reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
I remember the night I got elected and seeing people upset about Hillary not winning. I have my opinions on past presidents, like Bush senior, but the Clintons raise questions. Did they have an open marriage? Hillary seemed more upset about Bill getting caught in the Oval Office than his infidelities. The email scandal is another topic of interest. If we could see behind the scenes of politics, it would be like watching a dramatic show, and I think it would shock everyone.

Video Saved From X

reSee.it Video Transcript AI Summary
In 2016, there was controversy surrounding the hacking and recount of voting machines in Michigan and Wisconsin. Hillary Clinton was upset because the machines she had hacked got unhacked, and Jill Stein demanded a recount. It was believed that Hillary expected the same treatment as Joe Biden in the election. She had been promised that the game would be rigged for her, but it didn't happen. This caused her to lose her mind and throw things. In 2016, someone counterhacked the people who were going to hack on Hillary's behalf, but that didn't happen this time. The speakers know who did it but will save that for another discussion.

Video Saved From X

reSee.it Video Transcript AI Summary
People who oppose the mainstream media are often labeled as racist or potentially dangerous. WikiLeaks recently released thousands of hacked emails from Clinton campaign chairman John Podesta, which have revealed corruption, law breaking, and collusion within the Clinton campaign, the government, and the media. There are also claims that Podesta may be involved in a child sex trafficking ring. Additionally, the emails suggest that Podesta and his brother participated in occult practices. The speakers express their anger and frustration towards Podesta, demanding to know what secrets he is hiding.

Video Saved From X

reSee.it Video Transcript AI Summary
People who criticize the mainstream media are often labeled as racist or potentially dangerous. Tonight's discussion will be disturbing but it offers a reality check that you won't find elsewhere. WikiLeaks has released a new batch of emails from campaign chairman John Podesta, revealing corruption, lobbying, and media manipulation within the winning campaign. There are also claims of a child sex trafficking ring. This is a deliberate effort to destroy John Podesta personally. In a bizarre exchange, someone demands to be called "father" and tells another person to get lost.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses an email mentioning Seth Rich, a DNC staffer who was murdered. The email refers to Julian Assange's claim that Rich was a WikiLeaks source and may have been killed for leaking DNC emails. The FBI denies specific involvement but admits awareness of the reporting. There is mention of squashing the inquiry, possibly involving a media outlet. The speaker questions why the FBI didn't investigate Rich's murder despite public suggestions of his involvement in the leaks. They compare it to the FBI's investigation into Donald Trump based on rumors. The speaker finds it interesting how the FBI decides what to investigate and the basis for their decisions.

Video Saved From X

reSee.it Video Transcript AI Summary
A former Bernie Sanders supporter who worked for the DNC leaked information to WikiLeaks, exposing the rigging of the primary against Sanders. He was subsequently murdered. The speaker emphasizes that this is not a conspiracy theory, but a fact. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker suggests that the CIA wants Assange and controls various organizations to achieve their goals. They mention the possibility of more revelations related to Seth Rich and the number of people connected to the Clintons who have been killed.

Video Saved From X

reSee.it Video Transcript AI Summary
A former Bernie Sanders supporter who worked for the DNC claims that the DNC rigged the primary against Sanders. He leaked information to WikiLeaks and was subsequently murdered. The speaker questions why people ignore this and dismiss it as a conspiracy theory. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker suggests that the CIA controls everyone and is trying to capture Assange. They mention the possibility of the Ecuadorian embassy being blown up. The speaker believes that there are many people connected to the Clinton Organization who have been silenced or harmed.

Video Saved From X

reSee.it Video Transcript AI Summary
A Bernie Sanders supporter who worked for the DNC leaked information to WikiLeaks, exposing the rigging of the primary against Sanders. He was subsequently murdered. The speaker emphasizes that this is not a conspiracy theory, but a fact. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker believes that Assange is being targeted by the CIA. They mention the possibility of the Ecuadorian embassy being blown up and suggest that more information, like the Seth Rich case, will continue to come out. The speaker acknowledges that some connections to the Clintons may be coincidental, but believes there are many suspicious deaths associated with them.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the biggest scandal was when their campaign was spied on, but the other person disagrees, saying there is no evidence. The speaker insists that it is all over the place and that it was bad for Biden. The other person explains that they can't put on things they can't verify. The speaker continues to assert that it has been verified and that they got caught. The other person denies knowing about it.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on the Seth Rich murder and its alleged connection to WikiLeaks and the 2016 DNC email controversy. An FBI forensic report purportedly found that Rich contacted WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and Rich allegedly provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10, but his wallet, phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later, showing top DNC officials discussing ways to hurt Bernie Sanders at the polls, which contributed to the resignation of Debbie Wasserman Schultz as DNC chair and the DNC’s top three officials. Speaker 1 questions whether there is an “October surprise” and whether material is being held. Speaker 2 of the Helix group states that they do not sit on material and emphasizes that whistleblowers take significant risks; they note Rich’s murder as an example of high stakes and risk to sources, asserting that sources seek anonymity with them. When Speaker 1 asks if Rich was a source, Speaker 2 declines to comment but says they are investigating what happened to Rich and are concerned about it, though no conclusion has been reached. Speaker 3 argues that Rich was a Bernie Sanders supporter who worked for the DNC and asserts that the DNC rigged the primary against Sanders; he notes that Rich was aware of this and was involved as it happened, with Donald Brazil also involved. He describes Rich as idealistic and patriotic, and recounts his murder after leaking information to WikiLeaks, insisting that this is not a conspiracy theory but a fact-based concern. He challenges others to acknowledge the alleged corruption within the Democratic party and suggests that those who ignore the facts are engaging in denial. He also critiques media portrayals and online accusations about his own credibility. Speaker 4 discusses Assange and WikiLeaks, criticizing the idea of a conspiracy theory and labeling Assange as a key figure who exposed corruption. He mentions that Assange now “works for Russia” and questions the Ecuadorian embassy situation, describing it as heavily manipulated by interests around Hillary Clinton and the Clinton Foundation. He connects the Seth Rich disclosures to broader allegations of a coordinated effort to undermine Clinton and her circle, while acknowledging that some related claims may be questionable. Speaker 6 notes that hacking of the DNC and the role of CrowdStrike remain controversial and points to the subsequent murder of Rich as a focal point for questions that have not been fully explored by the media. Speaker 7 echoes concerns about the timeline, the FBI’s involvement, and past inquiries that were not pursued, emphasizing a sense that the case and the broader narrative around the DNC emails have been inadequately examined. Speaker 8 presents a long, conspiratorial narrative alleging that on 11/01/2016 Hillary and Bill Clinton orchestrated a civilian coup through corruption and co-option of key institutions, while a countercoup through Julian Assange and WikiLeaks was initiated to undermine Hillary and the Clinton machine. The speaker claims a silent countercoup across the Internet, led by members of the intelligence community, to stop the Clintons from gaining power and ensure Obama leaves without pardon, framing the moment as a major transitional event and a second American revolution conducted without guns.

Video Saved From X

reSee.it Video Transcript AI Summary
In the video, the speaker discusses the release of Hillary Clinton's emails from the late 2010s, which contained embarrassing details such as her speeches to Goldman Sachs. These emails damaged her image as she pretended to be a friend of the people. The speaker also mentions the leak of emails from the Democratic National Committee, which were wrongly blamed on Russia. They suggest that a DNC employee leaked the emails due to favoritism towards Clinton's campaign over Bernie Sanders'. The speaker asked if the publisher realized how powerful Clinton was, to which they replied that it was fun and they enjoyed it.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker believes that Hillary Clinton violated the Espionage Act and that President Obama was aware of it. They mention the Anthony Weiner laptop, which contained 675,000 Clinton emails, including those from the Clinton Foundation and Huma Abedin. The speaker accuses James Comey of lying when he said they had reviewed all the emails. They suggest that if they were the president, they would demand the laptop and have it thoroughly examined. They believe there is potential for prosecution based on the laptop's contents.

Video Saved From X

reSee.it Video Transcript AI Summary
The email leaks reveal the close ties between the Clinton campaign and the media. Clinton received questions and answers in advance of her debate with Bernie Sanders, and she had control over quotes written about her in the New York Times. The emails also show collaboration and conspiracy between reporters and the Clinton campaign to help her win the election. The Clinton machine is determined to destroy our campaign, but we are part of a powerful movement that our country has never seen before.

Video Saved From X

reSee.it Video Transcript AI Summary
A Bernie Sanders supporter who worked for the DNC claims that the party rigged the primary against Sanders. He leaked information to WikiLeaks and was subsequently killed. The speaker believes this is suspicious and points out other deaths connected to the Clintons. They discuss the Uranium One story, alleging that Bill Clinton received money from a Kremlin bank and that $142 million flowed into the Clinton Foundation. The argument that it was debunked is dismissed as bullshit. The money is seen as an attempt to buy influence.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states that Speaker 2 has a reputation for texting underage girls. Speaker 0 claims Bill Clinton officiated Speaker 2's wedding with someone who was a right-hand person to Hillary Clinton in 2016. Speaker 0 mentions 650,000 emails and a folder with the words "life insurance," claiming that nine out of twelve NYPD cops who saw the email committed suicide. Speaker 0 then reads a list of 46 names of people close to the Clintons who have died, including James McDougal and Mary Mahoney. Speaker 2 accuses Speaker 0 of being a bully for reading the list and says Hillary Clinton is the problem. Speaker 0 asks how people close to the Clintons keep dying. Speaker 1 suggests cutting the list out, but Speaker 0 refuses.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker, who claims to have been part of the Clinton machine, discusses his transformation from a corrupt individual to someone seeking justice against Hillary Clinton. He believes that Hillary is the one pulling the strings and warns of the consequences if she becomes president. The speaker also talks about the email scandal and how it was used to make Hillary an underdog in the election. He mentions the Arkansas Development Finance Authority and the alleged corruption surrounding it. The speaker shares stories about Bill Clinton's sexual affairs and the suspicious circumstances surrounding the death of Vince Foster. He concludes by emphasizing the importance of protecting individual rights and standing up against Washington's power.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: This story that's been the biggest thing on the Internet for several weeks, Pizzagate, as it's called, is a rabbit hole that is horrifying to go down. Now if you're a radio listener, this is a powerful video, but I've had it reposted because, again, he finished it, I guess, on Wednesday. It went out Thursday on the nightly news that was taped the day before. This is on infowars.com. Pizzagate is real. The only question is, what exactly is it? Because I'd said, man, I hope this is drug dealing code word or something or, you know, maybe they got the wrong manual because this is the FBI says this is this is pedophilia manuals. These are the terms they use, and then here's the New York Times. Fake news onslaught targets pizzeria as nest of child traffickers. Hey. I don't know why the pizzeria and the one down the street have symbols in the FBI dossier. I don't know why there's devil worship part of the walls. I don't know why it's connected to Potesta. I don't know why they got rock singers there talking about, you know, being you know, going after kids or whatever. This is what's going on, though. And so maybe it's just some genre they picked up. They don't know what they're involved in. I'm not accusing them of anything. Little I mean, it's not like they look like little piggy people or anything. Not like they fit all the cliches or anything when you go to the just like nice people to me, but the point is is that this is tied into Podesta with thousands of emails with, we're gonna have the six year old, the seven year old, and eight year old in the hot tub for your entertainment out at the ranch house. They can be a little persnickety, but they are also willing and enjoy it. Yeah. I mean, there's thousands of these. You're reading it going, what the hell is this? And you start reading it. There's thousands and thousands and thousands, and you know you're reading something real bad. Oh, I'll see you at the feast tonight. Oh, we'll have lots of blood and semen. Oh, good. And then they had, like, Time Magazine worshiping this high priestess the week after we exposed her about the news, all this PR, like, oh, we'll show them. They're attacking our high priestesses. We'll just put them in the news better. Like, we're all upstanding and out in the open and good people. Look. I've been careful about all this. This is lawsuit city. I don't know what the hell is going on with these people. I know straight up devil worship when I see it and find quotes of her saying it's real when she does it privately. Could he harass me anything Reddit accounts? I mean, I know real bathymen worship when I see it, but thousands of emails, I'm not ready to accuse all these people of this. It's up to you to research it for yourself, but you gotta go to infowars.com and actually see the photos and videos inside these places. You've gotta see their menus. You've gotta see it all, ladies and gentlemen, and then you gotta see the FBI law enforcement manuals showing the code words that are used. And by the way, didn't just believe this. I went to the FBI site. I went and looked it all up, and people asked, well, why weren't you on this earlier? We were on it from the beginning. We've been on it the last couple weeks since the election, but we're fighting on hundreds of fronts here. Let's go ahead and go to the report. Pizzagate is real. The question is, how real is it? What is it? Something's going on. Something's being covered up. It needs to be investigated. You just call it fake news. These are real WikiLeaks. This is real stuff going on. Here it is. Speaker 1: A warning to viewers, the following images are disturbing. This all began after WikiLeaks founder Julian Assange released hundreds of thousands of secret documents detailing a back stabbing Clinton Foundation, but it now appears the real truth Assange was leading us to was hidden between the blurred lines of Hillary Clinton's campaign manager, John Podesta's, released emails. Fast forward past John Podesta's brother, Tony's, casual email exchange with thalemic spirit cooking adherent Marina Abramovic. Rosetta Stone was needed next. A verification that high level Washington DC predatory pedophiles were using a code to communicate child sex trafficking as casually as ordering a pizza. An FBI unclassified document from WikiLeaks revealed symbols and logos used by pedophiles to identify sexual preferences to include those who sexually abuse children as well as those who produce, distribute, and trade child pornography are using various types of identification logos or symbols to recognize one another and distinguish their sexual preferences. Investigators should also be attentive to pedophilia symbols advertised on websites. During examinations of computer files, investigators should be conscious of subjects who try to conceal child pornography by labeling them with symbols instead of typical suggestive explicit names. Thus, the interest in code words. Now clues. The menu from comet ping pong. Notice the symbol of the ping pong paddles and its clever resemblance to the FBI documents symbol for child love. Alright. Hang on, New York Times. Before you declare this fake news from your ivory tower, now look at the symbol for Besta Pizza just two doors down from comet ping pong pizza, boldly using the symbol for boy lover as was recorded on the unclassified FBI document. The evidence begins to reveal that Besta Pizza and Comet Ping Pong Pizza may be competing for the lucrative Washington DC pedophile market right out in the open. Comet Ping Pong owner James Alifantis needs to explain himself, and so he did via the Hillary Clinton colluding New York Times. But so many questions remain unanswered. Why was this said by the band heavy breathing performing in comet ping pong? Speaker 0: He likes the world sounds. Demolios. And little boys. And children. Think I was his manager. Yep. We all have references. Speaker 1: Why is the art work adorning Comet Ping Pong's walls at the very least so insanely creepy, especially for a family restaurant? Why is Alifantis so close to Tony Podesta as revealed in the WikiLeaks emails? And why does mister Podesta collect questionable artwork specializing in grotesque eroticism and pedophilic images, not to mention Podesta's dabbling in what appears to be cannibalistic rituals while continuing his old friendship with convicted pedophile Dennis Hastard. Why is this man wearing an I love children shirt in this situation? Why did you write hashtag murder next to this incredibly creepy photo you posted? Why do you find it amusing that this baby is for sale? Why do you associate with this artist? Why is any of this okay? And if these code words are eventually proven to be just another method of communication, then why did the Podesta emails mention the code word pasta for either little boy or sex 78 times. Code word cheese for little girl 85 times. And what does Podesta's friend Herb mean by this statement from a Podesta email? PS. Do you think I'll do better playing dominoes on cheese than on pasta? According to the National Center for Missing and Exploited Children and the FBI, 460,699 children went missing in 2015 that we know of. Mister Alifantis, this isn't a witch hunt, and it isn't an attack from fake news that your boyfriend David Brock, founder of Media Matters, would have us all ignore. Either you are the unlucky victim of a fake news onslaught due to your own poorly initiated publicity or a decades old pedophile ring operating in the power hoarding shadows of Washington DC is about to be opened from your front door. John Bound for infowars.com. Speaker 0: Trump won. Hillary stole five states. Was ordered to stand down by the intelligence agencies where everything else is gonna come out on this. If you're a radio listener, you're lucky you didn't actually see the video. The art they tweet in Facebook is of children being murdered, cut in pieces, and raped by men with giant genitalia. So oh, yeah. Oh, yeah. So I don't know anymore, but that's what they're pushing. It's what they got hanging up in there, and it's what they're doing. And, I I can't go out there and investigate it myself. We've had reporters on that have been there. They say it's really creepy because, I don't have the self control to be around these type of people. So you want us to cover Pizzagate? We have covered it. We are covering it, and all I know is, god help us, we're in the hands of pure evil. We'll be right back. I'm on the show.

Video Saved From X

reSee.it Video Transcript AI Summary
A former Bernie Sanders supporter who worked for the DNC claims that the DNC rigged the primary against Sanders. He leaked information to WikiLeaks and was subsequently murdered. The speaker questions why people ignore this and dismiss it as a conspiracy theory. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker suggests that the CIA controls everyone and is trying to capture Assange. They mention the possibility of the Ecuadorian embassy being blown up. The speaker believes that there are many people connected to the Clinton Organization who have been silenced or harmed.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript states that Russia claimed to have very, very damaging information—high level DNC emails relating specifically to Hillary Clinton's physical and mental health and DNC leaders questioning whether, if elected, she would be capable of carrying out the duties of the presidency. Russia had this information. If they wanted to swing the election for Donald Trump, they would have released it in September or October 2016 at a pivotal time to swing momentum in Donald Trump’s direction and damage Hillary Clinton’s campaign. They did not do that deliberately. They understood that Hillary Clinton would likely be the inevitable president of The United States. They didn’t think Trump could win like a lot of other people. And so they were withholding this damaging information about Hillary Clinton and planning to release it in the days or weeks leading up to her inaugurate expected inauguration in order to once again sow chaos within The United

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the hacking of the DNC and mentions someone named Seth who allegedly provided information. However, the speaker does not reveal their sources. They believe that the files were not hacked by Russia but rather leaked from within the building. The speaker mentions Bill Binney, a former NSA officer, who supposedly demonstrated this. They also mention that lies about the hacking led to tensions with Russia. The speaker admits to initially dismissing the conspiracy theories surrounding the issue but later realized the truth. They express frustration with the lack of transparency and understanding surrounding certain actions and question the motives behind them.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on email leaks and allegations of hacking connected to a political context. One speaker notes that “one hour later, WikiLeaks starts dropping my emails,” suggesting a link between the leaks and his own communications. The group references those emails being public and questions about what might have been coincidental, with lines like “Just get lost into the public. One could say that there might those things might not have been a coincidence” and mentions “those things” that may or may not have been intended to surface. Two days after the initial events, the speaker recounts that “the FBI contacted me, the first thing the agent said to me was, I don’t know if you’re aware, but your email account had might have been hacked.” He confirms awareness of the hacking, stating “I said yes,” and recalls a demand that he change how he is addressed, with references to being told, “From now on, you won’t call me your father,” and “I you will call me your father,” coupled with the assertion “You think you hide shit, don’t you? Just get lost.” The dialogue shifts to broader implications: other campaign officials’ emails were divulged earlier than October 7, and the speakers discuss uncertainty about what exactly had been compromised, noting “there was a document that appeared to come from my account” and realizing “they had the contents of my email account.” The last time one speaker talked to the FBI is mentioned in the context of these disclosures. A separate thread introduces media narratives, with a speaker asking, “Media is telling you the entire story is a hoax or fake news. But what does that even mean?” and stating, “I spent the last month investigating. So what exactly is Pizzagate? And are there any actual facts to support the story?” There is a sense of frustration about interpretation and evidence, captured in the line, “They’re hearing what they wanna hear. They’re not really listening to what I’m telling them.” The transcript ends with a brief aside from another speaker, “What’s that?” indicating confusion or a request for clarification, tied to the ongoing discussion about the emails, hacks, and the Pizzagate inquiry.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states that a federal investigator told Fox News that an FBI forensic report on Seth Rich’s computer showed he made contact with WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and that Rich provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10; his wallet, cell phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later showing top DNC officials trading ideas on how to hurt Bernie Sanders at the polls, leading to the resignation of Debbie Wasserman Schultz and the DNC’s top three officials because of the apparent conclusions in those emails. Speaker 1 asks if there is an October surprise and whether anything is known about what is being sat on. Speaker 2 replies that WikiLeaks never sits on material, noting that whistleblowers take significant risks to provide material. He references a 27-year-old DNC worker who was shot in the back in Washington two weeks earlier for unknown reasons, insisting there is no finding that it was a robbery, and questioning what is being implied. Speaker 1 presses, asking if the murdered man was one of their sources. Speaker 2 declines to comment on sources, reiterating that the stakes are high in the United States and that sources face serious risks, which is why they come to WikiLeaks to protect their anonymity. He acknowledges the seriousness of the murder and says they are investigating what happened with Seth Rich, though no conclusion has been reached, and that a variety of WikiLeaks sources are concerned when such events occur. Speaker 3 contends that Seth Rich was a Bernie Sanders supporter who worked for the DNC and implies the DNC rigged the primary against Bernie Sanders. He asserts Rich was murdered after leaking information to WikiLeaks, describing Rich as a young, idealistic patriot who wore American flag attire, and argues that the murder is connected to corruption in the Democratic Party. He reflects on his own experience with online detractors and acknowledges flaws in many political figures; he asserts that it is rare to find someone who wants to be “the king of the world” and notes his own perceived lack of reputation. Speaker 4 contributes with emotion, insisting that Seth Rich was murdered and that the claim of a botched robbery is unfounded, listing inconsistencies (wallet, watch, phone left behind). He references Julian Assange and Russia, calling Assange the “darling of the left” when Obama was in office and later noting that Assange is stuck in the Ecuadorian embassy. Speaker 5 and Speaker 6 discuss broader context: Speaker 6 notes that the week WikiLeaks coverage happened on Fox News coincided with Mueller’s appointment and Comey’s firing, suggesting Fox pivoted from Russia stories to Seth Rich to deflect. Speaker 7 explains DNC data release timing, claiming FAT (file allocation table) formatting changed last-modified times on files, implying data was downloaded to a physical device before publication, suggesting an inside job rather than a Russian hack. Speaker 8 links the chain of events to the FBI, CrowdStrike, and questions about the investigation, alleging possible media silence and questioning why the murder case wasn’t more scrutinized. Speaker 9 recalls a private investigator’s work and notes that the FBI came to possess Rich’s laptop, with some at the DNC suspecting political motivation behind his murder; he asserts a media lack of follow-up. Speaker 10 presents a much broader claim: on 11/01/2016, Hillary and Bill Clinton allegedly orchestrated a civilian coup through corruption and co-optation, and a counter coup through Julian Assange and WikiLeaks was initiated by intelligence communities to prevent Hillary from becoming president and to indict Obama administration figures, describing this as a silent, internet-based counter coup and promising a peaceful transition without violence.

Video Saved From X

reSee.it Video Transcript AI Summary
Weed through a complete searchable database of 26,000 files related to Jeffrey Epstein. The speaker has spent hours and hours examining these files and will spend the coming days giving an inside look at them. A taste of the range of materials includes bizarre emails where Epstein is suspiciously dumping lists of names, including Bill Clinton, Donald Trump, Prince Andrew, and Woody Allen. There are emails over the years in which Epstein works with outside consultants to scrub Google search results and essentially bleach the Internet of bad press, claiming they can provide reinforcement from sites like Harvard and other publications they influence to meet Epstein’s needs. In another email, Epstein and Larry Summers, the former Harvard president and board member for OpenAI, are emailing about an article involving Donald Trump and Bill Clinton. Epstein mysteriously says he has some great stories after just coming back from a week of “Jeffrey style” meetings. There are also many emails related to Trump. Despite Trump’s public claim that the whole affair is a scam—with arrows pointing to the Democrats—the files show that he is mentioned in these emails more than anyone else. The speaker invites audiences to follow along as these files are examined and to work to hold everyone involved accountable.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript discusses a set of emails and intelligence claims regarding the 2016 U.S. election and the narratives surrounding Russia, Hillary Clinton, and the Trump campaign. It states that documents contain emails allegedly from the senior vice president of the George Soros Open Society Foundation. One email quotes a Clinton campaign adviser saying, “it will be a long term affair” and to “demonize Putin and Trump,” and adds that, “later, the FBI will put more oil into the fire.” Other emails are said to reveal that Hillary Clinton approved the idea of tying Trump and Russia to election interference, describing it as a scheme hoping the allegations would distract people from her own email scandal. The documents are presented as providing clear evidence that Hillary Clinton’s campaign was behind the Russia hoax, and that the FBI knew what the Clinton team was up to, acknowledging that the information they were receiving about the Trump campaign may have come from the Clinton camp. Despite these claims, the transcript asserts that the Obama-era intelligence community proceeded with a 2017 assessment concluding that Russia aspired to help Trump win the election.

Video Saved From X

reSee.it Video Transcript AI Summary
A former DNC staffer and Bernie Sanders supporter was allegedly murdered after leaking information to WikiLeaks about the DNC rigging the primary. The speaker questions why this is dismissed as a conspiracy theory, pointing out that the staffer's wallet, watch, and phone were not taken, contrary to a robbery gone wrong. Julian Assange, once favored by the left, is now accused of working for Russia after warning of consequences for sharing information with WikiLeaks. Assange is stuck in the Ecuadorian embassy because the CIA wants him. The speaker claims many people connected to Hillary Clinton, the Clinton Foundation, and Bill Clinton have died, some coincidentally, but the number is still stunning.
View Full Interactive Feed