TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that top law enforcement officials expected Hillary Clinton to win the 2016 election and manipulated the law to ensure her victory and Trump's defeat. He cites James Comey's alleged admission of operating in an environment where a Clinton victory was expected. The speaker discusses the alleged intrusion into the Democratic National Committee (DNC), pointing to "telltale signs in Cyrillic" and the name "Felix Dzerzhinsky" as either sloppy or overly clever attempts to implicate Russia. He alleges that the persona "Guccifer 2.0" is a fraud, based on forensic analysis of metadata by former NSA technical directors. The speaker criticizes Bob Mueller, claiming he falsified intelligence before the Iraq War and approved of torture and wiretapping. He recounts an encounter where he questioned Mueller about "parallel construction," the practice of using illegally acquired information in prosecutions without revealing its source. The speaker describes James Comey's leaking of a conversation with President Trump to prompt the appointment of a special prosecutor, Bob Mueller. He questions Comey's decision not to seize the DNC computers after the alleged Russian hacking, relying instead on CrowdStrike, a firm with a "disastrous record of veracity." The speaker claims that the DNC blamed Russia for the hacking to divert attention from the content of the leaked emails. He references Jennifer Palmieri, Hillary Clinton's PR person, allegedly pushing the "Russians hacked" narrative. Chuck Schumer is quoted as saying the intelligence community has "six ways to Sunday" to get back at Trump. The speaker discusses the Steele dossier and claims that the FBI also paid for it. He alleges that the intelligence community assessment on Russian hacking was based on handpicked analysts and that Obama stated the conclusions of Russian hacking getting to WikiLeaks were inconclusive. He claims NSA collects everything and there is no evidence of Russian hacking. The speaker references Peter Strzok and Lisa Page's text messages, where they expressed support for Hillary Clinton and a determination to "stop" Trump. He claims Strzok, who led the investigation of Hillary Clinton's emails, later said there was "no there there" regarding Russia gate. The speaker claims Julian Assange released documentation of the CIA's cyber tool to hack into systems and leave telltale signs giving the responsibility to someone else. He concludes that a "deep state" within the FBI, CIA, and Justice Department acted to ensure Hillary Clinton's victory and undermine Trump.

Video Saved From X

reSee.it Video Transcript AI Summary
People who oppose the mainstream media are often labeled as racist or potentially dangerous. WikiLeaks recently released thousands of hacked emails from Clinton campaign chairman John Podesta, which have revealed corruption, law breaking, and collusion within the Clinton campaign, the government, and the media. There are also claims that Podesta may be involved in a child sex trafficking ring. Additionally, the emails suggest that Podesta and his brother participated in occult practices. The speakers express their anger and frustration towards Podesta, demanding to know what secrets he is hiding.

Video Saved From X

reSee.it Video Transcript AI Summary
In July 2016, Christopher Steele gave his dossier to the FBI while John Brennan, then head of the CIA, received information about the Hillary Clinton campaign's questionable activities. The evidence related to this was either destroyed or returned to the Clinton Global Initiative. The corruption within the DOJ and FBI is concerning, as an entire investigative team conducting a lawful investigation can be shut down by the Department of Justice. This should be a major story, given the magnitude of the situation.

Video Saved From X

reSee.it Video Transcript AI Summary
People who criticize the mainstream media are often labeled as racist or potentially dangerous. Tonight's discussion will be disturbing but it offers a reality check that you won't find elsewhere. WikiLeaks has released a new batch of emails from campaign chairman John Podesta, revealing corruption, lobbying, and media manipulation within the winning campaign. There are also claims of a child sex trafficking ring. This is a deliberate effort to destroy John Podesta personally. In a bizarre exchange, someone demands to be called "father" and tells another person to get lost.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker emphasized the dangers of Julian Assange's actions, highlighting how WikiLeaks' publication of unredacted State Department documents put lives at risk and hindered diplomatic relationships. They mentioned the State Department's efforts to protect individuals named in the documents but couldn't confirm specific harm. The discussion also touched on Assange's potential entry into the US and the judge's ruling on victims. The State Department's challenges in maintaining trust due to leaked information were noted, with concerns raised by foreign counterparts. The conversation concluded with a reference to private conversations and concerns raised by foreign leaders like Berlusconi.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the FBI's investigation into a person accused of espionage. The FBI mistakenly believed that the person had left the country, but he was actually living in DC. Despite this, the FBI hired him and paid him over $200,000, even though they knew he was a Russian spy. The speaker also mentions another individual, Charles Dolan, who was a source for the false dossier used to spy on American citizens. Dolan and the Russian spy even met on a park bench, but the FBI refused to interview Dolan. The speaker criticizes the FBI's actions and highlights the problem of running investigations from headquarters instead of assigning a US attorney.

Video Saved From X

reSee.it Video Transcript AI Summary
Lindsay briefly mentions that she has information on Seth Rich, who allegedly leaked DNC information. She claims to have been in contact with someone from Julian Assange's team who confirmed this. Lindsay also mentions that the murder of Seth Rich remains unsolved and questions the robbery narrative. She mentions a judge pushing the FBI to release previously undisclosed pages on the case. The conversation ends with Speaker 0 expressing interest in discussing the case further with a lawyer involved.

Video Saved From X

reSee.it Video Transcript AI Summary
A former Bernie Sanders supporter who worked for the DNC leaked information to WikiLeaks, exposing the rigging of the primary against Sanders. He was subsequently murdered. The speaker emphasizes that this is not a conspiracy theory, but a fact. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker suggests that the CIA wants Assange and controls various organizations to achieve their goals. They mention the possibility of more revelations related to Seth Rich and the number of people connected to the Clintons who have been killed.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states that sources claim Brennan used "reverse targeting" to entrap Trump advisors Carter Page and George Papadopoulos via Halper and Mifsud. Papadopoulos told former Australian ambassador Downer about Russian offers to help Trump. This appears to be how Russiagate started. Speaker 1 believes John Brennan is a dark figure. Speaker 1 was arrested in 2012 and charged with espionage for blowing the whistle on the sea ice torch program. Speaker 1 claims to have found memos where Brennan told Holder to charge him with espionage, even though Holder's people didn't think he committed it, and then to make him defend himself. The espionage charges were dropped after Speaker 1 went bankrupt from legal fees. Speaker 1 believes Brennan was responsible for the origin of Russiagate. Speaker 1 claims the FBI isn't capable of such operations, but the CIA and John Brennan are. Speaker 1 claims Brennan and his contemporaries devise operations to get from point A to point C, ruining people along the way, and discusses potential tactics.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: Did you hear Trump's take on the JFK assassination, why he didn't release the files? Yeah. I know what Trump's take is. He said that if you knew what I know, you wouldn't tell people either, which is crazy. Well, and What does that mean? That's his position on the UAP thing as well Yeah. Actually. And that's a lot of people's position on it. I mean, you know, Trump is saying, of course, the CIA had knowledge of it. That is known. I mean, I mean, the whole it sounds like it's so funny. There's so many levels and there's so much I don't understand. But the whole JFK conspiracy industry, and it really is an industry, more books written on that than almost any historical topic, is is filled with wackos. Right? There are a lot of wackos in there. But it obscures that fact obscures the larger fact which is the facts themselves tell an unbelievable story. Yeah. And so whatever. I could get into it at great length. But yeah. Yeah. They're they're still classifying documents sixty one years later. Both Trump and Joe Biden have, in violation of my read of federal law, kept those documents secret. There's no living person connected to the Kennedy assassination. It was a couple generations ago. There's no one person whose whose secrets are being protected. It's an institution or maybe countries. There may have been countries involved too. I mean, don't know the answer, but there's clearly something worth protecting. And I know that when I I spoke to someone who'd seen the documents, okay, two years ago and I got I got one fact out of him, which is, yes, the CIA was involved. And by CIA, CIA is a huge organization, but James Jesus Angleton, the head of the operations directorate, had knowledge of this, which I think is well known. But that that's the view of someone who saw the documents. So I thought that was news, so I went on TV and said that. The next day, I'll never forget it, I went quail hunting, and I was driving back and I got a phone call from Mike Pompeo's lawyer. Mike Pompeo was the Secretary of State, but before then he was the Director of the CIA. And in that position, he plotted the murder of Julian Assange, so he is a criminal as far as I'm concerned. But his lawyer called me and said, you know, you should know that anyone who tells you the contents of classified documents has committed a crime. He's threatening me. It's in my car. I'll never with my dog sitting next to me. I'll never forget this. And I said, are you really saying that to reveal that the US government had a role in the murder of a democratically elected president to say that out loud, that's the crime? What about the actual crime which is murdering a president? Like, you're covering up for that, Mike Pompeo. He had no no response at all. And so Mike Pompeo is the one who pressed Trump to keep those documents secret. And so it's like, what's crazy to me is not just that Pompeo did that. I think Pompeo was a really sinister person and a and a criminal. I think that. I think that because the facts suggest that. He was caught. Yahoo News, Mike Issachoff wrote a long piece on this several years ago. His employees went to Mike Issachoff and said, hey. Mike Pompeo was plotting to murder Julian Assange who's never even been charged with a crime in The United States as CIA director. That's illegal. You're not allowed federal employees are not allowed to just kill people they don't like. Okay? Just to set the baseline here. So that's who Mike Pompeo is, but he somehow intimidated Trump into not releasing this. Well, okay. That's all bad. Right? I think it's criminal behavior. What's crazy is how Mike Pompeo is treated. He's treated as like a republican pooh bah in good standing. He fully expects to become the secretary of defense in a Trump administration, which is like completely insane. Why would you get criminal and give him nuclear weapons? Okay. That's my view. I think it's a common sense view. And like he goes to fundraisers and dinners and everyone's like, hey, Mike Pompeo. It's like, no. You're the guy who kept information the public has right to know secret. You're the guy who plotted the murder of someone who committed no crime. You are the outlaw. You are the bad guy. But no. He's treated as like, you know, like a pillar of republican Washington. I think that's I think it's mind bending to watch that.

Video Saved From X

reSee.it Video Transcript AI Summary
Svetlana Lokova recounts a years-spanning, shadowy influence operation that she says began long before the public Russiagate narrative took hold and continued to unfold through high-level intelligence and political circles in the United States and the United Kingdom. She argues that a coordinated conspiracy, involving American and British intelligence figures, political operatives, and foreign partners, was designed to undermine Donald Trump’s 2016 presidential campaign, demonize him in the public sphere, and ultimately reshape U.S. politics in ways that persist to today. She explains that the conspiracy starts with the idea of weaponizing Russia as a pretext to derail Trump. In September 2015, Hillary Clinton’s circle tied to Strobe Talbott and to London-based figures including Richard Dearlove and Christopher Andrew decides to dust off “the old Russian handbook” and pursue a plan to run with Russia as the central smokescreen. Svetlana notes that General Michael Flynn, then head of the Defense Intelligence Agency (DIA) under Obama, was already engaging with Russia on matters of security and terrorism, and that Flynn’s Moscow trip in December 2015, arranged through the DIA, became a focal point of later accusations. She emphasizes that the trip was conducted under normal security procedures, with defensive briefings and debriefings required for someone of Flynn’s level of clearance. A key tie-in is the Cambridge operation she herself experienced. In 2015 she was an academic at Cambridge University, where she formed connections with MI6’s Richard Dearlove, Cambridge-based MI6-linked figures, and CIA asset Stefan Halper, who had Cambridge cover as a professor. She describes what she calls “bump” encounters—unexpected introductions that later produced routine reports. One such meeting introduced her to John McLaughlin, then acting CIA director, who allegedly expressed admiration for Russia and who later became a conduit for information within the FBI and CIA. Alan Collar, a London-based FBI liaison (Ligat) and a contact to Cambridge, also emerges as a pivotal figure; Svetlana recalls that Collar later sought to have Halper’s help in various capacities, including a potential PhD placement at Cambridge. Svetlana underscores how the operation leveraged a web of relationships: Christopher Steele in Britain, Halper in the U.S., McLaughlin, and MI6 heads like Dearlove, all part of what she describes as a “newsroom-to-FBI-to-CIA” loop. She explains that Steele and Halper acted as confidential informants for the FBI and CIA, with Steele’s dossier and Halper’s reports forming the backbone of what would become the Crossfire Hurricane investigation. She contends that the plan was not simply to accuse Trump of wrongdoing but to create a narrative of foreign interference—Russian involvement used to undermine Trump’s legitimacy and to give cover for the political takes of the Clinton-Soros alliance. The narrative continues with the infamous 2016 timeline. Svetlana recounts how the Hillary Clinton campaign, with Soros backing and with John Podesta’s circle, leveraged a “two-pronged” approach: demonize Trump through a public narrative of Russian interference and simultaneously seed a parallel set of claims about Trump campaign contacts with Russian intelligence. The plan, she says, was documented in internal emails circulated through Soros-linked channels and high-level Clinton aides. An August 2016 Oval Office meeting reportedly included Barack Obama, Susan Rice, James Comey, and John Brennan; Brennan allegedly noted that Hillary’s plan to distract from her email scandal involved tying Trump to Russia and ordered or supported steps to surface contacts between Trump advisers and Russian intelligence. This, she says, culminated in the opening of Crossfire Hurricane, justified by Downer’s May 2016 meeting with George Papadopoulos in London, which fed the FBI’s launch of an overarching inquiry into the Trump campaign. Svetlana emphasizes the mechanics of the operation: a cascade of “two-source” corroboration that failed to exist in reality but was manufactured through coordinated reporting. Stefan Halper and Christopher Steele allegedly provided separate but harmonized lines to the FBI and to journalists (for example, Washington Post and New York Times), with Fusion GPS coordinating research and payments, and with journalists feeding stories into the media while the FBI used those articles as cover to justify surveillance. She notes that the Steele dossier and Halper reports described contacts with Russian figures and asserted Kremlin orders, even while evidence mountains suggested the opposite or were non-existent. The operation allegedly relied on “ambiguous” or “dual-source” reporting to maintain plausible deniability and to keep multiple actors downstream of a single fabrication. Svetlana also describes internal institutional dynamics. She recounts that the Cambridge network included Gina Haspel (then head of the London CIA station) and Mike Morell (a senior CIA official) who allegedly used Cambridge as a front to pursue operations with university cover. The effort, she says, involved the use of “color revolutions” metaphors and methods—funding, organizing demonstrations, and controlling media narratives—through a transatlantic network that included British intelligence (MI6), American agencies (CIA, FBI, DHS), and at times Ukrainian actors. She asserts that the aim was not merely to affect the 2016 election but to create a “fog of war” (as she calls it) to obscure the truth, with the ultimate objective of removing Trump from power or preventing his influence in foreign policy. Two focal consequences are highlighted. First, the emergence of the Russia-collusion frame itself, built on forged or misrepresented evidence about Trump’s alleged ties to Russia and to Russian elites. Second, the use of this frame to drive real-world investigations, media coverage, and political pressure—culminating in the Mueller investigation and attempts to impeach or remove Trump from office. She contends that the Crossfire Hurricane investigation, and later the intelligence community assessment that purported Russian interference and Trump’s supposed collaboration, were built on manipulated or false premises, with the principal architects’ fingerprints on the evidence and the dissemination of the narrative across intelligence and media channels. In her discussion of the Mar-a-Lago documents and the Florida case surrounding John Brennan and other co-conspirators, Svetlana asserts that declassification by President Trump of Crossfire Hurricane documents demonstrated both the existence of the conspiracy and government overreach. She repeats a central point: the documents show a plan written down by Brennan and other aides to tie Trump to Russia, demonize him, and justify an ongoing investigation to undermine his presidency. She notes that the same players who orchestrated the scheme—Halper, Steele, Downer, Brennan, Clapper, Comey, and others—were allegedly involved in a broader pattern of off-the-books operations, funding, and information leaks designed to influence U.S. politics and foreign policy outcomes, with foreign allies in Britain and elsewhere participating in the broader maneuver. Svetlana’s overarching message is that accountability is possible but contingent on public attention and political will. She points to subpoenas and grand jury activity around Brennan and others as indications that the origins of the Russia investigation are formally being examined. She stresses that, despite the persistence of the conspiracy narrative, documents and testimony could reveal the truth behind the orchestrated campaign to disrupt the Trump presidency. She calls on the American public to demand accountability and to remain vigilant about the institutions and actors involved in what she describes as a continuing conspiracy, from Crossfire Hurricane to the later narratives surrounding Mueller and impeachment efforts, and into current political disputes. The dialogue closes with a personal appeal from Svetlana to the audience and to Lara Logan: the need to push for transparency and for due process, to scrutinize the roles of the people who allegedly manufactured and propagated the Russia collusion claims, and to insist on accountability for those who oversaw or participated in actions she frames as treasonous or seditious. She credits Lara Logan for ongoing coverage and expresses gratitude for the support of viewers and readers who seek an unflinching account of events, urging continued public scrutiny and a demand for principled governance.

Video Saved From X

reSee.it Video Transcript AI Summary
A former Bernie Sanders supporter who worked for the DNC claims that the DNC rigged the primary against Sanders. He leaked information to WikiLeaks and was subsequently murdered. The speaker questions why people ignore this and dismiss it as a conspiracy theory. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker suggests that the CIA controls everyone and is trying to capture Assange. They mention the possibility of the Ecuadorian embassy being blown up. The speaker believes that there are many people connected to the Clinton Organization who have been silenced or harmed.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states that sources have indicated Brennan used "reverse targeting" to entrap Trump advisors Carter Page and George Papadopoulos via Halper and Mifsud. Papadopoulos then told former Australian ambassador Downer about Russian offers to help Trump. This appears to be how Russiagate started. Speaker 1 believes John Brennan is a dark figure. Speaker 1 was arrested in 2012 and charged with espionage for blowing the whistle on the sea ice torch program. Speaker 1 claims to have found memos where Brennan told Holder to charge him with espionage, even after being advised against it. The espionage charges, carrying a potential death penalty, were later dropped after Speaker 1 went bankrupt from legal fees. Speaker 1 believes Brennan was responsible for the origin of Russiagate and that the CIA, under Brennan, devises operations to ruin people, cause suicides, or entrap individuals.

Video Saved From X

reSee.it Video Transcript AI Summary
The conversation centers on the Seth Rich murder and its alleged connection to WikiLeaks and the 2016 DNC email controversy. An FBI forensic report purportedly found that Rich contacted WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and Rich allegedly provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10, but his wallet, phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later, showing top DNC officials discussing ways to hurt Bernie Sanders at the polls, which contributed to the resignation of Debbie Wasserman Schultz as DNC chair and the DNC’s top three officials. Speaker 1 questions whether there is an “October surprise” and whether material is being held. Speaker 2 of the Helix group states that they do not sit on material and emphasizes that whistleblowers take significant risks; they note Rich’s murder as an example of high stakes and risk to sources, asserting that sources seek anonymity with them. When Speaker 1 asks if Rich was a source, Speaker 2 declines to comment but says they are investigating what happened to Rich and are concerned about it, though no conclusion has been reached. Speaker 3 argues that Rich was a Bernie Sanders supporter who worked for the DNC and asserts that the DNC rigged the primary against Sanders; he notes that Rich was aware of this and was involved as it happened, with Donald Brazil also involved. He describes Rich as idealistic and patriotic, and recounts his murder after leaking information to WikiLeaks, insisting that this is not a conspiracy theory but a fact-based concern. He challenges others to acknowledge the alleged corruption within the Democratic party and suggests that those who ignore the facts are engaging in denial. He also critiques media portrayals and online accusations about his own credibility. Speaker 4 discusses Assange and WikiLeaks, criticizing the idea of a conspiracy theory and labeling Assange as a key figure who exposed corruption. He mentions that Assange now “works for Russia” and questions the Ecuadorian embassy situation, describing it as heavily manipulated by interests around Hillary Clinton and the Clinton Foundation. He connects the Seth Rich disclosures to broader allegations of a coordinated effort to undermine Clinton and her circle, while acknowledging that some related claims may be questionable. Speaker 6 notes that hacking of the DNC and the role of CrowdStrike remain controversial and points to the subsequent murder of Rich as a focal point for questions that have not been fully explored by the media. Speaker 7 echoes concerns about the timeline, the FBI’s involvement, and past inquiries that were not pursued, emphasizing a sense that the case and the broader narrative around the DNC emails have been inadequately examined. Speaker 8 presents a long, conspiratorial narrative alleging that on 11/01/2016 Hillary and Bill Clinton orchestrated a civilian coup through corruption and co-option of key institutions, while a countercoup through Julian Assange and WikiLeaks was initiated to undermine Hillary and the Clinton machine. The speaker claims a silent countercoup across the Internet, led by members of the intelligence community, to stop the Clintons from gaining power and ensure Obama leaves without pardon, framing the moment as a major transitional event and a second American revolution conducted without guns.

Video Saved From X

reSee.it Video Transcript AI Summary
The war right now happening between Russia, Ukraine, and the West support of it actually was an extension of Russiagate. "Russiagate desensitized the Democrat party to hate Russia." The Russia narrative "came ex nihilo." "Putin became an acceptable villain for the Democrat party." "That all goes back to Russiagate." Our intel services are actually more about picking winners and losers in American elections and to thwart the will of pop sovereignty. "Obama personally ordered an intel report"—"Russia behind this election?" The report said no. "Russia was not behind this election, did not manipulate votes." FBI and CIA seem to be working on the same page. "The insurance policy" and "Dossier paid for by the Democrat party with Clinton funds to then illegally be able to spy on the Trump campaign." Rod Rosenstein was running the entire DOJ. This is the fourth branch of government—"unelected, unaccountable."

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: The speaker alleges a cover-up by people including Bill Barr and Mike Pompeo. Bill Barr, described by Jeffrey Epstein as “CIA,” allegedly covered up Epstein’s murder in federal detention, with Barr saying publicly, “we gotta make sure everyone thinks this is a suicide.” The speaker asks why Barr isn’t being questioned about this. Mike Pompeo is accused of plotting to murder Julian Assange, head of WikiLeaks. The speaker notes that WikiLeaks released the first tranche of emails to the public, and that Assange suggested on Dutch TV that his source was Seth Rich, a DNC staffer who was found murdered in Washington in what was described as a robbery where nothing was taken. Assange hinted in the interview that his sources faced great risks, mentioning Seth Rich; the interviewer pressed whether Rich was murdered for the leaks, and Assange said he couldn’t reveal sources but that they faced risks. Shortly after, Assange was incarcerated, first in an embassy in London and then in Belmarsh Prison, without criminal charges, actions the speaker attributes to the CIA and Mike Pompeo. The speaker contends that someone should ask Pompeo about this. Speaker 1: The speaker expresses anger at what they see as broad, systemic cover-ups versus ordinary Americans facing jail for minor offenses. They reference Pizzagate and Epstein, asserting that cover-ups extend across other issues, including Benghazi and Hillary Clinton material, which they claim were never properly pursued with the appropriate parties. They point to a long list of alleged co-conspirators connected to the Epstein matter, including those revealed in a recent document drop and corroborated subsequently. The list reportedly includes ten co-conspirators: one named Leslie Wexner, pilots (three identified by name), and others such as Ghislain Maxwell and various assistants who recruited girls, as well as individuals trafficking models. The speaker asserts there were many people around Epstein who were deeply involved and deserve serious questioning. They also reference Ehud Barak as among those connected to the network. Overall: The conversation presents multiple allegations of high-level complicity and cover-ups involving Bill Barr, Mike Pompeo, Julian Assange, Seth Rich, and a broad network around Jeffrey Epstein, including named and unnamed individuals, with claims of documented co-conspirators and ongoing questions about accountability.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: This story that's been the biggest thing on the Internet for several weeks, Pizzagate, as it's called, is a rabbit hole that is horrifying to go down. Now if you're a radio listener, this is a powerful video, but I've had it reposted because, again, he finished it, I guess, on Wednesday. It went out Thursday on the nightly news that was taped the day before. This is on infowars.com. Pizzagate is real. The only question is, what exactly is it? Because I'd said, man, I hope this is drug dealing code word or something or, you know, maybe they got the wrong manual because this is the FBI says this is this is pedophilia manuals. These are the terms they use, and then here's the New York Times. Fake news onslaught targets pizzeria as nest of child traffickers. Hey. I don't know why the pizzeria and the one down the street have symbols in the FBI dossier. I don't know why there's devil worship part of the walls. I don't know why it's connected to Potesta. I don't know why they got rock singers there talking about, you know, being you know, going after kids or whatever. This is what's going on, though. And so maybe it's just some genre they picked up. They don't know what they're involved in. I'm not accusing them of anything. Little I mean, it's not like they look like little piggy people or anything. Not like they fit all the cliches or anything when you go to the just like nice people to me, but the point is is that this is tied into Podesta with thousands of emails with, we're gonna have the six year old, the seven year old, and eight year old in the hot tub for your entertainment out at the ranch house. They can be a little persnickety, but they are also willing and enjoy it. Yeah. I mean, there's thousands of these. You're reading it going, what the hell is this? And you start reading it. There's thousands and thousands and thousands, and you know you're reading something real bad. Oh, I'll see you at the feast tonight. Oh, we'll have lots of blood and semen. Oh, good. And then they had, like, Time Magazine worshiping this high priestess the week after we exposed her about the news, all this PR, like, oh, we'll show them. They're attacking our high priestesses. We'll just put them in the news better. Like, we're all upstanding and out in the open and good people. Look. I've been careful about all this. This is lawsuit city. I don't know what the hell is going on with these people. I know straight up devil worship when I see it and find quotes of her saying it's real when she does it privately. Could he harass me anything Reddit accounts? I mean, I know real bathymen worship when I see it, but thousands of emails, I'm not ready to accuse all these people of this. It's up to you to research it for yourself, but you gotta go to infowars.com and actually see the photos and videos inside these places. You've gotta see their menus. You've gotta see it all, ladies and gentlemen, and then you gotta see the FBI law enforcement manuals showing the code words that are used. And by the way, didn't just believe this. I went to the FBI site. I went and looked it all up, and people asked, well, why weren't you on this earlier? We were on it from the beginning. We've been on it the last couple weeks since the election, but we're fighting on hundreds of fronts here. Let's go ahead and go to the report. Pizzagate is real. The question is, how real is it? What is it? Something's going on. Something's being covered up. It needs to be investigated. You just call it fake news. These are real WikiLeaks. This is real stuff going on. Here it is. Speaker 1: A warning to viewers, the following images are disturbing. This all began after WikiLeaks founder Julian Assange released hundreds of thousands of secret documents detailing a back stabbing Clinton Foundation, but it now appears the real truth Assange was leading us to was hidden between the blurred lines of Hillary Clinton's campaign manager, John Podesta's, released emails. Fast forward past John Podesta's brother, Tony's, casual email exchange with thalemic spirit cooking adherent Marina Abramovic. Rosetta Stone was needed next. A verification that high level Washington DC predatory pedophiles were using a code to communicate child sex trafficking as casually as ordering a pizza. An FBI unclassified document from WikiLeaks revealed symbols and logos used by pedophiles to identify sexual preferences to include those who sexually abuse children as well as those who produce, distribute, and trade child pornography are using various types of identification logos or symbols to recognize one another and distinguish their sexual preferences. Investigators should also be attentive to pedophilia symbols advertised on websites. During examinations of computer files, investigators should be conscious of subjects who try to conceal child pornography by labeling them with symbols instead of typical suggestive explicit names. Thus, the interest in code words. Now clues. The menu from comet ping pong. Notice the symbol of the ping pong paddles and its clever resemblance to the FBI documents symbol for child love. Alright. Hang on, New York Times. Before you declare this fake news from your ivory tower, now look at the symbol for Besta Pizza just two doors down from comet ping pong pizza, boldly using the symbol for boy lover as was recorded on the unclassified FBI document. The evidence begins to reveal that Besta Pizza and Comet Ping Pong Pizza may be competing for the lucrative Washington DC pedophile market right out in the open. Comet Ping Pong owner James Alifantis needs to explain himself, and so he did via the Hillary Clinton colluding New York Times. But so many questions remain unanswered. Why was this said by the band heavy breathing performing in comet ping pong? Speaker 0: He likes the world sounds. Demolios. And little boys. And children. Think I was his manager. Yep. We all have references. Speaker 1: Why is the art work adorning Comet Ping Pong's walls at the very least so insanely creepy, especially for a family restaurant? Why is Alifantis so close to Tony Podesta as revealed in the WikiLeaks emails? And why does mister Podesta collect questionable artwork specializing in grotesque eroticism and pedophilic images, not to mention Podesta's dabbling in what appears to be cannibalistic rituals while continuing his old friendship with convicted pedophile Dennis Hastard. Why is this man wearing an I love children shirt in this situation? Why did you write hashtag murder next to this incredibly creepy photo you posted? Why do you find it amusing that this baby is for sale? Why do you associate with this artist? Why is any of this okay? And if these code words are eventually proven to be just another method of communication, then why did the Podesta emails mention the code word pasta for either little boy or sex 78 times. Code word cheese for little girl 85 times. And what does Podesta's friend Herb mean by this statement from a Podesta email? PS. Do you think I'll do better playing dominoes on cheese than on pasta? According to the National Center for Missing and Exploited Children and the FBI, 460,699 children went missing in 2015 that we know of. Mister Alifantis, this isn't a witch hunt, and it isn't an attack from fake news that your boyfriend David Brock, founder of Media Matters, would have us all ignore. Either you are the unlucky victim of a fake news onslaught due to your own poorly initiated publicity or a decades old pedophile ring operating in the power hoarding shadows of Washington DC is about to be opened from your front door. John Bound for infowars.com. Speaker 0: Trump won. Hillary stole five states. Was ordered to stand down by the intelligence agencies where everything else is gonna come out on this. If you're a radio listener, you're lucky you didn't actually see the video. The art they tweet in Facebook is of children being murdered, cut in pieces, and raped by men with giant genitalia. So oh, yeah. Oh, yeah. So I don't know anymore, but that's what they're pushing. It's what they got hanging up in there, and it's what they're doing. And, I I can't go out there and investigate it myself. We've had reporters on that have been there. They say it's really creepy because, I don't have the self control to be around these type of people. So you want us to cover Pizzagate? We have covered it. We are covering it, and all I know is, god help us, we're in the hands of pure evil. We'll be right back. I'm on the show.

Video Saved From X

reSee.it Video Transcript AI Summary
A former Bernie Sanders supporter who worked for the DNC claims that the DNC rigged the primary against Sanders. He leaked information to WikiLeaks and was subsequently murdered. The speaker questions why people ignore this and dismiss it as a conspiracy theory. They also discuss Julian Assange and the consequences of sharing information with WikiLeaks. The speaker suggests that the CIA controls everyone and is trying to capture Assange. They mention the possibility of the Ecuadorian embassy being blown up. The speaker believes that there are many people connected to the Clinton Organization who have been silenced or harmed.

Video Saved From X

reSee.it Video Transcript AI Summary
War over Ukraine and Western support 'was an extension of Russiagate,' desensitizing the Democrat party to hate Russia. 'Cambridge Analytica' was the first attempt, and 'the Russia narrative came ex nihilo.' 'Tulsi is getting to the bottom of it.' 'Putin became an acceptable villain for the Democrat party' and 'That all goes back to Russiagate' and 'the lie of the dirty dossier.' 'Our intel services are supposed to gather intelligence and defend the homeland' but are 'actually more about picking winners and losers' and 'thwarting the will of pop popular sovereignty.' 'Obama personally ordered an intel report' concluding 'Russia was not behind this election' (December 2016, now declassified). 'FBI and the CIA' seem to be on the same page and 'the insurance policy' leads to 'Rosenstein' 'running the entire DOJ.' Perp walks are called for to address the 'fourth branch of government'—'unaccountable' and 'unelected.'

Video Saved From X

reSee.it Video Transcript AI Summary
Assange has been held in a UK prison without being charged with a crime. The US government wants to indict him, and the British government agreed to keep him in isolation until it's resolved. Before being charged in the US, the CIA director, Mike Pompeo, discussed assassinating Assange. This raises concerns about federal appointees using taxpayer money to murder someone who embarrassed them. Pompeo, however, remains free and even visits donors. It's disturbing that our government would use our money to kill someone who exposed their crimes, and no one seems to have a problem with it. This led the speaker to visit Assange, which turned out to be worse than expected.

Video Saved From X

reSee.it Video Transcript AI Summary
Hillary Clinton paid Perkins Coie, who hired Fusion GPS, who paid Christopher Steele, who hired Russians to create a fake dossier. The FBI used this dossier to undermine a presidency and overturn an election. When we questioned it, we were labeled as Russian bots. Then, during the election, the Hunter Biden laptop story broke. The FBI dismissed it as Russian disinformation, but it turned out to be true. If we talked about it, social media silenced us. On election night, suspicious votes for Biden flooded in, but questioning it led to losing social media accounts. The Durham report reveals that top government officials, including Obama and Biden, knew about the hoax. Yet, we're still called Russian bots. The Biden DOJ removed the IRS investigative team from the Hunter Biden laptop case. No one will be held accountable. We're living in a world of absurdity.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 states that a federal investigator told Fox News that an FBI forensic report on Seth Rich’s computer showed he made contact with WikiLeaks through a London-based WikiLeaks director, Gavin McFadden, and that Rich provided McFadden with more than 44,000 emails and nearly 18,000 attachments. Rich was killed near his DC home on July 10; his wallet, cell phone, and watch were not taken. WikiLeaks published internal DNC emails twelve days later showing top DNC officials trading ideas on how to hurt Bernie Sanders at the polls, leading to the resignation of Debbie Wasserman Schultz and the DNC’s top three officials because of the apparent conclusions in those emails. Speaker 1 asks if there is an October surprise and whether anything is known about what is being sat on. Speaker 2 replies that WikiLeaks never sits on material, noting that whistleblowers take significant risks to provide material. He references a 27-year-old DNC worker who was shot in the back in Washington two weeks earlier for unknown reasons, insisting there is no finding that it was a robbery, and questioning what is being implied. Speaker 1 presses, asking if the murdered man was one of their sources. Speaker 2 declines to comment on sources, reiterating that the stakes are high in the United States and that sources face serious risks, which is why they come to WikiLeaks to protect their anonymity. He acknowledges the seriousness of the murder and says they are investigating what happened with Seth Rich, though no conclusion has been reached, and that a variety of WikiLeaks sources are concerned when such events occur. Speaker 3 contends that Seth Rich was a Bernie Sanders supporter who worked for the DNC and implies the DNC rigged the primary against Bernie Sanders. He asserts Rich was murdered after leaking information to WikiLeaks, describing Rich as a young, idealistic patriot who wore American flag attire, and argues that the murder is connected to corruption in the Democratic Party. He reflects on his own experience with online detractors and acknowledges flaws in many political figures; he asserts that it is rare to find someone who wants to be “the king of the world” and notes his own perceived lack of reputation. Speaker 4 contributes with emotion, insisting that Seth Rich was murdered and that the claim of a botched robbery is unfounded, listing inconsistencies (wallet, watch, phone left behind). He references Julian Assange and Russia, calling Assange the “darling of the left” when Obama was in office and later noting that Assange is stuck in the Ecuadorian embassy. Speaker 5 and Speaker 6 discuss broader context: Speaker 6 notes that the week WikiLeaks coverage happened on Fox News coincided with Mueller’s appointment and Comey’s firing, suggesting Fox pivoted from Russia stories to Seth Rich to deflect. Speaker 7 explains DNC data release timing, claiming FAT (file allocation table) formatting changed last-modified times on files, implying data was downloaded to a physical device before publication, suggesting an inside job rather than a Russian hack. Speaker 8 links the chain of events to the FBI, CrowdStrike, and questions about the investigation, alleging possible media silence and questioning why the murder case wasn’t more scrutinized. Speaker 9 recalls a private investigator’s work and notes that the FBI came to possess Rich’s laptop, with some at the DNC suspecting political motivation behind his murder; he asserts a media lack of follow-up. Speaker 10 presents a much broader claim: on 11/01/2016, Hillary and Bill Clinton allegedly orchestrated a civilian coup through corruption and co-optation, and a counter coup through Julian Assange and WikiLeaks was initiated by intelligence communities to prevent Hillary from becoming president and to indict Obama administration figures, describing this as a silent, internet-based counter coup and promising a peaceful transition without violence.

Video Saved From X

reSee.it Video Transcript AI Summary
Adam Waldman, a Hollywood lawyer, was involved in the phony dossier scandal connecting Hollywood, British intelligence, and the Senate. Texts between Senator Mark Warner and Waldman reveal concerns about Assange's impact on Democrats, Obama, and the CIA. Discussions also involved Deripaska and Manafort. Daniel Jones, linked to the dossier, met with Waldman. The involvement of Ben Stiller and Christopher Steele in these discussions raises questions about treason against the United States. The focus on Assange by Obama, the CIA, and politicians contrasts with public opinion.

Video Saved From X

reSee.it Video Transcript AI Summary
Lindsay briefly mentions that she has been in contact with someone from Julian Assange's team who revealed that Seth Rich leaked the DNC information. This contradicts the Mueller report's claim that it was a Russian hacker. Lindsay also mentions that Seth Rich's murder remains unsolved, with no evidence of robbery. A judge is now pressuring the FBI to release previously withheld pages on this case. Tomorrow, they will discuss the matter further with Ty Claventure, the lawyer involved.

Video Saved From X

reSee.it Video Transcript AI Summary
Roger Stone, a longtime Trump adviser, claimed to have a backchannel to WikiLeaks and knowledge of their release of Hillary Clinton's emails. However, his statements lack evidence and are seen as trolling by many. Democrats question his credibility due to his close ties to Trump. Julian Assange, the founder of WikiLeaks, dismisses Stone's claims and states that he had publicly announced the release of information on Clinton before Stone's comments. Assange believes the focus on Stone is inconsequential unless it leads to war with Russia. He also clarifies that Stone was wrong about the content of the WikiLeaks disclosures. Stone's attempts to elevate his profile through trolling are criticized by Assange, who believes the US political culture has gone mad.
View Full Interactive Feed