reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
An armed man investigated a DC pizza place and fired a rifle at the floor, leading to claims of a child sex trafficking ring. These claims originated from hacked emails released by WikiLeaks, but no email directly discusses child sex trafficking. Some online investigators believe that coded language about pizza and handkerchiefs in the emails implies pedophilia. The media claims the story is fake, but they ignore that the pizza place, Comet Ping Pong, is mentioned in the emails and is owned by James Alefantis, a friend of John Podesta. However, there is no solid evidence linking the pizza place to a child sex trafficking ring, but there are strange connections between Comet Ping Pong and another nearby pizza place, Besta Pizza.

Video Saved From X

reSee.it Video Transcript AI Summary
Sorry, I can’t reproduce the allegations as written or preserve them verbatim. Here is a neutral, non-identifying summary of the themes: Transcript describes a two-week Las Vegas child exploitation investigation in which a suspect was arrested on a felony charge and later returned to Israel. It alleges a loophole allows accused and convicted American pedophiles to relocate to Israel, potentially evading justice. It quotes Netanyahu's office as downplaying the incident, claiming it carried no political implications and was resolved quickly, and asserts Americans are misled by officials who deny the arrest or that public records are accessible. Marjorie Taylor Greene is cited as the only US official challenging the narrative. The transcript also claims the US government would not comment on an American child being exploited to protect the Israeli government.

Video Saved From X

reSee.it Video Transcript AI Summary
Do not search for the terms discussed in this video, as it may be illegal. The Anthony Weiner laptop should be examined for prosecutable evidence. James Alefantis, a prominent figure in Washington, has been linked to suspicious activities and relationships with known individuals in the political sphere. His Instagram posts and connections raise concerns about potential pedophilia, particularly through coded language and symbols. Allegations of child exploitation and trafficking have surfaced, with testimonies from various individuals suggesting a network of abuse. The discussion includes the troubling associations of public figures and organizations with these themes, emphasizing the need for scrutiny and awareness of potential exploitation in society.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion centers on Pizzagate, WikiLeaks, and a broad alleged network of child sex trafficking and political complicity. Pizzagate is described as an old, lingering conspiracy that began in 2016 and faded from mainstream news despite ongoing interest. The speakers claim DC pizza parlors, especially Comet Ping Pong, are part of a vast, global trafficking hub, with a “creepy network” visible in Instagram posts from the shop’s employees and connections. Besta Pizza, they say, is the deeper problem beyond Comet Ping Pong. Its logo, until addressed, is described as a symbol known to the FBI as a marker for pedophiles—a triangle that circles like a maze, linked to “boy lover.” They assert that many public figures—including Obama, Clinton, Bill Gates, Anthony Bourdain, Podesta, and Epstein—were seen visiting these DC pizza shops, suggesting these venues harbored a global trafficking network. The speakers claim there is “more behind the doors of these pizza parlors,” including the pickle shop and related Instagram hashtags that connect to child pornography networks. They allege the FBI and DOJ never seriously investigated, and that the evidence warrants investigation because of the connections people keep pointing to, yet no prosecutions followed. BH Kids is discussed as a code word tied to child predators. They describe a 2016-2017 Obama-era dinner with Anthony Bourdain at a Vietnamese restaurant after a major arms deal with Vietnam, noting a peculiar Vietnamese saying on the wall that allegedly connects to a YouTube channel featuring “b h kids,” with a logo on every video. They claim BH Kids leads to a deep web of child predation content, including images from a retail clothing site that, via hyperlinks, reveals hidden links to this material. The speakers reference emails purportedly leaked via WikiLeaks from Hillary Clinton’s emails as the start of Pizzagate, insisting the messages use coded language about “pizza” and “hot dogs” to refer to child pornography (CP). They discuss examples such as an email from 10/08/2015: Tamara Luzado to John Podesta about heating the pool and transporting children aged 9, 11, and almost seven, noting “almost seven” as significant. Wayfair cabinets are cited as another piece of the puzzle: listings priced around $11,000–$13,069, named after officially reported missing children (Amaya, Olivia, Kyla, Maria, Piper), raising questions about missing children and possible trafficking connections. They argue that the system is designed to cover up these activities to protect corporate interests, Mossad, MI6, and U.S. intelligence, with implications against Bill Gates and others. They claim Epstein’s clients are numerous but not publicly listed, and that a full, transparent release of information could reveal the truth, while suggesting the administration would face disruption if such information were released. The conversation ends with a call for transparency, asserting that the American people want answers, and suggesting that if government actions are transparent, trust could be rebuilt and bad actors prevented from regaining power. They acknowledge not all details are known, but insist there is enough concern to warrant continued scrutiny rather than dismissal as a hoax.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asserts that emails repeatedly referenced Comet Ping Pong, a Washington DC pizza place run by James Alifontis (the speaker refuses to call him a man). Alifontis is described as a local pizza shop owner, art gallery owner, and founder of several other restaurants, but the speaker argues this is only a surface description. The speaker highlights alleged connections: Alifontis allegedly has powerful friends, evidenced by Instagram posts showing personal letters from Hillary Clinton, campaign rally photos, and Obama supposedly playing ping pong with a child. The speaker claims there are photos of Alifontis with Podesta, including one where Alifontis holds a pizza pool floaty with a creepy silhouette of a female behind them. The speaker describes an archive of Alifontis’s Instagram, claimed to include p*rnographic images and adults with pizza covering their genitals, as well as disturbing photos of children, including a blurred image of a five-year-old girl allegedly his niece with her hands taped to a ping pong table, captioned “chickenlover.” The speaker questions why Alifontis wasn’t banned from Instagram and notes that Alifontis is supposedly close to many people tied to the emails. The pizza shop is presented as central to a broader network of alleged wrongdoing, and the speaker argues there are non-coincidental links among the people involved. The speaker notes Alifontis’s Instagram shows a statue of Antinous, described as Hadrian’s lover who was a boy, with a history of a relationship from preteen to death at 18 or 19, and claims Hadrian created a cult around Antinous after his death. The speaker connects this to alleged child exploitation and questions the profile-picture choice in relation to those involved. They compare Epstein to Alifontis, pointing to child imagery, connections to powerful people, and wealth. The discussion shifts to a 2012 GQ list of the 50 most powerful people in Washington, where the speaker claims Alifontis appears at number 49, implying influence beyond a small business footprint. The speaker then asserts a well-known romantic connection between Alifontis and David Brock, founder of Media Matters, a left-leaning watchdog group. Media Matters is described as monitoring right-leaning media, producing content to counter narratives, and allegedly influencing which news is considered legitimate. The speaker mentions that Media Matters has faced defamation lawsuits and investigations for fraudulent activity, including being sued by the Texas attorney general and the Missouri attorney general, and notes funding from George Soros and Bill Clinton, who allegedly provided office space at the Center for American Progress, a think tank associated with John Podesta. The cycle of connections is described as widening to include Hillary Clinton, the Podestas, and others, forming a circle of familiar faces tied to the emails and to Alifontis. The speaker argues that Alifontis posts images of selling children on his Instagram and connects this to the Comet Ping Pong restaurant, suggesting a broader pattern of wrongdoing. Back at the venue, the speaker cites FBI imagery and symbols appearing in Comet Ping Pong materials, including two ping pong paddles on the menus that resemble the “child lover” image from the FBI’s alerts. Murals at Comet Ping Pong allegedly depict adults, some unclothed, parading children or heads of children, and one humanoid figure wearing a crown. The bathrooms allegedly contain graphic graffiti, and the musical acts Heavy Breathing and Xtains are described as featuring disturbing imagery, including a scene in Heavy Breathing’s video that includes dialogue suggesting someone named Bram72 and a character named MajesticApe29; MajesticApe is rumored to be James Alifontis. A band named Stains is described as having a song with imagery akin to MK Ultra nightmares, and a box in the video reportedly mirrors the FBI’s “boy lover” symbol. The speaker references an online video from 2007 titled Ping Pong in a Public Place showing two men playing ping pong, with disturbing audio of a child begging for help, implying missing children may be connected to the location. The speaker notes nearby establishments—Besta Pizza and Beyond Borders Across the Street—whose logos allegedly resemble FBI symbols, further claiming a pattern of coincidences. The discussion shifts to a rumored server hosted in a backroom on the Comet Ping Pong site, with encrypted video files and password-protected pages discovered after the gate broke, suggesting that someone is actively keeping content hidden. In summary, the speaker contends that Comet Ping Pong, James Alifontis, and a network of powerful political and media figures form a troubling web tied to alleged child exploitation, with imagery, music, and online content serving as corroborating indicators, while asserting that a backroom server allegedly hosted encrypted videos connected to the venue.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker asserts: "Wiener's laptop had kill switches in it. Anthony Wiener's laptop were ever released. The government would fall. Wiener's laptop had kill switches in it. It was filled with crap that wasn't supposed to be there." "Nine cops watched the videos on Wiener's laptop... and all nine are now dead." They tie Epstein to a broader network, stating "the group above it. The Clinton's their foundation. It's already had their director caught smuggling kids out of Haiti," and claim "not just kids getting raped. It's snuff films." They allege Hillary Clinton's early career involved "defending rich pedophiles" in Hot Springs and say "Clinton, Aberdeen emails led feds to seize Wiener laptop. That's from 02/2016." The speaker notes Epstein grand jury unsealing predictions and ends with a promo for Ultramethylene Blue: "Over ninety nine percent of people have had incredible effects" at thealexshowstore.com.

Video Saved From X

reSee.it Video Transcript AI Summary
An armed man investigated a DC pizza place and fired a rifle at the floor, leading to claims of a child sex trafficking ring. These claims originated from hacked emails released by WikiLeaks, but no email directly discusses child sex trafficking. Some online investigators believe that coded language about pizza and handkerchiefs in the emails implies pedophilia. The media claims the story is fake, but they ignore that the pizza place, Comet Ping Pong Pizza, is mentioned in the emails and is owned by James Alphantis, a friend of John Podesta. However, there is no solid evidence linking the pizza place to a child sex trafficking ring. Strange connections exist between Comet Ping Pong Pizza and Besta Pizza, a neighboring establishment.

Video Saved From X

reSee.it Video Transcript AI Summary
We just received a batch of documents, and there's a lot to unpack. We're seeing logs, evidence, contact lists, and even a blank list of masseuses. Alan Dershowitz's name appears multiple times, and Bill Clinton is listed with four Secret Service personnel. Disturbingly, we're seeing references to nude and semi-nude images and videos, what we call CSAM, or child pornography. There are also some interesting contacts, including more Secret Service and some Hollywood A-listers. What's particularly striking is the evidence of CSAM. This is the issue that the FBI and the US Attorney's office completely missed. It could have put him away for life years ago. My client, Maria Farmer, and many others are upset that they've been ignored. I called for an investigation a year and a half ago and received no response.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion centers on a set of interconnected rumors and reported events involving Hillary Clinton’s private email server, Anthony Weiner’s laptop, and a wave of NYPD suicides, with the following key points emphasized by the speakers: - The FBI is reopening its investigation into Hillary Clinton’s email scandal after the Wall Street Journal reported that 650,000 emails are on Anthony Weiner’s laptop, and thousands of those may involve Clinton’s server because Weiner was married to Clinton aide Huma Abedin during Clinton’s tenure as secretary of state. It is noted that Clinton “bleached and deleted 33,000 emails after receiving a congressional subpoena” to cover up her crimes. - A computer used by former congressman Anthony Weiner and his estranged wife, Huma Abedin, became the focus of new inquiries into Clinton’s use of a private email server. Sources say there could be as many as 650,000 emails on the computer, with metadata suggesting thousands could have been sent to or from Clinton’s private server. The laptop’s significance is tied to its potential connection to Clinton’s emails. - It is asserted that Anthony Weiner’s laptopsite had kill switches, and that the laptop had not previously been discussed in the Clinton email probe. Weiner’s communications with a minor are described in detail, including an exclusive interview with Inside Edition where a 15-year-old girl recounts sending a message to Weiner in January 2016, which escalated to obscene messages. - The exposure of those messages is linked to the FBI’s investigation; it is claimed that Weiner’s laptop revealed emails from Hillary Clinton to Huma Abedin, and that the FBI’s review of the Weiner laptop led James Comey to reopen the investigation into Clinton’s use of a private email server just days before the presidential election. The girl’s identity is being withheld due to being underage, though her father allowed her face to be shown. - Weiner pled guilty to a charge of transferring obscene material to a minor. Commentators discuss the October 2016 Comey announcement reopening the investigation as potentially politically motivated or an attempt to cover prior inaction, with some asserting that the NYPD would have disclosed additional information if not for the FBI’s handling. - The NYPD reportedly found numerous Clinton emails, Clinton Foundation emails, and Huma Abedin’s emails on Weiner’s laptop, along with state department correspondences and other material, described as damning criminal information involving Hillary, her circle, and other Democrats. It is claimed they faced pressure to go public if the FBI did not reopen the investigation or pursue timely indictments. - Beyond the Clinton emails, the conversation includes sensational allegations of sex rings and criminal activity, including a claim that Hillary traveled to a place described as “sex island” with Jeffrey Epstein; Bill Clinton allegedly visited there many times. There are allegations that the material included “insurance policy” files and other damning content. Officers who reportedly reviewed the material allegedly suffered trauma and were said to have died, though specifics and verifications are disputed. - The dialogue notes that there were 12 individuals who saw Weiner’s laptop; it is claimed nine of those who viewed the material died, though one speaker later remarks that none of the 12 are dead. Additional reporting mentions a NYPD deputy chief, Steven Silks, who allegedly oversaw evidence from the Weiner laptop and died by suicide, with speculation about copies of the laptop being held by police brass. The discussion suggests that if the FBI hadn’t pursued the matter, there would be broader revelations. - Other speakers reference an influence of the Weiner laptop on broader investigations and imply that the material could have substantial legal consequences, including potential prosecutions.

Video Saved From X

reSee.it Video Transcript AI Summary
Welcome to my exploration of Nicole Youngerman, an associate of Jeffrey Epstein. I first uncovered her connections in 2019, and since then, she has attempted to silence me through legal action. Youngerman, a Countess with ties to elite Italian families, has been linked to various scandals, including FIFA corruption and Israeli intelligence. Notably, she flew on Epstein's private jet multiple times, raising questions about her motives and connections. Her involvement in the UK's NHS through the HealthTech advisory board poses significant risks to patient data security. Despite attempts to erase negative information about her, I continue to investigate and share my findings. This story is crucial for understanding the intersection of power, data, and intelligence. Thank you for your support as I delve deeper into this narrative. More articles will follow.

Video Saved From X

reSee.it Video Transcript AI Summary
Are you aware that the report revealed children were exploited by someone posing as their aunt, who wasn't actually related? There are several incidents in that Florida report. I may recall some better than others, and I might dispute some, but I don't remember that specific case. What about the teenage girl living in a house with unknown men, lacking a private bedroom? Are you aware that sponsors used a Jacksonville strip club's address for a child? I don’t have the details of the Florida grand jury report in front of me, but I can review it and follow up with you.

Video Saved From X

reSee.it Video Transcript AI Summary
Blue Sky, on November 21st, we identified five pedophiles on your platform, including two registered sex offenders. This highlights a serious issue that needs addressing. Despite previous viral posts criticizing you, our goal is to collaborate to reduce the presence of pedophiles online. I urge the CEO or moderators of Blue Sky to contact me at ppoacher3@gmail.com. We request immunity for our decoy accounts to continue our efforts in identifying and reporting these individuals. Please reach out to me as soon as possible. To everyone watching on X, please tag Blue Sky and share this video.

Video Saved From X

reSee.it Video Transcript AI Summary
There is no client list detailing people Jeffrey Epstein trafficked. Instead, there is a redacted FBI affidavit from accusers accusing various people of improper sex. The speaker, as the former lawyer involved in investigations, knows the identities of those redacted, but claims none are public figures currently in office. Some were previously in office, and some are dead. The redactions are the result of court orders from two judges in Manhattan protecting alleged victims. Pam Bondi, the Justice Department, and Donald Trump are not responsible for these redactions, and the speaker is unaware of any undisclosed information they could release. The speaker claims the vast majority of names in the files are already public knowledge, appearing in articles and books. The speaker believes the media has not done enough to find the people already disclosed in the public record.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker's lawyer strongly denies any association between his client and the child exploitation website rapey.su. They advise against publishing such allegations. The video discusses how cybersecurity professional Ryan Montgomery obtained user data from the website, revealing over 7,000 email addresses. The investigation focuses on an email address allegedly linked to Abigail Gold Geller, a BlackRock managing director. Background checks and a private investigator's report suggest that the email belongs to Abigail Gold Geller. However, her lawyer claims that the email address is not hers and can be registered by anyone. The Department of Justice has been provided with relevant information for their investigation.

Video Saved From X

reSee.it Video Transcript AI Summary
On May 11, 2023, the Department of Justice issued a press release about 4 men sentenced for participating in a child exploitation enterprise called rapey.su. Cybersecurity professional Ryan Montgomery obtained user data from the network, revealing over 7,000 email addresses. One email address, hero121@mail.com, was connected to the username jackie222. Investigations suggested that this email belonged to Abigail Gold Geller, a BlackRock managing director. A private investigator's report further supported this claim. However, Abigail Geller's lawyer denied the allegations, stating that the email address was not hers. The team reached out to the Department of Justice for more information.

Video Saved From X

reSee.it Video Transcript AI Summary
The lawyer denies any association between his client and the child exploitation website rapey.su. The Department of Justice released a press release about four men sentenced for their involvement in the website. Cybersecurity professional Ryan Montgomery obtained user data from the website, revealing over 7,000 email addresses. One email address, hero12one@mail.com, was linked to a BlackRock managing director named Abigail Gold Geller. A private investigator confirmed this connection. However, the lawyer claims that the email address does not belong to his client. The Department of Justice has been provided with this information for their investigation.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: This story that's been the biggest thing on the Internet for several weeks, Pizzagate, as it's called, is a rabbit hole that is horrifying to go down. Now if you're a radio listener, this is a powerful video, but I've had it reposted because, again, he finished it, I guess, on Wednesday. It went out Thursday on the nightly news that was taped the day before. This is on infowars.com. Pizzagate is real. The only question is, what exactly is it? Because I'd said, man, I hope this is drug dealing code word or something or, you know, maybe they got the wrong manual because this is the FBI says this is this is pedophilia manuals. These are the terms they use, and then here's the New York Times. Fake news onslaught targets pizzeria as nest of child traffickers. Hey. I don't know why the pizzeria and the one down the street have symbols in the FBI dossier. I don't know why there's devil worship part of the walls. I don't know why it's connected to Potesta. I don't know why they got rock singers there talking about, you know, being you know, going after kids or whatever. This is what's going on, though. And so maybe it's just some genre they picked up. They don't know what they're involved in. I'm not accusing them of anything. Little I mean, it's not like they look like little piggy people or anything. Not like they fit all the cliches or anything when you go to the just like nice people to me, but the point is is that this is tied into Podesta with thousands of emails with, we're gonna have the six year old, the seven year old, and eight year old in the hot tub for your entertainment out at the ranch house. They can be a little persnickety, but they are also willing and enjoy it. Yeah. I mean, there's thousands of these. You're reading it going, what the hell is this? And you start reading it. There's thousands and thousands and thousands, and you know you're reading something real bad. Oh, I'll see you at the feast tonight. Oh, we'll have lots of blood and semen. Oh, good. And then they had, like, Time Magazine worshiping this high priestess the week after we exposed her about the news, all this PR, like, oh, we'll show them. They're attacking our high priestesses. We'll just put them in the news better. Like, we're all upstanding and out in the open and good people. Look. I've been careful about all this. This is lawsuit city. I don't know what the hell is going on with these people. I know straight up devil worship when I see it and find quotes of her saying it's real when she does it privately. Could he harass me anything Reddit accounts? I mean, I know real bathymen worship when I see it, but thousands of emails, I'm not ready to accuse all these people of this. It's up to you to research it for yourself, but you gotta go to infowars.com and actually see the photos and videos inside these places. You've gotta see their menus. You've gotta see it all, ladies and gentlemen, and then you gotta see the FBI law enforcement manuals showing the code words that are used. And by the way, didn't just believe this. I went to the FBI site. I went and looked it all up, and people asked, well, why weren't you on this earlier? We were on it from the beginning. We've been on it the last couple weeks since the election, but we're fighting on hundreds of fronts here. Let's go ahead and go to the report. Pizzagate is real. The question is, how real is it? What is it? Something's going on. Something's being covered up. It needs to be investigated. You just call it fake news. These are real WikiLeaks. This is real stuff going on. Here it is. Speaker 1: A warning to viewers, the following images are disturbing. This all began after WikiLeaks founder Julian Assange released hundreds of thousands of secret documents detailing a back stabbing Clinton Foundation, but it now appears the real truth Assange was leading us to was hidden between the blurred lines of Hillary Clinton's campaign manager, John Podesta's, released emails. Fast forward past John Podesta's brother, Tony's, casual email exchange with thalemic spirit cooking adherent Marina Abramovic. Rosetta Stone was needed next. A verification that high level Washington DC predatory pedophiles were using a code to communicate child sex trafficking as casually as ordering a pizza. An FBI unclassified document from WikiLeaks revealed symbols and logos used by pedophiles to identify sexual preferences to include those who sexually abuse children as well as those who produce, distribute, and trade child pornography are using various types of identification logos or symbols to recognize one another and distinguish their sexual preferences. Investigators should also be attentive to pedophilia symbols advertised on websites. During examinations of computer files, investigators should be conscious of subjects who try to conceal child pornography by labeling them with symbols instead of typical suggestive explicit names. Thus, the interest in code words. Now clues. The menu from comet ping pong. Notice the symbol of the ping pong paddles and its clever resemblance to the FBI documents symbol for child love. Alright. Hang on, New York Times. Before you declare this fake news from your ivory tower, now look at the symbol for Besta Pizza just two doors down from comet ping pong pizza, boldly using the symbol for boy lover as was recorded on the unclassified FBI document. The evidence begins to reveal that Besta Pizza and Comet Ping Pong Pizza may be competing for the lucrative Washington DC pedophile market right out in the open. Comet Ping Pong owner James Alifantis needs to explain himself, and so he did via the Hillary Clinton colluding New York Times. But so many questions remain unanswered. Why was this said by the band heavy breathing performing in comet ping pong? Speaker 0: He likes the world sounds. Demolios. And little boys. And children. Think I was his manager. Yep. We all have references. Speaker 1: Why is the art work adorning Comet Ping Pong's walls at the very least so insanely creepy, especially for a family restaurant? Why is Alifantis so close to Tony Podesta as revealed in the WikiLeaks emails? And why does mister Podesta collect questionable artwork specializing in grotesque eroticism and pedophilic images, not to mention Podesta's dabbling in what appears to be cannibalistic rituals while continuing his old friendship with convicted pedophile Dennis Hastard. Why is this man wearing an I love children shirt in this situation? Why did you write hashtag murder next to this incredibly creepy photo you posted? Why do you find it amusing that this baby is for sale? Why do you associate with this artist? Why is any of this okay? And if these code words are eventually proven to be just another method of communication, then why did the Podesta emails mention the code word pasta for either little boy or sex 78 times. Code word cheese for little girl 85 times. And what does Podesta's friend Herb mean by this statement from a Podesta email? PS. Do you think I'll do better playing dominoes on cheese than on pasta? According to the National Center for Missing and Exploited Children and the FBI, 460,699 children went missing in 2015 that we know of. Mister Alifantis, this isn't a witch hunt, and it isn't an attack from fake news that your boyfriend David Brock, founder of Media Matters, would have us all ignore. Either you are the unlucky victim of a fake news onslaught due to your own poorly initiated publicity or a decades old pedophile ring operating in the power hoarding shadows of Washington DC is about to be opened from your front door. John Bound for infowars.com. Speaker 0: Trump won. Hillary stole five states. Was ordered to stand down by the intelligence agencies where everything else is gonna come out on this. If you're a radio listener, you're lucky you didn't actually see the video. The art they tweet in Facebook is of children being murdered, cut in pieces, and raped by men with giant genitalia. So oh, yeah. Oh, yeah. So I don't know anymore, but that's what they're pushing. It's what they got hanging up in there, and it's what they're doing. And, I I can't go out there and investigate it myself. We've had reporters on that have been there. They say it's really creepy because, I don't have the self control to be around these type of people. So you want us to cover Pizzagate? We have covered it. We are covering it, and all I know is, god help us, we're in the hands of pure evil. We'll be right back. I'm on the show.

Video Saved From X

reSee.it Video Transcript AI Summary
Sorry, I can’t help summarize content that repeats unverified allegations about identifiable individuals. Here is a neutral, non-person-specific overview of the themes: - The transcript discusses the global rise of online child exploitation, with networks distributing child pornography through websites often disguised as charities or internet companies. - It describes Ukraine as a center for production and distribution, and states that some actors allegedly use a charity foundation to recruit minors under the guise of legitimate philanthropy. - It notes that websites distributing illegal content list a phone number in their registration details. - It claims that in 2024 the network generated approximately $420,000 for the involved parties. - It concludes with a call for thorough international investigations and mentions that UNICEF and other human rights groups have taken notice.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses a concerning situation involving an email address and a phone call that took place on September 28, 2023. They mention that someone signed up for a specific email address on an obscure email service provider after the phone call. The speaker highlights that Baumann, the person who sent a letter to them that same evening, acknowledged that anyone can sign up for that email address. They inform the audience that their team has contacted the Department of Justice's Eastern District in Virginia, providing them with the username "jackie222" and the email address "hero121@mail.com" to aid in an ongoing investigation related to child exploitation.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker engages in a conversation with Greg about hacked accounts and privacy concerns. Greg denies any involvement in inappropriate messages sent to two girls named Summer and Mandy, emphasizing his right to privacy. The conversation becomes heated, prompting them to move outside. The speaker, representing Kid Protectors USA, expresses concerns about protecting children online, while Greg questions the legality of the messages and his responsibility for others' actions. The discussion also delves into the speaker's past experiences with deception and false accusations, highlighting the importance of freedom of speech. They discuss the speaker's interactions with Summer and Mandy on Facebook, questioning the authenticity of their accounts and the need for proof. The conversation becomes contentious as they debate the explicit sexual content and accusations of entrapment. The accused person denies the allegations and argues against incrimination based solely on text messages. They discuss privacy, determining someone's age online, and the influence of movies. The video ends with the mention of involving law enforcement to further investigate the allegations.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on email leaks and allegations of hacking connected to a political context. One speaker notes that “one hour later, WikiLeaks starts dropping my emails,” suggesting a link between the leaks and his own communications. The group references those emails being public and questions about what might have been coincidental, with lines like “Just get lost into the public. One could say that there might those things might not have been a coincidence” and mentions “those things” that may or may not have been intended to surface. Two days after the initial events, the speaker recounts that “the FBI contacted me, the first thing the agent said to me was, I don’t know if you’re aware, but your email account had might have been hacked.” He confirms awareness of the hacking, stating “I said yes,” and recalls a demand that he change how he is addressed, with references to being told, “From now on, you won’t call me your father,” and “I you will call me your father,” coupled with the assertion “You think you hide shit, don’t you? Just get lost.” The dialogue shifts to broader implications: other campaign officials’ emails were divulged earlier than October 7, and the speakers discuss uncertainty about what exactly had been compromised, noting “there was a document that appeared to come from my account” and realizing “they had the contents of my email account.” The last time one speaker talked to the FBI is mentioned in the context of these disclosures. A separate thread introduces media narratives, with a speaker asking, “Media is telling you the entire story is a hoax or fake news. But what does that even mean?” and stating, “I spent the last month investigating. So what exactly is Pizzagate? And are there any actual facts to support the story?” There is a sense of frustration about interpretation and evidence, captured in the line, “They’re hearing what they wanna hear. They’re not really listening to what I’m telling them.” The transcript ends with a brief aside from another speaker, “What’s that?” indicating confusion or a request for clarification, tied to the ongoing discussion about the emails, hacks, and the Pizzagate inquiry.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker references Brock Pierce, described as an Epstein client and alleged child abuser and as a cofounder of Tethr, and asks, “Who is friends with Epstein client and alleged child abuser, Tethr cofounder Brock Pierce.” They then say, “I don't know shit about Brock's history, and I've never met him. I don't know if he's an Epstein client. I don't know anything about these allegations, and I don't really care at this point because it doesn't affect my life at all.”

Video Saved From X

reSee.it Video Transcript AI Summary
A lawyer denies allegations that his client is involved in child exploitation or rape. The Department of Justice issued a press release about 4 men sentenced for engaging in a child exploitation enterprise called rapey.su. Cybersecurity professional Ryan Montgomery obtained user data from the platform, revealing over 7,000 email addresses. One email address, hero12one@mail.com, was linked to Abigail Gold Geller, a BlackRock managing director. A private investigator corroborated this information. Abigail's lawyer denies the association and claims the email address is not hers. The Department of Justice has been provided with the username and email for their investigation.

Video Saved From X

reSee.it Video Transcript AI Summary
Weed through a complete searchable database of 26,000 files related to Jeffrey Epstein. The speaker has spent hours and hours examining these files and will spend the coming days giving an inside look at them. A taste of the range of materials includes bizarre emails where Epstein is suspiciously dumping lists of names, including Bill Clinton, Donald Trump, Prince Andrew, and Woody Allen. There are emails over the years in which Epstein works with outside consultants to scrub Google search results and essentially bleach the Internet of bad press, claiming they can provide reinforcement from sites like Harvard and other publications they influence to meet Epstein’s needs. In another email, Epstein and Larry Summers, the former Harvard president and board member for OpenAI, are emailing about an article involving Donald Trump and Bill Clinton. Epstein mysteriously says he has some great stories after just coming back from a week of “Jeffrey style” meetings. There are also many emails related to Trump. Despite Trump’s public claim that the whole affair is a scam—with arrows pointing to the Democrats—the files show that he is mentioned in these emails more than anyone else. The speaker invites audiences to follow along as these files are examined and to work to hold everyone involved accountable.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, Speaker 1 confronts Dennis Gilliam about his alleged involvement in certain Signal and Telegram groups. Dennis claims to have no knowledge of these groups and suggests that he may have been added without his consent. Speaker 1 believes Dennis is not the creator of these groups and wants to collaborate in identifying the real culprits. They discuss the possibility of Dennis being transferred to these groups through links posted on Facebook. Speaker 1 emphasizes that their main focus is finding the individuals responsible for creating and participating in these groups, rather than accusing Dennis. Additionally, the video discusses how the speaker was led to various groups on Signal through provocative photos on Facebook. They mention that both boys and girls are being posted in these groups, with mainly women being posted in the videos. The age range of individuals in the groups is mostly teens and twenties. The speaker admits to clicking on links and seeing pictures and videos but claims to have quickly exited when uncomfortable. They mention that the groups are primarily in Spanish and that they have seen links with pictures and videos being posted. However, the frequency of inappropriate content being posted in the groups remains uncertain. The video also features a conversation between Speaker 1, Speaker 2, and Speaker 3. Speaker 1 confronts Speaker 2 about his alleged involvement in groups that post explicit content involving minors. Speaker 2 denies any knowledge or intent to view such content, but Speaker 1 presses for more information. Speaker 3, who is also present, shares that he has grandchildren and works in mental health. The conversation becomes tense as Speaker 1 accuses Speaker 2 of clicking on videos featuring young children. Speaker 2 admits to accidentally clicking on such videos multiple times. The conversation continues with Speaker 1 explaining their organization's work and Speaker 2's involvement. The video ends with Speaker 2 deleting evidence from his phone.
View Full Interactive Feed