LIST OF SHAME!! These Were The First People To Leak Photos Of School Girls Hiding Drugs in Their Private Parts

Piece by: Kwarula Otieno
Lifestyle

East African Data Handlers Ltd has released an Independent Computer Forensics Report establishing the original source of the pictures of school girls hiding drugs in their private parts which went viral on social media. (Read more below)

"The report is meant to highlight the authenticity of technology more so computer forensics to establish the original individual(s) who may have distributed the contents illegally."

"EADH investigated all the facts surrounding the story and tested their authenticity and validation. From our initial investigation, we have a list of more than 150 web pages who covered this story along with the pictures. These websites includes various news sites, blogs, Facebook pages, twitter accounts, Google + profiles and many more."

"Since more than 140 of these web pages and other media covered the story on August 7, 2015 and onwards we were able to dig out some personal user profiles who had shared this story way before it came into media. This gives us as well as local police a major lead in narrowing down the scope of investigation and helping them investigating those few people who had shared the story way before it made any headline."

"Names and other details of such users have been successfully obtained by EADH and will be presented to the local police shortly. EADH firmly believes that after investigating those few people (not more than 5) the truth will be presented to the people about the person who actually publicized the pictures which should have never come in public."

"EADH has solved lots of cyber forensics cases for the government agencies along with the other private corporations and has a proven track record of 100% success. We believe we will also explain the untold story behind this case shortly to the world and will help the authorities bringing the actual culprit down to justice. Proof of Concept (POC):- Under this section EADH is disclosing the users details and their public profile who shared the story on August 6, even before some of the leading media houses of the country and were amongst the very few to post the pictures online."

Click next to see the culprits

  1. Dagitari Wanjohi @Wakigogoine The above person is believed to the be among the first people who initially posted the photos on social media the authenticity and verification of their source of the file would clearly prove who had passed the images to him.

  1. BRIAN!! @Ichieni     The above person spearheaded the spread of the file to other internet users and thereafter the file took a life of its own

  1. trap a velli @BoiBlunt

  1. Krystal Joe Google +

The person above did the most initial post on Google plus All these users shared these pictures online very early which can help the authorities getting close of the suspects and nipping down the one who made the first uploads over the internet.

"If East African Data Handlers Ltd. gets a chance of further investigating into the case, we shall be able to provide enough evidence to prove the original person behind uploading these pictures online and we shall be in a position to disclose all the details of the device with which these pictures were taken and uploaded."

"We believe East African Data Handlers Ltd. Will assist the authorized authorities in every possible way to get the culprit down to justice and setting an example across the country so that every individual thinks twice before doing such a sin in future."

Disclaimer:-

1. East African Data Handlers Ltd. Does not declare the above-mentioned profile owners as the suspects in this case in any regards. However we believe that a digital forensics examination of their gadgets can lead us to the original culprit behind this.

  1. East African Data Handlers Ltd. Does not take responsibility for the admissibility of this report in any courts of law until and unless contacted by the right authorities. In that case EADH shall present a comprehensive forensics report with the proof of concept of all the evidences prepared in accordance with the U.S. Cyber Laws.