some person adversely;  or

9. Perform any other act which would not in itself materially benefit the actor but which is calculated to harm another person materially with respect to his or her health, safety, business, calling, career, financial condition, reputation or personal relationships.

The backlash against CNN-Kacsynski’s threat is swift and furious:

(1) On July 4, 2017, the chat forum 4chan‘s very resourceful /pol/ politically incorrect section declared war on CNN, vowing to utterly destroy the network. Here’s their “Declaration of War on CNN“:

“Sirs and madams,

Herein contained in this post is /pol/’s formal declaration of war against CNN. Your news agency has for years produced propaganda designed to brainwash the public at large into your sick worldview, and has non-stop endlessly harassed the good men and women of our website and in the right-wing at large. Your latest threat to dox an individual for creating a harmless meme is just another example of your malignant nature and the urgent need to shut your organization down for good.

That is why the ascendant nation of /pol/ has unanimously agreed that all of our resources will be put to the goal of ending your reign of terror. Do not take this lightly. We have the best cyber hackers in the world. We have access to memes that will forever damage the psyche of your company and its employees. We could bring you to heel with zero casualties if we so wanted. As such, we are offering you a chance to surrender now by our terms.

-Total surrender/ dismantlement of CNN and its sister companies and investigative organs
-Criminal prosecution by an impartial tribunal to accordingly sentence everyone involved in CNN and its crimes
-Immediate retraction of all hit pieces and false stories against the President of the United States along with an apology
-Cede all of CNN’s current economic and fiduciary assets to a private fund organized by representatives of /pol/ to be used for the development of new, alternative media organizations which will replace CNN
-Well-written apology to the person CNN threatened to dox

You have one week from the time of this posting. Our people will make certain that you see this message. Remember, we are anonymous. We do not forgive and we do not forget.

We’re waiting.”

And as promised, 4chan and other netcitizens delivered and will continue to exact retribution against CNN.

(2) On July 4, a 4chan poster discovered that Andrew Kaczynski follows the Church of Satan on Twitter. Is Kaczynski, like John Podesta, also a spirit-cooker?

(3) On July 5, netcitizens gave Andrew Kaczynski a taste of his own “dox” medicine by posting Kaczynski’s personal info. to pastebin and here.

(4) Someone did the research and discovered CNN is an All Jew Network, which defies the law of probability (click image below to enlarge):

(5) Reporting for the liberal Daily Caller on July 5, 2017, Betsy Rothstein claims that CNN staff have had their home addresses published and received anti-Semitic threats and accusations:

“Several anchors and reporters at CNN have had their home addresses published and have received threats of rape and other violence in the wake of a story published by Andrew Kaczynski . . . . Anti-network trolls are encouraging viewers to wrongly accuse CNN staffers of pedophilia and child pornography. There is also ‘tons of anti-Semitism.’”

Indeed, a 4chan netcitizen posted this list of home addresses of six CNN hosts and correspondents.

(6) Meme-makers got busy and created even more Trump vs. CNN pictures and GIFs. If the network had a hissy fit over the Trump wrestling GIF, this compilation is sure to give CNN honchos a stroke:

In this war, my bets are on 4chan.

Bring out the popcorn!

See also:

H/t Jim Stone and FOTM‘s MCA, MomOfIV, and Will Shanley.

UPDATE:

CNN’s ratings are plummeting. From Daily Caller, July 6, 2017:

CNN has fallen to #13 in cable TV rankings, according to weekly numbers posted on Thursday by TV Newser.

The ratings slide comes as the network has come under heavy scrutiny for a variety of journalistic missteps, including the retraction of an article alleging that a Trump associate had illicit Russian business ties.

Fox News and MSNBC are listed as first and second, respectively, in the cable rankings, which measured average audience sizes for the period between June 26 and July 2. Fox News drew an audience of around 1.82 million while MSNBC drew an audience of 1.34 million. CNN had only 711,000 viewers on an average day during the measurement period.

To give some perspective to CNN’s average daily rating of 711,000 viewers:

Fellowship of the Minds, this humble little-known blog with a handful of unpaid volunteer writers, had its best day on August 21, 2014, when we got a phenomenal 355,340 unique views. That’s half of the 711,000 average daily rating of international cable TV and corporate giant CNN, whose anchors are paid $millions.

~Eowyn

Pizzagate: The Podesta ‘pizza’ emails

Did you know that four days ago on Tuesday, June 27, 2017, John Podesta testified before Congress in a closed-door hearing?

Here’s a tweet from Alt-Media journalist Jack Posobiec of Rebel Media:

John Podesta is a longtime Democratic Party operative who was White House chief of staff in Bill Clinton’s administration, White House counselor in the Obama administration and, most recently, chairman of Hillary Clinton’s 2016 presidential campaign.

He is also the namesake of a collection of very curious emails published by WikiLeaks just days before the 2016 presidential election. The emails contain cryptic references to “pizza” and other food items (“hotdogs”; “pasta”; “tempting” “cheeses”; “yummy” “sauces”), believed by many in the Alternative Media to be code words that pedophiles use to communicate with each other about their criminal activities. One of the parties in those emails is James Alefantis, a former boyfriend of powerful Democratic Party operative and Clinton loyalist David Brock. Though only a pizzeria owner (of Comet Ping Pong  near Capitol Hill), Alefantis was named by GQ magazine as the 49th most powerful person in Washington, DC.

It is the Podesta “pizza” emails that gave rise to the term “Pizzagate”.

Certainly, the late Andrew Breitbart had thought Podesta to be a pedophile. A year before his sudden death from a heart attack, though he was only 43 years old, Breitbart in a tweet called Podesta a “cover-upperer” for a “world class” child sex slave operation.

That there are pedophiles in Washington, D.C. is not farfetched given the Franklin child sex ring scandal of 1988-1991 which involved GOP élites in Washington, D.C., and prominent citizens and Boys Town of Nebraska. The scandal was documented in two books:

MSM and even Alt-Media journalists like Wayne Madsen and Alex Jones dismiss Pizzagate as a “conspiracy theory” by tinfoil hat-wearing loonies (see “Failure of American Journalism: Pizzagate and the muzzling of Ben Swann” and “Alex Jones apologizes for Pizzagate ‘fake news’ on eve of March on D.C.”). They would have us instead believe that powerful and very busy D. C. élites like Podesta and 49th-most-powerful Alefantis spend their time incessantly chatting about pizzas in emails.

I have NEVER talked about pizza (or any food) in my emails. Have you?

It is to those Podesta pizza emails that we now turn.

Podesta “Pizza” Emails

Out of WikiLeaks‘ 2,060 Podesta emails, there are 149 references to “pizza”, 73 “hot dog”, 85 “cheese”, 78 “pasta”, 41 “sauce”, 84 “ice cream” and 47 “walnut” — all in very bizarre contexts that have nothing to do with food.

Below is a sample of the Podesta “pizza” emails. See if you can make any sense of them without resorting to code-words.

Here are the senders and recipients of the above “pizza” emails in alphabetical order, and, where relevant, what they wrote in the “pizza” emails:

(1) James Alefantis <jamesacorp@gmail.com>, the 49th post powerful person in Washington DC. On Oct. 4, 2008, he wrote to John Podesta presumably about a fundraiser at Comet:

“Great show! Great speech. Raised over 40 grand. My only regret is I did not make you a nice pizza. When can I?”

On March 19, 2016, at 5:30 PM, Alefantis sent a joke logo for a “Hillary party” (fundraiser?) to John Podesta’s brother, Tony (#13 below) and Nora Cox-Peled (#3 below) with this email message:

“My graphics guy sent this. No not forward 🙂 “

Note what the arrow in Hillary’s logo is doing to the pizza:

(2) Catherine Chieco <crchieco@gmail.com>, a D.C. writer/consultant who donated $1,000 in 2004 to the John Kerry presidential campaign. On Oct. 20, 2015, at 6:22 pm, she wrote to James Alefantis and others re. “Friday night at posto for Tony [Podesta]’s birthday”:

“Will you join us? Small gathering a few days before the pizza extravaganza. Time PDA but probably 7:30 ish. RSVP please!”

(3) Nora Cox-Peled <npeled@podestagroup.com>, Special Assistant to the Chairman (John Podesta), Podesta Group, August 2015 to August 2016.

(4) Tom Cunningham <Tom.Cunningham@uatp.com>, Vice President of Business Development at Universal Air Travel Plan Inc. (UATP), Washington, D.C.; former legislative assistant to a U.S. Representative.

(5) Leslie Dach <leslie.dach@outlook.com>, businessman; as Senior Counselor at DHS of Obama administration, he worked on promoting Obamacare; aide in Clinton administration; former Executive VP at Wal-Mart (Wikipedia).

(6) Paula Dailey <paulapix@starpower.net>, artist/writer/editor at Artz Road Studios, Washington DC (LinkedIn).

(7) Brian Dailey <brian.d.dailey@artzrs.com>, 65-year-old husband of Paula Daily; a D.C. “artist noted for his careers in both art and international relations,” whose life experiences “include national level involvement in arms control, space policy, intelligence systems, and international security” in the Pentagon, Senate Armed Service Committee, Senate Select Committee on Intelligence, and White House National Space Council. (Wikipedia)

(8) Mary Dickie <maryadickie@gmail.com>, nutritionist/dietician in Washington, DC. (Source)

(9) Peter Kadzik <peterkadzik@gmail.com>, Assistant Attorney General of the Obama administration; close friend of John Podesta who dined together the day after Hillary Clinton’s Benghazi testimony before the House. (Gateway Pundit)

(10) Alan Kriegel <ajkriegel@gmail.com>:

  • I found a Twitter account of an Ari Kriegel @ajkriegel, but it’s set to private.
  • I found an Elan Kriegel, who was Director of Analytics for Hillary Clinton’s presidential campaign. (Politico)
  • FOTM reader Maryaha found an Alan J. Kriegel, who was or is an attorney at Skadden Law in DC. He attended Georgetown University Law Center, and is listed as a First Year Student 1974/75. His wife is Hinda S. Kriegel. The addresses linked to him are all in the same area as Comet Ping Pong. Here is another email between Alan and John Podesta from Wikileaks: https://wikileaks.org/podesta-emails/emailid/4232

(11) John Podesta <john.podesta@gmail.com>, chairman of 2016 Hillary Clinton presidential campaign. On Sept. 4, 2014, at 2:28 am, he responded to an email from Susan Sandler (see #14 below) re. “Did you leave a handkerchief“:

“It’s mine, but not worth worrying about.”

On March 3, 2016, at 6:40 pm, he wrote in response to an email from his brother, Tony, one of the most powerful Democrat lobbyists in Washington, D.C.:

“I’m going to pass. I have too much to do before heading to Michigan tomorrow. No need for pizza.”

(12) Mary Podesta <podesta.mary@gmail.com>, wife of John Podesta.

(13) Tony Podesta <podesta@podesta.com>, John’s brother. On March 3, 2016, he wrote to John Podesta:

“29 at between park and Madison right around corner. Let me know. Or I could bring a pizza home.”

On Jan. 6, 2014, at 10:12 pm, he wrote:

Mary not free. Would love to get a pizza for an hour? Or come over”

(14) Herbert Sandler <hms@sandlerfoundation.org>, billionaire father of Susan Sandler (#15 below); Herbert and wife Marion, as CEOs of Golden West Financial Corporation and World Savings Bank, were notorious players in the 2008 financial crisis. On Dec. 24, 2015, Herbert Sandler wrote to John & Mary Podesta:

“Mary and John, I think you should give notice when changing strategies which have long been in place. I immediately realize something was different by the shape of the box and I contemplated who would be sending me something in the square shaped box. Lo and behold, instead of pasta and wonderful sauces, it was a lovely, tempting assortment of cheeses, Yummy. I am awaiting the return of my children and grandchildren from their holiday travels so that we can demolish them. Thank you so much. I hope you and your gang are well. I miss you both. Best wishes fro a merry Christmas and Happy New Year. Herb. Ps. Do you think I’ll do better playing dominos on cheese than on pasta?”

(15) Susan Sandler <ses@sandlerfoundation.org>, daughter of Herbert Sandler; member of Democracy Alliance, a powerful money group that funds Black Lives Matter (see “The white elites who fund Black Lives Matter“). On Sept. 2, 2014, at 2:54 pm, she wrote to John Podesta:

“Hi John, The realtor found a handkerchief (I think it has a map that seems pizza-related.) Is it yorus [sic]? They can send it if you want. I know you’re busy, so feel free not to respond if it’s not yours or you don’t want it.”

(16) Eryn Sepp <eryn.sepp@gmail.com>, assistant to John Podesta at the Center for American Progress (CAP).

(17) Todd Stern <SternTD@state.gov>, appointed by then-Secretary of State Hillary Clinton to be U.S. Special Envoy for Climate Change (2009-April 1, 2016). On Sept. 3, 2015, at 5:17 PM, he wrote to John Podesta:

“The next three months are going to be rougher internally than in Beijing. Between 7th and 1600, no fun. Hope you’re doing ok. I’m dreaming about your hotdog stand in Hawaii…”

(18) Kathryn Tate <kathy@ktate.com>, . On Sept. 2, 2014, at 10:04 AM, she wrote this email to Susan Sandler, cc Herbert Sandler, re. “You left something at the Field house”:

“Susan & Herb, I just came from checking the Field house and I have a square cloth handkerchief (white w/ black) that was left on the kitchen island. Happy to send it via the mail if you let me know where I should send it. I also meant to inquire yesterday about the pillows you purchased. I can send them as well, if you let me know where they are in the house.”

(19) Amy Weiss <Amy@weisspublicaffairs.com>, longtime Democratic Party operative; White House Deputy Assistant to the President/Deputy Press Secretary to President Bill Clinton; Communications Director for the Democratic National Committee. (Source)

(20) Rhett Workman <rhett.workman@aa.com>, Managing Director of Government & Airport Affairs for American Airlines.

Law enforcement authorities and online Urban Dictionary-like resources have identified the words in the Podesta emails, such as “pizza”, “hotdogs”, “cheese”, “sauce”, “pasta”, “handkerchief” and “map”, as code words for child sex trafficking. Writing in code words provide pedophiles a cover story in the event their communications, such as the Podesta emails, are discovered.

Below are the code words, according to The Daily Sheeple and others on Alt-Media, and examples from the Podesta emails. The words between brackets are the translations of the pedophile code words:

  • “cheese” = little girl
    • Herbert Sandler to John Podesta: “Lo and behold, instead of pasta [little boys] and wonderful sauces, it was a lovely, tempting assortment of cheeses [little girls]”
  • “hotdog” = boy
    • Todd Stern to John Podesta: “I’m dreaming about your hotdog [boy] stand in Hawaii…”
  • “ice cream” = male prostitute
  • “map” = semen
    • Susan Sandler to John Podesta: “The realtor found a handkerchief (I think it has a map [semen] that seems pizza [girl]-related). Is it yours?”
  • “pasta” = little boy
    • Herbert Sandler: “Do you think I’ll do better playing dominos on cheese [little girls] than on pasta [little boys]?”
  • “pizza” = girl
    • Tony to John Podesta: “Or I could bring a pizza [girl] home” “Would love to get a pizza [girl] for an hour?”
    • John to Tony Podesta: “I’m going to pass. I have too much to do before heading to Michigan tomorrow. No need for pizza [girl].”
    • James Alefantis to John Podesta: “My only regret is I did not make you a nice pizza [girl]. When can I?”
  • “sauce” = orgy
  • “walnut” or nuts = person of color

Urban Dictionary confirms the meanings of some of the terms:

  • cheese pizza: child pornography
  • pizza: code word for pussy
  • pizza: a girl’s vagina or pussy
  • pizza: code name for rough sex, bondage
  • pizza: code name for sex
  • hotdog: hotdogging is when “one man puts his penis in between the buttcheeks of the other and wiggles it it around, not penetrating, thus creating a hot dog”.
  • hotdog: a semi-hard penis
  • hotdog: butt sex
  • map: Australian slang for the female pubic region

Once you plug in the codes, the cryptic Podesta emails that otherwise make no sense, become comprehensible.

As Kim Holleman, an MIT Media Lab  visiting scholar and research affiliate (2013–2017), wrote in an article for Medium, June 5, 2017:

“What is interesting to me, is that we are all adults here. We all know code language when we use it. We all know code language when we see it. If I want to convey something covert to a colleague or friend, I use code…. This is the nature of code. It hides something. Once the code is ‘revealed’, you can never again occupy the same awareness you did before the information was ‘uncoded’….

All someone has to do is ask him [John Podesta] directly about the email codes, or the instagram photos, or the obsession with dark art, art about child abuse and art about cannibalism, art about beheading and autopsies-or ask him why he speaks fondly of his friend, Dennis Hastert, a convicted child rapist.”

Was Podesta asked about the “pizza” emails in his closed-door hearing before Congress on Tuesday?

I doubt it.

See also:

~Eowyn

Pedogate and the attempted assassination of Rep. Steve Scalise

On the morning of June 14, 2017, at 7:09 am at a practice of the Republican team for the Congressional Baseball Game in a public park (Eugene Simpson Stadium Park) in Alexandria, VA, about 10 miles from Washington, DC, a Bernie Sanders supporter named James T. Hodgkinson of Illinois opened fire with a rifle on the Republicans, shooting and wounding Congressman Steve Scalise (R-LA) and three other people. (Wikipedia)

As reported by Fox News, Sen. Jeff Flake and former combat surgeon Rep. Brad Wenstrup ran to assist Scalise after U.S. Capitol Police shot and killed Hodgkinson, 66, who had a violent history including arrests for battery, resisting arrest and drunken driving. Senator Rand Paul, also a witness, said he heard “as many as 50 shots”. Calling the scene “sort of a killing field,” Paul said, “We were like sitting ducks. Without the Capitol Hill police it would have been a massacre.”

Shot in the hip, Rep. Scalise was the only member of Congress to be hit. The other three who were wounded are:

  • Zack Barth, a congressional aide to Rep. Roger Williams (R-Texas).
  • Tyson Foods director of government relations Matt Mika was shot multiple times and was in critical condition.
  • Special Agent Crystal Griner was shot in the leg. Rep. Mo Brooks (R-Ala) used a belt as a tourniquet to stop the bleeding.

Initially conscious after being shot, Scalise went into shock while being taken to MedStar Washington Hospital Center in critical condition, where he underwent immediate surgery. MedStar is the same hospital to which Seth Rich — believed to the source of the damaging DNC emails published by WikiLeaks — was brought after being shot in a residential D.C. neighborhood early Sunday morning, July 10, 2016. Rich died in MedStar under suspicious conditions.

MedStar surgeon Dr. Jack Sava — said to have been Seth Rich’s surgeon as well — said Scalise had been hit by a single rifle bullet that “traveled across his pelvis, fracturing bones, injuring internal organs, and causing severe bleeding”. Sava  said that when Scalise arrived at the hospital, “he was in critical condition with an imminent risk of death,” but that after surgery by June 16, although still in critical condition, “We have controlled internal bleeding and his vital signs have stabilized”. On June 17, Scalise’s condition was upgraded to “serious” and he was responsive enough to talk with his family. He will required additional operations to manage abdominal and bone injuries.

Stephen Joseph Scalise, 51, is House Majority Whip and the representative for Louisiana’s 1st congressional district, serving since 2008. Scalise endorsed President Trump during last year’s presidential campaign, and has been a vocal backer of Trump’s travel ban. As chair of the House Republican Study Committee, he has spearheaded the effort to repeal and replace ObamaCare.

The buzz in the Alternative Media is that Scalise was targeted because of his strong stance against child predators and sex trafficking. Seven reasons are cited in support:

(1) Hodgkinson specifically targeted Republicans

Rep. Ron DeSantis (R-Fla.), who left the baseball practice just before the shooting, told Fox News that as he was walking to his car, a man asked him if it was Republicans or Democrats practicing. About 3 minutes later, at around 7:09 a.m., the shooting began. DeSantis said James Hogkinson was the man who had approached him.

In fact, Hodgkinson had a “kill” list of names of conservative Republican Congressmen in his pocket at the time of the shooting. (Fox News)

(2) Rep. Scalise has spoken out on child sex predators

(3) Scalise is a co-sponsor of a bill to criminalize those who make, facilitate, use, or transmit “visual images” of child sex

Scalise is one of 6 co-sponsors of H.R. 1761: Protecting Against Child Exploitation Act of 2017, which amends title 18, United States Code, to criminalize the knowing consent of the visual depiction or live transmission of a minor engaged in sexually explicit conduct, and for other purposes, including the amendment of subsections (a) and (b) of Section 2251 of title 18, United States Code to read as follows:

“(a) Any person who, in a circumstance described in subsection (f), knowingly—

“(1) employs, uses, persuades, induces, entices, or coerces a minor to engage in any sexually explicit conduct for the purpose of producing any visual depiction of such conduct, or transmitting a live visual depiction of such conduct;

“(2) produces or causes to be produced a visual depiction of a minor engaged in any sexually explicit conduct where the production of such visual depiction involves the use of a minor engaging in sexually explicit conduct and such visual depiction is of such conduct;

“(3) transmits or causes to be transmitted a live visual depiction of a minor engaged in any sexually explicit conduct;

“(4) has a minor assist any other person to engage in any sexually explicit conduct during the commission of an offense set forth in paragraphs (1) through (3) of this subsection; or

“(5) transports any minor in or affecting interstate or foreign commerce with the intent that such minor be used in the production or live transmission of a visual depiction of a minor engaged in any sexually explicit conduct,

shall be punished as provided under subsection (e).

(b) Any parent, legal guardian, or person having custody or control of a minor who, in a circumstance described in subsection (f), knowingly permits such minor to engage in, or to assist any other person to engage in, sexually explicit conduct knowing that a visual depiction of such conduct will be produced or transmitted shall be punished as provided under subsection (e).”

HR 1761 was passed by the House of Representatives on May 25, 2017. The bill was received in the U.S. Senate on June 5, and referred to the Senate Committee on the Judiciary.

(4) New York Times tipped off the shooter on the Congressional baseball practice field

From a NYT article by Nicholas Fandos on April 12, 2017:

“When members of Congress practice in the early mornings in an Alexandrea, Va., public park for their Congressional Baseball Game, plainclothes United States Capital Police are sitting there in a black S.U.V.”

(5) President Trump knows

On June 14, the day of the shooting, President Trump and First Lady Melania made a surprise, unscheduled visit to Rep. Scalise at MedStar. They were accompanied by Trump’s personal physician, Dr. Ronny Jackson. (New York Daily News)

The Alt-Media say this is Trump’s way of ensuring Scalise’s survival by sending a message to Pedogate that he is watching them.

(6) Democrats sent pizzas to Scalise’s staff

By now, anyone acquainted with Pizzagate cannot help but associate pizza with peodphiles.

Given that, it is curious that on the day of the shooting, staffers for House Minority Whip Rep. Steny Hoyer (D-Md.) were seen carrying several boxes of pizza to Scalise’s office. (The Hill)

(7) John Podesta wanted Rep. Scalise to resign

In 2015, John Podesta, chair of Hillary Clinton’s failed presidential campaign and a prime player in Pizzagate, was part of a signature drive in a petition to get Scalise to resign.

Here’s the email published by WikiLeaks:

So, do you think Congressman Scalise was targeted because of his stance on Pedogate? Sound off in our poll!

By the way, two days ago, AltMedia journalist Jack Posobiec tweeted that a source told him “the Podesta case is open,” implying that the FBI is investigating John Podesta.

Please pray that the evildoers be brought to justice.

UPDATE (July 6, 2017):

After undergoing multiple surgeries, Rep. Scalise was transferred out of the ICU on June 22, and was listed in fair condition.

Today, however, MedStar Washington Hospital Center announced he is in “serious” condition and has been readmitted to the intensive care unit due to “new concerns for infection”. (New York Post)

We must fight the evil ones with the light of Christ. Please pray for Steve Scalise.

~Eowyn

Democrat operative David Brock’s chat shows NSA surveillance used to identify and disable online Trump supporters

David Brock is a Clinton loyalist, apparatchik for the Democrat Party as founder of Media Matters, and the former boyfriend of Comet Ping Pong owner James Alefantis who, though a “mere” pizza restaurateur, was named by GQ magazine as 49th among the 50 most powerful people in Washington, D.C.

8 months ago in September 2016, someone hacked into Correct the Record — a Hillary super PAC founded by Brock — and obtained the transcript of a conversation between Brock and three other Democrat operatives the morning after the first presidential debate on Sept. 26 between Donald Trump and Hillary Clinton. The transcript was posted on Reddit and other sites.

Although the Sept. 26 debate was rigged to favor Hillary by outfitting her podium with a teleprompter (see “Hillary used a teleprompter during first debate with Trump”), the post-debate polls all had Trump as the winner, which prompted the morning-after chat between Brock and the three Democrat operatives:

  • ekim
  • efink: Elliot Fink, HR office manager/executive assistant of Correct the Record
  • cshaw: Connor Shaw (?), Special Projects, Correct the Record.

The chat is interesting and significant for at least two reasons:

(1) Referring to Hillary Clinton as “the sick thing,” Brock et al. were surprised by how good Hillary or her imposter looked in the debate (“whoever that was, she looked pretty good. how tf did they do that?” “i can’t talk. very hush hush.”) because just “a couple of weeks” before the debate, Hillary had performed poorly on two cognitive impairment tests:

  • A score of 3 on AMTS — Abbreviated Mental Test Score, a 10-question test to access elderly patients for the possibility of dementia. A score of 7-8 or less suggests cognitive impairment at the time of testing, although further and more formal tests are necessary to confirm a diagnosis of dementia, delirium or other causes of cognitive impairment.
  • A score of 22 on MMSE — Mini-Mental State Examination, a 30-point questionnaire that is used extensively in clinical and research settings to measure cognitive impairment and to screen for dementia. Any score below 24 can indicate severe (≤9 points), moderate (10–18 points) or mild (19–23 points) cognitive impairment.

(2) Panicking that Hillary had lost the debate (“we’re losing 100%”; “Trump made her look like a girl.”), and recognizing that Trump’s supporters are “enthusiastic” and “organized,” Brock et al. vowed they “have to stop the bleeding” and must “hit back hard” with new methods because “the usual means” of online trolling (“disruption scripts” and “down-voting”) “isn’t working” and because Trump supporters are sub-human “deplorables”.

Brock et al. said “we need to start hurting people” by deploying NSA spy software, specifically FOXACID, on Reddit, Twitter, 4chan and 8chan posters, identifying their leaders, getting their IP addresses, doxing (obtain personal information of an Internet poster, including real name, known aliases, address, phone number, SSN, credit card number, etc.), tracking their online activities , and infecting their computers with “magic lanterns” — viruses that log the keystrokes of the infected computer. For all of which Brock said “we have full clearance. Word of God.”

FOXACID is a National Security Agency (NSA) software designed to hack into  target computers with spam and QUANTUM — a program where servers deployed at key places on the Internet backbones impersonate legitimate Web sites and trick the target’s browser into visiting a FOXACID server. If the target’s browser is exploitable, further permanent “implants” (rootkits etc.) are deployed in the target computer, e.g. OLYMPUSFIRE for Windows, which give complete remote access to the infected machine.

The chat ended with Brock ordering the three operatives to compile a list of information on more than a thousand online posters. After Brock logged off the chat, one of the operatives asked what Brock would do with the information they’ll give him on the Trump supporters, the ominous answer was:

google Seth Rich and shut up about it.

Seth Rich, a DNC staffer believed to have provided thousands of damaging DNC emails to WikiLeaks, was murdered on July 10, 2½ months before the Trump-Hillary debate.

Below is the transcript of the Brock et al. chat:

Begin Transcript ekim [5:52 AM]

ekim [5:52 AM] set the channel purpose: clean up this mes

brock [5:52 AM] joined post-debate from an invitation by @ekim

brock [5:53 AM] go round up the others. i need some coffee.

ekim [5:53 AM] will do

efink [5:54 AM] motherfucker.

brock [5:54 AM] good morning to u to fink.

efink [5:55 AM] the only good thing about it was that whoever that was, she looked pretty good. how tf did they do that?

brock [5:56 AM] i can’t talk. very hush hush. still, we’ve lost every online poll and we need to get tough here. get this under control.

[5:56] still, i hope we put the sick thing to bed.

[5:56] i hope.

efink [5:57 AM] me 2. do i have time for coffee?

brock [5:57 AM] we’re all gonna need a lot of coffee.

ekim [5:58 AM] shaw is on his way sir.

[5:59] i don’t see what’s so bad. She looked really healthy! I thought she did GREAT!

efink [5:59 AM] she was scoring 3 on AMTS a couple of weeks ago and 22 on mmse. Yeah, whoever that was was normal.

[6:00] but the telemetry sucks. look at all the snap onlines: we’re losing 100%

[6:00] romney v obama numbers

ekim [6:01 AM] but those don’t mean anything

efink [6:01 AM] it means they’re enthusiastic. organized. if they can swarm a poll whats to stop them swarming a voting booth?

[6:01] it also creates a counter-nar. the free press will sniff it. we have to stop the bleeding.

ekim [6:01 AM] k

efink [6:02 AM] don’t worry. we have something. GET SHAW OUT OF BED.

[6:02] i’m going for coffee.

cshaw [6:05 AM] hello!

[6:06] hi Liz.

[6:06] I see we’re not happy :disappointed:

brock [6:06 AM] Not at all.

cshaw [6:06 AM] I read the round-up. It looked good?

brock [6:07 AM] the round up my burning ass. I’m talking about the real world. Trump made her look like a girl. Today we hit back. We hit back hard.

[6:07] Fink?

efink [6:07 AM] one sec.

[6:10] okay. guys, this is 18-2381 stuff. Got it?

cshaw [6:10 AM] yes

ekim [6:10 AM] yes sir.

efink [6:11 AM] alright. we need to move beyond the disruption scripts and down-voting. we need to start hurting people and that’s what this is about. This is about winning because we’ll never get a chance at this again. everything is justified. David?

brock [6:11 AM] dramatic.

[6:13] fuck–okay. so the Trump team is an emergent order. thirty million little chan and reddit assholes that bump around and then congeal to vote in a poll or push a meme or make a hashtag trend or whatever. This is new. It isn’t like fighting a centrally organized campaign.

[6:13] It’s more like fighting a disease.

[6:14] So what we need to do is break the pattern. The usual means isn’t working. Trump’s too charismatic. Morale is too high. This is an army of chaos folks.

[6:14] so we have full clearance. Word of God.

[6:15] Fink–let’s do this. I have a plane to catch.

efink [6:16 AM] uploaded and commented on an image: foxacid.jpg 1 Comment FOXACID

ekim [6:16 AM] Ew.

cshaw [6:16 AM] i like it! wtf is it??

efink [6:17 AM] This is manna from heaven, kids.

[6:18] We have the use of an NSA intrusion package. We are going to find the thought leaders. the meme-generators. the shit-posters. I need a target analysis for reddit, twitter, and the chans by tomorrow 5 PM.

[6:18] You will monitor, identify, and using the FA [foxacid] software set we have, identify/dox.

cshaw [6:18 AM] that will dox them??

efink [6:20 AM] It will man-on-the-side for the anon boards and intercept traffic. We can use that for IP addresses and loading tracking software and magic lantern onto their devices. Once we have them compromised

[6:20] David? How many do we need?

brock [6:21 AM] I want 150 from 4chan, whatever you can get from 8. I want 1000 top reddit drivers exposed and I want content analysis for their posts. I want the people who are really driving their narrative.

[6:22] I need all that in a packet by tomorrow afternoon with lexical analysis, proof of compromise. I want clips of memes. I want to up-vote patterns. All this has to be inside the US too. We can’t use externals.

cshaw [6:23 AM] It won’t work outside the US?

efink [6:23 AM] It works fine outside the us you idiot. That’s NSA stuff.

brock [6:24 AM] WE don’t work outside the US. Do you think this is fucking bean-bag?

[6:24] We are going to disrupt them before this shit goes any further.

[6:24] if they don’t have leaders, we’re going to get their thought leaders.

cshaw [6:24 AM] like pajama boy!

brock [6:25 AM] I AM NOT N THE MOOD cshaw

cshaw [6:25 AM] sorry

efink [6:26 AM] just get us the target profiles. Hit the numbers. Give us a matrix for each of them. Okay? PII, influence grid, recent activity, Q-rate. Like that.

[6:26] You know what to do.

cshaw [6:26 AM] Yes sir.

ekim [6:26 AM] What are we going to do with that?

brock [6:27 AM] dof u really want tio fucking know, kim?

ekim [6:27 AM] i’m good.

brock [6:28 AM] u better be. I am going to get a plane. You will be up ALL NIGHT. Keep the lab LOCKED. Fink bring in pizza or whatever to keep the kids going.

[6:28] I am out.

cshaw [6:28 AM] does it have to be We the Pizza?

efink [6:29 AM] Brock LIKES WtP. What do you want?

ekim [6:29 AM] Sushi. Sushi would be nice.

efink [6:30 AM] what do you think this is, the Trump campaign. We’re getting pizza from We.

[6:30] Get those files together.

ekim [6:30 AM] I’m on it. Do you know what brock is going to do with them? I do kind of want to know, sir.

efink [6:31 AM] google Seth Rich and shut up about it.

cshaw [6:31 AM] OOg.

[6:32] well, they are deplorable. idk. I think we should have done this a long time ago.

efink [6:32 AM] get working kids. I’ll check back in a couple. Have something for Brock before he hits the ground. k?

ekim [6:33 AM] I’m sick of We the Pizza.

cshaw [6:33 AM] me2.

[6:33] :confused:

ekim [6:33 AM] :confused:

Update (June 7, 2017):

In a series of comments (see below), blogger Max Insider of a hoax fake-news site called RealTrueNews — which is neither real nor true nor news — claims that he concocted the David Brock chat transcript and blames his deception on Trump supporters. See his December 27, 2016 fake post: “Inside Correct the Record: Post-Debate PLOT!“.

Notwithstanding Max Insider’s claim (whose alias is yet another lie as he is no “insider” of anything but hoaxes) that the Brock transcript is a hoax, it should be pointed out that the NSA in fact does engage in the nefarious activities described in the transcript — those of “doxing” online posters and deploying FoxAcid to attack and infect their computers. The following is from a UK Guardian article on Oct. 4, 2013:

“Secret servers and a privileged position on the internet’s backbone used to identify users and attack target computers

The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA’s application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world.

According to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The trick identified Tor users on the internet and then executes an attack against their Firefox web browser.

The NSA refers to these capabilities as CNE, or computer network exploitation.

The first step of this process is finding Tor users. To accomplish this, the NSA relies on its vast capability to monitor large parts of the internet. This is done via the agency’s partnership with US telecoms firms under programs codenamed Stormbrew, Fairview, Oakstar and Blarney.

The NSA creates “fingerprints” that detect http requests from the Tor network to particular servers. These fingerprints are loaded into NSA database systems like XKeyscore, a bespoke collection and analysis tool which NSA boasts allows its analysts to see “almost everything” a target does on the internet….

After identifying an individual Tor user on the internet, the NSA uses its network of secret internet servers to redirect those users to another set of secret internet servers, with the codename FoxAcid, to infect the user’s computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and attacks developed by the NSA, giving the agency opportunity to launch prepared attacks against their systems.

Once the computer is successfully attacked, it secretly calls back to a FoxAcid server, which then performs additional attacks on the target computer to ensure that it remains compromised long-term, and continues to provide eavesdropping information back to the NSA.

~Eowyn

FBI memo shows murdered Seth Rich’s laptop contained DNC emails

Joe Biggs is a US Army Retired Staff Sergeant who was a reporter for InfoWars, but is now a Texas-based independent journalist and a contributor to the blog BAM (Borderland Alternative Media).

Biggs was given by an FBI source a fascinating FBI memo that, though heavily redacted, strongly suggests Democratic National Committee (DNC) staffer Seth Rich indeed was the whistleblower who provided thousands of damaging DNC emails to WikiLeaks, among which are emails showing the DNC deliberately undermined Bernie Sanders’ campaign to favor Hillary Clinton. See:

Biggs writes in his BAM post of May 26, 2017:

If the Seth Rich murder was just an armed robbery why was the FBI looking into it? why is the mainstream media so hell-bent on shutting this story down? Why is Sean Hannity being silenced for even covering the murder of Rich? There are many unanswered questions but hopefully this FBI memo can be the first step into uncovering the truth behind the murder of Seth Rich.

In a heavily redacted memo, released to me by a source within the FBI, we see Seth Rich’s name. The Email states that [Rich’s] laptop contained DNC and Wikileaks information.

At the bottom right [of the FBI memo] it has code that can be used to look up the official FBI memo SCRDC-408

What that code means is name of person being looked into. “SCR” Seth Conrad Rich. Location “DC” with “408” documents. Any FBI Memo, if it’s a target of an investigation will show a code that can be used by journalists to request a FOIA. So FOIA experts can use that code and obtain a less redacted version.

Below is the redacted classified FBI memo (I supplied the red underlining). Note the following:

  • The memo was dated July 15, 2016, five days after Seth Rich was shot on Sunday morning at about 4:19 am in the residential Columbia Heights area of Washington, DC.
  • The memo made mention of “DC police” gaining “custody” of Seth Rich’s laptop computer (“scr laptop”).
  • The memo said “data obtained” from the laptop included “detailed DNC” “emails”.
  • The memo made mention of “Wikileaks”.

Judicial Watch has taken up the Seth Rich case and should, referring to the code “SCRDC-408”, make a FOIA (Freedom of Information Act) request to the FBI for the unredacted memo.

See also:

~Eowyn