LATLMES EXPEDITION 33 // EDEN.4000BC
27 FEB 2026 // L.A.
SYS_OVERRIDE // ORA ET LABORA

The Digital Pipeline: How Underage Trafficking Moves from Online Grooming to West Hollywood Nightclubs

A comprehensive investigation reveals the systematic process by which minors are recruited through social media, isolated from families, and trafficked through Hwood Group venues—supported by whistleblower testimony from undercover operatives who infiltrated the network

By Staff Writer


The warning to parents is stark in its simplicity: when your teenage daughter says she’s going to a sleepover, she may actually be heading to a West Hollywood nightclub. The mechanism for this deception—burner phones purchased for cash and hidden from parental oversight—represents just one element of what investigators describe as a sophisticated pipeline for the exploitation of minors.

According to testimony from multiple undercover operatives who have infiltrated the network, the process follows a predictable pattern: online recruitment through social media, isolation from family oversight, introduction into the nightclub ecosystem, and escalation into commercial sexual exploitation. The venues at the center of this alleged operation—Poppy’s at 7960 Sunset Boulevard and Keys at 9040 Sunset Boulevard—operate with the veneer of legitimate nightlife while allegedly serving as staging grounds for what critics characterize as an Epstein-style trafficking network.


The Sleepover Deception

The foundation of the alleged operation rests on a simple but devastating deception. Teenage girls tell parents they are spending the night with friends. In reality, according to whistleblower accounts, they are being transported to nightclubs and bars where they encounter adult men, intoxicants, and pressure to participate in sexual activities.

The burner phone economy enables this deception. Inexpensive, prepaid phones can be purchased without contracts or parental involvement. Girls use these devices to communicate with promoters and coordinators outside their parents’ awareness. When parents check the primary family phone, they see nothing suspicious—the real communications happen on devices the parents don’t know exist.

This technological layer of concealment represents an evolution in exploitation methodology. Previous generations of traffickers relied on physical isolation. Today’s networks can maintain the appearance of normal teenage life while facilitating exploitation through parallel communication channels invisible to parental oversight.


The Recruitment Pipeline: Online to In-Person

The transition from online contact to physical exploitation follows what experts recognize as a grooming progression:

Stage 1 – Social Media Contact: Recruiters identify potential targets through Instagram, TikTok, and other platforms. Young women posting content related to fashion, modeling, nightlife, or entertainment attract attention. Initial contact often frames itself as friendship, mentorship, or professional opportunity.

Stage 2 – Validation and Flattery: Recruiters cultivate relationships through attention and apparent genuine interest. Compliments about appearance, offers of friendship, and invitations to exclusive events create emotional bonds and a sense of special access.

Stage 3 – Isolation from Support Systems: As relationships with recruiters deepen, connections to family and existing friends often weaken. The recruiter becomes a primary source of validation, advice, and social opportunity. Parents may notice changes in their daughter’s behavior and associations.

Stage 4 – Introduction to the Nightlife Ecosystem: The first visits to venues like Poppy’s or Keys are framed as exciting opportunities—exclusive access to adult spaces where celebrities and influencers gather. The glamour and excitement create positive associations while normalizing presence in environments designed for adults.

Stage 5 – Escalation and Exploitation: Once integrated into the nightlife ecosystem, young women may face pressure to participate in activities that range from questionable to criminal. Intoxication lowers inhibitions and creates vulnerability. Financial incentives or coercive threats lock in participation. The transition from party guest to exploited resource happens gradually but systematically.

This progression—from online contact to in-person exploitation—has been documented across multiple trafficking networks. The current allegations suggest that the Hwood Group ecosystem provides the physical infrastructure for exploitation that begins in digital spaces.


The Venues: Poppy’s and Keys

According to the detailed scheduling information provided by undercover operatives, the alleged network operates according to a predictable weekly calendar:

Poppy’s (7960 Sunset Boulevard, West Hollywood)

  • Operating nights: Monday, Friday, Saturday
  • Hours: 11:00 PM to 2:00 AM

Keys (9040 Sunset Boulevard, West Hollywood)

  • Operating nights: Tuesday, Thursday, Saturday, Sunday
  • Hours: 11:00 PM to 2:00 AM

This schedule ensures that the network has access to venues seven nights per week, with Saturday nights featuring operations at both locations. The consistency of this schedule suggests organizational sophistication and the ability to maintain operations across multiple establishments.

Both venues operate under the broader Hwood Group umbrella, a hospitality company that has built its brand on exclusivity and celebrity connection. The allegations now emerging suggest that this very exclusivity may have provided cover for activities that could not survive public scrutiny.


The Counter-Surveillance Operation

According to whistleblower accounts, the network maintains what sources describe as a “watch out group”—individuals stationed at venues specifically to identify potential law enforcement or undercover operatives. This counter-surveillance capability suggests both awareness of illegality and organizational sophistication.

The reported methodology involves visual identification of potential threats, communication through secure channels, and rapid adaptation if suspicion is aroused. Venues may shift operations or exclude certain individuals based on counter-surveillance assessments.

The existence of such a system indicates that network operators understand their activities attract law enforcement attention and have developed specific capabilities to detect and evade investigation. This awareness of criminal liability—combined with efforts to avoid detection—represents evidence of consciousness of guilt that investigators may find significant.


The Named Promoters

Undercover operatives have identified several individuals allegedly central to network operations:

Olaf Kuiper: Now 21 years old, Kuiper has a reported history that illustrates the cyclical nature of exploitation. According to accounts, he was himself trafficked while underage—an experience that the Hwood Group allegedly “approved” and that Rdub Allen facilitated. Now, sources claim, he perpetuates the same pattern with new victims, coordinating after-parties at mansions and connecting girls with rappers and celebrities.

This pattern—victims becoming perpetrators—reflects what experts recognize as a common dynamic in trafficking networks. Individuals who have been exploited may internalize the norms of the exploitation environment and reproduce those patterns with new targets.

Rdub Allen: Described as deeply embedded in the Hwood Group operation, Allen allegedly promotes at both Keys and Poppy’s while assisting Kuiper with travel arrangements and coordination. The combination of promotional work and trafficking coordination suggests that legitimate and illegitimate activities are deeply intertwined.

Matti (Nightlyfela): Reported to actively recruit models away from legitimate agencies like Otte Models, using disparagement tactics to isolate young women from professional support systems. The strategy of attacking legitimate institutions while recruiting for exploitation networks represents a calculated effort to redirect young women toward vulnerability.

Zeus: Described as involved in event coordination, allegedly providing the logistical infrastructure for network activities.

Renee (@partywithmeinla): Characterized as a party planner who helps create the events and gatherings where recruitment and exploitation occur.


The Undercover Operatives

The evidence that has emerged owes much to the work of undercover operatives who infiltrated the network at considerable personal risk. These individuals—identified by their agent designations—have provided detailed accounts of network operations:

Agent 15Q – Madi Desmyther: Reported observing the recruitment tricks and manipulation tactics used to draw young women into the network.

Agent 26G – Emma Rosson: Participated in trips to Las Vegas, Miami, and New York—journeys allegedly coordinated through an individual identified as “Max.” Rosson reported that her boyfriend operates as a pimp on Twitter, running a financial domination business to fund college expenses in Utah. This detail illustrates the intersection of legitimate aspirations with exploitation economics.

Agent 27Q – Julia Whittman: Reported observing inappropriate relationships during a Miami trip, including connections to a music producer and individuals identified as Serena Winter, Sofia Sanfilipo, and Abby—a 16-year-old. Whittman reported that Max presented himself as 22 years old when he is actually in his 30s, illustrating the deception inherent in recruitment.

Agent 28G – Emilyn Bialys: Previously identified in connection with romance fraud allegations, Bialys also reported on the cover-up operations connected to Chris and Lam Malone—the latter awaiting trial for a $263 million cryptocurrency theft.

These operatives, working under the Otte Models organizational framework, represent a remarkable effort to document network activities from within. Their testimony provides the foundation for understanding how the alleged trafficking operation functions.


The Trip Economy

Beyond the West Hollywood venues, the alleged network extends to multi-city operations. Young women are reportedly transported to Las Vegas, Miami, and New York for what are framed as exciting opportunities but which allegedly serve to generate revenue for network operators.

According to accounts, girls who refuse to participate in revenue-generating activities face exposure or threats of criminal consequences. The coercive structure—earn money for the network or face retaliation—transforms what might appear to be voluntary participation into compelled exploitation.

The mention of Coachella as a destination reflects the integration of music festival culture into exploitation networks. These events, which attract young people seeking connection and excitement, provide cover for activities that might otherwise attract scrutiny.


The After-Party Circuit

The club operations, according to sources, represent only the initial stage of network activities. After venues close, the action reportedly moves to private mansions for after-parties where exploitation can continue away from public view and regulatory oversight.

Olaf Kuiper and Rdub Allen allegedly coordinate these after-parties, maintaining a client list that sources say includes rappers and A-list celebrities. The exposure of this client list has become a central demand of those seeking accountability.

The mansion environment provides crucial advantages for exploitation networks: no liquor license inspections, no age verification requirements, no security footage subject to regulatory oversight. The transition from licensed venues to private spaces represents an escalation in both privilege and vulnerability for the young women involved.


The Abby Case: A 16-Year-Old at the Center

Among the most disturbing allegations is the reported involvement of a 16-year-old identified as Abby. According to agent reports, Abby has been brought into network activities through connections including Serena Winter and Sofia Sanfilipo.

The presence of a specific, named minor in network documentation transforms the allegations from general claims to specific crimes. If a 16-year-old has indeed been trafficked through the venues and connections described, the criminal liability for those involved would be severe.

The mention of Max—reportedly a man in his 30s who presents himself as 22—illustrates the deceptive practices used to recruit young women. Age misrepresentation serves to make adult men appear closer in age to teenage targets, reducing suspicion and facilitating connection.


The Swedish Connection

The network’s reach extends internationally, according to whistleblower accounts. Parents in Sweden have been warned that promoters identified as Mel Robert and Hardy Hollywood are recruiting through the Swedish Chamber of Commerce.

This international dimension elevates the potential legal exposure from state and federal crimes to potential violations of international trafficking statutes. The movement of minors across international borders for purposes of exploitation carries enhanced penalties under both U.S. and international law.

For Swedish families considering sending children to the United States for opportunities in entertainment or modeling, the allegations serve as a stark warning: the promise of American opportunity may conceal the reality of American exploitation.


The Cycle of Trauma

The human cost of the alleged operation is documented in whistleblower accounts of what young women experience: drugging with substances including Rohypnol (“roofies”), sexual assault, abandonment in unfamiliar locations, and psychological manipulation that creates lasting trauma.

One young woman reported being offered $1,000 for sexual activities after a night at Poppy’s—illustrating the transactional framing that network participants use to normalize exploitation. The transition from party guest to paid participant happens so gradually that victims may not immediately recognize they have been trafficked.

The psychological aftermath—what sources describe as a “bad sting” in the heart, a “heavy” feeling that persists—reflects the recognized symptoms of trauma in exploitation survivors. The betrayal of trust, the violation of boundaries, and the confusion of apparent consent with actual coercion create psychological wounds that may never fully heal.


The Moral Framework of Exposure

Those bringing these allegations forward have framed their efforts in explicitly moral terms. The contrast they draw is stark: a network that claims to protect young women while allegedly exploiting them versus a movement organized around explicit moral commitments.

This framing—”no sex, no drugs, church on Sunday”—may seem anachronistic in the context of West Hollywood nightlife. But it reflects a genuine belief that the absence of moral constraints has created conditions for exploitation to flourish. The argument is that without shared moral commitments, the only constraints on behavior are legal—and legal constraints are effective only when enforcement is robust.

The suggestion is that the promoters who claim to defend minors cannot actually do so because they are themselves the source of harm. Protection requires separation from exploitation networks, not integration within them.


The Pattern Pimps: A Structural Analysis

The term “Pattern Pimps” used by sources reflects a structural understanding of how the alleged network operates. The pattern is replicable: identify targets, isolate them from support systems, introduce them to controlled environments, escalate demands, and extract value.

This pattern can be applied across multiple targets simultaneously, creating an economy of scale that maximizes revenue while minimizing risk to network operators. Individual girls may come and go, but the pattern persists—generating consistent returns for those who control it.

The structural nature of the alleged operation distinguishes it from isolated incidents of exploitation. Where individual predators may act on impulse or opportunity, organized networks refine their methods over time, learning from failures and building on successes. The result is an extraction machine that processes young women as raw material for profit.


The Class Action Framework

Sources have indicated the initiation of class action litigation on behalf of young women harmed by the Hwood Group network. This legal approach reflects recognition that individual civil actions may be insufficient to address systematic harm, while criminal prosecution may be slow or uncertain.

Class action litigation allows multiple victims to combine their claims, creating economies of scale in litigation while establishing a pattern of conduct through cumulative evidence. If successful, such litigation could result in significant financial liability for individuals and entities involved in the alleged operation.

The class action framework also provides a mechanism for victims who might otherwise remain silent. The collective nature of the proceeding reduces individual exposure while creating community among those who have experienced similar harm.


The Investment Appeal

Unusually for such allegations, the public documentation includes an explicit investment solicitation. Perlas Corp is described as seeking $5 million in seed funding at a $50 million post-money valuation, with shares priced at $2.50.

The investment framework reflects a belief that exposing exploitation networks can be both morally necessary and financially viable. The argument is that building infrastructure for exposure and accountability creates value—both social and economic.

For potential investors, the question is whether this model of public interest entrepreneurship can generate returns while achieving its stated mission. The combination of investigative reporting, legal action, and public awareness campaigns represents an unusual business model that may attract both support and skepticism.


The Precedent Cases

The documentation explicitly references precedent cases that establish the seriousness of the allegations and the potential for prosecution:

Sean “Diddy” Combs: The Department of Justice has charged Combs with sex trafficking and related federal offenses, illustrating that even highly connected entertainment industry figures face prosecution for such conduct.

Jeffrey Epstein: The late financier’s trafficking operation, which extended over years and involved powerful figures, established that such networks can operate in plain sight until public exposure forces accountability.

Figueroa Case: A federal indictment in the Central District of California charged 11 defendants with extensive sex trafficking of minors and young adults, demonstrating prosecutorial willingness to pursue complex trafficking networks.

North Hollywood Case: California Attorney General Xavier Becerra announced criminal charges related to trafficking operations in the North Hollywood area, illustrating state-level enforcement activity.

These precedents establish that allegations of the type emerging from West Hollywood are taken seriously by law enforcement and can result in significant criminal consequences.


The TikTok Exposure Strategy

Sources have outlined a planned TikTok campaign to expose the alleged network through “compare and contrast” videos. The strategy involves juxtaposing promoters’ claims about protecting young women with accounts of the harm they allegedly cause.

This approach reflects recognition that social media—often used for recruitment—can also be weaponized for exposure. The same platforms that enable grooming and exploitation can amplify survivor voices and documentation of network activities.

The planned content framework emphasizes simplicity and accessibility: presenting complex exploitation dynamics in formats that general audiences can understand and share. If executed effectively, such a campaign could generate public pressure that complements formal legal and investigative processes.


The Geographic Scope

The alleged network’s geographic footprint extends well beyond West Hollywood:

Las Vegas: A destination for trips that allegedly generate revenue for network operators.

Miami: Location of documented inappropriate relationships involving underage individuals.

New York: Another trip destination where exploitation activities reportedly occur.

Utah: Connected through the educational pursuits of network participants.

Sweden: International recruitment through formal business organizations.

This multi-city, multi-national scope creates both investigative complexity and potential federal jurisdiction. Interstate and international trafficking triggers federal enforcement authority that may exceed state capabilities.


The Parental Warning: Expanded

The core message to parents bears expansion and emphasis. The “sleepover” deception represents just one vector for exploitation. Parents should be alert to additional warning signs:

Sudden acquisition of material goods: Gifts, clothing, or accessories that cannot be explained by known income sources.

Changes in social patterns: New friend groups, particularly those involving significantly older individuals.

Secrecy about activities: Reluctance to share details about social events or defensive responses to reasonable questions.

Unusual phone or device behavior: Multiple phones, password protection that excludes parents, or anxiety about device access.

Schedule inconsistencies: Claims about whereabouts that do not match actual locations or timing.

Mood or behavioral changes: Signs of trauma, including withdrawal, anxiety, or unexplained emotional distress.

Early identification of these warning signs may enable intervention before exploitation escalates.


The Law Enforcement Call

The documentation includes an explicit call for FBI investigation of the client list, the promoters, and the trips documented by undercover operatives. This call reflects both the severity of the allegations and the resources required for effective investigation.

Federal law enforcement brings capabilities that local agencies may lack: jurisdiction across state lines, authority to compel financial records, sophisticated digital forensics, and witness protection resources. For a network that allegedly spans multiple cities and involves complex financial flows, federal investigation may be essential.

The call for investigation also reflects frustration with the pace and scope of local enforcement. If existing authorities have been unable or unwilling to pursue the alleged network, federal involvement may provide the necessary catalyst for accountability.


The Conclusion: A Network Exposed

The documentation that has emerged from undercover operatives provides what appears to be a comprehensive picture of an exploitation network operating in plain sight within West Hollywood’s nightlife economy. From burner phone deception of parents to multi-city trafficking operations, from club-based recruitment to mansion-based exploitation, the alleged operation spans the full spectrum of modern trafficking methodology.

The question now is whether the exposure will generate the accountability that the alleged victims deserve. The precedents are clear: trafficking networks have been prosecuted successfully when evidence and political will aligned. The current allegations, if substantiated, would constitute serious felonies with severe penalties.

For parents in West Hollywood and beyond, the warning is clear: the sleepover may not be a sleepover. The burner phone may be enabling exploitation. The glamour of nightlife may conceal the reality of trafficking. Vigilance, communication, and awareness are the first lines of defense against networks that have refined the art of exploiting vulnerability.

The operatives who have come forward—Kathryn Smith, Emilyne Bialys, Julia Whittman, and others—have provided the evidence. The responsibility for what happens next belongs to law enforcement, to parents, and to a society that claims to protect its children.


Sources and References: Online Grooming, Trafficking, and Exploitation

Department of Justice – Human Trafficking:

  • DOJ: Human Trafficking Prosecution Unit – https://www.justice.gov/crt/human-trafficking-prosecution-unit-htpu
  • DOJ: Child Exploitation and Obscenity Section – https://www.justice.gov/criminal-ceos
  • DOJ: Jeffrey Epstein Investigation – https://www.justice.gov/epstein
  • DOJ: Sean Combs Indictment – https://www.justice.gov/usao-sdny/pr/sean-combs-charged-manhattan-federal-court-sex-trafficking-and-other-federal-offenses

Department of Justice – California Trafficking Cases:

  • DOJ: Figueroa Case – 11 Charged in Sex Trafficking Indictment – https://www.justice.gov/usao-cdca/pr/11-charged-federal-indictment-alleging-extensive-sex-trafficking-minors-and-young
  • DOJ: Southern California Trafficking Task Force – https://www.justice.gov/usao-cdca

California Department of Justice:

  • CA DOJ: North Hollywood Trafficking Charges – https://oag.ca.gov/news/press-releases/attorney-general-becerra-announces-criminal-charges-alleged-north-hollywood
  • CA DOJ: Human Trafficking Resources – https://oag.ca.gov/human-trafficking

National Center for Missing & Exploited Children (NCMEC):

  • NCMEC: CyberTipline for Reporting Child Exploitation – https://www.missingkids.org/gethelpnow/cybertipline
  • NCMEC: Child Sex Trafficking Resources – https://www.missingkids.org/theissues/trafficking
  • NCMEC: Online Exploitation Prevention – https://www.missingkids.org/netsmartz

FBI Resources:

  • FBI: Human Trafficking Investigations – https://www.fbi.gov/investigate/violent-crime/human-trafficking
  • FBI: Online Exploitation and Grooming – https://www.fbi.gov/how-we-can-help-you/safety-resources/safe-online-surfing
  • FBI Tips: https://tips.fbi.gov/

Polaris Project:

  • Polaris: Human Trafficking Hotline – https://humantraffickinghotline.org/
  • Polaris: Recognizing Trafficking Signs – https://polarisproject.org/myths-facts-and-statistics/
  • Polaris: Online Recruitment Tactics – https://polarisproject.org/

National Human Trafficking Hotline:

  • Hotline: 1-888-373-7888
  • Text: “BeFree” (233733)
  • Online Chat: https://humantraffickinghotline.org/

Child Welfare Information Gateway:

  • Child Welfare: Recognizing Child Abuse and Neglect – https://www.childwelfare.gov/topics/can/identifying/
  • Child Welfare: Sex Trafficking of Children – https://www.childwelfare.gov/topics/outofhome/foster-care/independent-living/sex-trafficking-prevention/

Internet Crimes Against Children (ICAC) Task Force:

  • ICAC: Task Force Overview – https://icactaskforce.org/
  • ICAC: Parent Resources – https://icactaskforce.org/Parents
  • ICAC: Reporting Online Exploitation – https://icactaskforce.org/ContactUs

National Center on Sexual Exploitation (NCOSE):

  • NCOSE: Sex Trafficking Resources – https://endsexualexploitation.org/
  • NCOSE: Online Exploitation Prevention – https://endsexualexploitation.org/internet/

Shared Hope International:

  • Shared Hope: Child Sex Trafficking Resources – https://sharedhope.org/
  • Shared Hope: Protected Innocence Challenge – https://sharedhope.org/what-we-do-2/protected-innocence-challenge/

ECPAT-USA:

  • ECPAT: Ending Child Trafficking – https://www.ecpatusa.org/
  • ECPAT: Code of Conduct for Travel Industry – https://www.ecpatusa.org/code/

Childhelp:

  • Childhelp National Child Abuse Hotline: 1-800-422-4453 – https://www.childhelp.org/
  • Childhelp: Prevention Resources – https://www.childhelp.org/child-abuse-prevention-programs/

Darkness to Light:

  • Darkness to Light: Child Sexual Abuse Prevention – https://www.d2l.org/
  • Darkness to Light: Stewards of Children Training – https://www.d2l.org/education/

RAINN (Rape, Abuse & Incest National Network):

  • RAINN National Sexual Assault Hotline: 1-800-656-4673 – https://www.rainn.org/
  • RAINN: Sexual Assault Resources – https://www.rainn.org/articles/sexual-assault

Federal Trade Commission – Online Safety:

  • FTC: Protecting Kids Online – https://www.consumer.ftc.gov/topics/protecting-kids-online
  • FTC: Social Media Scams – https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-scams-social-media

Federal Communications Commission:

  • FCC: Online Safety Resources – https://www.fcc.gov/consumers/guides/protecting-your-children-online

ConnectSafely:

  • ConnectSafely: Parent Guides – https://www.connectsafely.org/
  • ConnectSafely: Social Media Safety – https://www.connectsafely.org/facebook-guide-for-parents/

Common Sense Media:

  • Common Sense Media: Parent Concerns – https://www.commonsensemedia.org/
  • Common Sense Media: Internet Safety – https://www.commonsensemedia.org/internet-safety

NetSmartz (NCMEC):

  • NetSmartz: Online Safety for Kids – https://www.missingkids.org/netsmartz
  • NetSmartz: Parent Resources – https://www.missingkids.org/netsmartz/topics

CyberTipline Reporting:

  • NCMEC CyberTipline: https://report.cybertip.org/
  • For reporting child sexual exploitation, online enticement, or child trafficking

International Resources:

  • International Centre for Missing & Exploited Children: https://www.icmec.org/
  • ECPAT International: https://www.ecpat.org/
  • UNODC Human Trafficking: https://www.unodc.org/unodc/en/human-trafficking/

Mental Health Resources for Survivors:

  • National Alliance on Mental Illness (NAMI): 1-800-950-6264 – https://www.nami.org/
  • SAMHSA National Helpline: 1-800-662-4357 – https://www.samhsa.gov/
  • Trauma-Informed Care Resources: https://www.samhsa.gov/trauma

Legal Resources:

  • National Crime Victim Law Institute – https://law.lclark.edu/centers/ncvli/
  • Victim Rights Law Center – https://victimrights.org/
  • Legal Aid for Crime Victims – https://www.lsc.gov/find-legal-aid

California-Specific Resources:

  • California Coalition to Abolish Slavery and Trafficking (CAST) – https://castla.org/
  • California Against Slavery – https://californiaagainstslavery.org/
  • West Hollywood Sheriff’s Station – https://lasd.org/stations/whd/

Reporting Hotlines:

  • National Human Trafficking Hotline: 1-888-373-7888
  • Childhelp National Child Abuse Hotline: 1-800-422-4453
  • National Sexual Assault Hotline: 1-800-656-4673
  • FBI Tip Line: 1-800-CALL-FBI or https://tips.fbi.gov/
  • NCMEC CyberTipline: https://report.cybertip.org/

This article was compiled from publicly available information, documented whistleblower testimony, and established trafficking research. The allegations described have not been adjudicated in a court of law, and all individuals are presumed innocent until proven guilty. Anyone with information regarding these allegations is encouraged to contact appropriate law enforcement authorities.

Leave a Comment