As another Lame Cherry exclusive in matter anti matter.
We actually have fuller forensic psychological profile on the murdered Seth Rich, thanks to his computer as the file which he leaked to Wikileaks is one of profound clues and sets a timeline into the mind of Mr. Rich.
There are telling points in Mr. Rich created the file 5 days before he was murdered. That reveals that his murder was something of urgency, but I do not believe it had to do with the Hillary Clinton and DNC files alone, but had to do with Seth Rich fleeing to New York in 'dust off his shoes' from the crooks at the DNC who stole the primary from Jewish Bernie Sanders, who if Rich had known that Mr. Sanders had agreed to be a fall guy for Hillary Clinton as part of the scam, Mr. Rich might be alive today, instead of acting out like leftists Bradley Manning and Edward Snowden.
All of this centers on the evidence of July 5th, 2016 AD in the year of our Lord when Seth Rich created the file for Wikileaks publication to expose the Clinton crimes.
Key findings in the report by the IT specialist known as The Forensicator:
- On 7/5/2016 at approximately 6:45 PM Eastern time, someone copied the data that eventually appears on the “NGP VAN” 7zip file (the subject of this analysis). This 7zip file was published by a persona named Guccifer 2, two months later on September 13, 2016.
- Due to the estimated speed of transfer (23 MB/s) calculated in this study, it is unlikely that this initial data transfer could have been done remotely over the Internet.
- The initial copying activity was likely done from a computer system that had direct access to the data. “Direct access” means that the individual who was collecting the data either had physical access to the computer where the data was stored, or the data was copied over a local high speed network (LAN).
- This initial copying activity was done on a system where Eastern Daylight Time (EDT) settings were in force. Most likely, the computer used to initially copy the data was located somewhere on the East Coast.
- The data was likely initially copied to a computer running Linux, because the file last modified times all reflect the apparent time of the copy and this is a characteristic of the Linux ‘cp’ command (using default options).
- A Linux OS may have been booted from a USB flash drive and the data may have been copied back to the same flash drive, which will likely have been formatted with the Linux (ext4) file system.
From a forensic psychological examination, we can learn a great deal as a detective or agent of the FBI would in dealing with the mindset of Seth Rich, as much as the actions of Seth Rich reveal the cause and effect of his murder.
We know for certain that Seth Rich, made the file when the office at DNC was closed. We know for certain that Rich was well aware of the open portals of windows and was using Linux. We know for certain this was Rich at that the DNC headquarters and NOT the Russians or any hacker, due to the east coast time stamp, and as stated above, we know this was Seth Rich, as this file was created inside the DNC due to the 32 MB a second transfer.
Seth Rich would have utilized a tetrabyte data storage drive. This was not a flashdrive. This was Seth Rich planning this for some time and accessing a main server, so as not to leave traces that it was him doing the copying.
What is relevant in this, is Seth Rich had already planned all of this out, in he was leaving the DNC for a job in New York. The copying of this file was the last in the sequence of events in Seth Rich was cutting all ties and never going back to politics.
We know that John Podesta emailed about this "leak" and putting the person on ice in this period of time. John Podesta though is not the entire iceberg in this, but there is an entire iceberg which is below this, which has their own play toy humans to exploit, who trade positions of power for sexual favors.
What appears with Seth Rich is a convergence of events in these:
- The sham of Bernie Sanders as a candidate so Hillary Clinton would defeat him.
- The mystique of Wikileaks
- The Clinton ruse of running against Russian hacking
- The criminal theft of the election from Jeb Bush / Donald Trump
- The harem of operatives which service the cartel elite in DC
The last is key in this, and why Jewish Seth Rich was a frequent at that homosexual club on his way home, as this appears the "zealous group" which was protecting the system which is at the heart of all of these connecting events.
Never lose sight whether it is John Kennedy, Chandra Levy, Vince Foster, Seth Rich, William Colby, the system protects itself and goes to Mary Pinchot Meyer lengths to deal with primates who endanger a functioning system by their actions, and will be neutralized, always leaving an odd story of their end which never quite feels right.
Seth Rich was tripping too many wires, and it was not Wikileaks alone. Do not think that Wikileaks is some unknown entity, any more than Anonymous. All player and events are monitored and factored in to the cause and effect. It requires more than just copying NSA folders as Edward Snowden did, because that disruption with Russia is factored in to exploit for war. That is the reason Mr. Snowden breathes the air yet, while someone else like William Colby disrupts the inner workings of the system and is neutralized with extreme prejudice.
Seth Rich was not murdered for a file. Seth Rich was murdered, because others were aware he was leaving the system in DC, and was no longer an asset, but had become a threat assessment.
From the above, it is logical to conclude that the copying of the files was not the reason, as Seth Rich had become noticed before the copying of the files. It was something he informed someone he trusted in his inner circle, and that person fed that information to others which produced the reaction and action order.
In the above, Seth Rich would have been permitted an exit strategy, but when he left the pod and took action to expose not the politicians in their crimes, but those who orchestrated this to put those puppets into 1600 Penn Avenue.
There is a protocol in this. One can expose political crooks, but never activate in exposing the enforcers or the lords and the priests. Doing that disrupts the system and will engage it to protect itself.
Seth Rich is speaking from the grave. No one in law enforcement is interested, because it would begin exposing the system in the links to the DC pod which Seth Rich was associating with.
Those who accomplished this murder of Seth Rich, did not have the resources to negate the effects of the file codex, but those who were protected did, and left that signature to add to the situational upheaval to achieve the results of the reason Hillary Clinton was being put into the White House, and now Donald Trump is initiating.