[–] Don-Keyhote 1 point 0 points 1 point (+1|-1) ago
id rather hear more about Mike Berman. Hes a longtime Podesta friend who also wrote them about how he was on the list to get a kidney transplant (they offered no help unfortunately). A similar note informed them that Pam Fleischaker successfully received her second heart transplant and a new kidney (she has a disease)
The pizza references are starting to seem less sinister though. You could ask your friend if he wants to get a beer for an hour and he knows it means you want a necessarily brief social encounter, which are usually done over food/drink. "Who wants pizza? We only have one slice and we need to know how thin to cut it" is playful office humor.
[–] shoosh 0 points 1 point 1 point (+1|-0) ago
Who wants pizza? We only have one slice and we need to know how thin to cut it" is playful office humor.
Could you please provide the entire conversation so it can be compared in context with your analysis? Thanks.
okay, I found it:
https://www.wikileaks.org/wiki/Slice_(military)
Slice (military) slice
An average logistic planning factor used to obtain estimates of requirements for personnel and materiel. (e.g., a personnel slice generally consists of the total strength of the stated basic combatant elements, plus its proportionate share of all supporting and higher headquarters personnel.)
https://wikileaks.org/gifiles/docs/18/18589_re-headcount-for-pizza-.html
On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered "global intelligence" company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor's web of informers, pay-off structure, payment laundering techniques and psychological methods.
Re: headcount for pizza
There's apparently been some confusion: we're not reserving slices here.
Everybody gets one slice, according to their needs, just as the glorious
tenets of Marxism would tell us.
Chris Douglas wrote:
> Headcount!
>
> Who all is in the Austin office today who is going to want pizza? We
> only have one slice and we need to know how thinly to slice it...
>
> Simply send a single response, filed, color-coded, double-sided and
> appropriately labeled, signed in triplicate and set on fire.
It may be playful humor, maybe it's ''psychological method'' (whatever the hell that is) but in connection with the rest of the information, it needs to be investigated.
edited to add: would love to get pizza for an hour could mean going for an hour, but normal people don't usually phrase it that way. Anyone who has that type of art work isn't anything normal people could relate to, so there's that.
Normal people might say, "would love to get a beer, I can only stay an hour" instead of "would love to get beer for an hour."
Maybe he's on a rushed lunch break.
If I'm booking something in time increments, like a massage, or timed and structured session, I might say, "I'm getting a massage for an hour."
https://i.imgjar.co/jar/ZdwRXW30ekOOZn6xx2fgGw.jpg
https://wikileaks.org/podesta-emails/emailid/33096
I think the wikileak excitement describing success with dominos on pasta or cheese is less likely to have any other explanation, along with ordering thousands of dollars of hotdogs and pizza flown in for a party. I don't think it's logistically possible to fit that much in a jet, (that's a lot of hotdogs) or practical to have cold reheated pizza for an event. If they shipped them in a refrigerated truck the hotdogs would be heated but pizza wouldn't be edible.
[–] Wolftrail7272 0 points 1 point 1 point (+1|-0) ago (edited ago)
If you break it up into a 4-3-4 series, the middle 3 are "NVM."
Lots of ciphers could be used here. Also, this could be a key to unlock a steganographically hidden image within either another image's data set or other file type. Just some speculation for you.
Also could be a .tor/.onion web address...