stegfound | 56 points | Nov 13 2016 15:16:36

Hidden data in podesta emails?

Hidden data in images from leaked podesta emails? 3262 photo 2.JPG 168.81 KiB 9e3ee4973f3c9cd832dc6a963619e06c image/jpeg 3262 photo 3.JPG 155.39 KiB f011273db730de69c71165e352e4b0ca image/jpeg

permalink

octokit | 10 points | Nov 13 2016 18:57:44

None of my stenography tools were able to find hidden information in the Photo2.jpg, and the EXIF data points to it being posted directly from an iPhone, so it's very unlikely that this photo was tampered with.

GPS coordinates show that this photo was taken at 1949 Glenbrook Rd, Glenbrook, NV 89413 , which is at a facility sitting on Lake Tahoe called Shakespeare Ranch . Note that this property is currently on the market for $69,000,000 . It appears to be a sort of resort, which has hosted "A-List Performers" such as "Robin Williams, Jay Leno, Lionel Richie, Kenny "Babyface" Edmonds, Kenny Loggins and the band America." The photo was taken on August 16, 2014 at 9:05 PM.

Let me know if any other photos need analyzed.

permalink

stegfound | 1 points | Nov 16 2016 03:46:38

Thanks for checking it out, did you try using stegdetect?

permalink

stegfound | 9 points | Nov 13 2016 15:41:47

http://imgur.com/a/qWqqI

permalink

hafysa80dfuy8 | 6 points | Nov 13 2016 20:00:32

Someone posted this yesterday asking for help, saying that HALF of the .jpg files from the Podesta emails tested positive for steganography using a program called stegdetect

https://www.reddit.com/r/Operation_Berenstain/comments/5clvgg/need_crypto_help/

So it seems like question is no longer if there is something hidden there, but what .

permalink

ThisMeansGroundWar | 3 points | Nov 13 2016 19:01:52

Uhhhhhhh....

permalink

1337b01 | 6 points | Nov 13 2016 16:34:07

You commented me this and posted it here. I agree there may be some hidden data. I just do not understand. Can you explain what we are looking at so even a non tech person can understand? Not everyone is good with forensics.

permalink

IceDagger316 | 1 points | Nov 13 2016 20:10:02

JPEG images allow for other data to be hidden in lowest ends of the coding. I could hide a list of phone numbers for hookers and blow in the coding of a JPEG of a Pepe, send it to you and if you had the right program, you could decode it and get the phone numbers. And then some hookers and blow.

Here's a bit more detail: https://en.wikipedia.org/wiki/Steganography

permalink

pizzapartywithkids | 5 points | Nov 13 2016 15:50:22

Gonna need more details than this.

Make it clear which email we're talking about and show where in the email you are arriving at this conclusion.

permalink

stegfound | 5 points | Nov 13 2016 15:59:26

https://wikileaks.org/podesta-emails/?file=jpg&count=50&page=7&#searchresult

Doc ID: 3262

permalink

DawBrady_ | 4 points | Nov 13 2016 16:55:47

Can't you do all the tech stuff and give us the extracted images? Not too many techies here for this field of work

permalink

Exec99 | 4 points | Nov 13 2016 16:24:58

Yes

permalink

Professor_Spooky | 4 points | Nov 13 2016 17:53:36

To the top. I've been wondering why the stenography leads haven't been being looked into. Careful OP I think you're on the right track, the shilling is strong.

permalink

[deleted] | 3 points | Nov 13 2016 18:50:47

[deleted]
^^^^^^^^^^^^^^^^0.7260

What is this?

permalink

1337b01 | 1 points | Nov 13 2016 16:39:42

I tested 9e3ee4973f3c9cd832dc6a963619e06c

on this site

https://www.imageforensic.org/show/9e3ee4973f3c9cd832dc6a963619e06c/d6474d42-4ea6-4276-9e9e-fc314694ce46

I really do not understand. Your going to need to explain yourself better OP so we can understand what you are talking about.

permalink

contrarianism | -3 points | Nov 13 2016 17:17:16

Fake

permalink