TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that top law enforcement officials expected Hillary Clinton to win the 2016 election and manipulated the law to ensure her victory and Trump's defeat. He cites James Comey's alleged admission of operating in an environment where a Clinton victory was expected. The speaker discusses the alleged intrusion into the Democratic National Committee (DNC), pointing to "telltale signs in Cyrillic" and the name "Felix Dzerzhinsky" as either sloppy or overly clever attempts to implicate Russia. He alleges that the persona "Guccifer 2.0" is a fraud, based on forensic analysis of metadata by former NSA technical directors. The speaker criticizes Bob Mueller, claiming he falsified intelligence before the Iraq War and approved of torture and wiretapping. He recounts an encounter where he questioned Mueller about "parallel construction," the practice of using illegally acquired information in prosecutions without revealing its source. The speaker describes James Comey's leaking of a conversation with President Trump to prompt the appointment of a special prosecutor, Bob Mueller. He questions Comey's decision not to seize the DNC computers after the alleged Russian hacking, relying instead on CrowdStrike, a firm with a "disastrous record of veracity." The speaker claims that the DNC blamed Russia for the hacking to divert attention from the content of the leaked emails. He references Jennifer Palmieri, Hillary Clinton's PR person, allegedly pushing the "Russians hacked" narrative. Chuck Schumer is quoted as saying the intelligence community has "six ways to Sunday" to get back at Trump. The speaker discusses the Steele dossier and claims that the FBI also paid for it. He alleges that the intelligence community assessment on Russian hacking was based on handpicked analysts and that Obama stated the conclusions of Russian hacking getting to WikiLeaks were inconclusive. He claims NSA collects everything and there is no evidence of Russian hacking. The speaker references Peter Strzok and Lisa Page's text messages, where they expressed support for Hillary Clinton and a determination to "stop" Trump. He claims Strzok, who led the investigation of Hillary Clinton's emails, later said there was "no there there" regarding Russia gate. The speaker claims Julian Assange released documentation of the CIA's cyber tool to hack into systems and leave telltale signs giving the responsibility to someone else. He concludes that a "deep state" within the FBI, CIA, and Justice Department acted to ensure Hillary Clinton's victory and undermine Trump.

Video Saved From X

reSee.it Video Transcript AI Summary
People who oppose the mainstream media are often labeled as racist or potentially dangerous. WikiLeaks recently released thousands of hacked emails from Clinton campaign chairman John Podesta, which have revealed corruption, law breaking, and collusion within the Clinton campaign, the government, and the media. There are also claims that Podesta may be involved in a child sex trafficking ring. Additionally, the emails suggest that Podesta and his brother participated in occult practices. The speakers express their anger and frustration towards Podesta, demanding to know what secrets he is hiding.

Video Saved From X

reSee.it Video Transcript AI Summary
People who criticize the mainstream media are often labeled as racist or potentially dangerous. Tonight's discussion will be disturbing but it offers a reality check that you won't find elsewhere. WikiLeaks has released a new batch of emails from campaign chairman John Podesta, revealing corruption, lobbying, and media manipulation within the winning campaign. There are also claims of a child sex trafficking ring. This is a deliberate effort to destroy John Podesta personally. In a bizarre exchange, someone demands to be called "father" and tells another person to get lost.

Video Saved From X

reSee.it Video Transcript AI Summary
A federal investigator told Fox News that Seth Rich, a DNC staffer murdered in July, contacted WikiLeaks through Gavin McFadden, providing over 44,000 emails. WikiLeaks then published DNC emails showing efforts to undermine Bernie Sanders, leading to resignations. Julian Assange alluded to risks faced by WikiLeaks sources, referencing Rich's murder. Some suggest Rich leaked the DNC emails to WikiLeaks and was killed because of it. The timing of the Fox News story, which was later retracted, coincided with the appointment of Mueller and the Comey firing, allegedly deflecting from the Russia investigation. It's claimed the FBI never investigated the DNC hack, instead relying on CrowdStrike. Some DNC members believed Rich was murdered for political reasons. One speaker alleges Hillary and Bill Clinton initiated a "civilian coup" by co-opting various government agencies. A "counter-coup" was allegedly initiated through Julian Assange and WikiLeaks by members of the intelligence community to undermine the Clintons and expose corruption. The speaker claims this was a peaceful effort to ensure a transition without pardons or acts of treason.

Video Saved From X

reSee.it Video Transcript AI Summary
A former Bernie Sanders supporter who worked for the DNC claims that the DNC rigged the primary against Sanders. He leaked information to WikiLeaks and was subsequently murdered. The speaker questions why people ignore this and dismiss it as a conspiracy theory. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker suggests that the CIA controls everyone and is trying to capture Assange. They mention the possibility of the Ecuadorian embassy being blown up. The speaker believes that there are many people connected to the Clinton Organization who have been silenced or harmed.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the biggest scandal was when their campaign was spied on, but the other person disagrees, saying there is no evidence. The speaker insists that it is all over the place and that it was bad for Biden. The other person explains that they can't put on things they can't verify. The speaker continues to assert that it has been verified and that they got caught. The other person denies knowing about it.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on the Seth Rich murder and its alleged connection to WikiLeaks and the 2016 DNC email controversy. An FBI forensic report purportedly found that Rich contacted WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and Rich allegedly provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10, but his wallet, phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later, showing top DNC officials discussing ways to hurt Bernie Sanders at the polls, which contributed to the resignation of Debbie Wasserman Schultz as DNC chair and the DNC’s top three officials. Speaker 1 questions whether there is an “October surprise” and whether material is being held. Speaker 2 of the Helix group states that they do not sit on material and emphasizes that whistleblowers take significant risks; they note Rich’s murder as an example of high stakes and risk to sources, asserting that sources seek anonymity with them. When Speaker 1 asks if Rich was a source, Speaker 2 declines to comment but says they are investigating what happened to Rich and are concerned about it, though no conclusion has been reached. Speaker 3 argues that Rich was a Bernie Sanders supporter who worked for the DNC and asserts that the DNC rigged the primary against Sanders; he notes that Rich was aware of this and was involved as it happened, with Donald Brazil also involved. He describes Rich as idealistic and patriotic, and recounts his murder after leaking information to WikiLeaks, insisting that this is not a conspiracy theory but a fact-based concern. He challenges others to acknowledge the alleged corruption within the Democratic party and suggests that those who ignore the facts are engaging in denial. He also critiques media portrayals and online accusations about his own credibility. Speaker 4 discusses Assange and WikiLeaks, criticizing the idea of a conspiracy theory and labeling Assange as a key figure who exposed corruption. He mentions that Assange now “works for Russia” and questions the Ecuadorian embassy situation, describing it as heavily manipulated by interests around Hillary Clinton and the Clinton Foundation. He connects the Seth Rich disclosures to broader allegations of a coordinated effort to undermine Clinton and her circle, while acknowledging that some related claims may be questionable. Speaker 6 notes that hacking of the DNC and the role of CrowdStrike remain controversial and points to the subsequent murder of Rich as a focal point for questions that have not been fully explored by the media. Speaker 7 echoes concerns about the timeline, the FBI’s involvement, and past inquiries that were not pursued, emphasizing a sense that the case and the broader narrative around the DNC emails have been inadequately examined. Speaker 8 presents a long, conspiratorial narrative alleging that on 11/01/2016 Hillary and Bill Clinton orchestrated a civilian coup through corruption and co-option of key institutions, while a countercoup through Julian Assange and WikiLeaks was initiated to undermine Hillary and the Clinton machine. The speaker claims a silent countercoup across the Internet, led by members of the intelligence community, to stop the Clintons from gaining power and ensure Obama leaves without pardon, framing the moment as a major transitional event and a second American revolution conducted without guns.

Video Saved From X

reSee.it Video Transcript AI Summary
In the video, the speaker discusses the release of Hillary Clinton's emails from the late 2010s, which contained embarrassing details such as her speeches to Goldman Sachs. These emails damaged her image as she pretended to be a friend of the people. The speaker also mentions the leak of emails from the Democratic National Committee, which were wrongly blamed on Russia. They suggest that a DNC employee leaked the emails due to favoritism towards Clinton's campaign over Bernie Sanders'. The speaker asked if the publisher realized how powerful Clinton was, to which they replied that it was fun and they enjoyed it.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 is being accused of spreading a Russian plan, but this claim is dismissed by both parties and former heads of the CIA. The accusation is considered garbage and not believed by anyone, including Speaker 0's friend Bernie.

Video Saved From X

reSee.it Video Transcript AI Summary
A Bernie Sanders supporter who worked for the DNC claims that the party rigged the primary against Sanders. He leaked information to WikiLeaks and was subsequently killed. The speaker believes this is suspicious and points out other deaths connected to the Clintons. They discuss the Uranium One story, alleging that Bill Clinton received money from a Kremlin bank and that $142 million flowed into the Clinton Foundation. The argument that it was debunked is dismissed as bullshit. The money is seen as an attempt to buy influence.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript outlines the origin and propagation of the Pizzagate conspiracy theory and catalogs a wide range of alleged connections among political figures, businesses, and investigations, presenting these as part of an open-source online inquiry that spiraled into a real-world incident and a broader discourse about media and power. - Origins and method: WikiLeaks released emails hacked from Hillary Clinton’s private server and John Podesta’s account. Anons and various forums (Reddit, Steamit, 4chan, Vote, Websleuths) purportedly found strange references to pizza and hotdogs in the emails, which they reinterpreted as code language used by pedophiles. The narrative emphasizes an open-source investigative culture where people publicly contribute data and discuss what is pertinent, claiming that scandals have occurred on both sides of the political aisle and are bipartisan. - Core claim and media framing: The program asserts that Pizzagate originated from Podesta email dumps and evolved into a theory that Clinton and Podesta ran a child sex trafficking ring. It is claimed that the email references to pizza, handkerchiefs, hot dogs, and related terms were code words used by pedophiles, with Comet Ping Pong Pizza referenced multiple times in the emails and connected to Podesta through James Alefantis, its owner, described as a friend of Podesta and listed by GQ as a powerful DC figure. - Specific nodes and symbols: The narrative identifies a supposed FBI symbol system used by pedophiles (including a “boy love” triangle) and notes that Besta Pizza’s logo formerly contained a similar symbol, which it is argued changed after investigators pointed it out. It also links a number of performances at Comet Ping Pong (e.g., Heavy Breathing, Sex Stains) to disturbing symbols later identified as pedophile codes. James Alefantis is described with references to intimate associations (e.g., a relationship with David Brock, founder of Media Matters) and to his Instagram presence, which allegedly contained disturbing images and coded references. - Broader network and alleged ties: The film asserts extensive links among Alefantis, Podesta brothers, and other Washington figures, including references to donations to Hillary Clinton and George Soros, frequent White House visits, and dinners with Podesta. It cites pictures of Podesta with Alefantis and other figures, and claims a pattern of relationships with prominent Democrats and fundraisers. - Cultural artifacts and art world connections: The transcript describes connections to Marina Abramović and “spirit cooking” events, claiming Podesta attended such events, and cites museum-like art collections (e.g., Tony Podesta’s home) as evidence of a hidden culture. It recaps the idea that “spirit cooking” is a ritual performance and contrasts it with the artist’s explanation of context. - Notable individuals and incidents: The text references Dennis Hastert (the former House Speaker) in the context of criminal charges and alleged abuse, presenting Podesta’s emails as mentioning Hastert and tying that into a broader network. It describes various DC figures and businesses (e.g., Gordy’s Pickle Jar, Beyond Borders, Politics and Prose) as part of the alleged web of pedophilia-adjacent activity, with logos and social media posts interpreted as evidence. It claims that the Podesta brothers and others are part of a “deep state” or “occult” network. - Pizzagate in the real world: The narrative recounts the December 2016 incident in which Edgar Welch fired inside Comet Ping Pong Earth, saying he was investigating claims of a child sex ring and that the information originated online. It emphasizes the danger and harassment faced by Alefantis, staff, and customers, including death threats, and frames the gun incident as a consequence of fake-news-driven conspiracy theory. - Media coverage and accountability: The transcript includes a Kelly File segment in which James Alefantis speaks about the harassment and threats to staff and customers, underscoring that the claims had real-world consequences even as police and mainstream media reportedly found no evidence of a sex ring. It includes an Infowars segment in which Alex Jones and others discuss Pizzagate, acknowledge that they had initially reported on Podesta email code words, and later issued an apology and retraction regarding specific statements about Alefantis and Comet Ping Pong. - Investigative and ethical reflections: The piece features a video producer recounting alleged threats from Alefantis, including a phone call in which he purportedly threatened to kill the producer and his family unless the related video was deleted. It also includes a segment where a technician discusses alleged “kill room” imagery and references to underground tunnels and a Pegasus museum, tying them to the broader conspiracy. - Conclusion and framing of a larger struggle: The final portion frames Pizzagate as part of a larger battle against a supposed deep-state manipulation of media and government. It positions the narrative as a catalyst for a broader movement (referred to as Q and a coming “second American revolution”), calling for declassification of materials related to Epstein, Gates, Spygate, Russiagate, JFK, and 9/11 and presenting a claim that public trust in mass media and social platforms is in jeopardy. It ends with a call to action and a slogan about a movement that transcends party politics, asserting that government should be controlled by the people. Throughout, the transcript presents a chain of alleged connections, symbols, and events used to argue that a hidden, interconnected network of political and cultural elites engaged in child trafficking, with Pizzagate as a flashpoint that demonstrated broader cultural and media manipulation. It includes counterpoints from mainstream coverage, as well as self-professed apologies and retractions by some producers, but it maintains the core claim of a pervasive, concealed conspiracy supported by a web of social, political, and artistic figures.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: The speaker alleges a cover-up by people including Bill Barr and Mike Pompeo. Bill Barr, described by Jeffrey Epstein as “CIA,” allegedly covered up Epstein’s murder in federal detention, with Barr saying publicly, “we gotta make sure everyone thinks this is a suicide.” The speaker asks why Barr isn’t being questioned about this. Mike Pompeo is accused of plotting to murder Julian Assange, head of WikiLeaks. The speaker notes that WikiLeaks released the first tranche of emails to the public, and that Assange suggested on Dutch TV that his source was Seth Rich, a DNC staffer who was found murdered in Washington in what was described as a robbery where nothing was taken. Assange hinted in the interview that his sources faced great risks, mentioning Seth Rich; the interviewer pressed whether Rich was murdered for the leaks, and Assange said he couldn’t reveal sources but that they faced risks. Shortly after, Assange was incarcerated, first in an embassy in London and then in Belmarsh Prison, without criminal charges, actions the speaker attributes to the CIA and Mike Pompeo. The speaker contends that someone should ask Pompeo about this. Speaker 1: The speaker expresses anger at what they see as broad, systemic cover-ups versus ordinary Americans facing jail for minor offenses. They reference Pizzagate and Epstein, asserting that cover-ups extend across other issues, including Benghazi and Hillary Clinton material, which they claim were never properly pursued with the appropriate parties. They point to a long list of alleged co-conspirators connected to the Epstein matter, including those revealed in a recent document drop and corroborated subsequently. The list reportedly includes ten co-conspirators: one named Leslie Wexner, pilots (three identified by name), and others such as Ghislain Maxwell and various assistants who recruited girls, as well as individuals trafficking models. The speaker asserts there were many people around Epstein who were deeply involved and deserve serious questioning. They also reference Ehud Barak as among those connected to the network. Overall: The conversation presents multiple allegations of high-level complicity and cover-ups involving Bill Barr, Mike Pompeo, Julian Assange, Seth Rich, and a broad network around Jeffrey Epstein, including named and unnamed individuals, with claims of documented co-conspirators and ongoing questions about accountability.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: This story that's been the biggest thing on the Internet for several weeks, Pizzagate, as it's called, is a rabbit hole that is horrifying to go down. Now if you're a radio listener, this is a powerful video, but I've had it reposted because, again, he finished it, I guess, on Wednesday. It went out Thursday on the nightly news that was taped the day before. This is on infowars.com. Pizzagate is real. The only question is, what exactly is it? Because I'd said, man, I hope this is drug dealing code word or something or, you know, maybe they got the wrong manual because this is the FBI says this is this is pedophilia manuals. These are the terms they use, and then here's the New York Times. Fake news onslaught targets pizzeria as nest of child traffickers. Hey. I don't know why the pizzeria and the one down the street have symbols in the FBI dossier. I don't know why there's devil worship part of the walls. I don't know why it's connected to Potesta. I don't know why they got rock singers there talking about, you know, being you know, going after kids or whatever. This is what's going on, though. And so maybe it's just some genre they picked up. They don't know what they're involved in. I'm not accusing them of anything. Little I mean, it's not like they look like little piggy people or anything. Not like they fit all the cliches or anything when you go to the just like nice people to me, but the point is is that this is tied into Podesta with thousands of emails with, we're gonna have the six year old, the seven year old, and eight year old in the hot tub for your entertainment out at the ranch house. They can be a little persnickety, but they are also willing and enjoy it. Yeah. I mean, there's thousands of these. You're reading it going, what the hell is this? And you start reading it. There's thousands and thousands and thousands, and you know you're reading something real bad. Oh, I'll see you at the feast tonight. Oh, we'll have lots of blood and semen. Oh, good. And then they had, like, Time Magazine worshiping this high priestess the week after we exposed her about the news, all this PR, like, oh, we'll show them. They're attacking our high priestesses. We'll just put them in the news better. Like, we're all upstanding and out in the open and good people. Look. I've been careful about all this. This is lawsuit city. I don't know what the hell is going on with these people. I know straight up devil worship when I see it and find quotes of her saying it's real when she does it privately. Could he harass me anything Reddit accounts? I mean, I know real bathymen worship when I see it, but thousands of emails, I'm not ready to accuse all these people of this. It's up to you to research it for yourself, but you gotta go to infowars.com and actually see the photos and videos inside these places. You've gotta see their menus. You've gotta see it all, ladies and gentlemen, and then you gotta see the FBI law enforcement manuals showing the code words that are used. And by the way, didn't just believe this. I went to the FBI site. I went and looked it all up, and people asked, well, why weren't you on this earlier? We were on it from the beginning. We've been on it the last couple weeks since the election, but we're fighting on hundreds of fronts here. Let's go ahead and go to the report. Pizzagate is real. The question is, how real is it? What is it? Something's going on. Something's being covered up. It needs to be investigated. You just call it fake news. These are real WikiLeaks. This is real stuff going on. Here it is. Speaker 1: A warning to viewers, the following images are disturbing. This all began after WikiLeaks founder Julian Assange released hundreds of thousands of secret documents detailing a back stabbing Clinton Foundation, but it now appears the real truth Assange was leading us to was hidden between the blurred lines of Hillary Clinton's campaign manager, John Podesta's, released emails. Fast forward past John Podesta's brother, Tony's, casual email exchange with thalemic spirit cooking adherent Marina Abramovic. Rosetta Stone was needed next. A verification that high level Washington DC predatory pedophiles were using a code to communicate child sex trafficking as casually as ordering a pizza. An FBI unclassified document from WikiLeaks revealed symbols and logos used by pedophiles to identify sexual preferences to include those who sexually abuse children as well as those who produce, distribute, and trade child pornography are using various types of identification logos or symbols to recognize one another and distinguish their sexual preferences. Investigators should also be attentive to pedophilia symbols advertised on websites. During examinations of computer files, investigators should be conscious of subjects who try to conceal child pornography by labeling them with symbols instead of typical suggestive explicit names. Thus, the interest in code words. Now clues. The menu from comet ping pong. Notice the symbol of the ping pong paddles and its clever resemblance to the FBI documents symbol for child love. Alright. Hang on, New York Times. Before you declare this fake news from your ivory tower, now look at the symbol for Besta Pizza just two doors down from comet ping pong pizza, boldly using the symbol for boy lover as was recorded on the unclassified FBI document. The evidence begins to reveal that Besta Pizza and Comet Ping Pong Pizza may be competing for the lucrative Washington DC pedophile market right out in the open. Comet Ping Pong owner James Alifantis needs to explain himself, and so he did via the Hillary Clinton colluding New York Times. But so many questions remain unanswered. Why was this said by the band heavy breathing performing in comet ping pong? Speaker 0: He likes the world sounds. Demolios. And little boys. And children. Think I was his manager. Yep. We all have references. Speaker 1: Why is the art work adorning Comet Ping Pong's walls at the very least so insanely creepy, especially for a family restaurant? Why is Alifantis so close to Tony Podesta as revealed in the WikiLeaks emails? And why does mister Podesta collect questionable artwork specializing in grotesque eroticism and pedophilic images, not to mention Podesta's dabbling in what appears to be cannibalistic rituals while continuing his old friendship with convicted pedophile Dennis Hastard. Why is this man wearing an I love children shirt in this situation? Why did you write hashtag murder next to this incredibly creepy photo you posted? Why do you find it amusing that this baby is for sale? Why do you associate with this artist? Why is any of this okay? And if these code words are eventually proven to be just another method of communication, then why did the Podesta emails mention the code word pasta for either little boy or sex 78 times. Code word cheese for little girl 85 times. And what does Podesta's friend Herb mean by this statement from a Podesta email? PS. Do you think I'll do better playing dominoes on cheese than on pasta? According to the National Center for Missing and Exploited Children and the FBI, 460,699 children went missing in 2015 that we know of. Mister Alifantis, this isn't a witch hunt, and it isn't an attack from fake news that your boyfriend David Brock, founder of Media Matters, would have us all ignore. Either you are the unlucky victim of a fake news onslaught due to your own poorly initiated publicity or a decades old pedophile ring operating in the power hoarding shadows of Washington DC is about to be opened from your front door. John Bound for infowars.com. Speaker 0: Trump won. Hillary stole five states. Was ordered to stand down by the intelligence agencies where everything else is gonna come out on this. If you're a radio listener, you're lucky you didn't actually see the video. The art they tweet in Facebook is of children being murdered, cut in pieces, and raped by men with giant genitalia. So oh, yeah. Oh, yeah. So I don't know anymore, but that's what they're pushing. It's what they got hanging up in there, and it's what they're doing. And, I I can't go out there and investigate it myself. We've had reporters on that have been there. They say it's really creepy because, I don't have the self control to be around these type of people. So you want us to cover Pizzagate? We have covered it. We are covering it, and all I know is, god help us, we're in the hands of pure evil. We'll be right back. I'm on the show.

Video Saved From X

reSee.it Video Transcript AI Summary
A former Bernie Sanders supporter who worked for the DNC claims that the DNC rigged the primary against Sanders. He leaked information to WikiLeaks and was subsequently murdered. The speaker questions why people ignore this and dismiss it as a conspiracy theory. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker suggests that the CIA controls everyone and is trying to capture Assange. They mention the possibility of the Ecuadorian embassy being blown up. The speaker believes that there are many people connected to the Clinton Organization who have been silenced or harmed.

Video Saved From X

reSee.it Video Transcript AI Summary
Warner reaches out to someone, mentioning being out of touch and needing to talk on the phone. The text conversation reveals that Daniel j Jones met with Adam Waldman, a lawyer connected to Igor Deripaska and Julian Assange. They discuss the damaging impact of Assange on Democrats, Obama, and the CIA, and the importance of bringing him to the US. Christopher Steele is somehow involved. The speaker accuses this of being treason against the American people. They also mention Ben Stiller, a UN envoy, and the involvement of the Film Actors Guild. Daniel j Jones, a former FBI agent, paid an FBI informant named Igor Dychenko to fabricate the Russian dossier. The PENCORTA Group, funded by George Soros, is mentioned, along with Fusion GBS and Christopher Steele as contributors to the dossier. The speaker concludes that it is Obama, the CIA, and politicians who have an issue with Assange, not the people.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 says it's "preposterous that we were talking about Hillary Clinton's emails again in the year 2025," that "they get activated," and that Trump won't be blamed for not releasing the Epstein files, "We spent years on this story." Speaker 1 counters, "No. Let let me you you had to take this story seriously for years, and it was false. It wasn't false." He asserts that "When Trump won in 2016, the intel community concluded that Russia didn't have a hand in his victory," but "Obama determined and wanted a new conclusion," sending "Brennan" to "come up with a new collusion," and insists "There was no proof." They claim "They amplified a false conclusion that Trump colluded with Russia in 2016." He adds, "The Democrats never cared about Epstein until they saw a political motivation," while noting "the right is more on top of Epstein" and that "We actually cared," concluding with "Save me your selective outrage."

Video Saved From X

reSee.it Video Transcript AI Summary
Roger Stone's trolling and lack of credibility in his statements about Assange and Clinton are highlighted. Julian Assange denies any back channel with Stone and dismisses the significance of Russian connections. Stone's false predictions and claims are addressed, with Assange emphasizing the madness of US political culture. Stone's refusal to name his WikiLeaks intermediary is criticized. Assange sees Stone's actions as a ploy to boost his image, with disappointment in media coverage.

Video Saved From X

reSee.it Video Transcript AI Summary
The hacking on both sides occurred, but the release of DNC information to WikiLeaks was deliberate to help Trump get elected. Evidence suggests Russia's involvement. Trump's claim of being caught in the act is true. Russia has the means and motivation for such actions, making this unprecedented in US electoral history.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on email leaks and allegations of hacking connected to a political context. One speaker notes that “one hour later, WikiLeaks starts dropping my emails,” suggesting a link between the leaks and his own communications. The group references those emails being public and questions about what might have been coincidental, with lines like “Just get lost into the public. One could say that there might those things might not have been a coincidence” and mentions “those things” that may or may not have been intended to surface. Two days after the initial events, the speaker recounts that “the FBI contacted me, the first thing the agent said to me was, I don’t know if you’re aware, but your email account had might have been hacked.” He confirms awareness of the hacking, stating “I said yes,” and recalls a demand that he change how he is addressed, with references to being told, “From now on, you won’t call me your father,” and “I you will call me your father,” coupled with the assertion “You think you hide shit, don’t you? Just get lost.” The dialogue shifts to broader implications: other campaign officials’ emails were divulged earlier than October 7, and the speakers discuss uncertainty about what exactly had been compromised, noting “there was a document that appeared to come from my account” and realizing “they had the contents of my email account.” The last time one speaker talked to the FBI is mentioned in the context of these disclosures. A separate thread introduces media narratives, with a speaker asking, “Media is telling you the entire story is a hoax or fake news. But what does that even mean?” and stating, “I spent the last month investigating. So what exactly is Pizzagate? And are there any actual facts to support the story?” There is a sense of frustration about interpretation and evidence, captured in the line, “They’re hearing what they wanna hear. They’re not really listening to what I’m telling them.” The transcript ends with a brief aside from another speaker, “What’s that?” indicating confusion or a request for clarification, tied to the ongoing discussion about the emails, hacks, and the Pizzagate inquiry.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states that a federal investigator told Fox News that an FBI forensic report on Seth Rich’s computer showed he made contact with WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and that Rich provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10; his wallet, cell phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later showing top DNC officials trading ideas on how to hurt Bernie Sanders at the polls, leading to the resignation of Debbie Wasserman Schultz and the DNC’s top three officials because of the apparent conclusions in those emails. Speaker 1 asks if there is an October surprise and whether anything is known about what is being sat on. Speaker 2 replies that WikiLeaks never sits on material, noting that whistleblowers take significant risks to provide material. He references a 27-year-old DNC worker who was shot in the back in Washington two weeks earlier for unknown reasons, insisting there is no finding that it was a robbery, and questioning what is being implied. Speaker 1 presses, asking if the murdered man was one of their sources. Speaker 2 declines to comment on sources, reiterating that the stakes are high in the United States and that sources face serious risks, which is why they come to WikiLeaks to protect their anonymity. He acknowledges the seriousness of the murder and says they are investigating what happened with Seth Rich, though no conclusion has been reached, and that a variety of WikiLeaks sources are concerned when such events occur. Speaker 3 contends that Seth Rich was a Bernie Sanders supporter who worked for the DNC and implies the DNC rigged the primary against Bernie Sanders. He asserts Rich was murdered after leaking information to WikiLeaks, describing Rich as a young, idealistic patriot who wore American flag attire, and argues that the murder is connected to corruption in the Democratic Party. He reflects on his own experience with online detractors and acknowledges flaws in many political figures; he asserts that it is rare to find someone who wants to be “the king of the world” and notes his own perceived lack of reputation. Speaker 4 contributes with emotion, insisting that Seth Rich was murdered and that the claim of a botched robbery is unfounded, listing inconsistencies (wallet, watch, phone left behind). He references Julian Assange and Russia, calling Assange the “darling of the left” when Obama was in office and later noting that Assange is stuck in the Ecuadorian embassy. Speaker 5 and Speaker 6 discuss broader context: Speaker 6 notes that the week WikiLeaks coverage happened on Fox News coincided with Mueller’s appointment and Comey’s firing, suggesting Fox pivoted from Russia stories to Seth Rich to deflect. Speaker 7 explains DNC data release timing, claiming FAT (file allocation table) formatting changed last-modified times on files, implying data was downloaded to a physical device before publication, suggesting an inside job rather than a Russian hack. Speaker 8 links the chain of events to the FBI, CrowdStrike, and questions about the investigation, alleging possible media silence and questioning why the murder case wasn’t more scrutinized. Speaker 9 recalls a private investigator’s work and notes that the FBI came to possess Rich’s laptop, with some at the DNC suspecting political motivation behind his murder; he asserts a media lack of follow-up. Speaker 10 presents a much broader claim: on 11/01/2016, Hillary and Bill Clinton allegedly orchestrated a civilian coup through corruption and co-optation, and a counter coup through Julian Assange and WikiLeaks was initiated by intelligence communities to prevent Hillary from becoming president and to indict Obama administration figures, describing this as a silent, internet-based counter coup and promising a peaceful transition without violence.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript captures a discussion about Clinton-related death conspiracy theories and how these claims circulate in political commentary. Speakers repeatedly assert that “the Clintons have killed” a large number of people—well over 100, with an figure cited of about 130—arguing that such deaths are linked to the Clintons’ power and to foreign policy actions, including a bombing campaign in Iraq and a massive blockade around Iraq that, according to UN estimates, contributed to the death of hundreds of thousands of children. One speaker emphasizes that “the body count is about 130” and notes that people know the body counts, even if some refuse to acknowledge the implication that politicians might have people murdered. A recurring theme is that there used to be a Clinton Body Count website tallying people connected to Hillary and Bill who were said to have been secretly killed; one participant says Hillary should demand its return and that the record is misrepresented. The conversation frames this as a widely held belief rather than proven fact, acknowledging skepticism about the claims while insisting there is “a lot of very suspicious deaths around the Clintons” that are fair to bring up. The discussion then shifts to particular cases and figures associated with Clinton circles. Vince Foster’s death is described as a conspiracy theory that never produced evidence, but the idea lingers. The panel also references other individuals—Mary Mahoney, John F. Kennedy Jr., James McDougal, and Mark Middleton—along with the broader pattern of deaths that are framed as connected to the Clintons, though without definitive proof being established on many of the cases. In the case of Mark Middleton, described as a longtime Clinton adviser who allegedly facilitated Epstein connections, Middleton’s death is recounted with details: found dead after driving to a Heifer Ranch, with an elaborate scenario involving hanging and a shotgun, an autopsy described as unclear, and a family that disputes the notion of suicide. The family has sought to seal photos and footage, arguing that releasing them would fuel conspiracy theories. The conversation also foregrounds Seth Rich, a DNC staffer who was shot in Washington, D.C. The panel notes that Rich was connected to WikiLeaks and allegedly provided thousands of emails to WikiLeaks, with claims that Fox News reported an FBI forensic finding showing contact with WikiLeaks and the release of top DNC emails leading to the resignation of Debbie Wasserman Schultz. There is debate among participants about whether Rich’s death was a botched robbery, noting that his wallet and watch were left behind and his phone was not taken, and that claims of murder are contested by others on air. Julian Assange and WikiLeaks are discussed as adding to the conspiracy milieu: Assange raises questions about killings, offers a reward for information, and is described as “working for Russia now.” The panel references the broader political pinboard: the Clinton/DNC nexus, the FBI/CrowdStrike narrative about the 2016 hacking, and the media environment around Russia investigations and alleged election interference. There is a sense of ongoing investigation and uncertainty, with speakers insisting that sources face danger and that certain deaths remain unresolved or contested in public discourse. Toward the end, the speakers reflect on how reputations attach to candidates; they compare Clinton-related reputations with those of other politicians, asking how, over the last fifty years, the pattern emerges that people close to Clinton figures die, while noting that public perception often constrains open discussion of these claims.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses leaked emails from a disgruntled DNC employee who was upset about the favoritism shown towards Hillary Clinton's campaign over Bernie Sanders'. The speaker finds it interesting and asks the employee if they realized the power Clinton held. When asked if they regret leaking the emails, the employee admits it was fun and they enjoyed it.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript discusses a set of emails and intelligence claims regarding the 2016 U.S. election and the narratives surrounding Russia, Hillary Clinton, and the Trump campaign. It states that documents contain emails allegedly from the senior vice president of the George Soros Open Society Foundation. One email quotes a Clinton campaign adviser saying, “it will be a long term affair” and to “demonize Putin and Trump,” and adds that, “later, the FBI will put more oil into the fire.” Other emails are said to reveal that Hillary Clinton approved the idea of tying Trump and Russia to election interference, describing it as a scheme hoping the allegations would distract people from her own email scandal. The documents are presented as providing clear evidence that Hillary Clinton’s campaign was behind the Russia hoax, and that the FBI knew what the Clinton team was up to, acknowledging that the information they were receiving about the Trump campaign may have come from the Clinton camp. Despite these claims, the transcript asserts that the Obama-era intelligence community proceeded with a 2017 assessment concluding that Russia aspired to help Trump win the election.

Video Saved From X

reSee.it Video Transcript AI Summary
A former DNC staffer and Bernie Sanders supporter was allegedly murdered after leaking information to WikiLeaks about the DNC rigging the primary. The speaker questions why this is dismissed as a conspiracy theory, pointing out that the staffer's wallet, watch, and phone were not taken, contrary to a robbery gone wrong. Julian Assange, once favored by the left, is now accused of working for Russia after warning of consequences for sharing information with WikiLeaks. Assange is stuck in the Ecuadorian embassy because the CIA wants him. The speaker claims many people connected to Hillary Clinton, the Clinton Foundation, and Bill Clinton have died, some coincidentally, but the number is still stunning.

Video Saved From X

reSee.it Video Transcript AI Summary
Donald Trump's recent weeks have been disastrous, reflected in the polls where he needs a miracle. The concept of an "October surprise" exists in American politics. The interviewer asks if WikiLeaks has any surprises, to which the representative responds that they don't sit on material and that whistleblowers take significant risks to provide them with information. They mention a recent incident where a 27-year-old DNC employee was shot and killed in Washington, emphasizing the risks their sources face. The interviewer questions if the victim was one of their sources, but the representative doesn't comment on that. They express concern about the situation and state that other sources are also worried when such incidents occur.
View Full Interactive Feed