TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Bill Clinton's association with Jeffrey Epstein, a known pedophile, is highlighted, including their travels together to Epstein's private island where young women were kept as sex slaves. John Podesta's hacked emails, released by WikiLeaks, reveal corruption and collusion within the Clinton campaign, as well as his involvement in occult rituals. The video suggests that certain pizza restaurants, connected to the Clintons, may have ties to pedophilia based on their logos and disturbing comments on social media. The transcript also mentions the involvement of wealthy individuals and the disturbing imagery associated with these establishments. Overall, the video raises questions about the Clintons' associations and possible involvement in illicit activities.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the controversy surrounding Pizzagate, dismissing claims that it has been debunked. They question the meaning behind code words in John Podesta's emails and raise concerns about his alleged involvement in child exploitation. They also mention Tony Podesta's artwork and the spirit cooking dinners hosted by Marina Abramovic. Speaker 1 challenges anyone who believes Pizzagate has been debunked to a debate. Speaker 2 reveals that they have not received any updates on the investigation from the FBI. The speakers criticize the mainstream media for spreading misinformation and claiming it is illegal to read Podesta's emails. They suggest that the media's fear of the email content led to these false statements.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that top law enforcement officials expected Hillary Clinton to win the 2016 election and manipulated the law to ensure her victory and Trump's defeat. He cites James Comey's alleged admission of operating in an environment where a Clinton victory was expected. The speaker discusses the alleged intrusion into the Democratic National Committee (DNC), pointing to "telltale signs in Cyrillic" and the name "Felix Dzerzhinsky" as either sloppy or overly clever attempts to implicate Russia. He alleges that the persona "Guccifer 2.0" is a fraud, based on forensic analysis of metadata by former NSA technical directors. The speaker criticizes Bob Mueller, claiming he falsified intelligence before the Iraq War and approved of torture and wiretapping. He recounts an encounter where he questioned Mueller about "parallel construction," the practice of using illegally acquired information in prosecutions without revealing its source. The speaker describes James Comey's leaking of a conversation with President Trump to prompt the appointment of a special prosecutor, Bob Mueller. He questions Comey's decision not to seize the DNC computers after the alleged Russian hacking, relying instead on CrowdStrike, a firm with a "disastrous record of veracity." The speaker claims that the DNC blamed Russia for the hacking to divert attention from the content of the leaked emails. He references Jennifer Palmieri, Hillary Clinton's PR person, allegedly pushing the "Russians hacked" narrative. Chuck Schumer is quoted as saying the intelligence community has "six ways to Sunday" to get back at Trump. The speaker discusses the Steele dossier and claims that the FBI also paid for it. He alleges that the intelligence community assessment on Russian hacking was based on handpicked analysts and that Obama stated the conclusions of Russian hacking getting to WikiLeaks were inconclusive. He claims NSA collects everything and there is no evidence of Russian hacking. The speaker references Peter Strzok and Lisa Page's text messages, where they expressed support for Hillary Clinton and a determination to "stop" Trump. He claims Strzok, who led the investigation of Hillary Clinton's emails, later said there was "no there there" regarding Russia gate. The speaker claims Julian Assange released documentation of the CIA's cyber tool to hack into systems and leave telltale signs giving the responsibility to someone else. He concludes that a "deep state" within the FBI, CIA, and Justice Department acted to ensure Hillary Clinton's victory and undermine Trump.

Video Saved From X

reSee.it Video Transcript AI Summary
Posters on 4chan and Reddit claim to have uncovered a child trafficking network among high-powered individuals. They found disturbing artwork and code words in the Podesta emails, suggesting a culture of death, torture, cannibalism, and child abuse. The investigation centers around a hipster pizza place called Comet Ping Pong, owned by James Alefantis, who is ranked as one of the most powerful people in Washington. Alefantis' boyfriend is David Brock, founder of liberal media watchdog group Media Matters. John Podesta, chairman of Hillary Clinton's campaign, was also involved. WikiLeaks released Podesta's emails, which contained references to pizza and hot dogs in strange contexts. This article only scratches the surface of a complex network with potentially more high-powered individuals involved. The investigation exposes a culture of death and abuse celebrated by the occult elite, transcending political parties and the law.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the controversy surrounding Pizzagate, dismissing claims that it has been debunked. They question the meaning behind code words in John Podesta's emails and raise concerns about his alleged involvement in child exploitation. They also mention Tony Podesta's artwork and the spirit cooking dinners organized by Marina Abramovic. Speaker 1 challenges anyone who believes Pizzagate has been debunked to a debate. Speaker 2 reveals that they have not received any updates on the investigation from the FBI. The speakers criticize the mainstream media for spreading misinformation and claiming it is illegal to read Podesta's emails. They suggest that the media's fear of the email content led to these false statements.

Video Saved From X

reSee.it Video Transcript AI Summary
People who criticize the mainstream media are often labeled as racist or potentially dangerous. Tonight's discussion will be disturbing but it offers a reality check that you won't find elsewhere. WikiLeaks has released a new batch of emails from campaign chairman John Podesta, revealing corruption, lobbying, and media manipulation within the winning campaign. There are also claims of a child sex trafficking ring. This is a deliberate effort to destroy John Podesta personally. In a bizarre exchange, someone demands to be called "father" and tells another person to get lost.

Video Saved From X

reSee.it Video Transcript AI Summary
Transcript centers on accusations tied to WikiLeaks Podesta emails, noting alleged coded language and a claim about guests at a party. It links these allegations to prior reporting about a person connected to the Podesta family. It also mentions alleged patterns in art collected by John Podesta and extends to his brother Tony Podesta, who reportedly stepped down amid a legal issue. A Washington Post article from 2004 is cited describing Tony Podesta’s home as having controversial imagery, with the images later scrubbed online. The speaker presents censored interior photos to illustrate the point and questions whether either brother will face justice, framing the issue as a test of the administration’s commitment to the rule of law.

Video Saved From X

reSee.it Video Transcript AI Summary
The episode opens with Lou Stump and his co-hosts, Chet Liftkit and Joey DeNardi, broadcasting from FEMA region six in an in‑person Nimrod pod taping. They recount Alex Jones’s 45‑minute interview with Ed Martin, described as “fighting the deep state for over three decades as a lawyer and political activist.” They say President Trump appointed Martin as US attorney of Washington DC, but his confirmation was blocked by Congress, so Trump created a special office for Martin with nationwide jurisdiction overseeing “secret strike forces,” including the Weaponization Working Group. Martin allegedly told Infowars that they would go after mortgage and tax fraud instead of complex racketeering, aiming for quick indictments. They assert the strike force faces trouble finding workhorses in the DOJ and say Trump has ordered firings of noncompliant officials and brought in replacements; Andrew Bailey, Missouri’s attorney general, is named as co‑deputy director of the FBI. The panel asserts Bailey is preparing to backfill Cash Patel, the FBI director, and claims Martin himself is being considered to replace Pam Bondi as US attorney general. They allege grand juries are open in Virginia, Missouri, New York, and Florida, and claim 97% of DC courts are rigged by Democrats. They say NSA at Fort Meade and CIA Langley are among Virginia jurisdictions with open grand juries. The hosts claim White House sources confirm indictments are coming, and if they don’t happen, Bondi will be fired and someone more effective will be installed. They warn listeners to prepare for “false flags” and say Trump has declared war on the deep state. They urge Ed Martin and Trump to gain public support to pressure the DOJ, and contrast Trump’s perceived actions with what they claim would happen under other presidents. Speaker 1 and Speaker 2 push back and add their takes. Speaker 1 doubts Trump’s track record in 2025, calling actions patronizing and noting discrepancies between words and deeds, and expressing skepticism that short‑term moves will create long‑term change. Speaker 2 argues fighting the swamp is good and highlights loyalty to Trump, noting weekly conversations and Trump’s praise of Martin after the bid was blocked, as well as interest in Biden pardons. Speaker 0 defends the shift, noting Alex Jones’s earlier skepticism about indictments and saying Trump has learned from the first term and is draining the swamp. They debate the credibility of grand juries, subpoenas, and raids, with Speaker 0 insisting indictments are the measure of success and that public pressure on the DOJ is necessary for accountability. They pivot to a broader discussion, declaring that the mainstream media isn’t taking grand jury openings seriously, and that the “mainstream” narrative conflicts with what they claim to be open and subpoenaed investigations. They accuse the CIA, FBI, and State Department of lying about certain events and assert that a cover‑up is in progress to protect figures like MBS (Mohammed bin Salman) and to shield broader networks. They promote the idea that the information age—via platforms like X (formerly Twitter)—allows the public to uncover truth and collaborate with others in citizen journalism, despite censorship and shadowbans. They claim there is an information war and that the common sense movement empowers people to push back against deep state control and corporate interests. A major diversion in the program is a deep dive into the Las Vegas shooting (10/01/2017). They recount the mass casualty event at the Route 91 Harvest Festival, with Steven Paddock alleged to have acted alone, and they raise questions about the number of firearms (including AR‑15s with bump stocks) and the timeline of the breach of the Mandalay Bay window. They present conflicting observations, such as the claim that the Mandalay Bay window in Paddock’s room remained unbroken when officers breached the room two hours after the shooting, while another window was broken in a different room. They argue the official story is refuted by video and audio evidence showing muzzle fire from helicopters, with unmarked choppers and off‑transponder activity. They allege multiple shooters and a Saudi involvement angle, alleging ETS (the Saudi version of Blackwater) and Maverick helicopters were present, and they claim the state department intervened to extract MBS from danger. They propose that Paddock was a distraction to divert attention from helicopter operations and that someone killed Paddock to fake a suicide, with the Saudis supposedly escaping via helicopters and private planes. They reference White House, media, and John Cullen (a pseudonym) as sources distributing these allegations, and they assert a network of witnesses and “Arabic men” seen on the ground. They also mention 911 calls from casinos and claim the footage and evidence were suppressed or misrepresented by mainstream outlets. They shift to discussions about Pizzagate, WikiLeaks, and a “Democrat Pedophile Network.” Lou frames Pizzagate as an older conspiracy surface that connected DC pizza parlors (Comet Ping Pong, and nearby Bestia Pizza) to a pedophilia network, citing alleged Instagram posts, the Bestia Pizza logo described as a triangle‑maze used as a pedophile marker, and a slate of famous figures associated with the pizza ecosystem. They recount alleged connections to Obama, Clinton, Podesta, Epstein, and others, and they argue these establishments hosted a global human trafficking hub. They reference Hillary Clinton’s emails (via WikiLeaks) and discuss the alleged use of coded language in emails about “CP” and “pizza,” asserting evidence of a deeper network and the need for investigation, while alleging cover‑ups by the FBI and DOJ. They cite an email in which a dinner with Obama and Anthony Bourdain was linked to a “b h kids” coded code about children, calling it disturbing. They mention cabinets on Wayfair listed for high prices named after missing children, suggesting further evidence of pedophile networks. Religious reflection and political philosophy follow, with discussions of Catholicism, Protestantism, and the role of faith in public life. They discuss RFK Jr.’s MAHA movement, nutrition, and preventative medicine as a path to healthier Americans, arguing for embedding nutrition into premed training and MCATs; they emphasize the need for comprehensive blood panels and personalized medicine, criticizing conventional medicine’s one‑size‑fits‑all approach and the influence of big pharma and corporate interests. They advocate a bipartisan approach to reform, credit RFK Jr. for pushing preventative health measures, and argue for a system prioritizing common sense and the public’s health over political partisanship. They close with calls to separate populism from Trump, view Trump as a vehicle to implement the people’s will, and envision the “second American revolution” rooted in transparency, constitutional values, and a renewal of American sovereignty. The episode ends with a sign‑off from Lou and a reminder to follow the Nimrod pod on X and subscribe to their Spotify and Apple Podcasts.

Video Saved From X

reSee.it Video Transcript AI Summary
A former Bernie Sanders supporter who worked for the DNC claims that the DNC rigged the primary against Sanders. He leaked information to WikiLeaks and was subsequently murdered. The speaker questions why people ignore this and dismiss it as a conspiracy theory. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker suggests that the CIA controls everyone and is trying to capture Assange. They mention the possibility of the Ecuadorian embassy being blown up. The speaker believes that there are many people connected to the Clinton Organization who have been silenced or harmed.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on the Seth Rich murder and its alleged connection to WikiLeaks and the 2016 DNC email controversy. An FBI forensic report purportedly found that Rich contacted WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and Rich allegedly provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10, but his wallet, phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later, showing top DNC officials discussing ways to hurt Bernie Sanders at the polls, which contributed to the resignation of Debbie Wasserman Schultz as DNC chair and the DNC’s top three officials. Speaker 1 questions whether there is an “October surprise” and whether material is being held. Speaker 2 of the Helix group states that they do not sit on material and emphasizes that whistleblowers take significant risks; they note Rich’s murder as an example of high stakes and risk to sources, asserting that sources seek anonymity with them. When Speaker 1 asks if Rich was a source, Speaker 2 declines to comment but says they are investigating what happened to Rich and are concerned about it, though no conclusion has been reached. Speaker 3 argues that Rich was a Bernie Sanders supporter who worked for the DNC and asserts that the DNC rigged the primary against Sanders; he notes that Rich was aware of this and was involved as it happened, with Donald Brazil also involved. He describes Rich as idealistic and patriotic, and recounts his murder after leaking information to WikiLeaks, insisting that this is not a conspiracy theory but a fact-based concern. He challenges others to acknowledge the alleged corruption within the Democratic party and suggests that those who ignore the facts are engaging in denial. He also critiques media portrayals and online accusations about his own credibility. Speaker 4 discusses Assange and WikiLeaks, criticizing the idea of a conspiracy theory and labeling Assange as a key figure who exposed corruption. He mentions that Assange now “works for Russia” and questions the Ecuadorian embassy situation, describing it as heavily manipulated by interests around Hillary Clinton and the Clinton Foundation. He connects the Seth Rich disclosures to broader allegations of a coordinated effort to undermine Clinton and her circle, while acknowledging that some related claims may be questionable. Speaker 6 notes that hacking of the DNC and the role of CrowdStrike remain controversial and points to the subsequent murder of Rich as a focal point for questions that have not been fully explored by the media. Speaker 7 echoes concerns about the timeline, the FBI’s involvement, and past inquiries that were not pursued, emphasizing a sense that the case and the broader narrative around the DNC emails have been inadequately examined. Speaker 8 presents a long, conspiratorial narrative alleging that on 11/01/2016 Hillary and Bill Clinton orchestrated a civilian coup through corruption and co-option of key institutions, while a countercoup through Julian Assange and WikiLeaks was initiated to undermine Hillary and the Clinton machine. The speaker claims a silent countercoup across the Internet, led by members of the intelligence community, to stop the Clintons from gaining power and ensure Obama leaves without pardon, framing the moment as a major transitional event and a second American revolution conducted without guns.

Video Saved From X

reSee.it Video Transcript AI Summary
In the video, the speaker discusses the release of Hillary Clinton's emails from the late 2010s, which contained embarrassing details such as her speeches to Goldman Sachs. These emails damaged her image as she pretended to be a friend of the people. The speaker also mentions the leak of emails from the Democratic National Committee, which were wrongly blamed on Russia. They suggest that a DNC employee leaked the emails due to favoritism towards Clinton's campaign over Bernie Sanders'. The speaker asked if the publisher realized how powerful Clinton was, to which they replied that it was fun and they enjoyed it.

Video Saved From X

reSee.it Video Transcript AI Summary
The email leaks reveal the close ties between the Clinton campaign and the media. Clinton received questions and answers in advance of her debate with Bernie Sanders, and she had control over quotes written about her in the New York Times. The emails also show collaboration and conspiracy between reporters and the Clinton campaign to help her win the election. The Clinton machine is determined to destroy our campaign, but we are part of a powerful movement that our country has never seen before.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript outlines the origin and propagation of the Pizzagate conspiracy theory and catalogs a wide range of alleged connections among political figures, businesses, and investigations, presenting these as part of an open-source online inquiry that spiraled into a real-world incident and a broader discourse about media and power. - Origins and method: WikiLeaks released emails hacked from Hillary Clinton’s private server and John Podesta’s account. Anons and various forums (Reddit, Steamit, 4chan, Vote, Websleuths) purportedly found strange references to pizza and hotdogs in the emails, which they reinterpreted as code language used by pedophiles. The narrative emphasizes an open-source investigative culture where people publicly contribute data and discuss what is pertinent, claiming that scandals have occurred on both sides of the political aisle and are bipartisan. - Core claim and media framing: The program asserts that Pizzagate originated from Podesta email dumps and evolved into a theory that Clinton and Podesta ran a child sex trafficking ring. It is claimed that the email references to pizza, handkerchiefs, hot dogs, and related terms were code words used by pedophiles, with Comet Ping Pong Pizza referenced multiple times in the emails and connected to Podesta through James Alefantis, its owner, described as a friend of Podesta and listed by GQ as a powerful DC figure. - Specific nodes and symbols: The narrative identifies a supposed FBI symbol system used by pedophiles (including a “boy love” triangle) and notes that Besta Pizza’s logo formerly contained a similar symbol, which it is argued changed after investigators pointed it out. It also links a number of performances at Comet Ping Pong (e.g., Heavy Breathing, Sex Stains) to disturbing symbols later identified as pedophile codes. James Alefantis is described with references to intimate associations (e.g., a relationship with David Brock, founder of Media Matters) and to his Instagram presence, which allegedly contained disturbing images and coded references. - Broader network and alleged ties: The film asserts extensive links among Alefantis, Podesta brothers, and other Washington figures, including references to donations to Hillary Clinton and George Soros, frequent White House visits, and dinners with Podesta. It cites pictures of Podesta with Alefantis and other figures, and claims a pattern of relationships with prominent Democrats and fundraisers. - Cultural artifacts and art world connections: The transcript describes connections to Marina Abramović and “spirit cooking” events, claiming Podesta attended such events, and cites museum-like art collections (e.g., Tony Podesta’s home) as evidence of a hidden culture. It recaps the idea that “spirit cooking” is a ritual performance and contrasts it with the artist’s explanation of context. - Notable individuals and incidents: The text references Dennis Hastert (the former House Speaker) in the context of criminal charges and alleged abuse, presenting Podesta’s emails as mentioning Hastert and tying that into a broader network. It describes various DC figures and businesses (e.g., Gordy’s Pickle Jar, Beyond Borders, Politics and Prose) as part of the alleged web of pedophilia-adjacent activity, with logos and social media posts interpreted as evidence. It claims that the Podesta brothers and others are part of a “deep state” or “occult” network. - Pizzagate in the real world: The narrative recounts the December 2016 incident in which Edgar Welch fired inside Comet Ping Pong Earth, saying he was investigating claims of a child sex ring and that the information originated online. It emphasizes the danger and harassment faced by Alefantis, staff, and customers, including death threats, and frames the gun incident as a consequence of fake-news-driven conspiracy theory. - Media coverage and accountability: The transcript includes a Kelly File segment in which James Alefantis speaks about the harassment and threats to staff and customers, underscoring that the claims had real-world consequences even as police and mainstream media reportedly found no evidence of a sex ring. It includes an Infowars segment in which Alex Jones and others discuss Pizzagate, acknowledge that they had initially reported on Podesta email code words, and later issued an apology and retraction regarding specific statements about Alefantis and Comet Ping Pong. - Investigative and ethical reflections: The piece features a video producer recounting alleged threats from Alefantis, including a phone call in which he purportedly threatened to kill the producer and his family unless the related video was deleted. It also includes a segment where a technician discusses alleged “kill room” imagery and references to underground tunnels and a Pegasus museum, tying them to the broader conspiracy. - Conclusion and framing of a larger struggle: The final portion frames Pizzagate as part of a larger battle against a supposed deep-state manipulation of media and government. It positions the narrative as a catalyst for a broader movement (referred to as Q and a coming “second American revolution”), calling for declassification of materials related to Epstein, Gates, Spygate, Russiagate, JFK, and 9/11 and presenting a claim that public trust in mass media and social platforms is in jeopardy. It ends with a call to action and a slogan about a movement that transcends party politics, asserting that government should be controlled by the people. Throughout, the transcript presents a chain of alleged connections, symbols, and events used to argue that a hidden, interconnected network of political and cultural elites engaged in child trafficking, with Pizzagate as a flashpoint that demonstrated broader cultural and media manipulation. It includes counterpoints from mainstream coverage, as well as self-professed apologies and retractions by some producers, but it maintains the core claim of a pervasive, concealed conspiracy supported by a web of social, political, and artistic figures.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker delivers a passionate tirade accusing established power structures of pervasive corruption and enacting or allowing harm without accountability. The core points are laid out as a sequence of high-profile allegations and perceived injustices, presented as ongoing and unresolved. Key claims and topics include: - Widespread frustration with exposing corruption: “I am tired of exposing corruption, doing our homework, [and] presenting the evidence. We know what's happening except then once we expose it, nothing happens. Nobody goes to jail.” - Hillary Clinton and related scandals: “Clinton got away with it. Even the left knew that the Clinton Foundation was dirty. They sold uranium to our biggest enemy, Russia.” The speaker asserts that “She can take confidential top secret emails and put them on her server at her home, something you and I would go to prison for.” - Benghazi and related actions: Benghazi referenced as gun running to a group in Syria that became ISIS, and the killing of a U.S. ambassador; a claim that troops were abandoned on Veterans Day with no consequences. - Spying on a presidential candidate: A charge that spying occurred on a presidential candidate, followed by the assertion that “they were doing it” and that “nothing happens.” - Russia collusion and its handling: The speaker claims collusion with Russia should have been the biggest scandal if true, or else that evidence and paperwork showed they knew it up to the White House; mentions lying to FISA courts, creating an enemies list, and using intelligence agencies to support an operation, claiming millions were spent on a claim they knew wasn’t true. - Ukraine and related investigations: The speaker mentions “the scandal, the loss of billions of tax dollars in Ukraine” and “the lies and the collusion with the Obama administration in Ukraine,” asserting these were downplayed or ignored. - Hunter Biden and Burisma/China: The speaker references “Hunter Biden, forget about Burisma. What was that? $7,000,000,000?” and asserts “We have all the proof anyone who cares to be honest needs… on his own freaking laptop,” with claimed verification by Democrats who had access to the same emails. - Deep state and justice system: An assertion of a “deep state” and a corrupted justice department, alongside perceived media complicity, including the claim that the media tells people to deny their own eyes. - Social and cultural protests: Claims that the country is torn apart by radicals marching with “no Trump, no Biden, no America” signs, while dismissing these protests as peaceful; and criticism of teachers’ unions and Black Lives Matter, labeling BLM as a corporation and BLM’s manifesto as advocating the destruction of the nuclear family. - Antifa and political labels: Antifa is dismissed as “not wild in the streets… that’s only an idea,” contrasting with the speaker’s view of constitutional support as radical. - Final sentiment: A declaration of having reached the limit, with a sense of fatigue and a near decision to end the show due to the perceived state of affairs, concluding with “I almost didn’t make the show last week because this is what I wanted to say to you.”

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: This story that's been the biggest thing on the Internet for several weeks, Pizzagate, as it's called, is a rabbit hole that is horrifying to go down. Now if you're a radio listener, this is a powerful video, but I've had it reposted because, again, he finished it, I guess, on Wednesday. It went out Thursday on the nightly news that was taped the day before. This is on infowars.com. Pizzagate is real. The only question is, what exactly is it? Because I'd said, man, I hope this is drug dealing code word or something or, you know, maybe they got the wrong manual because this is the FBI says this is this is pedophilia manuals. These are the terms they use, and then here's the New York Times. Fake news onslaught targets pizzeria as nest of child traffickers. Hey. I don't know why the pizzeria and the one down the street have symbols in the FBI dossier. I don't know why there's devil worship part of the walls. I don't know why it's connected to Potesta. I don't know why they got rock singers there talking about, you know, being you know, going after kids or whatever. This is what's going on, though. And so maybe it's just some genre they picked up. They don't know what they're involved in. I'm not accusing them of anything. Little I mean, it's not like they look like little piggy people or anything. Not like they fit all the cliches or anything when you go to the just like nice people to me, but the point is is that this is tied into Podesta with thousands of emails with, we're gonna have the six year old, the seven year old, and eight year old in the hot tub for your entertainment out at the ranch house. They can be a little persnickety, but they are also willing and enjoy it. Yeah. I mean, there's thousands of these. You're reading it going, what the hell is this? And you start reading it. There's thousands and thousands and thousands, and you know you're reading something real bad. Oh, I'll see you at the feast tonight. Oh, we'll have lots of blood and semen. Oh, good. And then they had, like, Time Magazine worshiping this high priestess the week after we exposed her about the news, all this PR, like, oh, we'll show them. They're attacking our high priestesses. We'll just put them in the news better. Like, we're all upstanding and out in the open and good people. Look. I've been careful about all this. This is lawsuit city. I don't know what the hell is going on with these people. I know straight up devil worship when I see it and find quotes of her saying it's real when she does it privately. Could he harass me anything Reddit accounts? I mean, I know real bathymen worship when I see it, but thousands of emails, I'm not ready to accuse all these people of this. It's up to you to research it for yourself, but you gotta go to infowars.com and actually see the photos and videos inside these places. You've gotta see their menus. You've gotta see it all, ladies and gentlemen, and then you gotta see the FBI law enforcement manuals showing the code words that are used. And by the way, didn't just believe this. I went to the FBI site. I went and looked it all up, and people asked, well, why weren't you on this earlier? We were on it from the beginning. We've been on it the last couple weeks since the election, but we're fighting on hundreds of fronts here. Let's go ahead and go to the report. Pizzagate is real. The question is, how real is it? What is it? Something's going on. Something's being covered up. It needs to be investigated. You just call it fake news. These are real WikiLeaks. This is real stuff going on. Here it is. Speaker 1: A warning to viewers, the following images are disturbing. This all began after WikiLeaks founder Julian Assange released hundreds of thousands of secret documents detailing a back stabbing Clinton Foundation, but it now appears the real truth Assange was leading us to was hidden between the blurred lines of Hillary Clinton's campaign manager, John Podesta's, released emails. Fast forward past John Podesta's brother, Tony's, casual email exchange with thalemic spirit cooking adherent Marina Abramovic. Rosetta Stone was needed next. A verification that high level Washington DC predatory pedophiles were using a code to communicate child sex trafficking as casually as ordering a pizza. An FBI unclassified document from WikiLeaks revealed symbols and logos used by pedophiles to identify sexual preferences to include those who sexually abuse children as well as those who produce, distribute, and trade child pornography are using various types of identification logos or symbols to recognize one another and distinguish their sexual preferences. Investigators should also be attentive to pedophilia symbols advertised on websites. During examinations of computer files, investigators should be conscious of subjects who try to conceal child pornography by labeling them with symbols instead of typical suggestive explicit names. Thus, the interest in code words. Now clues. The menu from comet ping pong. Notice the symbol of the ping pong paddles and its clever resemblance to the FBI documents symbol for child love. Alright. Hang on, New York Times. Before you declare this fake news from your ivory tower, now look at the symbol for Besta Pizza just two doors down from comet ping pong pizza, boldly using the symbol for boy lover as was recorded on the unclassified FBI document. The evidence begins to reveal that Besta Pizza and Comet Ping Pong Pizza may be competing for the lucrative Washington DC pedophile market right out in the open. Comet Ping Pong owner James Alifantis needs to explain himself, and so he did via the Hillary Clinton colluding New York Times. But so many questions remain unanswered. Why was this said by the band heavy breathing performing in comet ping pong? Speaker 0: He likes the world sounds. Demolios. And little boys. And children. Think I was his manager. Yep. We all have references. Speaker 1: Why is the art work adorning Comet Ping Pong's walls at the very least so insanely creepy, especially for a family restaurant? Why is Alifantis so close to Tony Podesta as revealed in the WikiLeaks emails? And why does mister Podesta collect questionable artwork specializing in grotesque eroticism and pedophilic images, not to mention Podesta's dabbling in what appears to be cannibalistic rituals while continuing his old friendship with convicted pedophile Dennis Hastard. Why is this man wearing an I love children shirt in this situation? Why did you write hashtag murder next to this incredibly creepy photo you posted? Why do you find it amusing that this baby is for sale? Why do you associate with this artist? Why is any of this okay? And if these code words are eventually proven to be just another method of communication, then why did the Podesta emails mention the code word pasta for either little boy or sex 78 times. Code word cheese for little girl 85 times. And what does Podesta's friend Herb mean by this statement from a Podesta email? PS. Do you think I'll do better playing dominoes on cheese than on pasta? According to the National Center for Missing and Exploited Children and the FBI, 460,699 children went missing in 2015 that we know of. Mister Alifantis, this isn't a witch hunt, and it isn't an attack from fake news that your boyfriend David Brock, founder of Media Matters, would have us all ignore. Either you are the unlucky victim of a fake news onslaught due to your own poorly initiated publicity or a decades old pedophile ring operating in the power hoarding shadows of Washington DC is about to be opened from your front door. John Bound for infowars.com. Speaker 0: Trump won. Hillary stole five states. Was ordered to stand down by the intelligence agencies where everything else is gonna come out on this. If you're a radio listener, you're lucky you didn't actually see the video. The art they tweet in Facebook is of children being murdered, cut in pieces, and raped by men with giant genitalia. So oh, yeah. Oh, yeah. So I don't know anymore, but that's what they're pushing. It's what they got hanging up in there, and it's what they're doing. And, I I can't go out there and investigate it myself. We've had reporters on that have been there. They say it's really creepy because, I don't have the self control to be around these type of people. So you want us to cover Pizzagate? We have covered it. We are covering it, and all I know is, god help us, we're in the hands of pure evil. We'll be right back. I'm on the show.

Video Saved From X

reSee.it Video Transcript AI Summary
The video discusses various disturbing images and emails related to James Alefantis, owner of Comet Pizza, and John Podesta, former chairman of Hillary Clinton's campaign. The images include sexualized references to pizza and the Teenage Mutant Ninja Turtles. The emails contain coded language, such as references to hot dogs and walnuts, which some believe are related to child trafficking. The video also mentions a painting in Podesta's office depicting cannibalism. The speaker questions the intentions behind these images and emails, suggesting that they imply something more sinister than innocent food references.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts: I’m not suicidal. Any creator, politician, or celebrity who tries to make a film or documentary on CPS has wound up dead, including a senator. The November film will be their hardest hitting, and they will “rip the veil off” to the point where CPS shows up at your door. Our government is running the world’s largest child trafficking network. They emphasize they would never kill themselves, do drugs, or put themselves in dangerous environments; if anything happens to them, it is the United States government. They watched the first take of the film and say, “they’re gonna kill me.” They urge a trip down memory lane to discuss Pizzagate, stating this is where it all starts. Speaker 1 begins by saying the Pizzagate story has outrageous connections and promising brand-new whistleblower information that will blow minds. They provide an overview: back to Bill and Hillary Clinton, whom many believe to be child pedophiles. They say there’s never been direct evidence, but in 02/2016 WikiLeaks published Hillary Clinton emails with John Podesta showing coded language about a child trafficking ring centered in a Washington, DC pizza restaurant basement at Comet Ping Pong. Edgar Maddison Welch went to the restaurant with firearms to “liberate the children,” but no one was hurt; it was later said there wasn’t a basement, so the scandal was dismissed, though there’s more to the story. The transcript then ties Hillary Clinton to Laura Silsbee, who was involved in trafficking, and outlines a chain: Hillary Clinton and Laura Silsbee exchanged documents detailing logistics of trafficking children from Haiti to Boise, Idaho. Laura Silsbee had previously kidnapped several dozen children from Haiti and attempted to cross into the Dominican Republic; she was caught and the children were returned to their families. Shawnee M. King is cited for reporting on Silsbee’s case. Jorge Puello, an attorney for Silsbee’s group, was suspected of leading an international trafficking ring; Puello was arrested in investigations by ICE and Homeland Security; his wife faced charges of sexual exploitation of minors and women. The narrative claims Hillary Clinton and Laura Silsbee were connected; Bill and Hillary Clinton allegedly helped negotiate the release of Laura Silsbee and her accomplices after their imprisonment in Haiti. Speaker 1 then ties the connections to CPS: the number-one source of child trafficking is the U.S. CPS system, and the number-one gateway to sex trafficking in America is the foster care system. The foster care system allegedly lost over 100,000 children in the last twenty years, raised questions about where they went, and claims millions of children are abused in foster care by financially compensated foster parents and social workers. The Adoptive Safe Families Act (ASFA), championed by Hillary Clinton and signed by Bill Clinton in 1997, supposedly created and financed CPS/foster care by diverting Social Security funds to 50 states, giving a financial incentive to “kidnap” children. It is claimed that CPS targets poor and minority children and single-parent families, and that the system now functions as a government-subsidized child-trafficking ring. Speaker 1 lists correlations: CPS is a tool used to target conservatives; CPS offices get paid per child kidnapped; 83% of removals lack proof of abuse. The claim is that Hillary Clinton created the system and that Laura Silsbee, a friend of Clinton, is involved in Idaho’s CPS network. Laura Silsbee allegedly works with Idaho Department of Health and Welfare (IDHW) and is a registered foster care parent in Idaho, receiving monthly payments for children in her custody, as shown by whistleblower-provided screenshots. Idaho’s Attorney General Raul Labrador opened an investigation into IDHW financial misappropriations, but Idaho’s Department director Dave Jepison resigned and disappeared, and Judge Lynn Norton allegedly issued an order halting the AG’s investigation. The Idaho Department of Health and Welfare allegedly dominates Idaho’s budget, and Laura Silsbee’s role with IDHW is framed as proof of a nationwide system. The narrative concludes by warning Idahoans to beware of Laura Silsbee (aka Laura Gaylor), Judge Norton, and supporters of IDHW, asserting that the system extends to all 50 states, including Arizona, Texas, and Florida, which are described as among the worst offenders in CPS corruption.

Video Saved From X

reSee.it Video Transcript AI Summary
WikiLeaks' release of Podesta's emails revealed code words and an email about young children being delivered to a party for his entertainment. This, along with his friendship with Dennis Hasturt, led to investigations into John Podesta, revealing his collection of art featuring children in violent situations. The investigation expanded to his brother, Tony Podesta, who stepped down from the Podesta Group amid legal issues. A 2004 Washington Post article described Tony Podesta's home as decorated with photos of nude teenagers, which were later scrubbed from the internet. The speaker claims to have acquired these photos, showing them censored. The speaker questions why guests mentioned in the article didn't report him to authorities. The speaker questions whether Tony or John Podesta will face justice, given Dennis Hasturt's 15-year sentence. The speaker suggests this will test the Trump administration's commitment to restoring the rule of law.

Video Saved From X

reSee.it Video Transcript AI Summary
A former Bernie Sanders supporter who worked for the DNC claims that the DNC rigged the primary against Sanders. He leaked information to WikiLeaks and was subsequently murdered. The speaker questions why people ignore this and dismiss it as a conspiracy theory. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker suggests that the CIA controls everyone and is trying to capture Assange. They mention the possibility of the Ecuadorian embassy being blown up. The speaker believes that there are many people connected to the Clinton Organization who have been silenced or harmed.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on email leaks and allegations of hacking connected to a political context. One speaker notes that “one hour later, WikiLeaks starts dropping my emails,” suggesting a link between the leaks and his own communications. The group references those emails being public and questions about what might have been coincidental, with lines like “Just get lost into the public. One could say that there might those things might not have been a coincidence” and mentions “those things” that may or may not have been intended to surface. Two days after the initial events, the speaker recounts that “the FBI contacted me, the first thing the agent said to me was, I don’t know if you’re aware, but your email account had might have been hacked.” He confirms awareness of the hacking, stating “I said yes,” and recalls a demand that he change how he is addressed, with references to being told, “From now on, you won’t call me your father,” and “I you will call me your father,” coupled with the assertion “You think you hide shit, don’t you? Just get lost.” The dialogue shifts to broader implications: other campaign officials’ emails were divulged earlier than October 7, and the speakers discuss uncertainty about what exactly had been compromised, noting “there was a document that appeared to come from my account” and realizing “they had the contents of my email account.” The last time one speaker talked to the FBI is mentioned in the context of these disclosures. A separate thread introduces media narratives, with a speaker asking, “Media is telling you the entire story is a hoax or fake news. But what does that even mean?” and stating, “I spent the last month investigating. So what exactly is Pizzagate? And are there any actual facts to support the story?” There is a sense of frustration about interpretation and evidence, captured in the line, “They’re hearing what they wanna hear. They’re not really listening to what I’m telling them.” The transcript ends with a brief aside from another speaker, “What’s that?” indicating confusion or a request for clarification, tied to the ongoing discussion about the emails, hacks, and the Pizzagate inquiry.

Video Saved From X

reSee.it Video Transcript AI Summary
Jeffrey Epstein's close friend, Brighington, used to travel with him to his private island where young women were kept as sex slaves. John Podesta, Hillary Clinton's campaign manager, had his Gmail hacked and his emails ended up on WikiLeaks. The emails mentioned heating a pool and having entertainment for children. The pizza restaurant, Comet Ping Pong, is connected to the Clintons and has disturbing symbols and comments on its Instagram. There are also connections to pedophilia and occult rituals involving John and Tony Podesta. The owner of Comet Ping Pong is considered one of the most powerful people in Washington.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the controversy surrounding Pizzagate, dismissing claims that it has been debunked. They question the meaning behind code words in John Podesta's emails and raise concerns about his alleged involvement in child exploitation. They also mention Tony Podesta's artwork and the spirit cooking dinners hosted by Marina Abramovic. Speaker 1 challenges anyone who believes Pizzagate has been debunked to a debate. Speaker 2 reveals that they have not received any updates on the investigation from the FBI. The speakers criticize the mainstream media for spreading misinformation and claiming it is illegal to read Podesta's emails. They suggest that the media's fear of the emails' content led to these false statements.

Video Saved From X

reSee.it Video Transcript AI Summary
A former DNC staffer and Bernie Sanders supporter was allegedly murdered after leaking information to WikiLeaks about the DNC rigging the primary. The speaker questions why this is dismissed as a conspiracy theory, pointing out that the staffer's wallet, watch, and phone were not taken, contrary to a robbery gone wrong. Julian Assange, once favored by the left, is now accused of working for Russia after warning of consequences for sharing information with WikiLeaks. Assange is stuck in the Ecuadorian embassy because the CIA wants him. The speaker claims many people connected to Hillary Clinton, the Clinton Foundation, and Bill Clinton have died, some coincidentally, but the number is still stunning.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript explores a conspiracy-laden view of elite abuse networks and attempts to connect public figures, media, and entertainment industries to child trafficking and satanic rituals. It begins with a meditation on how people come to believe facts—through trusted stories and news—and questions whether those stories can be recognized as deceptive. Several participants discuss a belief in elite pedophile rings and describe the psychological barriers people face when confronted with that possibility. They emphasize critical thinking as a tool to examine what one is being fed, recounting personal difficulties in accepting the notion of an overseas or hidden network of abuse, and then recount how Liz Crokin’s reporting, initially dismissed by the media, led one speaker to consider that there may be truth to such claims. Speaker 3, a journalist with two decades in mainstream media, recounts a career rooted in verification and reporting, noting that he was widely respected until he reported on Pizzagate. He claims the media corrupted or misrepresented Pizzagate and argues that the code words in John Podesta’s emails—especially “pizza” and “handkerchiefs”—are used as pedophile code words. He asserts that “pizza is a well known pedophile code word,” used by law enforcement in other cases, and cites a 2007 FBI document claiming symbols used by pedophiles, including a triangle signifying “boy love.” Speakers discuss the Podesta emails, insisting that no single email explicitly discusses child sex trafficking or pedophilia, but arguing that strangely worded messages about pizza and handkerchiefs indicate coded conversations. They contend that mainstream media framed Pizzagate as depictions of a conspiracy and accuse media figures of avoiding difficult questions of the clues within the Podesta material and related social media posts. The discussion shifts to broader allegations of elite complicity and cover-ups. It references Jeffrey Epstein’s death, debates about who might be involved or protected, and claims that powerful people who associated with Epstein and traveled on his plane or to his island were part of a wider network of abuse. Bill Gates’ ties to Epstein are discussed, with a New York Times report cited about meetings and a bidirectional philanthropic collaboration that allegedly connected Gates to Epstein. The text mentions other prominent figures, including members of royal families, models, actors, and politicians, and raises questions about why investigations did not occur or were suppressed. MKUltra and Nexium are invoked as examples of mind-control tactics and systemic abuse, with testimonies about branding, ritual symbolism (pyramids, one eye), and the recurrence of satanic imagery in Hollywood and political circles. The narrative asserts that many elites publicly display occult symbols, that discussions of pedophilia are sometimes dismissed as jokes, and that whistleblowers face threats and retaliation. The transcript includes personal testimonies about media complicity, the manipulation of public perception, and the fear of crossing elite lines. It closes with a promotional segment for the film Sound of Freedom, describing it as a true-story-inspired project about rescuing trafficked children and urging mass audience participation, including a pay-it-forward ticket program, with the aim of inspiring two million viewers in opening weekend.

Video Saved From X

reSee.it Video Transcript AI Summary
WikiLeaks' release of Podesta's emails revealed alleged code words and an email about young children being delivered to a party for his entertainment. This, along with his friendship with Dennis Hasturt, led to investigations into John Podesta, revealing his alleged habit of collecting art featuring children in violent situations. The investigation expanded to his brother, Tony Podesta, who stepped down from the Podesta Group amid legal issues. A 2004 Washington Post article described Tony Podesta's home as decorated with photos of nude teenagers. The speaker claims these photos were scrubbed from the internet but have now been acquired and will be shown, albeit censored. The speaker questions why guests who saw the photos didn't report Tony Podesta to authorities. The speaker doubts whether Tony or John Podesta will face justice, questioning if the justice system is too corrupt to prosecute powerful pedophiles. The speaker suggests this will be a test of the Trump administration's commitment to restoring the rule of law.
View Full Interactive Feed