TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
There were clear violations of the Espionage Act, and Obama knew and approved of Hillary Clinton's use of a secret server because he was writing to her on it using an alias. On Anthony Weiner's laptop, there were 675,000 Clinton emails, including Clinton Foundation emails, her Secretary of State emails, and Huma Abedin's emails. These included the BlackBerry backup emails that they were supposedly looking for. When they found them on the Wiener laptop, they got a search warrant for things that didn't include the BlackBerry backup emails. The claim that they reviewed all the emails is false, as they specifically did not look at the BlackBerry backups or a fraction of the emails on Anthony Weiner's laptop. The speaker suggests demanding the Anthony Weiner laptop and having a trusted person in the military analyze it, believing there is a lot that can be prosecuted. The speaker heard that New York police officers who saw some of the contents of the laptop were disturbed.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a massive file leak from Ehud Barak, ex-prime minister of Israel, with thousands of Epstein emails leaked online. Using AI and Python, he and a coding partner consolidate two email sets into one searchable JSON file (~50,000 emails) with metadata like day sent, from, and to. An AI-generated executive summary about Clinton Foundation prompts deeper digging, supported by links to primary emails. One email from noreply@relpsi.com points to Relationship Science LLC, a platform that provides real-time intelligence on influential decision makers and markets its three sixty alert emails for about $3,000 per year per subscriber. They find Barak and Epstein surveilling Hillary Clinton and Clinton Foundation, plus Putin, Bezos, Netanyahu, Gates, Soros, and others via RelSci reports—39 on Hillary relating to 2016. They claim an intelligence operation with coded messages and phone calls; a bank transfer detail appears. Plans include publishing the JSON and YouTube deep dive.

Video Saved From X

reSee.it Video Transcript AI Summary
Hillary Clinton's emails on her unsecured personal server contained intelligence from the United States government's most secretive and highly classified operations called special access programs or SAPS. These are described as the crown jewels of the American intelligence community and the United States government. The intelligence community's inspector general, Charles McCullough III, notified congressional oversight committees on January 14 that a comprehensive review by the intelligence agencies found "several dozen emails containing classified information at the confidential secret and top secret / SAP levels," bringing new scrutiny to Clinton's handling of government secrets. If this information is compromised, there would be "very serious national security damage," with no mistake that it was not something you accidentally stumble across and not realize what it is. Access to these programs is highly restricted and on a need-to-know basis only. The State Department spokesman had not seen the letter but added that there are reviews and investigations going on about past email practices and he was not at liberty to discuss the content. The new findings are striking given Clinton's first public statement about her personal server: "There is no classified material. So I'm certainly well aware of the classification requirements." Court documents indicate former CIA director David Petraeus was prosecuted for sharing special access program intelligence with his biographer Paula Broadwell, and both Petraeus and then secretary of state Clinton were required to sign nondisclosure agreements promising to protect SAPs, with the understanding that a failure to do so has significant legal consequences. This is described as a real test for the administration to apply the law in a fair and equal way and treat Hillary Clinton the same way that David Petraeus was treated. A new email first obtained by The Daily Caller shows the State Department knew about Clinton's personal account as early as August 2011, with suggestions to use a government BlackBerry and a .gov account rejected by Clinton's aide, Huma Abedin. The Obama Justice Department allegedly ordered federal lawyers to do and not to do concerning the Hillary Clinton email investigation. During sworn testimony on Capitol Hill, one insider told lawmakers what she was told. In closed-door testimony last summer, former FBI lawyer Lisa Page said the Obama administration's Justice Department advised the FBI not to pursue the gross negligence statute for Hillary Clinton in the mishandling of classified information. Former US attorney and House Republican John Radcliffe led the questioning about the statute known as 18 U.S.C. 793. Page interrupted, stating, "That is correct." Page's testimony appears to conflict with then-FBI director James Comey's recommendation in July 2016 against criminal charges for Clinton. When asked what authorities could assure the American people, she said, "No outside influence of any kind was brought to bear." The Republican-led House Oversight and Judiciary Committee investigation ended in January. With Democrats now in control, the committee's new ranking Republican made the Page transcript public. The transcript reveals an inherent two-tier system, with Hillary Clinton receiving different treatment: "there was actually at first concerned that they were going to charge her and then with Loretta Lynch in charge before she recused herself, made it very clear that that was not going to happen." A tip from a chart drawn up by federal investigators for the Clinton case, known as the mid-year exam, listed possible federal statutes for prosecution. Next to gross negligence was a notation: "DOJ not willing to charge this." Only known cases are military cases when accused lost the information. In response to the Page revelations, the president tweeted that the transcripts would: "Make the Obama justice department look exactly like it was, a broken and corrupt machine." Page testified that "The nation cannot move forward unless people are held accountable," and referenced very senior people, saying, "you know who I'm talking about, I've said it many times. You know? It's the it's the you know, start with Obama and work your way down."

Video Saved From X

reSee.it Video Transcript AI Summary
In an early 2014 email, Hillary Clinton informed her campaign manager that ISIS is funded by the governments of Saudi Arabia and Qatar. This revelation is significant as it contradicts the belief that only rogue individuals were supporting ISIS. The Clinton Foundation received donations from Saudi Arabia and Qatar while Clinton was Secretary of State, coinciding with massive arms sales to Saudi Arabia. This led to a doubling of total arms exports during her tenure, with some of that money potentially funding ISIS.

Video Saved From X

reSee.it Video Transcript AI Summary
675,000 Clinton emails, including those from the Clinton Foundation, Secretary of State, and Huma Abedin, were found on Anthony Weiner's laptop. If I were president, I would demand the laptop and have it examined by a trusted military expert. There is potential for prosecution based on the contents of the laptop. Some New York police officers who viewed it were so disturbed that they became physically ill.

Video Saved From X

reSee.it Video Transcript AI Summary
Hillary Clinton's emails on her unsecured personal server contained intelligence from the US government's most secretive and highly classified operations called special access programs (SAPs). According to a letter obtained by Fox News, a comprehensive review found several dozen emails containing classified information at the confidential, secret, and top secret/SAP levels. Access to these programs is highly restricted and on a need-to-know basis only. The State Department spokesman had not seen the letter. These findings contrast Clinton's statement that there was no classified material. Former CIA director David Petraeus was prosecuted for sharing special access program intelligence. Both Petraeus and Clinton were required to sign nondisclosure agreements promising to protect special access programs. An email shows the State Department knew about the personal account as early as August 2011, and suggestions to use a government BlackBerry and a .gov account were rejected by Huma Abedin.

Video Saved From X

reSee.it Video Transcript AI Summary
A letter obtained by Fox News reveals Hillary Clinton's emails on her unsecured personal server contained intelligence from the U.S. government's most secretive and highly classified operations, called special access programs (SAPs). Intelligence community inspector general Charles McCullough III notified congressional oversight committees on January 14 that a comprehensive review found several dozen emails containing classified information at the confidential, secret, and top secret/SAP levels. Access to these programs is highly restricted. A State Department spokesman had not seen the letter. Clinton previously stated there was no classified material on her server and that she was well aware of classification requirements. Former CIA director David Petraeus was prosecuted for sharing SAP intelligence. Both Petraeus and Clinton were required to sign nondisclosure agreements promising to protect SAPs. An email obtained by The Daily Caller shows the State Department knew about the personal account as early as August 2011, and suggestions to use a government BlackBerry and a .gov account were rejected by Huma Abedin.

Video Saved From X

reSee.it Video Transcript AI Summary
According to a letter obtained by Fox News, Hillary Clinton's emails on her unsecured personal server contained intelligence from the US government's most secretive and highly classified operations called special access programs (SAPs). The intelligence community's inspector general notified congressional oversight committees on January 14 that a comprehensive review found several dozen emails containing classified information at the confidential, secret, and top secret/SAP levels. Access to these programs is highly restricted. The findings are striking, given Clinton's earlier statement that there was no classified material. Former CIA director David Petraeus was prosecuted for sharing special access program intelligence. Both Petraeus and Clinton were required to sign nondisclosure agreements promising to protect special access programs. A new email shows the State Department knew about the personal account as early as August 2011, and suggestions to use a government BlackBerry and a .gov account were rejected by Clinton's aide.

Video Saved From X

reSee.it Video Transcript AI Summary
Hillary Clinton's email problems are reportedly "much worse than previously reported," according to a letter obtained by Fox News. The letter states Clinton's unsecured personal server contained intelligence from the U.S. government's most secretive and highly classified operations, called special access programs (SAPs). The intelligence community's inspector general notified congressional oversight committees on January 14 that a comprehensive review found "several dozen emails containing classified information at the confidential secret and top secret slash SAP levels." Experts claim that if this information is compromised, the U.S. will "suffer very serious national security damage." Clinton previously stated there was no classified material on her server and that she was "certainly well aware of the classification requirements." Former CIA Director David Petraeus was prosecuted for sharing SAP intelligence. The State Department knew about the personal account as early as August 2011, but suggestions to use a government BlackBerry and a .gov account were rejected by Clinton's aide.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion centers on a set of interconnected rumors and reported events involving Hillary Clinton’s private email server, Anthony Weiner’s laptop, and a wave of NYPD suicides, with the following key points emphasized by the speakers: - The FBI is reopening its investigation into Hillary Clinton’s email scandal after the Wall Street Journal reported that 650,000 emails are on Anthony Weiner’s laptop, and thousands of those may involve Clinton’s server because Weiner was married to Clinton aide Huma Abedin during Clinton’s tenure as secretary of state. It is noted that Clinton “bleached and deleted 33,000 emails after receiving a congressional subpoena” to cover up her crimes. - A computer used by former congressman Anthony Weiner and his estranged wife, Huma Abedin, became the focus of new inquiries into Clinton’s use of a private email server. Sources say there could be as many as 650,000 emails on the computer, with metadata suggesting thousands could have been sent to or from Clinton’s private server. The laptop’s significance is tied to its potential connection to Clinton’s emails. - It is asserted that Anthony Weiner’s laptopsite had kill switches, and that the laptop had not previously been discussed in the Clinton email probe. Weiner’s communications with a minor are described in detail, including an exclusive interview with Inside Edition where a 15-year-old girl recounts sending a message to Weiner in January 2016, which escalated to obscene messages. - The exposure of those messages is linked to the FBI’s investigation; it is claimed that Weiner’s laptop revealed emails from Hillary Clinton to Huma Abedin, and that the FBI’s review of the Weiner laptop led James Comey to reopen the investigation into Clinton’s use of a private email server just days before the presidential election. The girl’s identity is being withheld due to being underage, though her father allowed her face to be shown. - Weiner pled guilty to a charge of transferring obscene material to a minor. Commentators discuss the October 2016 Comey announcement reopening the investigation as potentially politically motivated or an attempt to cover prior inaction, with some asserting that the NYPD would have disclosed additional information if not for the FBI’s handling. - The NYPD reportedly found numerous Clinton emails, Clinton Foundation emails, and Huma Abedin’s emails on Weiner’s laptop, along with state department correspondences and other material, described as damning criminal information involving Hillary, her circle, and other Democrats. It is claimed they faced pressure to go public if the FBI did not reopen the investigation or pursue timely indictments. - Beyond the Clinton emails, the conversation includes sensational allegations of sex rings and criminal activity, including a claim that Hillary traveled to a place described as “sex island” with Jeffrey Epstein; Bill Clinton allegedly visited there many times. There are allegations that the material included “insurance policy” files and other damning content. Officers who reportedly reviewed the material allegedly suffered trauma and were said to have died, though specifics and verifications are disputed. - The dialogue notes that there were 12 individuals who saw Weiner’s laptop; it is claimed nine of those who viewed the material died, though one speaker later remarks that none of the 12 are dead. Additional reporting mentions a NYPD deputy chief, Steven Silks, who allegedly oversaw evidence from the Weiner laptop and died by suicide, with speculation about copies of the laptop being held by police brass. The discussion suggests that if the FBI hadn’t pursued the matter, there would be broader revelations. - Other speakers reference an influence of the Weiner laptop on broader investigations and imply that the material could have substantial legal consequences, including potential prosecutions.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript outlines the origin and propagation of the Pizzagate conspiracy theory and catalogs a wide range of alleged connections among political figures, businesses, and investigations, presenting these as part of an open-source online inquiry that spiraled into a real-world incident and a broader discourse about media and power. - Origins and method: WikiLeaks released emails hacked from Hillary Clinton’s private server and John Podesta’s account. Anons and various forums (Reddit, Steamit, 4chan, Vote, Websleuths) purportedly found strange references to pizza and hotdogs in the emails, which they reinterpreted as code language used by pedophiles. The narrative emphasizes an open-source investigative culture where people publicly contribute data and discuss what is pertinent, claiming that scandals have occurred on both sides of the political aisle and are bipartisan. - Core claim and media framing: The program asserts that Pizzagate originated from Podesta email dumps and evolved into a theory that Clinton and Podesta ran a child sex trafficking ring. It is claimed that the email references to pizza, handkerchiefs, hot dogs, and related terms were code words used by pedophiles, with Comet Ping Pong Pizza referenced multiple times in the emails and connected to Podesta through James Alefantis, its owner, described as a friend of Podesta and listed by GQ as a powerful DC figure. - Specific nodes and symbols: The narrative identifies a supposed FBI symbol system used by pedophiles (including a “boy love” triangle) and notes that Besta Pizza’s logo formerly contained a similar symbol, which it is argued changed after investigators pointed it out. It also links a number of performances at Comet Ping Pong (e.g., Heavy Breathing, Sex Stains) to disturbing symbols later identified as pedophile codes. James Alefantis is described with references to intimate associations (e.g., a relationship with David Brock, founder of Media Matters) and to his Instagram presence, which allegedly contained disturbing images and coded references. - Broader network and alleged ties: The film asserts extensive links among Alefantis, Podesta brothers, and other Washington figures, including references to donations to Hillary Clinton and George Soros, frequent White House visits, and dinners with Podesta. It cites pictures of Podesta with Alefantis and other figures, and claims a pattern of relationships with prominent Democrats and fundraisers. - Cultural artifacts and art world connections: The transcript describes connections to Marina Abramović and “spirit cooking” events, claiming Podesta attended such events, and cites museum-like art collections (e.g., Tony Podesta’s home) as evidence of a hidden culture. It recaps the idea that “spirit cooking” is a ritual performance and contrasts it with the artist’s explanation of context. - Notable individuals and incidents: The text references Dennis Hastert (the former House Speaker) in the context of criminal charges and alleged abuse, presenting Podesta’s emails as mentioning Hastert and tying that into a broader network. It describes various DC figures and businesses (e.g., Gordy’s Pickle Jar, Beyond Borders, Politics and Prose) as part of the alleged web of pedophilia-adjacent activity, with logos and social media posts interpreted as evidence. It claims that the Podesta brothers and others are part of a “deep state” or “occult” network. - Pizzagate in the real world: The narrative recounts the December 2016 incident in which Edgar Welch fired inside Comet Ping Pong Earth, saying he was investigating claims of a child sex ring and that the information originated online. It emphasizes the danger and harassment faced by Alefantis, staff, and customers, including death threats, and frames the gun incident as a consequence of fake-news-driven conspiracy theory. - Media coverage and accountability: The transcript includes a Kelly File segment in which James Alefantis speaks about the harassment and threats to staff and customers, underscoring that the claims had real-world consequences even as police and mainstream media reportedly found no evidence of a sex ring. It includes an Infowars segment in which Alex Jones and others discuss Pizzagate, acknowledge that they had initially reported on Podesta email code words, and later issued an apology and retraction regarding specific statements about Alefantis and Comet Ping Pong. - Investigative and ethical reflections: The piece features a video producer recounting alleged threats from Alefantis, including a phone call in which he purportedly threatened to kill the producer and his family unless the related video was deleted. It also includes a segment where a technician discusses alleged “kill room” imagery and references to underground tunnels and a Pegasus museum, tying them to the broader conspiracy. - Conclusion and framing of a larger struggle: The final portion frames Pizzagate as part of a larger battle against a supposed deep-state manipulation of media and government. It positions the narrative as a catalyst for a broader movement (referred to as Q and a coming “second American revolution”), calling for declassification of materials related to Epstein, Gates, Spygate, Russiagate, JFK, and 9/11 and presenting a claim that public trust in mass media and social platforms is in jeopardy. It ends with a call to action and a slogan about a movement that transcends party politics, asserting that government should be controlled by the people. Throughout, the transcript presents a chain of alleged connections, symbols, and events used to argue that a hidden, interconnected network of political and cultural elites engaged in child trafficking, with Pizzagate as a flashpoint that demonstrated broader cultural and media manipulation. It includes counterpoints from mainstream coverage, as well as self-professed apologies and retractions by some producers, but it maintains the core claim of a pervasive, concealed conspiracy supported by a web of social, political, and artistic figures.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: This story that's been the biggest thing on the Internet for several weeks, Pizzagate, as it's called, is a rabbit hole that is horrifying to go down. Now if you're a radio listener, this is a powerful video, but I've had it reposted because, again, he finished it, I guess, on Wednesday. It went out Thursday on the nightly news that was taped the day before. This is on infowars.com. Pizzagate is real. The only question is, what exactly is it? Because I'd said, man, I hope this is drug dealing code word or something or, you know, maybe they got the wrong manual because this is the FBI says this is this is pedophilia manuals. These are the terms they use, and then here's the New York Times. Fake news onslaught targets pizzeria as nest of child traffickers. Hey. I don't know why the pizzeria and the one down the street have symbols in the FBI dossier. I don't know why there's devil worship part of the walls. I don't know why it's connected to Potesta. I don't know why they got rock singers there talking about, you know, being you know, going after kids or whatever. This is what's going on, though. And so maybe it's just some genre they picked up. They don't know what they're involved in. I'm not accusing them of anything. Little I mean, it's not like they look like little piggy people or anything. Not like they fit all the cliches or anything when you go to the just like nice people to me, but the point is is that this is tied into Podesta with thousands of emails with, we're gonna have the six year old, the seven year old, and eight year old in the hot tub for your entertainment out at the ranch house. They can be a little persnickety, but they are also willing and enjoy it. Yeah. I mean, there's thousands of these. You're reading it going, what the hell is this? And you start reading it. There's thousands and thousands and thousands, and you know you're reading something real bad. Oh, I'll see you at the feast tonight. Oh, we'll have lots of blood and semen. Oh, good. And then they had, like, Time Magazine worshiping this high priestess the week after we exposed her about the news, all this PR, like, oh, we'll show them. They're attacking our high priestesses. We'll just put them in the news better. Like, we're all upstanding and out in the open and good people. Look. I've been careful about all this. This is lawsuit city. I don't know what the hell is going on with these people. I know straight up devil worship when I see it and find quotes of her saying it's real when she does it privately. Could he harass me anything Reddit accounts? I mean, I know real bathymen worship when I see it, but thousands of emails, I'm not ready to accuse all these people of this. It's up to you to research it for yourself, but you gotta go to infowars.com and actually see the photos and videos inside these places. You've gotta see their menus. You've gotta see it all, ladies and gentlemen, and then you gotta see the FBI law enforcement manuals showing the code words that are used. And by the way, didn't just believe this. I went to the FBI site. I went and looked it all up, and people asked, well, why weren't you on this earlier? We were on it from the beginning. We've been on it the last couple weeks since the election, but we're fighting on hundreds of fronts here. Let's go ahead and go to the report. Pizzagate is real. The question is, how real is it? What is it? Something's going on. Something's being covered up. It needs to be investigated. You just call it fake news. These are real WikiLeaks. This is real stuff going on. Here it is. Speaker 1: A warning to viewers, the following images are disturbing. This all began after WikiLeaks founder Julian Assange released hundreds of thousands of secret documents detailing a back stabbing Clinton Foundation, but it now appears the real truth Assange was leading us to was hidden between the blurred lines of Hillary Clinton's campaign manager, John Podesta's, released emails. Fast forward past John Podesta's brother, Tony's, casual email exchange with thalemic spirit cooking adherent Marina Abramovic. Rosetta Stone was needed next. A verification that high level Washington DC predatory pedophiles were using a code to communicate child sex trafficking as casually as ordering a pizza. An FBI unclassified document from WikiLeaks revealed symbols and logos used by pedophiles to identify sexual preferences to include those who sexually abuse children as well as those who produce, distribute, and trade child pornography are using various types of identification logos or symbols to recognize one another and distinguish their sexual preferences. Investigators should also be attentive to pedophilia symbols advertised on websites. During examinations of computer files, investigators should be conscious of subjects who try to conceal child pornography by labeling them with symbols instead of typical suggestive explicit names. Thus, the interest in code words. Now clues. The menu from comet ping pong. Notice the symbol of the ping pong paddles and its clever resemblance to the FBI documents symbol for child love. Alright. Hang on, New York Times. Before you declare this fake news from your ivory tower, now look at the symbol for Besta Pizza just two doors down from comet ping pong pizza, boldly using the symbol for boy lover as was recorded on the unclassified FBI document. The evidence begins to reveal that Besta Pizza and Comet Ping Pong Pizza may be competing for the lucrative Washington DC pedophile market right out in the open. Comet Ping Pong owner James Alifantis needs to explain himself, and so he did via the Hillary Clinton colluding New York Times. But so many questions remain unanswered. Why was this said by the band heavy breathing performing in comet ping pong? Speaker 0: He likes the world sounds. Demolios. And little boys. And children. Think I was his manager. Yep. We all have references. Speaker 1: Why is the art work adorning Comet Ping Pong's walls at the very least so insanely creepy, especially for a family restaurant? Why is Alifantis so close to Tony Podesta as revealed in the WikiLeaks emails? And why does mister Podesta collect questionable artwork specializing in grotesque eroticism and pedophilic images, not to mention Podesta's dabbling in what appears to be cannibalistic rituals while continuing his old friendship with convicted pedophile Dennis Hastard. Why is this man wearing an I love children shirt in this situation? Why did you write hashtag murder next to this incredibly creepy photo you posted? Why do you find it amusing that this baby is for sale? Why do you associate with this artist? Why is any of this okay? And if these code words are eventually proven to be just another method of communication, then why did the Podesta emails mention the code word pasta for either little boy or sex 78 times. Code word cheese for little girl 85 times. And what does Podesta's friend Herb mean by this statement from a Podesta email? PS. Do you think I'll do better playing dominoes on cheese than on pasta? According to the National Center for Missing and Exploited Children and the FBI, 460,699 children went missing in 2015 that we know of. Mister Alifantis, this isn't a witch hunt, and it isn't an attack from fake news that your boyfriend David Brock, founder of Media Matters, would have us all ignore. Either you are the unlucky victim of a fake news onslaught due to your own poorly initiated publicity or a decades old pedophile ring operating in the power hoarding shadows of Washington DC is about to be opened from your front door. John Bound for infowars.com. Speaker 0: Trump won. Hillary stole five states. Was ordered to stand down by the intelligence agencies where everything else is gonna come out on this. If you're a radio listener, you're lucky you didn't actually see the video. The art they tweet in Facebook is of children being murdered, cut in pieces, and raped by men with giant genitalia. So oh, yeah. Oh, yeah. So I don't know anymore, but that's what they're pushing. It's what they got hanging up in there, and it's what they're doing. And, I I can't go out there and investigate it myself. We've had reporters on that have been there. They say it's really creepy because, I don't have the self control to be around these type of people. So you want us to cover Pizzagate? We have covered it. We are covering it, and all I know is, god help us, we're in the hands of pure evil. We'll be right back. I'm on the show.

Video Saved From X

reSee.it Video Transcript AI Summary
Men multiplied on the earth and the sons of God took wives from the daughters of men. Giants existed in those days, and the sons of God had children with the daughters of men, resulting in mighty men of renowned. A cache of information related to Hillary Clinton's emails was released, mentioning the discovery of Nephilim in Gilgamesh. The epic of Gilgamesh tells the story of a hybrid king who ruled over humans. In 2003, a German research team found structures described in the epic, potentially confirming the existence of Gilgamesh's tomb. However, the excavation was halted due to conflict, and the US military was accused of suppressing the discoveries. The tomb of Gilgamesh was found in the desert of Iraq, and artifacts were recovered from a secret vault in Iraq's central bank. The connection between Gilgamesh and the antichrist is discussed, and the scripture warns against believing claims of the antichrist's location.

Video Saved From X

reSee.it Video Transcript AI Summary
Hillary Clinton's use of a private email server during her time as Secretary of State has been a subject of controversy. Clinton claimed that she sent work-related emails to government accounts, but it was later discovered that she used a private server. Clinton's lawyers sorted through her emails, separating work and personal ones. Around 30,000 work-related emails were turned over to the State Department, while roughly the same number of personal emails were deleted. The FBI recovered some emails, but others were permanently lost. There were also concerns about attempts to hide Clinton's email address and the use of BleachBit software to delete emails. The FBI did not reopen the investigation despite these revelations.

Video Saved From X

reSee.it Video Transcript AI Summary
In an email from Hillary Clinton to her campaign manager, it is stated that the governments of Saudi Arabia and Qatar have been funding ISIS. This is significant because Saudi and Qatari money is spread across various media institutions. It has been known that some Saudi figures support ISIS, but the government has always claimed disapproval, blaming rogue individuals. However, this email confirms that it is the governments themselves funding ISIS. Additionally, during Clinton's tenure as Secretary of State, the US approved a massive arms deal with Saudi Arabia worth over $80 billion, and the Clinton Foundation received donations from Saudi Arabia and Qatar, who were also funding ISIS. This connection is alarming.

Video Saved From X

reSee.it Video Transcript AI Summary
There's a massive file leak from Ehud Barak, the ex-prime minister of Israel and Epstein associate, with thousands of emails leaked online. This is just the start; AI analysis aims to consolidate thousands of emails into a searchable JSON file to reveal surveillance of Clinton and others. A noreply@relsai.com email pointed to Relationship Science LLC, whose REL SAI service provides a 'web based platform to build business relationships...' with 'three sixty alert emails' at '$3,000 per year per subscriber.' They report Hillary Clinton surveillance—'39 different reports about her relating mostly to her presidential campaign in 2016'—and surveillance of Putin, Bezos, Bill Clinton, Netanyahu, Gates, Summers, Bloomberg, Soros. Epstein and Barak were 'working on an intelligence operation together as partners,' using coded messages and phone calls for sensitive content. An email showed a bank account and routing number; Ayhu Barak involved. Plans for a JSON and a YouTube deep dive.

Video Saved From X

reSee.it Video Transcript AI Summary
Hillary Clinton's emails on her unsecured personal server contained intelligence from the US government's most secretive and highly classified operations called special access programs (SAPs). According to a letter obtained by Fox News, a comprehensive review found several dozen emails containing classified information at the confidential, secret, and top secret/SAP levels. The intelligence community's inspector general notified congressional oversight committees of the findings. Access to these programs is highly restricted and on a need-to-know basis only. The State Department spokesman had not seen the letter. These findings contrast Clinton's earlier statement that there was no classified material. Former CIA director David Petraeus was prosecuted for sharing special access program intelligence. Both Petraeus and Clinton were required to sign nondisclosure agreements promising to protect special access programs. An email shows the State Department knew about the personal account as early as August 2011, and suggestions to use a government BlackBerry and a .gov account were rejected by Huma Abedin.

Video Saved From X

reSee.it Video Transcript AI Summary
The FBI is reopening its investigation into Hillary Clinton's use of a private email server. The Wall Street Journal reports that 650,000 emails are sitting on Anthony Weiner's laptop, and thousands of those may involve Clinton's server since Weiner was married to Clinton's top aide when she was secretary of state. To cover up her crimes, she bleached and deleted 33,000 emails after receiving a congressional subpoena. A computer used by former congressman Anthony Weiner and his estranged wife, Huma Abedin, is now the focus of new inquiries. Sources say there could be as many as 650,000 emails on the computer with underlying metadata suggesting that thousands of those messages could have been sent to or from the private server that Mrs. Clinton used while she was secretary of state. The laptop had previously not come up in the Clinton email probe. Anthony Weiner’s laptop reportedly contained kill switches and was not released before. Weiner’s laptop is connected to an investigation into whether he sent sexually charged emails to a teenage minor; the laptop hadn’t previously come up in the Clinton probe. In an exclusive interview with Inside Edition, a minor says she first sent Weiner a message on Twitter in January 2016 when she was 15 years old. She says the messages quickly turned obscene, and she was disgusted, which contributed to her coming forward. At the time, Weiner's wife, Huma Abedin, was helping run Hillary Clinton's presidential campaign. The FBI's investigation of Weiner's laptop led to the discovery of a new batch of emails that Clinton had sent to Abedin, which led former FBI director James Comey to reopen the investigation into Clinton's use of a private email server just days before the presidential election. Inside Edition says it is withholding the girl's name because she is underage, but her father gave permission for her face to be shown. Weiner pled guilty to a charge of transferring obscene material to a minor. Commentators note that Comey’s October 2016 reopening announcement was controversial, with some saying it cost Hillary Clinton the election. It is argued that the NYPD started investigating via subpoena and warrant, and they found 650,000 emails on Weiner’s laptop, including Clinton emails, Huma Abedin’s emails, and evidence pertaining to Clinton Foundation. They reportedly found state department emails and material including money laundering and references to a trip to Epstein’s “sex island,” with Clinton and Bill Clinton allegedly there multiple times. The material was given to the FBI, with threats to go public if the investigation wasn’t reopened or indictments issued. There is testimony that “nine cops watched the videos on Wiener's laptop,” and that those officers were later dead. Another account says there were 12 individuals who saw the laptop, and none are dead. Reports note a surge in NYPD suicides this year, with nine or more officers dying by suicide, including the latest at Queens General Hospital. One account links deputy chief Steven Silks to overseeing evidence from the Weiner laptop and to copies made of that evidence; Silks reportedly died by an alleged self-inflicted gunshot wound one month before mandatory retirement. Other rumors claim the laptop contained numerous emails from Hillary Clinton during her time as secretary of state, “insurance policy” files, and family involvement, with allegations that the FBI lost the laptop. A high-ranking NYPD official reportedly warned of grave contents and indicated others had copies of the information. Proponents argue that, if the Weiner laptop were released, the government would fall.

Video Saved From X

reSee.it Video Transcript AI Summary
Hillary Clinton's email problems are reportedly "much worse than previously reported," according to a letter obtained by Fox News. The letter states that Clinton's unsecured personal server contained intelligence from the U.S. government's most secretive and highly classified operations, called special access programs (SAPs). The intelligence community's inspector general notified congressional oversight committees on January 14 that a comprehensive review found "several dozen emails containing classified information at the confidential secret and top secret slash SAP levels." Experts claim that if this information is compromised, the U.S. will "suffer very serious national security damage." Clinton previously stated there was no classified material on her server, and that she was "certainly well aware of the classification requirements." Former CIA director David Petraeus was prosecuted for sharing SAP intelligence, and both Petraeus and Clinton were required to sign nondisclosure agreements promising to protect special access programs. A new email shows the State Department knew about the personal account as early as August 2011, but suggestions to use a government BlackBerry and a .gov account were rejected by Clinton's aide.

Video Saved From X

reSee.it Video Transcript AI Summary
A letter obtained by Fox News reveals Hillary Clinton's emails on her personal server contained intelligence from special access programs (SAPs). According to the letter, the intelligence community's inspector general notified congressional oversight committees on January 14 that a review found several dozen emails containing classified information at the confidential, secret, and top secret/SAP levels. Access to SAPs is highly restricted. The State Department spokesman stated there are ongoing reviews about past email practices. These findings contradict Clinton's earlier statement that there was no classified material on her server. Former CIA director David Petraeus was prosecuted for sharing SAP intelligence. Both Petraeus and Clinton were required to sign nondisclosure agreements promising to protect SAPs. An email obtained by the Daily Caller shows the State Department knew about the personal account as early as August 2011, and suggestions to use a government BlackBerry and a .gov account were rejected by Huma Abedin.

Video Saved From X

reSee.it Video Transcript AI Summary
There were clear violations of the Espionage Act, contrary to President Obama's claims. Hillary Clinton's use of a secret server was known and approved, as evidenced by communications from an alias. The discovery of 675,000 Clinton emails on Anthony Weiner's laptop, linked to various individuals including Huma Abedin, raises serious concerns. The FBI's claims of reviewing all emails were misleading; they did not examine the BlackBerry backup emails or many others on the laptop. If in a position of power, I would demand access to the Weiner laptop for thorough investigation, as it likely contains prosecutable material. Reports suggest that even experienced investigators were disturbed by what they found.

Video Saved From X

reSee.it Video Transcript AI Summary
A speaker describes a massive file leak of thousands of emails from Ehud Barak, ex-prime minister of Israel, noting the mainstream media's silence. He and a partner use AI and Python to aggregate 50,000+ emails into one searchable JSON, preserving file names, dates, senders, and recipients. Initial AI summaries highlight Clinton Foundation surveillance, prompting insistence on primary-source citations from emails. One email appears as a noreply@relsai.com newsletter; this links to Relationship Science LLC, a platform that provides real-time intelligence on over 10,000,000 influential decision makers for a $3,000/year subscription. They find that Barak and Epstein were surveiling Hillary Clinton, Vladimir Putin, Jeff Bezos, Bill Clinton, Netanyahu, Gates, Soros, Bloomberg, Summers, and more, via paid reports. They also flag a bank account/routing number exchange and say Epstein and Barak were working on an intelligence operation, using phone calls for sensitive content. Plans to publish the JSON and continue deep dives.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2016, the Clintons orchestrated a silent coup using corruption and political connections. However, a counter coup was initiated by the intelligence community through Julian Assange and WikiLeaks. The case involving Hillary Clinton's emails, particularly those linked to Anthony Weiner, served as a warning to the administration that their corruption would be exposed. This counter coup aimed to prevent Hillary from becoming president and to hold Loretta Lynch and others accountable for their involvement in the Clinton Foundation's corruption. This historic event unfolded on the internet, with various intelligence organizations and brave individuals working together to save the republic. The goal is a peaceful transition of power without pardons or acts of treason.

Video Saved From X

reSee.it Video Transcript AI Summary
This is a massive file leak from Ehud Barak, ex-prime minister of Israel, with thousands of his emails leaked online. The host calls it “the start” and “preliminary reporting,” describing a project to merge tens of thousands of emails into a single, searchable JSON file preserving file names, paths, dates, and sender/recipient data. They used AI to generate summaries and found Clinton Foundation surveillance: “surveillance of the Clinton Foundation” and “39 different reports about her relating mostly to her presidential campaign in 2016,” plus surveillance of Vladimir Putin, Jeff Bezos, Bill Clinton, Benjamin Netanyahu, Bill Gates, Larry Summers, Michael Bloomberg, George Soros, and others. The monitoring appears to come from Relationship Science LLC (RellSci), whose newsletters from noreply@relsai.com provide real-time intelligence on over 10,000,000 influential decision makers and over 1,800,000 organizations, costing about $3,000 per year per subscriber. They conclude Epstein and Barak were “communicating behind the scenes about surveillance on the Clinton administration” and “working on an intelligence operation”; Epstein allegedly sent a bank account number and routing number to Barak for a money transfer. The researcher plans to publish the JSON and explore more connections, including a YouTube deep dive.

Video Saved From X

reSee.it Video Transcript AI Summary
The Anthony Weiner laptop contained 675,000 Clinton emails, including those from her time as Secretary of State and communications with Huma Abedin. When the FBI searched the laptop, they overlooked the critical BlackBerry backup emails, which Comey referred to as the "golden emails." They claimed to have reviewed all emails, but this was misleading. If in a position of power, I would demand access to the laptop and have a trusted military official analyze its contents, as there are likely prosecutable offenses within. Reports suggest that even experienced investigators were disturbed by what they found on the device.
View Full Interactive Feed